Hay
Date
June 2, 2025, 2:10 p.m.

Environment
qemu-arm64
qemu-x86_64

[   22.937218] ==================================================================
[   22.937719] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1f8/0x49c8
[   22.938468] Read of size 4 at addr fff00000c6cc9e30 by task kunit_try_catch/252
[   22.939036] 
[   22.939793] CPU: 1 UID: 0 PID: 252 Comm: kunit_try_catch Tainted: G    B            N 6.12.32-rc1 #1
[   22.939999] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.940073] Hardware name: linux,dummy-virt (DT)
[   22.940158] Call trace:
[   22.940205]  dump_backtrace+0x9c/0x128
[   22.940339]  show_stack+0x20/0x38
[   22.940425]  dump_stack_lvl+0x8c/0xd0
[   22.940533]  print_report+0x118/0x5f0
[   22.940647]  kasan_report+0xdc/0x128
[   22.940754]  kasan_check_range+0x100/0x1a8
[   22.940858]  __kasan_check_read+0x20/0x30
[   22.940921]  kasan_atomics_helper+0x1f8/0x49c8
[   22.940976]  kasan_atomics+0x1a0/0x2e8
[   22.941028]  kunit_try_run_case+0x170/0x3f0
[   22.941080]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.941135]  kthread+0x24c/0x2d0
[   22.941182]  ret_from_fork+0x10/0x20
[   22.941253] 
[   22.948528] Allocated by task 252:
[   22.948865]  kasan_save_stack+0x3c/0x68
[   22.949555]  kasan_save_track+0x20/0x40
[   22.950042]  kasan_save_alloc_info+0x40/0x58
[   22.950533]  __kasan_kmalloc+0xd4/0xd8
[   22.950976]  __kmalloc_cache_noprof+0x154/0x320
[   22.951804]  kasan_atomics+0xb8/0x2e8
[   22.952282]  kunit_try_run_case+0x170/0x3f0
[   22.952744]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.953218]  kthread+0x24c/0x2d0
[   22.953711]  ret_from_fork+0x10/0x20
[   22.954120] 
[   22.954445] The buggy address belongs to the object at fff00000c6cc9e00
[   22.954445]  which belongs to the cache kmalloc-64 of size 64
[   22.956246] The buggy address is located 0 bytes to the right of
[   22.956246]  allocated 48-byte region [fff00000c6cc9e00, fff00000c6cc9e30)
[   22.957162] 
[   22.957517] The buggy address belongs to the physical page:
[   22.958016] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106cc9
[   22.958744] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   22.959724] page_type: f5(slab)
[   22.960149] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   22.960724] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   22.961484] page dumped because: kasan: bad access detected
[   22.962021] 
[   22.962290] Memory state around the buggy address:
[   22.962745]  fff00000c6cc9d00: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   22.963572]  fff00000c6cc9d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.965048] >fff00000c6cc9e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   22.965675]                                      ^
[   22.966394]  fff00000c6cc9e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.967143]  fff00000c6cc9f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.967725] ==================================================================
[   23.829306] ==================================================================
[   23.829882] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f40/0x49c8
[   23.830838] Read of size 4 at addr fff00000c6cc9e30 by task kunit_try_catch/252
[   23.831925] 
[   23.832675] CPU: 1 UID: 0 PID: 252 Comm: kunit_try_catch Tainted: G    B            N 6.12.32-rc1 #1
[   23.832947] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.832992] Hardware name: linux,dummy-virt (DT)
[   23.833039] Call trace:
[   23.833073]  dump_backtrace+0x9c/0x128
[   23.833142]  show_stack+0x20/0x38
[   23.833188]  dump_stack_lvl+0x8c/0xd0
[   23.833261]  print_report+0x118/0x5f0
[   23.833316]  kasan_report+0xdc/0x128
[   23.833364]  __asan_report_load4_noabort+0x20/0x30
[   23.833418]  kasan_atomics_helper+0x3f40/0x49c8
[   23.833472]  kasan_atomics+0x1a0/0x2e8
[   23.833544]  kunit_try_run_case+0x170/0x3f0
[   23.833594]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.833649]  kthread+0x24c/0x2d0
[   23.833695]  ret_from_fork+0x10/0x20
[   23.833747] 
[   23.838596] Allocated by task 252:
[   23.839077]  kasan_save_stack+0x3c/0x68
[   23.839693]  kasan_save_track+0x20/0x40
[   23.840214]  kasan_save_alloc_info+0x40/0x58
[   23.840630]  __kasan_kmalloc+0xd4/0xd8
[   23.841112]  __kmalloc_cache_noprof+0x154/0x320
[   23.841688]  kasan_atomics+0xb8/0x2e8
[   23.842181]  kunit_try_run_case+0x170/0x3f0
[   23.842601]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.843096]  kthread+0x24c/0x2d0
[   23.843573]  ret_from_fork+0x10/0x20
[   23.844037] 
[   23.844350] The buggy address belongs to the object at fff00000c6cc9e00
[   23.844350]  which belongs to the cache kmalloc-64 of size 64
[   23.845314] The buggy address is located 0 bytes to the right of
[   23.845314]  allocated 48-byte region [fff00000c6cc9e00, fff00000c6cc9e30)
[   23.846310] 
[   23.846654] The buggy address belongs to the physical page:
[   23.847129] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106cc9
[   23.847946] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   23.848499] page_type: f5(slab)
[   23.848965] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   23.849691] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   23.850331] page dumped because: kasan: bad access detected
[   23.850797] 
[   23.851086] Memory state around the buggy address:
[   23.851508]  fff00000c6cc9d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.852082]  fff00000c6cc9d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.852815] >fff00000c6cc9e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   23.853363]                                      ^
[   23.853877]  fff00000c6cc9e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.854548]  fff00000c6cc9f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.855044] ==================================================================
[   23.794824] ==================================================================
[   23.795382] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xd00/0x49c8
[   23.796172] Write of size 4 at addr fff00000c6cc9e30 by task kunit_try_catch/252
[   23.796895] 
[   23.797255] CPU: 1 UID: 0 PID: 252 Comm: kunit_try_catch Tainted: G    B            N 6.12.32-rc1 #1
[   23.797496] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.797577] Hardware name: linux,dummy-virt (DT)
[   23.797661] Call trace:
[   23.797729]  dump_backtrace+0x9c/0x128
[   23.797856]  show_stack+0x20/0x38
[   23.797949]  dump_stack_lvl+0x8c/0xd0
[   23.798052]  print_report+0x118/0x5f0
[   23.798153]  kasan_report+0xdc/0x128
[   23.798264]  kasan_check_range+0x100/0x1a8
[   23.798369]  __kasan_check_write+0x20/0x30
[   23.798481]  kasan_atomics_helper+0xd00/0x49c8
[   23.798574]  kasan_atomics+0x1a0/0x2e8
[   23.798626]  kunit_try_run_case+0x170/0x3f0
[   23.798679]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.798735]  kthread+0x24c/0x2d0
[   23.798783]  ret_from_fork+0x10/0x20
[   23.798836] 
[   23.804130] Allocated by task 252:
[   23.804633]  kasan_save_stack+0x3c/0x68
[   23.805169]  kasan_save_track+0x20/0x40
[   23.805646]  kasan_save_alloc_info+0x40/0x58
[   23.806197]  __kasan_kmalloc+0xd4/0xd8
[   23.807121]  __kmalloc_cache_noprof+0x154/0x320
[   23.807535]  kasan_atomics+0xb8/0x2e8
[   23.807901]  kunit_try_run_case+0x170/0x3f0
[   23.808279]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.810317]  kthread+0x24c/0x2d0
[   23.810935]  ret_from_fork+0x10/0x20
[   23.811998] 
[   23.812601] The buggy address belongs to the object at fff00000c6cc9e00
[   23.812601]  which belongs to the cache kmalloc-64 of size 64
[   23.814599] The buggy address is located 0 bytes to the right of
[   23.814599]  allocated 48-byte region [fff00000c6cc9e00, fff00000c6cc9e30)
[   23.816175] 
[   23.817586] The buggy address belongs to the physical page:
[   23.818693] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106cc9
[   23.819978] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   23.820616] page_type: f5(slab)
[   23.821012] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   23.821703] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   23.822306] page dumped because: kasan: bad access detected
[   23.822756] 
[   23.823037] Memory state around the buggy address:
[   23.823599]  fff00000c6cc9d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.824187]  fff00000c6cc9d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.824928] >fff00000c6cc9e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   23.825604]                                      ^
[   23.826001]  fff00000c6cc9e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.826656]  fff00000c6cc9f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.827303] ==================================================================
[   23.469306] ==================================================================
[   23.469875] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x8d8/0x49c8
[   23.470494] Write of size 4 at addr fff00000c6cc9e30 by task kunit_try_catch/252
[   23.471201] 
[   23.471531] CPU: 1 UID: 0 PID: 252 Comm: kunit_try_catch Tainted: G    B            N 6.12.32-rc1 #1
[   23.471761] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.471843] Hardware name: linux,dummy-virt (DT)
[   23.471935] Call trace:
[   23.472004]  dump_backtrace+0x9c/0x128
[   23.472135]  show_stack+0x20/0x38
[   23.472232]  dump_stack_lvl+0x8c/0xd0
[   23.472317]  print_report+0x118/0x5f0
[   23.472368]  kasan_report+0xdc/0x128
[   23.472414]  kasan_check_range+0x100/0x1a8
[   23.472463]  __kasan_check_write+0x20/0x30
[   23.472512]  kasan_atomics_helper+0x8d8/0x49c8
[   23.472565]  kasan_atomics+0x1a0/0x2e8
[   23.472614]  kunit_try_run_case+0x170/0x3f0
[   23.472665]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.472720]  kthread+0x24c/0x2d0
[   23.472767]  ret_from_fork+0x10/0x20
[   23.472819] 
[   23.477999] Allocated by task 252:
[   23.478494]  kasan_save_stack+0x3c/0x68
[   23.479048]  kasan_save_track+0x20/0x40
[   23.479559]  kasan_save_alloc_info+0x40/0x58
[   23.479969]  __kasan_kmalloc+0xd4/0xd8
[   23.480432]  __kmalloc_cache_noprof+0x154/0x320
[   23.480994]  kasan_atomics+0xb8/0x2e8
[   23.481471]  kunit_try_run_case+0x170/0x3f0
[   23.482011]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.482550]  kthread+0x24c/0x2d0
[   23.482944]  ret_from_fork+0x10/0x20
[   23.483434] 
[   23.483745] The buggy address belongs to the object at fff00000c6cc9e00
[   23.483745]  which belongs to the cache kmalloc-64 of size 64
[   23.484587] The buggy address is located 0 bytes to the right of
[   23.484587]  allocated 48-byte region [fff00000c6cc9e00, fff00000c6cc9e30)
[   23.485592] 
[   23.485911] The buggy address belongs to the physical page:
[   23.486454] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106cc9
[   23.487120] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   23.487644] page_type: f5(slab)
[   23.488107] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   23.488736] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   23.489402] page dumped because: kasan: bad access detected
[   23.489844] 
[   23.490127] Memory state around the buggy address:
[   23.490600]  fff00000c6cc9d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.491172]  fff00000c6cc9d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.491848] >fff00000c6cc9e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   23.492417]                                      ^
[   23.492852]  fff00000c6cc9e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.493533]  fff00000c6cc9f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.494010] ==================================================================
[   23.768345] ==================================================================
[   23.769136] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f4c/0x49c8
[   23.769853] Read of size 4 at addr fff00000c6cc9e30 by task kunit_try_catch/252
[   23.770527] 
[   23.770891] CPU: 1 UID: 0 PID: 252 Comm: kunit_try_catch Tainted: G    B            N 6.12.32-rc1 #1
[   23.771186] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.771287] Hardware name: linux,dummy-virt (DT)
[   23.771393] Call trace:
[   23.771459]  dump_backtrace+0x9c/0x128
[   23.771586]  show_stack+0x20/0x38
[   23.771687]  dump_stack_lvl+0x8c/0xd0
[   23.771791]  print_report+0x118/0x5f0
[   23.771893]  kasan_report+0xdc/0x128
[   23.771997]  __asan_report_load4_noabort+0x20/0x30
[   23.772087]  kasan_atomics_helper+0x3f4c/0x49c8
[   23.772145]  kasan_atomics+0x1a0/0x2e8
[   23.772195]  kunit_try_run_case+0x170/0x3f0
[   23.772278]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.772337]  kthread+0x24c/0x2d0
[   23.772387]  ret_from_fork+0x10/0x20
[   23.772444] 
[   23.777342] Allocated by task 252:
[   23.777828]  kasan_save_stack+0x3c/0x68
[   23.778265]  kasan_save_track+0x20/0x40
[   23.778632]  kasan_save_alloc_info+0x40/0x58
[   23.779163]  __kasan_kmalloc+0xd4/0xd8
[   23.779681]  __kmalloc_cache_noprof+0x154/0x320
[   23.780278]  kasan_atomics+0xb8/0x2e8
[   23.780758]  kunit_try_run_case+0x170/0x3f0
[   23.781253]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.781853]  kthread+0x24c/0x2d0
[   23.782252]  ret_from_fork+0x10/0x20
[   23.782670] 
[   23.783021] The buggy address belongs to the object at fff00000c6cc9e00
[   23.783021]  which belongs to the cache kmalloc-64 of size 64
[   23.783867] The buggy address is located 0 bytes to the right of
[   23.783867]  allocated 48-byte region [fff00000c6cc9e00, fff00000c6cc9e30)
[   23.784751] 
[   23.784932] The buggy address belongs to the physical page:
[   23.785273] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106cc9
[   23.786135] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   23.786752] page_type: f5(slab)
[   23.787110] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   23.787921] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   23.788563] page dumped because: kasan: bad access detected
[   23.789052] 
[   23.789306] Memory state around the buggy address:
[   23.789775]  fff00000c6cc9d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.790438]  fff00000c6cc9d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.791162] >fff00000c6cc9e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   23.791788]                                      ^
[   23.792192]  fff00000c6cc9e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.792745]  fff00000c6cc9f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.793362] ==================================================================
[   23.911956] ==================================================================
[   23.912630] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xe3c/0x49c8
[   23.913297] Read of size 8 at addr fff00000c6cc9e30 by task kunit_try_catch/252
[   23.913931] 
[   23.914266] CPU: 1 UID: 0 PID: 252 Comm: kunit_try_catch Tainted: G    B            N 6.12.32-rc1 #1
[   23.914490] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.914575] Hardware name: linux,dummy-virt (DT)
[   23.914670] Call trace:
[   23.914738]  dump_backtrace+0x9c/0x128
[   23.914865]  show_stack+0x20/0x38
[   23.914964]  dump_stack_lvl+0x8c/0xd0
[   23.915048]  print_report+0x118/0x5f0
[   23.915142]  kasan_report+0xdc/0x128
[   23.915191]  kasan_check_range+0x100/0x1a8
[   23.915262]  __kasan_check_read+0x20/0x30
[   23.915318]  kasan_atomics_helper+0xe3c/0x49c8
[   23.915372]  kasan_atomics+0x1a0/0x2e8
[   23.915422]  kunit_try_run_case+0x170/0x3f0
[   23.915476]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.915529]  kthread+0x24c/0x2d0
[   23.915576]  ret_from_fork+0x10/0x20
[   23.915630] 
[   23.920822] Allocated by task 252:
[   23.922015]  kasan_save_stack+0x3c/0x68
[   23.922423]  kasan_save_track+0x20/0x40
[   23.923015]  kasan_save_alloc_info+0x40/0x58
[   23.923604]  __kasan_kmalloc+0xd4/0xd8
[   23.924218]  __kmalloc_cache_noprof+0x154/0x320
[   23.924868]  kasan_atomics+0xb8/0x2e8
[   23.925420]  kunit_try_run_case+0x170/0x3f0
[   23.926029]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.926652]  kthread+0x24c/0x2d0
[   23.927192]  ret_from_fork+0x10/0x20
[   23.927779] 
[   23.928147] The buggy address belongs to the object at fff00000c6cc9e00
[   23.928147]  which belongs to the cache kmalloc-64 of size 64
[   23.928991] The buggy address is located 0 bytes to the right of
[   23.928991]  allocated 48-byte region [fff00000c6cc9e00, fff00000c6cc9e30)
[   23.929781] 
[   23.930109] The buggy address belongs to the physical page:
[   23.930749] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106cc9
[   23.931381] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   23.932061] page_type: f5(slab)
[   23.932436] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   23.933151] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   23.933798] page dumped because: kasan: bad access detected
[   23.934259] 
[   23.934552] Memory state around the buggy address:
[   23.935015]  fff00000c6cc9d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.935652]  fff00000c6cc9d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.936355] >fff00000c6cc9e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   23.936937]                                      ^
[   23.937331]  fff00000c6cc9e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.937901]  fff00000c6cc9f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.938555] ==================================================================
[   23.441964] ==================================================================
[   23.442665] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x810/0x49c8
[   23.443366] Write of size 4 at addr fff00000c6cc9e30 by task kunit_try_catch/252
[   23.443984] 
[   23.444335] CPU: 1 UID: 0 PID: 252 Comm: kunit_try_catch Tainted: G    B            N 6.12.32-rc1 #1
[   23.444572] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.444650] Hardware name: linux,dummy-virt (DT)
[   23.444739] Call trace:
[   23.444808]  dump_backtrace+0x9c/0x128
[   23.444943]  show_stack+0x20/0x38
[   23.445043]  dump_stack_lvl+0x8c/0xd0
[   23.445115]  print_report+0x118/0x5f0
[   23.445166]  kasan_report+0xdc/0x128
[   23.445212]  kasan_check_range+0x100/0x1a8
[   23.445293]  __kasan_check_write+0x20/0x30
[   23.445351]  kasan_atomics_helper+0x810/0x49c8
[   23.445405]  kasan_atomics+0x1a0/0x2e8
[   23.445455]  kunit_try_run_case+0x170/0x3f0
[   23.445525]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.445582]  kthread+0x24c/0x2d0
[   23.445631]  ret_from_fork+0x10/0x20
[   23.445684] 
[   23.450983] Allocated by task 252:
[   23.451390]  kasan_save_stack+0x3c/0x68
[   23.451878]  kasan_save_track+0x20/0x40
[   23.452402]  kasan_save_alloc_info+0x40/0x58
[   23.452948]  __kasan_kmalloc+0xd4/0xd8
[   23.453461]  __kmalloc_cache_noprof+0x154/0x320
[   23.454024]  kasan_atomics+0xb8/0x2e8
[   23.454473]  kunit_try_run_case+0x170/0x3f0
[   23.454982]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.455516]  kthread+0x24c/0x2d0
[   23.455856]  ret_from_fork+0x10/0x20
[   23.456341] 
[   23.456643] The buggy address belongs to the object at fff00000c6cc9e00
[   23.456643]  which belongs to the cache kmalloc-64 of size 64
[   23.457586] The buggy address is located 0 bytes to the right of
[   23.457586]  allocated 48-byte region [fff00000c6cc9e00, fff00000c6cc9e30)
[   23.458496] 
[   23.458828] The buggy address belongs to the physical page:
[   23.459344] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106cc9
[   23.460020] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   23.460715] page_type: f5(slab)
[   23.461092] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   23.461807] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   23.462447] page dumped because: kasan: bad access detected
[   23.462913] 
[   23.463197] Memory state around the buggy address:
[   23.463652]  fff00000c6cc9d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.464306]  fff00000c6cc9d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.464907] >fff00000c6cc9e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   23.465525]                                      ^
[   23.465962]  fff00000c6cc9e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.466663]  fff00000c6cc9f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.467295] ==================================================================
[   24.053702] ==================================================================
[   24.054296] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf94/0x49c8
[   24.055226] Write of size 8 at addr fff00000c6cc9e30 by task kunit_try_catch/252
[   24.055900] 
[   24.056228] CPU: 1 UID: 0 PID: 252 Comm: kunit_try_catch Tainted: G    B            N 6.12.32-rc1 #1
[   24.056430] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.056491] Hardware name: linux,dummy-virt (DT)
[   24.056565] Call trace:
[   24.056618]  dump_backtrace+0x9c/0x128
[   24.056718]  show_stack+0x20/0x38
[   24.056790]  dump_stack_lvl+0x8c/0xd0
[   24.056874]  print_report+0x118/0x5f0
[   24.056960]  kasan_report+0xdc/0x128
[   24.057036]  kasan_check_range+0x100/0x1a8
[   24.057121]  __kasan_check_write+0x20/0x30
[   24.057267]  kasan_atomics_helper+0xf94/0x49c8
[   24.057384]  kasan_atomics+0x1a0/0x2e8
[   24.057493]  kunit_try_run_case+0x170/0x3f0
[   24.057617]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.057760]  kthread+0x24c/0x2d0
[   24.057835]  ret_from_fork+0x10/0x20
[   24.057891] 
[   24.063839] Allocated by task 252:
[   24.064398]  kasan_save_stack+0x3c/0x68
[   24.064965]  kasan_save_track+0x20/0x40
[   24.065505]  kasan_save_alloc_info+0x40/0x58
[   24.065960]  __kasan_kmalloc+0xd4/0xd8
[   24.066484]  __kmalloc_cache_noprof+0x154/0x320
[   24.067105]  kasan_atomics+0xb8/0x2e8
[   24.067488]  kunit_try_run_case+0x170/0x3f0
[   24.068019]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.068546]  kthread+0x24c/0x2d0
[   24.068960]  ret_from_fork+0x10/0x20
[   24.069448] 
[   24.070175] The buggy address belongs to the object at fff00000c6cc9e00
[   24.070175]  which belongs to the cache kmalloc-64 of size 64
[   24.071601] The buggy address is located 0 bytes to the right of
[   24.071601]  allocated 48-byte region [fff00000c6cc9e00, fff00000c6cc9e30)
[   24.072230] 
[   24.073973] The buggy address belongs to the physical page:
[   24.075090] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106cc9
[   24.076607] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   24.078021] page_type: f5(slab)
[   24.079067] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   24.080663] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   24.081907] page dumped because: kasan: bad access detected
[   24.082470] 
[   24.082785] Memory state around the buggy address:
[   24.083184]  fff00000c6cc9d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.084008]  fff00000c6cc9d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.084738] >fff00000c6cc9e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   24.085352]                                      ^
[   24.085870]  fff00000c6cc9e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.086566]  fff00000c6cc9f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.087192] ==================================================================
[   22.906969] ==================================================================
[   22.907729] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x40e4/0x49c8
[   22.908336] Write of size 4 at addr fff00000c6cc9e30 by task kunit_try_catch/252
[   22.908979] 
[   22.910664] CPU: 1 UID: 0 PID: 252 Comm: kunit_try_catch Tainted: G    B            N 6.12.32-rc1 #1
[   22.910804] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.910843] Hardware name: linux,dummy-virt (DT)
[   22.910889] Call trace:
[   22.910921]  dump_backtrace+0x9c/0x128
[   22.910990]  show_stack+0x20/0x38
[   22.911036]  dump_stack_lvl+0x8c/0xd0
[   22.911086]  print_report+0x118/0x5f0
[   22.911202]  kasan_report+0xdc/0x128
[   22.911313]  __asan_report_store4_noabort+0x20/0x30
[   22.911417]  kasan_atomics_helper+0x40e4/0x49c8
[   22.911520]  kasan_atomics+0x1a0/0x2e8
[   22.911616]  kunit_try_run_case+0x170/0x3f0
[   22.911710]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.911768]  kthread+0x24c/0x2d0
[   22.911815]  ret_from_fork+0x10/0x20
[   22.911869] 
[   22.916767] Allocated by task 252:
[   22.916945]  kasan_save_stack+0x3c/0x68
[   22.917141]  kasan_save_track+0x20/0x40
[   22.917846]  kasan_save_alloc_info+0x40/0x58
[   22.918506]  __kasan_kmalloc+0xd4/0xd8
[   22.919107]  __kmalloc_cache_noprof+0x154/0x320
[   22.919710]  kasan_atomics+0xb8/0x2e8
[   22.920611]  kunit_try_run_case+0x170/0x3f0
[   22.921077]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.921702]  kthread+0x24c/0x2d0
[   22.922096]  ret_from_fork+0x10/0x20
[   22.922523] 
[   22.922790] The buggy address belongs to the object at fff00000c6cc9e00
[   22.922790]  which belongs to the cache kmalloc-64 of size 64
[   22.923926] The buggy address is located 0 bytes to the right of
[   22.923926]  allocated 48-byte region [fff00000c6cc9e00, fff00000c6cc9e30)
[   22.924971] 
[   22.926084] The buggy address belongs to the physical page:
[   22.926535] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106cc9
[   22.927126] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   22.928035] page_type: f5(slab)
[   22.928454] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   22.929060] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   22.929651] page dumped because: kasan: bad access detected
[   22.930146] 
[   22.930452] Memory state around the buggy address:
[   22.930934]  fff00000c6cc9d00: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   22.932402]  fff00000c6cc9d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.933020] >fff00000c6cc9e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   22.933662]                                      ^
[   22.934085]  fff00000c6cc9e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.934711]  fff00000c6cc9f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.935306] ==================================================================
[   24.635768] ==================================================================
[   24.636513] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1780/0x49c8
[   24.637678] Write of size 8 at addr fff00000c6cc9e30 by task kunit_try_catch/252
[   24.638498] 
[   24.638842] CPU: 1 UID: 0 PID: 252 Comm: kunit_try_catch Tainted: G    B            N 6.12.32-rc1 #1
[   24.639120] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.639208] Hardware name: linux,dummy-virt (DT)
[   24.639317] Call trace:
[   24.639365]  dump_backtrace+0x9c/0x128
[   24.639438]  show_stack+0x20/0x38
[   24.639485]  dump_stack_lvl+0x8c/0xd0
[   24.639538]  print_report+0x118/0x5f0
[   24.639587]  kasan_report+0xdc/0x128
[   24.639633]  kasan_check_range+0x100/0x1a8
[   24.639682]  __kasan_check_write+0x20/0x30
[   24.639730]  kasan_atomics_helper+0x1780/0x49c8
[   24.639784]  kasan_atomics+0x1a0/0x2e8
[   24.639833]  kunit_try_run_case+0x170/0x3f0
[   24.639884]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.639939]  kthread+0x24c/0x2d0
[   24.639986]  ret_from_fork+0x10/0x20
[   24.640038] 
[   24.645316] Allocated by task 252:
[   24.645802]  kasan_save_stack+0x3c/0x68
[   24.646255]  kasan_save_track+0x20/0x40
[   24.646712]  kasan_save_alloc_info+0x40/0x58
[   24.647268]  __kasan_kmalloc+0xd4/0xd8
[   24.647670]  __kmalloc_cache_noprof+0x154/0x320
[   24.648215]  kasan_atomics+0xb8/0x2e8
[   24.648710]  kunit_try_run_case+0x170/0x3f0
[   24.649246]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.649677]  kthread+0x24c/0x2d0
[   24.650154]  ret_from_fork+0x10/0x20
[   24.650644] 
[   24.650895] The buggy address belongs to the object at fff00000c6cc9e00
[   24.650895]  which belongs to the cache kmalloc-64 of size 64
[   24.651779] The buggy address is located 0 bytes to the right of
[   24.651779]  allocated 48-byte region [fff00000c6cc9e00, fff00000c6cc9e30)
[   24.652821] 
[   24.653130] The buggy address belongs to the physical page:
[   24.653534] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106cc9
[   24.654249] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   24.654942] page_type: f5(slab)
[   24.655391] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   24.656032] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   24.656703] page dumped because: kasan: bad access detected
[   24.657139] 
[   24.657446] Memory state around the buggy address:
[   24.657912]  fff00000c6cc9d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.658608]  fff00000c6cc9d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.659234] >fff00000c6cc9e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   24.659869]                                      ^
[   24.660375]  fff00000c6cc9e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.660995]  fff00000c6cc9f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.661633] ==================================================================
[   24.173875] ==================================================================
[   24.174414] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1144/0x49c8
[   24.175299] Write of size 8 at addr fff00000c6cc9e30 by task kunit_try_catch/252
[   24.176080] 
[   24.176455] CPU: 1 UID: 0 PID: 252 Comm: kunit_try_catch Tainted: G    B            N 6.12.32-rc1 #1
[   24.176649] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.176706] Hardware name: linux,dummy-virt (DT)
[   24.176775] Call trace:
[   24.176827]  dump_backtrace+0x9c/0x128
[   24.176936]  show_stack+0x20/0x38
[   24.177019]  dump_stack_lvl+0x8c/0xd0
[   24.177117]  print_report+0x118/0x5f0
[   24.177201]  kasan_report+0xdc/0x128
[   24.177300]  kasan_check_range+0x100/0x1a8
[   24.177382]  __kasan_check_write+0x20/0x30
[   24.177510]  kasan_atomics_helper+0x1144/0x49c8
[   24.177617]  kasan_atomics+0x1a0/0x2e8
[   24.177727]  kunit_try_run_case+0x170/0x3f0
[   24.177839]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.177951]  kthread+0x24c/0x2d0
[   24.178039]  ret_from_fork+0x10/0x20
[   24.178175] 
[   24.183910] Allocated by task 252:
[   24.184654]  kasan_save_stack+0x3c/0x68
[   24.185270]  kasan_save_track+0x20/0x40
[   24.185868]  kasan_save_alloc_info+0x40/0x58
[   24.186506]  __kasan_kmalloc+0xd4/0xd8
[   24.187183]  __kmalloc_cache_noprof+0x154/0x320
[   24.187757]  kasan_atomics+0xb8/0x2e8
[   24.188308]  kunit_try_run_case+0x170/0x3f0
[   24.188822]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.189323]  kthread+0x24c/0x2d0
[   24.189646]  ret_from_fork+0x10/0x20
[   24.189988] 
[   24.190721] The buggy address belongs to the object at fff00000c6cc9e00
[   24.190721]  which belongs to the cache kmalloc-64 of size 64
[   24.191731] The buggy address is located 0 bytes to the right of
[   24.191731]  allocated 48-byte region [fff00000c6cc9e00, fff00000c6cc9e30)
[   24.192623] 
[   24.192981] The buggy address belongs to the physical page:
[   24.193525] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106cc9
[   24.194307] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   24.194921] page_type: f5(slab)
[   24.195365] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   24.196066] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   24.196730] page dumped because: kasan: bad access detected
[   24.197233] 
[   24.197519] Memory state around the buggy address:
[   24.198006]  fff00000c6cc9d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.198741]  fff00000c6cc9d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.199414] >fff00000c6cc9e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   24.200012]                                      ^
[   24.200509]  fff00000c6cc9e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.201180]  fff00000c6cc9f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.201833] ==================================================================
[   24.689694] ==================================================================
[   24.690283] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1810/0x49c8
[   24.691151] Write of size 8 at addr fff00000c6cc9e30 by task kunit_try_catch/252
[   24.692175] 
[   24.692532] CPU: 1 UID: 0 PID: 252 Comm: kunit_try_catch Tainted: G    B            N 6.12.32-rc1 #1
[   24.692789] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.692873] Hardware name: linux,dummy-virt (DT)
[   24.692931] Call trace:
[   24.692965]  dump_backtrace+0x9c/0x128
[   24.693033]  show_stack+0x20/0x38
[   24.693080]  dump_stack_lvl+0x8c/0xd0
[   24.693129]  print_report+0x118/0x5f0
[   24.693178]  kasan_report+0xdc/0x128
[   24.693224]  kasan_check_range+0x100/0x1a8
[   24.693300]  __kasan_check_write+0x20/0x30
[   24.693351]  kasan_atomics_helper+0x1810/0x49c8
[   24.693405]  kasan_atomics+0x1a0/0x2e8
[   24.693455]  kunit_try_run_case+0x170/0x3f0
[   24.693527]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.693584]  kthread+0x24c/0x2d0
[   24.693634]  ret_from_fork+0x10/0x20
[   24.693689] 
[   24.699090] Allocated by task 252:
[   24.699487]  kasan_save_stack+0x3c/0x68
[   24.700042]  kasan_save_track+0x20/0x40
[   24.700579]  kasan_save_alloc_info+0x40/0x58
[   24.700996]  __kasan_kmalloc+0xd4/0xd8
[   24.701399]  __kmalloc_cache_noprof+0x154/0x320
[   24.701874]  kasan_atomics+0xb8/0x2e8
[   24.702431]  kunit_try_run_case+0x170/0x3f0
[   24.702854]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.703502]  kthread+0x24c/0x2d0
[   24.703871]  ret_from_fork+0x10/0x20
[   24.704375] 
[   24.704668] The buggy address belongs to the object at fff00000c6cc9e00
[   24.704668]  which belongs to the cache kmalloc-64 of size 64
[   24.705594] The buggy address is located 0 bytes to the right of
[   24.705594]  allocated 48-byte region [fff00000c6cc9e00, fff00000c6cc9e30)
[   24.706782] 
[   24.707137] The buggy address belongs to the physical page:
[   24.707674] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106cc9
[   24.708432] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   24.709059] page_type: f5(slab)
[   24.709565] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   24.710257] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   24.710997] page dumped because: kasan: bad access detected
[   24.711536] 
[   24.711828] Memory state around the buggy address:
[   24.712300]  fff00000c6cc9d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.713019]  fff00000c6cc9d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.713701] >fff00000c6cc9e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   24.714374]                                      ^
[   24.714846]  fff00000c6cc9e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.715515]  fff00000c6cc9f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.716123] ==================================================================
[   23.260494] ==================================================================
[   23.260899] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x578/0x49c8
[   23.261939] Write of size 4 at addr fff00000c6cc9e30 by task kunit_try_catch/252
[   23.262783] 
[   23.263181] CPU: 1 UID: 0 PID: 252 Comm: kunit_try_catch Tainted: G    B            N 6.12.32-rc1 #1
[   23.263430] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.263534] Hardware name: linux,dummy-virt (DT)
[   23.263620] Call trace:
[   23.263674]  dump_backtrace+0x9c/0x128
[   23.263805]  show_stack+0x20/0x38
[   23.263906]  dump_stack_lvl+0x8c/0xd0
[   23.264022]  print_report+0x118/0x5f0
[   23.264137]  kasan_report+0xdc/0x128
[   23.264233]  kasan_check_range+0x100/0x1a8
[   23.264333]  __kasan_check_write+0x20/0x30
[   23.264422]  kasan_atomics_helper+0x578/0x49c8
[   23.264524]  kasan_atomics+0x1a0/0x2e8
[   23.264652]  kunit_try_run_case+0x170/0x3f0
[   23.264771]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.264873]  kthread+0x24c/0x2d0
[   23.264975]  ret_from_fork+0x10/0x20
[   23.265090] 
[   23.271859] Allocated by task 252:
[   23.272348]  kasan_save_stack+0x3c/0x68
[   23.272865]  kasan_save_track+0x20/0x40
[   23.273596]  kasan_save_alloc_info+0x40/0x58
[   23.274126]  __kasan_kmalloc+0xd4/0xd8
[   23.274480]  __kmalloc_cache_noprof+0x154/0x320
[   23.274828]  kasan_atomics+0xb8/0x2e8
[   23.276141]  kunit_try_run_case+0x170/0x3f0
[   23.276547]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.276938]  kthread+0x24c/0x2d0
[   23.277256]  ret_from_fork+0x10/0x20
[   23.277584] 
[   23.277789] The buggy address belongs to the object at fff00000c6cc9e00
[   23.277789]  which belongs to the cache kmalloc-64 of size 64
[   23.280425] The buggy address is located 0 bytes to the right of
[   23.280425]  allocated 48-byte region [fff00000c6cc9e00, fff00000c6cc9e30)
[   23.282392] 
[   23.282709] The buggy address belongs to the physical page:
[   23.283287] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106cc9
[   23.284006] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   23.285808] page_type: f5(slab)
[   23.286438] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   23.288081] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   23.288832] page dumped because: kasan: bad access detected
[   23.289663] 
[   23.290137] Memory state around the buggy address:
[   23.290697]  fff00000c6cc9d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.293563]  fff00000c6cc9d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.294064] >fff00000c6cc9e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   23.294773]                                      ^
[   23.295673]  fff00000c6cc9e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.296326]  fff00000c6cc9f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.296767] ==================================================================
[   23.329607] ==================================================================
[   23.330271] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x650/0x49c8
[   23.330859] Write of size 4 at addr fff00000c6cc9e30 by task kunit_try_catch/252
[   23.332276] 
[   23.332857] CPU: 1 UID: 0 PID: 252 Comm: kunit_try_catch Tainted: G    B            N 6.12.32-rc1 #1
[   23.333099] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.333150] Hardware name: linux,dummy-virt (DT)
[   23.333196] Call trace:
[   23.333230]  dump_backtrace+0x9c/0x128
[   23.333324]  show_stack+0x20/0x38
[   23.333372]  dump_stack_lvl+0x8c/0xd0
[   23.333424]  print_report+0x118/0x5f0
[   23.333473]  kasan_report+0xdc/0x128
[   23.333534]  kasan_check_range+0x100/0x1a8
[   23.333584]  __kasan_check_write+0x20/0x30
[   23.333634]  kasan_atomics_helper+0x650/0x49c8
[   23.333685]  kasan_atomics+0x1a0/0x2e8
[   23.333734]  kunit_try_run_case+0x170/0x3f0
[   23.333784]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.333837]  kthread+0x24c/0x2d0
[   23.333885]  ret_from_fork+0x10/0x20
[   23.333937] 
[   23.339769] Allocated by task 252:
[   23.340316]  kasan_save_stack+0x3c/0x68
[   23.340905]  kasan_save_track+0x20/0x40
[   23.341452]  kasan_save_alloc_info+0x40/0x58
[   23.341916]  __kasan_kmalloc+0xd4/0xd8
[   23.342516]  __kmalloc_cache_noprof+0x154/0x320
[   23.343137]  kasan_atomics+0xb8/0x2e8
[   23.343637]  kunit_try_run_case+0x170/0x3f0
[   23.344168]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.344799]  kthread+0x24c/0x2d0
[   23.345280]  ret_from_fork+0x10/0x20
[   23.345769] 
[   23.346102] The buggy address belongs to the object at fff00000c6cc9e00
[   23.346102]  which belongs to the cache kmalloc-64 of size 64
[   23.347067] The buggy address is located 0 bytes to the right of
[   23.347067]  allocated 48-byte region [fff00000c6cc9e00, fff00000c6cc9e30)
[   23.348147] 
[   23.348536] The buggy address belongs to the physical page:
[   23.349085] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106cc9
[   23.349823] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   23.350457] page_type: f5(slab)
[   23.350956] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   23.351774] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   23.352577] page dumped because: kasan: bad access detected
[   23.353221] 
[   23.353529] Memory state around the buggy address:
[   23.354034]  fff00000c6cc9d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.354753]  fff00000c6cc9d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.355452] >fff00000c6cc9e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   23.356108]                                      ^
[   23.356709]  fff00000c6cc9e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.357404]  fff00000c6cc9f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.358046] ==================================================================
[   23.940313] ==================================================================
[   23.940887] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x40c0/0x49c8
[   23.941510] Read of size 8 at addr fff00000c6cc9e30 by task kunit_try_catch/252
[   23.942080] 
[   23.942603] CPU: 1 UID: 0 PID: 252 Comm: kunit_try_catch Tainted: G    B            N 6.12.32-rc1 #1
[   23.942806] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.942874] Hardware name: linux,dummy-virt (DT)
[   23.943097] Call trace:
[   23.943169]  dump_backtrace+0x9c/0x128
[   23.943318]  show_stack+0x20/0x38
[   23.943419]  dump_stack_lvl+0x8c/0xd0
[   23.943525]  print_report+0x118/0x5f0
[   23.943622]  kasan_report+0xdc/0x128
[   23.943724]  __asan_report_load8_noabort+0x20/0x30
[   23.943835]  kasan_atomics_helper+0x40c0/0x49c8
[   23.943949]  kasan_atomics+0x1a0/0x2e8
[   23.944060]  kunit_try_run_case+0x170/0x3f0
[   23.944164]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.944301]  kthread+0x24c/0x2d0
[   23.944423]  ret_from_fork+0x10/0x20
[   23.944541] 
[   23.949726] Allocated by task 252:
[   23.950130]  kasan_save_stack+0x3c/0x68
[   23.951265]  kasan_save_track+0x20/0x40
[   23.951690]  kasan_save_alloc_info+0x40/0x58
[   23.952112]  __kasan_kmalloc+0xd4/0xd8
[   23.952531]  __kmalloc_cache_noprof+0x154/0x320
[   23.953003]  kasan_atomics+0xb8/0x2e8
[   23.953405]  kunit_try_run_case+0x170/0x3f0
[   23.953950]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.954496]  kthread+0x24c/0x2d0
[   23.954977]  ret_from_fork+0x10/0x20
[   23.955354] 
[   23.955661] The buggy address belongs to the object at fff00000c6cc9e00
[   23.955661]  which belongs to the cache kmalloc-64 of size 64
[   23.956582] The buggy address is located 0 bytes to the right of
[   23.956582]  allocated 48-byte region [fff00000c6cc9e00, fff00000c6cc9e30)
[   23.957564] 
[   23.957903] The buggy address belongs to the physical page:
[   23.958344] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106cc9
[   23.959112] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   23.959767] page_type: f5(slab)
[   23.960142] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   23.960817] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   23.961417] page dumped because: kasan: bad access detected
[   23.961941] 
[   23.962247] Memory state around the buggy address:
[   23.962707]  fff00000c6cc9d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.963272]  fff00000c6cc9d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.963942] >fff00000c6cc9e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   23.964524]                                      ^
[   23.964902]  fff00000c6cc9e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.965604]  fff00000c6cc9f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.966154] ==================================================================
[   24.117509] ==================================================================
[   24.118066] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x106c/0x49c8
[   24.118780] Write of size 8 at addr fff00000c6cc9e30 by task kunit_try_catch/252
[   24.119412] 
[   24.119815] CPU: 1 UID: 0 PID: 252 Comm: kunit_try_catch Tainted: G    B            N 6.12.32-rc1 #1
[   24.120068] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.120174] Hardware name: linux,dummy-virt (DT)
[   24.120282] Call trace:
[   24.120361]  dump_backtrace+0x9c/0x128
[   24.120509]  show_stack+0x20/0x38
[   24.120566]  dump_stack_lvl+0x8c/0xd0
[   24.120622]  print_report+0x118/0x5f0
[   24.120709]  kasan_report+0xdc/0x128
[   24.120759]  kasan_check_range+0x100/0x1a8
[   24.120810]  __kasan_check_write+0x20/0x30
[   24.120860]  kasan_atomics_helper+0x106c/0x49c8
[   24.120915]  kasan_atomics+0x1a0/0x2e8
[   24.120963]  kunit_try_run_case+0x170/0x3f0
[   24.121015]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.121069]  kthread+0x24c/0x2d0
[   24.121117]  ret_from_fork+0x10/0x20
[   24.121169] 
[   24.126809] Allocated by task 252:
[   24.127363]  kasan_save_stack+0x3c/0x68
[   24.127926]  kasan_save_track+0x20/0x40
[   24.128456]  kasan_save_alloc_info+0x40/0x58
[   24.129028]  __kasan_kmalloc+0xd4/0xd8
[   24.129571]  __kmalloc_cache_noprof+0x154/0x320
[   24.130095]  kasan_atomics+0xb8/0x2e8
[   24.130632]  kunit_try_run_case+0x170/0x3f0
[   24.131159]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.131726]  kthread+0x24c/0x2d0
[   24.132151]  ret_from_fork+0x10/0x20
[   24.132557] 
[   24.132889] The buggy address belongs to the object at fff00000c6cc9e00
[   24.132889]  which belongs to the cache kmalloc-64 of size 64
[   24.133705] The buggy address is located 0 bytes to the right of
[   24.133705]  allocated 48-byte region [fff00000c6cc9e00, fff00000c6cc9e30)
[   24.134763] 
[   24.135126] The buggy address belongs to the physical page:
[   24.135706] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106cc9
[   24.136428] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   24.137061] page_type: f5(slab)
[   24.137513] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   24.138234] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   24.138877] page dumped because: kasan: bad access detected
[   24.139425] 
[   24.139690] Memory state around the buggy address:
[   24.140107]  fff00000c6cc9d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.140843]  fff00000c6cc9d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.141447] >fff00000c6cc9e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   24.142117]                                      ^
[   24.142569]  fff00000c6cc9e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.143256]  fff00000c6cc9f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.143863] ==================================================================
[   23.496626] ==================================================================
[   23.497270] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4440/0x49c8
[   23.497869] Read of size 4 at addr fff00000c6cc9e30 by task kunit_try_catch/252
[   23.498474] 
[   23.498809] CPU: 1 UID: 0 PID: 252 Comm: kunit_try_catch Tainted: G    B            N 6.12.32-rc1 #1
[   23.499038] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.499142] Hardware name: linux,dummy-virt (DT)
[   23.499264] Call trace:
[   23.499338]  dump_backtrace+0x9c/0x128
[   23.499472]  show_stack+0x20/0x38
[   23.499580]  dump_stack_lvl+0x8c/0xd0
[   23.499709]  print_report+0x118/0x5f0
[   23.499803]  kasan_report+0xdc/0x128
[   23.499880]  __asan_report_load4_noabort+0x20/0x30
[   23.499973]  kasan_atomics_helper+0x4440/0x49c8
[   23.500053]  kasan_atomics+0x1a0/0x2e8
[   23.500130]  kunit_try_run_case+0x170/0x3f0
[   23.500216]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.500323]  kthread+0x24c/0x2d0
[   23.500411]  ret_from_fork+0x10/0x20
[   23.500498] 
[   23.506049] Allocated by task 252:
[   23.506551]  kasan_save_stack+0x3c/0x68
[   23.507023]  kasan_save_track+0x20/0x40
[   23.507478]  kasan_save_alloc_info+0x40/0x58
[   23.507946]  __kasan_kmalloc+0xd4/0xd8
[   23.508449]  __kmalloc_cache_noprof+0x154/0x320
[   23.509021]  kasan_atomics+0xb8/0x2e8
[   23.509469]  kunit_try_run_case+0x170/0x3f0
[   23.509925]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.510390]  kthread+0x24c/0x2d0
[   23.510866]  ret_from_fork+0x10/0x20
[   23.511303] 
[   23.511596] The buggy address belongs to the object at fff00000c6cc9e00
[   23.511596]  which belongs to the cache kmalloc-64 of size 64
[   23.512466] The buggy address is located 0 bytes to the right of
[   23.512466]  allocated 48-byte region [fff00000c6cc9e00, fff00000c6cc9e30)
[   23.513359] 
[   23.513707] The buggy address belongs to the physical page:
[   23.514255] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106cc9
[   23.515059] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   23.515636] page_type: f5(slab)
[   23.516105] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   23.516774] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   23.517446] page dumped because: kasan: bad access detected
[   23.517879] 
[   23.518183] Memory state around the buggy address:
[   23.518686]  fff00000c6cc9d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.519315]  fff00000c6cc9d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.519933] >fff00000c6cc9e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   23.520618]                                      ^
[   23.521072]  fff00000c6cc9e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.521734]  fff00000c6cc9f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.522277] ==================================================================
[   23.415559] ==================================================================
[   23.416941] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x7a0/0x49c8
[   23.417563] Write of size 4 at addr fff00000c6cc9e30 by task kunit_try_catch/252
[   23.417944] 
[   23.418124] CPU: 1 UID: 0 PID: 252 Comm: kunit_try_catch Tainted: G    B            N 6.12.32-rc1 #1
[   23.418233] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.418293] Hardware name: linux,dummy-virt (DT)
[   23.418338] Call trace:
[   23.418369]  dump_backtrace+0x9c/0x128
[   23.418432]  show_stack+0x20/0x38
[   23.418480]  dump_stack_lvl+0x8c/0xd0
[   23.418532]  print_report+0x118/0x5f0
[   23.418581]  kasan_report+0xdc/0x128
[   23.418627]  kasan_check_range+0x100/0x1a8
[   23.418676]  __kasan_check_write+0x20/0x30
[   23.418725]  kasan_atomics_helper+0x7a0/0x49c8
[   23.418777]  kasan_atomics+0x1a0/0x2e8
[   23.418825]  kunit_try_run_case+0x170/0x3f0
[   23.418875]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.418929]  kthread+0x24c/0x2d0
[   23.418976]  ret_from_fork+0x10/0x20
[   23.419031] 
[   23.423662] Allocated by task 252:
[   23.424164]  kasan_save_stack+0x3c/0x68
[   23.424704]  kasan_save_track+0x20/0x40
[   23.425192]  kasan_save_alloc_info+0x40/0x58
[   23.425755]  __kasan_kmalloc+0xd4/0xd8
[   23.426149]  __kmalloc_cache_noprof+0x154/0x320
[   23.426642]  kasan_atomics+0xb8/0x2e8
[   23.427059]  kunit_try_run_case+0x170/0x3f0
[   23.427587]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.428232]  kthread+0x24c/0x2d0
[   23.428687]  ret_from_fork+0x10/0x20
[   23.429035] 
[   23.429373] The buggy address belongs to the object at fff00000c6cc9e00
[   23.429373]  which belongs to the cache kmalloc-64 of size 64
[   23.430401] The buggy address is located 0 bytes to the right of
[   23.430401]  allocated 48-byte region [fff00000c6cc9e00, fff00000c6cc9e30)
[   23.431566] 
[   23.431910] The buggy address belongs to the physical page:
[   23.432364] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106cc9
[   23.433190] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   23.433828] page_type: f5(slab)
[   23.434190] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   23.434930] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   23.435595] page dumped because: kasan: bad access detected
[   23.436115] 
[   23.436376] Memory state around the buggy address:
[   23.436923]  fff00000c6cc9d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.437469]  fff00000c6cc9d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.438165] >fff00000c6cc9e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   23.438753]                                      ^
[   23.439178]  fff00000c6cc9e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.439827]  fff00000c6cc9f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.440407] ==================================================================
[   23.524381] ==================================================================
[   23.524942] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x978/0x49c8
[   23.525604] Write of size 4 at addr fff00000c6cc9e30 by task kunit_try_catch/252
[   23.526171] 
[   23.526527] CPU: 1 UID: 0 PID: 252 Comm: kunit_try_catch Tainted: G    B            N 6.12.32-rc1 #1
[   23.526748] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.526830] Hardware name: linux,dummy-virt (DT)
[   23.526922] Call trace:
[   23.526987]  dump_backtrace+0x9c/0x128
[   23.527123]  show_stack+0x20/0x38
[   23.527226]  dump_stack_lvl+0x8c/0xd0
[   23.527328]  print_report+0x118/0x5f0
[   23.527381]  kasan_report+0xdc/0x128
[   23.527429]  kasan_check_range+0x100/0x1a8
[   23.527476]  __kasan_check_write+0x20/0x30
[   23.527526]  kasan_atomics_helper+0x978/0x49c8
[   23.527579]  kasan_atomics+0x1a0/0x2e8
[   23.527627]  kunit_try_run_case+0x170/0x3f0
[   23.527679]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.527733]  kthread+0x24c/0x2d0
[   23.527783]  ret_from_fork+0x10/0x20
[   23.527839] 
[   23.533150] Allocated by task 252:
[   23.533672]  kasan_save_stack+0x3c/0x68
[   23.534220]  kasan_save_track+0x20/0x40
[   23.534723]  kasan_save_alloc_info+0x40/0x58
[   23.535177]  __kasan_kmalloc+0xd4/0xd8
[   23.535638]  __kmalloc_cache_noprof+0x154/0x320
[   23.536164]  kasan_atomics+0xb8/0x2e8
[   23.536681]  kunit_try_run_case+0x170/0x3f0
[   23.537166]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.537683]  kthread+0x24c/0x2d0
[   23.538027]  ret_from_fork+0x10/0x20
[   23.538502] 
[   23.538807] The buggy address belongs to the object at fff00000c6cc9e00
[   23.538807]  which belongs to the cache kmalloc-64 of size 64
[   23.539763] The buggy address is located 0 bytes to the right of
[   23.539763]  allocated 48-byte region [fff00000c6cc9e00, fff00000c6cc9e30)
[   23.540766] 
[   23.541088] The buggy address belongs to the physical page:
[   23.541576] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106cc9
[   23.542315] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   23.542915] page_type: f5(slab)
[   23.543804] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   23.544499] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   23.544952] page dumped because: kasan: bad access detected
[   23.545325] 
[   23.545536] Memory state around the buggy address:
[   23.545850]  fff00000c6cc9d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.547619]  fff00000c6cc9d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.548802] >fff00000c6cc9e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   23.550069]                                      ^
[   23.550901]  fff00000c6cc9e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.552502]  fff00000c6cc9f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.554028] ==================================================================
[   23.583968] ==================================================================
[   23.584458] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa50/0x49c8
[   23.585125] Write of size 4 at addr fff00000c6cc9e30 by task kunit_try_catch/252
[   23.585620] 
[   23.585979] CPU: 1 UID: 0 PID: 252 Comm: kunit_try_catch Tainted: G    B            N 6.12.32-rc1 #1
[   23.586191] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.586282] Hardware name: linux,dummy-virt (DT)
[   23.586369] Call trace:
[   23.586430]  dump_backtrace+0x9c/0x128
[   23.586556]  show_stack+0x20/0x38
[   23.586652]  dump_stack_lvl+0x8c/0xd0
[   23.586736]  print_report+0x118/0x5f0
[   23.586789]  kasan_report+0xdc/0x128
[   23.586836]  kasan_check_range+0x100/0x1a8
[   23.586886]  __kasan_check_write+0x20/0x30
[   23.586933]  kasan_atomics_helper+0xa50/0x49c8
[   23.586987]  kasan_atomics+0x1a0/0x2e8
[   23.587036]  kunit_try_run_case+0x170/0x3f0
[   23.587126]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.587182]  kthread+0x24c/0x2d0
[   23.587231]  ret_from_fork+0x10/0x20
