Hay
Date
June 7, 2025, 10:40 a.m.

Environment
qemu-arm64
qemu-x86_64

[   24.986152] ==================================================================
[   24.987845] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4210/0x49c8
[   24.988611] Read of size 4 at addr fff00000c42055b0 by task kunit_try_catch/253
[   24.989805] 
[   24.990206] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G    B            N 6.12.33-rc1 #1
[   24.990475] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.990546] Hardware name: linux,dummy-virt (DT)
[   24.990593] Call trace:
[   24.990623]  dump_backtrace+0x9c/0x128
[   24.990726]  show_stack+0x20/0x38
[   24.990782]  dump_stack_lvl+0x8c/0xd0
[   24.990830]  print_report+0x118/0x5f0
[   24.990886]  kasan_report+0xdc/0x128
[   24.990934]  __asan_report_load4_noabort+0x20/0x30
[   24.991021]  kasan_atomics_helper+0x4210/0x49c8
[   24.991082]  kasan_atomics+0x1a0/0x2e8
[   24.991135]  kunit_try_run_case+0x170/0x3f0
[   24.991184]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.991241]  kthread+0x24c/0x2d0
[   24.991290]  ret_from_fork+0x10/0x20
[   24.991343] 
[   24.999088] Allocated by task 253:
[   24.999755]  kasan_save_stack+0x3c/0x68
[   25.000279]  kasan_save_track+0x20/0x40
[   25.000773]  kasan_save_alloc_info+0x40/0x58
[   25.001398]  __kasan_kmalloc+0xd4/0xd8
[   25.001899]  __kmalloc_cache_noprof+0x154/0x320
[   25.002695]  kasan_atomics+0xb8/0x2e8
[   25.003224]  kunit_try_run_case+0x170/0x3f0
[   25.004060]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.004650]  kthread+0x24c/0x2d0
[   25.005177]  ret_from_fork+0x10/0x20
[   25.005721] 
[   25.006080] The buggy address belongs to the object at fff00000c4205580
[   25.006080]  which belongs to the cache kmalloc-64 of size 64
[   25.007107] The buggy address is located 0 bytes to the right of
[   25.007107]  allocated 48-byte region [fff00000c4205580, fff00000c42055b0)
[   25.008928] 
[   25.009283] The buggy address belongs to the physical page:
[   25.009945] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104205
[   25.010741] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   25.011696] page_type: f5(slab)
[   25.012215] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   25.013033] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   25.013877] page dumped because: kasan: bad access detected
[   25.014649] 
[   25.014992] Memory state around the buggy address:
[   25.015546]  fff00000c4205480: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   25.016587]  fff00000c4205500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.017328] >fff00000c4205580: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   25.018086]                                      ^
[   25.018680]  fff00000c4205600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.019698]  fff00000c4205680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.020443] ==================================================================
[   26.408980] ==================================================================
[   26.409906] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf94/0x49c8
[   26.410697] Write of size 8 at addr fff00000c42055b0 by task kunit_try_catch/253
[   26.412022] 
[   26.412441] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G    B            N 6.12.33-rc1 #1
[   26.412644] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.412728] Hardware name: linux,dummy-virt (DT)
[   26.412832] Call trace:
[   26.412893]  dump_backtrace+0x9c/0x128
[   26.412952]  show_stack+0x20/0x38
[   26.413034]  dump_stack_lvl+0x8c/0xd0
[   26.413085]  print_report+0x118/0x5f0
[   26.413134]  kasan_report+0xdc/0x128
[   26.413180]  kasan_check_range+0x100/0x1a8
[   26.413231]  __kasan_check_write+0x20/0x30
[   26.413281]  kasan_atomics_helper+0xf94/0x49c8
[   26.413338]  kasan_atomics+0x1a0/0x2e8
[   26.413389]  kunit_try_run_case+0x170/0x3f0
[   26.413441]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.413497]  kthread+0x24c/0x2d0
[   26.413548]  ret_from_fork+0x10/0x20
[   26.413599] 
[   26.420294] Allocated by task 253:
[   26.420761]  kasan_save_stack+0x3c/0x68
[   26.421350]  kasan_save_track+0x20/0x40
[   26.421866]  kasan_save_alloc_info+0x40/0x58
[   26.422410]  __kasan_kmalloc+0xd4/0xd8
[   26.422925]  __kmalloc_cache_noprof+0x154/0x320
[   26.423518]  kasan_atomics+0xb8/0x2e8
[   26.424030]  kunit_try_run_case+0x170/0x3f0
[   26.424526]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.425237]  kthread+0x24c/0x2d0
[   26.425642]  ret_from_fork+0x10/0x20
[   26.426267] 
[   26.426596] The buggy address belongs to the object at fff00000c4205580
[   26.426596]  which belongs to the cache kmalloc-64 of size 64
[   26.427696] The buggy address is located 0 bytes to the right of
[   26.427696]  allocated 48-byte region [fff00000c4205580, fff00000c42055b0)
[   26.428940] 
[   26.429330] The buggy address belongs to the physical page:
[   26.430038] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104205
[   26.430949] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   26.431689] page_type: f5(slab)
[   26.432179] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   26.432898] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   26.433580] page dumped because: kasan: bad access detected
[   26.434189] 
[   26.434524] Memory state around the buggy address:
[   26.435070]  fff00000c4205480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.435794]  fff00000c4205500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.436574] >fff00000c4205580: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   26.437354]                                      ^
[   26.437885]  fff00000c4205600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.438637]  fff00000c4205680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.439363] ==================================================================
[   25.061040] ==================================================================
[   25.062164] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1f8/0x49c8
[   25.062836] Read of size 4 at addr fff00000c42055b0 by task kunit_try_catch/253
[   25.063561] 
[   25.063913] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G    B            N 6.12.33-rc1 #1
[   25.064132] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.064203] Hardware name: linux,dummy-virt (DT)
[   25.064281] Call trace:
[   25.064347]  dump_backtrace+0x9c/0x128
[   25.064454]  show_stack+0x20/0x38
[   25.064551]  dump_stack_lvl+0x8c/0xd0
[   25.064655]  print_report+0x118/0x5f0
[   25.064780]  kasan_report+0xdc/0x128
[   25.064902]  kasan_check_range+0x100/0x1a8
[   25.065077]  __kasan_check_read+0x20/0x30
[   25.065248]  kasan_atomics_helper+0x1f8/0x49c8
[   25.065411]  kasan_atomics+0x1a0/0x2e8
[   25.065533]  kunit_try_run_case+0x170/0x3f0
[   25.065649]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.065762]  kthread+0x24c/0x2d0
[   25.065817]  ret_from_fork+0x10/0x20
[   25.065867] 
[   25.075991] Allocated by task 253:
[   25.076581]  kasan_save_stack+0x3c/0x68
[   25.077253]  kasan_save_track+0x20/0x40
[   25.077821]  kasan_save_alloc_info+0x40/0x58
[   25.078510]  __kasan_kmalloc+0xd4/0xd8
[   25.079108]  __kmalloc_cache_noprof+0x154/0x320
[   25.080121]  kasan_atomics+0xb8/0x2e8
[   25.080791]  kunit_try_run_case+0x170/0x3f0
[   25.081446]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.082213]  kthread+0x24c/0x2d0
[   25.082758]  ret_from_fork+0x10/0x20
[   25.083352] 
[   25.083855] The buggy address belongs to the object at fff00000c4205580
[   25.083855]  which belongs to the cache kmalloc-64 of size 64
[   25.085318] The buggy address is located 0 bytes to the right of
[   25.085318]  allocated 48-byte region [fff00000c4205580, fff00000c42055b0)
[   25.086700] 
[   25.087038] The buggy address belongs to the physical page:
[   25.088436] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104205
[   25.089418] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   25.090120] page_type: f5(slab)
[   25.090696] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   25.091903] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   25.092784] page dumped because: kasan: bad access detected
[   25.093425] 
[   25.093774] Memory state around the buggy address:
[   25.094388]  fff00000c4205480: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   25.095203]  fff00000c4205500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.096559] >fff00000c4205580: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   25.097449]                                      ^
[   25.097954]  fff00000c4205600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.098638]  fff00000c4205680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.099770] ==================================================================
[   25.216165] ==================================================================
[   25.216900] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x344/0x49c8
[   25.217573] Write of size 4 at addr fff00000c42055b0 by task kunit_try_catch/253
[   25.218395] 
[   25.218740] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G    B            N 6.12.33-rc1 #1
[   25.218946] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.219045] Hardware name: linux,dummy-virt (DT)
[   25.219135] Call trace:
[   25.219207]  dump_backtrace+0x9c/0x128
[   25.219334]  show_stack+0x20/0x38
[   25.219500]  dump_stack_lvl+0x8c/0xd0
[   25.219622]  print_report+0x118/0x5f0
[   25.219738]  kasan_report+0xdc/0x128
[   25.219858]  kasan_check_range+0x100/0x1a8
[   25.219995]  __kasan_check_write+0x20/0x30
[   25.220122]  kasan_atomics_helper+0x344/0x49c8
[   25.220243]  kasan_atomics+0x1a0/0x2e8
[   25.220404]  kunit_try_run_case+0x170/0x3f0
[   25.220522]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.220653]  kthread+0x24c/0x2d0
[   25.220777]  ret_from_fork+0x10/0x20
[   25.220895] 
[   25.228095] Allocated by task 253:
[   25.228720]  kasan_save_stack+0x3c/0x68
[   25.229362]  kasan_save_track+0x20/0x40
[   25.229913]  kasan_save_alloc_info+0x40/0x58
[   25.230461]  __kasan_kmalloc+0xd4/0xd8
[   25.230891]  __kmalloc_cache_noprof+0x154/0x320
[   25.231575]  kasan_atomics+0xb8/0x2e8
[   25.232182]  kunit_try_run_case+0x170/0x3f0
[   25.232810]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.233432]  kthread+0x24c/0x2d0
[   25.233897]  ret_from_fork+0x10/0x20
[   25.234403] 
[   25.234733] The buggy address belongs to the object at fff00000c4205580
[   25.234733]  which belongs to the cache kmalloc-64 of size 64
[   25.235938] The buggy address is located 0 bytes to the right of
[   25.235938]  allocated 48-byte region [fff00000c4205580, fff00000c42055b0)
[   25.237329] 
[   25.237608] The buggy address belongs to the physical page:
[   25.239068] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104205
[   25.239837] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   25.240442] page_type: f5(slab)
[   25.240942] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   25.243003] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   25.244626] page dumped because: kasan: bad access detected
[   25.245698] 
[   25.246138] Memory state around the buggy address:
[   25.246718]  fff00000c4205480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.247787]  fff00000c4205500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.248587] >fff00000c4205580: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   25.249532]                                      ^
[   25.250122]  fff00000c4205600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.250930]  fff00000c4205680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.251808] ==================================================================
[   25.552651] ==================================================================
[   25.553430] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x6bc/0x49c8
[   25.554222] Write of size 4 at addr fff00000c42055b0 by task kunit_try_catch/253
[   25.555033] 
[   25.555390] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G    B            N 6.12.33-rc1 #1
[   25.555591] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.555704] Hardware name: linux,dummy-virt (DT)
[   25.555793] Call trace:
[   25.555867]  dump_backtrace+0x9c/0x128
[   25.556009]  show_stack+0x20/0x38
[   25.556130]  dump_stack_lvl+0x8c/0xd0
[   25.556249]  print_report+0x118/0x5f0
[   25.556369]  kasan_report+0xdc/0x128
[   25.556485]  kasan_check_range+0x100/0x1a8
[   25.556603]  __kasan_check_write+0x20/0x30
[   25.556729]  kasan_atomics_helper+0x6bc/0x49c8
[   25.556866]  kasan_atomics+0x1a0/0x2e8
[   25.557008]  kunit_try_run_case+0x170/0x3f0
[   25.557129]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.557201]  kthread+0x24c/0x2d0
[   25.557250]  ret_from_fork+0x10/0x20
[   25.557300] 
[   25.563993] Allocated by task 253:
[   25.564474]  kasan_save_stack+0x3c/0x68
[   25.565075]  kasan_save_track+0x20/0x40
[   25.565693]  kasan_save_alloc_info+0x40/0x58
[   25.566241]  __kasan_kmalloc+0xd4/0xd8
[   25.566730]  __kmalloc_cache_noprof+0x154/0x320
[   25.567368]  kasan_atomics+0xb8/0x2e8
[   25.567867]  kunit_try_run_case+0x170/0x3f0
[   25.568429]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.569246]  kthread+0x24c/0x2d0
[   25.569744]  ret_from_fork+0x10/0x20
[   25.570679] 
[   25.571153] The buggy address belongs to the object at fff00000c4205580
[   25.571153]  which belongs to the cache kmalloc-64 of size 64
[   25.572238] The buggy address is located 0 bytes to the right of
[   25.572238]  allocated 48-byte region [fff00000c4205580, fff00000c42055b0)
[   25.573802] 
[   25.574244] The buggy address belongs to the physical page:
[   25.574912] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104205
[   25.575886] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   25.576718] page_type: f5(slab)
[   25.577219] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   25.577995] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   25.578744] page dumped because: kasan: bad access detected
[   25.579531] 
[   25.580018] Memory state around the buggy address:
[   25.580530]  fff00000c4205480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.581219]  fff00000c4205500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.581938] >fff00000c4205580: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   25.582670]                                      ^
[   25.583228]  fff00000c4205600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.583914]  fff00000c4205680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.584672] ==================================================================
[   25.101201] ==================================================================
[   25.101978] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x25c/0x49c8
[   25.102649] Write of size 4 at addr fff00000c42055b0 by task kunit_try_catch/253
[   25.103590] 
[   25.103987] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G    B            N 6.12.33-rc1 #1
[   25.104192] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.104276] Hardware name: linux,dummy-virt (DT)
[   25.104362] Call trace:
[   25.104461]  dump_backtrace+0x9c/0x128
[   25.104574]  show_stack+0x20/0x38
[   25.104676]  dump_stack_lvl+0x8c/0xd0
[   25.104789]  print_report+0x118/0x5f0
[   25.104886]  kasan_report+0xdc/0x128
[   25.105006]  kasan_check_range+0x100/0x1a8
[   25.105119]  __kasan_check_write+0x20/0x30
[   25.105286]  kasan_atomics_helper+0x25c/0x49c8
[   25.105417]  kasan_atomics+0x1a0/0x2e8
[   25.105538]  kunit_try_run_case+0x170/0x3f0
[   25.105651]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.105734]  kthread+0x24c/0x2d0
[   25.105785]  ret_from_fork+0x10/0x20
[   25.105836] 
[   25.114394] Allocated by task 253:
[   25.114919]  kasan_save_stack+0x3c/0x68
[   25.115877]  kasan_save_track+0x20/0x40
[   25.116515]  kasan_save_alloc_info+0x40/0x58
[   25.117072]  __kasan_kmalloc+0xd4/0xd8
[   25.117690]  __kmalloc_cache_noprof+0x154/0x320
[   25.118334]  kasan_atomics+0xb8/0x2e8
[   25.118980]  kunit_try_run_case+0x170/0x3f0
[   25.119516]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.120109]  kthread+0x24c/0x2d0
[   25.120508]  ret_from_fork+0x10/0x20
[   25.120955] 
[   25.122003] The buggy address belongs to the object at fff00000c4205580
[   25.122003]  which belongs to the cache kmalloc-64 of size 64
[   25.123442] The buggy address is located 0 bytes to the right of
[   25.123442]  allocated 48-byte region [fff00000c4205580, fff00000c42055b0)
[   25.125059] 
[   25.125566] The buggy address belongs to the physical page:
[   25.126243] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104205
[   25.126980] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   25.127693] page_type: f5(slab)
[   25.128199] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   25.128996] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   25.129730] page dumped because: kasan: bad access detected
[   25.130743] 
[   25.131035] Memory state around the buggy address:
[   25.131614]  fff00000c4205480: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   25.132534]  fff00000c4205500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.133242] >fff00000c4205580: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   25.134405]                                      ^
[   25.134893]  fff00000c4205600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.135594]  fff00000c4205680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.136606] ==================================================================
[   25.922813] ==================================================================
[   25.923597] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f34/0x49c8
[   25.924493] Read of size 4 at addr fff00000c42055b0 by task kunit_try_catch/253
[   25.925313] 
[   25.925625] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G    B            N 6.12.33-rc1 #1
[   25.925850] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.925938] Hardware name: linux,dummy-virt (DT)
[   25.926050] Call trace:
[   25.926125]  dump_backtrace+0x9c/0x128
[   25.926254]  show_stack+0x20/0x38
[   25.926374]  dump_stack_lvl+0x8c/0xd0
[   25.926500]  print_report+0x118/0x5f0
[   25.926615]  kasan_report+0xdc/0x128
[   25.926718]  __asan_report_load4_noabort+0x20/0x30
[   25.926780]  kasan_atomics_helper+0x3f34/0x49c8
[   25.926835]  kasan_atomics+0x1a0/0x2e8
[   25.926887]  kunit_try_run_case+0x170/0x3f0
[   25.926938]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.927026]  kthread+0x24c/0x2d0
[   25.927078]  ret_from_fork+0x10/0x20
[   25.927130] 
[   25.933463] Allocated by task 253:
[   25.933938]  kasan_save_stack+0x3c/0x68
[   25.934532]  kasan_save_track+0x20/0x40
[   25.935103]  kasan_save_alloc_info+0x40/0x58
[   25.935665]  __kasan_kmalloc+0xd4/0xd8
[   25.936170]  __kmalloc_cache_noprof+0x154/0x320
[   25.936701]  kasan_atomics+0xb8/0x2e8
[   25.937239]  kunit_try_run_case+0x170/0x3f0
[   25.937819]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.938498]  kthread+0x24c/0x2d0
[   25.938980]  ret_from_fork+0x10/0x20
[   25.939439] 
[   25.939760] The buggy address belongs to the object at fff00000c4205580
[   25.939760]  which belongs to the cache kmalloc-64 of size 64
[   25.940951] The buggy address is located 0 bytes to the right of
[   25.940951]  allocated 48-byte region [fff00000c4205580, fff00000c42055b0)
[   25.942286] 
[   25.942607] The buggy address belongs to the physical page:
[   25.943153] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104205
[   25.944020] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   25.944668] page_type: f5(slab)
[   25.945201] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   25.946507] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   25.947453] page dumped because: kasan: bad access detected
[   25.948059] 
[   25.948357] Memory state around the buggy address:
[   25.948872]  fff00000c4205480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.949665]  fff00000c4205500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.950433] >fff00000c4205580: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   25.951392]                                      ^
[   25.951826]  fff00000c4205600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.954514]  fff00000c4205680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.956391] ==================================================================
[   26.791743] ==================================================================
[   26.792356] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x406c/0x49c8
[   26.793321] Read of size 8 at addr fff00000c42055b0 by task kunit_try_catch/253
[   26.794129] 
[   26.794481] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G    B            N 6.12.33-rc1 #1
[   26.794697] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.794784] Hardware name: linux,dummy-virt (DT)
[   26.794876] Call trace:
[   26.794951]  dump_backtrace+0x9c/0x128
[   26.795094]  show_stack+0x20/0x38
[   26.795214]  dump_stack_lvl+0x8c/0xd0
[   26.795333]  print_report+0x118/0x5f0
[   26.795631]  kasan_report+0xdc/0x128
[   26.795757]  __asan_report_load8_noabort+0x20/0x30
[   26.795898]  kasan_atomics_helper+0x406c/0x49c8
[   26.796053]  kasan_atomics+0x1a0/0x2e8
[   26.796178]  kunit_try_run_case+0x170/0x3f0
[   26.796266]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.796327]  kthread+0x24c/0x2d0
[   26.796378]  ret_from_fork+0x10/0x20
[   26.796429] 
[   26.802616] Allocated by task 253:
[   26.803121]  kasan_save_stack+0x3c/0x68
[   26.803722]  kasan_save_track+0x20/0x40
[   26.804284]  kasan_save_alloc_info+0x40/0x58
[   26.804909]  __kasan_kmalloc+0xd4/0xd8
[   26.805471]  __kmalloc_cache_noprof+0x154/0x320
[   26.805998]  kasan_atomics+0xb8/0x2e8
[   26.806564]  kunit_try_run_case+0x170/0x3f0
[   26.807244]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.807908]  kthread+0x24c/0x2d0
[   26.808429]  ret_from_fork+0x10/0x20
[   26.808887] 
[   26.809227] The buggy address belongs to the object at fff00000c4205580
[   26.809227]  which belongs to the cache kmalloc-64 of size 64
[   26.810487] The buggy address is located 0 bytes to the right of
[   26.810487]  allocated 48-byte region [fff00000c4205580, fff00000c42055b0)
[   26.811691] 
[   26.812047] The buggy address belongs to the physical page:
[   26.812605] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104205
[   26.813428] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   26.814445] page_type: f5(slab)
[   26.814852] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   26.816065] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   26.816996] page dumped because: kasan: bad access detected
[   26.817542] 
[   26.817823] Memory state around the buggy address:
[   26.818469]  fff00000c4205480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.819407]  fff00000c4205500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.820233] >fff00000c4205580: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   26.821036]                                      ^
[   26.821699]  fff00000c4205600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.822543]  fff00000c4205680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.823337] ==================================================================
[   26.239863] ==================================================================
[   26.240595] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xe3c/0x49c8
[   26.241458] Read of size 8 at addr fff00000c42055b0 by task kunit_try_catch/253
[   26.242237] 
[   26.242617] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G    B            N 6.12.33-rc1 #1
[   26.242819] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.242909] Hardware name: linux,dummy-virt (DT)
[   26.243017] Call trace:
[   26.243091]  dump_backtrace+0x9c/0x128
[   26.243215]  show_stack+0x20/0x38
[   26.243333]  dump_stack_lvl+0x8c/0xd0
[   26.243455]  print_report+0x118/0x5f0
[   26.243591]  kasan_report+0xdc/0x128
[   26.243710]  kasan_check_range+0x100/0x1a8
[   26.243832]  __kasan_check_read+0x20/0x30
[   26.243981]  kasan_atomics_helper+0xe3c/0x49c8
[   26.244114]  kasan_atomics+0x1a0/0x2e8
[   26.244236]  kunit_try_run_case+0x170/0x3f0
[   26.244364]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.244479]  kthread+0x24c/0x2d0
[   26.244533]  ret_from_fork+0x10/0x20
[   26.244585] 
[   26.251253] Allocated by task 253:
[   26.251775]  kasan_save_stack+0x3c/0x68
[   26.252399]  kasan_save_track+0x20/0x40
[   26.252883]  kasan_save_alloc_info+0x40/0x58
[   26.253461]  __kasan_kmalloc+0xd4/0xd8
[   26.253920]  __kmalloc_cache_noprof+0x154/0x320
[   26.254546]  kasan_atomics+0xb8/0x2e8
[   26.255132]  kunit_try_run_case+0x170/0x3f0
[   26.255706]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.257112]  kthread+0x24c/0x2d0
[   26.257595]  ret_from_fork+0x10/0x20
[   26.258110] 
[   26.258399] The buggy address belongs to the object at fff00000c4205580
[   26.258399]  which belongs to the cache kmalloc-64 of size 64
[   26.259520] The buggy address is located 0 bytes to the right of
[   26.259520]  allocated 48-byte region [fff00000c4205580, fff00000c42055b0)
[   26.260803] 
[   26.261123] The buggy address belongs to the physical page:
[   26.261759] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104205
[   26.262829] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   26.263573] page_type: f5(slab)
[   26.264030] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   26.264799] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   26.265550] page dumped because: kasan: bad access detected
[   26.266158] 
[   26.266478] Memory state around the buggy address:
[   26.267041]  fff00000c4205480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.267725]  fff00000c4205500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.268469] >fff00000c4205580: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   26.269195]                                      ^
[   26.269762]  fff00000c4205600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.270464]  fff00000c4205680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.271216] ==================================================================
[   26.373486] ==================================================================
[   26.374162] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf28/0x49c8
[   26.374952] Write of size 8 at addr fff00000c42055b0 by task kunit_try_catch/253
[   26.375638] 
[   26.376037] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G    B            N 6.12.33-rc1 #1
[   26.376238] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.376326] Hardware name: linux,dummy-virt (DT)
[   26.376419] Call trace:
[   26.376491]  dump_backtrace+0x9c/0x128
[   26.376615]  show_stack+0x20/0x38
[   26.376732]  dump_stack_lvl+0x8c/0xd0
[   26.376862]  print_report+0x118/0x5f0
[   26.376996]  kasan_report+0xdc/0x128
[   26.377114]  kasan_check_range+0x100/0x1a8
[   26.377194]  __kasan_check_write+0x20/0x30
[   26.377246]  kasan_atomics_helper+0xf28/0x49c8
[   26.377300]  kasan_atomics+0x1a0/0x2e8
[   26.377351]  kunit_try_run_case+0x170/0x3f0
[   26.377400]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.377455]  kthread+0x24c/0x2d0
[   26.377504]  ret_from_fork+0x10/0x20
[   26.377554] 
[   26.386085] Allocated by task 253:
[   26.386673]  kasan_save_stack+0x3c/0x68
[   26.387313]  kasan_save_track+0x20/0x40
[   26.387974]  kasan_save_alloc_info+0x40/0x58
[   26.388657]  __kasan_kmalloc+0xd4/0xd8
[   26.389165]  __kmalloc_cache_noprof+0x154/0x320
[   26.389677]  kasan_atomics+0xb8/0x2e8
[   26.390424]  kunit_try_run_case+0x170/0x3f0
[   26.390951]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.391536]  kthread+0x24c/0x2d0
[   26.392010]  ret_from_fork+0x10/0x20
[   26.392543] 
[   26.392977] The buggy address belongs to the object at fff00000c4205580
[   26.392977]  which belongs to the cache kmalloc-64 of size 64
[   26.394161] The buggy address is located 0 bytes to the right of
[   26.394161]  allocated 48-byte region [fff00000c4205580, fff00000c42055b0)
[   26.395367] 
[   26.395707] The buggy address belongs to the physical page:
[   26.396386] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104205
[   26.397343] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   26.398090] page_type: f5(slab)
[   26.398551] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   26.399357] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   26.400191] page dumped because: kasan: bad access detected
[   26.400939] 
[   26.401394] Memory state around the buggy address:
[   26.401851]  fff00000c4205480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.402770]  fff00000c4205500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.403640] >fff00000c4205580: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   26.404479]                                      ^
[   26.405189]  fff00000c4205600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.406031]  fff00000c4205680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.406843] ==================================================================
[   26.550796] ==================================================================
[   26.551582] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1144/0x49c8
[   26.552412] Write of size 8 at addr fff00000c42055b0 by task kunit_try_catch/253
[   26.553577] 
[   26.554020] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G    B            N 6.12.33-rc1 #1
[   26.554218] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.554347] Hardware name: linux,dummy-virt (DT)
[   26.554441] Call trace:
[   26.554502]  dump_backtrace+0x9c/0x128
[   26.554564]  show_stack+0x20/0x38
[   26.554610]  dump_stack_lvl+0x8c/0xd0
[   26.554656]  print_report+0x118/0x5f0
[   26.554703]  kasan_report+0xdc/0x128
[   26.554751]  kasan_check_range+0x100/0x1a8
[   26.554802]  __kasan_check_write+0x20/0x30
[   26.554852]  kasan_atomics_helper+0x1144/0x49c8
[   26.554906]  kasan_atomics+0x1a0/0x2e8
[   26.554955]  kunit_try_run_case+0x170/0x3f0
[   26.555035]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.555092]  kthread+0x24c/0x2d0
[   26.555142]  ret_from_fork+0x10/0x20
[   26.555192] 
[   26.562525] Allocated by task 253:
[   26.563109]  kasan_save_stack+0x3c/0x68
[   26.563692]  kasan_save_track+0x20/0x40
[   26.564245]  kasan_save_alloc_info+0x40/0x58
[   26.565020]  __kasan_kmalloc+0xd4/0xd8
[   26.565539]  __kmalloc_cache_noprof+0x154/0x320
[   26.566243]  kasan_atomics+0xb8/0x2e8
[   26.566789]  kunit_try_run_case+0x170/0x3f0
[   26.567426]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.568153]  kthread+0x24c/0x2d0
[   26.568627]  ret_from_fork+0x10/0x20
[   26.569281] 
[   26.569617] The buggy address belongs to the object at fff00000c4205580
[   26.569617]  which belongs to the cache kmalloc-64 of size 64
[   26.571286] The buggy address is located 0 bytes to the right of
[   26.571286]  allocated 48-byte region [fff00000c4205580, fff00000c42055b0)
[   26.572456] 
[   26.573011] The buggy address belongs to the physical page:
[   26.573572] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104205
[   26.574558] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   26.575310] page_type: f5(slab)
[   26.575807] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   26.576653] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   26.577473] page dumped because: kasan: bad access detected
[   26.578110] 
[   26.578455] Memory state around the buggy address:
[   26.579035]  fff00000c4205480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.579796]  fff00000c4205500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.580610] >fff00000c4205580: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   26.581437]                                      ^
[   26.582008]  fff00000c4205600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.582790]  fff00000c4205680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.583579] ==================================================================
[   26.857213] ==================================================================
[   26.857751] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1518/0x49c8
[   26.858705] Write of size 8 at addr fff00000c42055b0 by task kunit_try_catch/253
[   26.859622] 
[   26.860015] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G    B            N 6.12.33-rc1 #1
[   26.860217] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.860302] Hardware name: linux,dummy-virt (DT)
[   26.860394] Call trace:
[   26.860471]  dump_backtrace+0x9c/0x128
[   26.860597]  show_stack+0x20/0x38
[   26.860715]  dump_stack_lvl+0x8c/0xd0
[   26.860841]  print_report+0x118/0x5f0
[   26.860978]  kasan_report+0xdc/0x128
[   26.861100]  kasan_check_range+0x100/0x1a8
[   26.861226]  __kasan_check_write+0x20/0x30
[   26.861351]  kasan_atomics_helper+0x1518/0x49c8
[   26.861486]  kasan_atomics+0x1a0/0x2e8
[   26.861613]  kunit_try_run_case+0x170/0x3f0
[   26.861725]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.861791]  kthread+0x24c/0x2d0
[   26.861843]  ret_from_fork+0x10/0x20
[   26.861892] 
[   26.868740] Allocated by task 253:
[   26.869242]  kasan_save_stack+0x3c/0x68
[   26.869827]  kasan_save_track+0x20/0x40
[   26.870333]  kasan_save_alloc_info+0x40/0x58
[   26.870870]  __kasan_kmalloc+0xd4/0xd8
[   26.871322]  __kmalloc_cache_noprof+0x154/0x320
[   26.872068]  kasan_atomics+0xb8/0x2e8
[   26.872627]  kunit_try_run_case+0x170/0x3f0
[   26.873240]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.873830]  kthread+0x24c/0x2d0
[   26.874351]  ret_from_fork+0x10/0x20
[   26.874878] 
[   26.875231] The buggy address belongs to the object at fff00000c4205580
[   26.875231]  which belongs to the cache kmalloc-64 of size 64
[   26.876331] The buggy address is located 0 bytes to the right of
[   26.876331]  allocated 48-byte region [fff00000c4205580, fff00000c42055b0)
[   26.877539] 
[   26.877869] The buggy address belongs to the physical page:
[   26.878477] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104205
[   26.879229] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   26.880081] page_type: f5(slab)
[   26.880533] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   26.881329] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   26.882082] page dumped because: kasan: bad access detected
[   26.882725] 
[   26.883067] Memory state around the buggy address:
[   26.883646]  fff00000c4205480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.884453]  fff00000c4205500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.885182] >fff00000c4205580: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   26.885912]                                      ^
[   26.886493]  fff00000c4205600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.887245]  fff00000c4205680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.887938] ==================================================================
[   26.688659] ==================================================================
[   26.689306] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1300/0x49c8
[   26.690072] Write of size 8 at addr fff00000c42055b0 by task kunit_try_catch/253
[   26.690981] 
[   26.691312] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G    B            N 6.12.33-rc1 #1
[   26.691545] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.691630] Hardware name: linux,dummy-virt (DT)
[   26.691722] Call trace:
[   26.691799]  dump_backtrace+0x9c/0x128
[   26.691927]  show_stack+0x20/0x38
[   26.692065]  dump_stack_lvl+0x8c/0xd0
[   26.692185]  print_report+0x118/0x5f0
[   26.692303]  kasan_report+0xdc/0x128
[   26.692403]  kasan_check_range+0x100/0x1a8
[   26.692457]  __kasan_check_write+0x20/0x30
[   26.692508]  kasan_atomics_helper+0x1300/0x49c8
[   26.692563]  kasan_atomics+0x1a0/0x2e8
[   26.692613]  kunit_try_run_case+0x170/0x3f0
[   26.692662]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.692718]  kthread+0x24c/0x2d0
[   26.692781]  ret_from_fork+0x10/0x20
[   26.692834] 
[   26.699494] Allocated by task 253:
[   26.700002]  kasan_save_stack+0x3c/0x68
[   26.700546]  kasan_save_track+0x20/0x40
[   26.701138]  kasan_save_alloc_info+0x40/0x58
[   26.701677]  __kasan_kmalloc+0xd4/0xd8
[   26.702158]  __kmalloc_cache_noprof+0x154/0x320
[   26.702866]  kasan_atomics+0xb8/0x2e8
[   26.703440]  kunit_try_run_case+0x170/0x3f0
[   26.703989]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.704532]  kthread+0x24c/0x2d0
[   26.705076]  ret_from_fork+0x10/0x20
[   26.705619] 
[   26.705945] The buggy address belongs to the object at fff00000c4205580