[   23.587312] 
[   23.593038] Allocated by task 252:
[   23.593414]  kasan_save_stack+0x3c/0x68
[   23.593724]  kasan_save_track+0x20/0x40
[   23.593966]  kasan_save_alloc_info+0x40/0x58
[   23.594213]  __kasan_kmalloc+0xd4/0xd8
[   23.594901]  __kmalloc_cache_noprof+0x154/0x320
[   23.595336]  kasan_atomics+0xb8/0x2e8
[   23.595580]  kunit_try_run_case+0x170/0x3f0
[   23.595835]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.596121]  kthread+0x24c/0x2d0
[   23.597070]  ret_from_fork+0x10/0x20
[   23.597631] 
[   23.597904] The buggy address belongs to the object at fff00000c6cc9e00
[   23.597904]  which belongs to the cache kmalloc-64 of size 64
[   23.598839] The buggy address is located 0 bytes to the right of
[   23.598839]  allocated 48-byte region [fff00000c6cc9e00, fff00000c6cc9e30)
[   23.599874] 
[   23.600223] The buggy address belongs to the physical page:
[   23.600796] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106cc9
[   23.601076] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   23.601535] page_type: f5(slab)
[   23.602089] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   23.602857] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   23.603544] page dumped because: kasan: bad access detected
[   23.603755] 
[   23.603870] Memory state around the buggy address:
[   23.604055]  fff00000c6cc9d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.604312]  fff00000c6cc9d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.604542] >fff00000c6cc9e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   23.604762]                                      ^
[   23.604942]  fff00000c6cc9e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.605169]  fff00000c6cc9f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.605640] ==================================================================
[   23.556251] ==================================================================
[   23.556891] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x9e4/0x49c8
[   23.557501] Write of size 4 at addr fff00000c6cc9e30 by task kunit_try_catch/252
[   23.558310] 
[   23.558659] CPU: 1 UID: 0 PID: 252 Comm: kunit_try_catch Tainted: G    B            N 6.12.32-rc1 #1
[   23.558883] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.558962] Hardware name: linux,dummy-virt (DT)
[   23.559052] Call trace:
[   23.559252]  dump_backtrace+0x9c/0x128
[   23.559407]  show_stack+0x20/0x38
[   23.559502]  dump_stack_lvl+0x8c/0xd0
[   23.559561]  print_report+0x118/0x5f0
[   23.559611]  kasan_report+0xdc/0x128
[   23.559656]  kasan_check_range+0x100/0x1a8
[   23.559705]  __kasan_check_write+0x20/0x30
[   23.559753]  kasan_atomics_helper+0x9e4/0x49c8
[   23.559806]  kasan_atomics+0x1a0/0x2e8
[   23.559853]  kunit_try_run_case+0x170/0x3f0
[   23.559904]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.559958]  kthread+0x24c/0x2d0
[   23.560004]  ret_from_fork+0x10/0x20
[   23.560059] 
[   23.564872] Allocated by task 252:
[   23.565309]  kasan_save_stack+0x3c/0x68
[   23.565883]  kasan_save_track+0x20/0x40
[   23.566293]  kasan_save_alloc_info+0x40/0x58
[   23.566977]  __kasan_kmalloc+0xd4/0xd8
[   23.567376]  __kmalloc_cache_noprof+0x154/0x320
[   23.568099]  kasan_atomics+0xb8/0x2e8
[   23.568608]  kunit_try_run_case+0x170/0x3f0
[   23.569147]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.569742]  kthread+0x24c/0x2d0
[   23.570180]  ret_from_fork+0x10/0x20
[   23.570563] 
[   23.570893] The buggy address belongs to the object at fff00000c6cc9e00
[   23.570893]  which belongs to the cache kmalloc-64 of size 64
[   23.571862] The buggy address is located 0 bytes to the right of
[   23.571862]  allocated 48-byte region [fff00000c6cc9e00, fff00000c6cc9e30)
[   23.572792] 
[   23.573152] The buggy address belongs to the physical page:
[   23.573736] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106cc9
[   23.574471] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   23.575089] page_type: f5(slab)
[   23.575494] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   23.576120] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   23.576764] page dumped because: kasan: bad access detected
[   23.577345] 
[   23.577656] Memory state around the buggy address:
[   23.578131]  fff00000c6cc9d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.578828]  fff00000c6cc9d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.579465] >fff00000c6cc9e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   23.580054]                                      ^
[   23.580510]  fff00000c6cc9e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.581234]  fff00000c6cc9f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.581756] ==================================================================
[   23.069953] ==================================================================
[   23.070710] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x344/0x49c8
[   23.071296] Write of size 4 at addr fff00000c6cc9e30 by task kunit_try_catch/252
[   23.072042] 
[   23.072413] CPU: 1 UID: 0 PID: 252 Comm: kunit_try_catch Tainted: G    B            N 6.12.32-rc1 #1
[   23.072652] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.072728] Hardware name: linux,dummy-virt (DT)
[   23.072814] Call trace:
[   23.072877]  dump_backtrace+0x9c/0x128
[   23.073002]  show_stack+0x20/0x38
[   23.073098]  dump_stack_lvl+0x8c/0xd0
[   23.073207]  print_report+0x118/0x5f0
[   23.073336]  kasan_report+0xdc/0x128
[   23.073432]  kasan_check_range+0x100/0x1a8
[   23.073537]  __kasan_check_write+0x20/0x30
[   23.073620]  kasan_atomics_helper+0x344/0x49c8
[   23.073746]  kasan_atomics+0x1a0/0x2e8
[   23.073832]  kunit_try_run_case+0x170/0x3f0
[   23.073911]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.074005]  kthread+0x24c/0x2d0
[   23.074093]  ret_from_fork+0x10/0x20
[   23.074177] 
[   23.081201] Allocated by task 252:
[   23.081618]  kasan_save_stack+0x3c/0x68
[   23.081995]  kasan_save_track+0x20/0x40
[   23.082843]  kasan_save_alloc_info+0x40/0x58
[   23.083306]  __kasan_kmalloc+0xd4/0xd8
[   23.083633]  __kmalloc_cache_noprof+0x154/0x320
[   23.084786]  kasan_atomics+0xb8/0x2e8
[   23.085112]  kunit_try_run_case+0x170/0x3f0
[   23.085623]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.086293]  kthread+0x24c/0x2d0
[   23.086706]  ret_from_fork+0x10/0x20
[   23.087190] 
[   23.087496] The buggy address belongs to the object at fff00000c6cc9e00
[   23.087496]  which belongs to the cache kmalloc-64 of size 64
[   23.088775] The buggy address is located 0 bytes to the right of
[   23.088775]  allocated 48-byte region [fff00000c6cc9e00, fff00000c6cc9e30)
[   23.089959] 
[   23.090421] The buggy address belongs to the physical page:
[   23.091013] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106cc9
[   23.091814] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   23.093114] page_type: f5(slab)
[   23.093673] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   23.094651] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   23.095470] page dumped because: kasan: bad access detected
[   23.096361] 
[   23.096650] Memory state around the buggy address:
[   23.097115]  fff00000c6cc9d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.097700]  fff00000c6cc9d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.098694] >fff00000c6cc9e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   23.099424]                                      ^
[   23.099839]  fff00000c6cc9e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.100200]  fff00000c6cc9f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.101324] ==================================================================
[   23.883385] ==================================================================
[   23.883937] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f6c/0x49c8
[   23.884753] Read of size 4 at addr fff00000c6cc9e30 by task kunit_try_catch/252
[   23.885522] 
[   23.885811] CPU: 1 UID: 0 PID: 252 Comm: kunit_try_catch Tainted: G    B            N 6.12.32-rc1 #1
[   23.886047] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.886133] Hardware name: linux,dummy-virt (DT)
[   23.886232] Call trace:
[   23.886300]  dump_backtrace+0x9c/0x128
[   23.886372]  show_stack+0x20/0x38
[   23.886462]  dump_stack_lvl+0x8c/0xd0
[   23.886570]  print_report+0x118/0x5f0
[   23.886666]  kasan_report+0xdc/0x128
[   23.886764]  __asan_report_load4_noabort+0x20/0x30
[   23.886876]  kasan_atomics_helper+0x3f6c/0x49c8
[   23.886988]  kasan_atomics+0x1a0/0x2e8
[   23.887144]  kunit_try_run_case+0x170/0x3f0
[   23.887211]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.887298]  kthread+0x24c/0x2d0
[   23.887350]  ret_from_fork+0x10/0x20
[   23.887406] 
[   23.894287] Allocated by task 252:
[   23.894650]  kasan_save_stack+0x3c/0x68
[   23.895018]  kasan_save_track+0x20/0x40
[   23.895641]  kasan_save_alloc_info+0x40/0x58
[   23.896088]  __kasan_kmalloc+0xd4/0xd8
[   23.896588]  __kmalloc_cache_noprof+0x154/0x320
[   23.896967]  kasan_atomics+0xb8/0x2e8
[   23.897498]  kunit_try_run_case+0x170/0x3f0
[   23.897955]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.898558]  kthread+0x24c/0x2d0
[   23.898887]  ret_from_fork+0x10/0x20
[   23.899364] 
[   23.899629] The buggy address belongs to the object at fff00000c6cc9e00
[   23.899629]  which belongs to the cache kmalloc-64 of size 64
[   23.900446] The buggy address is located 0 bytes to the right of
[   23.900446]  allocated 48-byte region [fff00000c6cc9e00, fff00000c6cc9e30)
[   23.901461] 
[   23.901792] The buggy address belongs to the physical page:
[   23.902293] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106cc9
[   23.902991] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   23.903589] page_type: f5(slab)
[   23.903998] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   23.904723] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   23.905405] page dumped because: kasan: bad access detected
[   23.905908] 
[   23.906173] Memory state around the buggy address:
[   23.906663]  fff00000c6cc9d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.907285]  fff00000c6cc9d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.907949] >fff00000c6cc9e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   23.908588]                                      ^
[   23.909040]  fff00000c6cc9e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.909673]  fff00000c6cc9f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.910248] ==================================================================
[   23.994841] ==================================================================
[   23.995383] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3fc4/0x49c8
[   23.996005] Write of size 8 at addr fff00000c6cc9e30 by task kunit_try_catch/252
[   23.996593] 
[   23.996949] CPU: 1 UID: 0 PID: 252 Comm: kunit_try_catch Tainted: G    B            N 6.12.32-rc1 #1
[   23.997193] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.997293] Hardware name: linux,dummy-virt (DT)
[   23.997387] Call trace:
[   23.997462]  dump_backtrace+0x9c/0x128
[   23.997601]  show_stack+0x20/0x38
[   23.997673]  dump_stack_lvl+0x8c/0xd0
[   23.997729]  print_report+0x118/0x5f0
[   23.997779]  kasan_report+0xdc/0x128
[   23.997826]  __asan_report_store8_noabort+0x20/0x30
[   23.997880]  kasan_atomics_helper+0x3fc4/0x49c8
[   23.997933]  kasan_atomics+0x1a0/0x2e8
[   23.997982]  kunit_try_run_case+0x170/0x3f0
[   23.998033]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.998087]  kthread+0x24c/0x2d0
[   23.998135]  ret_from_fork+0x10/0x20
[   23.998189] 
[   24.003175] Allocated by task 252:
[   24.003633]  kasan_save_stack+0x3c/0x68
[   24.004115]  kasan_save_track+0x20/0x40
[   24.004608]  kasan_save_alloc_info+0x40/0x58
[   24.005165]  __kasan_kmalloc+0xd4/0xd8
[   24.005644]  __kmalloc_cache_noprof+0x154/0x320
[   24.006189]  kasan_atomics+0xb8/0x2e8
[   24.006714]  kunit_try_run_case+0x170/0x3f0
[   24.007212]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.007752]  kthread+0x24c/0x2d0
[   24.008122]  ret_from_fork+0x10/0x20
[   24.008625] 
[   24.008864] The buggy address belongs to the object at fff00000c6cc9e00
[   24.008864]  which belongs to the cache kmalloc-64 of size 64
[   24.009788] The buggy address is located 0 bytes to the right of
[   24.009788]  allocated 48-byte region [fff00000c6cc9e00, fff00000c6cc9e30)
[   24.010764] 
[   24.011084] The buggy address belongs to the physical page:
[   24.011608] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106cc9
[   24.012408] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   24.012981] page_type: f5(slab)
[   24.013428] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   24.014132] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   24.014750] page dumped because: kasan: bad access detected
[   24.015191] 
[   24.015491] Memory state around the buggy address:
[   24.015897]  fff00000c6cc9d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.016560]  fff00000c6cc9d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.017261] >fff00000c6cc9e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   24.017877]                                      ^
[   24.018392]  fff00000c6cc9e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.018965]  fff00000c6cc9f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.019552] ==================================================================
[   23.635606] ==================================================================
[   23.636070] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xb28/0x49c8
[   23.636493] Write of size 4 at addr fff00000c6cc9e30 by task kunit_try_catch/252
[   23.637210] 
[   23.637607] CPU: 1 UID: 0 PID: 252 Comm: kunit_try_catch Tainted: G    B            N 6.12.32-rc1 #1
[   23.637835] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.637919] Hardware name: linux,dummy-virt (DT)
[   23.638035] Call trace:
[   23.638098]  dump_backtrace+0x9c/0x128
[   23.638253]  show_stack+0x20/0x38
[   23.638356]  dump_stack_lvl+0x8c/0xd0
[   23.638460]  print_report+0x118/0x5f0
[   23.638579]  kasan_report+0xdc/0x128
[   23.638675]  kasan_check_range+0x100/0x1a8
[   23.638782]  __kasan_check_write+0x20/0x30
[   23.638897]  kasan_atomics_helper+0xb28/0x49c8
[   23.639007]  kasan_atomics+0x1a0/0x2e8
[   23.639138]  kunit_try_run_case+0x170/0x3f0
[   23.639214]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.639297]  kthread+0x24c/0x2d0
[   23.639351]  ret_from_fork+0x10/0x20
[   23.639404] 
[   23.646471] Allocated by task 252:
[   23.646934]  kasan_save_stack+0x3c/0x68
[   23.647386]  kasan_save_track+0x20/0x40
[   23.647874]  kasan_save_alloc_info+0x40/0x58
[   23.648367]  __kasan_kmalloc+0xd4/0xd8
[   23.648778]  __kmalloc_cache_noprof+0x154/0x320
[   23.649294]  kasan_atomics+0xb8/0x2e8
[   23.649756]  kunit_try_run_case+0x170/0x3f0
[   23.650228]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.650774]  kthread+0x24c/0x2d0
[   23.651181]  ret_from_fork+0x10/0x20
[   23.651671] 
[   23.651946] The buggy address belongs to the object at fff00000c6cc9e00
[   23.651946]  which belongs to the cache kmalloc-64 of size 64
[   23.652837] The buggy address is located 0 bytes to the right of
[   23.652837]  allocated 48-byte region [fff00000c6cc9e00, fff00000c6cc9e30)
[   23.653891] 
[   23.654223] The buggy address belongs to the physical page:
[   23.654787] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106cc9
[   23.655226] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   23.655964] page_type: f5(slab)
[   23.656463] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   23.657168] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   23.657828] page dumped because: kasan: bad access detected
[   23.658360] 
[   23.658603] Memory state around the buggy address:
[   23.659174]  fff00000c6cc9d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.659831]  fff00000c6cc9d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.660474] >fff00000c6cc9e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   23.661086]                                      ^
[   23.661589]  fff00000c6cc9e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.662206]  fff00000c6cc9f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.662836] ==================================================================
[   23.716282] ==================================================================
[   23.716790] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f24/0x49c8
[   23.717328] Read of size 4 at addr fff00000c6cc9e30 by task kunit_try_catch/252
[   23.718608] 
[   23.719108] CPU: 1 UID: 0 PID: 252 Comm: kunit_try_catch Tainted: G    B            N 6.12.32-rc1 #1
[   23.719335] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.719423] Hardware name: linux,dummy-virt (DT)
[   23.719504] Call trace:
[   23.719542]  dump_backtrace+0x9c/0x128
[   23.719614]  show_stack+0x20/0x38
[   23.719662]  dump_stack_lvl+0x8c/0xd0
[   23.719711]  print_report+0x118/0x5f0
[   23.719759]  kasan_report+0xdc/0x128
[   23.719804]  __asan_report_load4_noabort+0x20/0x30
[   23.719855]  kasan_atomics_helper+0x3f24/0x49c8
[   23.719905]  kasan_atomics+0x1a0/0x2e8
[   23.719953]  kunit_try_run_case+0x170/0x3f0
[   23.720001]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.720052]  kthread+0x24c/0x2d0
[   23.720102]  ret_from_fork+0x10/0x20
[   23.720152] 
[   23.724957] Allocated by task 252:
[   23.725450]  kasan_save_stack+0x3c/0x68
[   23.725984]  kasan_save_track+0x20/0x40
[   23.726422]  kasan_save_alloc_info+0x40/0x58
[   23.726936]  __kasan_kmalloc+0xd4/0xd8
[   23.727451]  __kmalloc_cache_noprof+0x154/0x320
[   23.727977]  kasan_atomics+0xb8/0x2e8
[   23.728410]  kunit_try_run_case+0x170/0x3f0
[   23.728950]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.729567]  kthread+0x24c/0x2d0
[   23.730041]  ret_from_fork+0x10/0x20
[   23.730527] 
[   23.730843] The buggy address belongs to the object at fff00000c6cc9e00
[   23.730843]  which belongs to the cache kmalloc-64 of size 64
[   23.731746] The buggy address is located 0 bytes to the right of
[   23.731746]  allocated 48-byte region [fff00000c6cc9e00, fff00000c6cc9e30)
[   23.732667] 
[   23.733006] The buggy address belongs to the physical page:
[   23.733463] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106cc9
[   23.734252] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   23.734856] page_type: f5(slab)
[   23.735293] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   23.735925] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   23.736587] page dumped because: kasan: bad access detected
[   23.737049] 
[   23.737351] Memory state around the buggy address:
[   23.737792]  fff00000c6cc9d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.738410]  fff00000c6cc9d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.739018] >fff00000c6cc9e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   23.739454]                                      ^
[   23.739882]  fff00000c6cc9e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.740458]  fff00000c6cc9f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.741122] ==================================================================
[   24.549555] ==================================================================
[   24.550181] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f18/0x49c8
[   24.550960] Read of size 8 at addr fff00000c6cc9e30 by task kunit_try_catch/252
[   24.552340] 
[   24.552714] CPU: 1 UID: 0 PID: 252 Comm: kunit_try_catch Tainted: G    B            N 6.12.32-rc1 #1
[   24.552943] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.553005] Hardware name: linux,dummy-virt (DT)
[   24.553088] Call trace:
[   24.553146]  dump_backtrace+0x9c/0x128
[   24.553269]  show_stack+0x20/0x38
[   24.553345]  dump_stack_lvl+0x8c/0xd0
[   24.553426]  print_report+0x118/0x5f0
[   24.553520]  kasan_report+0xdc/0x128
[   24.553601]  __asan_report_load8_noabort+0x20/0x30
[   24.553696]  kasan_atomics_helper+0x3f18/0x49c8
[   24.553792]  kasan_atomics+0x1a0/0x2e8
[   24.553885]  kunit_try_run_case+0x170/0x3f0
[   24.554004]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.554136]  kthread+0x24c/0x2d0
[   24.554213]  ret_from_fork+0x10/0x20
[   24.554299] 
[   24.559081] Allocated by task 252:
[   24.559555]  kasan_save_stack+0x3c/0x68
[   24.559974]  kasan_save_track+0x20/0x40
[   24.560511]  kasan_save_alloc_info+0x40/0x58
[   24.561055]  __kasan_kmalloc+0xd4/0xd8
[   24.561568]  __kmalloc_cache_noprof+0x154/0x320
[   24.561939]  kasan_atomics+0xb8/0x2e8
[   24.562377]  kunit_try_run_case+0x170/0x3f0
[   24.562882]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.563434]  kthread+0x24c/0x2d0
[   24.563792]  ret_from_fork+0x10/0x20
[   24.564199] 
[   24.564522] The buggy address belongs to the object at fff00000c6cc9e00
[   24.564522]  which belongs to the cache kmalloc-64 of size 64
[   24.565396] The buggy address is located 0 bytes to the right of
[   24.565396]  allocated 48-byte region [fff00000c6cc9e00, fff00000c6cc9e30)
[   24.566327] 
[   24.566645] The buggy address belongs to the physical page:
[   24.567246] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106cc9
[   24.567875] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   24.568507] page_type: f5(slab)
[   24.568901] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   24.569714] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   24.570472] page dumped because: kasan: bad access detected
[   24.571134] 
[   24.571583] Memory state around the buggy address:
[   24.572017]  fff00000c6cc9d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.572616]  fff00000c6cc9d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.573202] >fff00000c6cc9e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   24.574110]                                      ^
[   24.574568]  fff00000c6cc9e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.575118]  fff00000c6cc9f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.575947] ==================================================================
[   23.102833] ==================================================================
[   23.103415] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x40fc/0x49c8
[   23.104661] Write of size 4 at addr fff00000c6cc9e30 by task kunit_try_catch/252
[   23.105762] 
[   23.106097] CPU: 1 UID: 0 PID: 252 Comm: kunit_try_catch Tainted: G    B            N 6.12.32-rc1 #1
[   23.106294] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.106364] Hardware name: linux,dummy-virt (DT)
[   23.106416] Call trace:
[   23.106452]  dump_backtrace+0x9c/0x128
[   23.106522]  show_stack+0x20/0x38
[   23.106570]  dump_stack_lvl+0x8c/0xd0
[   23.106622]  print_report+0x118/0x5f0
[   23.106671]  kasan_report+0xdc/0x128
[   23.106716]  __asan_report_store4_noabort+0x20/0x30
[   23.106769]  kasan_atomics_helper+0x40fc/0x49c8
[   23.106824]  kasan_atomics+0x1a0/0x2e8
[   23.106872]  kunit_try_run_case+0x170/0x3f0
[   23.106924]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.106978]  kthread+0x24c/0x2d0
[   23.107028]  ret_from_fork+0x10/0x20
[   23.107148] 
[   23.113614] Allocated by task 252:
[   23.114141]  kasan_save_stack+0x3c/0x68
[   23.114725]  kasan_save_track+0x20/0x40
[   23.115419]  kasan_save_alloc_info+0x40/0x58
[   23.115966]  __kasan_kmalloc+0xd4/0xd8
[   23.116651]  __kmalloc_cache_noprof+0x154/0x320
[   23.116988]  kasan_atomics+0xb8/0x2e8
[   23.117283]  kunit_try_run_case+0x170/0x3f0
[   23.117816]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.118473]  kthread+0x24c/0x2d0
[   23.118986]  ret_from_fork+0x10/0x20
[   23.119969] 
[   23.120324] The buggy address belongs to the object at fff00000c6cc9e00
[   23.120324]  which belongs to the cache kmalloc-64 of size 64
[   23.121431] The buggy address is located 0 bytes to the right of
[   23.121431]  allocated 48-byte region [fff00000c6cc9e00, fff00000c6cc9e30)
[   23.122476] 
[   23.122809] The buggy address belongs to the physical page:
[   23.123440] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106cc9
[   23.124072] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   23.125254] page_type: f5(slab)
[   23.125954] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   23.126656] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   23.127076] page dumped because: kasan: bad access detected
[   23.128025] 
[   23.128345] Memory state around the buggy address:
[   23.128852]  fff00000c6cc9d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.129387]  fff00000c6cc9d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.130103] >fff00000c6cc9e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   23.130669]                                      ^
[   23.131467]  fff00000c6cc9e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.132286]  fff00000c6cc9f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.132888] ==================================================================
[   24.203756] ==================================================================
[   24.204389] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x11b0/0x49c8
[   24.205037] Write of size 8 at addr fff00000c6cc9e30 by task kunit_try_catch/252
[   24.205657] 
[   24.206030] CPU: 1 UID: 0 PID: 252 Comm: kunit_try_catch Tainted: G    B            N 6.12.32-rc1 #1
[   24.206264] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.206361] Hardware name: linux,dummy-virt (DT)
[   24.206459] Call trace:
[   24.206530]  dump_backtrace+0x9c/0x128
[   24.206678]  show_stack+0x20/0x38
[   24.206778]  dump_stack_lvl+0x8c/0xd0
[   24.206865]  print_report+0x118/0x5f0
[   24.206918]  kasan_report+0xdc/0x128
[   24.206971]  kasan_check_range+0x100/0x1a8
[   24.207051]  __kasan_check_write+0x20/0x30
[   24.207154]  kasan_atomics_helper+0x11b0/0x49c8
[   24.207211]  kasan_atomics+0x1a0/0x2e8
[   24.207284]  kunit_try_run_case+0x170/0x3f0
[   24.207339]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.207396]  kthread+0x24c/0x2d0
[   24.207443]  ret_from_fork+0x10/0x20
[   24.207498] 
[   24.212555] Allocated by task 252:
[   24.212964]  kasan_save_stack+0x3c/0x68
[   24.213549]  kasan_save_track+0x20/0x40
[   24.214721]  kasan_save_alloc_info+0x40/0x58
[   24.215293]  __kasan_kmalloc+0xd4/0xd8
[   24.215985]  __kmalloc_cache_noprof+0x154/0x320
[   24.216521]  kasan_atomics+0xb8/0x2e8
[   24.217141]  kunit_try_run_case+0x170/0x3f0
[   24.217751]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.218330]  kthread+0x24c/0x2d0
[   24.218687]  ret_from_fork+0x10/0x20
[   24.219221] 
[   24.219483] The buggy address belongs to the object at fff00000c6cc9e00
[   24.219483]  which belongs to the cache kmalloc-64 of size 64
[   24.220564] The buggy address is located 0 bytes to the right of
[   24.220564]  allocated 48-byte region [fff00000c6cc9e00, fff00000c6cc9e30)
[   24.221915] 
[   24.222338] The buggy address belongs to the physical page:
[   24.222689] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106cc9
[   24.223480] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   24.224151] page_type: f5(slab)
[   24.224800] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   24.225515] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   24.226312] page dumped because: kasan: bad access detected
[   24.226775] 
[   24.227030] Memory state around the buggy address:
[   24.227454]  fff00000c6cc9d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.228265]  fff00000c6cc9d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.228996] >fff00000c6cc9e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   24.229675]                                      ^
[   24.230284]  fff00000c6cc9e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.230921]  fff00000c6cc9f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.231555] ==================================================================
[   23.689845] ==================================================================
[   23.690934] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xbc8/0x49c8
[   23.691504] Write of size 4 at addr fff00000c6cc9e30 by task kunit_try_catch/252
[   23.691873] 
[   23.692053] CPU: 1 UID: 0 PID: 252 Comm: kunit_try_catch Tainted: G    B            N 6.12.32-rc1 #1
[   23.692167] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.692204] Hardware name: linux,dummy-virt (DT)
[   23.692267] Call trace:
[   23.692305]  dump_backtrace+0x9c/0x128
[   23.692368]  show_stack+0x20/0x38
[   23.692416]  dump_stack_lvl+0x8c/0xd0
[   23.692467]  print_report+0x118/0x5f0
[   23.692514]  kasan_report+0xdc/0x128
[   23.692561]  kasan_check_range+0x100/0x1a8
[   23.692608]  __kasan_check_write+0x20/0x30
[   23.692655]  kasan_atomics_helper+0xbc8/0x49c8
[   23.692707]  kasan_atomics+0x1a0/0x2e8
[   23.692754]  kunit_try_run_case+0x170/0x3f0
[   23.692803]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.692858]  kthread+0x24c/0x2d0
[   23.692905]  ret_from_fork+0x10/0x20
[   23.692956] 
[   23.698073] Allocated by task 252:
[   23.698487]  kasan_save_stack+0x3c/0x68
[   23.698949]  kasan_save_track+0x20/0x40
[   23.699363]  kasan_save_alloc_info+0x40/0x58
[   23.699841]  __kasan_kmalloc+0xd4/0xd8
[   23.700194]  __kmalloc_cache_noprof+0x154/0x320
[   23.700761]  kasan_atomics+0xb8/0x2e8
[   23.701278]  kunit_try_run_case+0x170/0x3f0
[   23.701810]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.702390]  kthread+0x24c/0x2d0
[   23.702824]  ret_from_fork+0x10/0x20
[   23.703307] 
[   23.703614] The buggy address belongs to the object at fff00000c6cc9e00
[   23.703614]  which belongs to the cache kmalloc-64 of size 64
[   23.704537] The buggy address is located 0 bytes to the right of
[   23.704537]  allocated 48-byte region [fff00000c6cc9e00, fff00000c6cc9e30)
[   23.705486] 
[   23.705803] The buggy address belongs to the physical page:
[   23.706282] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106cc9
[   23.706894] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   23.707514] page_type: f5(slab)
[   23.707851] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   23.708654] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   23.709396] page dumped because: kasan: bad access detected
[   23.709877] 
[   23.710183] Memory state around the buggy address:
[   23.710622]  fff00000c6cc9d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.711258]  fff00000c6cc9d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.711838] >fff00000c6cc9e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   23.712520]                                      ^
[   23.712966]  fff00000c6cc9e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.713548]  fff00000c6cc9f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.714103] ==================================================================
[   23.000105] ==================================================================
[   23.000765] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x2c4/0x49c8
[   23.001508] Read of size 4 at addr fff00000c6cc9e30 by task kunit_try_catch/252
[   23.002478] 
[   23.002848] CPU: 1 UID: 0 PID: 252 Comm: kunit_try_catch Tainted: G    B            N 6.12.32-rc1 #1
[   23.003201] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.003855] Hardware name: linux,dummy-virt (DT)
[   23.003971] Call trace:
[   23.004025]  dump_backtrace+0x9c/0x128
[   23.004147]  show_stack+0x20/0x38
[   23.004254]  dump_stack_lvl+0x8c/0xd0
[   23.004354]  print_report+0x118/0x5f0
[   23.004444]  kasan_report+0xdc/0x128
[   23.004523]  kasan_check_range+0x100/0x1a8
[   23.004603]  __kasan_check_read+0x20/0x30
[   23.004692]  kasan_atomics_helper+0x2c4/0x49c8
[   23.004791]  kasan_atomics+0x1a0/0x2e8
[   23.004872]  kunit_try_run_case+0x170/0x3f0
[   23.004965]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.005063]  kthread+0x24c/0x2d0
[   23.005195]  ret_from_fork+0x10/0x20
[   23.005346] 
[   23.015644] Allocated by task 252:
[   23.016716]  kasan_save_stack+0x3c/0x68
[   23.017815]  kasan_save_track+0x20/0x40
[   23.018984]  kasan_save_alloc_info+0x40/0x58
[   23.020129]  __kasan_kmalloc+0xd4/0xd8
[   23.021259]  __kmalloc_cache_noprof+0x154/0x320
[   23.022173]  kasan_atomics+0xb8/0x2e8
[   23.022768]  kunit_try_run_case+0x170/0x3f0
[   23.023430]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.024333]  kthread+0x24c/0x2d0
[   23.024878]  ret_from_fork+0x10/0x20
[   23.025467] 
[   23.025912] The buggy address belongs to the object at fff00000c6cc9e00
[   23.025912]  which belongs to the cache kmalloc-64 of size 64
[   23.027319] The buggy address is located 0 bytes to the right of
[   23.027319]  allocated 48-byte region [fff00000c6cc9e00, fff00000c6cc9e30)
[   23.028145] 
[   23.028396] The buggy address belongs to the physical page:
[   23.028880] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106cc9
[   23.029926] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   23.030682] page_type: f5(slab)
[   23.031313] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   23.032362] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   23.033000] page dumped because: kasan: bad access detected
[   23.033440] 
[   23.033745] Memory state around the buggy address:
[   23.034153]  fff00000c6cc9d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.034859]  fff00000c6cc9d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.035744] >fff00000c6cc9e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   23.036150]                                      ^
[   23.036552]  fff00000c6cc9e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.037355]  fff00000c6cc9f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.038153] ==================================================================
[   23.742769] ==================================================================
[   23.743397] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xc64/0x49c8
[   23.744180] Write of size 4 at addr fff00000c6cc9e30 by task kunit_try_catch/252
[   23.744684] 
[   23.745035] CPU: 1 UID: 0 PID: 252 Comm: kunit_try_catch Tainted: G    B            N 6.12.32-rc1 #1
[   23.745272] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.745357] Hardware name: linux,dummy-virt (DT)
[   23.745454] Call trace:
[   23.745536]  dump_backtrace+0x9c/0x128
[   23.745656]  show_stack+0x20/0x38
[   23.745756]  dump_stack_lvl+0x8c/0xd0
[   23.745830]  print_report+0x118/0x5f0
[   23.745881]  kasan_report+0xdc/0x128
[   23.745927]  kasan_check_range+0x100/0x1a8
[   23.745977]  __kasan_check_write+0x20/0x30
[   23.746025]  kasan_atomics_helper+0xc64/0x49c8
[   23.746076]  kasan_atomics+0x1a0/0x2e8
[   23.746125]  kunit_try_run_case+0x170/0x3f0
[   23.746174]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.746228]  kthread+0x24c/0x2d0
[   23.746309]  ret_from_fork+0x10/0x20
[   23.746364] 
[   23.751398] Allocated by task 252:
[   23.751870]  kasan_save_stack+0x3c/0x68
[   23.752396]  kasan_save_track+0x20/0x40
[   23.752823]  kasan_save_alloc_info+0x40/0x58
[   23.753268]  __kasan_kmalloc+0xd4/0xd8
[   23.753648]  __kmalloc_cache_noprof+0x154/0x320
[   23.754196]  kasan_atomics+0xb8/0x2e8
[   23.754724]  kunit_try_run_case+0x170/0x3f0
[   23.755247]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.755749]  kthread+0x24c/0x2d0
[   23.756121]  ret_from_fork+0x10/0x20
[   23.756596] 
[   23.756910] The buggy address belongs to the object at fff00000c6cc9e00
[   23.756910]  which belongs to the cache kmalloc-64 of size 64
[   23.757773] The buggy address is located 0 bytes to the right of
[   23.757773]  allocated 48-byte region [fff00000c6cc9e00, fff00000c6cc9e30)
[   23.758723] 
[   23.759044] The buggy address belongs to the physical page:
[   23.759577] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106cc9
[   23.760349] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   23.760918] page_type: f5(slab)
[   23.761328] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   23.762010] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   23.762626] page dumped because: kasan: bad access detected
[   23.763104] 
[   23.763345] Memory state around the buggy address:
[   23.763679]  fff00000c6cc9d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.764407]  fff00000c6cc9d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.764889] >fff00000c6cc9e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   23.765434]                                      ^
[   23.765792]  fff00000c6cc9e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.766508]  fff00000c6cc9f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.767104] ==================================================================
[   23.967667] ==================================================================
[   23.968350] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xeb0/0x49c8
[   23.968973] Write of size 8 at addr fff00000c6cc9e30 by task kunit_try_catch/252
[   23.969664] 
[   23.970014] CPU: 1 UID: 0 PID: 252 Comm: kunit_try_catch Tainted: G    B            N 6.12.32-rc1 #1
[   23.970249] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.970332] Hardware name: linux,dummy-virt (DT)
[   23.970426] Call trace:
[   23.970489]  dump_backtrace+0x9c/0x128
[   23.970615]  show_stack+0x20/0x38
[   23.970719]  dump_stack_lvl+0x8c/0xd0
[   23.970825]  print_report+0x118/0x5f0
[   23.970926]  kasan_report+0xdc/0x128
[   23.971024]  kasan_check_range+0x100/0x1a8
[   23.971118]  __kasan_check_write+0x20/0x30
[   23.971182]  kasan_atomics_helper+0xeb0/0x49c8
[   23.971252]  kasan_atomics+0x1a0/0x2e8
[   23.971317]  kunit_try_run_case+0x170/0x3f0
[   23.971374]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.971430]  kthread+0x24c/0x2d0
[   23.971480]  ret_from_fork+0x10/0x20
[   23.971532] 
[   23.976757] Allocated by task 252:
[   23.977227]  kasan_save_stack+0x3c/0x68
[   23.977784]  kasan_save_track+0x20/0x40
[   23.978265]  kasan_save_alloc_info+0x40/0x58
[   23.978727]  __kasan_kmalloc+0xd4/0xd8
[   23.979148]  __kmalloc_cache_noprof+0x154/0x320
[   23.979627]  kasan_atomics+0xb8/0x2e8
[   23.980128]  kunit_try_run_case+0x170/0x3f0
[   23.980622]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.981150]  kthread+0x24c/0x2d0
[   23.981542]  ret_from_fork+0x10/0x20
[   23.982024] 
[   23.982354] The buggy address belongs to the object at fff00000c6cc9e00
[   23.982354]  which belongs to the cache kmalloc-64 of size 64
[   23.983150] The buggy address is located 0 bytes to the right of
[   23.983150]  allocated 48-byte region [fff00000c6cc9e00, fff00000c6cc9e30)
[   23.984090] 
[   23.984429] The buggy address belongs to the physical page:
[   23.985032] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106cc9
[   23.985700] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   23.986383] page_type: f5(slab)
[   23.986787] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   23.987382] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   23.988086] page dumped because: kasan: bad access detected
[   23.988589] 
[   23.988870] Memory state around the buggy address:
[   23.989386]  fff00000c6cc9d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.989985]  fff00000c6cc9d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.990642] >fff00000c6cc9e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   23.991247]                                      ^
[   23.991659]  fff00000c6cc9e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.992313]  fff00000c6cc9f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.992922] ==================================================================
[   24.434292] ==================================================================
[   24.434998] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1518/0x49c8
[   24.435945] Write of size 8 at addr fff00000c6cc9e30 by task kunit_try_catch/252
[   24.436726] 
[   24.437080] CPU: 1 UID: 0 PID: 252 Comm: kunit_try_catch Tainted: G    B            N 6.12.32-rc1 #1
[   24.437326] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.437402] Hardware name: linux,dummy-virt (DT)
[   24.437499] Call trace:
[   24.437569]  dump_backtrace+0x9c/0x128
[   24.437690]  show_stack+0x20/0x38
[   24.437786]  dump_stack_lvl+0x8c/0xd0
[   24.437865]  print_report+0x118/0x5f0
[   24.437933]  kasan_report+0xdc/0x128
[   24.437997]  kasan_check_range+0x100/0x1a8
[   24.438048]  __kasan_check_write+0x20/0x30
[   24.438097]  kasan_atomics_helper+0x1518/0x49c8
[   24.438151]  kasan_atomics+0x1a0/0x2e8
[   24.438200]  kunit_try_run_case+0x170/0x3f0
[   24.438277]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.438337]  kthread+0x24c/0x2d0
[   24.438386]  ret_from_fork+0x10/0x20
[   24.438441] 
[   24.445532] Allocated by task 252:
[   24.446059]  kasan_save_stack+0x3c/0x68
[   24.446595]  kasan_save_track+0x20/0x40
[   24.446990]  kasan_save_alloc_info+0x40/0x58
[   24.447588]  __kasan_kmalloc+0xd4/0xd8
[   24.448018]  __kmalloc_cache_noprof+0x154/0x320
[   24.448560]  kasan_atomics+0xb8/0x2e8
[   24.449021]  kunit_try_run_case+0x170/0x3f0
[   24.449413]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.450068]  kthread+0x24c/0x2d0
[   24.450509]  ret_from_fork+0x10/0x20
[   24.450978] 
[   24.451319] The buggy address belongs to the object at fff00000c6cc9e00
[   24.451319]  which belongs to the cache kmalloc-64 of size 64
[   24.452268] The buggy address is located 0 bytes to the right of
[   24.452268]  allocated 48-byte region [fff00000c6cc9e00, fff00000c6cc9e30)
[   24.453260] 
[   24.453602] The buggy address belongs to the physical page:
[   24.454166] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106cc9
[   24.454888] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   24.455518] page_type: f5(slab)
[   24.455911] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   24.456571] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   24.457193] page dumped because: kasan: bad access detected
[   24.457708] 
[   24.457974] Memory state around the buggy address:
[   24.458484]  fff00000c6cc9d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.459173]  fff00000c6cc9d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.460615] >fff00000c6cc9e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   24.461173]                                      ^
[   24.461683]  fff00000c6cc9e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.462305]  fff00000c6cc9f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.462863] ==================================================================
[   23.608604] ==================================================================
[   23.609183] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xabc/0x49c8
[   23.610024] Write of size 4 at addr fff00000c6cc9e30 by task kunit_try_catch/252
[   23.610555] 
[   23.610769] CPU: 1 UID: 0 PID: 252 Comm: kunit_try_catch Tainted: G    B            N 6.12.32-rc1 #1
[   23.610944] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.611000] Hardware name: linux,dummy-virt (DT)
[   23.611072] Call trace:
[   23.611128]  dump_backtrace+0x9c/0x128
[   23.611281]  show_stack+0x20/0x38
[   23.611404]  dump_stack_lvl+0x8c/0xd0
[   23.612027]  print_report+0x118/0x5f0
[   23.612177]  kasan_report+0xdc/0x128
[   23.612284]  kasan_check_range+0x100/0x1a8
[   23.612396]  __kasan_check_write+0x20/0x30
[   23.612496]  kasan_atomics_helper+0xabc/0x49c8
[   23.612601]  kasan_atomics+0x1a0/0x2e8
[   23.612654]  kunit_try_run_case+0x170/0x3f0
[   23.612711]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.612768]  kthread+0x24c/0x2d0
[   23.612815]  ret_from_fork+0x10/0x20
[   23.612870] 
[   23.617935] Allocated by task 252:
[   23.618415]  kasan_save_stack+0x3c/0x68
[   23.618944]  kasan_save_track+0x20/0x40
[   23.619440]  kasan_save_alloc_info+0x40/0x58
[   23.619892]  __kasan_kmalloc+0xd4/0xd8
[   23.620264]  __kmalloc_cache_noprof+0x154/0x320
[   23.620829]  kasan_atomics+0xb8/0x2e8
[   23.621294]  kunit_try_run_case+0x170/0x3f0
[   23.621840]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.622386]  kthread+0x24c/0x2d0
[   23.622708]  ret_from_fork+0x10/0x20
[   23.623154] 
[   23.623818] The buggy address belongs to the object at fff00000c6cc9e00
[   23.623818]  which belongs to the cache kmalloc-64 of size 64
[   23.624639] The buggy address is located 0 bytes to the right of
[   23.624639]  allocated 48-byte region [fff00000c6cc9e00, fff00000c6cc9e30)
[   23.625567] 
[   23.625879] The buggy address belongs to the physical page:
[   23.626282] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106cc9
[   23.627054] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   23.627698] page_type: f5(slab)
[   23.628095] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   23.628776] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   23.629430] page dumped because: kasan: bad access detected
[   23.629874] 
[   23.630153] Memory state around the buggy address:
[   23.630565]  fff00000c6cc9d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.631223]  fff00000c6cc9d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.631732] >fff00000c6cc9e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   23.632425]                                      ^
[   23.632844]  fff00000c6cc9e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.633511]  fff00000c6cc9f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.634086] ==================================================================
[   24.578078] ==================================================================
[   24.578621] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x16f0/0x49c8
[   24.579426] Write of size 8 at addr fff00000c6cc9e30 by task kunit_try_catch/252
[   24.580129] 
[   24.580495] CPU: 1 UID: 0 PID: 252 Comm: kunit_try_catch Tainted: G    B            N 6.12.32-rc1 #1
[   24.580676] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.580717] Hardware name: linux,dummy-virt (DT)
[   24.580789] Call trace:
[   24.580842]  dump_backtrace+0x9c/0x128
[   24.580969]  show_stack+0x20/0x38
[   24.581077]  dump_stack_lvl+0x8c/0xd0
[   24.581177]  print_report+0x118/0x5f0
[   24.581300]  kasan_report+0xdc/0x128
[   24.581362]  kasan_check_range+0x100/0x1a8
[   24.581414]  __kasan_check_write+0x20/0x30
[   24.581464]  kasan_atomics_helper+0x16f0/0x49c8
[   24.581534]  kasan_atomics+0x1a0/0x2e8
[   24.581584]  kunit_try_run_case+0x170/0x3f0
[   24.581637]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.581692]  kthread+0x24c/0x2d0
[   24.581740]  ret_from_fork+0x10/0x20
[   24.581794] 
[   24.586956] Allocated by task 252:
[   24.587438]  kasan_save_stack+0x3c/0x68
[   24.587950]  kasan_save_track+0x20/0x40
[   24.588335]  kasan_save_alloc_info+0x40/0x58
[   24.588812]  __kasan_kmalloc+0xd4/0xd8
[   24.589308]  __kmalloc_cache_noprof+0x154/0x320
[   24.589822]  kasan_atomics+0xb8/0x2e8
[   24.590217]  kunit_try_run_case+0x170/0x3f0
[   24.590677]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.591193]  kthread+0x24c/0x2d0
[   24.591681]  ret_from_fork+0x10/0x20
[   24.592171] 
[   24.592482] The buggy address belongs to the object at fff00000c6cc9e00
[   24.592482]  which belongs to the cache kmalloc-64 of size 64
[   24.593344] The buggy address is located 0 bytes to the right of
[   24.593344]  allocated 48-byte region [fff00000c6cc9e00, fff00000c6cc9e30)
[   24.594206] 
[   24.594538] The buggy address belongs to the physical page:
[   24.595075] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106cc9
[   24.595795] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   24.596389] page_type: f5(slab)
[   24.596817] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   24.597371] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   24.599317] page dumped because: kasan: bad access detected
[   24.599912] 
[   24.600156] Memory state around the buggy address:
[   24.600624]  fff00000c6cc9d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.601180]  fff00000c6cc9d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.601746] >fff00000c6cc9e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   24.602172]                                      ^
[   24.602531]  fff00000c6cc9e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.602937]  fff00000c6cc9f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.603336] ==================================================================
[   23.228878] ==================================================================
[   23.229686] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x50c/0x49c8
[   23.230473] Write of size 4 at addr fff00000c6cc9e30 by task kunit_try_catch/252
[   23.231275] 
[   23.231667] CPU: 1 UID: 0 PID: 252 Comm: kunit_try_catch Tainted: G    B            N 6.12.32-rc1 #1
[   23.231905] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.231987] Hardware name: linux,dummy-virt (DT)
[   23.232077] Call trace:
[   23.232143]  dump_backtrace+0x9c/0x128
[   23.232283]  show_stack+0x20/0x38
[   23.232381]  dump_stack_lvl+0x8c/0xd0
[   23.232494]  print_report+0x118/0x5f0
[   23.232592]  kasan_report+0xdc/0x128
[   23.232703]  kasan_check_range+0x100/0x1a8
[   23.232816]  __kasan_check_write+0x20/0x30
[   23.232913]  kasan_atomics_helper+0x50c/0x49c8
[   23.233042]  kasan_atomics+0x1a0/0x2e8
[   23.233157]  kunit_try_run_case+0x170/0x3f0
[   23.233275]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.233380]  kthread+0x24c/0x2d0
[   23.233458]  ret_from_fork+0x10/0x20
[   23.233599] 
[   23.240379] Allocated by task 252:
[   23.240830]  kasan_save_stack+0x3c/0x68
[   23.241278]  kasan_save_track+0x20/0x40
[   23.241781]  kasan_save_alloc_info+0x40/0x58
[   23.242254]  __kasan_kmalloc+0xd4/0xd8
[   23.242659]  __kmalloc_cache_noprof+0x154/0x320
[   23.244040]  kasan_atomics+0xb8/0x2e8
[   23.244429]  kunit_try_run_case+0x170/0x3f0
[   23.244719]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.245343]  kthread+0x24c/0x2d0
[   23.245777]  ret_from_fork+0x10/0x20
[   23.246293] 
[   23.246604] The buggy address belongs to the object at fff00000c6cc9e00
[   23.246604]  which belongs to the cache kmalloc-64 of size 64
[   23.247762] The buggy address is located 0 bytes to the right of
[   23.247762]  allocated 48-byte region [fff00000c6cc9e00, fff00000c6cc9e30)
[   23.248669] 
[   23.248994] The buggy address belongs to the physical page:
[   23.249612] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106cc9
[   23.250434] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   23.251892] page_type: f5(slab)
[   23.252378] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   23.253123] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   23.253924] page dumped because: kasan: bad access detected
[   23.254428] 
[   23.254675] Memory state around the buggy address:
[   23.255110]  fff00000c6cc9d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.255631]  fff00000c6cc9d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.256171] >fff00000c6cc9e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   23.257347]                                      ^
[   23.257832]  fff00000c6cc9e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.258692]  fff00000c6cc9f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.259477] ==================================================================
[   24.318009] ==================================================================
[   24.318450] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1370/0x49c8
[   24.319274] Write of size 8 at addr fff00000c6cc9e30 by task kunit_try_catch/252
[   24.319895] 
[   24.320694] CPU: 1 UID: 0 PID: 252 Comm: kunit_try_catch Tainted: G    B            N 6.12.32-rc1 #1
[   24.320949] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.321018] Hardware name: linux,dummy-virt (DT)
[   24.321068] Call trace:
[   24.321103]  dump_backtrace+0x9c/0x128
[   24.321173]  show_stack+0x20/0x38
[   24.321220]  dump_stack_lvl+0x8c/0xd0
[   24.321299]  print_report+0x118/0x5f0
[   24.321349]  kasan_report+0xdc/0x128
[   24.321395]  kasan_check_range+0x100/0x1a8
[   24.321444]  __kasan_check_write+0x20/0x30
[   24.321507]  kasan_atomics_helper+0x1370/0x49c8
[   24.321563]  kasan_atomics+0x1a0/0x2e8
[   24.321613]  kunit_try_run_case+0x170/0x3f0
[   24.321667]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.321723]  kthread+0x24c/0x2d0
[   24.321769]  ret_from_fork+0x10/0x20
[   24.321823] 
[   24.327339] Allocated by task 252:
[   24.327832]  kasan_save_stack+0x3c/0x68
[   24.328314]  kasan_save_track+0x20/0x40
[   24.328844]  kasan_save_alloc_info+0x40/0x58
[   24.329347]  __kasan_kmalloc+0xd4/0xd8
[   24.329896]  __kmalloc_cache_noprof+0x154/0x320
[   24.330366]  kasan_atomics+0xb8/0x2e8
[   24.330876]  kunit_try_run_case+0x170/0x3f0
[   24.331468]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.331995]  kthread+0x24c/0x2d0
[   24.332295]  ret_from_fork+0x10/0x20
[   24.334479] 
[   24.334724] The buggy address belongs to the object at fff00000c6cc9e00
[   24.334724]  which belongs to the cache kmalloc-64 of size 64
[   24.335388] The buggy address is located 0 bytes to the right of
[   24.335388]  allocated 48-byte region [fff00000c6cc9e00, fff00000c6cc9e30)
[   24.336324] 
[   24.336677] The buggy address belongs to the physical page:
[   24.337102] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106cc9
[   24.337670] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   24.338846] page_type: f5(slab)
[   24.340092] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   24.341271] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   24.341732] page dumped because: kasan: bad access detected
[   24.342071] 
[   24.343005] Memory state around the buggy address:
[   24.343917]  fff00000c6cc9d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.345151]  fff00000c6cc9d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.346368] >fff00000c6cc9e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   24.346789]                                      ^
[   24.347197]  fff00000c6cc9e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.347987]  fff00000c6cc9f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.348773] ==================================================================
[   22.970627] ==================================================================
[   22.971400] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x25c/0x49c8
[   22.972654] Write of size 4 at addr fff00000c6cc9e30 by task kunit_try_catch/252
[   22.973170] 
[   22.973545] CPU: 1 UID: 0 PID: 252 Comm: kunit_try_catch Tainted: G    B            N 6.12.32-rc1 #1
[   22.973753] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.973832] Hardware name: linux,dummy-virt (DT)
[   22.973929] Call trace:
[   22.973980]  dump_backtrace+0x9c/0x128
[   22.974054]  show_stack+0x20/0x38
[   22.974100]  dump_stack_lvl+0x8c/0xd0
[   22.974154]  print_report+0x118/0x5f0
[   22.974202]  kasan_report+0xdc/0x128
[   22.974273]  kasan_check_range+0x100/0x1a8
[   22.974329]  __kasan_check_write+0x20/0x30
[   22.974380]  kasan_atomics_helper+0x25c/0x49c8
[   22.974434]  kasan_atomics+0x1a0/0x2e8
[   22.974484]  kunit_try_run_case+0x170/0x3f0
[   22.974536]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.974590]  kthread+0x24c/0x2d0
[   22.974638]  ret_from_fork+0x10/0x20
[   22.974689] 
[   22.981270] Allocated by task 252:
[   22.981749]  kasan_save_stack+0x3c/0x68
[   22.982203]  kasan_save_track+0x20/0x40
[   22.982499]  kasan_save_alloc_info+0x40/0x58
[   22.982991]  __kasan_kmalloc+0xd4/0xd8
[   22.983818]  __kmalloc_cache_noprof+0x154/0x320
[   22.984551]  kasan_atomics+0xb8/0x2e8
[   22.984966]  kunit_try_run_case+0x170/0x3f0
[   22.985398]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.985912]  kthread+0x24c/0x2d0
[   22.986305]  ret_from_fork+0x10/0x20
[   22.986754] 
[   22.987022] The buggy address belongs to the object at fff00000c6cc9e00
[   22.987022]  which belongs to the cache kmalloc-64 of size 64
[   22.987846] The buggy address is located 0 bytes to the right of
[   22.987846]  allocated 48-byte region [fff00000c6cc9e00, fff00000c6cc9e30)
[   22.989209] 
[   22.989449] The buggy address belongs to the physical page:
[   22.989779] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106cc9
[   22.990342] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   22.990980] page_type: f5(slab)