[   26.705945]  which belongs to the cache kmalloc-64 of size 64
[   26.707216] The buggy address is located 0 bytes to the right of
[   26.707216]  allocated 48-byte region [fff00000c4205580, fff00000c42055b0)
[   26.708407] 
[   26.708776] The buggy address belongs to the physical page:
[   26.709346] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104205
[   26.710219] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   26.710895] page_type: f5(slab)
[   26.711417] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   26.712345] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   26.713089] page dumped because: kasan: bad access detected
[   26.713655] 
[   26.714025] Memory state around the buggy address:
[   26.714582]  fff00000c4205480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.715286]  fff00000c4205500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.716058] >fff00000c4205580: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   26.716730]                                      ^
[   26.717327]  fff00000c4205600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.718067]  fff00000c4205680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.718788] ==================================================================
[   25.995683] ==================================================================
[   25.996396] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f24/0x49c8
[   25.998252] Read of size 4 at addr fff00000c42055b0 by task kunit_try_catch/253
[   25.999198] 
[   25.999583] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G    B            N 6.12.33-rc1 #1
[   25.999848] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.999940] Hardware name: linux,dummy-virt (DT)
[   26.000051] Call trace:
[   26.000091]  dump_backtrace+0x9c/0x128
[   26.000151]  show_stack+0x20/0x38
[   26.000199]  dump_stack_lvl+0x8c/0xd0
[   26.000249]  print_report+0x118/0x5f0
[   26.000300]  kasan_report+0xdc/0x128
[   26.000351]  __asan_report_load4_noabort+0x20/0x30
[   26.000407]  kasan_atomics_helper+0x3f24/0x49c8
[   26.000464]  kasan_atomics+0x1a0/0x2e8
[   26.000518]  kunit_try_run_case+0x170/0x3f0
[   26.000569]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.000627]  kthread+0x24c/0x2d0
[   26.000677]  ret_from_fork+0x10/0x20
[   26.000728] 
[   26.008033] Allocated by task 253:
[   26.008468]  kasan_save_stack+0x3c/0x68
[   26.009010]  kasan_save_track+0x20/0x40
[   26.009551]  kasan_save_alloc_info+0x40/0x58
[   26.010187]  __kasan_kmalloc+0xd4/0xd8
[   26.010838]  __kmalloc_cache_noprof+0x154/0x320
[   26.011561]  kasan_atomics+0xb8/0x2e8
[   26.012062]  kunit_try_run_case+0x170/0x3f0
[   26.012754]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.013453]  kthread+0x24c/0x2d0
[   26.013999]  ret_from_fork+0x10/0x20
[   26.014540] 
[   26.014917] The buggy address belongs to the object at fff00000c4205580
[   26.014917]  which belongs to the cache kmalloc-64 of size 64
[   26.016155] The buggy address is located 0 bytes to the right of
[   26.016155]  allocated 48-byte region [fff00000c4205580, fff00000c42055b0)
[   26.017471] 
[   26.017810] The buggy address belongs to the physical page:
[   26.018414] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104205
[   26.019325] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   26.020093] page_type: f5(slab)
[   26.020591] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   26.021459] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   26.022273] page dumped because: kasan: bad access detected
[   26.022883] 
[   26.023249] Memory state around the buggy address:
[   26.023847]  fff00000c4205480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.024727]  fff00000c4205500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.025535] >fff00000c4205580: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   26.026307]                                      ^
[   26.026901]  fff00000c4205600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.027693]  fff00000c4205680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.028506] ==================================================================
[   25.586203] ==================================================================
[   25.586882] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x728/0x49c8
[   25.588781] Write of size 4 at addr fff00000c42055b0 by task kunit_try_catch/253
[   25.589753] 
[   25.590074] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G    B            N 6.12.33-rc1 #1
[   25.590277] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.590365] Hardware name: linux,dummy-virt (DT)
[   25.590454] Call trace:
[   25.590514]  dump_backtrace+0x9c/0x128
[   25.590589]  show_stack+0x20/0x38
[   25.590653]  dump_stack_lvl+0x8c/0xd0
[   25.590731]  print_report+0x118/0x5f0
[   25.590779]  kasan_report+0xdc/0x128
[   25.590828]  kasan_check_range+0x100/0x1a8
[   25.590879]  __kasan_check_write+0x20/0x30
[   25.590929]  kasan_atomics_helper+0x728/0x49c8
[   25.591010]  kasan_atomics+0x1a0/0x2e8
[   25.591064]  kunit_try_run_case+0x170/0x3f0
[   25.591113]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.591169]  kthread+0x24c/0x2d0
[   25.591216]  ret_from_fork+0x10/0x20
[   25.591267] 
[   25.597893] Allocated by task 253:
[   25.598493]  kasan_save_stack+0x3c/0x68
[   25.599142]  kasan_save_track+0x20/0x40
[   25.599618]  kasan_save_alloc_info+0x40/0x58
[   25.600200]  __kasan_kmalloc+0xd4/0xd8
[   25.600715]  __kmalloc_cache_noprof+0x154/0x320
[   25.601329]  kasan_atomics+0xb8/0x2e8
[   25.601825]  kunit_try_run_case+0x170/0x3f0
[   25.602416]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.603804]  kthread+0x24c/0x2d0
[   25.604221]  ret_from_fork+0x10/0x20
[   25.604684] 
[   25.604979] The buggy address belongs to the object at fff00000c4205580
[   25.604979]  which belongs to the cache kmalloc-64 of size 64
[   25.606115] The buggy address is located 0 bytes to the right of
[   25.606115]  allocated 48-byte region [fff00000c4205580, fff00000c42055b0)
[   25.607323] 
[   25.607596] The buggy address belongs to the physical page:
[   25.608269] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104205
[   25.609078] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   25.609730] page_type: f5(slab)
[   25.610260] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   25.611098] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   25.611825] page dumped because: kasan: bad access detected
[   25.612448] 
[   25.612791] Memory state around the buggy address:
[   25.613322]  fff00000c4205480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.614174]  fff00000c4205500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.615018] >fff00000c4205580: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   25.615721]                                      ^
[   25.616340]  fff00000c4205600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.617050]  fff00000c4205680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.617774] ==================================================================
[   27.067396] ==================================================================
[   27.068853] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f5c/0x49c8
[   27.069933] Read of size 8 at addr fff00000c42055b0 by task kunit_try_catch/253
[   27.070767] 
[   27.071151] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G    B            N 6.12.33-rc1 #1
[   27.071395] Tainted: [B]=BAD_PAGE, [N]=TEST
[   27.071510] Hardware name: linux,dummy-virt (DT)
[   27.071607] Call trace:
[   27.071685]  dump_backtrace+0x9c/0x128
[   27.071815]  show_stack+0x20/0x38
[   27.072001]  dump_stack_lvl+0x8c/0xd0
[   27.072287]  print_report+0x118/0x5f0
[   27.072361]  kasan_report+0xdc/0x128
[   27.072421]  __asan_report_load8_noabort+0x20/0x30
[   27.072488]  kasan_atomics_helper+0x3f5c/0x49c8
[   27.072548]  kasan_atomics+0x1a0/0x2e8
[   27.072601]  kunit_try_run_case+0x170/0x3f0
[   27.072652]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   27.072711]  kthread+0x24c/0x2d0
[   27.072773]  ret_from_fork+0x10/0x20
[   27.072831] 
[   27.081188] Allocated by task 253:
[   27.081699]  kasan_save_stack+0x3c/0x68
[   27.082232]  kasan_save_track+0x20/0x40
[   27.082776]  kasan_save_alloc_info+0x40/0x58
[   27.083338]  __kasan_kmalloc+0xd4/0xd8
[   27.084056]  __kmalloc_cache_noprof+0x154/0x320
[   27.084541]  kasan_atomics+0xb8/0x2e8
[   27.084912]  kunit_try_run_case+0x170/0x3f0
[   27.085322]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   27.085810]  kthread+0x24c/0x2d0
[   27.086890]  ret_from_fork+0x10/0x20
[   27.087944] 
[   27.088293] The buggy address belongs to the object at fff00000c4205580
[   27.088293]  which belongs to the cache kmalloc-64 of size 64
[   27.089423] The buggy address is located 0 bytes to the right of
[   27.089423]  allocated 48-byte region [fff00000c4205580, fff00000c42055b0)
[   27.090550] 
[   27.090880] The buggy address belongs to the physical page:
[   27.091722] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104205
[   27.092522] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   27.093531] page_type: f5(slab)
[   27.094461] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   27.095770] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   27.096597] page dumped because: kasan: bad access detected
[   27.097357] 
[   27.097666] Memory state around the buggy address:
[   27.098477]  fff00000c4205480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.099343]  fff00000c4205500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.100217] >fff00000c4205580: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   27.101080]                                      ^
[   27.101615]  fff00000c4205600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.102613]  fff00000c4205680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.103473] ==================================================================
[   26.923349] ==================================================================
[   26.924283] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x15f0/0x49c8
[   26.925238] Write of size 8 at addr fff00000c42055b0 by task kunit_try_catch/253
[   26.926315] 
[   26.926705] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G    B            N 6.12.33-rc1 #1
[   26.927009] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.927097] Hardware name: linux,dummy-virt (DT)
[   26.927187] Call trace:
[   26.927260]  dump_backtrace+0x9c/0x128
[   26.927349]  show_stack+0x20/0x38
[   26.927399]  dump_stack_lvl+0x8c/0xd0
[   26.927446]  print_report+0x118/0x5f0
[   26.927494]  kasan_report+0xdc/0x128
[   26.927542]  kasan_check_range+0x100/0x1a8
[   26.927594]  __kasan_check_write+0x20/0x30
[   26.927645]  kasan_atomics_helper+0x15f0/0x49c8
[   26.927702]  kasan_atomics+0x1a0/0x2e8
[   26.927756]  kunit_try_run_case+0x170/0x3f0
[   26.927809]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.927867]  kthread+0x24c/0x2d0
[   26.927918]  ret_from_fork+0x10/0x20
[   26.927995] 
[   26.935319] Allocated by task 253:
[   26.936017]  kasan_save_stack+0x3c/0x68
[   26.936674]  kasan_save_track+0x20/0x40
[   26.937369]  kasan_save_alloc_info+0x40/0x58
[   26.938082]  __kasan_kmalloc+0xd4/0xd8
[   26.938507]  __kmalloc_cache_noprof+0x154/0x320
[   26.939383]  kasan_atomics+0xb8/0x2e8
[   26.940018]  kunit_try_run_case+0x170/0x3f0
[   26.940709]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.941476]  kthread+0x24c/0x2d0
[   26.942026]  ret_from_fork+0x10/0x20
[   26.942655] 
[   26.943061] The buggy address belongs to the object at fff00000c4205580
[   26.943061]  which belongs to the cache kmalloc-64 of size 64
[   26.944379] The buggy address is located 0 bytes to the right of
[   26.944379]  allocated 48-byte region [fff00000c4205580, fff00000c42055b0)
[   26.945736] 
[   26.946150] The buggy address belongs to the physical page:
[   26.946783] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104205
[   26.947705] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   26.948534] page_type: f5(slab)
[   26.949075] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   26.949954] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   26.950780] page dumped because: kasan: bad access detected
[   26.951497] 
[   26.951863] Memory state around the buggy address:
[   26.952503]  fff00000c4205480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.953359]  fff00000c4205500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.954219] >fff00000c4205580: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   26.955016]                                      ^
[   26.955661]  fff00000c4205600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.956505]  fff00000c4205680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.957347] ==================================================================
[   25.857657] ==================================================================
[   25.858441] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xabc/0x49c8
[   25.860102] Write of size 4 at addr fff00000c42055b0 by task kunit_try_catch/253
[   25.860827] 
[   25.861169] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G    B            N 6.12.33-rc1 #1
[   25.861373] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.861458] Hardware name: linux,dummy-virt (DT)
[   25.861553] Call trace:
[   25.861624]  dump_backtrace+0x9c/0x128
[   25.861739]  show_stack+0x20/0x38
[   25.861838]  dump_stack_lvl+0x8c/0xd0
[   25.861909]  print_report+0x118/0x5f0
[   25.861985]  kasan_report+0xdc/0x128
[   25.862038]  kasan_check_range+0x100/0x1a8
[   25.862090]  __kasan_check_write+0x20/0x30
[   25.862139]  kasan_atomics_helper+0xabc/0x49c8
[   25.862195]  kasan_atomics+0x1a0/0x2e8
[   25.862247]  kunit_try_run_case+0x170/0x3f0
[   25.862300]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.862356]  kthread+0x24c/0x2d0
[   25.862406]  ret_from_fork+0x10/0x20
[   25.862458] 
[   25.869167] Allocated by task 253:
[   25.869624]  kasan_save_stack+0x3c/0x68
[   25.870147]  kasan_save_track+0x20/0x40
[   25.870771]  kasan_save_alloc_info+0x40/0x58
[   25.871466]  __kasan_kmalloc+0xd4/0xd8
[   25.871975]  __kmalloc_cache_noprof+0x154/0x320
[   25.872599]  kasan_atomics+0xb8/0x2e8
[   25.873127]  kunit_try_run_case+0x170/0x3f0
[   25.873705]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.874422]  kthread+0x24c/0x2d0
[   25.874976]  ret_from_fork+0x10/0x20
[   25.875440] 
[   25.875764] The buggy address belongs to the object at fff00000c4205580
[   25.875764]  which belongs to the cache kmalloc-64 of size 64
[   25.877092] The buggy address is located 0 bytes to the right of
[   25.877092]  allocated 48-byte region [fff00000c4205580, fff00000c42055b0)
[   25.878324] 
[   25.878662] The buggy address belongs to the physical page:
[   25.879227] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104205
[   25.880174] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   25.880884] page_type: f5(slab)
[   25.881375] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   25.882173] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   25.882948] page dumped because: kasan: bad access detected
[   25.883596] 
[   25.883935] Memory state around the buggy address:
[   25.884539]  fff00000c4205480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.885345]  fff00000c4205500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.886149] >fff00000c4205580: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   25.886886]                                      ^
[   25.887528]  fff00000c4205600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.888292]  fff00000c4205680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.889145] ==================================================================
[   25.403730] ==================================================================
[   25.404501] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x50c/0x49c8
[   25.405438] Write of size 4 at addr fff00000c42055b0 by task kunit_try_catch/253
[   25.406649] 
[   25.407116] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G    B            N 6.12.33-rc1 #1
[   25.407322] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.407421] Hardware name: linux,dummy-virt (DT)
[   25.407512] Call trace:
[   25.407580]  dump_backtrace+0x9c/0x128
[   25.407700]  show_stack+0x20/0x38
[   25.407830]  dump_stack_lvl+0x8c/0xd0
[   25.407944]  print_report+0x118/0x5f0
[   25.408071]  kasan_report+0xdc/0x128
[   25.408171]  kasan_check_range+0x100/0x1a8
[   25.408281]  __kasan_check_write+0x20/0x30
[   25.408384]  kasan_atomics_helper+0x50c/0x49c8
[   25.408498]  kasan_atomics+0x1a0/0x2e8
[   25.408620]  kunit_try_run_case+0x170/0x3f0
[   25.408740]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.408843]  kthread+0x24c/0x2d0
[   25.408897]  ret_from_fork+0x10/0x20
[   25.408946] 
[   25.417816] Allocated by task 253:
[   25.418676]  kasan_save_stack+0x3c/0x68
[   25.419401]  kasan_save_track+0x20/0x40
[   25.420060]  kasan_save_alloc_info+0x40/0x58
[   25.420471]  __kasan_kmalloc+0xd4/0xd8
[   25.420885]  __kmalloc_cache_noprof+0x154/0x320
[   25.421336]  kasan_atomics+0xb8/0x2e8
[   25.421713]  kunit_try_run_case+0x170/0x3f0
[   25.422344]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.423524]  kthread+0x24c/0x2d0
[   25.425844]  ret_from_fork+0x10/0x20
[   25.426846] 
[   25.427291] The buggy address belongs to the object at fff00000c4205580
[   25.427291]  which belongs to the cache kmalloc-64 of size 64
[   25.430431] The buggy address is located 0 bytes to the right of
[   25.430431]  allocated 48-byte region [fff00000c4205580, fff00000c42055b0)
[   25.433718] 
[   25.434247] The buggy address belongs to the physical page:
[   25.435055] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104205
[   25.436362] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   25.437032] page_type: f5(slab)
[   25.437495] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   25.438185] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   25.438940] page dumped because: kasan: bad access detected
[   25.440244] 
[   25.440598] Memory state around the buggy address:
[   25.441123]  fff00000c4205480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.441836]  fff00000c4205500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.442574] >fff00000c4205580: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   25.443710]                                      ^
[   25.444191]  fff00000c4205600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.444883]  fff00000c4205680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.445609] ==================================================================
[   26.993326] ==================================================================
[   26.994135] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f18/0x49c8
[   26.995009] Read of size 8 at addr fff00000c42055b0 by task kunit_try_catch/253
[   26.996023] 
[   26.996407] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G    B            N 6.12.33-rc1 #1
[   26.996653] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.996778] Hardware name: linux,dummy-virt (DT)
[   26.996876] Call trace:
[   26.996952]  dump_backtrace+0x9c/0x128
[   26.997145]  show_stack+0x20/0x38
[   26.997268]  dump_stack_lvl+0x8c/0xd0
[   26.997407]  print_report+0x118/0x5f0
[   26.997550]  kasan_report+0xdc/0x128
[   26.997604]  __asan_report_load8_noabort+0x20/0x30
[   26.997663]  kasan_atomics_helper+0x3f18/0x49c8
[   26.997719]  kasan_atomics+0x1a0/0x2e8
[   26.997771]  kunit_try_run_case+0x170/0x3f0
[   26.997821]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.997879]  kthread+0x24c/0x2d0
[   26.997931]  ret_from_fork+0x10/0x20
[   26.998012] 
[   27.005746] Allocated by task 253:
[   27.006128]  kasan_save_stack+0x3c/0x68
[   27.006512]  kasan_save_track+0x20/0x40
[   27.006901]  kasan_save_alloc_info+0x40/0x58
[   27.009105]  __kasan_kmalloc+0xd4/0xd8
[   27.010096]  __kmalloc_cache_noprof+0x154/0x320
[   27.011791]  kasan_atomics+0xb8/0x2e8
[   27.013077]  kunit_try_run_case+0x170/0x3f0
[   27.014391]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   27.015928]  kthread+0x24c/0x2d0
[   27.016802]  ret_from_fork+0x10/0x20
[   27.017501] 
[   27.017936] The buggy address belongs to the object at fff00000c4205580
[   27.017936]  which belongs to the cache kmalloc-64 of size 64
[   27.019157] The buggy address is located 0 bytes to the right of
[   27.019157]  allocated 48-byte region [fff00000c4205580, fff00000c42055b0)
[   27.020378] 
[   27.020738] The buggy address belongs to the physical page:
[   27.021426] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104205
[   27.022280] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   27.023069] page_type: f5(slab)
[   27.023607] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   27.024484] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   27.025307] page dumped because: kasan: bad access detected
[   27.025952] 
[   27.026302] Memory state around the buggy address:
[   27.026929]  fff00000c4205480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.027742]  fff00000c4205500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.028525] >fff00000c4205580: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   27.029310]                                      ^
[   27.029915]  fff00000c4205600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.030712]  fff00000c4205680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.031456] ==================================================================
[   25.366395] ==================================================================
[   25.367143] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a0/0x49c8
[   25.368305] Write of size 4 at addr fff00000c42055b0 by task kunit_try_catch/253
[   25.369226] 
[   25.369586] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G    B            N 6.12.33-rc1 #1
[   25.369774] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.369844] Hardware name: linux,dummy-virt (DT)
[   25.369926] Call trace:
[   25.370008]  dump_backtrace+0x9c/0x128
[   25.370135]  show_stack+0x20/0x38
[   25.370255]  dump_stack_lvl+0x8c/0xd0
[   25.370379]  print_report+0x118/0x5f0
[   25.370542]  kasan_report+0xdc/0x128
[   25.370662]  kasan_check_range+0x100/0x1a8
[   25.370780]  __kasan_check_write+0x20/0x30
[   25.370948]  kasan_atomics_helper+0x4a0/0x49c8
[   25.371097]  kasan_atomics+0x1a0/0x2e8
[   25.371244]  kunit_try_run_case+0x170/0x3f0
[   25.371431]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.371584]  kthread+0x24c/0x2d0
[   25.371696]  ret_from_fork+0x10/0x20
[   25.371804] 
[   25.380235] Allocated by task 253:
[   25.381151]  kasan_save_stack+0x3c/0x68
[   25.381645]  kasan_save_track+0x20/0x40
[   25.382327]  kasan_save_alloc_info+0x40/0x58
[   25.383033]  __kasan_kmalloc+0xd4/0xd8
[   25.384044]  __kmalloc_cache_noprof+0x154/0x320
[   25.385521]  kasan_atomics+0xb8/0x2e8
[   25.386229]  kunit_try_run_case+0x170/0x3f0
[   25.386900]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.387983]  kthread+0x24c/0x2d0
[   25.388562]  ret_from_fork+0x10/0x20
[   25.389127] 
[   25.389271] The buggy address belongs to the object at fff00000c4205580
[   25.389271]  which belongs to the cache kmalloc-64 of size 64
[   25.389753] The buggy address is located 0 bytes to the right of
[   25.389753]  allocated 48-byte region [fff00000c4205580, fff00000c42055b0)
[   25.390732] 
[   25.391081] The buggy address belongs to the physical page:
[   25.391788] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104205
[   25.393539] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   25.394400] page_type: f5(slab)
[   25.394608] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   25.394943] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   25.396023] page dumped because: kasan: bad access detected
[   25.396735] 
[   25.397307] Memory state around the buggy address:
[   25.398102]  fff00000c4205480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.398856]  fff00000c4205500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.399619] >fff00000c4205580: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   25.400332]                                      ^
[   25.401129]  fff00000c4205600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.401863]  fff00000c4205680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.402590] ==================================================================
[   25.181160] ==================================================================
[   25.181732] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4264/0x49c8
[   25.182586] Read of size 4 at addr fff00000c42055b0 by task kunit_try_catch/253
[   25.183337] 
[   25.183777] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G    B            N 6.12.33-rc1 #1
[   25.184002] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.184082] Hardware name: linux,dummy-virt (DT)
[   25.184159] Call trace:
[   25.184213]  dump_backtrace+0x9c/0x128
[   25.184319]  show_stack+0x20/0x38
[   25.184422]  dump_stack_lvl+0x8c/0xd0
[   25.184524]  print_report+0x118/0x5f0
[   25.184616]  kasan_report+0xdc/0x128
[   25.184712]  __asan_report_load4_noabort+0x20/0x30
[   25.184834]  kasan_atomics_helper+0x4264/0x49c8
[   25.184938]  kasan_atomics+0x1a0/0x2e8
[   25.185069]  kunit_try_run_case+0x170/0x3f0
[   25.185173]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.185286]  kthread+0x24c/0x2d0
[   25.185380]  ret_from_fork+0x10/0x20
[   25.185482] 
[   25.192190] Allocated by task 253:
[   25.192772]  kasan_save_stack+0x3c/0x68
[   25.193547]  kasan_save_track+0x20/0x40
[   25.194348]  kasan_save_alloc_info+0x40/0x58
[   25.195034]  __kasan_kmalloc+0xd4/0xd8
[   25.195625]  __kmalloc_cache_noprof+0x154/0x320
[   25.196357]  kasan_atomics+0xb8/0x2e8
[   25.196922]  kunit_try_run_case+0x170/0x3f0
[   25.197523]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.198198]  kthread+0x24c/0x2d0
[   25.198605]  ret_from_fork+0x10/0x20
[   25.199054] 
[   25.199432] The buggy address belongs to the object at fff00000c4205580
[   25.199432]  which belongs to the cache kmalloc-64 of size 64
[   25.201108] The buggy address is located 0 bytes to the right of
[   25.201108]  allocated 48-byte region [fff00000c4205580, fff00000c42055b0)
[   25.202414] 
[   25.202737] The buggy address belongs to the physical page:
[   25.204693] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104205
[   25.205462] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   25.206205] page_type: f5(slab)
[   25.206667] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   25.207897] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   25.209061] page dumped because: kasan: bad access detected
[   25.209614] 
[   25.209919] Memory state around the buggy address:
[   25.210486]  fff00000c4205480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.211232]  fff00000c4205500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.212006] >fff00000c4205580: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   25.212686]                                      ^
[   25.213432]  fff00000c4205600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.214314]  fff00000c4205680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.214908] ==================================================================
[   26.959697] ==================================================================
[   26.960312] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x165c/0x49c8
[   26.961234] Write of size 8 at addr fff00000c42055b0 by task kunit_try_catch/253
[   26.962199] 
[   26.962615] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G    B            N 6.12.33-rc1 #1
[   26.962937] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.963054] Hardware name: linux,dummy-virt (DT)
[   26.963147] Call trace:
[   26.963221]  dump_backtrace+0x9c/0x128
[   26.963463]  show_stack+0x20/0x38
[   26.963578]  dump_stack_lvl+0x8c/0xd0
[   26.963633]  print_report+0x118/0x5f0
[   26.963683]  kasan_report+0xdc/0x128
[   26.963731]  kasan_check_range+0x100/0x1a8
[   26.963783]  __kasan_check_write+0x20/0x30
[   26.963834]  kasan_atomics_helper+0x165c/0x49c8
[   26.963889]  kasan_atomics+0x1a0/0x2e8
[   26.963940]  kunit_try_run_case+0x170/0x3f0
[   26.964021]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.964081]  kthread+0x24c/0x2d0
[   26.964134]  ret_from_fork+0x10/0x20
[   26.964184] 
[   26.971900] Allocated by task 253:
[   26.972478]  kasan_save_stack+0x3c/0x68
[   26.973416]  kasan_save_track+0x20/0x40
[   26.974111]  kasan_save_alloc_info+0x40/0x58
[   26.974651]  __kasan_kmalloc+0xd4/0xd8
[   26.975189]  __kmalloc_cache_noprof+0x154/0x320
[   26.975825]  kasan_atomics+0xb8/0x2e8
[   26.976398]  kunit_try_run_case+0x170/0x3f0
[   26.977058]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.977559]  kthread+0x24c/0x2d0
[   26.977770]  ret_from_fork+0x10/0x20
[   26.978031] 
[   26.978358] The buggy address belongs to the object at fff00000c4205580
[   26.978358]  which belongs to the cache kmalloc-64 of size 64
[   26.979555] The buggy address is located 0 bytes to the right of
[   26.979555]  allocated 48-byte region [fff00000c4205580, fff00000c42055b0)
[   26.980774] 
[   26.981168] The buggy address belongs to the physical page:
[   26.981825] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104205
[   26.982804] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   26.983512] page_type: f5(slab)
[   26.984116] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   26.985006] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   26.985785] page dumped because: kasan: bad access detected
[   26.986431] 
[   26.986763] Memory state around the buggy address:
[   26.987385]  fff00000c4205480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.988209]  fff00000c4205500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.989000] >fff00000c4205580: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   26.989743]                                      ^
[   26.990361]  fff00000c4205600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.991151]  fff00000c4205680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.991903] ==================================================================
[   27.105994] ==================================================================
[   27.106642] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1780/0x49c8
[   27.107576] Write of size 8 at addr fff00000c42055b0 by task kunit_try_catch/253
[   27.108656] 
[   27.109014] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G    B            N 6.12.33-rc1 #1
[   27.109180] Tainted: [B]=BAD_PAGE, [N]=TEST
[   27.109224] Hardware name: linux,dummy-virt (DT)
[   27.109274] Call trace:
[   27.109342]  dump_backtrace+0x9c/0x128
[   27.109469]  show_stack+0x20/0x38
[   27.109585]  dump_stack_lvl+0x8c/0xd0
[   27.109702]  print_report+0x118/0x5f0
[   27.109819]  kasan_report+0xdc/0x128
[   27.109873]  kasan_check_range+0x100/0x1a8
[   27.109926]  __kasan_check_write+0x20/0x30
[   27.110007]  kasan_atomics_helper+0x1780/0x49c8
[   27.110068]  kasan_atomics+0x1a0/0x2e8
[   27.110119]  kunit_try_run_case+0x170/0x3f0
[   27.110170]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   27.110225]  kthread+0x24c/0x2d0
[   27.110276]  ret_from_fork+0x10/0x20
[   27.110328] 
[   27.116996] Allocated by task 253:
[   27.117409]  kasan_save_stack+0x3c/0x68
[   27.117990]  kasan_save_track+0x20/0x40
[   27.118480]  kasan_save_alloc_info+0x40/0x58
[   27.118982]  __kasan_kmalloc+0xd4/0xd8
[   27.119552]  __kmalloc_cache_noprof+0x154/0x320
[   27.120207]  kasan_atomics+0xb8/0x2e8
[   27.120736]  kunit_try_run_case+0x170/0x3f0
[   27.121311]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   27.122059]  kthread+0x24c/0x2d0
[   27.122652]  ret_from_fork+0x10/0x20
[   27.123200] 
[   27.123510] The buggy address belongs to the object at fff00000c4205580
[   27.123510]  which belongs to the cache kmalloc-64 of size 64
[   27.124623] The buggy address is located 0 bytes to the right of
[   27.124623]  allocated 48-byte region [fff00000c4205580, fff00000c42055b0)
[   27.125817] 
[   27.126206] The buggy address belongs to the physical page:
[   27.126875] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104205
[   27.127818] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   27.128522] page_type: f5(slab)
[   27.129057] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   27.129817] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   27.130652] page dumped because: kasan: bad access detected
[   27.131223] 
[   27.131546] Memory state around the buggy address:
[   27.132141]  fff00000c4205480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.132895]  fff00000c4205500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.133589] >fff00000c4205580: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   27.134401]                                      ^
[   27.134905]  fff00000c4205600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.135694]  fff00000c4205680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.136464] ==================================================================
[   25.485655] ==================================================================
[   25.486335] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x5e4/0x49c8
[   25.487230] Write of size 4 at addr fff00000c42055b0 by task kunit_try_catch/253
[   25.488004] 
[   25.488334] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G    B            N 6.12.33-rc1 #1
[   25.488505] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.488568] Hardware name: linux,dummy-virt (DT)
[   25.488653] Call trace:
[   25.488721]  dump_backtrace+0x9c/0x128
[   25.488854]  show_stack+0x20/0x38
[   25.488987]  dump_stack_lvl+0x8c/0xd0
[   25.489113]  print_report+0x118/0x5f0
[   25.489230]  kasan_report+0xdc/0x128
[   25.489353]  kasan_check_range+0x100/0x1a8
[   25.489476]  __kasan_check_write+0x20/0x30
[   25.489606]  kasan_atomics_helper+0x5e4/0x49c8
[   25.489734]  kasan_atomics+0x1a0/0x2e8
[   25.489856]  kunit_try_run_case+0x170/0x3f0
[   25.490039]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.490206]  kthread+0x24c/0x2d0
[   25.490371]  ret_from_fork+0x10/0x20
[   25.490497] 
[   25.497989] Allocated by task 253:
[   25.498543]  kasan_save_stack+0x3c/0x68
[   25.499080]  kasan_save_track+0x20/0x40
[   25.499693]  kasan_save_alloc_info+0x40/0x58
[   25.500362]  __kasan_kmalloc+0xd4/0xd8
[   25.500899]  __kmalloc_cache_noprof+0x154/0x320
[   25.501563]  kasan_atomics+0xb8/0x2e8
[   25.502183]  kunit_try_run_case+0x170/0x3f0
[   25.502779]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.503475]  kthread+0x24c/0x2d0
[   25.503939]  ret_from_fork+0x10/0x20
[   25.504647] 
[   25.504950] The buggy address belongs to the object at fff00000c4205580
[   25.504950]  which belongs to the cache kmalloc-64 of size 64
[   25.506186] The buggy address is located 0 bytes to the right of
[   25.506186]  allocated 48-byte region [fff00000c4205580, fff00000c42055b0)
[   25.507530] 
[   25.507904] The buggy address belongs to the physical page:
[   25.508649] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104205
[   25.509595] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   25.510452] page_type: f5(slab)
[   25.510988] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   25.511812] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   25.512599] page dumped because: kasan: bad access detected
[   25.513275] 
[   25.513605] Memory state around the buggy address:
[   25.514227]  fff00000c4205480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.515039]  fff00000c4205500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.515810] >fff00000c4205580: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   25.516579]                                      ^
[   25.517190]  fff00000c4205600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.517949]  fff00000c4205680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.518706] ==================================================================
[   25.023320] ==================================================================
[   25.024491] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x40e4/0x49c8
[   25.024917] Write of size 4 at addr fff00000c42055b0 by task kunit_try_catch/253
[   25.025955] 
[   25.026363] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G    B            N 6.12.33-rc1 #1
[   25.026579] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.026665] Hardware name: linux,dummy-virt (DT)
[   25.026759] Call trace:
[   25.026835]  dump_backtrace+0x9c/0x128