[   22.991907] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   22.992570] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   22.993163] page dumped because: kasan: bad access detected
[   22.993739] 
[   22.994041] Memory state around the buggy address:
[   22.994545]  fff00000c6cc9d00: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   22.995123]  fff00000c6cc9d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.996134] >fff00000c6cc9e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   22.996647]                                      ^
[   22.997014]  fff00000c6cc9e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.997954]  fff00000c6cc9f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.998546] ==================================================================
[   24.290146] ==================================================================
[   24.290796] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1300/0x49c8
[   24.291733] Write of size 8 at addr fff00000c6cc9e30 by task kunit_try_catch/252
[   24.292524] 
[   24.292793] CPU: 1 UID: 0 PID: 252 Comm: kunit_try_catch Tainted: G    B            N 6.12.32-rc1 #1
[   24.292953] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.292993] Hardware name: linux,dummy-virt (DT)
[   24.293066] Call trace:
[   24.293135]  dump_backtrace+0x9c/0x128
[   24.293285]  show_stack+0x20/0x38
[   24.293388]  dump_stack_lvl+0x8c/0xd0
[   24.293450]  print_report+0x118/0x5f0
[   24.293522]  kasan_report+0xdc/0x128
[   24.293572]  kasan_check_range+0x100/0x1a8
[   24.293623]  __kasan_check_write+0x20/0x30
[   24.293674]  kasan_atomics_helper+0x1300/0x49c8
[   24.293728]  kasan_atomics+0x1a0/0x2e8
[   24.293777]  kunit_try_run_case+0x170/0x3f0
[   24.293832]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.293888]  kthread+0x24c/0x2d0
[   24.293935]  ret_from_fork+0x10/0x20
[   24.293988] 
[   24.299414] Allocated by task 252:
[   24.299928]  kasan_save_stack+0x3c/0x68
[   24.300488]  kasan_save_track+0x20/0x40
[   24.301044]  kasan_save_alloc_info+0x40/0x58
[   24.301587]  __kasan_kmalloc+0xd4/0xd8
[   24.302091]  __kmalloc_cache_noprof+0x154/0x320
[   24.302699]  kasan_atomics+0xb8/0x2e8
[   24.303211]  kunit_try_run_case+0x170/0x3f0
[   24.303780]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.304316]  kthread+0x24c/0x2d0
[   24.304702]  ret_from_fork+0x10/0x20
[   24.305197] 
[   24.305493] The buggy address belongs to the object at fff00000c6cc9e00
[   24.305493]  which belongs to the cache kmalloc-64 of size 64
[   24.306366] The buggy address is located 0 bytes to the right of
[   24.306366]  allocated 48-byte region [fff00000c6cc9e00, fff00000c6cc9e30)
[   24.307387] 
[   24.307736] The buggy address belongs to the physical page:
[   24.308266] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106cc9
[   24.308981] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   24.309630] page_type: f5(slab)
[   24.310049] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   24.310714] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   24.311353] page dumped because: kasan: bad access detected
[   24.311875] 
[   24.312163] Memory state around the buggy address:
[   24.312654]  fff00000c6cc9d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.313267]  fff00000c6cc9d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.313911] >fff00000c6cc9e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   24.314603]                                      ^
[   24.315068]  fff00000c6cc9e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.315712]  fff00000c6cc9f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.316324] ==================================================================
[   23.039864] ==================================================================
[   23.040643] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4264/0x49c8
[   23.041468] Read of size 4 at addr fff00000c6cc9e30 by task kunit_try_catch/252
[   23.042162] 
[   23.042553] CPU: 1 UID: 0 PID: 252 Comm: kunit_try_catch Tainted: G    B            N 6.12.32-rc1 #1
[   23.042836] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.042924] Hardware name: linux,dummy-virt (DT)
[   23.043028] Call trace:
[   23.043171]  dump_backtrace+0x9c/0x128
[   23.043305]  show_stack+0x20/0x38
[   23.043394]  dump_stack_lvl+0x8c/0xd0
[   23.043485]  print_report+0x118/0x5f0
[   23.043564]  kasan_report+0xdc/0x128
[   23.043657]  __asan_report_load4_noabort+0x20/0x30
[   23.043759]  kasan_atomics_helper+0x4264/0x49c8
[   23.043853]  kasan_atomics+0x1a0/0x2e8
[   23.043950]  kunit_try_run_case+0x170/0x3f0
[   23.044047]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.044141]  kthread+0x24c/0x2d0
[   23.044230]  ret_from_fork+0x10/0x20
[   23.044314] 
[   23.049967] Allocated by task 252:
[   23.050471]  kasan_save_stack+0x3c/0x68
[   23.051038]  kasan_save_track+0x20/0x40
[   23.051449]  kasan_save_alloc_info+0x40/0x58
[   23.051882]  __kasan_kmalloc+0xd4/0xd8
[   23.052252]  __kmalloc_cache_noprof+0x154/0x320
[   23.052650]  kasan_atomics+0xb8/0x2e8
[   23.052979]  kunit_try_run_case+0x170/0x3f0
[   23.054451]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.054847]  kthread+0x24c/0x2d0
[   23.055754]  ret_from_fork+0x10/0x20
[   23.056324] 
[   23.056661] The buggy address belongs to the object at fff00000c6cc9e00
[   23.056661]  which belongs to the cache kmalloc-64 of size 64
[   23.057744] The buggy address is located 0 bytes to the right of
[   23.057744]  allocated 48-byte region [fff00000c6cc9e00, fff00000c6cc9e30)
[   23.059004] 
[   23.059275] The buggy address belongs to the physical page:
[   23.059968] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106cc9
[   23.061163] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   23.061906] page_type: f5(slab)
[   23.062158] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   23.062646] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   23.063801] page dumped because: kasan: bad access detected
[   23.064251] 
[   23.064413] Memory state around the buggy address:
[   23.064678]  fff00000c6cc9d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.065019]  fff00000c6cc9d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.065821] >fff00000c6cc9e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   23.066601]                                      ^
[   23.067016]  fff00000c6cc9e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.068017]  fff00000c6cc9f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.068657] ==================================================================
[   23.856518] ==================================================================
[   23.857171] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xda0/0x49c8
[   23.857792] Write of size 4 at addr fff00000c6cc9e30 by task kunit_try_catch/252
[   23.858540] 
[   23.858845] CPU: 1 UID: 0 PID: 252 Comm: kunit_try_catch Tainted: G    B            N 6.12.32-rc1 #1
[   23.859140] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.859223] Hardware name: linux,dummy-virt (DT)
[   23.859314] Call trace:
[   23.859376]  dump_backtrace+0x9c/0x128
[   23.859506]  show_stack+0x20/0x38
[   23.859617]  dump_stack_lvl+0x8c/0xd0
[   23.859722]  print_report+0x118/0x5f0
[   23.859787]  kasan_report+0xdc/0x128
[   23.859835]  kasan_check_range+0x100/0x1a8
[   23.859885]  __kasan_check_write+0x20/0x30
[   23.859935]  kasan_atomics_helper+0xda0/0x49c8
[   23.859990]  kasan_atomics+0x1a0/0x2e8
[   23.860041]  kunit_try_run_case+0x170/0x3f0
[   23.860091]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.860144]  kthread+0x24c/0x2d0
[   23.860191]  ret_from_fork+0x10/0x20
[   23.860266] 
[   23.865532] Allocated by task 252:
[   23.866017]  kasan_save_stack+0x3c/0x68
[   23.866583]  kasan_save_track+0x20/0x40
[   23.866974]  kasan_save_alloc_info+0x40/0x58
[   23.867412]  __kasan_kmalloc+0xd4/0xd8
[   23.867888]  __kmalloc_cache_noprof+0x154/0x320
[   23.868434]  kasan_atomics+0xb8/0x2e8
[   23.868935]  kunit_try_run_case+0x170/0x3f0
[   23.869364]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.870002]  kthread+0x24c/0x2d0
[   23.870394]  ret_from_fork+0x10/0x20
[   23.870775] 
[   23.871082] The buggy address belongs to the object at fff00000c6cc9e00
[   23.871082]  which belongs to the cache kmalloc-64 of size 64
[   23.872026] The buggy address is located 0 bytes to the right of
[   23.872026]  allocated 48-byte region [fff00000c6cc9e00, fff00000c6cc9e30)
[   23.872978] 
[   23.873261] The buggy address belongs to the physical page:
[   23.873802] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106cc9
[   23.874471] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   23.875143] page_type: f5(slab)
[   23.875622] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   23.876198] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   23.876901] page dumped because: kasan: bad access detected
[   23.877433] 
[   23.877733] Memory state around the buggy address:
[   23.878199]  fff00000c6cc9d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.878776]  fff00000c6cc9d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.879459] >fff00000c6cc9e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   23.880018]                                      ^
[   23.880450]  fff00000c6cc9e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.881095]  fff00000c6cc9f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.881762] ==================================================================
[   24.464310] ==================================================================
[   24.464854] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1584/0x49c8
[   24.465551] Write of size 8 at addr fff00000c6cc9e30 by task kunit_try_catch/252
[   24.466102] 
[   24.466453] CPU: 1 UID: 0 PID: 252 Comm: kunit_try_catch Tainted: G    B            N 6.12.32-rc1 #1
[   24.466675] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.466754] Hardware name: linux,dummy-virt (DT)
[   24.466842] Call trace:
[   24.466901]  dump_backtrace+0x9c/0x128
[   24.467023]  show_stack+0x20/0x38
[   24.467118]  dump_stack_lvl+0x8c/0xd0
[   24.467220]  print_report+0x118/0x5f0
[   24.467384]  kasan_report+0xdc/0x128
[   24.467481]  kasan_check_range+0x100/0x1a8
[   24.467564]  __kasan_check_write+0x20/0x30
[   24.467617]  kasan_atomics_helper+0x1584/0x49c8
[   24.467672]  kasan_atomics+0x1a0/0x2e8
[   24.467722]  kunit_try_run_case+0x170/0x3f0
[   24.467779]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.467835]  kthread+0x24c/0x2d0
[   24.467883]  ret_from_fork+0x10/0x20
[   24.467937] 
[   24.473497] Allocated by task 252:
[   24.473971]  kasan_save_stack+0x3c/0x68
[   24.474432]  kasan_save_track+0x20/0x40
[   24.474950]  kasan_save_alloc_info+0x40/0x58
[   24.475867]  __kasan_kmalloc+0xd4/0xd8
[   24.476265]  __kmalloc_cache_noprof+0x154/0x320
[   24.476673]  kasan_atomics+0xb8/0x2e8
[   24.477017]  kunit_try_run_case+0x170/0x3f0
[   24.477995]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.478637]  kthread+0x24c/0x2d0
[   24.479006]  ret_from_fork+0x10/0x20
[   24.479376] 
[   24.479633] The buggy address belongs to the object at fff00000c6cc9e00
[   24.479633]  which belongs to the cache kmalloc-64 of size 64
[   24.480514] The buggy address is located 0 bytes to the right of
[   24.480514]  allocated 48-byte region [fff00000c6cc9e00, fff00000c6cc9e30)
[   24.481522] 
[   24.481886] The buggy address belongs to the physical page:
[   24.482464] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106cc9
[   24.483192] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   24.483777] page_type: f5(slab)
[   24.484305] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   24.484971] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   24.485688] page dumped because: kasan: bad access detected
[   24.486218] 
[   24.486504] Memory state around the buggy address:
[   24.486992]  fff00000c6cc9d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.487670]  fff00000c6cc9d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.488301] >fff00000c6cc9e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   24.488926]                                      ^
[   24.489411]  fff00000c6cc9e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.490081]  fff00000c6cc9f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.490719] ==================================================================
[   24.405756] ==================================================================
[   24.406332] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x14ac/0x49c8
[   24.408002] Write of size 8 at addr fff00000c6cc9e30 by task kunit_try_catch/252
[   24.408848] 
[   24.409247] CPU: 1 UID: 0 PID: 252 Comm: kunit_try_catch Tainted: G    B            N 6.12.32-rc1 #1
[   24.409509] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.409581] Hardware name: linux,dummy-virt (DT)
[   24.409631] Call trace:
[   24.409666]  dump_backtrace+0x9c/0x128
[   24.409734]  show_stack+0x20/0x38
[   24.409781]  dump_stack_lvl+0x8c/0xd0
[   24.409833]  print_report+0x118/0x5f0
[   24.409881]  kasan_report+0xdc/0x128
[   24.409927]  kasan_check_range+0x100/0x1a8
[   24.409977]  __kasan_check_write+0x20/0x30
[   24.410027]  kasan_atomics_helper+0x14ac/0x49c8
[   24.410079]  kasan_atomics+0x1a0/0x2e8
[   24.410129]  kunit_try_run_case+0x170/0x3f0
[   24.410180]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.410235]  kthread+0x24c/0x2d0
[   24.410314]  ret_from_fork+0x10/0x20
[   24.410370] 
[   24.415875] Allocated by task 252:
[   24.416430]  kasan_save_stack+0x3c/0x68
[   24.416960]  kasan_save_track+0x20/0x40
[   24.417515]  kasan_save_alloc_info+0x40/0x58
[   24.418024]  __kasan_kmalloc+0xd4/0xd8
[   24.418560]  __kmalloc_cache_noprof+0x154/0x320
[   24.419019]  kasan_atomics+0xb8/0x2e8
[   24.419560]  kunit_try_run_case+0x170/0x3f0
[   24.419966]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.420606]  kthread+0x24c/0x2d0
[   24.421031]  ret_from_fork+0x10/0x20
[   24.421501] 
[   24.421828] The buggy address belongs to the object at fff00000c6cc9e00
[   24.421828]  which belongs to the cache kmalloc-64 of size 64
[   24.422801] The buggy address is located 0 bytes to the right of
[   24.422801]  allocated 48-byte region [fff00000c6cc9e00, fff00000c6cc9e30)
[   24.423758] 
[   24.424072] The buggy address belongs to the physical page:
[   24.424676] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106cc9
[   24.425387] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   24.426005] page_type: f5(slab)
[   24.426431] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   24.427103] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   24.427727] page dumped because: kasan: bad access detected
[   24.428180] 
[   24.428510] Memory state around the buggy address:
[   24.428973]  fff00000c6cc9d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.429634]  fff00000c6cc9d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.430377] >fff00000c6cc9e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   24.430966]                                      ^
[   24.431470]  fff00000c6cc9e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.432132]  fff00000c6cc9f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.432689] ==================================================================
[   24.521235] ==================================================================
[   24.521833] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x165c/0x49c8
[   24.522431] Write of size 8 at addr fff00000c6cc9e30 by task kunit_try_catch/252
[   24.523109] 
[   24.523492] CPU: 1 UID: 0 PID: 252 Comm: kunit_try_catch Tainted: G    B            N 6.12.32-rc1 #1
[   24.523716] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.523801] Hardware name: linux,dummy-virt (DT)
[   24.523891] Call trace:
[   24.523934]  dump_backtrace+0x9c/0x128
[   24.524007]  show_stack+0x20/0x38
[   24.524056]  dump_stack_lvl+0x8c/0xd0
[   24.524114]  print_report+0x118/0x5f0
[   24.524164]  kasan_report+0xdc/0x128
[   24.524210]  kasan_check_range+0x100/0x1a8
[   24.524304]  __kasan_check_write+0x20/0x30
[   24.524398]  kasan_atomics_helper+0x165c/0x49c8
[   24.524510]  kasan_atomics+0x1a0/0x2e8
[   24.524622]  kunit_try_run_case+0x170/0x3f0
[   24.524684]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.524741]  kthread+0x24c/0x2d0
[   24.524790]  ret_from_fork+0x10/0x20
[   24.524845] 
[   24.530058] Allocated by task 252:
[   24.530503]  kasan_save_stack+0x3c/0x68
[   24.530965]  kasan_save_track+0x20/0x40
[   24.531465]  kasan_save_alloc_info+0x40/0x58
[   24.531890]  __kasan_kmalloc+0xd4/0xd8
[   24.532324]  __kmalloc_cache_noprof+0x154/0x320
[   24.532853]  kasan_atomics+0xb8/0x2e8
[   24.533362]  kunit_try_run_case+0x170/0x3f0
[   24.533891]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.534343]  kthread+0x24c/0x2d0
[   24.534794]  ret_from_fork+0x10/0x20
[   24.535280] 
[   24.535581] The buggy address belongs to the object at fff00000c6cc9e00
[   24.535581]  which belongs to the cache kmalloc-64 of size 64
[   24.536472] The buggy address is located 0 bytes to the right of
[   24.536472]  allocated 48-byte region [fff00000c6cc9e00, fff00000c6cc9e30)
[   24.537963] 
[   24.538227] The buggy address belongs to the physical page:
[   24.538693] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106cc9
[   24.539601] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   24.540267] page_type: f5(slab)
[   24.540685] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   24.541352] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   24.541920] page dumped because: kasan: bad access detected
[   24.542441] 
[   24.542740] Memory state around the buggy address:
[   24.543396]  fff00000c6cc9d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.544214]  fff00000c6cc9d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.544895] >fff00000c6cc9e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   24.545602]                                      ^
[   24.546018]  fff00000c6cc9e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.546880]  fff00000c6cc9f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.547554] ==================================================================
[   24.145418] ==================================================================
[   24.146179] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x10d8/0x49c8
[   24.147036] Write of size 8 at addr fff00000c6cc9e30 by task kunit_try_catch/252
[   24.148094] 
[   24.148448] CPU: 1 UID: 0 PID: 252 Comm: kunit_try_catch Tainted: G    B            N 6.12.32-rc1 #1
[   24.148579] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.148634] Hardware name: linux,dummy-virt (DT)
[   24.148689] Call trace:
[   24.148726]  dump_backtrace+0x9c/0x128
[   24.148800]  show_stack+0x20/0x38
[   24.148847]  dump_stack_lvl+0x8c/0xd0
[   24.148896]  print_report+0x118/0x5f0
[   24.148945]  kasan_report+0xdc/0x128
[   24.148991]  kasan_check_range+0x100/0x1a8
[   24.149041]  __kasan_check_write+0x20/0x30
[   24.149091]  kasan_atomics_helper+0x10d8/0x49c8
[   24.149144]  kasan_atomics+0x1a0/0x2e8
[   24.149193]  kunit_try_run_case+0x170/0x3f0
[   24.149258]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.149319]  kthread+0x24c/0x2d0
[   24.149367]  ret_from_fork+0x10/0x20
[   24.149420] 
[   24.154964] Allocated by task 252:
[   24.155466]  kasan_save_stack+0x3c/0x68
[   24.155985]  kasan_save_track+0x20/0x40
[   24.156422]  kasan_save_alloc_info+0x40/0x58
[   24.157010]  __kasan_kmalloc+0xd4/0xd8
[   24.157559]  __kmalloc_cache_noprof+0x154/0x320
[   24.158137]  kasan_atomics+0xb8/0x2e8
[   24.158568]  kunit_try_run_case+0x170/0x3f0
[   24.158995]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.159645]  kthread+0x24c/0x2d0
[   24.160113]  ret_from_fork+0x10/0x20
[   24.160575] 
[   24.160882] The buggy address belongs to the object at fff00000c6cc9e00
[   24.160882]  which belongs to the cache kmalloc-64 of size 64
[   24.161824] The buggy address is located 0 bytes to the right of
[   24.161824]  allocated 48-byte region [fff00000c6cc9e00, fff00000c6cc9e30)
[   24.162935] 
[   24.163296] The buggy address belongs to the physical page:
[   24.163779] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106cc9
[   24.164592] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   24.165213] page_type: f5(slab)
[   24.165636] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   24.166334] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   24.166984] page dumped because: kasan: bad access detected
[   24.167495] 
[   24.167760] Memory state around the buggy address:
[   24.168202]  fff00000c6cc9d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.168943]  fff00000c6cc9d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.169622] >fff00000c6cc9e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   24.170194]                                      ^
[   24.170562]  fff00000c6cc9e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.171201]  fff00000c6cc9f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.171849] ==================================================================
[   23.388540] ==================================================================
[   23.389328] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x728/0x49c8
[   23.390187] Write of size 4 at addr fff00000c6cc9e30 by task kunit_try_catch/252
[   23.390941] 
[   23.391380] CPU: 1 UID: 0 PID: 252 Comm: kunit_try_catch Tainted: G    B            N 6.12.32-rc1 #1
[   23.391622] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.391724] Hardware name: linux,dummy-virt (DT)
[   23.391781] Call trace:
[   23.391815]  dump_backtrace+0x9c/0x128
[   23.391903]  show_stack+0x20/0x38
[   23.391966]  dump_stack_lvl+0x8c/0xd0
[   23.392020]  print_report+0x118/0x5f0
[   23.392068]  kasan_report+0xdc/0x128
[   23.392114]  kasan_check_range+0x100/0x1a8
[   23.392164]  __kasan_check_write+0x20/0x30
[   23.392213]  kasan_atomics_helper+0x728/0x49c8
[   23.392290]  kasan_atomics+0x1a0/0x2e8
[   23.392342]  kunit_try_run_case+0x170/0x3f0
[   23.392396]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.392452]  kthread+0x24c/0x2d0
[   23.392500]  ret_from_fork+0x10/0x20
[   23.392552] 
[   23.397236] Allocated by task 252:
[   23.397776]  kasan_save_stack+0x3c/0x68
[   23.398352]  kasan_save_track+0x20/0x40
[   23.398882]  kasan_save_alloc_info+0x40/0x58
[   23.399490]  __kasan_kmalloc+0xd4/0xd8
[   23.399925]  __kmalloc_cache_noprof+0x154/0x320
[   23.400215]  kasan_atomics+0xb8/0x2e8
[   23.400809]  kunit_try_run_case+0x170/0x3f0
[   23.401435]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.402109]  kthread+0x24c/0x2d0
[   23.402613]  ret_from_fork+0x10/0x20
[   23.403125] 
[   23.403458] The buggy address belongs to the object at fff00000c6cc9e00
[   23.403458]  which belongs to the cache kmalloc-64 of size 64
[   23.404487] The buggy address is located 0 bytes to the right of
[   23.404487]  allocated 48-byte region [fff00000c6cc9e00, fff00000c6cc9e30)
[   23.405384] 
[   23.405723] The buggy address belongs to the physical page:
[   23.406293] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106cc9
[   23.406985] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   23.407545] page_type: f5(slab)
[   23.407990] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   23.408582] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   23.409318] page dumped because: kasan: bad access detected
[   23.409747] 
[   23.410039] Memory state around the buggy address:
[   23.410543]  fff00000c6cc9d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.411159]  fff00000c6cc9d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.411762] >fff00000c6cc9e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   23.412364]                                      ^
[   23.412826]  fff00000c6cc9e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.413473]  fff00000c6cc9f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.414110] ==================================================================
[   24.377766] ==================================================================
[   24.378879] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x406c/0x49c8
[   24.379585] Read of size 8 at addr fff00000c6cc9e30 by task kunit_try_catch/252
[   24.380184] 
[   24.380582] CPU: 1 UID: 0 PID: 252 Comm: kunit_try_catch Tainted: G    B            N 6.12.32-rc1 #1
[   24.380846] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.380935] Hardware name: linux,dummy-virt (DT)
[   24.381040] Call trace:
[   24.381102]  dump_backtrace+0x9c/0x128
[   24.381183]  show_stack+0x20/0x38
[   24.381233]  dump_stack_lvl+0x8c/0xd0
[   24.381317]  print_report+0x118/0x5f0
[   24.381369]  kasan_report+0xdc/0x128
[   24.381417]  __asan_report_load8_noabort+0x20/0x30
[   24.381473]  kasan_atomics_helper+0x406c/0x49c8
[   24.381542]  kasan_atomics+0x1a0/0x2e8
[   24.381593]  kunit_try_run_case+0x170/0x3f0
[   24.381645]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.381701]  kthread+0x24c/0x2d0
[   24.381749]  ret_from_fork+0x10/0x20
[   24.381803] 
[   24.387079] Allocated by task 252:
[   24.387625]  kasan_save_stack+0x3c/0x68
[   24.388087]  kasan_save_track+0x20/0x40
[   24.388604]  kasan_save_alloc_info+0x40/0x58
[   24.389150]  __kasan_kmalloc+0xd4/0xd8
[   24.389582]  __kmalloc_cache_noprof+0x154/0x320
[   24.390193]  kasan_atomics+0xb8/0x2e8
[   24.390607]  kunit_try_run_case+0x170/0x3f0
[   24.391194]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.391780]  kthread+0x24c/0x2d0
[   24.392274]  ret_from_fork+0x10/0x20
[   24.392699] 
[   24.393005] The buggy address belongs to the object at fff00000c6cc9e00
[   24.393005]  which belongs to the cache kmalloc-64 of size 64
[   24.393896] The buggy address is located 0 bytes to the right of
[   24.393896]  allocated 48-byte region [fff00000c6cc9e00, fff00000c6cc9e30)
[   24.394939] 
[   24.395254] The buggy address belongs to the physical page:
[   24.395865] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106cc9
[   24.396462] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   24.397058] page_type: f5(slab)
[   24.397488] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   24.398212] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   24.398857] page dumped because: kasan: bad access detected
[   24.399390] 
[   24.399707] Memory state around the buggy address:
[   24.400182]  fff00000c6cc9d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.400917]  fff00000c6cc9d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.401459] >fff00000c6cc9e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   24.402108]                                      ^
[   24.402598]  fff00000c6cc9e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.403192]  fff00000c6cc9f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.403824] ==================================================================
[   23.166080] ==================================================================
[   23.166581] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x434/0x49c8
[   23.168266] Write of size 4 at addr fff00000c6cc9e30 by task kunit_try_catch/252
[   23.168960] 
[   23.169290] CPU: 1 UID: 0 PID: 252 Comm: kunit_try_catch Tainted: G    B            N 6.12.32-rc1 #1
[   23.169529] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.169611] Hardware name: linux,dummy-virt (DT)
[   23.169692] Call trace:
[   23.169759]  dump_backtrace+0x9c/0x128
[   23.169838]  show_stack+0x20/0x38
[   23.169886]  dump_stack_lvl+0x8c/0xd0
[   23.169942]  print_report+0x118/0x5f0
[   23.169992]  kasan_report+0xdc/0x128
[   23.170038]  kasan_check_range+0x100/0x1a8
[   23.170086]  __kasan_check_write+0x20/0x30
[   23.170136]  kasan_atomics_helper+0x434/0x49c8
[   23.170187]  kasan_atomics+0x1a0/0x2e8
[   23.170254]  kunit_try_run_case+0x170/0x3f0
[   23.170320]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.170375]  kthread+0x24c/0x2d0
[   23.170423]  ret_from_fork+0x10/0x20
[   23.170478] 
[   23.176609] Allocated by task 252:
[   23.177106]  kasan_save_stack+0x3c/0x68
[   23.178742]  kasan_save_track+0x20/0x40
[   23.179921]  kasan_save_alloc_info+0x40/0x58
[   23.180378]  __kasan_kmalloc+0xd4/0xd8
[   23.180713]  __kmalloc_cache_noprof+0x154/0x320
[   23.181298]  kasan_atomics+0xb8/0x2e8
[   23.181737]  kunit_try_run_case+0x170/0x3f0
[   23.182210]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.182728]  kthread+0x24c/0x2d0
[   23.183511]  ret_from_fork+0x10/0x20
[   23.184027] 
[   23.184287] The buggy address belongs to the object at fff00000c6cc9e00
[   23.184287]  which belongs to the cache kmalloc-64 of size 64
[   23.185183] The buggy address is located 0 bytes to the right of
[   23.185183]  allocated 48-byte region [fff00000c6cc9e00, fff00000c6cc9e30)
[   23.186191] 
[   23.186471] The buggy address belongs to the physical page:
[   23.187036] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106cc9
[   23.188087] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   23.188584] page_type: f5(slab)
[   23.189380] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   23.190225] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   23.190869] page dumped because: kasan: bad access detected
[   23.191654] 
[   23.191927] Memory state around the buggy address:
[   23.192674]  fff00000c6cc9d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.193334]  fff00000c6cc9d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.194168] >fff00000c6cc9e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   23.194912]                                      ^
[   23.195712]  fff00000c6cc9e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.196922]  fff00000c6cc9f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.197558] ==================================================================
[   24.604934] ==================================================================
[   24.607420] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f5c/0x49c8
[   24.608461] Read of size 8 at addr fff00000c6cc9e30 by task kunit_try_catch/252
[   24.609938] 
[   24.610328] CPU: 1 UID: 0 PID: 252 Comm: kunit_try_catch Tainted: G    B            N 6.12.32-rc1 #1
[   24.610567] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.610649] Hardware name: linux,dummy-virt (DT)
[   24.610745] Call trace:
[   24.610814]  dump_backtrace+0x9c/0x128
[   24.610941]  show_stack+0x20/0x38
[   24.611039]  dump_stack_lvl+0x8c/0xd0
[   24.611130]  print_report+0x118/0x5f0
[   24.611213]  kasan_report+0xdc/0x128
[   24.611315]  __asan_report_load8_noabort+0x20/0x30
[   24.611422]  kasan_atomics_helper+0x3f5c/0x49c8
[   24.611530]  kasan_atomics+0x1a0/0x2e8
[   24.611627]  kunit_try_run_case+0x170/0x3f0
[   24.611789]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.611906]  kthread+0x24c/0x2d0
[   24.611994]  ret_from_fork+0x10/0x20
[   24.612089] 
[   24.617290] Allocated by task 252:
[   24.617862]  kasan_save_stack+0x3c/0x68
[   24.618458]  kasan_save_track+0x20/0x40
[   24.619035]  kasan_save_alloc_info+0x40/0x58
[   24.619529]  __kasan_kmalloc+0xd4/0xd8
[   24.620007]  __kmalloc_cache_noprof+0x154/0x320
[   24.620534]  kasan_atomics+0xb8/0x2e8
[   24.620814]  kunit_try_run_case+0x170/0x3f0
[   24.621396]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.621946]  kthread+0x24c/0x2d0
[   24.622359]  ret_from_fork+0x10/0x20
[   24.622781] 
[   24.623089] The buggy address belongs to the object at fff00000c6cc9e00
[   24.623089]  which belongs to the cache kmalloc-64 of size 64
[   24.623894] The buggy address is located 0 bytes to the right of
[   24.623894]  allocated 48-byte region [fff00000c6cc9e00, fff00000c6cc9e30)
[   24.624832] 
[   24.625172] The buggy address belongs to the physical page:
[   24.625652] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106cc9
[   24.626344] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   24.627031] page_type: f5(slab)
[   24.627431] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   24.628135] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   24.628773] page dumped because: kasan: bad access detected
[   24.629282] 
[   24.629529] Memory state around the buggy address:
[   24.629969]  fff00000c6cc9d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.630620]  fff00000c6cc9d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.631000] >fff00000c6cc9e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   24.631728]                                      ^
[   24.632213]  fff00000c6cc9e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.632693]  fff00000c6cc9f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.633425] ==================================================================
[   24.088761] ==================================================================
[   24.089429] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1000/0x49c8
[   24.090124] Write of size 8 at addr fff00000c6cc9e30 by task kunit_try_catch/252
[   24.090773] 
[   24.091210] CPU: 1 UID: 0 PID: 252 Comm: kunit_try_catch Tainted: G    B            N 6.12.32-rc1 #1
[   24.091473] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.091563] Hardware name: linux,dummy-virt (DT)
[   24.091649] Call trace:
[   24.091685]  dump_backtrace+0x9c/0x128
[   24.091760]  show_stack+0x20/0x38
[   24.091805]  dump_stack_lvl+0x8c/0xd0
[   24.091857]  print_report+0x118/0x5f0
[   24.091906]  kasan_report+0xdc/0x128
[   24.091952]  kasan_check_range+0x100/0x1a8
[   24.092003]  __kasan_check_write+0x20/0x30
[   24.092053]  kasan_atomics_helper+0x1000/0x49c8
[   24.092105]  kasan_atomics+0x1a0/0x2e8
[   24.092154]  kunit_try_run_case+0x170/0x3f0
[   24.092207]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.092293]  kthread+0x24c/0x2d0
[   24.092346]  ret_from_fork+0x10/0x20
[   24.092400] 
[   24.098116] Allocated by task 252:
[   24.098662]  kasan_save_stack+0x3c/0x68
[   24.099253]  kasan_save_track+0x20/0x40
[   24.099763]  kasan_save_alloc_info+0x40/0x58
[   24.100256]  __kasan_kmalloc+0xd4/0xd8
[   24.100765]  __kmalloc_cache_noprof+0x154/0x320
[   24.101404]  kasan_atomics+0xb8/0x2e8
[   24.101839]  kunit_try_run_case+0x170/0x3f0
[   24.102368]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.102907]  kthread+0x24c/0x2d0
[   24.103252]  ret_from_fork+0x10/0x20
[   24.103727] 
[   24.103969] The buggy address belongs to the object at fff00000c6cc9e00
[   24.103969]  which belongs to the cache kmalloc-64 of size 64
[   24.104925] The buggy address is located 0 bytes to the right of
[   24.104925]  allocated 48-byte region [fff00000c6cc9e00, fff00000c6cc9e30)
[   24.106018] 
[   24.106366] The buggy address belongs to the physical page:
[   24.106924] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106cc9
[   24.107584] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   24.108195] page_type: f5(slab)
[   24.108642] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   24.109352] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   24.110010] page dumped because: kasan: bad access detected
[   24.110557] 
[   24.110857] Memory state around the buggy address:
[   24.111368]  fff00000c6cc9d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.112009]  fff00000c6cc9d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.112683] >fff00000c6cc9e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   24.113306]                                      ^
[   24.113818]  fff00000c6cc9e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.114457]  fff00000c6cc9f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.115073] ==================================================================
[   24.022678] ==================================================================
[   24.023453] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf28/0x49c8
[   24.023848] Write of size 8 at addr fff00000c6cc9e30 by task kunit_try_catch/252
[   24.024204] 
[   24.024422] CPU: 1 UID: 0 PID: 252 Comm: kunit_try_catch Tainted: G    B            N 6.12.32-rc1 #1
[   24.024588] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.024661] Hardware name: linux,dummy-virt (DT)
[   24.024752] Call trace:
[   24.024819]  dump_backtrace+0x9c/0x128
[   24.024933]  show_stack+0x20/0x38
[   24.024987]  dump_stack_lvl+0x8c/0xd0
[   24.025042]  print_report+0x118/0x5f0
[   24.025121]  kasan_report+0xdc/0x128
[   24.025223]  kasan_check_range+0x100/0x1a8
[   24.025497]  __kasan_check_write+0x20/0x30
[   24.025621]  kasan_atomics_helper+0xf28/0x49c8
[   24.025752]  kasan_atomics+0x1a0/0x2e8
[   24.025874]  kunit_try_run_case+0x170/0x3f0
[   24.025994]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.026078]  kthread+0x24c/0x2d0
[   24.026134]  ret_from_fork+0x10/0x20
[   24.026190] 
[   24.033311] Allocated by task 252:
[   24.033951]  kasan_save_stack+0x3c/0x68
[   24.034395]  kasan_save_track+0x20/0x40
[   24.035019]  kasan_save_alloc_info+0x40/0x58
[   24.035645]  __kasan_kmalloc+0xd4/0xd8
[   24.036035]  __kmalloc_cache_noprof+0x154/0x320
[   24.036706]  kasan_atomics+0xb8/0x2e8
[   24.037088]  kunit_try_run_case+0x170/0x3f0
[   24.037734]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.038307]  kthread+0x24c/0x2d0
[   24.038674]  ret_from_fork+0x10/0x20
[   24.039217] 
[   24.039472] The buggy address belongs to the object at fff00000c6cc9e00
[   24.039472]  which belongs to the cache kmalloc-64 of size 64
[   24.040488] The buggy address is located 0 bytes to the right of
[   24.040488]  allocated 48-byte region [fff00000c6cc9e00, fff00000c6cc9e30)
[   24.041851] 
[   24.042360] The buggy address belongs to the physical page:
[   24.042835] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106cc9
[   24.043485] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   24.044025] page_type: f5(slab)
[   24.044459] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   24.045331] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   24.046127] page dumped because: kasan: bad access detected
[   24.046740] 
[   24.047051] Memory state around the buggy address:
[   24.047648]  fff00000c6cc9d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.048352]  fff00000c6cc9d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.049044] >fff00000c6cc9e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   24.049740]                                      ^
[   24.050399]  fff00000c6cc9e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.051082]  fff00000c6cc9f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.051755] ==================================================================
[   24.350732] ==================================================================
[   24.351396] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x141c/0x49c8
[   24.351989] Write of size 8 at addr fff00000c6cc9e30 by task kunit_try_catch/252
[   24.352700] 
[   24.353075] CPU: 1 UID: 0 PID: 252 Comm: kunit_try_catch Tainted: G    B            N 6.12.32-rc1 #1
[   24.353344] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.353442] Hardware name: linux,dummy-virt (DT)
[   24.353543] Call trace:
[   24.353608]  dump_backtrace+0x9c/0x128
[   24.353763]  show_stack+0x20/0x38
[   24.353837]  dump_stack_lvl+0x8c/0xd0
[   24.353893]  print_report+0x118/0x5f0
[   24.353950]  kasan_report+0xdc/0x128
[   24.354021]  kasan_check_range+0x100/0x1a8
[   24.354073]  __kasan_check_write+0x20/0x30
[   24.354122]  kasan_atomics_helper+0x141c/0x49c8
[   24.354175]  kasan_atomics+0x1a0/0x2e8
[   24.354224]  kunit_try_run_case+0x170/0x3f0
[   24.354303]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.354359]  kthread+0x24c/0x2d0
[   24.354408]  ret_from_fork+0x10/0x20
[   24.354462] 
[   24.359922] Allocated by task 252:
[   24.360391]  kasan_save_stack+0x3c/0x68
[   24.360939]  kasan_save_track+0x20/0x40
[   24.361509]  kasan_save_alloc_info+0x40/0x58
[   24.361972]  __kasan_kmalloc+0xd4/0xd8
[   24.362508]  __kmalloc_cache_noprof+0x154/0x320
[   24.362997]  kasan_atomics+0xb8/0x2e8
[   24.363500]  kunit_try_run_case+0x170/0x3f0
[   24.363941]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.364543]  kthread+0x24c/0x2d0
[   24.364975]  ret_from_fork+0x10/0x20
[   24.365420] 
[   24.365755] The buggy address belongs to the object at fff00000c6cc9e00
[   24.365755]  which belongs to the cache kmalloc-64 of size 64
[   24.366683] The buggy address is located 0 bytes to the right of
[   24.366683]  allocated 48-byte region [fff00000c6cc9e00, fff00000c6cc9e30)
[   24.367642] 
[   24.367974] The buggy address belongs to the physical page:
[   24.368450] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106cc9
[   24.369184] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   24.369784] page_type: f5(slab)
[   24.370151] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   24.370910] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   24.371480] page dumped because: kasan: bad access detected
[   24.371988] 
[   24.372281] Memory state around the buggy address:
[   24.372759]  fff00000c6cc9d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.373438]  fff00000c6cc9d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.374082] >fff00000c6cc9e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   24.374686]                                      ^
[   24.375170]  fff00000c6cc9e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.375821]  fff00000c6cc9f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.376439] ==================================================================
[   24.492714] ==================================================================
[   24.493304] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x15f0/0x49c8
[   24.494188] Write of size 8 at addr fff00000c6cc9e30 by task kunit_try_catch/252
[   24.495280] 
[   24.495616] CPU: 1 UID: 0 PID: 252 Comm: kunit_try_catch Tainted: G    B            N 6.12.32-rc1 #1
[   24.495825] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.495868] Hardware name: linux,dummy-virt (DT)
[   24.495913] Call trace:
[   24.495961]  dump_backtrace+0x9c/0x128
[   24.496068]  show_stack+0x20/0x38
[   24.496167]  dump_stack_lvl+0x8c/0xd0
[   24.496273]  print_report+0x118/0x5f0
[   24.496333]  kasan_report+0xdc/0x128
[   24.496381]  kasan_check_range+0x100/0x1a8
[   24.496432]  __kasan_check_write+0x20/0x30
[   24.496482]  kasan_atomics_helper+0x15f0/0x49c8
[   24.496535]  kasan_atomics+0x1a0/0x2e8
[   24.496585]  kunit_try_run_case+0x170/0x3f0
[   24.496641]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.496701]  kthread+0x24c/0x2d0
[   24.496750]  ret_from_fork+0x10/0x20
[   24.496804] 
[   24.501918] Allocated by task 252:
[   24.502411]  kasan_save_stack+0x3c/0x68
[   24.502894]  kasan_save_track+0x20/0x40
[   24.503314]  kasan_save_alloc_info+0x40/0x58
[   24.503778]  __kasan_kmalloc+0xd4/0xd8
[   24.504267]  __kmalloc_cache_noprof+0x154/0x320
[   24.504817]  kasan_atomics+0xb8/0x2e8
[   24.505307]  kunit_try_run_case+0x170/0x3f0
[   24.505742]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.506286]  kthread+0x24c/0x2d0
[   24.506624]  ret_from_fork+0x10/0x20
[   24.506982] 
[   24.507228] The buggy address belongs to the object at fff00000c6cc9e00
[   24.507228]  which belongs to the cache kmalloc-64 of size 64
[   24.508566] The buggy address is located 0 bytes to the right of
[   24.508566]  allocated 48-byte region [fff00000c6cc9e00, fff00000c6cc9e30)
[   24.509595] 
[   24.510091] The buggy address belongs to the physical page:
[   24.510422] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106cc9
[   24.511178] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   24.511816] page_type: f5(slab)
[   24.512182] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   24.512937] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   24.513632] page dumped because: kasan: bad access detected
[   24.514103] 
[   24.514386] Memory state around the buggy address:
[   24.514853]  fff00000c6cc9d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.515491]  fff00000c6cc9d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.516127] >fff00000c6cc9e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   24.516767]                                      ^
[   24.517086]  fff00000c6cc9e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.517803]  fff00000c6cc9f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.518306] ==================================================================
[   24.233155] ==================================================================
[   24.233774] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x121c/0x49c8
[   24.234482] Write of size 8 at addr fff00000c6cc9e30 by task kunit_try_catch/252
[   24.235182] 
[   24.235481] CPU: 1 UID: 0 PID: 252 Comm: kunit_try_catch Tainted: G    B            N 6.12.32-rc1 #1
[   24.235734] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.235823] Hardware name: linux,dummy-virt (DT)
[   24.235916] Call trace:
[   24.235986]  dump_backtrace+0x9c/0x128
[   24.236132]  show_stack+0x20/0x38
[   24.236231]  dump_stack_lvl+0x8c/0xd0
[   24.236353]  print_report+0x118/0x5f0
[   24.236488]  kasan_report+0xdc/0x128
[   24.236577]  kasan_check_range+0x100/0x1a8
[   24.236632]  __kasan_check_write+0x20/0x30
[   24.236686]  kasan_atomics_helper+0x121c/0x49c8
[   24.236776]  kasan_atomics+0x1a0/0x2e8
[   24.236828]  kunit_try_run_case+0x170/0x3f0
[   24.236884]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.236939]  kthread+0x24c/0x2d0
[   24.236988]  ret_from_fork+0x10/0x20
[   24.237043] 
[   24.242624] Allocated by task 252:
[   24.243105]  kasan_save_stack+0x3c/0x68
[   24.243679]  kasan_save_track+0x20/0x40
[   24.244172]  kasan_save_alloc_info+0x40/0x58
[   24.244721]  __kasan_kmalloc+0xd4/0xd8
[   24.245150]  __kmalloc_cache_noprof+0x154/0x320
[   24.245737]  kasan_atomics+0xb8/0x2e8
[   24.246274]  kunit_try_run_case+0x170/0x3f0
[   24.246832]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.247409]  kthread+0x24c/0x2d0
[   24.247815]  ret_from_fork+0x10/0x20
[   24.248167] 
[   24.248479] The buggy address belongs to the object at fff00000c6cc9e00
[   24.248479]  which belongs to the cache kmalloc-64 of size 64
[   24.249373] The buggy address is located 0 bytes to the right of
[   24.249373]  allocated 48-byte region [fff00000c6cc9e00, fff00000c6cc9e30)
[   24.250460] 
[   24.250819] The buggy address belongs to the physical page:
[   24.251327] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106cc9
[   24.252037] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   24.252742] page_type: f5(slab)
[   24.253116] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   24.253873] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   24.254609] page dumped because: kasan: bad access detected
[   24.255142] 
[   24.255434] Memory state around the buggy address:
[   24.255925]  fff00000c6cc9d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.256639]  fff00000c6cc9d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.257248] >fff00000c6cc9e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   24.257827]                                      ^
[   24.258220]  fff00000c6cc9e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.258758]  fff00000c6cc9f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.259316] ==================================================================
[   23.664437] ==================================================================
[   23.665095] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f34/0x49c8
[   23.665758] Read of size 4 at addr fff00000c6cc9e30 by task kunit_try_catch/252
[   23.666269] 
[   23.666618] CPU: 1 UID: 0 PID: 252 Comm: kunit_try_catch Tainted: G    B            N 6.12.32-rc1 #1
[   23.666852] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.666932] Hardware name: linux,dummy-virt (DT)
[   23.667027] Call trace:
[   23.667093]  dump_backtrace+0x9c/0x128
[   23.667269]  show_stack+0x20/0x38
[   23.667372]  dump_stack_lvl+0x8c/0xd0
[   23.667477]  print_report+0x118/0x5f0
[   23.667532]  kasan_report+0xdc/0x128
[   23.667581]  __asan_report_load4_noabort+0x20/0x30
[   23.667633]  kasan_atomics_helper+0x3f34/0x49c8
[   23.667688]  kasan_atomics+0x1a0/0x2e8
[   23.667736]  kunit_try_run_case+0x170/0x3f0
[   23.667788]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.667844]  kthread+0x24c/0x2d0
[   23.667890]  ret_from_fork+0x10/0x20
[   23.667945] 
[   23.672653] Allocated by task 252:
[   23.673156]  kasan_save_stack+0x3c/0x68
[   23.673701]  kasan_save_track+0x20/0x40
[   23.674165]  kasan_save_alloc_info+0x40/0x58
[   23.674611]  __kasan_kmalloc+0xd4/0xd8
[   23.675056]  __kmalloc_cache_noprof+0x154/0x320
[   23.675489]  kasan_atomics+0xb8/0x2e8
[   23.675959]  kunit_try_run_case+0x170/0x3f0
[   23.676432]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.676854]  kthread+0x24c/0x2d0
[   23.677325]  ret_from_fork+0x10/0x20
[   23.677810] 
[   23.678055] The buggy address belongs to the object at fff00000c6cc9e00
[   23.678055]  which belongs to the cache kmalloc-64 of size 64
[   23.678968] The buggy address is located 0 bytes to the right of
[   23.678968]  allocated 48-byte region [fff00000c6cc9e00, fff00000c6cc9e30)
[   23.679890] 
[   23.680208] The buggy address belongs to the physical page:
[   23.680823] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106cc9
[   23.681445] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   23.682092] page_type: f5(slab)
[   23.682491] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   23.683277] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   23.683854] page dumped because: kasan: bad access detected
[   23.684403] 
[   23.684651] Memory state around the buggy address:
[   23.685009]  fff00000c6cc9d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.685740]  fff00000c6cc9d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.686301] >fff00000c6cc9e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   23.686908]                                      ^
[   23.687355]  fff00000c6cc9e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.687973]  fff00000c6cc9f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.688469] ==================================================================
[   23.360454] ==================================================================
[   23.361022] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x6bc/0x49c8
[   23.361761] Write of size 4 at addr fff00000c6cc9e30 by task kunit_try_catch/252
[   23.362515] 
[   23.362891] CPU: 1 UID: 0 PID: 252 Comm: kunit_try_catch Tainted: G    B            N 6.12.32-rc1 #1
[   23.363075] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.363155] Hardware name: linux,dummy-virt (DT)
[   23.363213] Call trace:
[   23.363266]  dump_backtrace+0x9c/0x128
[   23.363400]  show_stack+0x20/0x38
[   23.363502]  dump_stack_lvl+0x8c/0xd0
[   23.363598]  print_report+0x118/0x5f0
[   23.363650]  kasan_report+0xdc/0x128
[   23.363702]  kasan_check_range+0x100/0x1a8
[   23.363752]  __kasan_check_write+0x20/0x30
[   23.363798]  kasan_atomics_helper+0x6bc/0x49c8
[   23.363849]  kasan_atomics+0x1a0/0x2e8
[   23.363895]  kunit_try_run_case+0x170/0x3f0
[   23.363944]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.364000]  kthread+0x24c/0x2d0
[   23.364047]  ret_from_fork+0x10/0x20
[   23.364098] 
[   23.369565] Allocated by task 252:
[   23.370099]  kasan_save_stack+0x3c/0x68
[   23.370676]  kasan_save_track+0x20/0x40
[   23.371163]  kasan_save_alloc_info+0x40/0x58
[   23.371594]  __kasan_kmalloc+0xd4/0xd8
[   23.372113]  __kmalloc_cache_noprof+0x154/0x320
[   23.372541]  kasan_atomics+0xb8/0x2e8
[   23.373056]  kunit_try_run_case+0x170/0x3f0
[   23.373594]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.374169]  kthread+0x24c/0x2d0
[   23.374662]  ret_from_fork+0x10/0x20
[   23.375182] 
[   23.375493] The buggy address belongs to the object at fff00000c6cc9e00
[   23.375493]  which belongs to the cache kmalloc-64 of size 64
[   23.376358] The buggy address is located 0 bytes to the right of
[   23.376358]  allocated 48-byte region [fff00000c6cc9e00, fff00000c6cc9e30)
[   23.377394] 
[   23.377746] The buggy address belongs to the physical page:
[   23.378221] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106cc9
[   23.378961] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   23.379558] page_type: f5(slab)
[   23.379956] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   23.380617] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   23.381296] page dumped because: kasan: bad access detected
[   23.381745] 
[   23.381997] Memory state around the buggy address:
[   23.382720]  fff00000c6cc9d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.383356]  fff00000c6cc9d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.383889] >fff00000c6cc9e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   23.384550]                                      ^
[   23.385071]  fff00000c6cc9e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.385721]  fff00000c6cc9f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.386334] ==================================================================
[   24.744935] ==================================================================
[   24.745761] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x18a4/0x49c8
[   24.746295] Write of size 8 at addr fff00000c6cc9e30 by task kunit_try_catch/252
[   24.746731] 
[   24.746945] CPU: 1 UID: 0 PID: 252 Comm: kunit_try_catch Tainted: G    B            N 6.12.32-rc1 #1
[   24.747136] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.747200] Hardware name: linux,dummy-virt (DT)
[   24.747572] Call trace:
[   24.747655]  dump_backtrace+0x9c/0x128
[   24.747814]  show_stack+0x20/0x38
[   24.747934]  dump_stack_lvl+0x8c/0xd0
[   24.748049]  print_report+0x118/0x5f0
[   24.748162]  kasan_report+0xdc/0x128
[   24.748287]  kasan_check_range+0x100/0x1a8
[   24.748392]  __kasan_check_write+0x20/0x30
[   24.748499]  kasan_atomics_helper+0x18a4/0x49c8
[   24.748608]  kasan_atomics+0x1a0/0x2e8
[   24.748717]  kunit_try_run_case+0x170/0x3f0
[   24.748835]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.748953]  kthread+0x24c/0x2d0
[   24.749052]  ret_from_fork+0x10/0x20
[   24.749139] 
[   24.754291] Allocated by task 252:
[   24.754792]  kasan_save_stack+0x3c/0x68
[   24.755344]  kasan_save_track+0x20/0x40
[   24.755857]  kasan_save_alloc_info+0x40/0x58
[   24.756339]  __kasan_kmalloc+0xd4/0xd8
[   24.756820]  __kmalloc_cache_noprof+0x154/0x320
[   24.757402]  kasan_atomics+0xb8/0x2e8
[   24.757817]  kunit_try_run_case+0x170/0x3f0
[   24.758290]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.758752]  kthread+0x24c/0x2d0
[   24.759213]  ret_from_fork+0x10/0x20
[   24.759622] 
[   24.759918] The buggy address belongs to the object at fff00000c6cc9e00
[   24.759918]  which belongs to the cache kmalloc-64 of size 64
[   24.760808] The buggy address is located 0 bytes to the right of
[   24.760808]  allocated 48-byte region [fff00000c6cc9e00, fff00000c6cc9e30)
[   24.762271] 
[   24.762792] The buggy address belongs to the physical page:
[   24.763477] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106cc9
[   24.764133] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   24.764576] page_type: f5(slab)
[   24.765043] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   24.765685] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   24.766274] page dumped because: kasan: bad access detected
[   24.766852] 
[   24.767131] Memory state around the buggy address:
[   24.767566]  fff00000c6cc9d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.768110]  fff00000c6cc9d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.768840] >fff00000c6cc9e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   24.769410]                                      ^
[   24.769873]  fff00000c6cc9e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.770545]  fff00000c6cc9f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.771107] ==================================================================
[   24.260745] ==================================================================
[   24.261838] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1288/0x49c8
[   24.262554] Write of size 8 at addr fff00000c6cc9e30 by task kunit_try_catch/252
[   24.263403] 
[   24.263759] CPU: 1 UID: 0 PID: 252 Comm: kunit_try_catch Tainted: G    B            N 6.12.32-rc1 #1