[   25.026978]  show_stack+0x20/0x38
[   25.027095]  dump_stack_lvl+0x8c/0xd0
[   25.027207]  print_report+0x118/0x5f0
[   25.027320]  kasan_report+0xdc/0x128
[   25.027482]  __asan_report_store4_noabort+0x20/0x30
[   25.027606]  kasan_atomics_helper+0x40e4/0x49c8
[   25.027727]  kasan_atomics+0x1a0/0x2e8
[   25.027826]  kunit_try_run_case+0x170/0x3f0
[   25.027882]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.027937]  kthread+0x24c/0x2d0
[   25.028021]  ret_from_fork+0x10/0x20
[   25.028074] 
[   25.034905] Allocated by task 253:
[   25.035861]  kasan_save_stack+0x3c/0x68
[   25.036499]  kasan_save_track+0x20/0x40
[   25.037526]  kasan_save_alloc_info+0x40/0x58
[   25.038448]  __kasan_kmalloc+0xd4/0xd8
[   25.039104]  __kmalloc_cache_noprof+0x154/0x320
[   25.040131]  kasan_atomics+0xb8/0x2e8
[   25.040563]  kunit_try_run_case+0x170/0x3f0
[   25.041123]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.042047]  kthread+0x24c/0x2d0
[   25.042382]  ret_from_fork+0x10/0x20
[   25.042929] 
[   25.043296] The buggy address belongs to the object at fff00000c4205580
[   25.043296]  which belongs to the cache kmalloc-64 of size 64
[   25.044618] The buggy address is located 0 bytes to the right of
[   25.044618]  allocated 48-byte region [fff00000c4205580, fff00000c42055b0)
[   25.046132] 
[   25.046482] The buggy address belongs to the physical page:
[   25.047027] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104205
[   25.048251] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   25.048850] page_type: f5(slab)
[   25.049253] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   25.050099] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   25.050915] page dumped because: kasan: bad access detected
[   25.051826] 
[   25.052214] Memory state around the buggy address:
[   25.052794]  fff00000c4205480: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   25.053636]  fff00000c4205500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.054516] >fff00000c4205580: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   25.055284]                                      ^
[   25.056227]  fff00000c4205600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.057421]  fff00000c4205680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.058748] ==================================================================
[   25.138444] ==================================================================
[   25.139204] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x2c4/0x49c8
[   25.140042] Read of size 4 at addr fff00000c42055b0 by task kunit_try_catch/253
[   25.140823] 
[   25.141223] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G    B            N 6.12.33-rc1 #1
[   25.141468] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.141555] Hardware name: linux,dummy-virt (DT)
[   25.141641] Call trace:
[   25.141706]  dump_backtrace+0x9c/0x128
[   25.141973]  show_stack+0x20/0x38
[   25.142094]  dump_stack_lvl+0x8c/0xd0
[   25.142416]  print_report+0x118/0x5f0
[   25.142580]  kasan_report+0xdc/0x128
[   25.142697]  kasan_check_range+0x100/0x1a8
[   25.142760]  __kasan_check_read+0x20/0x30
[   25.142813]  kasan_atomics_helper+0x2c4/0x49c8
[   25.142865]  kasan_atomics+0x1a0/0x2e8
[   25.142918]  kunit_try_run_case+0x170/0x3f0
[   25.142994]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.143057]  kthread+0x24c/0x2d0
[   25.143108]  ret_from_fork+0x10/0x20
[   25.143157] 
[   25.150718] Allocated by task 253:
[   25.151238]  kasan_save_stack+0x3c/0x68
[   25.151710]  kasan_save_track+0x20/0x40
[   25.152144]  kasan_save_alloc_info+0x40/0x58
[   25.152607]  __kasan_kmalloc+0xd4/0xd8
[   25.155288]  __kmalloc_cache_noprof+0x154/0x320
[   25.156660]  kasan_atomics+0xb8/0x2e8
[   25.157084]  kunit_try_run_case+0x170/0x3f0
[   25.157726]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.158414]  kthread+0x24c/0x2d0
[   25.159131]  ret_from_fork+0x10/0x20
[   25.160326] 
[   25.160593] The buggy address belongs to the object at fff00000c4205580
[   25.160593]  which belongs to the cache kmalloc-64 of size 64
[   25.162762] The buggy address is located 0 bytes to the right of
[   25.162762]  allocated 48-byte region [fff00000c4205580, fff00000c42055b0)
[   25.165590] 
[   25.166085] The buggy address belongs to the physical page:
[   25.166948] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104205
[   25.168516] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   25.170008] page_type: f5(slab)
[   25.170527] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   25.171713] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   25.172522] page dumped because: kasan: bad access detected
[   25.173184] 
[   25.173502] Memory state around the buggy address:
[   25.174148]  fff00000c4205480: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   25.175012]  fff00000c4205500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.175771] >fff00000c4205580: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   25.176932]                                      ^
[   25.177514]  fff00000c4205600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.178452]  fff00000c4205680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.179233] ==================================================================
[   26.201573] ==================================================================
[   26.202316] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f6c/0x49c8
[   26.203129] Read of size 4 at addr fff00000c42055b0 by task kunit_try_catch/253
[   26.204283] 
[   26.204580] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G    B            N 6.12.33-rc1 #1
[   26.204814] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.204906] Hardware name: linux,dummy-virt (DT)
[   26.205023] Call trace:
[   26.205097]  dump_backtrace+0x9c/0x128
[   26.205223]  show_stack+0x20/0x38
[   26.205341]  dump_stack_lvl+0x8c/0xd0
[   26.205459]  print_report+0x118/0x5f0
[   26.205573]  kasan_report+0xdc/0x128
[   26.205636]  __asan_report_load4_noabort+0x20/0x30
[   26.205690]  kasan_atomics_helper+0x3f6c/0x49c8
[   26.205745]  kasan_atomics+0x1a0/0x2e8
[   26.205796]  kunit_try_run_case+0x170/0x3f0
[   26.205847]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.205901]  kthread+0x24c/0x2d0
[   26.205950]  ret_from_fork+0x10/0x20
[   26.206031] 
[   26.212231] Allocated by task 253:
[   26.213263]  kasan_save_stack+0x3c/0x68
[   26.213736]  kasan_save_track+0x20/0x40
[   26.214314]  kasan_save_alloc_info+0x40/0x58
[   26.214936]  __kasan_kmalloc+0xd4/0xd8
[   26.217485]  __kmalloc_cache_noprof+0x154/0x320
[   26.217901]  kasan_atomics+0xb8/0x2e8
[   26.218296]  kunit_try_run_case+0x170/0x3f0
[   26.218698]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.220863]  kthread+0x24c/0x2d0
[   26.222349]  ret_from_fork+0x10/0x20
[   26.223705] 
[   26.224558] The buggy address belongs to the object at fff00000c4205580
[   26.224558]  which belongs to the cache kmalloc-64 of size 64
[   26.226679] The buggy address is located 0 bytes to the right of
[   26.226679]  allocated 48-byte region [fff00000c4205580, fff00000c42055b0)
[   26.228027] 
[   26.228362] The buggy address belongs to the physical page:
[   26.228998] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104205
[   26.229861] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   26.230587] page_type: f5(slab)
[   26.231066] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   26.231796] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   26.232593] page dumped because: kasan: bad access detected
[   26.233190] 
[   26.233507] Memory state around the buggy address:
[   26.234030]  fff00000c4205480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.234867]  fff00000c4205500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.235674] >fff00000c4205580: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   26.236426]                                      ^
[   26.237000]  fff00000c4205600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.237711]  fff00000c4205680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.238419] ==================================================================
[   26.340726] ==================================================================
[   26.342020] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3fc4/0x49c8
[   26.342906] Write of size 8 at addr fff00000c42055b0 by task kunit_try_catch/253
[   26.344196] 
[   26.344660] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G    B            N 6.12.33-rc1 #1
[   26.344888] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.345114] Hardware name: linux,dummy-virt (DT)
[   26.345159] Call trace:
[   26.345192]  dump_backtrace+0x9c/0x128
[   26.345251]  show_stack+0x20/0x38
[   26.345299]  dump_stack_lvl+0x8c/0xd0
[   26.345347]  print_report+0x118/0x5f0
[   26.345394]  kasan_report+0xdc/0x128
[   26.345441]  __asan_report_store8_noabort+0x20/0x30
[   26.345494]  kasan_atomics_helper+0x3fc4/0x49c8
[   26.345548]  kasan_atomics+0x1a0/0x2e8
[   26.345599]  kunit_try_run_case+0x170/0x3f0
[   26.345648]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.345704]  kthread+0x24c/0x2d0
[   26.345752]  ret_from_fork+0x10/0x20
[   26.345803] 
[   26.352418] Allocated by task 253:
[   26.352990]  kasan_save_stack+0x3c/0x68
[   26.353573]  kasan_save_track+0x20/0x40
[   26.354181]  kasan_save_alloc_info+0x40/0x58
[   26.354784]  __kasan_kmalloc+0xd4/0xd8
[   26.355302]  __kmalloc_cache_noprof+0x154/0x320
[   26.355978]  kasan_atomics+0xb8/0x2e8
[   26.356486]  kunit_try_run_case+0x170/0x3f0
[   26.357164]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.357886]  kthread+0x24c/0x2d0
[   26.358422]  ret_from_fork+0x10/0x20
[   26.359029] 
[   26.359357] The buggy address belongs to the object at fff00000c4205580
[   26.359357]  which belongs to the cache kmalloc-64 of size 64
[   26.360674] The buggy address is located 0 bytes to the right of
[   26.360674]  allocated 48-byte region [fff00000c4205580, fff00000c42055b0)
[   26.361947] 
[   26.362306] The buggy address belongs to the physical page:
[   26.362887] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104205
[   26.363571] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   26.364332] page_type: f5(slab)
[   26.364827] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   26.365644] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   26.366453] page dumped because: kasan: bad access detected
[   26.367028] 
[   26.367365] Memory state around the buggy address:
[   26.367926]  fff00000c4205480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.368663]  fff00000c4205500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.369390] >fff00000c4205580: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   26.370081]                                      ^
[   26.370691]  fff00000c4205600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.371431]  fff00000c4205680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.372176] ==================================================================
[   26.653312] ==================================================================
[   26.654150] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1288/0x49c8
[   26.655467] Write of size 8 at addr fff00000c42055b0 by task kunit_try_catch/253
[   26.656460] 
[   26.656947] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G    B            N 6.12.33-rc1 #1
[   26.657169] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.657290] Hardware name: linux,dummy-virt (DT)
[   26.657383] Call trace:
[   26.657458]  dump_backtrace+0x9c/0x128
[   26.657549]  show_stack+0x20/0x38
[   26.657597]  dump_stack_lvl+0x8c/0xd0
[   26.657644]  print_report+0x118/0x5f0
[   26.657691]  kasan_report+0xdc/0x128
[   26.657738]  kasan_check_range+0x100/0x1a8
[   26.657788]  __kasan_check_write+0x20/0x30
[   26.657840]  kasan_atomics_helper+0x1288/0x49c8
[   26.657895]  kasan_atomics+0x1a0/0x2e8
[   26.657949]  kunit_try_run_case+0x170/0x3f0
[   26.658035]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.658094]  kthread+0x24c/0x2d0
[   26.658145]  ret_from_fork+0x10/0x20
[   26.658196] 
[   26.666336] Allocated by task 253:
[   26.666844]  kasan_save_stack+0x3c/0x68
[   26.667455]  kasan_save_track+0x20/0x40
[   26.667934]  kasan_save_alloc_info+0x40/0x58
[   26.668593]  __kasan_kmalloc+0xd4/0xd8
[   26.669229]  __kmalloc_cache_noprof+0x154/0x320
[   26.669853]  kasan_atomics+0xb8/0x2e8
[   26.670368]  kunit_try_run_case+0x170/0x3f0
[   26.671015]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.671688]  kthread+0x24c/0x2d0
[   26.672201]  ret_from_fork+0x10/0x20
[   26.672797] 
[   26.673196] The buggy address belongs to the object at fff00000c4205580
[   26.673196]  which belongs to the cache kmalloc-64 of size 64
[   26.674382] The buggy address is located 0 bytes to the right of
[   26.674382]  allocated 48-byte region [fff00000c4205580, fff00000c42055b0)
[   26.675693] 
[   26.676090] The buggy address belongs to the physical page:
[   26.676754] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104205
[   26.677599] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   26.678325] page_type: f5(slab)
[   26.678850] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   26.679651] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   26.680485] page dumped because: kasan: bad access detected
[   26.681189] 
[   26.681537] Memory state around the buggy address:
[   26.682106]  fff00000c4205480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.682855]  fff00000c4205500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.683662] >fff00000c4205580: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   26.684344]                                      ^
[   26.685008]  fff00000c4205600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.685951]  fff00000c4205680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.686700] ==================================================================
[   26.824990] ==================================================================
[   26.825719] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x14ac/0x49c8
[   26.826733] Write of size 8 at addr fff00000c42055b0 by task kunit_try_catch/253
[   26.827490] 
[   26.828095] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G    B            N 6.12.33-rc1 #1
[   26.828795] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.828834] Hardware name: linux,dummy-virt (DT)
[   26.828873] Call trace:
[   26.828904]  dump_backtrace+0x9c/0x128
[   26.828992]  show_stack+0x20/0x38
[   26.829112]  dump_stack_lvl+0x8c/0xd0
[   26.829230]  print_report+0x118/0x5f0
[   26.829341]  kasan_report+0xdc/0x128
[   26.829395]  kasan_check_range+0x100/0x1a8
[   26.829447]  __kasan_check_write+0x20/0x30
[   26.829498]  kasan_atomics_helper+0x14ac/0x49c8
[   26.829554]  kasan_atomics+0x1a0/0x2e8
[   26.829606]  kunit_try_run_case+0x170/0x3f0
[   26.829656]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.829713]  kthread+0x24c/0x2d0
[   26.829764]  ret_from_fork+0x10/0x20
[   26.829812] 
[   26.836521] Allocated by task 253:
[   26.837049]  kasan_save_stack+0x3c/0x68
[   26.837694]  kasan_save_track+0x20/0x40
[   26.838258]  kasan_save_alloc_info+0x40/0x58
[   26.838765]  __kasan_kmalloc+0xd4/0xd8
[   26.839325]  __kmalloc_cache_noprof+0x154/0x320
[   26.840101]  kasan_atomics+0xb8/0x2e8
[   26.840572]  kunit_try_run_case+0x170/0x3f0
[   26.841170]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.841781]  kthread+0x24c/0x2d0
[   26.842248]  ret_from_fork+0x10/0x20
[   26.842793] 
[   26.843143] The buggy address belongs to the object at fff00000c4205580
[   26.843143]  which belongs to the cache kmalloc-64 of size 64
[   26.844152] The buggy address is located 0 bytes to the right of
[   26.844152]  allocated 48-byte region [fff00000c4205580, fff00000c42055b0)
[   26.845295] 
[   26.845627] The buggy address belongs to the physical page:
[   26.846372] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104205
[   26.847166] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   26.847954] page_type: f5(slab)
[   26.848380] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   26.849223] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   26.850020] page dumped because: kasan: bad access detected
[   26.850673] 
[   26.851284] Memory state around the buggy address:
[   26.851827]  fff00000c4205480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.852563]  fff00000c4205500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.853281] >fff00000c4205580: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   26.854034]                                      ^
[   26.854601]  fff00000c4205600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.855321]  fff00000c4205680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.856097] ==================================================================
[   25.329363] ==================================================================
[   25.330440] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x434/0x49c8
[   25.331200] Write of size 4 at addr fff00000c42055b0 by task kunit_try_catch/253
[   25.332217] 
[   25.332574] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G    B            N 6.12.33-rc1 #1
[   25.332779] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.332858] Hardware name: linux,dummy-virt (DT)
[   25.332943] Call trace:
[   25.333037]  dump_backtrace+0x9c/0x128
[   25.333165]  show_stack+0x20/0x38
[   25.333279]  dump_stack_lvl+0x8c/0xd0
[   25.333396]  print_report+0x118/0x5f0
[   25.333513]  kasan_report+0xdc/0x128
[   25.333607]  kasan_check_range+0x100/0x1a8
[   25.333661]  __kasan_check_write+0x20/0x30
[   25.333712]  kasan_atomics_helper+0x434/0x49c8
[   25.333765]  kasan_atomics+0x1a0/0x2e8
[   25.333815]  kunit_try_run_case+0x170/0x3f0
[   25.333864]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.333919]  kthread+0x24c/0x2d0
[   25.333995]  ret_from_fork+0x10/0x20
[   25.334058] 
[   25.342472] Allocated by task 253:
[   25.342938]  kasan_save_stack+0x3c/0x68
[   25.344184]  kasan_save_track+0x20/0x40
[   25.344737]  kasan_save_alloc_info+0x40/0x58
[   25.345493]  __kasan_kmalloc+0xd4/0xd8
[   25.345872]  __kmalloc_cache_noprof+0x154/0x320
[   25.346314]  kasan_atomics+0xb8/0x2e8
[   25.346687]  kunit_try_run_case+0x170/0x3f0
[   25.347840]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.348850]  kthread+0x24c/0x2d0
[   25.349552]  ret_from_fork+0x10/0x20
[   25.349982] 
[   25.350407] The buggy address belongs to the object at fff00000c4205580
[   25.350407]  which belongs to the cache kmalloc-64 of size 64
[   25.351598] The buggy address is located 0 bytes to the right of
[   25.351598]  allocated 48-byte region [fff00000c4205580, fff00000c42055b0)
[   25.353092] 
[   25.353411] The buggy address belongs to the physical page:
[   25.353999] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104205
[   25.354871] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   25.355753] page_type: f5(slab)
[   25.356223] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   25.357167] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   25.358002] page dumped because: kasan: bad access detected
[   25.358606] 
[   25.358985] Memory state around the buggy address:
[   25.359656]  fff00000c4205480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.360560]  fff00000c4205500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.361643] >fff00000c4205580: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   25.362467]                                      ^
[   25.363059]  fff00000c4205600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.363908]  fff00000c4205680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.364854] ==================================================================
[   25.447074] ==================================================================
[   25.447750] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x578/0x49c8
[   25.449239] Write of size 4 at addr fff00000c42055b0 by task kunit_try_catch/253
[   25.450824] 
[   25.451307] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G    B            N 6.12.33-rc1 #1
[   25.451551] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.451632] Hardware name: linux,dummy-virt (DT)
[   25.451716] Call trace:
[   25.451781]  dump_backtrace+0x9c/0x128
[   25.451922]  show_stack+0x20/0x38
[   25.452036]  dump_stack_lvl+0x8c/0xd0
[   25.452141]  print_report+0x118/0x5f0
[   25.452237]  kasan_report+0xdc/0x128
[   25.452344]  kasan_check_range+0x100/0x1a8
[   25.452463]  __kasan_check_write+0x20/0x30
[   25.452560]  kasan_atomics_helper+0x578/0x49c8
[   25.452616]  kasan_atomics+0x1a0/0x2e8
[   25.452667]  kunit_try_run_case+0x170/0x3f0
[   25.452714]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.452783]  kthread+0x24c/0x2d0
[   25.452835]  ret_from_fork+0x10/0x20
[   25.452885] 
[   25.460944] Allocated by task 253:
[   25.461356]  kasan_save_stack+0x3c/0x68
[   25.461937]  kasan_save_track+0x20/0x40
[   25.462510]  kasan_save_alloc_info+0x40/0x58
[   25.463000]  __kasan_kmalloc+0xd4/0xd8
[   25.463583]  __kmalloc_cache_noprof+0x154/0x320
[   25.465020]  kasan_atomics+0xb8/0x2e8
[   25.465469]  kunit_try_run_case+0x170/0x3f0
[   25.466228]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.467028]  kthread+0x24c/0x2d0
[   25.467546]  ret_from_fork+0x10/0x20
[   25.468003] 
[   25.468286] The buggy address belongs to the object at fff00000c4205580
[   25.468286]  which belongs to the cache kmalloc-64 of size 64
[   25.470266] The buggy address is located 0 bytes to the right of
[   25.470266]  allocated 48-byte region [fff00000c4205580, fff00000c42055b0)
[   25.471906] 
[   25.472287] The buggy address belongs to the physical page:
[   25.472930] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104205
[   25.473787] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   25.474528] page_type: f5(slab)
[   25.475026] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   25.476626] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   25.477563] page dumped because: kasan: bad access detected
[   25.478242] 
[   25.478705] Memory state around the buggy address:
[   25.479282]  fff00000c4205480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.480377]  fff00000c4205500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.481129] >fff00000c4205580: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   25.481979]                                      ^
[   25.482629]  fff00000c4205600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.483447]  fff00000c4205680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.484318] ==================================================================
[   26.169126] ==================================================================
[   26.170008] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xda0/0x49c8
[   26.171181] Write of size 4 at addr fff00000c42055b0 by task kunit_try_catch/253
[   26.172464] 
[   26.172799] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G    B            N 6.12.33-rc1 #1
[   26.173025] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.173107] Hardware name: linux,dummy-virt (DT)
[   26.173199] Call trace:
[   26.173275]  dump_backtrace+0x9c/0x128
[   26.173365]  show_stack+0x20/0x38
[   26.173413]  dump_stack_lvl+0x8c/0xd0
[   26.173461]  print_report+0x118/0x5f0
[   26.173506]  kasan_report+0xdc/0x128
[   26.173552]  kasan_check_range+0x100/0x1a8
[   26.173601]  __kasan_check_write+0x20/0x30
[   26.173650]  kasan_atomics_helper+0xda0/0x49c8
[   26.173705]  kasan_atomics+0x1a0/0x2e8
[   26.173755]  kunit_try_run_case+0x170/0x3f0
[   26.173802]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.173857]  kthread+0x24c/0x2d0
[   26.173903]  ret_from_fork+0x10/0x20
[   26.173951] 
[   26.180703] Allocated by task 253:
[   26.181262]  kasan_save_stack+0x3c/0x68
[   26.181860]  kasan_save_track+0x20/0x40
[   26.182315]  kasan_save_alloc_info+0x40/0x58
[   26.182911]  __kasan_kmalloc+0xd4/0xd8
[   26.183488]  __kmalloc_cache_noprof+0x154/0x320
[   26.184128]  kasan_atomics+0xb8/0x2e8
[   26.184661]  kunit_try_run_case+0x170/0x3f0
[   26.185186]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.185855]  kthread+0x24c/0x2d0
[   26.186403]  ret_from_fork+0x10/0x20
[   26.186875] 
[   26.187204] The buggy address belongs to the object at fff00000c4205580
[   26.187204]  which belongs to the cache kmalloc-64 of size 64
[   26.188296] The buggy address is located 0 bytes to the right of
[   26.188296]  allocated 48-byte region [fff00000c4205580, fff00000c42055b0)
[   26.189560] 
[   26.189877] The buggy address belongs to the physical page:
[   26.190591] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104205
[   26.191508] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   26.192246] page_type: f5(slab)
[   26.192725] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   26.193584] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   26.194398] page dumped because: kasan: bad access detected
[   26.195017] 
[   26.195302] Memory state around the buggy address:
[   26.195984]  fff00000c4205480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.196665]  fff00000c4205500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.197436] >fff00000c4205580: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   26.198233]                                      ^
[   26.198718]  fff00000c4205600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.199620]  fff00000c4205680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.200268] ==================================================================
[   26.064274] ==================================================================
[   26.065348] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f4c/0x49c8
[   26.066374] Read of size 4 at addr fff00000c42055b0 by task kunit_try_catch/253
[   26.068143] 
[   26.068535] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G    B            N 6.12.33-rc1 #1
[   26.068690] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.068789] Hardware name: linux,dummy-virt (DT)
[   26.068887] Call trace:
[   26.068971]  dump_backtrace+0x9c/0x128
[   26.069117]  show_stack+0x20/0x38
[   26.069250]  dump_stack_lvl+0x8c/0xd0
[   26.069306]  print_report+0x118/0x5f0
[   26.069354]  kasan_report+0xdc/0x128
[   26.069400]  __asan_report_load4_noabort+0x20/0x30
[   26.069457]  kasan_atomics_helper+0x3f4c/0x49c8
[   26.069510]  kasan_atomics+0x1a0/0x2e8
[   26.069559]  kunit_try_run_case+0x170/0x3f0
[   26.069609]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.069663]  kthread+0x24c/0x2d0
[   26.069713]  ret_from_fork+0x10/0x20
[   26.069764] 
[   26.076642] Allocated by task 253:
[   26.077070]  kasan_save_stack+0x3c/0x68
[   26.077621]  kasan_save_track+0x20/0x40
[   26.078122]  kasan_save_alloc_info+0x40/0x58
[   26.078728]  __kasan_kmalloc+0xd4/0xd8
[   26.079353]  __kmalloc_cache_noprof+0x154/0x320
[   26.080013]  kasan_atomics+0xb8/0x2e8
[   26.080620]  kunit_try_run_case+0x170/0x3f0
[   26.081259]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.081917]  kthread+0x24c/0x2d0
[   26.082468]  ret_from_fork+0x10/0x20
[   26.083044] 
[   26.083402] The buggy address belongs to the object at fff00000c4205580
[   26.083402]  which belongs to the cache kmalloc-64 of size 64
[   26.084646] The buggy address is located 0 bytes to the right of
[   26.084646]  allocated 48-byte region [fff00000c4205580, fff00000c42055b0)
[   26.085980] 
[   26.086321] The buggy address belongs to the physical page:
[   26.087020] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104205
[   26.087929] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   26.088666] page_type: f5(slab)
[   26.089287] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   26.090130] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   26.090919] page dumped because: kasan: bad access detected
[   26.091570] 
[   26.091894] Memory state around the buggy address:
[   26.092522]  fff00000c4205480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.093360]  fff00000c4205500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.094132] >fff00000c4205580: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   26.094887]                                      ^
[   26.095467]  fff00000c4205600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.096228]  fff00000c4205680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.096825] ==================================================================
[   26.760261] ==================================================================
[   26.761071] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x141c/0x49c8
[   26.761913] Write of size 8 at addr fff00000c42055b0 by task kunit_try_catch/253
[   26.762624] 
[   26.762997] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G    B            N 6.12.33-rc1 #1
[   26.763202] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.763287] Hardware name: linux,dummy-virt (DT)
[   26.763379] Call trace:
[   26.763477]  dump_backtrace+0x9c/0x128
[   26.763603]  show_stack+0x20/0x38
[   26.763714]  dump_stack_lvl+0x8c/0xd0
[   26.763827]  print_report+0x118/0x5f0
[   26.763920]  kasan_report+0xdc/0x128
[   26.763997]  kasan_check_range+0x100/0x1a8
[   26.764053]  __kasan_check_write+0x20/0x30
[   26.764103]  kasan_atomics_helper+0x141c/0x49c8
[   26.764158]  kasan_atomics+0x1a0/0x2e8
[   26.764208]  kunit_try_run_case+0x170/0x3f0
[   26.764257]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.764314]  kthread+0x24c/0x2d0
[   26.764363]  ret_from_fork+0x10/0x20
[   26.764414] 
[   26.771045] Allocated by task 253:
[   26.771478]  kasan_save_stack+0x3c/0x68
[   26.771950]  kasan_save_track+0x20/0x40
[   26.772540]  kasan_save_alloc_info+0x40/0x58
[   26.773058]  __kasan_kmalloc+0xd4/0xd8
[   26.773491]  __kmalloc_cache_noprof+0x154/0x320
[   26.774196]  kasan_atomics+0xb8/0x2e8
[   26.774747]  kunit_try_run_case+0x170/0x3f0
[   26.775351]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.775980]  kthread+0x24c/0x2d0
[   26.776503]  ret_from_fork+0x10/0x20
[   26.776957] 
[   26.777287] The buggy address belongs to the object at fff00000c4205580
[   26.777287]  which belongs to the cache kmalloc-64 of size 64
[   26.778513] The buggy address is located 0 bytes to the right of
[   26.778513]  allocated 48-byte region [fff00000c4205580, fff00000c42055b0)
[   26.779689] 
[   26.780029] The buggy address belongs to the physical page:
[   26.780518] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104205
[   26.781721] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   26.782906] page_type: f5(slab)
[   26.783427] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   26.784275] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   26.785047] page dumped because: kasan: bad access detected
[   26.785604] 
[   26.785905] Memory state around the buggy address:
[   26.786482]  fff00000c4205480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.787221]  fff00000c4205500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.787953] >fff00000c4205580: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   26.788667]                                      ^
[   26.789218]  fff00000c4205600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.789991]  fff00000c4205680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.790697] ==================================================================
[   27.202073] ==================================================================
[   27.203002] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f88/0x49c8
[   27.204094] Read of size 8 at addr fff00000c42055b0 by task kunit_try_catch/253
[   27.205069] 
[   27.205459] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G    B            N 6.12.33-rc1 #1
[   27.205680] Tainted: [B]=BAD_PAGE, [N]=TEST
[   27.205769] Hardware name: linux,dummy-virt (DT)
[   27.205861] Call trace:
[   27.205896]  dump_backtrace+0x9c/0x128
[   27.205955]  show_stack+0x20/0x38
[   27.206035]  dump_stack_lvl+0x8c/0xd0
[   27.206086]  print_report+0x118/0x5f0
[   27.206133]  kasan_report+0xdc/0x128
[   27.206179]  __asan_report_load8_noabort+0x20/0x30
[   27.206236]  kasan_atomics_helper+0x3f88/0x49c8
[   27.206295]  kasan_atomics+0x1a0/0x2e8
[   27.206348]  kunit_try_run_case+0x170/0x3f0
[   27.206399]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   27.206456]  kthread+0x24c/0x2d0
[   27.206507]  ret_from_fork+0x10/0x20
[   27.206560] 
[   27.212716] Allocated by task 253:
[   27.213224]  kasan_save_stack+0x3c/0x68
[   27.213791]  kasan_save_track+0x20/0x40
[   27.214383]  kasan_save_alloc_info+0x40/0x58
[   27.214919]  __kasan_kmalloc+0xd4/0xd8
[   27.215530]  __kmalloc_cache_noprof+0x154/0x320
[   27.216214]  kasan_atomics+0xb8/0x2e8
[   27.216834]  kunit_try_run_case+0x170/0x3f0
[   27.217342]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   27.218059]  kthread+0x24c/0x2d0
[   27.218511]  ret_from_fork+0x10/0x20
[   27.219014] 
[   27.219342] The buggy address belongs to the object at fff00000c4205580
[   27.219342]  which belongs to the cache kmalloc-64 of size 64
[   27.220450] The buggy address is located 0 bytes to the right of
[   27.220450]  allocated 48-byte region [fff00000c4205580, fff00000c42055b0)
[   27.221721] 
[   27.222061] The buggy address belongs to the physical page:
[   27.222648] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104205
[   27.223475] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   27.224142] page_type: f5(slab)
[   27.224663] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   27.225397] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   27.226221] page dumped because: kasan: bad access detected
[   27.226816] 
[   27.227158] Memory state around the buggy address:
[   27.227690]  fff00000c4205480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.228413]  fff00000c4205500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.229125] >fff00000c4205580: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   27.229808]                                      ^
[   27.230506]  fff00000c4205600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.231162]  fff00000c4205680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.231917] ==================================================================
[   25.254202] ==================================================================
[   25.254756] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x40fc/0x49c8
[   25.255664] Write of size 4 at addr fff00000c42055b0 by task kunit_try_catch/253
[   25.256451] 
[   25.256831] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G    B            N 6.12.33-rc1 #1
[   25.257073] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.257161] Hardware name: linux,dummy-virt (DT)
[   25.257259] Call trace:
[   25.257337]  dump_backtrace+0x9c/0x128
[   25.257468]  show_stack+0x20/0x38
[   25.257591]  dump_stack_lvl+0x8c/0xd0
[   25.257715]  print_report+0x118/0x5f0
[   25.257834]  kasan_report+0xdc/0x128
[   25.257950]  __asan_report_store4_noabort+0x20/0x30
[   25.258152]  kasan_atomics_helper+0x40fc/0x49c8
[   25.258297]  kasan_atomics+0x1a0/0x2e8
[   25.258359]  kunit_try_run_case+0x170/0x3f0
[   25.258410]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.258468]  kthread+0x24c/0x2d0
[   25.258518]  ret_from_fork+0x10/0x20
[   25.258569] 
[   25.266495] Allocated by task 253:
[   25.266983]  kasan_save_stack+0x3c/0x68
[   25.268674]  kasan_save_track+0x20/0x40
[   25.269141]  kasan_save_alloc_info+0x40/0x58
[   25.269767]  __kasan_kmalloc+0xd4/0xd8
[   25.270330]  __kmalloc_cache_noprof+0x154/0x320
[   25.270917]  kasan_atomics+0xb8/0x2e8
[   25.271879]  kunit_try_run_case+0x170/0x3f0
[   25.272696]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.273446]  kthread+0x24c/0x2d0
[   25.273977]  ret_from_fork+0x10/0x20
[   25.274518] 
[   25.274900] The buggy address belongs to the object at fff00000c4205580
[   25.274900]  which belongs to the cache kmalloc-64 of size 64
[   25.276613] The buggy address is located 0 bytes to the right of
[   25.276613]  allocated 48-byte region [fff00000c4205580, fff00000c42055b0)
[   25.277788] 
[   25.278371] The buggy address belongs to the physical page:
[   25.279028] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104205
[   25.280244] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   25.280926] page_type: f5(slab)
[   25.281560] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   25.282480] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   25.283352] page dumped because: kasan: bad access detected
[   25.284056] 
[   25.284342] Memory state around the buggy address:
[   25.284911]  fff00000c4205480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.285613]  fff00000c4205500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.287056] >fff00000c4205580: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   25.287645]                                      ^
[   25.288574]  fff00000c4205600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.289438]  fff00000c4205680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.290320] ==================================================================
[   25.725893] ==================================================================
[   25.727009] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4440/0x49c8
[   25.728043] Read of size 4 at addr fff00000c42055b0 by task kunit_try_catch/253
[   25.728834] 
[   25.729193] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G    B            N 6.12.33-rc1 #1
[   25.729424] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.729511] Hardware name: linux,dummy-virt (DT)
[   25.729609] Call trace:
[   25.729680]  dump_backtrace+0x9c/0x128
[   25.729813]  show_stack+0x20/0x38
[   25.729908]  dump_stack_lvl+0x8c/0xd0
[   25.729992]  print_report+0x118/0x5f0
[   25.730049]  kasan_report+0xdc/0x128
[   25.730096]  __asan_report_load4_noabort+0x20/0x30
[   25.730151]  kasan_atomics_helper+0x4440/0x49c8
[   25.730208]  kasan_atomics+0x1a0/0x2e8
[   25.730260]  kunit_try_run_case+0x170/0x3f0
[   25.730312]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.730369]  kthread+0x24c/0x2d0
[   25.730422]  ret_from_fork+0x10/0x20
[   25.730477] 
[   25.736856] Allocated by task 253:
[   25.737417]  kasan_save_stack+0x3c/0x68
[   25.737942]  kasan_save_track+0x20/0x40
[   25.738511]  kasan_save_alloc_info+0x40/0x58
[   25.739044]  __kasan_kmalloc+0xd4/0xd8
[   25.739652]  __kmalloc_cache_noprof+0x154/0x320
[   25.740230]  kasan_atomics+0xb8/0x2e8
[   25.740742]  kunit_try_run_case+0x170/0x3f0
[   25.741316]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.741929]  kthread+0x24c/0x2d0
[   25.742472]  ret_from_fork+0x10/0x20
[   25.743126] 
[   25.743455] The buggy address belongs to the object at fff00000c4205580
[   25.743455]  which belongs to the cache kmalloc-64 of size 64
[   25.744561] The buggy address is located 0 bytes to the right of
[   25.744561]  allocated 48-byte region [fff00000c4205580, fff00000c42055b0)
[   25.745749] 
[   25.746142] The buggy address belongs to the physical page:
[   25.746767] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104205
[   25.747509] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   25.748291] page_type: f5(slab)
[   25.748803] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   25.749722] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   25.750462] page dumped because: kasan: bad access detected
[   25.751083] 
[   25.751431] Memory state around the buggy address:
[   25.752050]  fff00000c4205480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.752758]  fff00000c4205500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.753591] >fff00000c4205580: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   25.754380]                                      ^
[   25.754955]  fff00000c4205600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.755646]  fff00000c4205680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.756404] ==================================================================
[   26.440372] ==================================================================
[   26.441235] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1000/0x49c8
[   26.441927] Write of size 8 at addr fff00000c42055b0 by task kunit_try_catch/253
[   26.443169] 
[   26.443866] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G    B            N 6.12.33-rc1 #1
[   26.444089] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.444174] Hardware name: linux,dummy-virt (DT)
[   26.444286] Call trace:
[   26.444371]  dump_backtrace+0x9c/0x128
[   26.444495]  show_stack+0x20/0x38
[   26.444566]  dump_stack_lvl+0x8c/0xd0
[   26.444616]  print_report+0x118/0x5f0
[   26.444666]  kasan_report+0xdc/0x128
[   26.444714]  kasan_check_range+0x100/0x1a8
[   26.444772]  __kasan_check_write+0x20/0x30
[   26.444828]  kasan_atomics_helper+0x1000/0x49c8
[   26.444883]  kasan_atomics+0x1a0/0x2e8
[   26.444935]  kunit_try_run_case+0x170/0x3f0
[   26.445017]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.445078]  kthread+0x24c/0x2d0
[   26.445128]  ret_from_fork+0x10/0x20
[   26.445178] 
[   26.452212] Allocated by task 253:
[   26.452778]  kasan_save_stack+0x3c/0x68
[   26.453441]  kasan_save_track+0x20/0x40
[   26.454054]  kasan_save_alloc_info+0x40/0x58
[   26.454611]  __kasan_kmalloc+0xd4/0xd8
[   26.455206]  __kmalloc_cache_noprof+0x154/0x320
[   26.455879]  kasan_atomics+0xb8/0x2e8
[   26.456487]  kunit_try_run_case+0x170/0x3f0
[   26.457098]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.457808]  kthread+0x24c/0x2d0
[   26.458340]  ret_from_fork+0x10/0x20
[   26.458892] 
[   26.459276] The buggy address belongs to the object at fff00000c4205580
[   26.459276]  which belongs to the cache kmalloc-64 of size 64
[   26.460474] The buggy address is located 0 bytes to the right of
[   26.460474]  allocated 48-byte region [fff00000c4205580, fff00000c42055b0)
[   26.461800] 
[   26.462195] The buggy address belongs to the physical page:
[   26.462812] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104205
[   26.463685] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   26.464304] page_type: f5(slab)
[   26.464759] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   26.465624] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   26.466381] page dumped because: kasan: bad access detected
[   26.466988] 
[   26.467266] Memory state around the buggy address:
[   26.467874]  fff00000c4205480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.468618]  fff00000c4205500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.469371] >fff00000c4205580: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   26.470045]                                      ^
[   26.470627]  fff00000c4205600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.471449]  fff00000c4205680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.472236] ==================================================================
[   25.618953] ==================================================================
[   25.619693] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x7a0/0x49c8
[   25.620610] Write of size 4 at addr fff00000c42055b0 by task kunit_try_catch/253
[   25.621409] 
[   25.621828] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G    B            N 6.12.33-rc1 #1
[   25.622054] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.622180] Hardware name: linux,dummy-virt (DT)
[   25.622276] Call trace:
[   25.622350]  dump_backtrace+0x9c/0x128
[   25.622477]  show_stack+0x20/0x38
[   25.622594]  dump_stack_lvl+0x8c/0xd0
[   25.622716]  print_report+0x118/0x5f0
[   25.622836]  kasan_report+0xdc/0x128
[   25.622955]  kasan_check_range+0x100/0x1a8
[   25.623098]  __kasan_check_write+0x20/0x30
[   25.623162]  kasan_atomics_helper+0x7a0/0x49c8
[   25.623217]  kasan_atomics+0x1a0/0x2e8
[   25.623268]  kunit_try_run_case+0x170/0x3f0
[   25.623318]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.623373]  kthread+0x24c/0x2d0
[   25.623424]  ret_from_fork+0x10/0x20
[   25.623474] 
[   25.630110] Allocated by task 253:
[   25.630505]  kasan_save_stack+0x3c/0x68
[   25.631146]  kasan_save_track+0x20/0x40
[   25.631764]  kasan_save_alloc_info+0x40/0x58
[   25.632370]  __kasan_kmalloc+0xd4/0xd8
[   25.632810]  __kmalloc_cache_noprof+0x154/0x320
[   25.633581]  kasan_atomics+0xb8/0x2e8
[   25.634978]  kunit_try_run_case+0x170/0x3f0
[   25.635581]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.636166]  kthread+0x24c/0x2d0
[   25.636567]  ret_from_fork+0x10/0x20
[   25.637233] 
[   25.637698] The buggy address belongs to the object at fff00000c4205580
[   25.637698]  which belongs to the cache kmalloc-64 of size 64
[   25.638940] The buggy address is located 0 bytes to the right of
[   25.638940]  allocated 48-byte region [fff00000c4205580, fff00000c42055b0)
[   25.640500] 
[   25.640795] The buggy address belongs to the physical page:
[   25.641393] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104205
[   25.642261] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   25.643190] page_type: f5(slab)
[   25.643755] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   25.644659] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   25.645538] page dumped because: kasan: bad access detected
[   25.646232] 
[   25.646647] Memory state around the buggy address:
[   25.647285]  fff00000c4205480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.648120]  fff00000c4205500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.648941] >fff00000c4205580: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   25.649736]                                      ^
[   25.650381]  fff00000c4205600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.651268]  fff00000c4205680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.652047] ==================================================================
[   25.654255] ==================================================================
[   25.654940] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x810/0x49c8
[   25.655846] Write of size 4 at addr fff00000c42055b0 by task kunit_try_catch/253
[   25.657036] 
[   25.657383] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G    B            N 6.12.33-rc1 #1
[   25.657759] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.657798] Hardware name: linux,dummy-virt (DT)
[   25.657837] Call trace:
[   25.657869]  dump_backtrace+0x9c/0x128
[   25.657926]  show_stack+0x20/0x38
[   25.658005]  dump_stack_lvl+0x8c/0xd0
[   25.658058]  print_report+0x118/0x5f0
[   25.658105]  kasan_report+0xdc/0x128
[   25.658151]  kasan_check_range+0x100/0x1a8
[   25.658201]  __kasan_check_write+0x20/0x30
[   25.658250]  kasan_atomics_helper+0x810/0x49c8
[   25.658305]  kasan_atomics+0x1a0/0x2e8
[   25.658356]  kunit_try_run_case+0x170/0x3f0
[   25.658405]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.658461]  kthread+0x24c/0x2d0
[   25.658511]  ret_from_fork+0x10/0x20
[   25.658562] 
[   25.665427] Allocated by task 253:
[   25.665994]  kasan_save_stack+0x3c/0x68
[   25.666590]  kasan_save_track+0x20/0x40
[   25.667167]  kasan_save_alloc_info+0x40/0x58
[   25.667763]  __kasan_kmalloc+0xd4/0xd8
[   25.668207]  __kmalloc_cache_noprof+0x154/0x320
[   25.669000]  kasan_atomics+0xb8/0x2e8
[   25.669627]  kunit_try_run_case+0x170/0x3f0
[   25.670272]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.671003]  kthread+0x24c/0x2d0
[   25.671582]  ret_from_fork+0x10/0x20
[   25.672073] 
[   25.672447] The buggy address belongs to the object at fff00000c4205580
[   25.672447]  which belongs to the cache kmalloc-64 of size 64
[   25.673456] The buggy address is located 0 bytes to the right of
[   25.673456]  allocated 48-byte region [fff00000c4205580, fff00000c42055b0)
[   25.674614] 
[   25.674944] The buggy address belongs to the physical page:
[   25.675571] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104205
[   25.676379] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   25.677070] page_type: f5(slab)
[   25.677475] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   25.678329] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   25.679099] page dumped because: kasan: bad access detected
[   25.679736] 
[   25.680092] Memory state around the buggy address:
[   25.680649]  fff00000c4205480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.681433]  fff00000c4205500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.682274] >fff00000c4205580: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   25.682904]                                      ^
[   25.683544]  fff00000c4205600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.684242]  fff00000c4205680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.684804] ==================================================================
[   25.757622] ==================================================================
[   25.758422] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x978/0x49c8
[   25.759116] Write of size 4 at addr fff00000c42055b0 by task kunit_try_catch/253
[   25.759723] 
[   25.759938] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G    B            N 6.12.33-rc1 #1
[   25.760218] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.760331] Hardware name: linux,dummy-virt (DT)
[   25.760484] Call trace:
[   25.760558]  dump_backtrace+0x9c/0x128
[   25.760685]  show_stack+0x20/0x38
[   25.760806]  dump_stack_lvl+0x8c/0xd0
[   25.760929]  print_report+0x118/0x5f0
[   25.761068]  kasan_report+0xdc/0x128
[   25.761184]  kasan_check_range+0x100/0x1a8
[   25.761377]  __kasan_check_write+0x20/0x30
[   25.761511]  kasan_atomics_helper+0x978/0x49c8
[   25.761645]  kasan_atomics+0x1a0/0x2e8
[   25.761740]  kunit_try_run_case+0x170/0x3f0
[   25.761797]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.761856]  kthread+0x24c/0x2d0
[   25.761907]  ret_from_fork+0x10/0x20
[   25.761976] 
[   25.770235] Allocated by task 253:
[   25.770643]  kasan_save_stack+0x3c/0x68
[   25.771331]  kasan_save_track+0x20/0x40
[   25.771974]  kasan_save_alloc_info+0x40/0x58
[   25.772540]  __kasan_kmalloc+0xd4/0xd8
[   25.773149]  __kmalloc_cache_noprof+0x154/0x320
[   25.773764]  kasan_atomics+0xb8/0x2e8
[   25.774439]  kunit_try_run_case+0x170/0x3f0
[   25.775029]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.775733]  kthread+0x24c/0x2d0
[   25.776236]  ret_from_fork+0x10/0x20
[   25.776795] 
[   25.777184] The buggy address belongs to the object at fff00000c4205580
[   25.777184]  which belongs to the cache kmalloc-64 of size 64
[   25.778418] The buggy address is located 0 bytes to the right of
[   25.778418]  allocated 48-byte region [fff00000c4205580, fff00000c42055b0)
[   25.779643] 
[   25.780008] The buggy address belongs to the physical page:
[   25.780703] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104205
[   25.781572] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   25.782336] page_type: f5(slab)
[   25.782848] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   25.783700] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   25.784552] page dumped because: kasan: bad access detected
[   25.785196] 
[   25.785549] Memory state around the buggy address:
[   25.786162]  fff00000c4205480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.786984]  fff00000c4205500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.787767] >fff00000c4205580: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   25.788561]                                      ^
[   25.789134]  fff00000c4205600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.789900]  fff00000c4205680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.790779] ==================================================================
[   26.474101] ==================================================================
[   26.474829] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x106c/0x49c8
[   26.475725] Write of size 8 at addr fff00000c42055b0 by task kunit_try_catch/253
[   26.476623] 
[   26.476942] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G    B            N 6.12.33-rc1 #1
[   26.477408] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.477479] Hardware name: linux,dummy-virt (DT)
[   26.477553] Call trace:
[   26.477613]  dump_backtrace+0x9c/0x128
[   26.477725]  show_stack+0x20/0x38
[   26.477819]  dump_stack_lvl+0x8c/0xd0
[   26.477923]  print_report+0x118/0x5f0
[   26.478055]  kasan_report+0xdc/0x128
[   26.478164]  kasan_check_range+0x100/0x1a8
[   26.478281]  __kasan_check_write+0x20/0x30
[   26.478395]  kasan_atomics_helper+0x106c/0x49c8
[   26.478515]  kasan_atomics+0x1a0/0x2e8
[   26.478629]  kunit_try_run_case+0x170/0x3f0
[   26.478743]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.478858]  kthread+0x24c/0x2d0
[   26.478979]  ret_from_fork+0x10/0x20
[   26.479092] 
[   26.493022] Allocated by task 253:
[   26.493571]  kasan_save_stack+0x3c/0x68
[   26.494078]  kasan_save_track+0x20/0x40
[   26.494717]  kasan_save_alloc_info+0x40/0x58
[   26.495328]  __kasan_kmalloc+0xd4/0xd8
[   26.495890]  __kmalloc_cache_noprof+0x154/0x320
[   26.496559]  kasan_atomics+0xb8/0x2e8
[   26.497114]  kunit_try_run_case+0x170/0x3f0
[   26.497691]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.498400]  kthread+0x24c/0x2d0
[   26.498895]  ret_from_fork+0x10/0x20
[   26.499456] 
[   26.499805] The buggy address belongs to the object at fff00000c4205580
[   26.499805]  which belongs to the cache kmalloc-64 of size 64
[   26.501028] The buggy address is located 0 bytes to the right of
[   26.501028]  allocated 48-byte region [fff00000c4205580, fff00000c42055b0)
[   26.502283] 
[   26.502595] The buggy address belongs to the physical page:
[   26.503217] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104205
[   26.504153] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   26.504899] page_type: f5(slab)
[   26.505404] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   26.506248] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   26.507045] page dumped because: kasan: bad access detected
[   26.507667] 
[   26.508005] Memory state around the buggy address:
[   26.508592]  fff00000c4205480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.509450]  fff00000c4205500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.510255] >fff00000c4205580: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   26.511006]                                      ^
[   26.511578]  fff00000c4205600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.512361]  fff00000c4205680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.513173] ==================================================================
[   26.720317] ==================================================================
[   26.721065] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1370/0x49c8
[   26.721925] Write of size 8 at addr fff00000c42055b0 by task kunit_try_catch/253
[   26.723997] 
[   26.724340] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G    B            N 6.12.33-rc1 #1