[   24.264015] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.264097] Hardware name: linux,dummy-virt (DT)
[   24.264216] Call trace:
[   24.264301]  dump_backtrace+0x9c/0x128
[   24.264407]  show_stack+0x20/0x38
[   24.264459]  dump_stack_lvl+0x8c/0xd0
[   24.264513]  print_report+0x118/0x5f0
[   24.264560]  kasan_report+0xdc/0x128
[   24.264606]  kasan_check_range+0x100/0x1a8
[   24.264655]  __kasan_check_write+0x20/0x30
[   24.264705]  kasan_atomics_helper+0x1288/0x49c8
[   24.264757]  kasan_atomics+0x1a0/0x2e8
[   24.264806]  kunit_try_run_case+0x170/0x3f0
[   24.264856]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.264911]  kthread+0x24c/0x2d0
[   24.264959]  ret_from_fork+0x10/0x20
[   24.265014] 
[   24.270440] Allocated by task 252:
[   24.270823]  kasan_save_stack+0x3c/0x68
[   24.271406]  kasan_save_track+0x20/0x40
[   24.271949]  kasan_save_alloc_info+0x40/0x58
[   24.272429]  __kasan_kmalloc+0xd4/0xd8
[   24.272959]  __kmalloc_cache_noprof+0x154/0x320
[   24.273497]  kasan_atomics+0xb8/0x2e8
[   24.273881]  kunit_try_run_case+0x170/0x3f0
[   24.274483]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.274999]  kthread+0x24c/0x2d0
[   24.275376]  ret_from_fork+0x10/0x20
[   24.275825] 
[   24.276102] The buggy address belongs to the object at fff00000c6cc9e00
[   24.276102]  which belongs to the cache kmalloc-64 of size 64
[   24.277006] The buggy address is located 0 bytes to the right of
[   24.277006]  allocated 48-byte region [fff00000c6cc9e00, fff00000c6cc9e30)
[   24.278061] 
[   24.278413] The buggy address belongs to the physical page:
[   24.278862] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106cc9
[   24.279654] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   24.280316] page_type: f5(slab)
[   24.280776] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   24.281514] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   24.282132] page dumped because: kasan: bad access detected
[   24.282686] 
[   24.282998] Memory state around the buggy address:
[   24.283450]  fff00000c6cc9d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.284163]  fff00000c6cc9d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.284835] >fff00000c6cc9e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   24.285595]                                      ^
[   24.286227]  fff00000c6cc9e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.286984]  fff00000c6cc9f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.287703] ==================================================================
[   23.198766] ==================================================================
[   23.199515] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a0/0x49c8
[   23.200158] Write of size 4 at addr fff00000c6cc9e30 by task kunit_try_catch/252
[   23.201093] 
[   23.201389] CPU: 1 UID: 0 PID: 252 Comm: kunit_try_catch Tainted: G    B            N 6.12.32-rc1 #1
[   23.201621] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.201702] Hardware name: linux,dummy-virt (DT)
[   23.201799] Call trace:
[   23.201862]  dump_backtrace+0x9c/0x128
[   23.201989]  show_stack+0x20/0x38
[   23.202081]  dump_stack_lvl+0x8c/0xd0
[   23.202189]  print_report+0x118/0x5f0
[   23.202307]  kasan_report+0xdc/0x128
[   23.202404]  kasan_check_range+0x100/0x1a8
[   23.202513]  __kasan_check_write+0x20/0x30
[   23.202617]  kasan_atomics_helper+0x4a0/0x49c8
[   23.202732]  kasan_atomics+0x1a0/0x2e8
[   23.202785]  kunit_try_run_case+0x170/0x3f0
[   23.202843]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.202898]  kthread+0x24c/0x2d0
[   23.202946]  ret_from_fork+0x10/0x20
[   23.202999] 
[   23.209555] Allocated by task 252:
[   23.209797]  kasan_save_stack+0x3c/0x68
[   23.210058]  kasan_save_track+0x20/0x40
[   23.210301]  kasan_save_alloc_info+0x40/0x58
[   23.210782]  __kasan_kmalloc+0xd4/0xd8
[   23.211336]  __kmalloc_cache_noprof+0x154/0x320
[   23.212505]  kasan_atomics+0xb8/0x2e8
[   23.212848]  kunit_try_run_case+0x170/0x3f0
[   23.213284]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.214063]  kthread+0x24c/0x2d0
[   23.214607]  ret_from_fork+0x10/0x20
[   23.215317] 
[   23.215695] The buggy address belongs to the object at fff00000c6cc9e00
[   23.215695]  which belongs to the cache kmalloc-64 of size 64
[   23.216581] The buggy address is located 0 bytes to the right of
[   23.216581]  allocated 48-byte region [fff00000c6cc9e00, fff00000c6cc9e30)
[   23.217367] 
[   23.217729] The buggy address belongs to the physical page:
[   23.218287] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106cc9
[   23.219153] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   23.219829] page_type: f5(slab)
[   23.220218] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   23.220756] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   23.221809] page dumped because: kasan: bad access detected
[   23.222802] 
[   23.223019] Memory state around the buggy address:
[   23.223634]  fff00000c6cc9d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.224539]  fff00000c6cc9d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.225229] >fff00000c6cc9e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   23.225827]                                      ^
[   23.226365]  fff00000c6cc9e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.227116]  fff00000c6cc9f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.227728] ==================================================================
[   23.298396] ==================================================================
[   23.299344] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x5e4/0x49c8
[   23.300478] Write of size 4 at addr fff00000c6cc9e30 by task kunit_try_catch/252
[   23.301151] 
[   23.301497] CPU: 1 UID: 0 PID: 252 Comm: kunit_try_catch Tainted: G    B            N 6.12.32-rc1 #1
[   23.301974] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.302051] Hardware name: linux,dummy-virt (DT)
[   23.302141] Call trace:
[   23.302185]  dump_backtrace+0x9c/0x128
[   23.302281]  show_stack+0x20/0x38
[   23.302333]  dump_stack_lvl+0x8c/0xd0
[   23.302383]  print_report+0x118/0x5f0
[   23.302432]  kasan_report+0xdc/0x128
[   23.302476]  kasan_check_range+0x100/0x1a8
[   23.302526]  __kasan_check_write+0x20/0x30
[   23.302574]  kasan_atomics_helper+0x5e4/0x49c8
[   23.302628]  kasan_atomics+0x1a0/0x2e8
[   23.302678]  kunit_try_run_case+0x170/0x3f0
[   23.302730]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.302785]  kthread+0x24c/0x2d0
[   23.302831]  ret_from_fork+0x10/0x20
[   23.302884] 
[   23.309507] Allocated by task 252:
[   23.310084]  kasan_save_stack+0x3c/0x68
[   23.310787]  kasan_save_track+0x20/0x40
[   23.311257]  kasan_save_alloc_info+0x40/0x58
[   23.311904]  __kasan_kmalloc+0xd4/0xd8
[   23.312744]  __kmalloc_cache_noprof+0x154/0x320
[   23.313177]  kasan_atomics+0xb8/0x2e8
[   23.313525]  kunit_try_run_case+0x170/0x3f0
[   23.313894]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.314526]  kthread+0x24c/0x2d0
[   23.314893]  ret_from_fork+0x10/0x20
[   23.315638] 
[   23.316040] The buggy address belongs to the object at fff00000c6cc9e00
[   23.316040]  which belongs to the cache kmalloc-64 of size 64
[   23.317382] The buggy address is located 0 bytes to the right of
[   23.317382]  allocated 48-byte region [fff00000c6cc9e00, fff00000c6cc9e30)
[   23.318755] 
[   23.319020] The buggy address belongs to the physical page:
[   23.319616] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106cc9
[   23.320668] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   23.321279] page_type: f5(slab)
[   23.321488] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   23.321742] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   23.321973] page dumped because: kasan: bad access detected
[   23.322161] 
[   23.322346] Memory state around the buggy address:
[   23.323072]  fff00000c6cc9d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.324328]  fff00000c6cc9d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.325041] >fff00000c6cc9e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   23.325842]                                      ^
[   23.326437]  fff00000c6cc9e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.327067]  fff00000c6cc9f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.327926] ==================================================================
[   22.874336] ==================================================================
[   22.876573] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4210/0x49c8
[   22.877284] Read of size 4 at addr fff00000c6cc9e30 by task kunit_try_catch/252
[   22.877831] 
[   22.878191] CPU: 1 UID: 0 PID: 252 Comm: kunit_try_catch Tainted: G    B            N 6.12.32-rc1 #1
[   22.878436] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.878512] Hardware name: linux,dummy-virt (DT)
[   22.878617] Call trace:
[   22.878691]  dump_backtrace+0x9c/0x128
[   22.878822]  show_stack+0x20/0x38
[   22.878895]  dump_stack_lvl+0x8c/0xd0
[   22.878956]  print_report+0x118/0x5f0
[   22.879008]  kasan_report+0xdc/0x128
[   22.879078]  __asan_report_load4_noabort+0x20/0x30
[   22.879176]  kasan_atomics_helper+0x4210/0x49c8
[   22.879281]  kasan_atomics+0x1a0/0x2e8
[   22.879371]  kunit_try_run_case+0x170/0x3f0
[   22.879491]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.879598]  kthread+0x24c/0x2d0
[   22.879682]  ret_from_fork+0x10/0x20
[   22.879778] 
[   22.886033] Allocated by task 252:
[   22.886587]  kasan_save_stack+0x3c/0x68
[   22.887422]  kasan_save_track+0x20/0x40
[   22.887919]  kasan_save_alloc_info+0x40/0x58
[   22.888348]  __kasan_kmalloc+0xd4/0xd8
[   22.888853]  __kmalloc_cache_noprof+0x154/0x320
[   22.889434]  kasan_atomics+0xb8/0x2e8
[   22.889878]  kunit_try_run_case+0x170/0x3f0
[   22.890308]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.890914]  kthread+0x24c/0x2d0
[   22.891307]  ret_from_fork+0x10/0x20
[   22.891808] 
[   22.892054] The buggy address belongs to the object at fff00000c6cc9e00
[   22.892054]  which belongs to the cache kmalloc-64 of size 64
[   22.892908] The buggy address is located 0 bytes to the right of
[   22.892908]  allocated 48-byte region [fff00000c6cc9e00, fff00000c6cc9e30)
[   22.893892] 
[   22.894223] The buggy address belongs to the physical page:
[   22.894759] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106cc9
[   22.895499] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   22.896325] page_type: f5(slab)
[   22.896799] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   22.897435] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   22.898102] page dumped because: kasan: bad access detected
[   22.898830] 
[   22.899478] Memory state around the buggy address:
[   22.899997]  fff00000c6cc9d00: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   22.900619]  fff00000c6cc9d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.901248] >fff00000c6cc9e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   22.901871]                                      ^
[   22.902415]  fff00000c6cc9e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.903065]  fff00000c6cc9f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.903950] ==================================================================
[   23.134508] ==================================================================
[   23.135769] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3c8/0x49c8
[   23.136473] Write of size 4 at addr fff00000c6cc9e30 by task kunit_try_catch/252
[   23.137282] 
[   23.137649] CPU: 1 UID: 0 PID: 252 Comm: kunit_try_catch Tainted: G    B            N 6.12.32-rc1 #1
[   23.137885] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.137976] Hardware name: linux,dummy-virt (DT)
[   23.138070] Call trace:
[   23.138136]  dump_backtrace+0x9c/0x128
[   23.138276]  show_stack+0x20/0x38
[   23.138387]  dump_stack_lvl+0x8c/0xd0
[   23.138478]  print_report+0x118/0x5f0
[   23.138536]  kasan_report+0xdc/0x128
[   23.138585]  kasan_check_range+0x100/0x1a8
[   23.138633]  __kasan_check_write+0x20/0x30
[   23.138683]  kasan_atomics_helper+0x3c8/0x49c8
[   23.138734]  kasan_atomics+0x1a0/0x2e8
[   23.138783]  kunit_try_run_case+0x170/0x3f0
[   23.138832]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.138886]  kthread+0x24c/0x2d0
[   23.138934]  ret_from_fork+0x10/0x20
[   23.138986] 
[   23.145260] Allocated by task 252:
[   23.145770]  kasan_save_stack+0x3c/0x68
[   23.146899]  kasan_save_track+0x20/0x40
[   23.147510]  kasan_save_alloc_info+0x40/0x58
[   23.148298]  __kasan_kmalloc+0xd4/0xd8
[   23.148614]  __kmalloc_cache_noprof+0x154/0x320
[   23.149289]  kasan_atomics+0xb8/0x2e8
[   23.149656]  kunit_try_run_case+0x170/0x3f0
[   23.150338]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.150879]  kthread+0x24c/0x2d0
[   23.151744]  ret_from_fork+0x10/0x20
[   23.152125] 
[   23.152444] The buggy address belongs to the object at fff00000c6cc9e00
[   23.152444]  which belongs to the cache kmalloc-64 of size 64
[   23.153318] The buggy address is located 0 bytes to the right of
[   23.153318]  allocated 48-byte region [fff00000c6cc9e00, fff00000c6cc9e30)
[   23.154315] 
[   23.154585] The buggy address belongs to the physical page:
[   23.155573] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106cc9
[   23.156334] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   23.156752] page_type: f5(slab)
[   23.157582] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   23.158390] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   23.159310] page dumped because: kasan: bad access detected
[   23.160029] 
[   23.160311] Memory state around the buggy address:
[   23.160727]  fff00000c6cc9d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.161342]  fff00000c6cc9d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.161983] >fff00000c6cc9e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   23.162589]                                      ^
[   23.163521]  fff00000c6cc9e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.164219]  fff00000c6cc9f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.164535] ==================================================================
[   24.717797] ==================================================================
[   24.718420] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f88/0x49c8
[   24.719161] Read of size 8 at addr fff00000c6cc9e30 by task kunit_try_catch/252
[   24.719628] 
[   24.720017] CPU: 1 UID: 0 PID: 252 Comm: kunit_try_catch Tainted: G    B            N 6.12.32-rc1 #1
[   24.720272] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.720359] Hardware name: linux,dummy-virt (DT)
[   24.720460] Call trace:
[   24.720553]  dump_backtrace+0x9c/0x128
[   24.720684]  show_stack+0x20/0x38
[   24.720775]  dump_stack_lvl+0x8c/0xd0
[   24.720835]  print_report+0x118/0x5f0
[   24.720884]  kasan_report+0xdc/0x128
[   24.720931]  __asan_report_load8_noabort+0x20/0x30
[   24.720984]  kasan_atomics_helper+0x3f88/0x49c8
[   24.721038]  kasan_atomics+0x1a0/0x2e8
[   24.721091]  kunit_try_run_case+0x170/0x3f0
[   24.721143]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.721200]  kthread+0x24c/0x2d0
[   24.721273]  ret_from_fork+0x10/0x20
[   24.721331] 
[   24.726641] Allocated by task 252:
[   24.727065]  kasan_save_stack+0x3c/0x68
[   24.727619]  kasan_save_track+0x20/0x40
[   24.728073]  kasan_save_alloc_info+0x40/0x58
[   24.728515]  __kasan_kmalloc+0xd4/0xd8
[   24.729051]  __kmalloc_cache_noprof+0x154/0x320
[   24.729537]  kasan_atomics+0xb8/0x2e8
[   24.730068]  kunit_try_run_case+0x170/0x3f0
[   24.730563]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.731146]  kthread+0x24c/0x2d0
[   24.731542]  ret_from_fork+0x10/0x20
[   24.732026] 
[   24.732365] The buggy address belongs to the object at fff00000c6cc9e00
[   24.732365]  which belongs to the cache kmalloc-64 of size 64
[   24.733305] The buggy address is located 0 bytes to the right of
[   24.733305]  allocated 48-byte region [fff00000c6cc9e00, fff00000c6cc9e30)
[   24.734322] 
[   24.734661] The buggy address belongs to the physical page:
[   24.735154] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106cc9
[   24.735933] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   24.736550] page_type: f5(slab)
[   24.736970] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   24.737708] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   24.738355] page dumped because: kasan: bad access detected
[   24.738833] 
[   24.739160] Memory state around the buggy address:
[   24.739647]  fff00000c6cc9d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.740266]  fff00000c6cc9d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.740930] >fff00000c6cc9e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   24.741590]                                      ^
[   24.742003]  fff00000c6cc9e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.742557]  fff00000c6cc9f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.743072] ==================================================================
[   24.662916] ==================================================================
[   24.663620] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f78/0x49c8
[   24.664311] Read of size 8 at addr fff00000c6cc9e30 by task kunit_try_catch/252
[   24.664904] 
[   24.665261] CPU: 1 UID: 0 PID: 252 Comm: kunit_try_catch Tainted: G    B            N 6.12.32-rc1 #1
[   24.665515] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.665605] Hardware name: linux,dummy-virt (DT)
[   24.665695] Call trace:
[   24.665767]  dump_backtrace+0x9c/0x128
[   24.665910]  show_stack+0x20/0x38
[   24.666012]  dump_stack_lvl+0x8c/0xd0
[   24.666096]  print_report+0x118/0x5f0
[   24.666148]  kasan_report+0xdc/0x128
[   24.666196]  __asan_report_load8_noabort+0x20/0x30
[   24.666277]  kasan_atomics_helper+0x3f78/0x49c8
[   24.666336]  kasan_atomics+0x1a0/0x2e8
[   24.666388]  kunit_try_run_case+0x170/0x3f0
[   24.666444]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.666501]  kthread+0x24c/0x2d0
[   24.666550]  ret_from_fork+0x10/0x20
[   24.666605] 
[   24.671523] Allocated by task 252:
[   24.672040]  kasan_save_stack+0x3c/0x68
[   24.672537]  kasan_save_track+0x20/0x40
[   24.672948]  kasan_save_alloc_info+0x40/0x58
[   24.673535]  __kasan_kmalloc+0xd4/0xd8
[   24.674040]  __kmalloc_cache_noprof+0x154/0x320
[   24.674548]  kasan_atomics+0xb8/0x2e8
[   24.675052]  kunit_try_run_case+0x170/0x3f0
[   24.675598]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.676117]  kthread+0x24c/0x2d0
[   24.676551]  ret_from_fork+0x10/0x20
[   24.676901] 
[   24.677203] The buggy address belongs to the object at fff00000c6cc9e00
[   24.677203]  which belongs to the cache kmalloc-64 of size 64
[   24.678105] The buggy address is located 0 bytes to the right of
[   24.678105]  allocated 48-byte region [fff00000c6cc9e00, fff00000c6cc9e30)
[   24.679085] 
[   24.679427] The buggy address belongs to the physical page:
[   24.679998] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106cc9
[   24.680707] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   24.681315] page_type: f5(slab)
[   24.681699] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   24.682394] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   24.682966] page dumped because: kasan: bad access detected
[   24.683408] 
[   24.683709] Memory state around the buggy address:
[   24.684157]  fff00000c6cc9d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.684819]  fff00000c6cc9d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.685445] >fff00000c6cc9e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   24.685992]                                      ^
[   24.686484]  fff00000c6cc9e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.687202]  fff00000c6cc9f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.687746] ==================================================================

[   15.435142] ==================================================================
[   15.435538] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x16e8/0x5450
[   15.436304] Write of size 8 at addr ffff888102635030 by task kunit_try_catch/270
[   15.436870] 
[   15.437021] CPU: 0 UID: 0 PID: 270 Comm: kunit_try_catch Tainted: G    B            N 6.12.32-rc1 #1
[   15.437109] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.437135] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.437175] Call Trace:
[   15.437214]  <TASK>
[   15.437251]  dump_stack_lvl+0x73/0xb0
[   15.437306]  print_report+0xd1/0x640
[   15.437582]  ? __virt_addr_valid+0x1db/0x2d0
[   15.437636]  ? kasan_atomics_helper+0x16e8/0x5450
[   15.437696]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.437745]  ? kasan_atomics_helper+0x16e8/0x5450
[   15.437786]  kasan_report+0x140/0x180
[   15.437836]  ? kasan_atomics_helper+0x16e8/0x5450
[   15.437890]  kasan_check_range+0x10c/0x1c0
[   15.437952]  __kasan_check_write+0x18/0x20
[   15.438005]  kasan_atomics_helper+0x16e8/0x5450
[   15.438085]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.438126]  ? __kmalloc_cache_noprof+0x168/0x350
[   15.438155]  kasan_atomics+0x1dd/0x310
[   15.438179]  ? __pfx_kasan_atomics+0x10/0x10
[   15.438203]  ? __pfx_read_tsc+0x10/0x10
[   15.438225]  ? ktime_get_ts64+0x84/0x230
[   15.438256]  kunit_try_run_case+0x1a6/0x480
[   15.438282]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.438305]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   15.438329]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.438357]  ? __kthread_parkme+0x82/0x160
[   15.438380]  ? preempt_count_sub+0x50/0x80
[   15.438405]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.438428]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.438456]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.438486]  kthread+0x257/0x310
[   15.438506]  ? __pfx_kthread+0x10/0x10
[   15.438528]  ret_from_fork+0x41/0x80
[   15.438551]  ? __pfx_kthread+0x10/0x10
[   15.438572]  ret_from_fork_asm+0x1a/0x30
[   15.438605]  </TASK>
[   15.438620] 
[   15.448163] Allocated by task 270:
[   15.448457]  kasan_save_stack+0x45/0x70
[   15.449679]  kasan_save_track+0x18/0x40
[   15.450290]  kasan_save_alloc_info+0x3b/0x50
[   15.450732]  __kasan_kmalloc+0xb7/0xc0
[   15.451295]  __kmalloc_cache_noprof+0x168/0x350
[   15.451651]  kasan_atomics+0x96/0x310
[   15.451937]  kunit_try_run_case+0x1a6/0x480
[   15.452734]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.452958]  kthread+0x257/0x310
[   15.453474]  ret_from_fork+0x41/0x80
[   15.453642]  ret_from_fork_asm+0x1a/0x30
[   15.454168] 
[   15.454276] The buggy address belongs to the object at ffff888102635000
[   15.454276]  which belongs to the cache kmalloc-64 of size 64
[   15.454876] The buggy address is located 0 bytes to the right of
[   15.454876]  allocated 48-byte region [ffff888102635000, ffff888102635030)
[   15.455607] 
[   15.456085] The buggy address belongs to the physical page:
[   15.456768] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102635
[   15.457236] flags: 0x200000000000000(node=0|zone=2)
[   15.457475] page_type: f5(slab)
[   15.457750] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.458171] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   15.458495] page dumped because: kasan: bad access detected
[   15.458815] 
[   15.458928] Memory state around the buggy address:
[   15.459331]  ffff888102634f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.459745]  ffff888102634f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.460265] >ffff888102635000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.460703]                                      ^
[   15.461027]  ffff888102635080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.461347]  ffff888102635100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.461794] ==================================================================
[   14.822255] ==================================================================
[   14.822920] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xac8/0x5450
[   14.823454] Write of size 4 at addr ffff888102635030 by task kunit_try_catch/270
[   14.823955] 
[   14.824160] CPU: 0 UID: 0 PID: 270 Comm: kunit_try_catch Tainted: G    B            N 6.12.32-rc1 #1
[   14.824242] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.824269] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.824310] Call Trace:
[   14.824342]  <TASK>
[   14.824374]  dump_stack_lvl+0x73/0xb0
[   14.824431]  print_report+0xd1/0x640
[   14.824478]  ? __virt_addr_valid+0x1db/0x2d0
[   14.824525]  ? kasan_atomics_helper+0xac8/0x5450
[   14.824568]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.824616]  ? kasan_atomics_helper+0xac8/0x5450
[   14.824674]  kasan_report+0x140/0x180
[   14.824724]  ? kasan_atomics_helper+0xac8/0x5450
[   14.824784]  kasan_check_range+0x10c/0x1c0
[   14.824829]  __kasan_check_write+0x18/0x20
[   14.824872]  kasan_atomics_helper+0xac8/0x5450
[   14.824920]  ? kasan_save_alloc_info+0x3b/0x50
[   14.824964]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.825015]  ? __kmalloc_cache_noprof+0x168/0x350
[   14.825102]  kasan_atomics+0x1dd/0x310
[   14.825150]  ? __pfx_kasan_atomics+0x10/0x10
[   14.825196]  ? __pfx_read_tsc+0x10/0x10
[   14.825238]  ? ktime_get_ts64+0x84/0x230
[   14.825294]  kunit_try_run_case+0x1a6/0x480
[   14.825340]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.825382]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   14.825426]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.825476]  ? __kthread_parkme+0x82/0x160
[   14.825511]  ? preempt_count_sub+0x50/0x80
[   14.825553]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.825588]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.825628]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.825687]  kthread+0x257/0x310
[   14.825737]  ? __pfx_kthread+0x10/0x10
[   14.825777]  ret_from_fork+0x41/0x80
[   14.825826]  ? __pfx_kthread+0x10/0x10
[   14.825877]  ret_from_fork_asm+0x1a/0x30
[   14.825960]  </TASK>
[   14.825989] 
[   14.836039] Allocated by task 270:
[   14.836364]  kasan_save_stack+0x45/0x70
[   14.836719]  kasan_save_track+0x18/0x40
[   14.837042]  kasan_save_alloc_info+0x3b/0x50
[   14.837436]  __kasan_kmalloc+0xb7/0xc0
[   14.837788]  __kmalloc_cache_noprof+0x168/0x350
[   14.838256]  kasan_atomics+0x96/0x310
[   14.838554]  kunit_try_run_case+0x1a6/0x480
[   14.838898]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.839333]  kthread+0x257/0x310
[   14.839525]  ret_from_fork+0x41/0x80
[   14.839743]  ret_from_fork_asm+0x1a/0x30
[   14.840109] 
[   14.840265] The buggy address belongs to the object at ffff888102635000
[   14.840265]  which belongs to the cache kmalloc-64 of size 64
[   14.841213] The buggy address is located 0 bytes to the right of
[   14.841213]  allocated 48-byte region [ffff888102635000, ffff888102635030)
[   14.841921] 
[   14.842033] The buggy address belongs to the physical page:
[   14.842492] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102635
[   14.843024] flags: 0x200000000000000(node=0|zone=2)
[   14.843289] page_type: f5(slab)
[   14.843583] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.844021] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   14.844389] page dumped because: kasan: bad access detected
[   14.844717] 
[   14.844881] Memory state around the buggy address:
[   14.845200]  ffff888102634f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.845580]  ffff888102634f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.846006] >ffff888102635000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.846471]                                      ^
[   14.846856]  ffff888102635080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.847261]  ffff888102635100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.847611] ==================================================================
[   15.382726] ==================================================================
[   15.384313] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x15b7/0x5450
[   15.384866] Write of size 8 at addr ffff888102635030 by task kunit_try_catch/270
[   15.385405] 
[   15.385590] CPU: 0 UID: 0 PID: 270 Comm: kunit_try_catch Tainted: G    B            N 6.12.32-rc1 #1
[   15.385686] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.385715] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.385759] Call Trace:
[   15.385796]  <TASK>
[   15.385831]  dump_stack_lvl+0x73/0xb0
[   15.385888]  print_report+0xd1/0x640
[   15.385947]  ? __virt_addr_valid+0x1db/0x2d0
[   15.386002]  ? kasan_atomics_helper+0x15b7/0x5450
[   15.386086]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.386139]  ? kasan_atomics_helper+0x15b7/0x5450
[   15.386193]  kasan_report+0x140/0x180
[   15.386247]  ? kasan_atomics_helper+0x15b7/0x5450
[   15.386303]  kasan_check_range+0x10c/0x1c0
[   15.386343]  __kasan_check_write+0x18/0x20
[   15.386382]  kasan_atomics_helper+0x15b7/0x5450
[   15.386453]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.386500]  ? __kmalloc_cache_noprof+0x168/0x350
[   15.386554]  kasan_atomics+0x1dd/0x310
[   15.386609]  ? __pfx_kasan_atomics+0x10/0x10
[   15.386672]  ? __pfx_read_tsc+0x10/0x10
[   15.386709]  ? ktime_get_ts64+0x84/0x230
[   15.386765]  kunit_try_run_case+0x1a6/0x480
[   15.386824]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.386877]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   15.386924]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.386978]  ? __kthread_parkme+0x82/0x160
[   15.387016]  ? preempt_count_sub+0x50/0x80
[   15.387085]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.387130]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.387185]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.387240]  kthread+0x257/0x310
[   15.387284]  ? __pfx_kthread+0x10/0x10
[   15.387328]  ret_from_fork+0x41/0x80
[   15.387372]  ? __pfx_kthread+0x10/0x10
[   15.387413]  ret_from_fork_asm+0x1a/0x30
[   15.387478]  </TASK>
[   15.387506] 
[   15.396234] Allocated by task 270:
[   15.396543]  kasan_save_stack+0x45/0x70
[   15.396880]  kasan_save_track+0x18/0x40
[   15.397156]  kasan_save_alloc_info+0x3b/0x50
[   15.397370]  __kasan_kmalloc+0xb7/0xc0
[   15.397562]  __kmalloc_cache_noprof+0x168/0x350
[   15.397792]  kasan_atomics+0x96/0x310
[   15.397997]  kunit_try_run_case+0x1a6/0x480
[   15.398358]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.398777]  kthread+0x257/0x310
[   15.399099]  ret_from_fork+0x41/0x80
[   15.399410]  ret_from_fork_asm+0x1a/0x30
[   15.399734] 
[   15.399901] The buggy address belongs to the object at ffff888102635000
[   15.399901]  which belongs to the cache kmalloc-64 of size 64
[   15.400722] The buggy address is located 0 bytes to the right of
[   15.400722]  allocated 48-byte region [ffff888102635000, ffff888102635030)
[   15.401545] 
[   15.401736] The buggy address belongs to the physical page:
[   15.402120] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102635
[   15.402541] flags: 0x200000000000000(node=0|zone=2)
[   15.402867] page_type: f5(slab)
[   15.403165] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.403539] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   15.403954] page dumped because: kasan: bad access detected
[   15.404364] 
[   15.404526] Memory state around the buggy address:
[   15.404830]  ffff888102634f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.405153]  ffff888102634f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.405429] >ffff888102635000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.405936]                                      ^
[   15.406344]  ffff888102635080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.406822]  ffff888102635100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.407339] ==================================================================
[   14.516451] ==================================================================
[   14.516906] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b56/0x5450
[   14.517198] Read of size 4 at addr ffff888102635030 by task kunit_try_catch/270
[   14.517700] 
[   14.517888] CPU: 0 UID: 0 PID: 270 Comm: kunit_try_catch Tainted: G    B            N 6.12.32-rc1 #1
[   14.517984] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.518011] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.518087] Call Trace:
[   14.518149]  <TASK>
[   14.518176]  dump_stack_lvl+0x73/0xb0
[   14.518230]  print_report+0xd1/0x640
[   14.518272]  ? __virt_addr_valid+0x1db/0x2d0
[   14.518307]  ? kasan_atomics_helper+0x4b56/0x5450
[   14.518342]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.518381]  ? kasan_atomics_helper+0x4b56/0x5450
[   14.518426]  kasan_report+0x140/0x180
[   14.518474]  ? kasan_atomics_helper+0x4b56/0x5450
[   14.518526]  __asan_report_load4_noabort+0x18/0x20
[   14.518568]  kasan_atomics_helper+0x4b56/0x5450
[   14.518613]  ? kasan_save_alloc_info+0x3b/0x50
[   14.518646]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.518718]  ? __kmalloc_cache_noprof+0x168/0x350
[   14.518770]  kasan_atomics+0x1dd/0x310
[   14.518802]  ? __pfx_kasan_atomics+0x10/0x10
[   14.518834]  ? __pfx_read_tsc+0x10/0x10
[   14.518864]  ? ktime_get_ts64+0x84/0x230
[   14.518903]  kunit_try_run_case+0x1a6/0x480
[   14.518939]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.518973]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   14.519013]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.519054]  ? __kthread_parkme+0x82/0x160
[   14.519084]  ? preempt_count_sub+0x50/0x80
[   14.519177]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.519218]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.519266]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.519315]  kthread+0x257/0x310
[   14.519352]  ? __pfx_kthread+0x10/0x10
[   14.519392]  ret_from_fork+0x41/0x80
[   14.519432]  ? __pfx_kthread+0x10/0x10
[   14.519472]  ret_from_fork_asm+0x1a/0x30
[   14.519529]  </TASK>
[   14.519562] 
[   14.529224] Allocated by task 270:
[   14.529401]  kasan_save_stack+0x45/0x70
[   14.532189]  kasan_save_track+0x18/0x40
[   14.532546]  kasan_save_alloc_info+0x3b/0x50
[   14.533588]  __kasan_kmalloc+0xb7/0xc0
[   14.533910]  __kmalloc_cache_noprof+0x168/0x350
[   14.534114]  kasan_atomics+0x96/0x310
[   14.534269]  kunit_try_run_case+0x1a6/0x480
[   14.534427]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.534602]  kthread+0x257/0x310
[   14.536136]  ret_from_fork+0x41/0x80
[   14.536541]  ret_from_fork_asm+0x1a/0x30
[   14.537353] 
[   14.538487] The buggy address belongs to the object at ffff888102635000
[   14.538487]  which belongs to the cache kmalloc-64 of size 64
[   14.540339] The buggy address is located 0 bytes to the right of
[   14.540339]  allocated 48-byte region [ffff888102635000, ffff888102635030)
[   14.541409] 
[   14.541530] The buggy address belongs to the physical page:
[   14.541882] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102635
[   14.542300] flags: 0x200000000000000(node=0|zone=2)
[   14.542613] page_type: f5(slab)
[   14.542908] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.544005] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   14.544850] page dumped because: kasan: bad access detected
[   14.545533] 
[   14.545699] Memory state around the buggy address:
[   14.545877]  ffff888102634f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.546277]  ffff888102634f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.546600] >ffff888102635000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.546983]                                      ^
[   14.547331]  ffff888102635080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.547561]  ffff888102635100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.548443] ==================================================================
[   14.799526] ==================================================================
[   14.800439] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa2c/0x5450
[   14.800785] Write of size 4 at addr ffff888102635030 by task kunit_try_catch/270
[   14.801177] 
[   14.801309] CPU: 0 UID: 0 PID: 270 Comm: kunit_try_catch Tainted: G    B            N 6.12.32-rc1 #1
[   14.801389] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.801416] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.801459] Call Trace:
[   14.801490]  <TASK>
[   14.801523]  dump_stack_lvl+0x73/0xb0
[   14.801579]  print_report+0xd1/0x640
[   14.801628]  ? __virt_addr_valid+0x1db/0x2d0
[   14.801690]  ? kasan_atomics_helper+0xa2c/0x5450
[   14.801734]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.801775]  ? kasan_atomics_helper+0xa2c/0x5450
[   14.801816]  kasan_report+0x140/0x180
[   14.801858]  ? kasan_atomics_helper+0xa2c/0x5450
[   14.801917]  kasan_check_range+0x10c/0x1c0
[   14.801959]  __kasan_check_write+0x18/0x20
[   14.801996]  kasan_atomics_helper+0xa2c/0x5450
[   14.802037]  ? kasan_save_alloc_info+0x3b/0x50
[   14.802107]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.802154]  ? __kmalloc_cache_noprof+0x168/0x350
[   14.802203]  kasan_atomics+0x1dd/0x310
[   14.802240]  ? __pfx_kasan_atomics+0x10/0x10
[   14.802282]  ? __pfx_read_tsc+0x10/0x10
[   14.802317]  ? ktime_get_ts64+0x84/0x230
[   14.802364]  kunit_try_run_case+0x1a6/0x480
[   14.802405]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.802442]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   14.802482]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.802526]  ? __kthread_parkme+0x82/0x160
[   14.802562]  ? preempt_count_sub+0x50/0x80
[   14.802598]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.802693]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.802757]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.802810]  kthread+0x257/0x310
[   14.802851]  ? __pfx_kthread+0x10/0x10
[   14.802894]  ret_from_fork+0x41/0x80
[   14.802934]  ? __pfx_kthread+0x10/0x10
[   14.802976]  ret_from_fork_asm+0x1a/0x30
[   14.803040]  </TASK>
[   14.803097] 
[   14.811397] Allocated by task 270:
[   14.811576]  kasan_save_stack+0x45/0x70
[   14.811793]  kasan_save_track+0x18/0x40
[   14.811964]  kasan_save_alloc_info+0x3b/0x50
[   14.812176]  __kasan_kmalloc+0xb7/0xc0
[   14.812340]  __kmalloc_cache_noprof+0x168/0x350
[   14.812700]  kasan_atomics+0x96/0x310
[   14.813006]  kunit_try_run_case+0x1a6/0x480
[   14.813370]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.813764]  kthread+0x257/0x310
[   14.814083]  ret_from_fork+0x41/0x80
[   14.814380]  ret_from_fork_asm+0x1a/0x30
[   14.814710] 
[   14.814869] The buggy address belongs to the object at ffff888102635000
[   14.814869]  which belongs to the cache kmalloc-64 of size 64
[   14.815689] The buggy address is located 0 bytes to the right of
[   14.815689]  allocated 48-byte region [ffff888102635000, ffff888102635030)
[   14.816551] 
[   14.816725] The buggy address belongs to the physical page:
[   14.816986] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102635
[   14.817273] flags: 0x200000000000000(node=0|zone=2)
[   14.817460] page_type: f5(slab)
[   14.817615] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.818172] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   14.818713] page dumped because: kasan: bad access detected
[   14.819127] 
[   14.819288] Memory state around the buggy address:
[   14.819627]  ffff888102634f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.820045]  ffff888102634f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.820430] >ffff888102635000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.820734]                                      ^
[   14.821075]  ffff888102635080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.821316]  ffff888102635100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.821543] ==================================================================
[   14.602338] ==================================================================
[   14.602742] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x566/0x5450
[   14.603629] Write of size 4 at addr ffff888102635030 by task kunit_try_catch/270
[   14.604013] 
[   14.604205] CPU: 0 UID: 0 PID: 270 Comm: kunit_try_catch Tainted: G    B            N 6.12.32-rc1 #1
[   14.604283] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.604304] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.604344] Call Trace:
[   14.604379]  <TASK>
[   14.604411]  dump_stack_lvl+0x73/0xb0
[   14.604682]  print_report+0xd1/0x640
[   14.604732]  ? __virt_addr_valid+0x1db/0x2d0
[   14.604780]  ? kasan_atomics_helper+0x566/0x5450
[   14.604830]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.604866]  ? kasan_atomics_helper+0x566/0x5450
[   14.604906]  kasan_report+0x140/0x180
[   14.604947]  ? kasan_atomics_helper+0x566/0x5450
[   14.604991]  kasan_check_range+0x10c/0x1c0
[   14.605024]  __kasan_check_write+0x18/0x20
[   14.605060]  kasan_atomics_helper+0x566/0x5450
[   14.605251]  ? kasan_save_alloc_info+0x3b/0x50
[   14.605297]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.605335]  ? __kmalloc_cache_noprof+0x168/0x350
[   14.605378]  kasan_atomics+0x1dd/0x310
[   14.605414]  ? __pfx_kasan_atomics+0x10/0x10
[   14.605453]  ? __pfx_read_tsc+0x10/0x10
[   14.605490]  ? ktime_get_ts64+0x84/0x230
[   14.605538]  kunit_try_run_case+0x1a6/0x480
[   14.605579]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.605616]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   14.605656]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.605715]  ? __kthread_parkme+0x82/0x160
[   14.605752]  ? preempt_count_sub+0x50/0x80
[   14.605798]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.605836]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.605864]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.605891]  kthread+0x257/0x310
[   14.605922]  ? __pfx_kthread+0x10/0x10
[   14.605944]  ret_from_fork+0x41/0x80
[   14.605965]  ? __pfx_kthread+0x10/0x10
[   14.605984]  ret_from_fork_asm+0x1a/0x30
[   14.606016]  </TASK>
[   14.606030] 
[   14.616099] Allocated by task 270:
[   14.616291]  kasan_save_stack+0x45/0x70
[   14.616686]  kasan_save_track+0x18/0x40
[   14.616961]  kasan_save_alloc_info+0x3b/0x50
[   14.617374]  __kasan_kmalloc+0xb7/0xc0
[   14.617678]  __kmalloc_cache_noprof+0x168/0x350
[   14.617934]  kasan_atomics+0x96/0x310
[   14.618443]  kunit_try_run_case+0x1a6/0x480
[   14.618728]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.618953]  kthread+0x257/0x310
[   14.619203]  ret_from_fork+0x41/0x80
[   14.619897]  ret_from_fork_asm+0x1a/0x30
[   14.620088] 
[   14.620193] The buggy address belongs to the object at ffff888102635000
[   14.620193]  which belongs to the cache kmalloc-64 of size 64
[   14.620798] The buggy address is located 0 bytes to the right of
[   14.620798]  allocated 48-byte region [ffff888102635000, ffff888102635030)
[   14.621571] 
[   14.621747] The buggy address belongs to the physical page:
[   14.622002] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102635
[   14.622340] flags: 0x200000000000000(node=0|zone=2)
[   14.622657] page_type: f5(slab)
[   14.623471] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.624203] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   14.624540] page dumped because: kasan: bad access detected
[   14.624874] 
[   14.625026] Memory state around the buggy address:
[   14.625483]  ffff888102634f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.625973]  ffff888102634f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.626686] >ffff888102635000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.627008]                                      ^
[   14.627596]  ffff888102635080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.627945]  ffff888102635100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.628575] ==================================================================
[   15.162323] ==================================================================
[   15.162672] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1218/0x5450
[   15.163094] Write of size 4 at addr ffff888102635030 by task kunit_try_catch/270
[   15.163425] 
[   15.163605] CPU: 0 UID: 0 PID: 270 Comm: kunit_try_catch Tainted: G    B            N 6.12.32-rc1 #1
[   15.163696] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.163722] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.163760] Call Trace:
[   15.163791]  <TASK>
[   15.163819]  dump_stack_lvl+0x73/0xb0
[   15.163873]  print_report+0xd1/0x640
[   15.163917]  ? __virt_addr_valid+0x1db/0x2d0
[   15.163961]  ? kasan_atomics_helper+0x1218/0x5450
[   15.164001]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.164045]  ? kasan_atomics_helper+0x1218/0x5450
[   15.164126]  kasan_report+0x140/0x180
[   15.164171]  ? kasan_atomics_helper+0x1218/0x5450
[   15.164224]  kasan_check_range+0x10c/0x1c0
[   15.164266]  __kasan_check_write+0x18/0x20
[   15.164302]  kasan_atomics_helper+0x1218/0x5450
[   15.164348]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.164392]  ? __kmalloc_cache_noprof+0x168/0x350
[   15.164446]  kasan_atomics+0x1dd/0x310
[   15.164489]  ? __pfx_kasan_atomics+0x10/0x10
[   15.164530]  ? __pfx_read_tsc+0x10/0x10
[   15.164566]  ? ktime_get_ts64+0x84/0x230
[   15.164616]  kunit_try_run_case+0x1a6/0x480
[   15.164661]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.164715]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   15.164758]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.164801]  ? __kthread_parkme+0x82/0x160
[   15.164842]  ? preempt_count_sub+0x50/0x80
[   15.164885]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.164925]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.164973]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.165020]  kthread+0x257/0x310
[   15.165086]  ? __pfx_kthread+0x10/0x10
[   15.165129]  ret_from_fork+0x41/0x80
[   15.165168]  ? __pfx_kthread+0x10/0x10
[   15.165196]  ret_from_fork_asm+0x1a/0x30
[   15.165246]  </TASK>
[   15.165267] 
[   15.172569] Allocated by task 270:
[   15.172859]  kasan_save_stack+0x45/0x70
[   15.173214]  kasan_save_track+0x18/0x40
[   15.173508]  kasan_save_alloc_info+0x3b/0x50
[   15.173822]  __kasan_kmalloc+0xb7/0xc0
[   15.174154]  __kmalloc_cache_noprof+0x168/0x350
[   15.174480]  kasan_atomics+0x96/0x310
[   15.174723]  kunit_try_run_case+0x1a6/0x480
[   15.174949]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.175310]  kthread+0x257/0x310
[   15.175505]  ret_from_fork+0x41/0x80
[   15.175733]  ret_from_fork_asm+0x1a/0x30
[   15.175915] 
[   15.176022] The buggy address belongs to the object at ffff888102635000
[   15.176022]  which belongs to the cache kmalloc-64 of size 64
[   15.176748] The buggy address is located 0 bytes to the right of
[   15.176748]  allocated 48-byte region [ffff888102635000, ffff888102635030)
[   15.177609] 
[   15.177790] The buggy address belongs to the physical page:
[   15.178231] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102635
[   15.178568] flags: 0x200000000000000(node=0|zone=2)
[   15.179798] page_type: f5(slab)
[   15.180598] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.180924] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   15.181218] page dumped because: kasan: bad access detected
[   15.181417] 
[   15.181527] Memory state around the buggy address:
[   15.181888]  ffff888102634f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.182448]  ffff888102634f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.182942] >ffff888102635000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.183463]                                      ^
[   15.183789]  ffff888102635080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.184114]  ffff888102635100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.184511] ==================================================================
[   15.305643] ==================================================================
[   15.306276] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1468/0x5450
[   15.306820] Write of size 8 at addr ffff888102635030 by task kunit_try_catch/270
[   15.307328] 
[   15.307526] CPU: 0 UID: 0 PID: 270 Comm: kunit_try_catch Tainted: G    B            N 6.12.32-rc1 #1
[   15.307618] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.307654] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.307737] Call Trace:
[   15.307769]  <TASK>
[   15.307798]  dump_stack_lvl+0x73/0xb0
[   15.307858]  print_report+0xd1/0x640
[   15.307930]  ? __virt_addr_valid+0x1db/0x2d0
[   15.307974]  ? kasan_atomics_helper+0x1468/0x5450
[   15.308017]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.308084]  ? kasan_atomics_helper+0x1468/0x5450
[   15.308131]  kasan_report+0x140/0x180
[   15.308211]  ? kasan_atomics_helper+0x1468/0x5450
[   15.308285]  kasan_check_range+0x10c/0x1c0
[   15.308351]  __kasan_check_write+0x18/0x20
[   15.308396]  kasan_atomics_helper+0x1468/0x5450
[   15.308441]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.308489]  ? __kmalloc_cache_noprof+0x168/0x350
[   15.308545]  kasan_atomics+0x1dd/0x310
[   15.308588]  ? __pfx_kasan_atomics+0x10/0x10
[   15.308628]  ? __pfx_read_tsc+0x10/0x10
[   15.308661]  ? ktime_get_ts64+0x84/0x230
[   15.308721]  kunit_try_run_case+0x1a6/0x480
[   15.308767]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.308808]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   15.308853]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.308904]  ? __kthread_parkme+0x82/0x160
[   15.308948]  ? preempt_count_sub+0x50/0x80
[   15.308997]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.309040]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.309104]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.309159]  kthread+0x257/0x310
[   15.309201]  ? __pfx_kthread+0x10/0x10
[   15.309244]  ret_from_fork+0x41/0x80
[   15.309286]  ? __pfx_kthread+0x10/0x10
[   15.309327]  ret_from_fork_asm+0x1a/0x30
[   15.309386]  </TASK>
[   15.309410] 
[   15.318229] Allocated by task 270:
[   15.318549]  kasan_save_stack+0x45/0x70
[   15.318903]  kasan_save_track+0x18/0x40
[   15.319247]  kasan_save_alloc_info+0x3b/0x50
[   15.319562]  __kasan_kmalloc+0xb7/0xc0
[   15.319882]  __kmalloc_cache_noprof+0x168/0x350
[   15.320232]  kasan_atomics+0x96/0x310
[   15.320506]  kunit_try_run_case+0x1a6/0x480
[   15.320810]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.321169]  kthread+0x257/0x310
[   15.321458]  ret_from_fork+0x41/0x80
[   15.321683]  ret_from_fork_asm+0x1a/0x30
[   15.321986] 
[   15.322213] The buggy address belongs to the object at ffff888102635000
[   15.322213]  which belongs to the cache kmalloc-64 of size 64
[   15.322947] The buggy address is located 0 bytes to the right of
[   15.322947]  allocated 48-byte region [ffff888102635000, ffff888102635030)
[   15.323303] 
[   15.323391] The buggy address belongs to the physical page:
[   15.323552] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102635
[   15.326379] flags: 0x200000000000000(node=0|zone=2)
[   15.327100] page_type: f5(slab)
[   15.327370] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.328660] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   15.330003] page dumped because: kasan: bad access detected
[   15.330774] 
[   15.330960] Memory state around the buggy address:
[   15.332234]  ffff888102634f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.332998]  ffff888102634f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.333977] >ffff888102635000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.334415]                                      ^
[   15.334728]  ffff888102635080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.335010]  ffff888102635100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.335354] ==================================================================
[   15.846605] ==================================================================
[   15.847352] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4f9a/0x5450
[   15.847930] Read of size 8 at addr ffff888102635030 by task kunit_try_catch/270
[   15.848471] 
[   15.848627] CPU: 0 UID: 0 PID: 270 Comm: kunit_try_catch Tainted: G    B            N 6.12.32-rc1 #1
[   15.848714] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.848734] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.848765] Call Trace:
[   15.848799]  <TASK>
[   15.848827]  dump_stack_lvl+0x73/0xb0
[   15.848876]  print_report+0xd1/0x640
[   15.848913]  ? __virt_addr_valid+0x1db/0x2d0
[   15.848952]  ? kasan_atomics_helper+0x4f9a/0x5450
[   15.848986]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.849023]  ? kasan_atomics_helper+0x4f9a/0x5450
[   15.849069]  kasan_report+0x140/0x180
[   15.849106]  ? kasan_atomics_helper+0x4f9a/0x5450
[   15.849147]  __asan_report_load8_noabort+0x18/0x20
[   15.849177]  kasan_atomics_helper+0x4f9a/0x5450
[   15.849210]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.849247]  ? __kmalloc_cache_noprof+0x168/0x350
[   15.849285]  kasan_atomics+0x1dd/0x310
[   15.849318]  ? __pfx_kasan_atomics+0x10/0x10
[   15.849359]  ? __pfx_read_tsc+0x10/0x10
[   15.849393]  ? ktime_get_ts64+0x84/0x230
[   15.849432]  kunit_try_run_case+0x1a6/0x480
[   15.849467]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.849497]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   15.849534]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.849582]  ? __kthread_parkme+0x82/0x160
[   15.849621]  ? preempt_count_sub+0x50/0x80
[   15.849663]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.849719]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.849768]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.849817]  kthread+0x257/0x310
[   15.849855]  ? __pfx_kthread+0x10/0x10
[   15.849898]  ret_from_fork+0x41/0x80
[   15.849954]  ? __pfx_kthread+0x10/0x10
[   15.849999]  ret_from_fork_asm+0x1a/0x30
[   15.850068]  </TASK>
[   15.850093] 
[   15.864564] Allocated by task 270:
[   15.864800]  kasan_save_stack+0x45/0x70
[   15.865381]  kasan_save_track+0x18/0x40
[   15.866088]  kasan_save_alloc_info+0x3b/0x50
[   15.866498]  __kasan_kmalloc+0xb7/0xc0
[   15.866690]  __kmalloc_cache_noprof+0x168/0x350
[   15.867018]  kasan_atomics+0x96/0x310
[   15.867372]  kunit_try_run_case+0x1a6/0x480
[   15.867611]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.867853]  kthread+0x257/0x310
[   15.868166]  ret_from_fork+0x41/0x80
[   15.868374]  ret_from_fork_asm+0x1a/0x30
[   15.868691] 
[   15.868808] The buggy address belongs to the object at ffff888102635000
[   15.868808]  which belongs to the cache kmalloc-64 of size 64
[   15.869408] The buggy address is located 0 bytes to the right of
[   15.869408]  allocated 48-byte region [ffff888102635000, ffff888102635030)
[   15.869920] 
[   15.870146] The buggy address belongs to the physical page:
[   15.870576] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102635
[   15.870944] flags: 0x200000000000000(node=0|zone=2)
[   15.871383] page_type: f5(slab)
[   15.871595] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.872116] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   15.872533] page dumped because: kasan: bad access detected
[   15.872861] 
[   15.873047] Memory state around the buggy address:
[   15.873266]  ffff888102634f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.873796]  ffff888102634f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.874184] >ffff888102635000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.874695]                                      ^
[   15.875000]  ffff888102635080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.875446]  ffff888102635100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.875833] ==================================================================
[   15.876780] ==================================================================
[   15.877349] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x20c9/0x5450
[   15.877865] Write of size 8 at addr ffff888102635030 by task kunit_try_catch/270
[   15.878306] 
[   15.878532] CPU: 0 UID: 0 PID: 270 Comm: kunit_try_catch Tainted: G    B            N 6.12.32-rc1 #1
[   15.878631] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.878662] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.878722] Call Trace:
[   15.878765]  <TASK>
[   15.878806]  dump_stack_lvl+0x73/0xb0
[   15.878869]  print_report+0xd1/0x640
[   15.878916]  ? __virt_addr_valid+0x1db/0x2d0
[   15.878988]  ? kasan_atomics_helper+0x20c9/0x5450
[   15.879033]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.879116]  ? kasan_atomics_helper+0x20c9/0x5450
[   15.879170]  kasan_report+0x140/0x180
[   15.879222]  ? kasan_atomics_helper+0x20c9/0x5450
[   15.879279]  kasan_check_range+0x10c/0x1c0
[   15.879328]  __kasan_check_write+0x18/0x20
[   15.879372]  kasan_atomics_helper+0x20c9/0x5450
[   15.879426]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.879479]  ? __kmalloc_cache_noprof+0x168/0x350
[   15.879539]  kasan_atomics+0x1dd/0x310
[   15.879579]  ? __pfx_kasan_atomics+0x10/0x10
[   15.879619]  ? __pfx_read_tsc+0x10/0x10
[   15.879656]  ? ktime_get_ts64+0x84/0x230
[   15.879743]  kunit_try_run_case+0x1a6/0x480
[   15.879793]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.879835]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   15.879877]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.879926]  ? __kthread_parkme+0x82/0x160
[   15.879967]  ? preempt_count_sub+0x50/0x80
[   15.880008]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.880097]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.880150]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.880185]  kthread+0x257/0x310
[   15.880208]  ? __pfx_kthread+0x10/0x10
[   15.880241]  ret_from_fork+0x41/0x80
[   15.880262]  ? __pfx_kthread+0x10/0x10
[   15.880281]  ret_from_fork_asm+0x1a/0x30
[   15.880312]  </TASK>
[   15.880327] 
[   15.888189] Allocated by task 270:
[   15.888415]  kasan_save_stack+0x45/0x70
[   15.888678]  kasan_save_track+0x18/0x40
[   15.888967]  kasan_save_alloc_info+0x3b/0x50
[   15.889288]  __kasan_kmalloc+0xb7/0xc0
[   15.889577]  __kmalloc_cache_noprof+0x168/0x350
[   15.889904]  kasan_atomics+0x96/0x310
[   15.890192]  kunit_try_run_case+0x1a6/0x480
[   15.890546]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.890995]  kthread+0x257/0x310
[   15.891313]  ret_from_fork+0x41/0x80
[   15.891616]  ret_from_fork_asm+0x1a/0x30
[   15.891946] 
[   15.892143] The buggy address belongs to the object at ffff888102635000
[   15.892143]  which belongs to the cache kmalloc-64 of size 64
[   15.892791] The buggy address is located 0 bytes to the right of
[   15.892791]  allocated 48-byte region [ffff888102635000, ffff888102635030)
[   15.893354] 
[   15.893523] The buggy address belongs to the physical page:
[   15.893942] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102635
[   15.894591] flags: 0x200000000000000(node=0|zone=2)
[   15.895050] page_type: f5(slab)
[   15.895374] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.895950] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   15.896537] page dumped because: kasan: bad access detected
[   15.896964] 
[   15.897179] Memory state around the buggy address:
[   15.897559]  ffff888102634f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.897887]  ffff888102634f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.898037] >ffff888102635000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.898544]                                      ^
[   15.898969]  ffff888102635080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.899626]  ffff888102635100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.899987] ==================================================================
[   15.257549] ==================================================================
[   15.258586] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x13b6/0x5450
[   15.259677] Read of size 8 at addr ffff888102635030 by task kunit_try_catch/270
[   15.260023] 
[   15.260589] CPU: 0 UID: 0 PID: 270 Comm: kunit_try_catch Tainted: G    B            N 6.12.32-rc1 #1
[   15.260684] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.260704] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.260737] Call Trace:
[   15.260764]  <TASK>
[   15.260785]  dump_stack_lvl+0x73/0xb0
[   15.260834]  print_report+0xd1/0x640
[   15.260872]  ? __virt_addr_valid+0x1db/0x2d0
[   15.260908]  ? kasan_atomics_helper+0x13b6/0x5450
[   15.260944]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.260976]  ? kasan_atomics_helper+0x13b6/0x5450
[   15.261008]  kasan_report+0x140/0x180
[   15.261041]  ? kasan_atomics_helper+0x13b6/0x5450
[   15.261376]  kasan_check_range+0x10c/0x1c0
[   15.261426]  __kasan_check_read+0x15/0x20
[   15.261529]  kasan_atomics_helper+0x13b6/0x5450
[   15.261584]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.261639]  ? __kmalloc_cache_noprof+0x168/0x350
[   15.261691]  kasan_atomics+0x1dd/0x310
[   15.261734]  ? __pfx_kasan_atomics+0x10/0x10
[   15.261771]  ? __pfx_read_tsc+0x10/0x10
[   15.261804]  ? ktime_get_ts64+0x84/0x230
[   15.261834]  kunit_try_run_case+0x1a6/0x480
[   15.261857]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.261878]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   15.261907]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.261944]  ? __kthread_parkme+0x82/0x160
[   15.261965]  ? preempt_count_sub+0x50/0x80
[   15.261989]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.262012]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.262038]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.262082]  kthread+0x257/0x310
[   15.262133]  ? __pfx_kthread+0x10/0x10
[   15.262154]  ret_from_fork+0x41/0x80
[   15.262175]  ? __pfx_kthread+0x10/0x10
[   15.262194]  ret_from_fork_asm+0x1a/0x30
[   15.262225]  </TASK>
[   15.262238] 
[   15.270891] Allocated by task 270:
[   15.271139]  kasan_save_stack+0x45/0x70
[   15.271361]  kasan_save_track+0x18/0x40
[   15.271680]  kasan_save_alloc_info+0x3b/0x50
[   15.272011]  __kasan_kmalloc+0xb7/0xc0
[   15.272343]  __kmalloc_cache_noprof+0x168/0x350
[   15.272687]  kasan_atomics+0x96/0x310
[   15.272979]  kunit_try_run_case+0x1a6/0x480
[   15.273305]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.273604]  kthread+0x257/0x310
[   15.273777]  ret_from_fork+0x41/0x80
[   15.274138]  ret_from_fork_asm+0x1a/0x30
[   15.274457] 
[   15.274626] The buggy address belongs to the object at ffff888102635000
[   15.274626]  which belongs to the cache kmalloc-64 of size 64
[   15.275274] The buggy address is located 0 bytes to the right of
[   15.275274]  allocated 48-byte region [ffff888102635000, ffff888102635030)
[   15.275887] 
[   15.276100] The buggy address belongs to the physical page:
[   15.276382] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102635
[   15.276947] flags: 0x200000000000000(node=0|zone=2)
[   15.277228] page_type: f5(slab)
[   15.277502] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.277873] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   15.278428] page dumped because: kasan: bad access detected
[   15.278814] 
[   15.278923] Memory state around the buggy address:
[   15.279231]  ffff888102634f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.279605]  ffff888102634f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.280027] >ffff888102635000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.280370]                                      ^
[   15.280757]  ffff888102635080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.281130]  ffff888102635100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.281496] ==================================================================
[   15.062475] ==================================================================
[   15.062745] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x107a/0x5450
[   15.062981] Write of size 4 at addr ffff888102635030 by task kunit_try_catch/270
[   15.063206] 
[   15.063317] CPU: 0 UID: 0 PID: 270 Comm: kunit_try_catch Tainted: G    B            N 6.12.32-rc1 #1
[   15.063391] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.063415] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.063453] Call Trace:
[   15.063486]  <TASK>
[   15.063514]  dump_stack_lvl+0x73/0xb0
[   15.063557]  print_report+0xd1/0x640
[   15.063596]  ? __virt_addr_valid+0x1db/0x2d0
[   15.063638]  ? kasan_atomics_helper+0x107a/0x5450
[   15.064608]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.064763]  ? kasan_atomics_helper+0x107a/0x5450
[   15.064805]  kasan_report+0x140/0x180
[   15.064848]  ? kasan_atomics_helper+0x107a/0x5450
[   15.064899]  kasan_check_range+0x10c/0x1c0
[   15.064936]  __kasan_check_write+0x18/0x20
[   15.064970]  kasan_atomics_helper+0x107a/0x5450
[   15.065010]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.065054]  ? __kmalloc_cache_noprof+0x168/0x350
[   15.065870]  kasan_atomics+0x1dd/0x310
[   15.065955]  ? __pfx_kasan_atomics+0x10/0x10
[   15.066007]  ? __pfx_read_tsc+0x10/0x10
[   15.066052]  ? ktime_get_ts64+0x84/0x230
[   15.066569]  kunit_try_run_case+0x1a6/0x480
[   15.066624]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.066683]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   15.066731]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.066779]  ? __kthread_parkme+0x82/0x160
[   15.066819]  ? preempt_count_sub+0x50/0x80
[   15.066862]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.066898]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.066942]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.066986]  kthread+0x257/0x310
[   15.067019]  ? __pfx_kthread+0x10/0x10
[   15.067091]  ret_from_fork+0x41/0x80
[   15.067131]  ? __pfx_kthread+0x10/0x10
[   15.067165]  ret_from_fork_asm+0x1a/0x30
[   15.067224]  </TASK>
[   15.067246] 
[   15.078086] Allocated by task 270:
[   15.078531]  kasan_save_stack+0x45/0x70
[   15.078932]  kasan_save_track+0x18/0x40
[   15.079256]  kasan_save_alloc_info+0x3b/0x50
[   15.079859]  __kasan_kmalloc+0xb7/0xc0
[   15.080272]  __kmalloc_cache_noprof+0x168/0x350
[   15.080488]  kasan_atomics+0x96/0x310
[   15.080720]  kunit_try_run_case+0x1a6/0x480
[   15.081031]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.081254]  kthread+0x257/0x310
[   15.081517]  ret_from_fork+0x41/0x80
[   15.081801]  ret_from_fork_asm+0x1a/0x30
[   15.082012] 
[   15.082267] The buggy address belongs to the object at ffff888102635000
[   15.082267]  which belongs to the cache kmalloc-64 of size 64
[   15.082981] The buggy address is located 0 bytes to the right of
[   15.082981]  allocated 48-byte region [ffff888102635000, ffff888102635030)
[   15.083900] 
[   15.084073] The buggy address belongs to the physical page:
[   15.084569] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102635
[   15.084923] flags: 0x200000000000000(node=0|zone=2)
[   15.085419] page_type: f5(slab)
[   15.085712] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.085958] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   15.086500] page dumped because: kasan: bad access detected
[   15.086756] 
[   15.086870] Memory state around the buggy address:
[   15.087310]  ffff888102634f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.087849]  ffff888102634f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.088327] >ffff888102635000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.088742]                                      ^
[   15.089090]  ffff888102635080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.089506]  ffff888102635100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.089980] ==================================================================
[   14.549535] ==================================================================
[   14.549935] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a1/0x5450
[   14.550476] Write of size 4 at addr ffff888102635030 by task kunit_try_catch/270
[   14.550781] 
[   14.550914] CPU: 0 UID: 0 PID: 270 Comm: kunit_try_catch Tainted: G    B            N 6.12.32-rc1 #1
[   14.550996] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.551019] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.551061] Call Trace:
[   14.551102]  <TASK>
[   14.551139]  dump_stack_lvl+0x73/0xb0
[   14.551195]  print_report+0xd1/0x640
[   14.551242]  ? __virt_addr_valid+0x1db/0x2d0
[   14.551279]  ? kasan_atomics_helper+0x4a1/0x5450
[   14.551312]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.551347]  ? kasan_atomics_helper+0x4a1/0x5450
[   14.551382]  kasan_report+0x140/0x180
[   14.551423]  ? kasan_atomics_helper+0x4a1/0x5450
[   14.551472]  kasan_check_range+0x10c/0x1c0
[   14.551508]  __kasan_check_write+0x18/0x20
[   14.551544]  kasan_atomics_helper+0x4a1/0x5450
[   14.551581]  ? kasan_save_alloc_info+0x3b/0x50
[   14.551620]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.551709]  ? __kmalloc_cache_noprof+0x168/0x350
[   14.551771]  kasan_atomics+0x1dd/0x310
[   14.551817]  ? __pfx_kasan_atomics+0x10/0x10
[   14.551854]  ? __pfx_read_tsc+0x10/0x10
[   14.551887]  ? ktime_get_ts64+0x84/0x230
[   14.551940]  kunit_try_run_case+0x1a6/0x480
[   14.551976]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.552004]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   14.552035]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.552111]  ? __kthread_parkme+0x82/0x160
[   14.552144]  ? preempt_count_sub+0x50/0x80
[   14.552177]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.552209]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.552245]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.552286]  kthread+0x257/0x310
[   14.552313]  ? __pfx_kthread+0x10/0x10
[   14.552343]  ret_from_fork+0x41/0x80
[   14.552371]  ? __pfx_kthread+0x10/0x10
[   14.552400]  ret_from_fork_asm+0x1a/0x30
[   14.552448]  </TASK>
[   14.552469] 
[   14.560289] Allocated by task 270:
[   14.560631]  kasan_save_stack+0x45/0x70
[   14.560963]  kasan_save_track+0x18/0x40
[   14.561320]  kasan_save_alloc_info+0x3b/0x50
[   14.561506]  __kasan_kmalloc+0xb7/0xc0
[   14.561684]  __kmalloc_cache_noprof+0x168/0x350
[   14.561870]  kasan_atomics+0x96/0x310
[   14.562045]  kunit_try_run_case+0x1a6/0x480
[   14.562433]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.562822]  kthread+0x257/0x310
[   14.563149]  ret_from_fork+0x41/0x80
[   14.563434]  ret_from_fork_asm+0x1a/0x30
[   14.563701] 
[   14.563852] The buggy address belongs to the object at ffff888102635000
[   14.563852]  which belongs to the cache kmalloc-64 of size 64
[   14.564515] The buggy address is located 0 bytes to the right of
[   14.564515]  allocated 48-byte region [ffff888102635000, ffff888102635030)
[   14.565242] 
[   14.565385] The buggy address belongs to the physical page:
[   14.565565] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102635
[   14.565838] flags: 0x200000000000000(node=0|zone=2)
[   14.566137] page_type: f5(slab)
[   14.566367] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.566882] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   14.567464] page dumped because: kasan: bad access detected
[   14.567833] 
[   14.567934] Memory state around the buggy address:
[   14.568102]  ffff888102634f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.568545]  ffff888102634f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.568815] >ffff888102635000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.569143]                                      ^
[   14.569451]  ffff888102635080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.569925]  ffff888102635100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.570189] ==================================================================
[   14.405844] ==================================================================
[   14.406286] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4bbe/0x5450
[   14.406477] Read of size 4 at addr ffff888102635030 by task kunit_try_catch/270
[   14.406846] 
[   14.406983] CPU: 0 UID: 0 PID: 270 Comm: kunit_try_catch Tainted: G    B            N 6.12.32-rc1 #1
[   14.407043] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.407056] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.407088] Call Trace:
[   14.407102]  <TASK>
[   14.407129]  dump_stack_lvl+0x73/0xb0
[   14.407158]  print_report+0xd1/0x640
[   14.407180]  ? __virt_addr_valid+0x1db/0x2d0
[   14.407203]  ? kasan_atomics_helper+0x4bbe/0x5450
[   14.407226]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.407248]  ? kasan_atomics_helper+0x4bbe/0x5450
[   14.407272]  kasan_report+0x140/0x180
[   14.407572]  ? kasan_atomics_helper+0x4bbe/0x5450
[   14.407602]  __asan_report_load4_noabort+0x18/0x20
[   14.407625]  kasan_atomics_helper+0x4bbe/0x5450
[   14.407647]  ? kasan_save_alloc_info+0x3b/0x50
[   14.407680]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.407708]  ? __kmalloc_cache_noprof+0x168/0x350
[   14.407735]  kasan_atomics+0x1dd/0x310
[   14.407755]  ? __pfx_kasan_atomics+0x10/0x10
[   14.407776]  ? __pfx_read_tsc+0x10/0x10
[   14.407795]  ? ktime_get_ts64+0x84/0x230
[   14.407821]  kunit_try_run_case+0x1a6/0x480
[   14.407843]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.407862]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   14.407883]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.407907]  ? __kthread_parkme+0x82/0x160
[   14.407927]  ? preempt_count_sub+0x50/0x80
[   14.407950]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.407970]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.407995]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.408021]  kthread+0x257/0x310
[   14.408040]  ? __pfx_kthread+0x10/0x10
[   14.408059]  ret_from_fork+0x41/0x80
[   14.408078]  ? __pfx_kthread+0x10/0x10
[   14.408251]  ret_from_fork_asm+0x1a/0x30
[   14.408284]  </TASK>
[   14.408297] 
[   14.411879] Allocated by task 270:
[   14.411971]  kasan_save_stack+0x45/0x70
[   14.412085]  kasan_save_track+0x18/0x40
[   14.412358]  kasan_save_alloc_info+0x3b/0x50
[   14.413732]  __kasan_kmalloc+0xb7/0xc0
[   14.413840]  __kmalloc_cache_noprof+0x168/0x350
[   14.413953]  kasan_atomics+0x96/0x310
[   14.414047]  kunit_try_run_case+0x1a6/0x480
[   14.414452]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.414803]  kthread+0x257/0x310
[   14.414962]  ret_from_fork+0x41/0x80
[   14.415052]  ret_from_fork_asm+0x1a/0x30
[   14.415433] 
[   14.415547] The buggy address belongs to the object at ffff888102635000
[   14.415547]  which belongs to the cache kmalloc-64 of size 64
[   14.415755] The buggy address is located 0 bytes to the right of
[   14.415755]  allocated 48-byte region [ffff888102635000, ffff888102635030)
[   14.415955] 
[   14.416009] The buggy address belongs to the physical page:
[   14.416986] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102635
[   14.417227] flags: 0x200000000000000(node=0|zone=2)
[   14.417332] page_type: f5(slab)
[   14.417414] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.417588] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   14.418013] page dumped because: kasan: bad access detected
[   14.418554] 
[   14.418748] Memory state around the buggy address:
[   14.418869]  ffff888102634f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.418996]  ffff888102634f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.419468] >ffff888102635000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.419960]                                      ^
[   14.420261]  ffff888102635080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.421013]  ffff888102635100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.421326] ==================================================================
[   15.706752] ==================================================================
[   15.707159] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1d7b/0x5450
[   15.707545] Write of size 8 at addr ffff888102635030 by task kunit_try_catch/270
[   15.707763] 
[   15.707883] CPU: 0 UID: 0 PID: 270 Comm: kunit_try_catch Tainted: G    B            N 6.12.32-rc1 #1
[   15.707959] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.707982] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.708019] Call Trace:
[   15.708056]  <TASK>
[   15.708122]  dump_stack_lvl+0x73/0xb0
[   15.708183]  print_report+0xd1/0x640
[   15.708230]  ? __virt_addr_valid+0x1db/0x2d0
[   15.708277]  ? kasan_atomics_helper+0x1d7b/0x5450
[   15.708325]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.708373]  ? kasan_atomics_helper+0x1d7b/0x5450
[   15.708416]  kasan_report+0x140/0x180
[   15.708460]  ? kasan_atomics_helper+0x1d7b/0x5450
[   15.708513]  kasan_check_range+0x10c/0x1c0
[   15.708550]  __kasan_check_write+0x18/0x20
[   15.708587]  kasan_atomics_helper+0x1d7b/0x5450
[   15.708634]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.708694]  ? __kmalloc_cache_noprof+0x168/0x350
[   15.708741]  kasan_atomics+0x1dd/0x310
[   15.708781]  ? __pfx_kasan_atomics+0x10/0x10
[   15.708821]  ? __pfx_read_tsc+0x10/0x10
[   15.708860]  ? ktime_get_ts64+0x84/0x230
[   15.708913]  kunit_try_run_case+0x1a6/0x480
[   15.708961]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.709002]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   15.709046]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.709131]  ? __kthread_parkme+0x82/0x160
[   15.709175]  ? preempt_count_sub+0x50/0x80
[   15.709224]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.709259]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.709299]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.709345]  kthread+0x257/0x310
[   15.709381]  ? __pfx_kthread+0x10/0x10
[   15.709422]  ret_from_fork+0x41/0x80
[   15.709465]  ? __pfx_kthread+0x10/0x10
[   15.709507]  ret_from_fork_asm+0x1a/0x30
[   15.709572]  </TASK>
[   15.709600] 
[   15.717165] Allocated by task 270:
[   15.717469]  kasan_save_stack+0x45/0x70
[   15.717796]  kasan_save_track+0x18/0x40
[   15.718136]  kasan_save_alloc_info+0x3b/0x50
[   15.718423]  __kasan_kmalloc+0xb7/0xc0
[   15.718616]  __kmalloc_cache_noprof+0x168/0x350
[   15.718938]  kasan_atomics+0x96/0x310
[   15.719141]  kunit_try_run_case+0x1a6/0x480
[   15.719322]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.719634]  kthread+0x257/0x310
[   15.719870]  ret_from_fork+0x41/0x80
[   15.720155]  ret_from_fork_asm+0x1a/0x30
[   15.720461] 
[   15.720615] The buggy address belongs to the object at ffff888102635000
[   15.720615]  which belongs to the cache kmalloc-64 of size 64
[   15.721132] The buggy address is located 0 bytes to the right of
[   15.721132]  allocated 48-byte region [ffff888102635000, ffff888102635030)
[   15.721642] 
[   15.721814] The buggy address belongs to the physical page:
[   15.722253] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102635
[   15.722812] flags: 0x200000000000000(node=0|zone=2)
[   15.723168] page_type: f5(slab)
[   15.723321] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.723569] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   15.723823] page dumped because: kasan: bad access detected
[   15.724018] 
[   15.724144] Memory state around the buggy address:
[   15.724490]  ffff888102634f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.724962]  ffff888102634f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.725469] >ffff888102635000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.725963]                                      ^
[   15.726333]  ffff888102635080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.726796]  ffff888102635100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.727120] ==================================================================
[   15.971573] ==================================================================
[   15.972120] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x224d/0x5450
[   15.972603] Write of size 8 at addr ffff888102635030 by task kunit_try_catch/270
[   15.973098] 
[   15.973339] CPU: 0 UID: 0 PID: 270 Comm: kunit_try_catch Tainted: G    B            N 6.12.32-rc1 #1
[   15.973428] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.973455] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.973500] Call Trace:
[   15.973542]  <TASK>
[   15.973579]  dump_stack_lvl+0x73/0xb0
[   15.973636]  print_report+0xd1/0x640
[   15.973694]  ? __virt_addr_valid+0x1db/0x2d0
[   15.973746]  ? kasan_atomics_helper+0x224d/0x5450
[   15.973795]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.973842]  ? kasan_atomics_helper+0x224d/0x5450
[   15.973892]  kasan_report+0x140/0x180
[   15.973944]  ? kasan_atomics_helper+0x224d/0x5450
[   15.974006]  kasan_check_range+0x10c/0x1c0
[   15.974056]  __kasan_check_write+0x18/0x20
[   15.974108]  kasan_atomics_helper+0x224d/0x5450
[   15.974145]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.974183]  ? __kmalloc_cache_noprof+0x168/0x350
[   15.974223]  kasan_atomics+0x1dd/0x310
[   15.974255]  ? __pfx_kasan_atomics+0x10/0x10
[   15.974287]  ? __pfx_read_tsc+0x10/0x10
[   15.974318]  ? ktime_get_ts64+0x84/0x230
[   15.974358]  kunit_try_run_case+0x1a6/0x480
[   15.974392]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.974422]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   15.974454]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.974490]  ? __kthread_parkme+0x82/0x160
[   15.974525]  ? preempt_count_sub+0x50/0x80
[   15.974567]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.974602]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.974647]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.974714]  kthread+0x257/0x310
[   15.974750]  ? __pfx_kthread+0x10/0x10
[   15.974791]  ret_from_fork+0x41/0x80
[   15.974831]  ? __pfx_kthread+0x10/0x10
[   15.974872]  ret_from_fork_asm+0x1a/0x30
[   15.974935]  </TASK>
[   15.974964] 
[   15.985553] Allocated by task 270:
[   15.985808]  kasan_save_stack+0x45/0x70
[   15.986375]  kasan_save_track+0x18/0x40
[   15.987834]  kasan_save_alloc_info+0x3b/0x50
[   15.988182]  __kasan_kmalloc+0xb7/0xc0
[   15.988349]  __kmalloc_cache_noprof+0x168/0x350
[   15.988878]  kasan_atomics+0x96/0x310
[   15.989190]  kunit_try_run_case+0x1a6/0x480
[   15.989639]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.989898]  kthread+0x257/0x310
[   15.990086]  ret_from_fork+0x41/0x80
[   15.990471]  ret_from_fork_asm+0x1a/0x30
[   15.990899] 
[   15.991087] The buggy address belongs to the object at ffff888102635000
[   15.991087]  which belongs to the cache kmalloc-64 of size 64
[   15.991751] The buggy address is located 0 bytes to the right of
[   15.991751]  allocated 48-byte region [ffff888102635000, ffff888102635030)
[   15.992681] 
[   15.992880] The buggy address belongs to the physical page:
[   15.993283] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102635
[   15.993745] flags: 0x200000000000000(node=0|zone=2)
[   15.993980] page_type: f5(slab)
[   15.994281] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.994826] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   15.995688] page dumped because: kasan: bad access detected
[   15.995953] 
[   15.996081] Memory state around the buggy address:
[   15.996481]  ffff888102634f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.996719]  ffff888102634f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.997528] >ffff888102635000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.997969]                                      ^
[   15.998439]  ffff888102635080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.998855]  ffff888102635100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.999370] ==================================================================
[   15.282745] ==================================================================
[   15.283150] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4eb0/0x5450
[   15.283680] Read of size 8 at addr ffff888102635030 by task kunit_try_catch/270
[   15.284010] 
[   15.284224] CPU: 0 UID: 0 PID: 270 Comm: kunit_try_catch Tainted: G    B            N 6.12.32-rc1 #1
[   15.284322] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.284349] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.284384] Call Trace:
[   15.284415]  <TASK>
[   15.284443]  dump_stack_lvl+0x73/0xb0
[   15.284567]  print_report+0xd1/0x640
[   15.284616]  ? __virt_addr_valid+0x1db/0x2d0
[   15.284659]  ? kasan_atomics_helper+0x4eb0/0x5450
[   15.284713]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.284774]  ? kasan_atomics_helper+0x4eb0/0x5450
[   15.284821]  kasan_report+0x140/0x180
[   15.284867]  ? kasan_atomics_helper+0x4eb0/0x5450
[   15.284924]  __asan_report_load8_noabort+0x18/0x20
[   15.284982]  kasan_atomics_helper+0x4eb0/0x5450
[   15.285030]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.285107]  ? __kmalloc_cache_noprof+0x168/0x350
[   15.285176]  kasan_atomics+0x1dd/0x310
[   15.285220]  ? __pfx_kasan_atomics+0x10/0x10
[   15.285259]  ? __pfx_read_tsc+0x10/0x10
[   15.285293]  ? ktime_get_ts64+0x84/0x230
[   15.285342]  kunit_try_run_case+0x1a6/0x480
[   15.285400]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.285450]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   15.285504]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.285553]  ? __kthread_parkme+0x82/0x160
[   15.285600]  ? preempt_count_sub+0x50/0x80
[   15.285644]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.285691]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.285739]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.285791]  kthread+0x257/0x310
[   15.285831]  ? __pfx_kthread+0x10/0x10
[   15.285872]  ret_from_fork+0x41/0x80
[   15.285920]  ? __pfx_kthread+0x10/0x10
[   15.285964]  ret_from_fork_asm+0x1a/0x30
[   15.286029]  </TASK>
[   15.286080] 
[   15.293970] Allocated by task 270:
[   15.294296]  kasan_save_stack+0x45/0x70
[   15.294516]  kasan_save_track+0x18/0x40
[   15.294809]  kasan_save_alloc_info+0x3b/0x50
[   15.295134]  __kasan_kmalloc+0xb7/0xc0
[   15.295406]  __kmalloc_cache_noprof+0x168/0x350
[   15.295685]  kasan_atomics+0x96/0x310
[   15.295888]  kunit_try_run_case+0x1a6/0x480
[   15.296157]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.296400]  kthread+0x257/0x310
[   15.296572]  ret_from_fork+0x41/0x80
[   15.296830]  ret_from_fork_asm+0x1a/0x30
[   15.297157] 
[   15.297320] The buggy address belongs to the object at ffff888102635000
[   15.297320]  which belongs to the cache kmalloc-64 of size 64
[   15.298143] The buggy address is located 0 bytes to the right of
[   15.298143]  allocated 48-byte region [ffff888102635000, ffff888102635030)
[   15.298881] 
[   15.299040] The buggy address belongs to the physical page:
[   15.299323] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102635
[   15.299747] flags: 0x200000000000000(node=0|zone=2)
[   15.299967] page_type: f5(slab)
[   15.300187] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.300469] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   15.300767] page dumped because: kasan: bad access detected
[   15.301116] 
[   15.301264] Memory state around the buggy address:
[   15.301614]  ffff888102634f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.302149]  ffff888102634f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.302650] >ffff888102635000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.303151]                                      ^
[   15.303700]  ffff888102635080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.304232]  ffff888102635100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.304727] ==================================================================
[   14.422583] ==================================================================
[   14.422874] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4ba4/0x5450
[   14.423286] Write of size 4 at addr ffff888102635030 by task kunit_try_catch/270
[   14.423568] 
[   14.423736] CPU: 0 UID: 0 PID: 270 Comm: kunit_try_catch Tainted: G    B            N 6.12.32-rc1 #1
[   14.423782] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.423794] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.423815] Call Trace:
[   14.423829]  <TASK>
[   14.423871]  dump_stack_lvl+0x73/0xb0
[   14.423913]  print_report+0xd1/0x640
[   14.423948]  ? __virt_addr_valid+0x1db/0x2d0
[   14.423972]  ? kasan_atomics_helper+0x4ba4/0x5450
[   14.423994]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.424017]  ? kasan_atomics_helper+0x4ba4/0x5450
[   14.424040]  kasan_report+0x140/0x180
[   14.424074]  ? kasan_atomics_helper+0x4ba4/0x5450
[   14.424103]  __asan_report_store4_noabort+0x1b/0x30
[   14.424125]  kasan_atomics_helper+0x4ba4/0x5450
[   14.424160]  ? kasan_save_alloc_info+0x3b/0x50
[   14.424183]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.424208]  ? __kmalloc_cache_noprof+0x168/0x350
[   14.424236]  kasan_atomics+0x1dd/0x310
[   14.424354]  ? __pfx_kasan_atomics+0x10/0x10
[   14.424379]  ? __pfx_read_tsc+0x10/0x10
[   14.424399]  ? ktime_get_ts64+0x84/0x230
[   14.424426]  kunit_try_run_case+0x1a6/0x480
[   14.424448]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.424469]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   14.424489]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.424515]  ? __kthread_parkme+0x82/0x160
[   14.424534]  ? preempt_count_sub+0x50/0x80
[   14.424556]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.424576]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.424601]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.424626]  kthread+0x257/0x310
[   14.424644]  ? __pfx_kthread+0x10/0x10
[   14.424679]  ret_from_fork+0x41/0x80
[   14.424702]  ? __pfx_kthread+0x10/0x10
[   14.424721]  ret_from_fork_asm+0x1a/0x30
[   14.424750]  </TASK>
[   14.424761] 
[   14.431606] Allocated by task 270:
[   14.431862]  kasan_save_stack+0x45/0x70
[   14.432266]  kasan_save_track+0x18/0x40
[   14.432503]  kasan_save_alloc_info+0x3b/0x50
[   14.432604]  __kasan_kmalloc+0xb7/0xc0
[   14.432703]  __kmalloc_cache_noprof+0x168/0x350
[   14.432925]  kasan_atomics+0x96/0x310
[   14.433138]  kunit_try_run_case+0x1a6/0x480
[   14.433422]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.433554]  kthread+0x257/0x310
[   14.433656]  ret_from_fork+0x41/0x80
[   14.433757]  ret_from_fork_asm+0x1a/0x30
[   14.433929] 
[   14.434036] The buggy address belongs to the object at ffff888102635000
[   14.434036]  which belongs to the cache kmalloc-64 of size 64
[   14.434546] The buggy address is located 0 bytes to the right of
[   14.434546]  allocated 48-byte region [ffff888102635000, ffff888102635030)
[   14.434907] 
[   14.434959] The buggy address belongs to the physical page:
[   14.435056] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102635
[   14.435442] flags: 0x200000000000000(node=0|zone=2)
[   14.435734] page_type: f5(slab)
[   14.435818] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.436560] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   14.436878] page dumped because: kasan: bad access detected
[   14.436982] 
[   14.437033] Memory state around the buggy address:
[   14.437502]  ffff888102634f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.437913]  ffff888102634f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.438841] >ffff888102635000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.439260]                                      ^
[   14.439383]  ffff888102635080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.439532]  ffff888102635100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.439842] ==================================================================
[   15.462894] ==================================================================
[   15.463289] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1780/0x5450
[   15.463858] Write of size 8 at addr ffff888102635030 by task kunit_try_catch/270
[   15.464348] 
[   15.464640] CPU: 0 UID: 0 PID: 270 Comm: kunit_try_catch Tainted: G    B            N 6.12.32-rc1 #1
[   15.464747] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.464775] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.464819] Call Trace:
[   15.464857]  <TASK>
[   15.464890]  dump_stack_lvl+0x73/0xb0
[   15.464940]  print_report+0xd1/0x640
[   15.464976]  ? __virt_addr_valid+0x1db/0x2d0
[   15.465016]  ? kasan_atomics_helper+0x1780/0x5450
[   15.465056]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.465134]  ? kasan_atomics_helper+0x1780/0x5450
[   15.465184]  kasan_report+0x140/0x180
[   15.465230]  ? kasan_atomics_helper+0x1780/0x5450
[   15.465292]  kasan_check_range+0x10c/0x1c0
[   15.465336]  __kasan_check_write+0x18/0x20
[   15.465374]  kasan_atomics_helper+0x1780/0x5450
[   15.465421]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.465472]  ? __kmalloc_cache_noprof+0x168/0x350
[   15.465523]  kasan_atomics+0x1dd/0x310
[   15.465547]  ? __pfx_kasan_atomics+0x10/0x10
[   15.465569]  ? __pfx_read_tsc+0x10/0x10
[   15.465589]  ? ktime_get_ts64+0x84/0x230
[   15.465617]  kunit_try_run_case+0x1a6/0x480
[   15.465639]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.465659]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   15.465703]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.465729]  ? __kthread_parkme+0x82/0x160
[   15.465749]  ? preempt_count_sub+0x50/0x80
[   15.465771]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.465791]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.465816]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.465841]  kthread+0x257/0x310
[   15.465859]  ? __pfx_kthread+0x10/0x10
[   15.465878]  ret_from_fork+0x41/0x80
[   15.465899]  ? __pfx_kthread+0x10/0x10
[   15.465929]  ret_from_fork_asm+0x1a/0x30
[   15.465962]  </TASK>
[   15.465976] 
[   15.475552] Allocated by task 270:
[   15.475855]  kasan_save_stack+0x45/0x70
[   15.476178]  kasan_save_track+0x18/0x40
[   15.476418]  kasan_save_alloc_info+0x3b/0x50
[   15.476736]  __kasan_kmalloc+0xb7/0xc0
[   15.476909]  __kmalloc_cache_noprof+0x168/0x350
[   15.477152]  kasan_atomics+0x96/0x310
[   15.477454]  kunit_try_run_case+0x1a6/0x480
[   15.477779]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.477995]  kthread+0x257/0x310
[   15.478301]  ret_from_fork+0x41/0x80
[   15.478574]  ret_from_fork_asm+0x1a/0x30
[   15.478838] 
[   15.479010] The buggy address belongs to the object at ffff888102635000
[   15.479010]  which belongs to the cache kmalloc-64 of size 64
[   15.479588] The buggy address is located 0 bytes to the right of
[   15.479588]  allocated 48-byte region [ffff888102635000, ffff888102635030)
[   15.480226] 
[   15.480371] The buggy address belongs to the physical page:
[   15.480560] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102635
[   15.481112] flags: 0x200000000000000(node=0|zone=2)
[   15.481437] page_type: f5(slab)
[   15.481596] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.481853] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   15.482392] page dumped because: kasan: bad access detected
[   15.482777] 
[   15.482948] Memory state around the buggy address:
[   15.483316]  ffff888102634f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.483632]  ffff888102634f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.484154] >ffff888102635000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.484399]                                      ^
[   15.484760]  ffff888102635080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.485129]  ffff888102635100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.485367] ==================================================================
[   15.751442] ==================================================================
[   15.751763] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1eab/0x5450
[   15.752274] Write of size 8 at addr ffff888102635030 by task kunit_try_catch/270
[   15.752790] 
[   15.752981] CPU: 0 UID: 0 PID: 270 Comm: kunit_try_catch Tainted: G    B            N 6.12.32-rc1 #1
[   15.753100] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.753130] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.753175] Call Trace:
[   15.753217]  <TASK>
[   15.753253]  dump_stack_lvl+0x73/0xb0
[   15.753312]  print_report+0xd1/0x640
[   15.753363]  ? __virt_addr_valid+0x1db/0x2d0
[   15.753415]  ? kasan_atomics_helper+0x1eab/0x5450
[   15.753461]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.753512]  ? kasan_atomics_helper+0x1eab/0x5450
[   15.753561]  kasan_report+0x140/0x180
[   15.753614]  ? kasan_atomics_helper+0x1eab/0x5450
[   15.753686]  kasan_check_range+0x10c/0x1c0
[   15.753737]  __kasan_check_write+0x18/0x20
[   15.753784]  kasan_atomics_helper+0x1eab/0x5450
[   15.753831]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.753875]  ? __kmalloc_cache_noprof+0x168/0x350
[   15.753935]  kasan_atomics+0x1dd/0x310
[   15.753978]  ? __pfx_kasan_atomics+0x10/0x10
[   15.754019]  ? __pfx_read_tsc+0x10/0x10
[   15.754089]  ? ktime_get_ts64+0x84/0x230
[   15.754145]  kunit_try_run_case+0x1a6/0x480
[   15.754186]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.754224]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   15.754267]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.754315]  ? __kthread_parkme+0x82/0x160
[   15.754352]  ? preempt_count_sub+0x50/0x80
[   15.754399]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.754434]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.754483]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.754533]  kthread+0x257/0x310
[   15.754572]  ? __pfx_kthread+0x10/0x10
[   15.754615]  ret_from_fork+0x41/0x80
[   15.754659]  ? __pfx_kthread+0x10/0x10
[   15.754712]  ret_from_fork_asm+0x1a/0x30
[   15.754776]  </TASK>
[   15.754800] 
[   15.762774] Allocated by task 270:
[   15.763114]  kasan_save_stack+0x45/0x70
[   15.763431]  kasan_save_track+0x18/0x40
[   15.763759]  kasan_save_alloc_info+0x3b/0x50
[   15.764133]  __kasan_kmalloc+0xb7/0xc0
[   15.764438]  __kmalloc_cache_noprof+0x168/0x350
[   15.764798]  kasan_atomics+0x96/0x310
[   15.765122]  kunit_try_run_case+0x1a6/0x480
[   15.765443]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.766193]  kthread+0x257/0x310
[   15.766509]  ret_from_fork+0x41/0x80
[   15.766795]  ret_from_fork_asm+0x1a/0x30
[   15.766993] 
[   15.767181] The buggy address belongs to the object at ffff888102635000
[   15.767181]  which belongs to the cache kmalloc-64 of size 64
[   15.767716] The buggy address is located 0 bytes to the right of
[   15.767716]  allocated 48-byte region [ffff888102635000, ffff888102635030)
[   15.768368] 
[   15.768493] The buggy address belongs to the physical page:
[   15.768708] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102635
[   15.768991] flags: 0x200000000000000(node=0|zone=2)
[   15.769228] page_type: f5(slab)
[   15.769401] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.769889] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   15.770483] page dumped because: kasan: bad access detected
[   15.770896] 
[   15.771081] Memory state around the buggy address:
[   15.771440]  ffff888102634f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.771937]  ffff888102634f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.772321] >ffff888102635000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.772575]                                      ^
[   15.772889]  ffff888102635080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.773391]  ffff888102635100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.773848] ==================================================================
[   15.635575] ==================================================================
[   15.635889] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1c19/0x5450
[   15.636419] Write of size 8 at addr ffff888102635030 by task kunit_try_catch/270
[   15.636701] 
[   15.636879] CPU: 0 UID: 0 PID: 270 Comm: kunit_try_catch Tainted: G    B            N 6.12.32-rc1 #1
[   15.636961] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.636987] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.637025] Call Trace:
[   15.637116]  <TASK>
[   15.637150]  dump_stack_lvl+0x73/0xb0
[   15.637208]  print_report+0xd1/0x640
[   15.637251]  ? __virt_addr_valid+0x1db/0x2d0
[   15.637318]  ? kasan_atomics_helper+0x1c19/0x5450
[   15.637361]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.637408]  ? kasan_atomics_helper+0x1c19/0x5450
[   15.637452]  kasan_report+0x140/0x180
[   15.637516]  ? kasan_atomics_helper+0x1c19/0x5450
[   15.637573]  kasan_check_range+0x10c/0x1c0
[   15.637616]  __kasan_check_write+0x18/0x20
[   15.637655]  kasan_atomics_helper+0x1c19/0x5450
[   15.637712]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.637778]  ? __kmalloc_cache_noprof+0x168/0x350
[   15.637832]  kasan_atomics+0x1dd/0x310
[   15.637869]  ? __pfx_kasan_atomics+0x10/0x10
[   15.637919]  ? __pfx_read_tsc+0x10/0x10
[   15.637963]  ? ktime_get_ts64+0x84/0x230
[   15.638039]  kunit_try_run_case+0x1a6/0x480
[   15.638121]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.638165]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   15.638213]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.638285]  ? __kthread_parkme+0x82/0x160
[   15.638329]  ? preempt_count_sub+0x50/0x80
[   15.638379]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.638424]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.638495]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.638550]  kthread+0x257/0x310
[   15.638593]  ? __pfx_kthread+0x10/0x10
[   15.638633]  ret_from_fork+0x41/0x80
[   15.638685]  ? __pfx_kthread+0x10/0x10
[   15.638747]  ret_from_fork_asm+0x1a/0x30
[   15.638813]  </TASK>
[   15.638844] 
[   15.646200] Allocated by task 270:
[   15.646384]  kasan_save_stack+0x45/0x70
[   15.646657]  kasan_save_track+0x18/0x40
[   15.646988]  kasan_save_alloc_info+0x3b/0x50
[   15.647340]  __kasan_kmalloc+0xb7/0xc0
[   15.647649]  __kmalloc_cache_noprof+0x168/0x350
[   15.648006]  kasan_atomics+0x96/0x310
[   15.648334]  kunit_try_run_case+0x1a6/0x480
[   15.648663]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.649045]  kthread+0x257/0x310
[   15.649365]  ret_from_fork+0x41/0x80
[   15.649691]  ret_from_fork_asm+0x1a/0x30
[   15.649897] 
[   15.650004] The buggy address belongs to the object at ffff888102635000
[   15.650004]  which belongs to the cache kmalloc-64 of size 64
[   15.651875] The buggy address is located 0 bytes to the right of
[   15.651875]  allocated 48-byte region [ffff888102635000, ffff888102635030)
[   15.652574] 
[   15.652762] The buggy address belongs to the physical page:
[   15.652996] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102635
[   15.653490] flags: 0x200000000000000(node=0|zone=2)
[   15.653704] page_type: f5(slab)
[   15.653868] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.654131] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   15.654374] page dumped because: kasan: bad access detected
[   15.654565] 
[   15.654793] Memory state around the buggy address:
[   15.655179]  ffff888102634f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.655712]  ffff888102634f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.656513] >ffff888102635000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.657091]                                      ^
[   15.657467]  ffff888102635080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.658033]  ffff888102635100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.658563] ==================================================================
[   15.486639] ==================================================================
[   15.487880] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1819/0x5450
[   15.488641] Write of size 8 at addr ffff888102635030 by task kunit_try_catch/270
[   15.488909] 
[   15.489041] CPU: 0 UID: 0 PID: 270 Comm: kunit_try_catch Tainted: G    B            N 6.12.32-rc1 #1
[   15.489204] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.489229] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.489262] Call Trace:
[   15.489295]  <TASK>
[   15.489326]  dump_stack_lvl+0x73/0xb0
[   15.489384]  print_report+0xd1/0x640
[   15.489433]  ? __virt_addr_valid+0x1db/0x2d0
[   15.489483]  ? kasan_atomics_helper+0x1819/0x5450
[   15.489529]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.489576]  ? kasan_atomics_helper+0x1819/0x5450
[   15.489623]  kasan_report+0x140/0x180
[   15.489681]  ? kasan_atomics_helper+0x1819/0x5450
[   15.489736]  kasan_check_range+0x10c/0x1c0
[   15.489771]  __kasan_check_write+0x18/0x20
[   15.489794]  kasan_atomics_helper+0x1819/0x5450
[   15.489819]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.489844]  ? __kmalloc_cache_noprof+0x168/0x350
[   15.489871]  kasan_atomics+0x1dd/0x310
[   15.489891]  ? __pfx_kasan_atomics+0x10/0x10
[   15.489929]  ? __pfx_read_tsc+0x10/0x10
[   15.489952]  ? ktime_get_ts64+0x84/0x230
[   15.489981]  kunit_try_run_case+0x1a6/0x480
[   15.490006]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.490027]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   15.490049]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.490127]  ? __kthread_parkme+0x82/0x160
[   15.490148]  ? preempt_count_sub+0x50/0x80
[   15.490171]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.490191]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.490218]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.490244]  kthread+0x257/0x310
[   15.490263]  ? __pfx_kthread+0x10/0x10
[   15.490283]  ret_from_fork+0x41/0x80
[   15.490304]  ? __pfx_kthread+0x10/0x10
[   15.490323]  ret_from_fork_asm+0x1a/0x30
[   15.490354]  </TASK>
[   15.490368] 
[   15.498457] Allocated by task 270:
[   15.498790]  kasan_save_stack+0x45/0x70
[   15.499168]  kasan_save_track+0x18/0x40
[   15.499530]  kasan_save_alloc_info+0x3b/0x50
[   15.499958]  __kasan_kmalloc+0xb7/0xc0
[   15.500358]  __kmalloc_cache_noprof+0x168/0x350
[   15.500739]  kasan_atomics+0x96/0x310
[   15.501079]  kunit_try_run_case+0x1a6/0x480
[   15.501448]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.501749]  kthread+0x257/0x310
[   15.502006]  ret_from_fork+0x41/0x80
[   15.502387]  ret_from_fork_asm+0x1a/0x30
[   15.502783] 
[   15.502999] The buggy address belongs to the object at ffff888102635000
[   15.502999]  which belongs to the cache kmalloc-64 of size 64
[   15.503841] The buggy address is located 0 bytes to the right of
[   15.503841]  allocated 48-byte region [ffff888102635000, ffff888102635030)
[   15.504341] 
[   15.504441] The buggy address belongs to the physical page:
[   15.504608] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102635
[   15.505395] flags: 0x200000000000000(node=0|zone=2)
[   15.505830] page_type: f5(slab)
[   15.506179] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.506801] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   15.507305] page dumped because: kasan: bad access detected
[   15.507651] 
[   15.507824] Memory state around the buggy address:
[   15.508260]  ffff888102634f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.508615]  ffff888102634f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.508969] >ffff888102635000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.509522]                                      ^
[   15.509772]  ffff888102635080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.510288]  ffff888102635100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.510763] ==================================================================
[   15.900842] ==================================================================
[   15.901279] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4fb4/0x5450
[   15.901625] Read of size 8 at addr ffff888102635030 by task kunit_try_catch/270
[   15.902299] 
[   15.902462] CPU: 0 UID: 0 PID: 270 Comm: kunit_try_catch Tainted: G    B            N 6.12.32-rc1 #1
[   15.902547] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.902569] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.902608] Call Trace:
[   15.902649]  <TASK>
[   15.902695]  dump_stack_lvl+0x73/0xb0
[   15.902756]  print_report+0xd1/0x640
[   15.902808]  ? __virt_addr_valid+0x1db/0x2d0
[   15.902858]  ? kasan_atomics_helper+0x4fb4/0x5450
[   15.902910]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.902954]  ? kasan_atomics_helper+0x4fb4/0x5450
[   15.902997]  kasan_report+0x140/0x180
[   15.903067]  ? kasan_atomics_helper+0x4fb4/0x5450
[   15.903121]  __asan_report_load8_noabort+0x18/0x20
[   15.903179]  kasan_atomics_helper+0x4fb4/0x5450
[   15.903230]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.903276]  ? __kmalloc_cache_noprof+0x168/0x350
[   15.903344]  kasan_atomics+0x1dd/0x310
[   15.903387]  ? __pfx_kasan_atomics+0x10/0x10
[   15.903423]  ? __pfx_read_tsc+0x10/0x10
[   15.903461]  ? ktime_get_ts64+0x84/0x230
[   15.903514]  kunit_try_run_case+0x1a6/0x480
[   15.903564]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.903606]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   15.903653]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.903726]  ? __kthread_parkme+0x82/0x160
[   15.903768]  ? preempt_count_sub+0x50/0x80
[   15.903815]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.903853]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.903889]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.903930]  kthread+0x257/0x310
[   15.903964]  ? __pfx_kthread+0x10/0x10
[   15.904001]  ret_from_fork+0x41/0x80
[   15.904059]  ? __pfx_kthread+0x10/0x10
[   15.904228]  ret_from_fork_asm+0x1a/0x30
[   15.904294]  </TASK>
[   15.904323] 
[   15.915082] Allocated by task 270:
[   15.915406]  kasan_save_stack+0x45/0x70
[   15.915769]  kasan_save_track+0x18/0x40
[   15.916110]  kasan_save_alloc_info+0x3b/0x50
[   15.916475]  __kasan_kmalloc+0xb7/0xc0
[   15.916799]  __kmalloc_cache_noprof+0x168/0x350
[   15.917154]  kasan_atomics+0x96/0x310
[   15.917312]  kunit_try_run_case+0x1a6/0x480
[   15.917563]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.917921]  kthread+0x257/0x310
[   15.918219]  ret_from_fork+0x41/0x80
[   15.918423]  ret_from_fork_asm+0x1a/0x30
[   15.918745] 
[   15.918901] The buggy address belongs to the object at ffff888102635000
[   15.918901]  which belongs to the cache kmalloc-64 of size 64
[   15.919434] The buggy address is located 0 bytes to the right of
[   15.919434]  allocated 48-byte region [ffff888102635000, ffff888102635030)
[   15.920216] 
[   15.920363] The buggy address belongs to the physical page:
[   15.921140] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102635
[   15.921469] flags: 0x200000000000000(node=0|zone=2)
[   15.921659] page_type: f5(slab)
[   15.921929] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.922392] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   15.922803] page dumped because: kasan: bad access detected
[   15.923030] 
[   15.923202] Memory state around the buggy address:
[   15.923529]  ffff888102634f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.923784]  ffff888102634f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.924292] >ffff888102635000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.924600]                                      ^
[   15.924931]  ffff888102635080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.925373]  ffff888102635100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.925631] ==================================================================
[   14.630603] ==================================================================
[   14.631135] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x5ff/0x5450
[   14.631371] Write of size 4 at addr ffff888102635030 by task kunit_try_catch/270
[   14.631649] 
[   14.631852] CPU: 0 UID: 0 PID: 270 Comm: kunit_try_catch Tainted: G    B            N 6.12.32-rc1 #1
[   14.631936] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.631964] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.632006] Call Trace:
[   14.632037]  <TASK>
[   14.632067]  dump_stack_lvl+0x73/0xb0
[   14.632118]  print_report+0xd1/0x640
[   14.632177]  ? __virt_addr_valid+0x1db/0x2d0
[   14.632216]  ? kasan_atomics_helper+0x5ff/0x5450
[   14.632257]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.632302]  ? kasan_atomics_helper+0x5ff/0x5450
[   14.632350]  kasan_report+0x140/0x180
[   14.632396]  ? kasan_atomics_helper+0x5ff/0x5450
[   14.632444]  kasan_check_range+0x10c/0x1c0
[   14.632482]  __kasan_check_write+0x18/0x20
[   14.632518]  kasan_atomics_helper+0x5ff/0x5450
[   14.632556]  ? kasan_save_alloc_info+0x3b/0x50
[   14.632598]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.632649]  ? __kmalloc_cache_noprof+0x168/0x350
[   14.632720]  kasan_atomics+0x1dd/0x310
[   14.632766]  ? __pfx_kasan_atomics+0x10/0x10
[   14.632811]  ? __pfx_read_tsc+0x10/0x10
[   14.632852]  ? ktime_get_ts64+0x84/0x230
[   14.632908]  kunit_try_run_case+0x1a6/0x480
[   14.632952]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.632977]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   14.633000]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.633025]  ? __kthread_parkme+0x82/0x160
[   14.633046]  ? preempt_count_sub+0x50/0x80
[   14.633081]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.633127]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.633154]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.633181]  kthread+0x257/0x310
[   14.633200]  ? __pfx_kthread+0x10/0x10
[   14.633219]  ret_from_fork+0x41/0x80
[   14.633240]  ? __pfx_kthread+0x10/0x10
[   14.633258]  ret_from_fork_asm+0x1a/0x30
[   14.633289]  </TASK>
[   14.633304] 
[   14.640868] Allocated by task 270:
[   14.641049]  kasan_save_stack+0x45/0x70
[   14.641352]  kasan_save_track+0x18/0x40
[   14.642513]  kasan_save_alloc_info+0x3b/0x50
[   14.642873]  __kasan_kmalloc+0xb7/0xc0
[   14.643223]  __kmalloc_cache_noprof+0x168/0x350
[   14.643421]  kasan_atomics+0x96/0x310
[   14.643593]  kunit_try_run_case+0x1a6/0x480
[   14.643838]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.644978]  kthread+0x257/0x310
[   14.645499]  ret_from_fork+0x41/0x80
[   14.645847]  ret_from_fork_asm+0x1a/0x30
[   14.646210] 
[   14.646352] The buggy address belongs to the object at ffff888102635000
[   14.646352]  which belongs to the cache kmalloc-64 of size 64
[   14.646842] The buggy address is located 0 bytes to the right of
[   14.646842]  allocated 48-byte region [ffff888102635000, ffff888102635030)
[   14.647342] 
[   14.647506] The buggy address belongs to the physical page:
[   14.647897] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102635
[   14.648189] flags: 0x200000000000000(node=0|zone=2)
[   14.648382] page_type: f5(slab)
[   14.648637] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.649178] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   14.649605] page dumped because: kasan: bad access detected
[   14.649884] 
[   14.650052] Memory state around the buggy address:
[   14.650288]  ffff888102634f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.650632]  ffff888102634f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.651013] >ffff888102635000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.651422]                                      ^
[   14.651776]  ffff888102635080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.652126]  ffff888102635100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.652559] ==================================================================
[   14.676774] ==================================================================
[   14.677310] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x730/0x5450
[   14.677711] Write of size 4 at addr ffff888102635030 by task kunit_try_catch/270
[   14.677955] 
[   14.678142] CPU: 0 UID: 0 PID: 270 Comm: kunit_try_catch Tainted: G    B            N 6.12.32-rc1 #1
[   14.678224] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.678251] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.678293] Call Trace:
[   14.678325]  <TASK>
[   14.678355]  dump_stack_lvl+0x73/0xb0
[   14.678410]  print_report+0xd1/0x640
[   14.678457]  ? __virt_addr_valid+0x1db/0x2d0
[   14.678503]  ? kasan_atomics_helper+0x730/0x5450
[   14.678549]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.678592]  ? kasan_atomics_helper+0x730/0x5450
[   14.678639]  kasan_report+0x140/0x180
[   14.678694]  ? kasan_atomics_helper+0x730/0x5450
[   14.678742]  kasan_check_range+0x10c/0x1c0
[   14.678780]  __kasan_check_write+0x18/0x20
[   14.678817]  kasan_atomics_helper+0x730/0x5450
[   14.678860]  ? kasan_save_alloc_info+0x3b/0x50
[   14.678901]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.678952]  ? __kmalloc_cache_noprof+0x168/0x350
[   14.678998]  kasan_atomics+0x1dd/0x310
[   14.679032]  ? __pfx_kasan_atomics+0x10/0x10
[   14.679070]  ? __pfx_read_tsc+0x10/0x10
[   14.679129]  ? ktime_get_ts64+0x84/0x230
[   14.679173]  kunit_try_run_case+0x1a6/0x480
[   14.679213]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.679251]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   14.679294]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.679342]  ? __kthread_parkme+0x82/0x160
[   14.679382]  ? preempt_count_sub+0x50/0x80
[   14.679432]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.679472]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.679520]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.679570]  kthread+0x257/0x310
[   14.679609]  ? __pfx_kthread+0x10/0x10
[   14.679648]  ret_from_fork+0x41/0x80
[   14.679698]  ? __pfx_kthread+0x10/0x10
[   14.679731]  ret_from_fork_asm+0x1a/0x30
[   14.679783]  </TASK>
[   14.679805] 
[   14.687369] Allocated by task 270:
[   14.687547]  kasan_save_stack+0x45/0x70
[   14.687828]  kasan_save_track+0x18/0x40
[   14.688110]  kasan_save_alloc_info+0x3b/0x50
[   14.688440]  __kasan_kmalloc+0xb7/0xc0
[   14.688744]  __kmalloc_cache_noprof+0x168/0x350
[   14.689088]  kasan_atomics+0x96/0x310
[   14.689364]  kunit_try_run_case+0x1a6/0x480
[   14.689660]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.690058]  kthread+0x257/0x310
[   14.690289]  ret_from_fork+0x41/0x80
[   14.690448]  ret_from_fork_asm+0x1a/0x30
[   14.690747] 
[   14.690888] The buggy address belongs to the object at ffff888102635000
[   14.690888]  which belongs to the cache kmalloc-64 of size 64
[   14.691855] The buggy address is located 0 bytes to the right of
[   14.691855]  allocated 48-byte region [ffff888102635000, ffff888102635030)
[   14.692547] 
[   14.692733] The buggy address belongs to the physical page:
[   14.692945] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102635
[   14.693377] flags: 0x200000000000000(node=0|zone=2)
[   14.693781] page_type: f5(slab)
[   14.693999] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.694261] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   14.694525] page dumped because: kasan: bad access detected
[   14.694747] 
[   14.694857] Memory state around the buggy address:
[   14.695220]  ffff888102634f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.695683]  ffff888102634f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.696136] >ffff888102635000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.696596]                                      ^
[   14.696930]  ffff888102635080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.697503]  ffff888102635100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.697965] ==================================================================
[   14.892691] ==================================================================
[   14.893409] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a86/0x5450
[   14.894015] Read of size 4 at addr ffff888102635030 by task kunit_try_catch/270
[   14.894525] 
[   14.894730] CPU: 0 UID: 0 PID: 270 Comm: kunit_try_catch Tainted: G    B            N 6.12.32-rc1 #1
[   14.894801] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.894828] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.894857] Call Trace:
[   14.894883]  <TASK>
[   14.894906]  dump_stack_lvl+0x73/0xb0
[   14.894953]  print_report+0xd1/0x640
[   14.894986]  ? __virt_addr_valid+0x1db/0x2d0
[   14.895020]  ? kasan_atomics_helper+0x4a86/0x5450
[   14.895078]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.895120]  ? kasan_atomics_helper+0x4a86/0x5450
[   14.895162]  kasan_report+0x140/0x180
[   14.895204]  ? kasan_atomics_helper+0x4a86/0x5450
[   14.895249]  __asan_report_load4_noabort+0x18/0x20
[   14.895289]  kasan_atomics_helper+0x4a86/0x5450
[   14.895337]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.895383]  ? __kmalloc_cache_noprof+0x168/0x350
[   14.895440]  kasan_atomics+0x1dd/0x310
[   14.895476]  ? __pfx_kasan_atomics+0x10/0x10
[   14.895521]  ? __pfx_read_tsc+0x10/0x10
[   14.895561]  ? ktime_get_ts64+0x84/0x230
[   14.895613]  kunit_try_run_case+0x1a6/0x480
[   14.895660]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.895713]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   14.895759]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.895809]  ? __kthread_parkme+0x82/0x160
[   14.895848]  ? preempt_count_sub+0x50/0x80
[   14.895900]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.895935]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.895981]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.896026]  kthread+0x257/0x310
[   14.896095]  ? __pfx_kthread+0x10/0x10
[   14.896154]  ret_from_fork+0x41/0x80
[   14.896185]  ? __pfx_kthread+0x10/0x10
[   14.896242]  ret_from_fork_asm+0x1a/0x30
[   14.896288]  </TASK>
[   14.896308] 
[   14.904625] Allocated by task 270:
[   14.904867]  kasan_save_stack+0x45/0x70
[   14.905177]  kasan_save_track+0x18/0x40
[   14.905482]  kasan_save_alloc_info+0x3b/0x50
[   14.905783]  __kasan_kmalloc+0xb7/0xc0
[   14.906139]  __kmalloc_cache_noprof+0x168/0x350
[   14.906503]  kasan_atomics+0x96/0x310
[   14.906794]  kunit_try_run_case+0x1a6/0x480
[   14.907148]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.907457]  kthread+0x257/0x310
[   14.907648]  ret_from_fork+0x41/0x80
[   14.907962]  ret_from_fork_asm+0x1a/0x30
[   14.908211] 
[   14.908374] The buggy address belongs to the object at ffff888102635000
[   14.908374]  which belongs to the cache kmalloc-64 of size 64
[   14.908978] The buggy address is located 0 bytes to the right of
[   14.908978]  allocated 48-byte region [ffff888102635000, ffff888102635030)
[   14.909574] 
[   14.909767] The buggy address belongs to the physical page:
[   14.910104] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102635
[   14.910508] flags: 0x200000000000000(node=0|zone=2)
[   14.910874] page_type: f5(slab)
[   14.911178] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.911567] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   14.911959] page dumped because: kasan: bad access detected
[   14.912280] 
[   14.912389] Memory state around the buggy address:
[   14.912572]  ffff888102634f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.912812]  ffff888102634f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.913046] >ffff888102635000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.913301]                                      ^
[   14.913488]  ffff888102635080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.913746]  ffff888102635100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.914275] ==================================================================
[   15.135287] ==================================================================
[   15.135620] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a04/0x5450
[   15.136028] Read of size 4 at addr ffff888102635030 by task kunit_try_catch/270
[   15.137004] 
[   15.137156] CPU: 0 UID: 0 PID: 270 Comm: kunit_try_catch Tainted: G    B            N 6.12.32-rc1 #1
[   15.137575] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.137615] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.137788] Call Trace:
[   15.137948]  <TASK>
[   15.137990]  dump_stack_lvl+0x73/0xb0
[   15.138049]  print_report+0xd1/0x640
[   15.138127]  ? __virt_addr_valid+0x1db/0x2d0
[   15.138169]  ? kasan_atomics_helper+0x4a04/0x5450
[   15.138206]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.138250]  ? kasan_atomics_helper+0x4a04/0x5450
[   15.138293]  kasan_report+0x140/0x180
[   15.138487]  ? kasan_atomics_helper+0x4a04/0x5450
[   15.138547]  __asan_report_load4_noabort+0x18/0x20
[   15.138591]  kasan_atomics_helper+0x4a04/0x5450
[   15.139082]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.139312]  ? __kmalloc_cache_noprof+0x168/0x350
[   15.139370]  kasan_atomics+0x1dd/0x310
[   15.139411]  ? __pfx_kasan_atomics+0x10/0x10
[   15.139482]  ? __pfx_read_tsc+0x10/0x10
[   15.139522]  ? ktime_get_ts64+0x84/0x230
[   15.139818]  kunit_try_run_case+0x1a6/0x480
[   15.139871]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.139914]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   15.139957]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.140043]  ? __kthread_parkme+0x82/0x160
[   15.140106]  ? preempt_count_sub+0x50/0x80
[   15.140158]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.140202]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.140255]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.140312]  kthread+0x257/0x310
[   15.140369]  ? __pfx_kthread+0x10/0x10
[   15.140393]  ret_from_fork+0x41/0x80
[   15.140414]  ? __pfx_kthread+0x10/0x10
[   15.140433]  ret_from_fork_asm+0x1a/0x30
[   15.140464]  </TASK>
[   15.140477] 
[   15.148914] Allocated by task 270:
[   15.149256]  kasan_save_stack+0x45/0x70
[   15.149603]  kasan_save_track+0x18/0x40
[   15.149824]  kasan_save_alloc_info+0x3b/0x50
[   15.150221]  __kasan_kmalloc+0xb7/0xc0
[   15.150518]  __kmalloc_cache_noprof+0x168/0x350
[   15.150862]  kasan_atomics+0x96/0x310
[   15.151092]  kunit_try_run_case+0x1a6/0x480
[   15.151440]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.151660]  kthread+0x257/0x310
[   15.151830]  ret_from_fork+0x41/0x80
[   15.151998]  ret_from_fork_asm+0x1a/0x30
[   15.152205] 
[   15.152335] The buggy address belongs to the object at ffff888102635000
[   15.152335]  which belongs to the cache kmalloc-64 of size 64
[   15.153203] The buggy address is located 0 bytes to the right of
[   15.153203]  allocated 48-byte region [ffff888102635000, ffff888102635030)
[   15.154674] 
[   15.154926] The buggy address belongs to the physical page:
[   15.155582] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102635
[   15.155838] flags: 0x200000000000000(node=0|zone=2)
[   15.156499] page_type: f5(slab)
[   15.156758] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.157023] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   15.157852] page dumped because: kasan: bad access detected
[   15.158380] 
[   15.158584] Memory state around the buggy address:
[   15.158964]  ffff888102634f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.159502]  ffff888102634f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.159817] >ffff888102635000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.160225]                                      ^
[   15.160508]  ffff888102635080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.160971]  ffff888102635100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.161506] ==================================================================
[   15.336612] ==================================================================
[   15.337034] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x50d6/0x5450
[   15.337631] Write of size 8 at addr ffff888102635030 by task kunit_try_catch/270
[   15.337983] 
[   15.338238] CPU: 0 UID: 0 PID: 270 Comm: kunit_try_catch Tainted: G    B            N 6.12.32-rc1 #1
[   15.338335] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.338359] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.338398] Call Trace:
[   15.338431]  <TASK>
[   15.338463]  dump_stack_lvl+0x73/0xb0
[   15.338524]  print_report+0xd1/0x640
[   15.338572]  ? __virt_addr_valid+0x1db/0x2d0
[   15.338622]  ? kasan_atomics_helper+0x50d6/0x5450
[   15.338683]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.338728]  ? kasan_atomics_helper+0x50d6/0x5450
[   15.338773]  kasan_report+0x140/0x180
[   15.338840]  ? kasan_atomics_helper+0x50d6/0x5450
[   15.338896]  __asan_report_store8_noabort+0x1b/0x30
[   15.338939]  kasan_atomics_helper+0x50d6/0x5450
[   15.338986]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.339035]  ? __kmalloc_cache_noprof+0x168/0x350
[   15.339141]  kasan_atomics+0x1dd/0x310
[   15.339185]  ? __pfx_kasan_atomics+0x10/0x10
[   15.339224]  ? __pfx_read_tsc+0x10/0x10
[   15.339258]  ? ktime_get_ts64+0x84/0x230
[   15.339290]  kunit_try_run_case+0x1a6/0x480
[   15.339314]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.339334]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   15.339357]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.339382]  ? __kthread_parkme+0x82/0x160
[   15.339402]  ? preempt_count_sub+0x50/0x80
[   15.339425]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.339445]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.339471]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.339497]  kthread+0x257/0x310
[   15.339516]  ? __pfx_kthread+0x10/0x10
[   15.339535]  ret_from_fork+0x41/0x80
[   15.339556]  ? __pfx_kthread+0x10/0x10
[   15.339575]  ret_from_fork_asm+0x1a/0x30
[   15.339605]  </TASK>
[   15.339619] 
[   15.347474] Allocated by task 270:
[   15.347687]  kasan_save_stack+0x45/0x70
[   15.348000]  kasan_save_track+0x18/0x40
[   15.348340]  kasan_save_alloc_info+0x3b/0x50
[   15.348652]  __kasan_kmalloc+0xb7/0xc0
[   15.348971]  __kmalloc_cache_noprof+0x168/0x350
[   15.349347]  kasan_atomics+0x96/0x310
[   15.349662]  kunit_try_run_case+0x1a6/0x480
[   15.350025]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.350391]  kthread+0x257/0x310
[   15.350691]  ret_from_fork+0x41/0x80
[   15.350915]  ret_from_fork_asm+0x1a/0x30
[   15.351257] 
[   15.351400] The buggy address belongs to the object at ffff888102635000
[   15.351400]  which belongs to the cache kmalloc-64 of size 64
[   15.351829] The buggy address is located 0 bytes to the right of
[   15.351829]  allocated 48-byte region [ffff888102635000, ffff888102635030)
[   15.352673] 
[   15.352776] The buggy address belongs to the physical page:
[   15.353179] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102635
[   15.353571] flags: 0x200000000000000(node=0|zone=2)
[   15.353945] page_type: f5(slab)
[   15.354273] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.354706] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   15.355242] page dumped because: kasan: bad access detected
[   15.355519] 
[   15.355689] Memory state around the buggy address:
[   15.355952]  ffff888102634f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.356247]  ffff888102634f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.356739] >ffff888102635000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.357120]                                      ^
[   15.357425]  ffff888102635080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.357849]  ffff888102635100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.358387] ==================================================================
[   15.774817] ==================================================================
[   15.775214] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1f44/0x5450
[   15.775508] Write of size 8 at addr ffff888102635030 by task kunit_try_catch/270
[   15.775868] 
[   15.776054] CPU: 0 UID: 0 PID: 270 Comm: kunit_try_catch Tainted: G    B            N 6.12.32-rc1 #1
[   15.776171] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.776198] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.776241] Call Trace:
[   15.776284]  <TASK>
[   15.776320]  dump_stack_lvl+0x73/0xb0
[   15.776379]  print_report+0xd1/0x640
[   15.776425]  ? __virt_addr_valid+0x1db/0x2d0
[   15.776475]  ? kasan_atomics_helper+0x1f44/0x5450
[   15.776521]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.776571]  ? kasan_atomics_helper+0x1f44/0x5450
[   15.776622]  kasan_report+0x140/0x180
[   15.776680]  ? kasan_atomics_helper+0x1f44/0x5450
[   15.776765]  kasan_check_range+0x10c/0x1c0
[   15.776799]  __kasan_check_write+0x18/0x20
[   15.776838]  kasan_atomics_helper+0x1f44/0x5450
[   15.776876]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.776916]  ? __kmalloc_cache_noprof+0x168/0x350
[   15.776957]  kasan_atomics+0x1dd/0x310
[   15.776986]  ? __pfx_kasan_atomics+0x10/0x10
[   15.777016]  ? __pfx_read_tsc+0x10/0x10
[   15.777044]  ? ktime_get_ts64+0x84/0x230
[   15.778933]  kunit_try_run_case+0x1a6/0x480
[   15.779011]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.779090]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   15.779143]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.779198]  ? __kthread_parkme+0x82/0x160
[   15.779243]  ? preempt_count_sub+0x50/0x80
[   15.779294]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.779338]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.779393]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.779437]  kthread+0x257/0x310
[   15.779458]  ? __pfx_kthread+0x10/0x10
[   15.779479]  ret_from_fork+0x41/0x80
[   15.779499]  ? __pfx_kthread+0x10/0x10
[   15.779518]  ret_from_fork_asm+0x1a/0x30
[   15.779549]  </TASK>
[   15.779563] 
[   15.787887] Allocated by task 270:
[   15.788123]  kasan_save_stack+0x45/0x70
[   15.788357]  kasan_save_track+0x18/0x40
[   15.788553]  kasan_save_alloc_info+0x3b/0x50
[   15.788843]  __kasan_kmalloc+0xb7/0xc0
[   15.789141]  __kmalloc_cache_noprof+0x168/0x350
[   15.789492]  kasan_atomics+0x96/0x310
[   15.789816]  kunit_try_run_case+0x1a6/0x480
[   15.790187]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.790583]  kthread+0x257/0x310
[   15.790849]  ret_from_fork+0x41/0x80
[   15.791110]  ret_from_fork_asm+0x1a/0x30
[   15.791350] 
[   15.791509] The buggy address belongs to the object at ffff888102635000
[   15.791509]  which belongs to the cache kmalloc-64 of size 64
[   15.792040] The buggy address is located 0 bytes to the right of
[   15.792040]  allocated 48-byte region [ffff888102635000, ffff888102635030)
[   15.792485] 
[   15.792598] The buggy address belongs to the physical page:
[   15.792805] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102635
[   15.793122] flags: 0x200000000000000(node=0|zone=2)
[   15.793484] page_type: f5(slab)
[   15.793781] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.794338] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   15.794840] page dumped because: kasan: bad access detected
[   15.795247] 
[   15.795408] Memory state around the buggy address:
[   15.795685]  ffff888102634f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.796030]  ffff888102634f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.796426] >ffff888102635000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.796892]                                      ^
[   15.797532]  ffff888102635080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.798424]  ffff888102635100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.798701] ==================================================================
[   14.870219] ==================================================================
[   14.870775] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xc71/0x5450
[   14.871306] Write of size 4 at addr ffff888102635030 by task kunit_try_catch/270
[   14.871805] 
[   14.871985] CPU: 0 UID: 0 PID: 270 Comm: kunit_try_catch Tainted: G    B            N 6.12.32-rc1 #1
[   14.872081] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.872108] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.872144] Call Trace:
[   14.872181]  <TASK>
[   14.872207]  dump_stack_lvl+0x73/0xb0
[   14.872279]  print_report+0xd1/0x640
[   14.872328]  ? __virt_addr_valid+0x1db/0x2d0
[   14.872373]  ? kasan_atomics_helper+0xc71/0x5450
[   14.872419]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.872468]  ? kasan_atomics_helper+0xc71/0x5450
[   14.872513]  kasan_report+0x140/0x180
[   14.872554]  ? kasan_atomics_helper+0xc71/0x5450
[   14.872604]  kasan_check_range+0x10c/0x1c0
[   14.872646]  __kasan_check_write+0x18/0x20
[   14.872698]  kasan_atomics_helper+0xc71/0x5450
[   14.872747]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.872791]  ? __kmalloc_cache_noprof+0x168/0x350
[   14.872836]  kasan_atomics+0x1dd/0x310
[   14.872875]  ? __pfx_kasan_atomics+0x10/0x10
[   14.872923]  ? __pfx_read_tsc+0x10/0x10
[   14.872962]  ? ktime_get_ts64+0x84/0x230
[   14.873028]  kunit_try_run_case+0x1a6/0x480
[   14.873102]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.873151]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   14.873208]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.873255]  ? __kthread_parkme+0x82/0x160
[   14.873295]  ? preempt_count_sub+0x50/0x80
[   14.873346]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.873389]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.873450]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.873499]  kthread+0x257/0x310
[   14.873537]  ? __pfx_kthread+0x10/0x10
[   14.873574]  ret_from_fork+0x41/0x80
[   14.873625]  ? __pfx_kthread+0x10/0x10
[   14.873681]  ret_from_fork_asm+0x1a/0x30
[   14.873739]  </TASK>
[   14.873764] 
[   14.881518] Allocated by task 270:
[   14.881813]  kasan_save_stack+0x45/0x70
[   14.882204]  kasan_save_track+0x18/0x40
[   14.882533]  kasan_save_alloc_info+0x3b/0x50
[   14.882883]  __kasan_kmalloc+0xb7/0xc0
[   14.883251]  __kmalloc_cache_noprof+0x168/0x350
[   14.883596]  kasan_atomics+0x96/0x310
[   14.883829]  kunit_try_run_case+0x1a6/0x480
[   14.884161]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.884511]  kthread+0x257/0x310
[   14.884692]  ret_from_fork+0x41/0x80
[   14.884904]  ret_from_fork_asm+0x1a/0x30
[   14.885189] 
[   14.885298] The buggy address belongs to the object at ffff888102635000
[   14.885298]  which belongs to the cache kmalloc-64 of size 64
[   14.886001] The buggy address is located 0 bytes to the right of
[   14.886001]  allocated 48-byte region [ffff888102635000, ffff888102635030)
[   14.886707] 
[   14.886894] The buggy address belongs to the physical page:
[   14.887249] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102635
[   14.887717] flags: 0x200000000000000(node=0|zone=2)
[   14.888091] page_type: f5(slab)
[   14.888352] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.888723] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   14.889209] page dumped because: kasan: bad access detected
[   14.889515] 
[   14.889644] Memory state around the buggy address:
[   14.889992]  ffff888102634f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.890360]  ffff888102634f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.890712] >ffff888102635000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.890958]                                      ^
[   14.891172]  ffff888102635080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.891411]  ffff888102635100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.891637] ==================================================================
[   15.112912] ==================================================================
[   15.113418] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1149/0x5450
[   15.114635] Write of size 4 at addr ffff888102635030 by task kunit_try_catch/270
[   15.115043] 
[   15.115208] CPU: 0 UID: 0 PID: 270 Comm: kunit_try_catch Tainted: G    B            N 6.12.32-rc1 #1
[   15.115290] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.115318] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.115360] Call Trace:
[   15.115394]  <TASK>
[   15.115423]  dump_stack_lvl+0x73/0xb0
[   15.115476]  print_report+0xd1/0x640
[   15.115520]  ? __virt_addr_valid+0x1db/0x2d0
[   15.115567]  ? kasan_atomics_helper+0x1149/0x5450
[   15.115615]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.115672]  ? kasan_atomics_helper+0x1149/0x5450
[   15.115724]  kasan_report+0x140/0x180
[   15.115777]  ? kasan_atomics_helper+0x1149/0x5450
[   15.115838]  kasan_check_range+0x10c/0x1c0
[   15.115884]  __kasan_check_write+0x18/0x20
[   15.115923]  kasan_atomics_helper+0x1149/0x5450
[   15.115968]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.116006]  ? __kmalloc_cache_noprof+0x168/0x350
[   15.116053]  kasan_atomics+0x1dd/0x310
[   15.116092]  ? __pfx_kasan_atomics+0x10/0x10
[   15.116132]  ? __pfx_read_tsc+0x10/0x10
[   15.116170]  ? ktime_get_ts64+0x84/0x230
[   15.116221]  kunit_try_run_case+0x1a6/0x480
[   15.116265]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.116307]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   15.116348]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.116397]  ? __kthread_parkme+0x82/0x160
[   15.116438]  ? preempt_count_sub+0x50/0x80
[   15.116488]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.116528]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.116569]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.116609]  kthread+0x257/0x310
[   15.116641]  ? __pfx_kthread+0x10/0x10
[   15.116716]  ret_from_fork+0x41/0x80
[   15.116763]  ? __pfx_kthread+0x10/0x10
[   15.116806]  ret_from_fork_asm+0x1a/0x30
[   15.116870]  </TASK>
[   15.116897] 
[   15.124294] Allocated by task 270:
[   15.124530]  kasan_save_stack+0x45/0x70
[   15.124809]  kasan_save_track+0x18/0x40
[   15.125044]  kasan_save_alloc_info+0x3b/0x50
[   15.125372]  __kasan_kmalloc+0xb7/0xc0
[   15.125570]  __kmalloc_cache_noprof+0x168/0x350
[   15.125773]  kasan_atomics+0x96/0x310
[   15.125955]  kunit_try_run_case+0x1a6/0x480
[   15.126183]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.126399]  kthread+0x257/0x310
[   15.126597]  ret_from_fork+0x41/0x80
[   15.126893]  ret_from_fork_asm+0x1a/0x30
[   15.127240] 
[   15.127402] The buggy address belongs to the object at ffff888102635000
[   15.127402]  which belongs to the cache kmalloc-64 of size 64
[   15.128210] The buggy address is located 0 bytes to the right of
[   15.128210]  allocated 48-byte region [ffff888102635000, ffff888102635030)
[   15.129004] 
[   15.129188] The buggy address belongs to the physical page:
[   15.129430] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102635
[   15.129835] flags: 0x200000000000000(node=0|zone=2)
[   15.130172] page_type: f5(slab)
[   15.130380] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.130804] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   15.131200] page dumped because: kasan: bad access detected
[   15.131472] 
[   15.131613] Memory state around the buggy address:
[   15.131807]  ffff888102634f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.132048]  ffff888102634f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.132313] >ffff888102635000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.132597]                                      ^
[   15.132930]  ffff888102635080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.133459]  ffff888102635100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.133989] ==================================================================
[   15.234088] ==================================================================
[   15.234556] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x49d0/0x5450
[   15.234982] Read of size 4 at addr ffff888102635030 by task kunit_try_catch/270
[   15.235417] 
[   15.235645] CPU: 0 UID: 0 PID: 270 Comm: kunit_try_catch Tainted: G    B            N 6.12.32-rc1 #1
[   15.235744] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.235773] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.235816] Call Trace:
[   15.235854]  <TASK>
[   15.235888]  dump_stack_lvl+0x73/0xb0
[   15.235950]  print_report+0xd1/0x640
[   15.236001]  ? __virt_addr_valid+0x1db/0x2d0
[   15.236051]  ? kasan_atomics_helper+0x49d0/0x5450
[   15.236095]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.236146]  ? kasan_atomics_helper+0x49d0/0x5450
[   15.236197]  kasan_report+0x140/0x180
[   15.236249]  ? kasan_atomics_helper+0x49d0/0x5450
[   15.236310]  __asan_report_load4_noabort+0x18/0x20
[   15.236358]  kasan_atomics_helper+0x49d0/0x5450
[   15.236404]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.236449]  ? __kmalloc_cache_noprof+0x168/0x350
[   15.236503]  kasan_atomics+0x1dd/0x310
[   15.236547]  ? __pfx_kasan_atomics+0x10/0x10
[   15.236594]  ? __pfx_read_tsc+0x10/0x10
[   15.236630]  ? ktime_get_ts64+0x84/0x230
[   15.236712]  kunit_try_run_case+0x1a6/0x480
[   15.236763]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.236840]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   15.236900]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.236954]  ? __kthread_parkme+0x82/0x160
[   15.236999]  ? preempt_count_sub+0x50/0x80
[   15.237050]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.237092]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.237146]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.237203]  kthread+0x257/0x310
[   15.237246]  ? __pfx_kthread+0x10/0x10
[   15.237291]  ret_from_fork+0x41/0x80
[   15.237599]  ? __pfx_kthread+0x10/0x10
[   15.237680]  ret_from_fork_asm+0x1a/0x30
[   15.237748]  </TASK>
[   15.237778] 
[   15.246417] Allocated by task 270:
[   15.246747]  kasan_save_stack+0x45/0x70
[   15.247106]  kasan_save_track+0x18/0x40
[   15.247336]  kasan_save_alloc_info+0x3b/0x50
[   15.247530]  __kasan_kmalloc+0xb7/0xc0
[   15.247716]  __kmalloc_cache_noprof+0x168/0x350
[   15.248081]  kasan_atomics+0x96/0x310
[   15.248382]  kunit_try_run_case+0x1a6/0x480
[   15.248711]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.249101]  kthread+0x257/0x310
[   15.249261]  ret_from_fork+0x41/0x80
[   15.249425]  ret_from_fork_asm+0x1a/0x30
[   15.249735] 
[   15.249887] The buggy address belongs to the object at ffff888102635000
[   15.249887]  which belongs to the cache kmalloc-64 of size 64
[   15.250676] The buggy address is located 0 bytes to the right of
[   15.250676]  allocated 48-byte region [ffff888102635000, ffff888102635030)
[   15.251099] 
[   15.251260] The buggy address belongs to the physical page:
[   15.251629] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102635
[   15.252168] flags: 0x200000000000000(node=0|zone=2)
[   15.252531] page_type: f5(slab)
[   15.252777] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.253035] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   15.253500] page dumped because: kasan: bad access detected
[   15.253758] 
[   15.253863] Memory state around the buggy address:
[   15.254229]  ffff888102634f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.254488]  ffff888102634f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.254946] >ffff888102635000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.255431]                                      ^
[   15.255639]  ffff888102635080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.255983]  ffff888102635100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.256400] ==================================================================
[   14.460284] ==================================================================
[   14.460574] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b70/0x5450
[   14.460859] Write of size 4 at addr ffff888102635030 by task kunit_try_catch/270
[   14.461804] 
[   14.462044] CPU: 0 UID: 0 PID: 270 Comm: kunit_try_catch Tainted: G    B            N 6.12.32-rc1 #1
[   14.462154] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.462190] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.462451] Call Trace:
[   14.462484]  <TASK>
[   14.462509]  dump_stack_lvl+0x73/0xb0
[   14.462559]  print_report+0xd1/0x640
[   14.462594]  ? __virt_addr_valid+0x1db/0x2d0
[   14.462635]  ? kasan_atomics_helper+0x4b70/0x5450
[   14.462687]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.462729]  ? kasan_atomics_helper+0x4b70/0x5450
[   14.462774]  kasan_report+0x140/0x180
[   14.462813]  ? kasan_atomics_helper+0x4b70/0x5450
[   14.462857]  __asan_report_store4_noabort+0x1b/0x30
[   14.462887]  kasan_atomics_helper+0x4b70/0x5450
[   14.462923]  ? kasan_save_alloc_info+0x3b/0x50
[   14.462959]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.463003]  ? __kmalloc_cache_noprof+0x168/0x350
[   14.463058]  kasan_atomics+0x1dd/0x310
[   14.463096]  ? __pfx_kasan_atomics+0x10/0x10
[   14.463139]  ? __pfx_read_tsc+0x10/0x10
[   14.463178]  ? ktime_get_ts64+0x84/0x230
[   14.463243]  kunit_try_run_case+0x1a6/0x480
[   14.463275]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.463306]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   14.463336]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.463360]  ? __kthread_parkme+0x82/0x160
[   14.463380]  ? preempt_count_sub+0x50/0x80
[   14.463401]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.463420]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.463445]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.463469]  kthread+0x257/0x310
[   14.463487]  ? __pfx_kthread+0x10/0x10
[   14.463505]  ret_from_fork+0x41/0x80
[   14.463524]  ? __pfx_kthread+0x10/0x10
[   14.463542]  ret_from_fork_asm+0x1a/0x30
[   14.463571]  </TASK>
[   14.463583] 
[   14.474767] Allocated by task 270:
[   14.474961]  kasan_save_stack+0x45/0x70
[   14.475164]  kasan_save_track+0x18/0x40
[   14.475459]  kasan_save_alloc_info+0x3b/0x50
[   14.476042]  __kasan_kmalloc+0xb7/0xc0
[   14.476478]  __kmalloc_cache_noprof+0x168/0x350
[   14.476813]  kasan_atomics+0x96/0x310
[   14.477299]  kunit_try_run_case+0x1a6/0x480
[   14.477576]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.477863]  kthread+0x257/0x310
[   14.478333]  ret_from_fork+0x41/0x80
[   14.478571]  ret_from_fork_asm+0x1a/0x30
[   14.478812] 
[   14.478988] The buggy address belongs to the object at ffff888102635000
[   14.478988]  which belongs to the cache kmalloc-64 of size 64
[   14.479940] The buggy address is located 0 bytes to the right of
[   14.479940]  allocated 48-byte region [ffff888102635000, ffff888102635030)
[   14.480714] 
[   14.480917] The buggy address belongs to the physical page:
[   14.481402] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102635
[   14.481965] flags: 0x200000000000000(node=0|zone=2)
[   14.482492] page_type: f5(slab)
[   14.482722] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.483246] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   14.484067] page dumped because: kasan: bad access detected
[   14.484605] 
[   14.484755] Memory state around the buggy address:
[   14.484943]  ffff888102634f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.485577]  ffff888102634f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.485990] >ffff888102635000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.486550]                                      ^
[   14.486854]  ffff888102635080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.487602]  ffff888102635100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.487986] ==================================================================
[   14.940678] ==================================================================
[   14.941035] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xde1/0x5450
[   14.941472] Write of size 4 at addr ffff888102635030 by task kunit_try_catch/270
[   14.941955] 
[   14.942147] CPU: 0 UID: 0 PID: 270 Comm: kunit_try_catch Tainted: G    B            N 6.12.32-rc1 #1
[   14.942234] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.942262] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.942318] Call Trace:
[   14.942350]  <TASK>
[   14.942379]  dump_stack_lvl+0x73/0xb0
[   14.942443]  print_report+0xd1/0x640
[   14.942491]  ? __virt_addr_valid+0x1db/0x2d0
[   14.942560]  ? kasan_atomics_helper+0xde1/0x5450
[   14.942602]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.942672]  ? kasan_atomics_helper+0xde1/0x5450
[   14.942723]  kasan_report+0x140/0x180
[   14.942772]  ? kasan_atomics_helper+0xde1/0x5450
[   14.942827]  kasan_check_range+0x10c/0x1c0
[   14.942862]  __kasan_check_write+0x18/0x20
[   14.942896]  kasan_atomics_helper+0xde1/0x5450
[   14.942943]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.942997]  ? __kmalloc_cache_noprof+0x168/0x350
[   14.943049]  kasan_atomics+0x1dd/0x310
[   14.943119]  ? __pfx_kasan_atomics+0x10/0x10
[   14.943162]  ? __pfx_read_tsc+0x10/0x10
[   14.943198]  ? ktime_get_ts64+0x84/0x230
[   14.943249]  kunit_try_run_case+0x1a6/0x480
[   14.943303]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.943357]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   14.943399]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.943445]  ? __kthread_parkme+0x82/0x160
[   14.943491]  ? preempt_count_sub+0x50/0x80
[   14.943538]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.943592]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.943640]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.943706]  kthread+0x257/0x310
[   14.943745]  ? __pfx_kthread+0x10/0x10
[   14.943799]  ret_from_fork+0x41/0x80
[   14.943839]  ? __pfx_kthread+0x10/0x10
[   14.943879]  ret_from_fork_asm+0x1a/0x30
[   14.943932]  </TASK>
[   14.943962] 
[   14.951442] Allocated by task 270:
[   14.951619]  kasan_save_stack+0x45/0x70
[   14.951813]  kasan_save_track+0x18/0x40
[   14.952221]  kasan_save_alloc_info+0x3b/0x50
[   14.952556]  __kasan_kmalloc+0xb7/0xc0
[   14.952854]  __kmalloc_cache_noprof+0x168/0x350
[   14.953250]  kasan_atomics+0x96/0x310
[   14.953544]  kunit_try_run_case+0x1a6/0x480
[   14.953879]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.954373]  kthread+0x257/0x310
[   14.954584]  ret_from_fork+0x41/0x80
[   14.954777]  ret_from_fork_asm+0x1a/0x30
[   14.954961] 
[   14.955064] The buggy address belongs to the object at ffff888102635000
[   14.955064]  which belongs to the cache kmalloc-64 of size 64
[   14.955931] The buggy address is located 0 bytes to the right of
[   14.955931]  allocated 48-byte region [ffff888102635000, ffff888102635030)
[   14.956810] 
[   14.956925] The buggy address belongs to the physical page:
[   14.957675] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102635
[   14.958766] flags: 0x200000000000000(node=0|zone=2)
[   14.959490] page_type: f5(slab)
[   14.960144] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.960712] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   14.961121] page dumped because: kasan: bad access detected
[   14.961474] 
[   14.961607] Memory state around the buggy address:
[   14.961882]  ffff888102634f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.962322]  ffff888102634f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.962747] >ffff888102635000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.963045]                                      ^
[   14.963365]  ffff888102635080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.963804]  ffff888102635100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.964119] ==================================================================
[   15.612550] ==================================================================
[   15.612928] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1b23/0x5450
[   15.613355] Write of size 8 at addr ffff888102635030 by task kunit_try_catch/270
[   15.613836] 
[   15.614005] CPU: 0 UID: 0 PID: 270 Comm: kunit_try_catch Tainted: G    B            N 6.12.32-rc1 #1
[   15.614123] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.614151] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.614205] Call Trace:
[   15.614253]  <TASK>
[   15.614287]  dump_stack_lvl+0x73/0xb0
[   15.614379]  print_report+0xd1/0x640
[   15.614417]  ? __virt_addr_valid+0x1db/0x2d0
[   15.614454]  ? kasan_atomics_helper+0x1b23/0x5450
[   15.614490]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.614523]  ? kasan_atomics_helper+0x1b23/0x5450
[   15.614560]  kasan_report+0x140/0x180
[   15.614601]  ? kasan_atomics_helper+0x1b23/0x5450
[   15.614651]  kasan_check_range+0x10c/0x1c0
[   15.614703]  __kasan_check_write+0x18/0x20
[   15.614746]  kasan_atomics_helper+0x1b23/0x5450
[   15.614792]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.614830]  ? __kmalloc_cache_noprof+0x168/0x350
[   15.614867]  kasan_atomics+0x1dd/0x310
[   15.614888]  ? __pfx_kasan_atomics+0x10/0x10
[   15.614912]  ? __pfx_read_tsc+0x10/0x10
[   15.614944]  ? ktime_get_ts64+0x84/0x230
[   15.614992]  kunit_try_run_case+0x1a6/0x480
[   15.615037]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.615090]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   15.615134]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.615177]  ? __kthread_parkme+0x82/0x160
[   15.615210]  ? preempt_count_sub+0x50/0x80
[   15.615247]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.615283]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.615330]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.615381]  kthread+0x257/0x310
[   15.615422]  ? __pfx_kthread+0x10/0x10
[   15.615465]  ret_from_fork+0x41/0x80
[   15.615506]  ? __pfx_kthread+0x10/0x10
[   15.615547]  ret_from_fork_asm+0x1a/0x30
[   15.615611]  </TASK>
[   15.615638] 
[   15.625212] Allocated by task 270:
[   15.625389]  kasan_save_stack+0x45/0x70
[   15.625700]  kasan_save_track+0x18/0x40
[   15.626020]  kasan_save_alloc_info+0x3b/0x50
[   15.626404]  __kasan_kmalloc+0xb7/0xc0
[   15.626592]  __kmalloc_cache_noprof+0x168/0x350
[   15.626891]  kasan_atomics+0x96/0x310
[   15.627111]  kunit_try_run_case+0x1a6/0x480
[   15.627405]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.627715]  kthread+0x257/0x310
[   15.627877]  ret_from_fork+0x41/0x80
[   15.628042]  ret_from_fork_asm+0x1a/0x30
[   15.628374] 
[   15.628535] The buggy address belongs to the object at ffff888102635000
[   15.628535]  which belongs to the cache kmalloc-64 of size 64
[   15.629197] The buggy address is located 0 bytes to the right of
[   15.629197]  allocated 48-byte region [ffff888102635000, ffff888102635030)
[   15.629697] 
[   15.629804] The buggy address belongs to the physical page:
[   15.630199] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102635
[   15.630722] flags: 0x200000000000000(node=0|zone=2)
[   15.630959] page_type: f5(slab)
[   15.631253] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.631606] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   15.631947] page dumped because: kasan: bad access detected
[   15.632264] 
[   15.632382] Memory state around the buggy address:
[   15.632561]  ffff888102634f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.632802]  ffff888102634f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.633032] >ffff888102635000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.633459]                                      ^
[   15.633788]  ffff888102635080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.634320]  ffff888102635100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.634699] ==================================================================
[   15.090763] ==================================================================
[   15.091191] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a1e/0x5450
[   15.091580] Read of size 4 at addr ffff888102635030 by task kunit_try_catch/270
[   15.091825] 
[   15.091975] CPU: 0 UID: 0 PID: 270 Comm: kunit_try_catch Tainted: G    B            N 6.12.32-rc1 #1
[   15.092054] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.092080] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.092122] Call Trace:
[   15.092157]  <TASK>
[   15.092187]  dump_stack_lvl+0x73/0xb0
[   15.092243]  print_report+0xd1/0x640
[   15.092293]  ? __virt_addr_valid+0x1db/0x2d0
[   15.092338]  ? kasan_atomics_helper+0x4a1e/0x5450
[   15.092381]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.092419]  ? kasan_atomics_helper+0x4a1e/0x5450
[   15.092462]  kasan_report+0x140/0x180
[   15.092502]  ? kasan_atomics_helper+0x4a1e/0x5450
[   15.092549]  __asan_report_load4_noabort+0x18/0x20
[   15.092590]  kasan_atomics_helper+0x4a1e/0x5450
[   15.092637]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.092735]  ? __kmalloc_cache_noprof+0x168/0x350
[   15.092804]  kasan_atomics+0x1dd/0x310
[   15.092848]  ? __pfx_kasan_atomics+0x10/0x10
[   15.092891]  ? __pfx_read_tsc+0x10/0x10
[   15.092930]  ? ktime_get_ts64+0x84/0x230
[   15.092993]  kunit_try_run_case+0x1a6/0x480
[   15.093079]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.093116]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   15.093141]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.093168]  ? __kthread_parkme+0x82/0x160
[   15.093190]  ? preempt_count_sub+0x50/0x80
[   15.093213]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.093240]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.093282]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.093329]  kthread+0x257/0x310
[   15.093365]  ? __pfx_kthread+0x10/0x10
[   15.093412]  ret_from_fork+0x41/0x80
[   15.093451]  ? __pfx_kthread+0x10/0x10
[   15.093505]  ret_from_fork_asm+0x1a/0x30
[   15.093564]  </TASK>
[   15.093589] 
[   15.101449] Allocated by task 270:
[   15.101634]  kasan_save_stack+0x45/0x70
[   15.102010]  kasan_save_track+0x18/0x40
[   15.102372]  kasan_save_alloc_info+0x3b/0x50
[   15.102713]  __kasan_kmalloc+0xb7/0xc0
[   15.103009]  __kmalloc_cache_noprof+0x168/0x350
[   15.103382]  kasan_atomics+0x96/0x310
[   15.103611]  kunit_try_run_case+0x1a6/0x480
[   15.103910]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.104153]  kthread+0x257/0x310
[   15.104317]  ret_from_fork+0x41/0x80
[   15.104491]  ret_from_fork_asm+0x1a/0x30
[   15.104745] 
[   15.104915] The buggy address belongs to the object at ffff888102635000
[   15.104915]  which belongs to the cache kmalloc-64 of size 64
[   15.105707] The buggy address is located 0 bytes to the right of
[   15.105707]  allocated 48-byte region [ffff888102635000, ffff888102635030)
[   15.106609] 
[   15.106812] The buggy address belongs to the physical page:
[   15.107233] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102635
[   15.107586] flags: 0x200000000000000(node=0|zone=2)
[   15.107930] page_type: f5(slab)
[   15.108190] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.108619] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   15.108964] page dumped because: kasan: bad access detected
[   15.109281] 
[   15.109479] Memory state around the buggy address:
[   15.109745]  ffff888102634f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.110186]  ffff888102634f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.110437] >ffff888102635000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.110680]                                      ^
[   15.111043]  ffff888102635080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.111541]  ffff888102635100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.112005] ==================================================================
[   14.570710] ==================================================================
[   14.571227] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b3c/0x5450
[   14.571749] Write of size 4 at addr ffff888102635030 by task kunit_try_catch/270
[   14.572306] 
[   14.572489] CPU: 0 UID: 0 PID: 270 Comm: kunit_try_catch Tainted: G    B            N 6.12.32-rc1 #1
[   14.572577] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.572601] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.572644] Call Trace:
[   14.572691]  <TASK>
[   14.572726]  dump_stack_lvl+0x73/0xb0
[   14.572783]  print_report+0xd1/0x640
[   14.572834]  ? __virt_addr_valid+0x1db/0x2d0
[   14.572883]  ? kasan_atomics_helper+0x4b3c/0x5450
[   14.572931]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.572978]  ? kasan_atomics_helper+0x4b3c/0x5450
[   14.573026]  kasan_report+0x140/0x180
[   14.573103]  ? kasan_atomics_helper+0x4b3c/0x5450
[   14.573165]  __asan_report_store4_noabort+0x1b/0x30
[   14.573213]  kasan_atomics_helper+0x4b3c/0x5450
[   14.573258]  ? kasan_save_alloc_info+0x3b/0x50
[   14.573297]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.573337]  ? __kmalloc_cache_noprof+0x168/0x350
[   14.573377]  kasan_atomics+0x1dd/0x310
[   14.573412]  ? __pfx_kasan_atomics+0x10/0x10
[   14.573447]  ? __pfx_read_tsc+0x10/0x10
[   14.573476]  ? ktime_get_ts64+0x84/0x230
[   14.573520]  kunit_try_run_case+0x1a6/0x480
[   14.573560]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.573595]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   14.573632]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.573689]  ? __kthread_parkme+0x82/0x160
[   14.573724]  ? preempt_count_sub+0x50/0x80
[   14.573765]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.573803]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.573844]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.573888]  kthread+0x257/0x310
[   14.573938]  ? __pfx_kthread+0x10/0x10
[   14.573979]  ret_from_fork+0x41/0x80
[   14.574022]  ? __pfx_kthread+0x10/0x10
[   14.574096]  ret_from_fork_asm+0x1a/0x30
[   14.574164]  </TASK>
[   14.574192] 
[   14.588809] Allocated by task 270:
[   14.589060]  kasan_save_stack+0x45/0x70
[   14.589690]  kasan_save_track+0x18/0x40
[   14.590264]  kasan_save_alloc_info+0x3b/0x50
[   14.590584]  __kasan_kmalloc+0xb7/0xc0
[   14.590814]  __kmalloc_cache_noprof+0x168/0x350
[   14.591072]  kasan_atomics+0x96/0x310
[   14.591619]  kunit_try_run_case+0x1a6/0x480
[   14.591786]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.592247]  kthread+0x257/0x310
[   14.592536]  ret_from_fork+0x41/0x80
[   14.592820]  ret_from_fork_asm+0x1a/0x30
[   14.593017] 
[   14.593558] The buggy address belongs to the object at ffff888102635000
[   14.593558]  which belongs to the cache kmalloc-64 of size 64
[   14.594322] The buggy address is located 0 bytes to the right of
[   14.594322]  allocated 48-byte region [ffff888102635000, ffff888102635030)
[   14.594940] 
[   14.595321] The buggy address belongs to the physical page:
[   14.595670] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102635
[   14.596053] flags: 0x200000000000000(node=0|zone=2)
[   14.596635] page_type: f5(slab)
[   14.596881] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.597543] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   14.598020] page dumped because: kasan: bad access detected
[   14.598465] 
[   14.598627] Memory state around the buggy address:
[   14.598875]  ffff888102634f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.599461]  ffff888102634f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.599814] >ffff888102635000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.600287]                                      ^
[   14.600633]  ffff888102635080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.600978]  ffff888102635100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.601614] ==================================================================
[   15.013360] ==================================================================
[   15.013796] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xfaa/0x5450
[   15.014344] Write of size 4 at addr ffff888102635030 by task kunit_try_catch/270
[   15.014530] 
[   15.014622] CPU: 0 UID: 0 PID: 270 Comm: kunit_try_catch Tainted: G    B            N 6.12.32-rc1 #1
[   15.014695] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.014716] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.014746] Call Trace:
[   15.014772]  <TASK>
[   15.014796]  dump_stack_lvl+0x73/0xb0
[   15.014839]  print_report+0xd1/0x640
[   15.014874]  ? __virt_addr_valid+0x1db/0x2d0
[   15.014910]  ? kasan_atomics_helper+0xfaa/0x5450
[   15.014944]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.014984]  ? kasan_atomics_helper+0xfaa/0x5450
[   15.015022]  kasan_report+0x140/0x180
[   15.015114]  ? kasan_atomics_helper+0xfaa/0x5450
[   15.015185]  kasan_check_range+0x10c/0x1c0
[   15.015231]  __kasan_check_write+0x18/0x20
[   15.015274]  kasan_atomics_helper+0xfaa/0x5450
[   15.015320]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.015370]  ? __kmalloc_cache_noprof+0x168/0x350
[   15.015428]  kasan_atomics+0x1dd/0x310
[   15.015474]  ? __pfx_kasan_atomics+0x10/0x10
[   15.015520]  ? __pfx_read_tsc+0x10/0x10
[   15.015560]  ? ktime_get_ts64+0x84/0x230
[   15.015619]  kunit_try_run_case+0x1a6/0x480
[   15.015659]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.015709]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   15.015747]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.015796]  ? __kthread_parkme+0x82/0x160
[   15.015837]  ? preempt_count_sub+0x50/0x80
[   15.015884]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.015925]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.015996]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.016049]  kthread+0x257/0x310
[   15.016113]  ? __pfx_kthread+0x10/0x10
[   15.016154]  ret_from_fork+0x41/0x80
[   15.016195]  ? __pfx_kthread+0x10/0x10
[   15.016236]  ret_from_fork_asm+0x1a/0x30
[   15.016299]  </TASK>
[   15.016325] 
[   15.026391] Allocated by task 270:
[   15.026609]  kasan_save_stack+0x45/0x70
[   15.026964]  kasan_save_track+0x18/0x40
[   15.027226]  kasan_save_alloc_info+0x3b/0x50
[   15.027507]  __kasan_kmalloc+0xb7/0xc0
[   15.027823]  __kmalloc_cache_noprof+0x168/0x350
[   15.028044]  kasan_atomics+0x96/0x310
[   15.028269]  kunit_try_run_case+0x1a6/0x480
[   15.028611]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.029014]  kthread+0x257/0x310
[   15.029296]  ret_from_fork+0x41/0x80
[   15.029545]  ret_from_fork_asm+0x1a/0x30
[   15.029820] 
[   15.029999] The buggy address belongs to the object at ffff888102635000
[   15.029999]  which belongs to the cache kmalloc-64 of size 64
[   15.030572] The buggy address is located 0 bytes to the right of
[   15.030572]  allocated 48-byte region [ffff888102635000, ffff888102635030)
[   15.031093] 
[   15.031227] The buggy address belongs to the physical page:
[   15.031621] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102635
[   15.032128] flags: 0x200000000000000(node=0|zone=2)
[   15.032456] page_type: f5(slab)
[   15.032700] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.033127] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   15.033477] page dumped because: kasan: bad access detected
[   15.033835] 
[   15.034024] Memory state around the buggy address:
[   15.034281]  ffff888102634f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.034674]  ffff888102634f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.035049] >ffff888102635000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.035536]                                      ^
[   15.035803]  ffff888102635080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.036250]  ffff888102635100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.036607] ==================================================================
[   15.659510] ==================================================================
[   15.660065] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4f32/0x5450
[   15.660648] Read of size 8 at addr ffff888102635030 by task kunit_try_catch/270
[   15.661620] 
[   15.661868] CPU: 0 UID: 0 PID: 270 Comm: kunit_try_catch Tainted: G    B            N 6.12.32-rc1 #1
[   15.661978] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.662006] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.662046] Call Trace:
[   15.662099]  <TASK>
[   15.662134]  dump_stack_lvl+0x73/0xb0
[   15.662193]  print_report+0xd1/0x640
[   15.662236]  ? __virt_addr_valid+0x1db/0x2d0
[   15.662267]  ? kasan_atomics_helper+0x4f32/0x5450
[   15.662292]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.662317]  ? kasan_atomics_helper+0x4f32/0x5450
[   15.662342]  kasan_report+0x140/0x180
[   15.662368]  ? kasan_atomics_helper+0x4f32/0x5450
[   15.662398]  __asan_report_load8_noabort+0x18/0x20
[   15.662420]  kasan_atomics_helper+0x4f32/0x5450
[   15.662446]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.662472]  ? __kmalloc_cache_noprof+0x168/0x350
[   15.662499]  kasan_atomics+0x1dd/0x310
[   15.662521]  ? __pfx_kasan_atomics+0x10/0x10
[   15.662543]  ? __pfx_read_tsc+0x10/0x10
[   15.662563]  ? ktime_get_ts64+0x84/0x230
[   15.662592]  kunit_try_run_case+0x1a6/0x480
[   15.662615]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.662636]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   15.662659]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.662711]  ? __kthread_parkme+0x82/0x160
[   15.662734]  ? preempt_count_sub+0x50/0x80
[   15.662758]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.662780]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.662807]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.662834]  kthread+0x257/0x310
[   15.662853]  ? __pfx_kthread+0x10/0x10
[   15.662874]  ret_from_fork+0x41/0x80
[   15.662895]  ? __pfx_kthread+0x10/0x10
[   15.662915]  ret_from_fork_asm+0x1a/0x30
[   15.662948]  </TASK>
[   15.662961] 
[   15.672147] Allocated by task 270:
[   15.672811]  kasan_save_stack+0x45/0x70
[   15.673208]  kasan_save_track+0x18/0x40
[   15.673491]  kasan_save_alloc_info+0x3b/0x50
[   15.673876]  __kasan_kmalloc+0xb7/0xc0
[   15.674330]  __kmalloc_cache_noprof+0x168/0x350
[   15.674888]  kasan_atomics+0x96/0x310
[   15.675185]  kunit_try_run_case+0x1a6/0x480
[   15.675374]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.675602]  kthread+0x257/0x310
[   15.675766]  ret_from_fork+0x41/0x80
[   15.675960]  ret_from_fork_asm+0x1a/0x30
[   15.676251] 
[   15.676386] The buggy address belongs to the object at ffff888102635000
[   15.676386]  which belongs to the cache kmalloc-64 of size 64
[   15.676887] The buggy address is located 0 bytes to the right of
[   15.676887]  allocated 48-byte region [ffff888102635000, ffff888102635030)
[   15.677489] 
[   15.677656] The buggy address belongs to the physical page:
[   15.677881] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102635
[   15.678336] flags: 0x200000000000000(node=0|zone=2)
[   15.678555] page_type: f5(slab)
[   15.678749] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.679284] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   15.679728] page dumped because: kasan: bad access detected
[   15.680084] 
[   15.680243] Memory state around the buggy address:
[   15.680448]  ffff888102634f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.680814]  ffff888102634f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.681123] >ffff888102635000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.681357]                                      ^
[   15.681547]  ffff888102635080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.681931]  ffff888102635100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.682421] ==================================================================
[   14.848426] ==================================================================
[   14.848865] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xb6b/0x5450
[   14.849278] Write of size 4 at addr ffff888102635030 by task kunit_try_catch/270
[   14.849660] 
[   14.849853] CPU: 0 UID: 0 PID: 270 Comm: kunit_try_catch Tainted: G    B            N 6.12.32-rc1 #1
[   14.849941] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.849964] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.850010] Call Trace:
[   14.850043]  <TASK>
[   14.850118]  dump_stack_lvl+0x73/0xb0
[   14.850177]  print_report+0xd1/0x640
[   14.850226]  ? __virt_addr_valid+0x1db/0x2d0
[   14.850272]  ? kasan_atomics_helper+0xb6b/0x5450
[   14.850317]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.850363]  ? kasan_atomics_helper+0xb6b/0x5450
[   14.850413]  kasan_report+0x140/0x180
[   14.850460]  ? kasan_atomics_helper+0xb6b/0x5450
[   14.850518]  kasan_check_range+0x10c/0x1c0
[   14.850564]  __kasan_check_write+0x18/0x20
[   14.850612]  kasan_atomics_helper+0xb6b/0x5450
[   14.850652]  ? kasan_save_alloc_info+0x3b/0x50
[   14.850711]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.850760]  ? __kmalloc_cache_noprof+0x168/0x350
[   14.850818]  kasan_atomics+0x1dd/0x310
[   14.850863]  ? __pfx_kasan_atomics+0x10/0x10
[   14.850910]  ? __pfx_read_tsc+0x10/0x10
[   14.850952]  ? ktime_get_ts64+0x84/0x230
[   14.851006]  kunit_try_run_case+0x1a6/0x480
[   14.851083]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.851129]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   14.851173]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.851223]  ? __kthread_parkme+0x82/0x160
[   14.851266]  ? preempt_count_sub+0x50/0x80
[   14.851309]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.851342]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.851379]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.851405]  kthread+0x257/0x310
[   14.851424]  ? __pfx_kthread+0x10/0x10
[   14.851443]  ret_from_fork+0x41/0x80
[   14.851463]  ? __pfx_kthread+0x10/0x10
[   14.851480]  ret_from_fork_asm+0x1a/0x30
[   14.851510]  </TASK>
[   14.851523] 
[   14.859568] Allocated by task 270:
[   14.859800]  kasan_save_stack+0x45/0x70
[   14.860146]  kasan_save_track+0x18/0x40
[   14.860398]  kasan_save_alloc_info+0x3b/0x50
[   14.860720]  __kasan_kmalloc+0xb7/0xc0
[   14.860894]  __kmalloc_cache_noprof+0x168/0x350
[   14.861108]  kasan_atomics+0x96/0x310
[   14.861318]  kunit_try_run_case+0x1a6/0x480
[   14.861654]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.862096]  kthread+0x257/0x310
[   14.862377]  ret_from_fork+0x41/0x80
[   14.862647]  ret_from_fork_asm+0x1a/0x30
[   14.862821] 
[   14.863004] The buggy address belongs to the object at ffff888102635000
[   14.863004]  which belongs to the cache kmalloc-64 of size 64
[   14.863615] The buggy address is located 0 bytes to the right of
[   14.863615]  allocated 48-byte region [ffff888102635000, ffff888102635030)
[   14.864246] 
[   14.864437] The buggy address belongs to the physical page:
[   14.864691] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102635
[   14.865151] flags: 0x200000000000000(node=0|zone=2)
[   14.865473] page_type: f5(slab)
[   14.865705] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.866245] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   14.866500] page dumped because: kasan: bad access detected
[   14.866718] 
[   14.866875] Memory state around the buggy address:
[   14.867260]  ffff888102634f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.867746]  ffff888102634f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.868220] >ffff888102635000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.868502]                                      ^
[   14.868827]  ffff888102635080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.869165]  ffff888102635100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.869396] ==================================================================
[   15.535172] ==================================================================
[   15.535445] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x194b/0x5450
[   15.536252] Write of size 8 at addr ffff888102635030 by task kunit_try_catch/270
[   15.536861] 
[   15.537097] CPU: 0 UID: 0 PID: 270 Comm: kunit_try_catch Tainted: G    B            N 6.12.32-rc1 #1
[   15.537212] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.537244] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.537286] Call Trace:
[   15.537322]  <TASK>
[   15.537352]  dump_stack_lvl+0x73/0xb0
[   15.537413]  print_report+0xd1/0x640
[   15.537461]  ? __virt_addr_valid+0x1db/0x2d0
[   15.537512]  ? kasan_atomics_helper+0x194b/0x5450
[   15.537560]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.537608]  ? kasan_atomics_helper+0x194b/0x5450
[   15.537659]  kasan_report+0x140/0x180
[   15.537721]  ? kasan_atomics_helper+0x194b/0x5450
[   15.537781]  kasan_check_range+0x10c/0x1c0
[   15.537827]  __kasan_check_write+0x18/0x20
[   15.537872]  kasan_atomics_helper+0x194b/0x5450
[   15.537931]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.537975]  ? __kmalloc_cache_noprof+0x168/0x350
[   15.538029]  kasan_atomics+0x1dd/0x310
[   15.538071]  ? __pfx_kasan_atomics+0x10/0x10
[   15.538166]  ? __pfx_read_tsc+0x10/0x10
[   15.538207]  ? ktime_get_ts64+0x84/0x230
[   15.538276]  kunit_try_run_case+0x1a6/0x480
[   15.538324]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.538368]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   15.538431]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.538480]  ? __kthread_parkme+0x82/0x160
[   15.538539]  ? preempt_count_sub+0x50/0x80
[   15.538581]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.538622]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.538684]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.538740]  kthread+0x257/0x310
[   15.538782]  ? __pfx_kthread+0x10/0x10
[   15.538825]  ret_from_fork+0x41/0x80
[   15.538864]  ? __pfx_kthread+0x10/0x10
[   15.538887]  ret_from_fork_asm+0x1a/0x30
[   15.538918]  </TASK>
[   15.538932] 
[   15.546770] Allocated by task 270:
[   15.547070]  kasan_save_stack+0x45/0x70
[   15.547396]  kasan_save_track+0x18/0x40
[   15.547709]  kasan_save_alloc_info+0x3b/0x50
[   15.548104]  __kasan_kmalloc+0xb7/0xc0
[   15.548455]  __kmalloc_cache_noprof+0x168/0x350
[   15.548806]  kasan_atomics+0x96/0x310
[   15.549846]  kunit_try_run_case+0x1a6/0x480
[   15.550743]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.551045]  kthread+0x257/0x310
[   15.551440]  ret_from_fork+0x41/0x80
[   15.551745]  ret_from_fork_asm+0x1a/0x30
[   15.552029] 
[   15.552191] The buggy address belongs to the object at ffff888102635000
[   15.552191]  which belongs to the cache kmalloc-64 of size 64
[   15.552578] The buggy address is located 0 bytes to the right of
[   15.552578]  allocated 48-byte region [ffff888102635000, ffff888102635030)
[   15.553164] 
[   15.553324] The buggy address belongs to the physical page:
[   15.553725] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102635
[   15.554239] flags: 0x200000000000000(node=0|zone=2)
[   15.554451] page_type: f5(slab)
[   15.554613] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.555233] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   15.555888] page dumped because: kasan: bad access detected
[   15.556241] 
[   15.556365] Memory state around the buggy address:
[   15.556554]  ffff888102634f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.557056]  ffff888102634f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.557395] >ffff888102635000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.557636]                                      ^
[   15.557926]  ffff888102635080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.558560]  ffff888102635100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.559052] ==================================================================
[   15.585410] ==================================================================
[   15.585694] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1a80/0x5450
[   15.586135] Write of size 8 at addr ffff888102635030 by task kunit_try_catch/270
[   15.586372] 
[   15.586486] CPU: 0 UID: 0 PID: 270 Comm: kunit_try_catch Tainted: G    B            N 6.12.32-rc1 #1
[   15.586560] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.586583] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.586618] Call Trace:
[   15.586650]  <TASK>
[   15.586957]  dump_stack_lvl+0x73/0xb0
[   15.587025]  print_report+0xd1/0x640
[   15.587062]  ? __virt_addr_valid+0x1db/0x2d0
[   15.587096]  ? kasan_atomics_helper+0x1a80/0x5450
[   15.587132]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.587168]  ? kasan_atomics_helper+0x1a80/0x5450
[   15.587207]  kasan_report+0x140/0x180
[   15.587248]  ? kasan_atomics_helper+0x1a80/0x5450
[   15.587297]  kasan_check_range+0x10c/0x1c0
[   15.587330]  __kasan_check_write+0x18/0x20
[   15.587360]  kasan_atomics_helper+0x1a80/0x5450
[   15.587396]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.587431]  ? __kmalloc_cache_noprof+0x168/0x350
[   15.587471]  kasan_atomics+0x1dd/0x310
[   15.587501]  ? __pfx_kasan_atomics+0x10/0x10
[   15.587554]  ? __pfx_read_tsc+0x10/0x10
[   15.587960]  ? ktime_get_ts64+0x84/0x230
[   15.588063]  kunit_try_run_case+0x1a6/0x480
[   15.588108]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.588141]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   15.588175]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.588219]  ? __kthread_parkme+0x82/0x160
[   15.588257]  ? preempt_count_sub+0x50/0x80
[   15.588299]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.588336]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.588381]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.588426]  kthread+0x257/0x310
[   15.588460]  ? __pfx_kthread+0x10/0x10
[   15.588496]  ret_from_fork+0x41/0x80
[   15.588531]  ? __pfx_kthread+0x10/0x10
[   15.588564]  ret_from_fork_asm+0x1a/0x30
[   15.588622]  </TASK>
[   15.588645] 
[   15.599677] Allocated by task 270:
[   15.599974]  kasan_save_stack+0x45/0x70
[   15.600343]  kasan_save_track+0x18/0x40
[   15.600647]  kasan_save_alloc_info+0x3b/0x50
[   15.600984]  __kasan_kmalloc+0xb7/0xc0
[   15.601314]  __kmalloc_cache_noprof+0x168/0x350
[   15.601660]  kasan_atomics+0x96/0x310
[   15.602006]  kunit_try_run_case+0x1a6/0x480
[   15.602379]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.602800]  kthread+0x257/0x310
[   15.603111]  ret_from_fork+0x41/0x80
[   15.603419]  ret_from_fork_asm+0x1a/0x30
[   15.603747] 
[   15.603908] The buggy address belongs to the object at ffff888102635000
[   15.603908]  which belongs to the cache kmalloc-64 of size 64
[   15.604871] The buggy address is located 0 bytes to the right of
[   15.604871]  allocated 48-byte region [ffff888102635000, ffff888102635030)
[   15.605390] 
[   15.605605] The buggy address belongs to the physical page:
[   15.605974] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102635
[   15.606493] flags: 0x200000000000000(node=0|zone=2)
[   15.606836] page_type: f5(slab)
[   15.607156] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.607545] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   15.607966] page dumped because: kasan: bad access detected
[   15.608386] 
[   15.608533] Memory state around the buggy address:
[   15.608917]  ffff888102634f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.609383]  ffff888102634f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.609746] >ffff888102635000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.610233]                                      ^
[   15.610493]  ffff888102635080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.610939]  ffff888102635100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.611419] ==================================================================
[   15.728501] ==================================================================
[   15.729044] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1e13/0x5450
[   15.729529] Write of size 8 at addr ffff888102635030 by task kunit_try_catch/270
[   15.730756] 
[   15.730914] CPU: 0 UID: 0 PID: 270 Comm: kunit_try_catch Tainted: G    B            N 6.12.32-rc1 #1
[   15.731005] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.731033] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.731085] Call Trace:
[   15.731127]  <TASK>
[   15.731162]  dump_stack_lvl+0x73/0xb0
[   15.731220]  print_report+0xd1/0x640
[   15.731246]  ? __virt_addr_valid+0x1db/0x2d0
[   15.731271]  ? kasan_atomics_helper+0x1e13/0x5450
[   15.731294]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.731317]  ? kasan_atomics_helper+0x1e13/0x5450
[   15.731341]  kasan_report+0x140/0x180
[   15.731364]  ? kasan_atomics_helper+0x1e13/0x5450
[   15.731392]  kasan_check_range+0x10c/0x1c0
[   15.731413]  __kasan_check_write+0x18/0x20
[   15.731434]  kasan_atomics_helper+0x1e13/0x5450
[   15.731458]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.731482]  ? __kmalloc_cache_noprof+0x168/0x350
[   15.731510]  kasan_atomics+0x1dd/0x310
[   15.731530]  ? __pfx_kasan_atomics+0x10/0x10
[   15.731551]  ? __pfx_read_tsc+0x10/0x10
[   15.731570]  ? ktime_get_ts64+0x84/0x230
[   15.731596]  kunit_try_run_case+0x1a6/0x480
[   15.731618]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.731638]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   15.731660]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.731713]  ? __kthread_parkme+0x82/0x160
[   15.731748]  ? preempt_count_sub+0x50/0x80
[   15.731785]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.731816]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.731857]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.731903]  kthread+0x257/0x310
[   15.731936]  ? __pfx_kthread+0x10/0x10
[   15.731966]  ret_from_fork+0x41/0x80
[   15.731998]  ? __pfx_kthread+0x10/0x10
[   15.732028]  ret_from_fork_asm+0x1a/0x30
[   15.732082]  </TASK>
[   15.732105] 
[   15.741288] Allocated by task 270:
[   15.741539]  kasan_save_stack+0x45/0x70
[   15.741860]  kasan_save_track+0x18/0x40
[   15.742085]  kasan_save_alloc_info+0x3b/0x50
[   15.742406]  __kasan_kmalloc+0xb7/0xc0
[   15.742597]  __kmalloc_cache_noprof+0x168/0x350
[   15.742873]  kasan_atomics+0x96/0x310
[   15.743140]  kunit_try_run_case+0x1a6/0x480
[   15.743452]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.743732]  kthread+0x257/0x310
[   15.743937]  ret_from_fork+0x41/0x80
[   15.744216]  ret_from_fork_asm+0x1a/0x30
[   15.744386] 
[   15.744523] The buggy address belongs to the object at ffff888102635000
[   15.744523]  which belongs to the cache kmalloc-64 of size 64
[   15.744997] The buggy address is located 0 bytes to the right of
[   15.744997]  allocated 48-byte region [ffff888102635000, ffff888102635030)
[   15.745604] 
[   15.745772] The buggy address belongs to the physical page:
[   15.746193] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102635
[   15.746481] flags: 0x200000000000000(node=0|zone=2)
[   15.746833] page_type: f5(slab)
[   15.747035] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.747446] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   15.747759] page dumped because: kasan: bad access detected
[   15.748030] 
[   15.748199] Memory state around the buggy address:
[   15.748415]  ffff888102634f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.748809]  ffff888102634f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.749103] >ffff888102635000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.749476]                                      ^
[   15.749832]  ffff888102635080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.750189]  ffff888102635100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.750632] ==================================================================
[   14.774452] ==================================================================
[   14.775179] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x993/0x5450
[   14.775688] Write of size 4 at addr ffff888102635030 by task kunit_try_catch/270
[   14.776215] 
[   14.776383] CPU: 0 UID: 0 PID: 270 Comm: kunit_try_catch Tainted: G    B            N 6.12.32-rc1 #1
[   14.776468] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.776495] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.776537] Call Trace:
[   14.776569]  <TASK>
[   14.776599]  dump_stack_lvl+0x73/0xb0
[   14.776656]  print_report+0xd1/0x640
[   14.776714]  ? __virt_addr_valid+0x1db/0x2d0
[   14.776766]  ? kasan_atomics_helper+0x993/0x5450
[   14.776807]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.776854]  ? kasan_atomics_helper+0x993/0x5450
[   14.776902]  kasan_report+0x140/0x180
[   14.776941]  ? kasan_atomics_helper+0x993/0x5450
[   14.776981]  kasan_check_range+0x10c/0x1c0
[   14.777014]  __kasan_check_write+0x18/0x20
[   14.777044]  kasan_atomics_helper+0x993/0x5450
[   14.777112]  ? kasan_save_alloc_info+0x3b/0x50
[   14.777144]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.777182]  ? __kmalloc_cache_noprof+0x168/0x350
[   14.777228]  kasan_atomics+0x1dd/0x310
[   14.777262]  ? __pfx_kasan_atomics+0x10/0x10
[   14.777295]  ? __pfx_read_tsc+0x10/0x10
[   14.777323]  ? ktime_get_ts64+0x84/0x230
[   14.777361]  kunit_try_run_case+0x1a6/0x480
[   14.777394]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.777425]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   14.777459]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.777498]  ? __kthread_parkme+0x82/0x160
[   14.777529]  ? preempt_count_sub+0x50/0x80
[   14.777563]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.777593]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.777635]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.777691]  kthread+0x257/0x310
[   14.777722]  ? __pfx_kthread+0x10/0x10
[   14.777754]  ret_from_fork+0x41/0x80
[   14.777788]  ? __pfx_kthread+0x10/0x10
[   14.777823]  ret_from_fork_asm+0x1a/0x30
[   14.777875]  </TASK>
[   14.777918] 
[   14.786299] Allocated by task 270:
[   14.786604]  kasan_save_stack+0x45/0x70
[   14.786933]  kasan_save_track+0x18/0x40
[   14.787312]  kasan_save_alloc_info+0x3b/0x50
[   14.787596]  __kasan_kmalloc+0xb7/0xc0
[   14.787768]  __kmalloc_cache_noprof+0x168/0x350
[   14.787952]  kasan_atomics+0x96/0x310
[   14.788149]  kunit_try_run_case+0x1a6/0x480
[   14.788333]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.788539]  kthread+0x257/0x310
[   14.788696]  ret_from_fork+0x41/0x80
[   14.788963]  ret_from_fork_asm+0x1a/0x30
[   14.789302] 
[   14.789466] The buggy address belongs to the object at ffff888102635000
[   14.789466]  which belongs to the cache kmalloc-64 of size 64
[   14.790008] The buggy address is located 0 bytes to the right of
[   14.790008]  allocated 48-byte region [ffff888102635000, ffff888102635030)
[   14.791195] 
[   14.791375] The buggy address belongs to the physical page:
[   14.793240] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102635
[   14.793815] flags: 0x200000000000000(node=0|zone=2)
[   14.794218] page_type: f5(slab)
[   14.794497] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.794839] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   14.795097] page dumped because: kasan: bad access detected
[   14.795272] 
[   14.795361] Memory state around the buggy address:
[   14.795553]  ffff888102634f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.795850]  ffff888102634f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.796377] >ffff888102635000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.796976]                                      ^
[   14.797222]  ffff888102635080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.797456]  ffff888102635100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.797652] ==================================================================
[   15.185264] ==================================================================
[   15.185693] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x49ea/0x5450
[   15.186259] Read of size 4 at addr ffff888102635030 by task kunit_try_catch/270
[   15.186688] 
[   15.186984] CPU: 0 UID: 0 PID: 270 Comm: kunit_try_catch Tainted: G    B            N 6.12.32-rc1 #1
[   15.187432] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.187485] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.187540] Call Trace:
[   15.187576]  <TASK>
[   15.187608]  dump_stack_lvl+0x73/0xb0
[   15.187693]  print_report+0xd1/0x640
[   15.187755]  ? __virt_addr_valid+0x1db/0x2d0
[   15.187803]  ? kasan_atomics_helper+0x49ea/0x5450
[   15.187858]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.187901]  ? kasan_atomics_helper+0x49ea/0x5450
[   15.187939]  kasan_report+0x140/0x180
[   15.187983]  ? kasan_atomics_helper+0x49ea/0x5450
[   15.188034]  __asan_report_load4_noabort+0x18/0x20
[   15.188117]  kasan_atomics_helper+0x49ea/0x5450
[   15.188175]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.188229]  ? __kmalloc_cache_noprof+0x168/0x350
[   15.188290]  kasan_atomics+0x1dd/0x310
[   15.188338]  ? __pfx_kasan_atomics+0x10/0x10
[   15.188385]  ? __pfx_read_tsc+0x10/0x10
[   15.188427]  ? ktime_get_ts64+0x84/0x230
[   15.188487]  kunit_try_run_case+0x1a6/0x480
[   15.188536]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.188576]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   15.188610]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.188637]  ? __kthread_parkme+0x82/0x160
[   15.188658]  ? preempt_count_sub+0x50/0x80
[   15.188708]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.188731]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.188758]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.188786]  kthread+0x257/0x310
[   15.188806]  ? __pfx_kthread+0x10/0x10
[   15.188826]  ret_from_fork+0x41/0x80
[   15.188847]  ? __pfx_kthread+0x10/0x10
[   15.188868]  ret_from_fork_asm+0x1a/0x30
[   15.188899]  </TASK>
[   15.188912] 
[   15.198474] Allocated by task 270:
[   15.198698]  kasan_save_stack+0x45/0x70
[   15.199107]  kasan_save_track+0x18/0x40
[   15.199480]  kasan_save_alloc_info+0x3b/0x50
[   15.199853]  __kasan_kmalloc+0xb7/0xc0
[   15.200230]  __kmalloc_cache_noprof+0x168/0x350
[   15.200425]  kasan_atomics+0x96/0x310
[   15.200907]  kunit_try_run_case+0x1a6/0x480
[   15.201226]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.201416]  kthread+0x257/0x310
[   15.201655]  ret_from_fork+0x41/0x80
[   15.201983]  ret_from_fork_asm+0x1a/0x30
[   15.202223] 
[   15.202336] The buggy address belongs to the object at ffff888102635000
[   15.202336]  which belongs to the cache kmalloc-64 of size 64
[   15.202996] The buggy address is located 0 bytes to the right of
[   15.202996]  allocated 48-byte region [ffff888102635000, ffff888102635030)
[   15.203591] 
[   15.203764] The buggy address belongs to the physical page:
[   15.204084] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102635
[   15.204457] flags: 0x200000000000000(node=0|zone=2)
[   15.204796] page_type: f5(slab)
[   15.205103] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.205460] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   15.205909] page dumped because: kasan: bad access detected
[   15.206182] 
[   15.206293] Memory state around the buggy address:
[   15.206478]  ffff888102634f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.206980]  ffff888102634f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.207508] >ffff888102635000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.207756]                                      ^
[   15.207941]  ffff888102635080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.208472]  ffff888102635100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.208963] ==================================================================
[   14.653426] ==================================================================
[   14.653952] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x698/0x5450
[   14.654226] Write of size 4 at addr ffff888102635030 by task kunit_try_catch/270
[   14.654631] 
[   14.654845] CPU: 0 UID: 0 PID: 270 Comm: kunit_try_catch Tainted: G    B            N 6.12.32-rc1 #1
[   14.654927] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.654952] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.654994] Call Trace:
[   14.655029]  <TASK>
[   14.655061]  dump_stack_lvl+0x73/0xb0
[   14.655129]  print_report+0xd1/0x640
[   14.655174]  ? __virt_addr_valid+0x1db/0x2d0
[   14.655217]  ? kasan_atomics_helper+0x698/0x5450
[   14.655253]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.655294]  ? kasan_atomics_helper+0x698/0x5450
[   14.655337]  kasan_report+0x140/0x180
[   14.655380]  ? kasan_atomics_helper+0x698/0x5450
[   14.655433]  kasan_check_range+0x10c/0x1c0
[   14.655472]  __kasan_check_write+0x18/0x20
[   14.655511]  kasan_atomics_helper+0x698/0x5450
[   14.655550]  ? kasan_save_alloc_info+0x3b/0x50
[   14.655593]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.655638]  ? __kmalloc_cache_noprof+0x168/0x350
[   14.655707]  kasan_atomics+0x1dd/0x310
[   14.655752]  ? __pfx_kasan_atomics+0x10/0x10
[   14.655796]  ? __pfx_read_tsc+0x10/0x10
[   14.655836]  ? ktime_get_ts64+0x84/0x230
[   14.655894]  kunit_try_run_case+0x1a6/0x480
[   14.655942]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.655986]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   14.656029]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.656078]  ? __kthread_parkme+0x82/0x160
[   14.656121]  ? preempt_count_sub+0x50/0x80
[   14.656169]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.656212]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.656263]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.656307]  kthread+0x257/0x310
[   14.656344]  ? __pfx_kthread+0x10/0x10
[   14.656380]  ret_from_fork+0x41/0x80
[   14.656414]  ? __pfx_kthread+0x10/0x10
[   14.656445]  ret_from_fork_asm+0x1a/0x30
[   14.656524]  </TASK>
[   14.656550] 
[   14.664465] Allocated by task 270:
[   14.664660]  kasan_save_stack+0x45/0x70
[   14.664962]  kasan_save_track+0x18/0x40
[   14.665330]  kasan_save_alloc_info+0x3b/0x50
[   14.665565]  __kasan_kmalloc+0xb7/0xc0
[   14.665807]  __kmalloc_cache_noprof+0x168/0x350
[   14.666058]  kasan_atomics+0x96/0x310
[   14.666306]  kunit_try_run_case+0x1a6/0x480
[   14.666539]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.666788]  kthread+0x257/0x310
[   14.666951]  ret_from_fork+0x41/0x80
[   14.667112]  ret_from_fork_asm+0x1a/0x30
[   14.667290] 
[   14.667393] The buggy address belongs to the object at ffff888102635000
[   14.667393]  which belongs to the cache kmalloc-64 of size 64
[   14.667929] The buggy address is located 0 bytes to the right of
[   14.667929]  allocated 48-byte region [ffff888102635000, ffff888102635030)
[   14.669054] 
[   14.669230] The buggy address belongs to the physical page:
[   14.669601] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102635
[   14.670171] flags: 0x200000000000000(node=0|zone=2)
[   14.670380] page_type: f5(slab)
[   14.670591] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.670993] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   14.671608] page dumped because: kasan: bad access detected
[   14.671829] 
[   14.671981] Memory state around the buggy address:
[   14.672239]  ffff888102634f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.672484]  ffff888102634f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.672755] >ffff888102635000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.674154]                                      ^
[   14.674507]  ffff888102635080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.674996]  ffff888102635100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.676177] ==================================================================
[   15.926653] ==================================================================
[   15.927232] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x218b/0x5450
[   15.927881] Write of size 8 at addr ffff888102635030 by task kunit_try_catch/270
[   15.928735] 
[   15.928946] CPU: 0 UID: 0 PID: 270 Comm: kunit_try_catch Tainted: G    B            N 6.12.32-rc1 #1
[   15.929037] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.929076] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.929117] Call Trace:
[   15.929156]  <TASK>
[   15.929191]  dump_stack_lvl+0x73/0xb0
[   15.929251]  print_report+0xd1/0x640
[   15.929296]  ? __virt_addr_valid+0x1db/0x2d0
[   15.929344]  ? kasan_atomics_helper+0x218b/0x5450
[   15.929386]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.929432]  ? kasan_atomics_helper+0x218b/0x5450
[   15.929477]  kasan_report+0x140/0x180
[   15.929519]  ? kasan_atomics_helper+0x218b/0x5450
[   15.929574]  kasan_check_range+0x10c/0x1c0
[   15.929620]  __kasan_check_write+0x18/0x20
[   15.929675]  kasan_atomics_helper+0x218b/0x5450
[   15.929726]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.929768]  ? __kmalloc_cache_noprof+0x168/0x350
[   15.929815]  kasan_atomics+0x1dd/0x310
[   15.929837]  ? __pfx_kasan_atomics+0x10/0x10
[   15.929859]  ? __pfx_read_tsc+0x10/0x10
[   15.929880]  ? ktime_get_ts64+0x84/0x230
[   15.929918]  kunit_try_run_case+0x1a6/0x480
[   15.929948]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.929972]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   15.929998]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.930027]  ? __kthread_parkme+0x82/0x160
[   15.930050]  ? preempt_count_sub+0x50/0x80
[   15.930087]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.930114]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.930141]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.930168]  kthread+0x257/0x310
[   15.930188]  ? __pfx_kthread+0x10/0x10
[   15.930207]  ret_from_fork+0x41/0x80
[   15.930227]  ? __pfx_kthread+0x10/0x10
[   15.930246]  ret_from_fork_asm+0x1a/0x30
[   15.930277]  </TASK>
[   15.930292] 
[   15.937619] Allocated by task 270:
[   15.937941]  kasan_save_stack+0x45/0x70
[   15.938308]  kasan_save_track+0x18/0x40
[   15.938551]  kasan_save_alloc_info+0x3b/0x50
[   15.938788]  __kasan_kmalloc+0xb7/0xc0
[   15.939192]  __kmalloc_cache_noprof+0x168/0x350
[   15.939393]  kasan_atomics+0x96/0x310
[   15.939568]  kunit_try_run_case+0x1a6/0x480
[   15.939769]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.939987]  kthread+0x257/0x310
[   15.940227]  ret_from_fork+0x41/0x80
[   15.940528]  ret_from_fork_asm+0x1a/0x30
[   15.940854] 
[   15.941021] The buggy address belongs to the object at ffff888102635000
[   15.941021]  which belongs to the cache kmalloc-64 of size 64
[   15.942122] The buggy address is located 0 bytes to the right of
[   15.942122]  allocated 48-byte region [ffff888102635000, ffff888102635030)
[   15.942591] 
[   15.942728] The buggy address belongs to the physical page:
[   15.943121] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102635
[   15.943547] flags: 0x200000000000000(node=0|zone=2)
[   15.943847] page_type: f5(slab)
[   15.944015] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.944420] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   15.944880] page dumped because: kasan: bad access detected
[   15.945301] 
[   15.945397] Memory state around the buggy address:
[   15.945622]  ffff888102634f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.945893]  ffff888102634f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.946376] >ffff888102635000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.946850]                                      ^
[   15.947227]  ffff888102635080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.947471]  ffff888102635100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.947708] ==================================================================
[   15.210290] ==================================================================
[   15.210571] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x12e7/0x5450
[   15.211161] Write of size 4 at addr ffff888102635030 by task kunit_try_catch/270
[   15.211543] 
[   15.211759] CPU: 0 UID: 0 PID: 270 Comm: kunit_try_catch Tainted: G    B            N 6.12.32-rc1 #1
[   15.211844] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.211868] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.211906] Call Trace:
[   15.211938]  <TASK>
[   15.211968]  dump_stack_lvl+0x73/0xb0
[   15.212028]  print_report+0xd1/0x640
[   15.212114]  ? __virt_addr_valid+0x1db/0x2d0
[   15.212163]  ? kasan_atomics_helper+0x12e7/0x5450
[   15.212214]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.212270]  ? kasan_atomics_helper+0x12e7/0x5450
[   15.212318]  kasan_report+0x140/0x180
[   15.212370]  ? kasan_atomics_helper+0x12e7/0x5450
[   15.212427]  kasan_check_range+0x10c/0x1c0
[   15.212473]  __kasan_check_write+0x18/0x20
[   15.212518]  kasan_atomics_helper+0x12e7/0x5450
[   15.212571]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.212626]  ? __kmalloc_cache_noprof+0x168/0x350
[   15.212691]  kasan_atomics+0x1dd/0x310
[   15.212730]  ? __pfx_kasan_atomics+0x10/0x10
[   15.212771]  ? __pfx_read_tsc+0x10/0x10
[   15.212809]  ? ktime_get_ts64+0x84/0x230
[   15.212866]  kunit_try_run_case+0x1a6/0x480
[   15.212926]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.212967]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   15.213010]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.213088]  ? __kthread_parkme+0x82/0x160
[   15.213133]  ? preempt_count_sub+0x50/0x80
[   15.213193]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.213229]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.213261]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.213288]  kthread+0x257/0x310
[   15.213306]  ? __pfx_kthread+0x10/0x10
[   15.213325]  ret_from_fork+0x41/0x80
[   15.213345]  ? __pfx_kthread+0x10/0x10
[   15.213364]  ret_from_fork_asm+0x1a/0x30
[   15.213395]  </TASK>
[   15.213409] 
[   15.221470] Allocated by task 270:
[   15.221661]  kasan_save_stack+0x45/0x70
[   15.222098]  kasan_save_track+0x18/0x40
[   15.222438]  kasan_save_alloc_info+0x3b/0x50
[   15.222830]  __kasan_kmalloc+0xb7/0xc0
[   15.223225]  __kmalloc_cache_noprof+0x168/0x350
[   15.223610]  kasan_atomics+0x96/0x310
[   15.223932]  kunit_try_run_case+0x1a6/0x480
[   15.224232]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.224501]  kthread+0x257/0x310
[   15.224681]  ret_from_fork+0x41/0x80
[   15.224872]  ret_from_fork_asm+0x1a/0x30
[   15.225082] 
[   15.225193] The buggy address belongs to the object at ffff888102635000
[   15.225193]  which belongs to the cache kmalloc-64 of size 64
[   15.226051] The buggy address is located 0 bytes to the right of
[   15.226051]  allocated 48-byte region [ffff888102635000, ffff888102635030)
[   15.226993] 
[   15.227202] The buggy address belongs to the physical page:
[   15.227600] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102635
[   15.227881] flags: 0x200000000000000(node=0|zone=2)
[   15.228188] page_type: f5(slab)
[   15.228505] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.229075] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   15.229627] page dumped because: kasan: bad access detected
[   15.229871] 
[   15.230094] Memory state around the buggy address:
[   15.230365]  ffff888102634f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.230860]  ffff888102634f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.231285] >ffff888102635000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.231720]                                      ^
[   15.231965]  ffff888102635080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.232438]  ffff888102635100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.232813] ==================================================================
[   15.408486] ==================================================================
[   15.409045] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1650/0x5450
[   15.409611] Write of size 8 at addr ffff888102635030 by task kunit_try_catch/270
[   15.410194] 
[   15.410373] CPU: 0 UID: 0 PID: 270 Comm: kunit_try_catch Tainted: G    B            N 6.12.32-rc1 #1
[   15.410460] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.410488] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.410527] Call Trace:
[   15.410563]  <TASK>
[   15.410592]  dump_stack_lvl+0x73/0xb0
[   15.410630]  print_report+0xd1/0x640
[   15.410653]  ? __virt_addr_valid+0x1db/0x2d0
[   15.410704]  ? kasan_atomics_helper+0x1650/0x5450
[   15.410737]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.410780]  ? kasan_atomics_helper+0x1650/0x5450
[   15.410816]  kasan_report+0x140/0x180
[   15.410854]  ? kasan_atomics_helper+0x1650/0x5450
[   15.410903]  kasan_check_range+0x10c/0x1c0
[   15.410944]  __kasan_check_write+0x18/0x20
[   15.411010]  kasan_atomics_helper+0x1650/0x5450
[   15.411103]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.411155]  ? __kmalloc_cache_noprof+0x168/0x350
[   15.411204]  kasan_atomics+0x1dd/0x310
[   15.411244]  ? __pfx_kasan_atomics+0x10/0x10
[   15.411284]  ? __pfx_read_tsc+0x10/0x10
[   15.411325]  ? ktime_get_ts64+0x84/0x230
[   15.411380]  kunit_try_run_case+0x1a6/0x480
[   15.411442]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.411484]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   15.411525]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.411571]  ? __kthread_parkme+0x82/0x160
[   15.411614]  ? preempt_count_sub+0x50/0x80
[   15.411678]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.411718]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.411766]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.411816]  kthread+0x257/0x310
[   15.411853]  ? __pfx_kthread+0x10/0x10
[   15.411907]  ret_from_fork+0x41/0x80
[   15.411947]  ? __pfx_kthread+0x10/0x10
[   15.411983]  ret_from_fork_asm+0x1a/0x30
[   15.412040]  </TASK>
[   15.412075] 
[   15.422155] Allocated by task 270:
[   15.422468]  kasan_save_stack+0x45/0x70
[   15.422701]  kasan_save_track+0x18/0x40
[   15.422993]  kasan_save_alloc_info+0x3b/0x50
[   15.423566]  __kasan_kmalloc+0xb7/0xc0
[   15.423813]  __kmalloc_cache_noprof+0x168/0x350
[   15.424115]  kasan_atomics+0x96/0x310
[   15.424785]  kunit_try_run_case+0x1a6/0x480
[   15.425043]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.425443]  kthread+0x257/0x310
[   15.425609]  ret_from_fork+0x41/0x80
[   15.425889]  ret_from_fork_asm+0x1a/0x30
[   15.426134] 
[   15.426323] The buggy address belongs to the object at ffff888102635000
[   15.426323]  which belongs to the cache kmalloc-64 of size 64
[   15.426863] The buggy address is located 0 bytes to the right of
[   15.426863]  allocated 48-byte region [ffff888102635000, ffff888102635030)
[   15.427477] 
[   15.428091] The buggy address belongs to the physical page:
[   15.428352] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102635
[   15.428657] flags: 0x200000000000000(node=0|zone=2)
[   15.429075] page_type: f5(slab)
[   15.429431] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.429992] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   15.430253] page dumped because: kasan: bad access detected
[   15.430703] 
[   15.430873] Memory state around the buggy address:
[   15.431334]  ffff888102634f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.431888]  ffff888102634f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.432237] >ffff888102635000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.432710]                                      ^
[   15.433013]  ffff888102635080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.433551]  ffff888102635100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.433898] ==================================================================
[   14.440528] ==================================================================
[   14.440876] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b8a/0x5450
[   14.441391] Read of size 4 at addr ffff888102635030 by task kunit_try_catch/270
[   14.441606] 
[   14.441684] CPU: 0 UID: 0 PID: 270 Comm: kunit_try_catch Tainted: G    B            N 6.12.32-rc1 #1
[   14.441732] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.441764] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.441787] Call Trace:
[   14.441812]  <TASK>
[   14.441839]  dump_stack_lvl+0x73/0xb0
[   14.441878]  print_report+0xd1/0x640
[   14.441914]  ? __virt_addr_valid+0x1db/0x2d0
[   14.441943]  ? kasan_atomics_helper+0x4b8a/0x5450
[   14.441979]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.442014]  ? kasan_atomics_helper+0x4b8a/0x5450
[   14.442051]  kasan_report+0x140/0x180
[   14.442076]  ? kasan_atomics_helper+0x4b8a/0x5450
[   14.442116]  __asan_report_load4_noabort+0x18/0x20
[   14.442139]  kasan_atomics_helper+0x4b8a/0x5450
[   14.442161]  ? kasan_save_alloc_info+0x3b/0x50
[   14.442182]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.442206]  ? __kmalloc_cache_noprof+0x168/0x350
[   14.442233]  kasan_atomics+0x1dd/0x310
[   14.442253]  ? __pfx_kasan_atomics+0x10/0x10
[   14.442274]  ? __pfx_read_tsc+0x10/0x10
[   14.442292]  ? ktime_get_ts64+0x84/0x230
[   14.442485]  kunit_try_run_case+0x1a6/0x480
[   14.442519]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.442542]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   14.442562]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.442586]  ? __kthread_parkme+0x82/0x160
[   14.442621]  ? preempt_count_sub+0x50/0x80
[   14.442645]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.442674]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.442702]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.442727]  kthread+0x257/0x310
[   14.442745]  ? __pfx_kthread+0x10/0x10
[   14.442783]  ret_from_fork+0x41/0x80
[   14.442803]  ? __pfx_kthread+0x10/0x10
[   14.442832]  ret_from_fork_asm+0x1a/0x30
[   14.442862]  </TASK>
[   14.442874] 
[   14.449344] Allocated by task 270:
[   14.449451]  kasan_save_stack+0x45/0x70
[   14.449554]  kasan_save_track+0x18/0x40
[   14.449764]  kasan_save_alloc_info+0x3b/0x50
[   14.450041]  __kasan_kmalloc+0xb7/0xc0
[   14.450327]  __kmalloc_cache_noprof+0x168/0x350
[   14.450804]  kasan_atomics+0x96/0x310
[   14.451301]  kunit_try_run_case+0x1a6/0x480
[   14.451609]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.451879]  kthread+0x257/0x310
[   14.452528]  ret_from_fork+0x41/0x80
[   14.452819]  ret_from_fork_asm+0x1a/0x30
[   14.453445] 
[   14.453615] The buggy address belongs to the object at ffff888102635000
[   14.453615]  which belongs to the cache kmalloc-64 of size 64
[   14.453868] The buggy address is located 0 bytes to the right of
[   14.453868]  allocated 48-byte region [ffff888102635000, ffff888102635030)
[   14.454508] 
[   14.454581] The buggy address belongs to the physical page:
[   14.454707] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102635
[   14.454978] flags: 0x200000000000000(node=0|zone=2)
[   14.455285] page_type: f5(slab)
[   14.455557] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.455933] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   14.456436] page dumped because: kasan: bad access detected
[   14.456764] 
[   14.456867] Memory state around the buggy address:
[   14.457268]  ffff888102634f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.457545]  ffff888102634f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.457774] >ffff888102635000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.458079]                                      ^
[   14.458316]  ffff888102635080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.458848]  ffff888102635100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.459008] ==================================================================
[   14.989747] ==================================================================
[   14.990340] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf11/0x5450
[   14.990808] Write of size 4 at addr ffff888102635030 by task kunit_try_catch/270
[   14.991309] 
[   14.991493] CPU: 0 UID: 0 PID: 270 Comm: kunit_try_catch Tainted: G    B            N 6.12.32-rc1 #1
[   14.991582] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.991608] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.991648] Call Trace:
[   14.991691]  <TASK>
[   14.991725]  dump_stack_lvl+0x73/0xb0
[   14.991783]  print_report+0xd1/0x640
[   14.991829]  ? __virt_addr_valid+0x1db/0x2d0
[   14.991876]  ? kasan_atomics_helper+0xf11/0x5450
[   14.991923]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.991967]  ? kasan_atomics_helper+0xf11/0x5450
[   14.992016]  kasan_report+0x140/0x180
[   14.992127]  ? kasan_atomics_helper+0xf11/0x5450
[   14.992199]  kasan_check_range+0x10c/0x1c0
[   14.992245]  __kasan_check_write+0x18/0x20
[   14.992288]  kasan_atomics_helper+0xf11/0x5450
[   14.992341]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.992392]  ? __kmalloc_cache_noprof+0x168/0x350
[   14.992454]  kasan_atomics+0x1dd/0x310
[   14.992500]  ? __pfx_kasan_atomics+0x10/0x10
[   14.992547]  ? __pfx_read_tsc+0x10/0x10
[   14.992589]  ? ktime_get_ts64+0x84/0x230
[   14.992646]  kunit_try_run_case+0x1a6/0x480
[   14.992705]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.992750]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   14.992789]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.992825]  ? __kthread_parkme+0x82/0x160
[   14.992846]  ? preempt_count_sub+0x50/0x80
[   14.992870]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.992892]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.992919]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.992946]  kthread+0x257/0x310
[   14.992966]  ? __pfx_kthread+0x10/0x10
[   14.992986]  ret_from_fork+0x41/0x80
[   14.993006]  ? __pfx_kthread+0x10/0x10
[   14.993026]  ret_from_fork_asm+0x1a/0x30
[   14.993072]  </TASK>
[   14.993110] 
[   15.001482] Allocated by task 270:
[   15.001780]  kasan_save_stack+0x45/0x70
[   15.002192]  kasan_save_track+0x18/0x40
[   15.002516]  kasan_save_alloc_info+0x3b/0x50
[   15.002859]  __kasan_kmalloc+0xb7/0xc0
[   15.003172]  __kmalloc_cache_noprof+0x168/0x350
[   15.003516]  kasan_atomics+0x96/0x310
[   15.003773]  kunit_try_run_case+0x1a6/0x480
[   15.003956]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.004198]  kthread+0x257/0x310
[   15.004353]  ret_from_fork+0x41/0x80
[   15.004521]  ret_from_fork_asm+0x1a/0x30
[   15.004697] 
[   15.004841] The buggy address belongs to the object at ffff888102635000
[   15.004841]  which belongs to the cache kmalloc-64 of size 64
[   15.005617] The buggy address is located 0 bytes to the right of
[   15.005617]  allocated 48-byte region [ffff888102635000, ffff888102635030)
[   15.006551] 
[   15.006757] The buggy address belongs to the physical page:
[   15.007169] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102635
[   15.007712] flags: 0x200000000000000(node=0|zone=2)
[   15.008012] page_type: f5(slab)
[   15.008337] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.008639] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   15.008896] page dumped because: kasan: bad access detected
[   15.009118] 
[   15.009223] Memory state around the buggy address:
[   15.009406]  ffff888102634f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.009669]  ffff888102634f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.010226] >ffff888102635000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.010710]                                      ^
[   15.011080]  ffff888102635080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.011562]  ffff888102635100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.012050] ==================================================================
[   14.915309] ==================================================================
[   14.916019] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xd48/0x5450
[   14.916552] Write of size 4 at addr ffff888102635030 by task kunit_try_catch/270
[   14.917165] 
[   14.917365] CPU: 0 UID: 0 PID: 270 Comm: kunit_try_catch Tainted: G    B            N 6.12.32-rc1 #1
[   14.917457] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.917482] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.917540] Call Trace:
[   14.917573]  <TASK>
[   14.917604]  dump_stack_lvl+0x73/0xb0
[   14.917674]  print_report+0xd1/0x640
[   14.917717]  ? __virt_addr_valid+0x1db/0x2d0
[   14.917763]  ? kasan_atomics_helper+0xd48/0x5450
[   14.917803]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.917858]  ? kasan_atomics_helper+0xd48/0x5450
[   14.917925]  kasan_report+0x140/0x180
[   14.917978]  ? kasan_atomics_helper+0xd48/0x5450
[   14.918034]  kasan_check_range+0x10c/0x1c0
[   14.918102]  __kasan_check_write+0x18/0x20
[   14.918144]  kasan_atomics_helper+0xd48/0x5450
[   14.918190]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.918240]  ? __kmalloc_cache_noprof+0x168/0x350
[   14.918297]  kasan_atomics+0x1dd/0x310
[   14.918342]  ? __pfx_kasan_atomics+0x10/0x10
[   14.918388]  ? __pfx_read_tsc+0x10/0x10
[   14.918432]  ? ktime_get_ts64+0x84/0x230
[   14.918487]  kunit_try_run_case+0x1a6/0x480
[   14.918536]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.918580]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   14.918624]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.918686]  ? __kthread_parkme+0x82/0x160
[   14.918732]  ? preempt_count_sub+0x50/0x80
[   14.918783]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.918826]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.918882]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.918936]  kthread+0x257/0x310
[   14.918977]  ? __pfx_kthread+0x10/0x10
[   14.919021]  ret_from_fork+0x41/0x80
[   14.919087]  ? __pfx_kthread+0x10/0x10
[   14.919133]  ret_from_fork_asm+0x1a/0x30
[   14.919199]  </TASK>
[   14.919225] 
[   14.927605] Allocated by task 270:
[   14.927924]  kasan_save_stack+0x45/0x70
[   14.928287]  kasan_save_track+0x18/0x40
[   14.928644]  kasan_save_alloc_info+0x3b/0x50
[   14.929022]  __kasan_kmalloc+0xb7/0xc0
[   14.929405]  __kmalloc_cache_noprof+0x168/0x350
[   14.929828]  kasan_atomics+0x96/0x310
[   14.930223]  kunit_try_run_case+0x1a6/0x480
[   14.930587]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.931029]  kthread+0x257/0x310
[   14.931423]  ret_from_fork+0x41/0x80
[   14.931771]  ret_from_fork_asm+0x1a/0x30
[   14.932110] 
[   14.932319] The buggy address belongs to the object at ffff888102635000
[   14.932319]  which belongs to the cache kmalloc-64 of size 64
[   14.933008] The buggy address is located 0 bytes to the right of
[   14.933008]  allocated 48-byte region [ffff888102635000, ffff888102635030)
[   14.933749] 
[   14.933874] The buggy address belongs to the physical page:
[   14.934361] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102635
[   14.934976] flags: 0x200000000000000(node=0|zone=2)
[   14.935424] page_type: f5(slab)
[   14.935726] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.936200] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   14.936568] page dumped because: kasan: bad access detected
[   14.936931] 
[   14.937097] Memory state around the buggy address:
[   14.937275]  ffff888102634f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.937734]  ffff888102634f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.938311] >ffff888102635000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.938661]                                      ^
[   14.939009]  ffff888102635080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.939582]  ffff888102635100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.939814] ==================================================================
[   15.037134] ==================================================================
[   15.037826] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a38/0x5450
[   15.038404] Read of size 4 at addr ffff888102635030 by task kunit_try_catch/270
[   15.038793] 
[   15.038927] CPU: 0 UID: 0 PID: 270 Comm: kunit_try_catch Tainted: G    B            N 6.12.32-rc1 #1
[   15.039010] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.039038] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.039106] Call Trace:
[   15.039140]  <TASK>
[   15.039173]  dump_stack_lvl+0x73/0xb0
[   15.039222]  print_report+0xd1/0x640
[   15.039263]  ? __virt_addr_valid+0x1db/0x2d0
[   15.039326]  ? kasan_atomics_helper+0x4a38/0x5450
[   15.039374]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.039428]  ? kasan_atomics_helper+0x4a38/0x5450
[   15.039475]  kasan_report+0x140/0x180
[   15.039533]  ? kasan_atomics_helper+0x4a38/0x5450
[   15.039597]  __asan_report_load4_noabort+0x18/0x20
[   15.039636]  kasan_atomics_helper+0x4a38/0x5450
[   15.039694]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.039742]  ? __kmalloc_cache_noprof+0x168/0x350
[   15.039799]  kasan_atomics+0x1dd/0x310
[   15.039843]  ? __pfx_kasan_atomics+0x10/0x10
[   15.039892]  ? __pfx_read_tsc+0x10/0x10
[   15.039933]  ? ktime_get_ts64+0x84/0x230
[   15.039987]  kunit_try_run_case+0x1a6/0x480
[   15.040033]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.040105]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   15.040144]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.040187]  ? __kthread_parkme+0x82/0x160
[   15.040226]  ? preempt_count_sub+0x50/0x80
[   15.040294]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.040334]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.040381]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.040431]  kthread+0x257/0x310
[   15.040468]  ? __pfx_kthread+0x10/0x10
[   15.040525]  ret_from_fork+0x41/0x80
[   15.040564]  ? __pfx_kthread+0x10/0x10
[   15.040601]  ret_from_fork_asm+0x1a/0x30
[   15.040656]  </TASK>
[   15.040690] 
[   15.049294] Allocated by task 270:
[   15.049500]  kasan_save_stack+0x45/0x70
[   15.049772]  kasan_save_track+0x18/0x40
[   15.050030]  kasan_save_alloc_info+0x3b/0x50
[   15.050347]  __kasan_kmalloc+0xb7/0xc0
[   15.050576]  __kmalloc_cache_noprof+0x168/0x350
[   15.050830]  kasan_atomics+0x96/0x310
[   15.051147]  kunit_try_run_case+0x1a6/0x480
[   15.051467]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.051842]  kthread+0x257/0x310
[   15.052037]  ret_from_fork+0x41/0x80
[   15.052318]  ret_from_fork_asm+0x1a/0x30
[   15.052610] 
[   15.052785] The buggy address belongs to the object at ffff888102635000
[   15.052785]  which belongs to the cache kmalloc-64 of size 64
[   15.053345] The buggy address is located 0 bytes to the right of
[   15.053345]  allocated 48-byte region [ffff888102635000, ffff888102635030)
[   15.053955] 
[   15.054183] The buggy address belongs to the physical page:
[   15.054513] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102635
[   15.054990] flags: 0x200000000000000(node=0|zone=2)
[   15.055313] page_type: f5(slab)
[   15.055575] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.055894] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   15.056215] page dumped because: kasan: bad access detected
[   15.056447] 
[   15.056561] Memory state around the buggy address:
[   15.056867]  ffff888102634f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.057377]  ffff888102634f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.057815] >ffff888102635000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.058304]                                      ^
[   15.058537]  ffff888102635080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.059375]  ffff888102635100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.059633] ==================================================================
[   15.948736] ==================================================================
[   15.949291] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4fa7/0x5450
[   15.949542] Read of size 8 at addr ffff888102635030 by task kunit_try_catch/270
[   15.949895] 
[   15.950113] CPU: 0 UID: 0 PID: 270 Comm: kunit_try_catch Tainted: G    B            N 6.12.32-rc1 #1
[   15.950202] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.950228] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.950272] Call Trace:
[   15.950311]  <TASK>
[   15.950345]  dump_stack_lvl+0x73/0xb0
[   15.950401]  print_report+0xd1/0x640
[   15.950443]  ? __virt_addr_valid+0x1db/0x2d0
[   15.950488]  ? kasan_atomics_helper+0x4fa7/0x5450
[   15.950535]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.950582]  ? kasan_atomics_helper+0x4fa7/0x5450
[   15.950630]  kasan_report+0x140/0x180
[   15.950693]  ? kasan_atomics_helper+0x4fa7/0x5450
[   15.950753]  __asan_report_load8_noabort+0x18/0x20
[   15.950801]  kasan_atomics_helper+0x4fa7/0x5450
[   15.950853]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.950905]  ? __kmalloc_cache_noprof+0x168/0x350
[   15.950964]  kasan_atomics+0x1dd/0x310
[   15.951009]  ? __pfx_kasan_atomics+0x10/0x10
[   15.951055]  ? __pfx_read_tsc+0x10/0x10
[   15.951095]  ? ktime_get_ts64+0x84/0x230
[   15.951149]  kunit_try_run_case+0x1a6/0x480
[   15.951198]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.951242]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   15.951283]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.951328]  ? __kthread_parkme+0x82/0x160
[   15.951367]  ? preempt_count_sub+0x50/0x80
[   15.951412]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.951451]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.951502]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.951553]  kthread+0x257/0x310
[   15.951606]  ? __pfx_kthread+0x10/0x10
[   15.951646]  ret_from_fork+0x41/0x80
[   15.951709]  ? __pfx_kthread+0x10/0x10
[   15.951749]  ret_from_fork_asm+0x1a/0x30
[   15.951807]  </TASK>
[   15.951834] 
[   15.960618] Allocated by task 270:
[   15.960842]  kasan_save_stack+0x45/0x70
[   15.961109]  kasan_save_track+0x18/0x40
[   15.961420]  kasan_save_alloc_info+0x3b/0x50
[   15.961749]  __kasan_kmalloc+0xb7/0xc0
[   15.961945]  __kmalloc_cache_noprof+0x168/0x350
[   15.962411]  kasan_atomics+0x96/0x310
[   15.962637]  kunit_try_run_case+0x1a6/0x480
[   15.962986]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.963510]  kthread+0x257/0x310
[   15.963755]  ret_from_fork+0x41/0x80
[   15.964052]  ret_from_fork_asm+0x1a/0x30
[   15.964318] 
[   15.964435] The buggy address belongs to the object at ffff888102635000
[   15.964435]  which belongs to the cache kmalloc-64 of size 64
[   15.965020] The buggy address is located 0 bytes to the right of
[   15.965020]  allocated 48-byte region [ffff888102635000, ffff888102635030)
[   15.965419] 
[   15.965538] The buggy address belongs to the physical page:
[   15.965800] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102635
[   15.966361] flags: 0x200000000000000(node=0|zone=2)
[   15.966834] page_type: f5(slab)
[   15.967118] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.967583] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   15.967803] page dumped because: kasan: bad access detected
[   15.968110] 
[   15.968295] Memory state around the buggy address:
[   15.968551]  ffff888102634f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.968907]  ffff888102634f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.969330] >ffff888102635000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.969754]                                      ^
[   15.970070]  ffff888102635080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.970323]  ffff888102635100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.970571] ==================================================================
[   15.560093] ==================================================================
[   15.560420] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x19e4/0x5450
[   15.560927] Write of size 8 at addr ffff888102635030 by task kunit_try_catch/270
[   15.561401] 
[   15.561632] CPU: 0 UID: 0 PID: 270 Comm: kunit_try_catch Tainted: G    B            N 6.12.32-rc1 #1
[   15.561735] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.561763] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.561802] Call Trace:
[   15.561835]  <TASK>
[   15.561868]  dump_stack_lvl+0x73/0xb0
[   15.561945]  print_report+0xd1/0x640
[   15.562012]  ? __virt_addr_valid+0x1db/0x2d0
[   15.562060]  ? kasan_atomics_helper+0x19e4/0x5450
[   15.562103]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.562148]  ? kasan_atomics_helper+0x19e4/0x5450
[   15.562193]  kasan_report+0x140/0x180
[   15.562240]  ? kasan_atomics_helper+0x19e4/0x5450
[   15.562298]  kasan_check_range+0x10c/0x1c0
[   15.562344]  __kasan_check_write+0x18/0x20
[   15.562388]  kasan_atomics_helper+0x19e4/0x5450
[   15.562441]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.562489]  ? __kmalloc_cache_noprof+0x168/0x350
[   15.562552]  kasan_atomics+0x1dd/0x310
[   15.562612]  ? __pfx_kasan_atomics+0x10/0x10
[   15.562659]  ? __pfx_read_tsc+0x10/0x10
[   15.562709]  ? ktime_get_ts64+0x84/0x230
[   15.562768]  kunit_try_run_case+0x1a6/0x480
[   15.562818]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.562862]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   15.562910]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.562958]  ? __kthread_parkme+0x82/0x160
[   15.562999]  ? preempt_count_sub+0x50/0x80
[   15.563058]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.563106]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.563154]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.563210]  kthread+0x257/0x310
[   15.563250]  ? __pfx_kthread+0x10/0x10
[   15.563305]  ret_from_fork+0x41/0x80
[   15.563352]  ? __pfx_kthread+0x10/0x10
[   15.563404]  ret_from_fork_asm+0x1a/0x30
[   15.563471]  </TASK>
[   15.563500] 
[   15.571602] Allocated by task 270:
[   15.571970]  kasan_save_stack+0x45/0x70
[   15.572418]  kasan_save_track+0x18/0x40
[   15.572757]  kasan_save_alloc_info+0x3b/0x50
[   15.573110]  __kasan_kmalloc+0xb7/0xc0
[   15.573443]  __kmalloc_cache_noprof+0x168/0x350
[   15.573808]  kasan_atomics+0x96/0x310
[   15.574179]  kunit_try_run_case+0x1a6/0x480
[   15.574531]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.574917]  kthread+0x257/0x310
[   15.575096]  ret_from_fork+0x41/0x80
[   15.575388]  ret_from_fork_asm+0x1a/0x30
[   15.575712] 
[   15.575833] The buggy address belongs to the object at ffff888102635000
[   15.575833]  which belongs to the cache kmalloc-64 of size 64
[   15.576374] The buggy address is located 0 bytes to the right of
[   15.576374]  allocated 48-byte region [ffff888102635000, ffff888102635030)
[   15.577096] 
[   15.577253] The buggy address belongs to the physical page:
[   15.577451] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102635
[   15.577727] flags: 0x200000000000000(node=0|zone=2)
[   15.577939] page_type: f5(slab)
[   15.578204] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.578757] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   15.579368] page dumped because: kasan: bad access detected
[   15.579882] 
[   15.580402] Memory state around the buggy address:
[   15.580940]  ffff888102634f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.582730]  ffff888102634f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.583372] >ffff888102635000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.583762]                                      ^
[   15.583936]  ffff888102635080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.584143]  ffff888102635100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.584561] ==================================================================
[   14.488851] ==================================================================
[   14.489437] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e0/0x5450
[   14.489988] Read of size 4 at addr ffff888102635030 by task kunit_try_catch/270
[   14.490572] 
[   14.490782] CPU: 0 UID: 0 PID: 270 Comm: kunit_try_catch Tainted: G    B            N 6.12.32-rc1 #1
[   14.490886] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.490912] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.490944] Call Trace:
[   14.490976]  <TASK>
[   14.491005]  dump_stack_lvl+0x73/0xb0
[   14.491069]  print_report+0xd1/0x640
[   14.491126]  ? __virt_addr_valid+0x1db/0x2d0
[   14.491558]  ? kasan_atomics_helper+0x3e0/0x5450
[   14.491635]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.491686]  ? kasan_atomics_helper+0x3e0/0x5450
[   14.491727]  kasan_report+0x140/0x180
[   14.491773]  ? kasan_atomics_helper+0x3e0/0x5450
[   14.491820]  kasan_check_range+0x10c/0x1c0
[   14.491866]  __kasan_check_read+0x15/0x20
[   14.491905]  kasan_atomics_helper+0x3e0/0x5450
[   14.491961]  ? kasan_save_alloc_info+0x3b/0x50
[   14.491990]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.492015]  ? __kmalloc_cache_noprof+0x168/0x350
[   14.492041]  kasan_atomics+0x1dd/0x310
[   14.492079]  ? __pfx_kasan_atomics+0x10/0x10
[   14.492157]  ? __pfx_read_tsc+0x10/0x10
[   14.492188]  ? ktime_get_ts64+0x84/0x230
[   14.492227]  kunit_try_run_case+0x1a6/0x480
[   14.492250]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.492269]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   14.492291]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.492314]  ? __kthread_parkme+0x82/0x160
[   14.492333]  ? preempt_count_sub+0x50/0x80
[   14.492355]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.492374]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.492397]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.492422]  kthread+0x257/0x310
[   14.492439]  ? __pfx_kthread+0x10/0x10
[   14.492457]  ret_from_fork+0x41/0x80
[   14.492477]  ? __pfx_kthread+0x10/0x10
[   14.492494]  ret_from_fork_asm+0x1a/0x30
[   14.492523]  </TASK>
[   14.492536] 
[   14.503597] Allocated by task 270:
[   14.503914]  kasan_save_stack+0x45/0x70
[   14.504342]  kasan_save_track+0x18/0x40
[   14.504698]  kasan_save_alloc_info+0x3b/0x50
[   14.505089]  __kasan_kmalloc+0xb7/0xc0
[   14.505508]  __kmalloc_cache_noprof+0x168/0x350
[   14.505829]  kasan_atomics+0x96/0x310
[   14.506212]  kunit_try_run_case+0x1a6/0x480
[   14.506458]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.506869]  kthread+0x257/0x310
[   14.507232]  ret_from_fork+0x41/0x80
[   14.507413]  ret_from_fork_asm+0x1a/0x30
[   14.507741] 
[   14.507928] The buggy address belongs to the object at ffff888102635000
[   14.507928]  which belongs to the cache kmalloc-64 of size 64
[   14.508885] The buggy address is located 0 bytes to the right of
[   14.508885]  allocated 48-byte region [ffff888102635000, ffff888102635030)
[   14.509390] 
[   14.509569] The buggy address belongs to the physical page:
[   14.510024] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102635
[   14.510582] flags: 0x200000000000000(node=0|zone=2)
[   14.510911] page_type: f5(slab)
[   14.511225] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.511638] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   14.512042] page dumped because: kasan: bad access detected
[   14.512403] 
[   14.512532] Memory state around the buggy address:
[   14.512742]  ffff888102634f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.513274]  ffff888102634f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.513576] >ffff888102635000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.513802]                                      ^
[   14.514294]  ffff888102635080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.514857]  ffff888102635100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.515469] ==================================================================
[   15.683442] ==================================================================
[   15.683945] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1ce2/0x5450
[   15.684805] Write of size 8 at addr ffff888102635030 by task kunit_try_catch/270
[   15.685109] 
[   15.685245] CPU: 0 UID: 0 PID: 270 Comm: kunit_try_catch Tainted: G    B            N 6.12.32-rc1 #1
[   15.685324] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.685348] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.685387] Call Trace:
[   15.685420]  <TASK>
[   15.685454]  dump_stack_lvl+0x73/0xb0
[   15.685509]  print_report+0xd1/0x640
[   15.685553]  ? __virt_addr_valid+0x1db/0x2d0
[   15.685599]  ? kasan_atomics_helper+0x1ce2/0x5450
[   15.685645]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.685699]  ? kasan_atomics_helper+0x1ce2/0x5450
[   15.685746]  kasan_report+0x140/0x180
[   15.685793]  ? kasan_atomics_helper+0x1ce2/0x5450
[   15.685853]  kasan_check_range+0x10c/0x1c0
[   15.685898]  __kasan_check_write+0x18/0x20
[   15.685948]  kasan_atomics_helper+0x1ce2/0x5450
[   15.685991]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.686040]  ? __kmalloc_cache_noprof+0x168/0x350
[   15.686135]  kasan_atomics+0x1dd/0x310
[   15.686181]  ? __pfx_kasan_atomics+0x10/0x10
[   15.686231]  ? __pfx_read_tsc+0x10/0x10
[   15.686275]  ? ktime_get_ts64+0x84/0x230
[   15.686333]  kunit_try_run_case+0x1a6/0x480
[   15.686383]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.686427]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   15.686476]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.686525]  ? __kthread_parkme+0x82/0x160
[   15.686563]  ? preempt_count_sub+0x50/0x80
[   15.686609]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.686648]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.686706]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.686758]  kthread+0x257/0x310
[   15.686798]  ? __pfx_kthread+0x10/0x10
[   15.686836]  ret_from_fork+0x41/0x80
[   15.686873]  ? __pfx_kthread+0x10/0x10
[   15.686906]  ret_from_fork_asm+0x1a/0x30
[   15.686962]  </TASK>
[   15.686988] 
[   15.694684] Allocated by task 270:
[   15.694995]  kasan_save_stack+0x45/0x70
[   15.695325]  kasan_save_track+0x18/0x40
[   15.695589]  kasan_save_alloc_info+0x3b/0x50
[   15.695884]  __kasan_kmalloc+0xb7/0xc0
[   15.696082]  __kmalloc_cache_noprof+0x168/0x350
[   15.696318]  kasan_atomics+0x96/0x310
[   15.696570]  kunit_try_run_case+0x1a6/0x480
[   15.696900]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.697291]  kthread+0x257/0x310
[   15.697541]  ret_from_fork+0x41/0x80
[   15.697828]  ret_from_fork_asm+0x1a/0x30
[   15.698099] 
[   15.698211] The buggy address belongs to the object at ffff888102635000
[   15.698211]  which belongs to the cache kmalloc-64 of size 64
[   15.698751] The buggy address is located 0 bytes to the right of
[   15.698751]  allocated 48-byte region [ffff888102635000, ffff888102635030)
[   15.699340] 
[   15.699454] The buggy address belongs to the physical page:
[   15.699651] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102635
[   15.700177] flags: 0x200000000000000(node=0|zone=2)
[   15.700526] page_type: f5(slab)
[   15.700793] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.701162] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   15.701502] page dumped because: kasan: bad access detected
[   15.701777] 
[   15.701938] Memory state around the buggy address:
[   15.702160]  ffff888102634f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.702402]  ffff888102634f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.702642] >ffff888102635000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.703129]                                      ^
[   15.703488]  ffff888102635080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.703968]  ffff888102635100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.704452] ==================================================================
[   15.799462] ==================================================================
[   15.800001] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4f73/0x5450
[   15.800541] Read of size 8 at addr ffff888102635030 by task kunit_try_catch/270
[   15.801016] 
[   15.801208] CPU: 0 UID: 0 PID: 270 Comm: kunit_try_catch Tainted: G    B            N 6.12.32-rc1 #1
[   15.801294] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.801318] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.801353] Call Trace:
[   15.801390]  <TASK>
[   15.801423]  dump_stack_lvl+0x73/0xb0
[   15.801483]  print_report+0xd1/0x640
[   15.801531]  ? __virt_addr_valid+0x1db/0x2d0
[   15.801584]  ? kasan_atomics_helper+0x4f73/0x5450
[   15.801636]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.801695]  ? kasan_atomics_helper+0x4f73/0x5450
[   15.801739]  kasan_report+0x140/0x180
[   15.801786]  ? kasan_atomics_helper+0x4f73/0x5450
[   15.801861]  __asan_report_load8_noabort+0x18/0x20
[   15.801916]  kasan_atomics_helper+0x4f73/0x5450
[   15.801989]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.802042]  ? __kmalloc_cache_noprof+0x168/0x350
[   15.802135]  kasan_atomics+0x1dd/0x310
[   15.802177]  ? __pfx_kasan_atomics+0x10/0x10
[   15.802218]  ? __pfx_read_tsc+0x10/0x10
[   15.802250]  ? ktime_get_ts64+0x84/0x230
[   15.802301]  kunit_try_run_case+0x1a6/0x480
[   15.802346]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.802407]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   15.802454]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.802507]  ? __kthread_parkme+0x82/0x160
[   15.802551]  ? preempt_count_sub+0x50/0x80
[   15.802598]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.802639]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.802704]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.802761]  kthread+0x257/0x310
[   15.802802]  ? __pfx_kthread+0x10/0x10
[   15.802839]  ret_from_fork+0x41/0x80
[   15.802876]  ? __pfx_kthread+0x10/0x10
[   15.802915]  ret_from_fork_asm+0x1a/0x30
[   15.802973]  </TASK>
[   15.802997] 
[   15.811259] Allocated by task 270:
[   15.811483]  kasan_save_stack+0x45/0x70
[   15.811839]  kasan_save_track+0x18/0x40
[   15.812156]  kasan_save_alloc_info+0x3b/0x50
[   15.812424]  __kasan_kmalloc+0xb7/0xc0
[   15.812607]  __kmalloc_cache_noprof+0x168/0x350
[   15.812978]  kasan_atomics+0x96/0x310
[   15.813302]  kunit_try_run_case+0x1a6/0x480
[   15.813615]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.814038]  kthread+0x257/0x310
[   15.814266]  ret_from_fork+0x41/0x80
[   15.814470]  ret_from_fork_asm+0x1a/0x30
[   15.814681] 
[   15.814805] The buggy address belongs to the object at ffff888102635000
[   15.814805]  which belongs to the cache kmalloc-64 of size 64
[   15.815598] The buggy address is located 0 bytes to the right of
[   15.815598]  allocated 48-byte region [ffff888102635000, ffff888102635030)
[   15.816446] 
[   15.816600] The buggy address belongs to the physical page:
[   15.816835] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102635
[   15.817389] flags: 0x200000000000000(node=0|zone=2)
[   15.817625] page_type: f5(slab)
[   15.817831] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.818180] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   15.818459] page dumped because: kasan: bad access detected
[   15.818712] 
[   15.818871] Memory state around the buggy address:
[   15.819239]  ffff888102634f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.819733]  ffff888102634f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.820227] >ffff888102635000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.820717]                                      ^
[   15.821089]  ffff888102635080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.821449]  ffff888102635100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.821858] ==================================================================
[   15.822758] ==================================================================
[   15.823320] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x2007/0x5450
[   15.823693] Write of size 8 at addr ffff888102635030 by task kunit_try_catch/270
[   15.824113] 
[   15.824279] CPU: 0 UID: 0 PID: 270 Comm: kunit_try_catch Tainted: G    B            N 6.12.32-rc1 #1
[   15.824365] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.824392] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.824450] Call Trace:
[   15.824488]  <TASK>
[   15.824524]  dump_stack_lvl+0x73/0xb0
[   15.824584]  print_report+0xd1/0x640
[   15.824630]  ? __virt_addr_valid+0x1db/0x2d0
[   15.824687]  ? kasan_atomics_helper+0x2007/0x5450
[   15.824751]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.824799]  ? kasan_atomics_helper+0x2007/0x5450
[   15.824843]  kasan_report+0x140/0x180
[   15.824907]  ? kasan_atomics_helper+0x2007/0x5450
[   15.824964]  kasan_check_range+0x10c/0x1c0
[   15.825011]  __kasan_check_write+0x18/0x20
[   15.825083]  kasan_atomics_helper+0x2007/0x5450
[   15.825132]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.825182]  ? __kmalloc_cache_noprof+0x168/0x350
[   15.825252]  kasan_atomics+0x1dd/0x310
[   15.825296]  ? __pfx_kasan_atomics+0x10/0x10
[   15.825341]  ? __pfx_read_tsc+0x10/0x10
[   15.825395]  ? ktime_get_ts64+0x84/0x230
[   15.825450]  kunit_try_run_case+0x1a6/0x480
[   15.825496]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.825537]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   15.825583]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.825631]  ? __kthread_parkme+0x82/0x160
[   15.825677]  ? preempt_count_sub+0x50/0x80
[   15.825723]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.825765]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.825832]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.825883]  kthread+0x257/0x310
[   15.825938]  ? __pfx_kthread+0x10/0x10
[   15.825983]  ret_from_fork+0x41/0x80
[   15.826030]  ? __pfx_kthread+0x10/0x10
[   15.826116]  ret_from_fork_asm+0x1a/0x30
[   15.826176]  </TASK>
[   15.826202] 
[   15.834285] Allocated by task 270:
[   15.834535]  kasan_save_stack+0x45/0x70
[   15.834886]  kasan_save_track+0x18/0x40
[   15.835183]  kasan_save_alloc_info+0x3b/0x50
[   15.835520]  __kasan_kmalloc+0xb7/0xc0
[   15.835812]  __kmalloc_cache_noprof+0x168/0x350
[   15.836172]  kasan_atomics+0x96/0x310
[   15.836486]  kunit_try_run_case+0x1a6/0x480
[   15.836729]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.836963]  kthread+0x257/0x310
[   15.837287]  ret_from_fork+0x41/0x80
[   15.837587]  ret_from_fork_asm+0x1a/0x30
[   15.837885] 
[   15.838101] The buggy address belongs to the object at ffff888102635000
[   15.838101]  which belongs to the cache kmalloc-64 of size 64
[   15.838742] The buggy address is located 0 bytes to the right of
[   15.838742]  allocated 48-byte region [ffff888102635000, ffff888102635030)
[   15.839291] 
[   15.839445] The buggy address belongs to the physical page:
[   15.839728] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102635
[   15.840269] flags: 0x200000000000000(node=0|zone=2)
[   15.840620] page_type: f5(slab)
[   15.840904] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.841446] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   15.841997] page dumped because: kasan: bad access detected
[   15.842465] 
[   15.842674] Memory state around the buggy address:
[   15.843009]  ffff888102634f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.843380]  ffff888102634f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.843906] >ffff888102635000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.844316]                                      ^
[   15.844673]  ffff888102635080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.845102]  ffff888102635100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.845474] ==================================================================
[   14.698995] ==================================================================
[   14.699514] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x7c8/0x5450
[   14.699809] Write of size 4 at addr ffff888102635030 by task kunit_try_catch/270
[   14.700060] 
[   14.700184] CPU: 0 UID: 0 PID: 270 Comm: kunit_try_catch Tainted: G    B            N 6.12.32-rc1 #1
[   14.700265] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.700292] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.700332] Call Trace:
[   14.700364]  <TASK>
[   14.700395]  dump_stack_lvl+0x73/0xb0
[   14.700447]  print_report+0xd1/0x640
[   14.700495]  ? __virt_addr_valid+0x1db/0x2d0
[   14.700542]  ? kasan_atomics_helper+0x7c8/0x5450
[   14.700589]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.700636]  ? kasan_atomics_helper+0x7c8/0x5450
[   14.700689]  kasan_report+0x140/0x180
[   14.700730]  ? kasan_atomics_helper+0x7c8/0x5450
[   14.700784]  kasan_check_range+0x10c/0x1c0
[   14.700828]  __kasan_check_write+0x18/0x20
[   14.700870]  kasan_atomics_helper+0x7c8/0x5450
[   14.700916]  ? kasan_save_alloc_info+0x3b/0x50
[   14.700959]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.701009]  ? __kmalloc_cache_noprof+0x168/0x350
[   14.701066]  kasan_atomics+0x1dd/0x310
[   14.701109]  ? __pfx_kasan_atomics+0x10/0x10
[   14.701155]  ? __pfx_read_tsc+0x10/0x10
[   14.701195]  ? ktime_get_ts64+0x84/0x230
[   14.701250]  kunit_try_run_case+0x1a6/0x480
[   14.701289]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.701331]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   14.701374]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.701424]  ? __kthread_parkme+0x82/0x160
[   14.701458]  ? preempt_count_sub+0x50/0x80
[   14.701520]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.701560]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.701606]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.701658]  kthread+0x257/0x310
[   14.701711]  ? __pfx_kthread+0x10/0x10
[   14.701754]  ret_from_fork+0x41/0x80
[   14.701797]  ? __pfx_kthread+0x10/0x10
[   14.701839]  ret_from_fork_asm+0x1a/0x30
[   14.701911]  </TASK>
[   14.701938] 
[   14.714773] Allocated by task 270:
[   14.714988]  kasan_save_stack+0x45/0x70
[   14.715197]  kasan_save_track+0x18/0x40
[   14.715362]  kasan_save_alloc_info+0x3b/0x50
[   14.715519]  __kasan_kmalloc+0xb7/0xc0
[   14.715691]  __kmalloc_cache_noprof+0x168/0x350
[   14.716028]  kasan_atomics+0x96/0x310
[   14.716634]  kunit_try_run_case+0x1a6/0x480
[   14.717002]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.717344]  kthread+0x257/0x310
[   14.717555]  ret_from_fork+0x41/0x80
[   14.717786]  ret_from_fork_asm+0x1a/0x30
[   14.718129] 
[   14.718313] The buggy address belongs to the object at ffff888102635000
[   14.718313]  which belongs to the cache kmalloc-64 of size 64
[   14.718830] The buggy address is located 0 bytes to the right of
[   14.718830]  allocated 48-byte region [ffff888102635000, ffff888102635030)
[   14.719476] 
[   14.719645] The buggy address belongs to the physical page:
[   14.719962] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102635
[   14.720368] flags: 0x200000000000000(node=0|zone=2)
[   14.720676] page_type: f5(slab)
[   14.720883] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.721379] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   14.721843] page dumped because: kasan: bad access detected
[   14.722128] 
[   14.722308] Memory state around the buggy address:
[   14.722534]  ffff888102634f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.722893]  ffff888102634f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.723395] >ffff888102635000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.723707]                                      ^
[   14.724050]  ffff888102635080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.724503]  ffff888102635100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.724934] ==================================================================
[   14.725852] ==================================================================
[   14.726372] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x861/0x5450
[   14.726778] Write of size 4 at addr ffff888102635030 by task kunit_try_catch/270
[   14.727148] 
[   14.727333] CPU: 0 UID: 0 PID: 270 Comm: kunit_try_catch Tainted: G    B            N 6.12.32-rc1 #1
[   14.727426] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.727451] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.727506] Call Trace:
[   14.727544]  <TASK>
[   14.727574]  dump_stack_lvl+0x73/0xb0
[   14.727632]  print_report+0xd1/0x640
[   14.727689]  ? __virt_addr_valid+0x1db/0x2d0
[   14.727750]  ? kasan_atomics_helper+0x861/0x5450
[   14.727792]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.727835]  ? kasan_atomics_helper+0x861/0x5450
[   14.727877]  kasan_report+0x140/0x180
[   14.727933]  ? kasan_atomics_helper+0x861/0x5450
[   14.728001]  kasan_check_range+0x10c/0x1c0
[   14.728042]  __kasan_check_write+0x18/0x20
[   14.728121]  kasan_atomics_helper+0x861/0x5450
[   14.728181]  ? kasan_save_alloc_info+0x3b/0x50
[   14.728223]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.728270]  ? __kmalloc_cache_noprof+0x168/0x350
[   14.728322]  kasan_atomics+0x1dd/0x310
[   14.728372]  ? __pfx_kasan_atomics+0x10/0x10
[   14.728430]  ? __pfx_read_tsc+0x10/0x10
[   14.728470]  ? ktime_get_ts64+0x84/0x230
[   14.728521]  kunit_try_run_case+0x1a6/0x480
[   14.728574]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.728614]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   14.728679]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.728732]  ? __kthread_parkme+0x82/0x160
[   14.728775]  ? preempt_count_sub+0x50/0x80
[   14.728819]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.728860]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.728919]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.728973]  kthread+0x257/0x310
[   14.729029]  ? __pfx_kthread+0x10/0x10
[   14.729098]  ret_from_fork+0x41/0x80
[   14.729136]  ? __pfx_kthread+0x10/0x10
[   14.729167]  ret_from_fork_asm+0x1a/0x30
[   14.729199]  </TASK>
[   14.729213] 
[   14.740197] Allocated by task 270:
[   14.740495]  kasan_save_stack+0x45/0x70
[   14.740823]  kasan_save_track+0x18/0x40
[   14.741079]  kasan_save_alloc_info+0x3b/0x50
[   14.741271]  __kasan_kmalloc+0xb7/0xc0
[   14.741436]  __kmalloc_cache_noprof+0x168/0x350
[   14.741913]  kasan_atomics+0x96/0x310
[   14.742311]  kunit_try_run_case+0x1a6/0x480
[   14.742824]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.743260]  kthread+0x257/0x310
[   14.743527]  ret_from_fork+0x41/0x80
[   14.743724]  ret_from_fork_asm+0x1a/0x30
[   14.744128] 
[   14.744304] The buggy address belongs to the object at ffff888102635000
[   14.744304]  which belongs to the cache kmalloc-64 of size 64
[   14.745109] The buggy address is located 0 bytes to the right of
[   14.745109]  allocated 48-byte region [ffff888102635000, ffff888102635030)
[   14.745693] 
[   14.745849] The buggy address belongs to the physical page:
[   14.746154] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102635
[   14.746602] flags: 0x200000000000000(node=0|zone=2)
[   14.747038] page_type: f5(slab)
[   14.747361] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.747603] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   14.748089] page dumped because: kasan: bad access detected
[   14.748447] 
[   14.748600] Memory state around the buggy address:
[   14.748870]  ffff888102634f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.749302]  ffff888102634f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.749679] >ffff888102635000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.750011]                                      ^
[   14.750422]  ffff888102635080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.750791]  ffff888102635100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.751228] ==================================================================
[   15.511600] ==================================================================
[   15.512071] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x18b2/0x5450
[   15.512755] Write of size 8 at addr ffff888102635030 by task kunit_try_catch/270
[   15.513111] 
[   15.513343] CPU: 0 UID: 0 PID: 270 Comm: kunit_try_catch Tainted: G    B            N 6.12.32-rc1 #1
[   15.513496] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.513524] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.513579] Call Trace:
[   15.513619]  <TASK>
[   15.513651]  dump_stack_lvl+0x73/0xb0
[   15.513723]  print_report+0xd1/0x640
[   15.513767]  ? __virt_addr_valid+0x1db/0x2d0
[   15.513849]  ? kasan_atomics_helper+0x18b2/0x5450
[   15.513919]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.513972]  ? kasan_atomics_helper+0x18b2/0x5450
[   15.514027]  kasan_report+0x140/0x180
[   15.514075]  ? kasan_atomics_helper+0x18b2/0x5450
[   15.514152]  kasan_check_range+0x10c/0x1c0
[   15.514196]  __kasan_check_write+0x18/0x20
[   15.514264]  kasan_atomics_helper+0x18b2/0x5450
[   15.514325]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.514377]  ? __kmalloc_cache_noprof+0x168/0x350
[   15.514418]  kasan_atomics+0x1dd/0x310
[   15.514441]  ? __pfx_kasan_atomics+0x10/0x10
[   15.514463]  ? __pfx_read_tsc+0x10/0x10
[   15.514483]  ? ktime_get_ts64+0x84/0x230
[   15.514512]  kunit_try_run_case+0x1a6/0x480
[   15.514535]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.514555]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   15.514577]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.514603]  ? __kthread_parkme+0x82/0x160
[   15.514624]  ? preempt_count_sub+0x50/0x80
[   15.514647]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.514686]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.514717]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.514744]  kthread+0x257/0x310
[   15.514763]  ? __pfx_kthread+0x10/0x10
[   15.514782]  ret_from_fork+0x41/0x80
[   15.514803]  ? __pfx_kthread+0x10/0x10
[   15.514821]  ret_from_fork_asm+0x1a/0x30
[   15.514852]  </TASK>
[   15.514865] 
[   15.523550] Allocated by task 270:
[   15.523807]  kasan_save_stack+0x45/0x70
[   15.524151]  kasan_save_track+0x18/0x40
[   15.524393]  kasan_save_alloc_info+0x3b/0x50
[   15.524705]  __kasan_kmalloc+0xb7/0xc0
[   15.524970]  __kmalloc_cache_noprof+0x168/0x350
[   15.525408]  kasan_atomics+0x96/0x310
[   15.525608]  kunit_try_run_case+0x1a6/0x480
[   15.525854]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.526304]  kthread+0x257/0x310
[   15.526627]  ret_from_fork+0x41/0x80
[   15.526844]  ret_from_fork_asm+0x1a/0x30
[   15.527255] 
[   15.527371] The buggy address belongs to the object at ffff888102635000
[   15.527371]  which belongs to the cache kmalloc-64 of size 64
[   15.528077] The buggy address is located 0 bytes to the right of
[   15.528077]  allocated 48-byte region [ffff888102635000, ffff888102635030)
[   15.528615] 
[   15.528741] The buggy address belongs to the physical page:
[   15.528994] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102635
[   15.529662] flags: 0x200000000000000(node=0|zone=2)
[   15.530060] page_type: f5(slab)
[   15.530430] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.530883] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   15.531142] page dumped because: kasan: bad access detected
[   15.531347] 
[   15.531540] Memory state around the buggy address:
[   15.531887]  ffff888102634f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.532425]  ffff888102634f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.532930] >ffff888102635000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.533273]                                      ^
[   15.533544]  ffff888102635080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.534122]  ffff888102635100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.534538] ==================================================================
[   16.000156] ==================================================================
[   16.000550] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x5117/0x5450
[   16.001103] Read of size 8 at addr ffff888102635030 by task kunit_try_catch/270
[   16.001630] 
[   16.001860] CPU: 0 UID: 0 PID: 270 Comm: kunit_try_catch Tainted: G    B            N 6.12.32-rc1 #1
[   16.001964] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.001992] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.002082] Call Trace:
[   16.002127]  <TASK>
[   16.002164]  dump_stack_lvl+0x73/0xb0
[   16.002224]  print_report+0xd1/0x640
[   16.002289]  ? __virt_addr_valid+0x1db/0x2d0
[   16.002345]  ? kasan_atomics_helper+0x5117/0x5450
[   16.002387]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.002431]  ? kasan_atomics_helper+0x5117/0x5450
[   16.002478]  kasan_report+0x140/0x180
[   16.002528]  ? kasan_atomics_helper+0x5117/0x5450
[   16.002587]  __asan_report_load8_noabort+0x18/0x20
[   16.002633]  kasan_atomics_helper+0x5117/0x5450
[   16.002686]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.002717]  ? __kmalloc_cache_noprof+0x168/0x350
[   16.002746]  kasan_atomics+0x1dd/0x310
[   16.002767]  ? __pfx_kasan_atomics+0x10/0x10
[   16.002789]  ? __pfx_read_tsc+0x10/0x10
[   16.002809]  ? ktime_get_ts64+0x84/0x230
[   16.002837]  kunit_try_run_case+0x1a6/0x480
[   16.002861]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.002880]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   16.002902]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.002927]  ? __kthread_parkme+0x82/0x160
[   16.002947]  ? preempt_count_sub+0x50/0x80
[   16.002971]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.002991]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.003016]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.003042]  kthread+0x257/0x310
[   16.003082]  ? __pfx_kthread+0x10/0x10
[   16.003135]  ret_from_fork+0x41/0x80
[   16.003157]  ? __pfx_kthread+0x10/0x10
[   16.003176]  ret_from_fork_asm+0x1a/0x30
[   16.003207]  </TASK>
[   16.003221] 
[   16.012777] Allocated by task 270:
[   16.013012]  kasan_save_stack+0x45/0x70
[   16.013477]  kasan_save_track+0x18/0x40
[   16.013869]  kasan_save_alloc_info+0x3b/0x50
[   16.014222]  __kasan_kmalloc+0xb7/0xc0
[   16.014524]  __kmalloc_cache_noprof+0x168/0x350
[   16.014988]  kasan_atomics+0x96/0x310
[   16.015338]  kunit_try_run_case+0x1a6/0x480
[   16.015716]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.016052]  kthread+0x257/0x310
[   16.016323]  ret_from_fork+0x41/0x80
[   16.016589]  ret_from_fork_asm+0x1a/0x30
[   16.016891] 
[   16.017132] The buggy address belongs to the object at ffff888102635000
[   16.017132]  which belongs to the cache kmalloc-64 of size 64
[   16.017902] The buggy address is located 0 bytes to the right of
[   16.017902]  allocated 48-byte region [ffff888102635000, ffff888102635030)
[   16.018582] 
[   16.018768] The buggy address belongs to the physical page:
[   16.019090] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102635
[   16.019556] flags: 0x200000000000000(node=0|zone=2)
[   16.019900] page_type: f5(slab)
[   16.020213] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.020578] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   16.020883] page dumped because: kasan: bad access detected
[   16.021257] 
[   16.021428] Memory state around the buggy address:
[   16.021798]  ffff888102634f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.022284]  ffff888102634f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.022740] >ffff888102635000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.023094]                                      ^
[   16.023455]  ffff888102635080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.023805]  ffff888102635100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.024235] ==================================================================
[   15.359792] ==================================================================
[   15.360380] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x151e/0x5450
[   15.360708] Write of size 8 at addr ffff888102635030 by task kunit_try_catch/270
[   15.360961] 
[   15.361115] CPU: 0 UID: 0 PID: 270 Comm: kunit_try_catch Tainted: G    B            N 6.12.32-rc1 #1
[   15.361202] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.361230] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.361275] Call Trace:
[   15.361315]  <TASK>
[   15.361352]  dump_stack_lvl+0x73/0xb0
[   15.361402]  print_report+0xd1/0x640
[   15.361445]  ? __virt_addr_valid+0x1db/0x2d0
[   15.361482]  ? kasan_atomics_helper+0x151e/0x5450
[   15.361518]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.361559]  ? kasan_atomics_helper+0x151e/0x5450
[   15.361603]  kasan_report+0x140/0x180
[   15.361688]  ? kasan_atomics_helper+0x151e/0x5450
[   15.361744]  kasan_check_range+0x10c/0x1c0
[   15.361788]  __kasan_check_write+0x18/0x20
[   15.361828]  kasan_atomics_helper+0x151e/0x5450
[   15.361879]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.361944]  ? __kmalloc_cache_noprof+0x168/0x350
[   15.362009]  kasan_atomics+0x1dd/0x310
[   15.362107]  ? __pfx_kasan_atomics+0x10/0x10
[   15.362165]  ? __pfx_read_tsc+0x10/0x10
[   15.362204]  ? ktime_get_ts64+0x84/0x230
[   15.362254]  kunit_try_run_case+0x1a6/0x480
[   15.362301]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.362338]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   15.362384]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.362437]  ? __kthread_parkme+0x82/0x160
[   15.362481]  ? preempt_count_sub+0x50/0x80
[   15.362534]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.362578]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.362631]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.362696]  kthread+0x257/0x310
[   15.362735]  ? __pfx_kthread+0x10/0x10
[   15.362775]  ret_from_fork+0x41/0x80
[   15.362807]  ? __pfx_kthread+0x10/0x10
[   15.362838]  ret_from_fork_asm+0x1a/0x30
[   15.362897]  </TASK>
[   15.362922] 
[   15.371760] Allocated by task 270:
[   15.372098]  kasan_save_stack+0x45/0x70
[   15.372356]  kasan_save_track+0x18/0x40
[   15.372621]  kasan_save_alloc_info+0x3b/0x50
[   15.372932]  __kasan_kmalloc+0xb7/0xc0
[   15.373213]  __kmalloc_cache_noprof+0x168/0x350
[   15.373499]  kasan_atomics+0x96/0x310
[   15.373809]  kunit_try_run_case+0x1a6/0x480
[   15.374087]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.374423]  kthread+0x257/0x310
[   15.374691]  ret_from_fork+0x41/0x80
[   15.374907]  ret_from_fork_asm+0x1a/0x30
[   15.375212] 
[   15.375378] The buggy address belongs to the object at ffff888102635000
[   15.375378]  which belongs to the cache kmalloc-64 of size 64
[   15.375840] The buggy address is located 0 bytes to the right of
[   15.375840]  allocated 48-byte region [ffff888102635000, ffff888102635030)
[   15.376546] 
[   15.376728] The buggy address belongs to the physical page:
[   15.377028] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102635
[   15.377463] flags: 0x200000000000000(node=0|zone=2)
[   15.377729] page_type: f5(slab)
[   15.377894] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.378345] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   15.378864] page dumped because: kasan: bad access detected
[   15.379245] 
[   15.379352] Memory state around the buggy address:
[   15.379537]  ffff888102634f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.379941]  ffff888102634f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.380464] >ffff888102635000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.380890]                                      ^
[   15.381112]  ffff888102635080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.381351]  ffff888102635100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.381581] ==================================================================
[   14.752298] ==================================================================
[   14.752747] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x8fa/0x5450
[   14.753147] Write of size 4 at addr ffff888102635030 by task kunit_try_catch/270
[   14.753475] 
[   14.753803] CPU: 0 UID: 0 PID: 270 Comm: kunit_try_catch Tainted: G    B            N 6.12.32-rc1 #1
[   14.753897] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.753928] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.753963] Call Trace:
[   14.753992]  <TASK>
[   14.754017]  dump_stack_lvl+0x73/0xb0
[   14.754076]  print_report+0xd1/0x640
[   14.754110]  ? __virt_addr_valid+0x1db/0x2d0
[   14.754143]  ? kasan_atomics_helper+0x8fa/0x5450
[   14.754175]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.754208]  ? kasan_atomics_helper+0x8fa/0x5450
[   14.754245]  kasan_report+0x140/0x180
[   14.754275]  ? kasan_atomics_helper+0x8fa/0x5450
[   14.754304]  kasan_check_range+0x10c/0x1c0
[   14.754327]  __kasan_check_write+0x18/0x20
[   14.754349]  kasan_atomics_helper+0x8fa/0x5450
[   14.754373]  ? kasan_save_alloc_info+0x3b/0x50
[   14.754395]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.754424]  ? __kmalloc_cache_noprof+0x168/0x350
[   14.754453]  kasan_atomics+0x1dd/0x310
[   14.754474]  ? __pfx_kasan_atomics+0x10/0x10
[   14.754497]  ? __pfx_read_tsc+0x10/0x10
[   14.754517]  ? ktime_get_ts64+0x84/0x230
[   14.754545]  kunit_try_run_case+0x1a6/0x480
[   14.754569]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.754590]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   14.754613]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.754639]  ? __kthread_parkme+0x82/0x160
[   14.754660]  ? preempt_count_sub+0x50/0x80
[   14.754715]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.754751]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.754798]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.754845]  kthread+0x257/0x310
[   14.754885]  ? __pfx_kthread+0x10/0x10
[   14.754926]  ret_from_fork+0x41/0x80
[   14.754966]  ? __pfx_kthread+0x10/0x10
[   14.755002]  ret_from_fork_asm+0x1a/0x30
[   14.755063]  </TASK>
[   14.755088] 
[   14.763383] Allocated by task 270:
[   14.763652]  kasan_save_stack+0x45/0x70
[   14.764003]  kasan_save_track+0x18/0x40
[   14.764247]  kasan_save_alloc_info+0x3b/0x50
[   14.764490]  __kasan_kmalloc+0xb7/0xc0
[   14.764775]  __kmalloc_cache_noprof+0x168/0x350
[   14.765086]  kasan_atomics+0x96/0x310
[   14.765392]  kunit_try_run_case+0x1a6/0x480
[   14.765730]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.765970]  kthread+0x257/0x310
[   14.766297]  ret_from_fork+0x41/0x80
[   14.766526]  ret_from_fork_asm+0x1a/0x30
[   14.766831] 
[   14.766980] The buggy address belongs to the object at ffff888102635000
[   14.766980]  which belongs to the cache kmalloc-64 of size 64
[   14.767647] The buggy address is located 0 bytes to the right of
[   14.767647]  allocated 48-byte region [ffff888102635000, ffff888102635030)
[   14.768351] 
[   14.768501] The buggy address belongs to the physical page:
[   14.768790] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102635
[   14.769294] flags: 0x200000000000000(node=0|zone=2)
[   14.769595] page_type: f5(slab)
[   14.769855] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.770276] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   14.770698] page dumped because: kasan: bad access detected
[   14.771024] 
[   14.771228] Memory state around the buggy address:
[   14.771483]  ffff888102634f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.771873]  ffff888102634f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.772331] >ffff888102635000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.772694]                                      ^
[   14.772942]  ffff888102635080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.773209]  ffff888102635100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.773441] ==================================================================
[   14.965383] ==================================================================
[   14.965744] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xe79/0x5450
[   14.966035] Write of size 4 at addr ffff888102635030 by task kunit_try_catch/270
[   14.966579] 
[   14.966765] CPU: 0 UID: 0 PID: 270 Comm: kunit_try_catch Tainted: G    B            N 6.12.32-rc1 #1
[   14.966853] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.966877] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.966916] Call Trace:
[   14.966949]  <TASK>
[   14.967002]  dump_stack_lvl+0x73/0xb0
[   14.967099]  print_report+0xd1/0x640
[   14.967143]  ? __virt_addr_valid+0x1db/0x2d0
[   14.967187]  ? kasan_atomics_helper+0xe79/0x5450
[   14.967227]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.967271]  ? kasan_atomics_helper+0xe79/0x5450
[   14.967332]  kasan_report+0x140/0x180
[   14.967388]  ? kasan_atomics_helper+0xe79/0x5450
[   14.967443]  kasan_check_range+0x10c/0x1c0
[   14.967489]  __kasan_check_write+0x18/0x20
[   14.967532]  kasan_atomics_helper+0xe79/0x5450
[   14.967577]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.967627]  ? __kmalloc_cache_noprof+0x168/0x350
[   14.967693]  kasan_atomics+0x1dd/0x310
[   14.967739]  ? __pfx_kasan_atomics+0x10/0x10
[   14.967784]  ? __pfx_read_tsc+0x10/0x10
[   14.967818]  ? ktime_get_ts64+0x84/0x230
[   14.967850]  kunit_try_run_case+0x1a6/0x480
[   14.967874]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.967894]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   14.967916]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.967941]  ? __kthread_parkme+0x82/0x160
[   14.967961]  ? preempt_count_sub+0x50/0x80
[   14.967983]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.968003]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.968028]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.968068]  kthread+0x257/0x310
[   14.968125]  ? __pfx_kthread+0x10/0x10
[   14.968145]  ret_from_fork+0x41/0x80
[   14.968166]  ? __pfx_kthread+0x10/0x10
[   14.968186]  ret_from_fork_asm+0x1a/0x30
[   14.968216]  </TASK>
[   14.968230] 
[   14.977918] Allocated by task 270:
[   14.978239]  kasan_save_stack+0x45/0x70
[   14.978491]  kasan_save_track+0x18/0x40
[   14.978711]  kasan_save_alloc_info+0x3b/0x50
[   14.978947]  __kasan_kmalloc+0xb7/0xc0
[   14.979206]  __kmalloc_cache_noprof+0x168/0x350
[   14.979442]  kasan_atomics+0x96/0x310
[   14.979762]  kunit_try_run_case+0x1a6/0x480
[   14.979984]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.980224]  kthread+0x257/0x310
[   14.980382]  ret_from_fork+0x41/0x80
[   14.980550]  ret_from_fork_asm+0x1a/0x30
[   14.980835] 
[   14.981029] The buggy address belongs to the object at ffff888102635000
[   14.981029]  which belongs to the cache kmalloc-64 of size 64
[   14.981949] The buggy address is located 0 bytes to the right of
[   14.981949]  allocated 48-byte region [ffff888102635000, ffff888102635030)
[   14.982818] 
[   14.982995] The buggy address belongs to the physical page:
[   14.983412] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102635
[   14.983899] flags: 0x200000000000000(node=0|zone=2)
[   14.984324] page_type: f5(slab)
[   14.984494] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.984814] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   14.985443] page dumped because: kasan: bad access detected
[   14.985756] 
[   14.985863] Memory state around the buggy address:
[   14.986118]  ffff888102634f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.986619]  ffff888102634f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.987192] >ffff888102635000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.987601]                                      ^
[   14.987816]  ffff888102635080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.988163]  ffff888102635100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.988656] ==================================================================