[   26.724545] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.724630] Hardware name: linux,dummy-virt (DT)
[   26.724718] Call trace:
[   26.724800]  dump_backtrace+0x9c/0x128
[   26.724919]  show_stack+0x20/0x38
[   26.725023]  dump_stack_lvl+0x8c/0xd0
[   26.725079]  print_report+0x118/0x5f0
[   26.725125]  kasan_report+0xdc/0x128
[   26.725171]  kasan_check_range+0x100/0x1a8
[   26.725219]  __kasan_check_write+0x20/0x30
[   26.725270]  kasan_atomics_helper+0x1370/0x49c8
[   26.725325]  kasan_atomics+0x1a0/0x2e8
[   26.725374]  kunit_try_run_case+0x170/0x3f0
[   26.725423]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.725480]  kthread+0x24c/0x2d0
[   26.725530]  ret_from_fork+0x10/0x20
[   26.725580] 
[   26.732523] Allocated by task 253:
[   26.733063]  kasan_save_stack+0x3c/0x68
[   26.733749]  kasan_save_track+0x20/0x40
[   26.734325]  kasan_save_alloc_info+0x40/0x58
[   26.734944]  __kasan_kmalloc+0xd4/0xd8
[   26.735487]  __kmalloc_cache_noprof+0x154/0x320
[   26.736144]  kasan_atomics+0xb8/0x2e8
[   26.736675]  kunit_try_run_case+0x170/0x3f0
[   26.737255]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.737911]  kthread+0x24c/0x2d0
[   26.738412]  ret_from_fork+0x10/0x20
[   26.738939] 
[   26.739277] The buggy address belongs to the object at fff00000c4205580
[   26.739277]  which belongs to the cache kmalloc-64 of size 64
[   26.740360] The buggy address is located 0 bytes to the right of
[   26.740360]  allocated 48-byte region [fff00000c4205580, fff00000c42055b0)
[   26.741679] 
[   26.742569] The buggy address belongs to the physical page:
[   26.743831] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104205
[   26.744452] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   26.744995] page_type: f5(slab)
[   26.745363] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   26.745911] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   26.750203] page dumped because: kasan: bad access detected
[   26.751760] 
[   26.752381] Memory state around the buggy address:
[   26.754099]  fff00000c4205480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.754822]  fff00000c4205500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.755531] >fff00000c4205580: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   26.756324]                                      ^
[   26.756920]  fff00000c4205600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.757672]  fff00000c4205680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.758343] ==================================================================
[   26.584804] ==================================================================
[   26.585516] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x11b0/0x49c8
[   26.586228] Write of size 8 at addr fff00000c42055b0 by task kunit_try_catch/253
[   26.587273] 
[   26.587569] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G    B            N 6.12.33-rc1 #1
[   26.587773] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.587857] Hardware name: linux,dummy-virt (DT)
[   26.588001] Call trace:
[   26.588073]  dump_backtrace+0x9c/0x128
[   26.588200]  show_stack+0x20/0x38
[   26.588367]  dump_stack_lvl+0x8c/0xd0
[   26.588487]  print_report+0x118/0x5f0
[   26.588589]  kasan_report+0xdc/0x128
[   26.588640]  kasan_check_range+0x100/0x1a8
[   26.588690]  __kasan_check_write+0x20/0x30
[   26.588746]  kasan_atomics_helper+0x11b0/0x49c8
[   26.588817]  kasan_atomics+0x1a0/0x2e8
[   26.588871]  kunit_try_run_case+0x170/0x3f0
[   26.588922]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.589006]  kthread+0x24c/0x2d0
[   26.589063]  ret_from_fork+0x10/0x20
[   26.589114] 
[   26.597124] Allocated by task 253:
[   26.597632]  kasan_save_stack+0x3c/0x68
[   26.598203]  kasan_save_track+0x20/0x40
[   26.598814]  kasan_save_alloc_info+0x40/0x58
[   26.599536]  __kasan_kmalloc+0xd4/0xd8
[   26.600074]  __kmalloc_cache_noprof+0x154/0x320
[   26.600648]  kasan_atomics+0xb8/0x2e8
[   26.601269]  kunit_try_run_case+0x170/0x3f0
[   26.601880]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.602596]  kthread+0x24c/0x2d0
[   26.603111]  ret_from_fork+0x10/0x20
[   26.603713] 
[   26.604062] The buggy address belongs to the object at fff00000c4205580
[   26.604062]  which belongs to the cache kmalloc-64 of size 64
[   26.605240] The buggy address is located 0 bytes to the right of
[   26.605240]  allocated 48-byte region [fff00000c4205580, fff00000c42055b0)
[   26.606550] 
[   26.606928] The buggy address belongs to the physical page:
[   26.607580] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104205
[   26.608491] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   26.609269] page_type: f5(slab)
[   26.609806] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   26.610664] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   26.611465] page dumped because: kasan: bad access detected
[   26.612094] 
[   26.612455] Memory state around the buggy address:
[   26.613071]  fff00000c4205480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.613878]  fff00000c4205500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.614671] >fff00000c4205580: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   26.615488]                                      ^
[   26.616068]  fff00000c4205600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.616890]  fff00000c4205680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.617649] ==================================================================
[   26.134839] ==================================================================
[   26.135557] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f40/0x49c8
[   26.136525] Read of size 4 at addr fff00000c42055b0 by task kunit_try_catch/253
[   26.137471] 
[   26.138003] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G    B            N 6.12.33-rc1 #1
[   26.138227] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.138426] Hardware name: linux,dummy-virt (DT)
[   26.138526] Call trace:
[   26.138598]  dump_backtrace+0x9c/0x128
[   26.138725]  show_stack+0x20/0x38
[   26.138807]  dump_stack_lvl+0x8c/0xd0
[   26.138882]  print_report+0x118/0x5f0
[   26.138933]  kasan_report+0xdc/0x128
[   26.139004]  __asan_report_load4_noabort+0x20/0x30
[   26.139064]  kasan_atomics_helper+0x3f40/0x49c8
[   26.139120]  kasan_atomics+0x1a0/0x2e8
[   26.139169]  kunit_try_run_case+0x170/0x3f0
[   26.139216]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.139272]  kthread+0x24c/0x2d0
[   26.139320]  ret_from_fork+0x10/0x20
[   26.139370] 
[   26.146084] Allocated by task 253:
[   26.146621]  kasan_save_stack+0x3c/0x68
[   26.147354]  kasan_save_track+0x20/0x40
[   26.147890]  kasan_save_alloc_info+0x40/0x58
[   26.148589]  __kasan_kmalloc+0xd4/0xd8
[   26.149164]  __kmalloc_cache_noprof+0x154/0x320
[   26.149887]  kasan_atomics+0xb8/0x2e8
[   26.150461]  kunit_try_run_case+0x170/0x3f0
[   26.151178]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.151890]  kthread+0x24c/0x2d0
[   26.152344]  ret_from_fork+0x10/0x20
[   26.152897] 
[   26.153270] The buggy address belongs to the object at fff00000c4205580
[   26.153270]  which belongs to the cache kmalloc-64 of size 64
[   26.154479] The buggy address is located 0 bytes to the right of
[   26.154479]  allocated 48-byte region [fff00000c4205580, fff00000c42055b0)
[   26.155802] 
[   26.156168] The buggy address belongs to the physical page:
[   26.156788] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104205
[   26.157772] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   26.158682] page_type: f5(slab)
[   26.159504] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   26.160352] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   26.161238] page dumped because: kasan: bad access detected
[   26.161845] 
[   26.162379] Memory state around the buggy address:
[   26.162906]  fff00000c4205480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.163627]  fff00000c4205500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.164372] >fff00000c4205580: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   26.165111]                                      ^
[   26.165646]  fff00000c4205600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.166373]  fff00000c4205680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.167143] ==================================================================
[   25.520141] ==================================================================
[   25.521150] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x650/0x49c8
[   25.522327] Write of size 4 at addr fff00000c42055b0 by task kunit_try_catch/253
[   25.523274] 
[   25.523745] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G    B            N 6.12.33-rc1 #1
[   25.523987] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.524072] Hardware name: linux,dummy-virt (DT)
[   25.524165] Call trace:
[   25.524223]  dump_backtrace+0x9c/0x128
[   25.524284]  show_stack+0x20/0x38
[   25.524329]  dump_stack_lvl+0x8c/0xd0
[   25.524377]  print_report+0x118/0x5f0
[   25.524422]  kasan_report+0xdc/0x128
[   25.524470]  kasan_check_range+0x100/0x1a8
[   25.524519]  __kasan_check_write+0x20/0x30
[   25.524568]  kasan_atomics_helper+0x650/0x49c8
[   25.524622]  kasan_atomics+0x1a0/0x2e8
[   25.524672]  kunit_try_run_case+0x170/0x3f0
[   25.524719]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.524788]  kthread+0x24c/0x2d0
[   25.524837]  ret_from_fork+0x10/0x20
[   25.524887] 
[   25.531535] Allocated by task 253:
[   25.532050]  kasan_save_stack+0x3c/0x68
[   25.532669]  kasan_save_track+0x20/0x40
[   25.533204]  kasan_save_alloc_info+0x40/0x58
[   25.533812]  __kasan_kmalloc+0xd4/0xd8
[   25.534462]  __kmalloc_cache_noprof+0x154/0x320
[   25.535102]  kasan_atomics+0xb8/0x2e8
[   25.535535]  kunit_try_run_case+0x170/0x3f0
[   25.536084]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.536852]  kthread+0x24c/0x2d0
[   25.537411]  ret_from_fork+0x10/0x20
[   25.538047] 
[   25.538416] The buggy address belongs to the object at fff00000c4205580
[   25.538416]  which belongs to the cache kmalloc-64 of size 64
[   25.539507] The buggy address is located 0 bytes to the right of
[   25.539507]  allocated 48-byte region [fff00000c4205580, fff00000c42055b0)
[   25.540832] 
[   25.541188] The buggy address belongs to the physical page:
[   25.541972] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104205
[   25.542815] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   25.543482] page_type: f5(slab)
[   25.544167] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   25.544939] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   25.545664] page dumped because: kasan: bad access detected
[   25.546275] 
[   25.546596] Memory state around the buggy address:
[   25.547137]  fff00000c4205480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.547901]  fff00000c4205500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.548570] >fff00000c4205580: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   25.549351]                                      ^
[   25.549899]  fff00000c4205600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.550639]  fff00000c4205680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.551409] ==================================================================
[   25.960381] ==================================================================
[   25.962049] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xbc8/0x49c8
[   25.963293] Write of size 4 at addr fff00000c42055b0 by task kunit_try_catch/253
[   25.964379] 
[   25.964708] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G    B            N 6.12.33-rc1 #1
[   25.965163] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.965206] Hardware name: linux,dummy-virt (DT)
[   25.965289] Call trace:
[   25.965325]  dump_backtrace+0x9c/0x128
[   25.965382]  show_stack+0x20/0x38
[   25.965429]  dump_stack_lvl+0x8c/0xd0
[   25.965477]  print_report+0x118/0x5f0
[   25.965524]  kasan_report+0xdc/0x128
[   25.965568]  kasan_check_range+0x100/0x1a8
[   25.965615]  __kasan_check_write+0x20/0x30
[   25.965664]  kasan_atomics_helper+0xbc8/0x49c8
[   25.965716]  kasan_atomics+0x1a0/0x2e8
[   25.965765]  kunit_try_run_case+0x170/0x3f0
[   25.965814]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.965870]  kthread+0x24c/0x2d0
[   25.965919]  ret_from_fork+0x10/0x20
[   25.966031] 
[   25.974302] Allocated by task 253:
[   25.974898]  kasan_save_stack+0x3c/0x68
[   25.975619]  kasan_save_track+0x20/0x40
[   25.976238]  kasan_save_alloc_info+0x40/0x58
[   25.976845]  __kasan_kmalloc+0xd4/0xd8
[   25.977432]  __kmalloc_cache_noprof+0x154/0x320
[   25.978009]  kasan_atomics+0xb8/0x2e8
[   25.978571]  kunit_try_run_case+0x170/0x3f0
[   25.979209]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.979863]  kthread+0x24c/0x2d0
[   25.980442]  ret_from_fork+0x10/0x20
[   25.980993] 
[   25.981370] The buggy address belongs to the object at fff00000c4205580
[   25.981370]  which belongs to the cache kmalloc-64 of size 64
[   25.982560] The buggy address is located 0 bytes to the right of
[   25.982560]  allocated 48-byte region [fff00000c4205580, fff00000c42055b0)
[   25.983504] 
[   25.983645] The buggy address belongs to the physical page:
[   25.983902] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104205
[   25.985172] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   25.985887] page_type: f5(slab)
[   25.986368] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   25.987237] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   25.988032] page dumped because: kasan: bad access detected
[   25.988662] 
[   25.989050] Memory state around the buggy address:
[   25.989601]  fff00000c4205480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.990454]  fff00000c4205500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.991246] >fff00000c4205580: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   25.992026]                                      ^
[   25.992642]  fff00000c4205600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.993423]  fff00000c4205680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.994201] ==================================================================
[   25.825284] ==================================================================
[   25.826030] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa50/0x49c8
[   25.826851] Write of size 4 at addr fff00000c42055b0 by task kunit_try_catch/253
[   25.827632] 
[   25.828056] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G    B            N 6.12.33-rc1 #1
[   25.828262] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.828345] Hardware name: linux,dummy-virt (DT)
[   25.828439] Call trace:
[   25.828507]  dump_backtrace+0x9c/0x128
[   25.828634]  show_stack+0x20/0x38
[   25.828747]  dump_stack_lvl+0x8c/0xd0
[   25.828873]  print_report+0x118/0x5f0
[   25.829010]  kasan_report+0xdc/0x128
[   25.829130]  kasan_check_range+0x100/0x1a8
[   25.829251]  __kasan_check_write+0x20/0x30
[   25.829375]  kasan_atomics_helper+0xa50/0x49c8
[   25.829505]  kasan_atomics+0x1a0/0x2e8
[   25.829592]  kunit_try_run_case+0x170/0x3f0
[   25.829642]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.829700]  kthread+0x24c/0x2d0
[   25.829751]  ret_from_fork+0x10/0x20
[   25.829803] 
[   25.836479] Allocated by task 253:
[   25.836944]  kasan_save_stack+0x3c/0x68
[   25.837541]  kasan_save_track+0x20/0x40
[   25.838074]  kasan_save_alloc_info+0x40/0x58
[   25.838643]  __kasan_kmalloc+0xd4/0xd8
[   25.839175]  __kmalloc_cache_noprof+0x154/0x320
[   25.839766]  kasan_atomics+0xb8/0x2e8
[   25.840240]  kunit_try_run_case+0x170/0x3f0
[   25.840829]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.841578]  kthread+0x24c/0x2d0
[   25.842080]  ret_from_fork+0x10/0x20
[   25.842554] 
[   25.842886] The buggy address belongs to the object at fff00000c4205580
[   25.842886]  which belongs to the cache kmalloc-64 of size 64
[   25.844023] The buggy address is located 0 bytes to the right of
[   25.844023]  allocated 48-byte region [fff00000c4205580, fff00000c42055b0)
[   25.845153] 
[   25.845434] The buggy address belongs to the physical page:
[   25.846127] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104205
[   25.847001] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   25.847699] page_type: f5(slab)
[   25.848271] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   25.849028] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   25.849801] page dumped because: kasan: bad access detected
[   25.850396] 
[   25.850707] Memory state around the buggy address:
[   25.851264]  fff00000c4205480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.852391]  fff00000c4205500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.853051] >fff00000c4205580: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   25.853881]                                      ^
[   25.854436]  fff00000c4205600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.855190]  fff00000c4205680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.855903] ==================================================================
[   27.033084] ==================================================================
[   27.034193] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x16f0/0x49c8
[   27.035082] Write of size 8 at addr fff00000c42055b0 by task kunit_try_catch/253
[   27.036061] 
[   27.036441] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G    B            N 6.12.33-rc1 #1
[   27.036674] Tainted: [B]=BAD_PAGE, [N]=TEST
[   27.036797] Hardware name: linux,dummy-virt (DT)
[   27.036891] Call trace:
[   27.036984]  dump_backtrace+0x9c/0x128
[   27.037157]  show_stack+0x20/0x38
[   27.037277]  dump_stack_lvl+0x8c/0xd0
[   27.037445]  print_report+0x118/0x5f0
[   27.037550]  kasan_report+0xdc/0x128
[   27.037603]  kasan_check_range+0x100/0x1a8
[   27.037654]  __kasan_check_write+0x20/0x30
[   27.037749]  kasan_atomics_helper+0x16f0/0x49c8
[   27.037810]  kasan_atomics+0x1a0/0x2e8
[   27.037864]  kunit_try_run_case+0x170/0x3f0
[   27.037918]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   27.038004]  kthread+0x24c/0x2d0
[   27.038060]  ret_from_fork+0x10/0x20
[   27.038112] 
[   27.045349] Allocated by task 253:
[   27.045748]  kasan_save_stack+0x3c/0x68
[   27.046455]  kasan_save_track+0x20/0x40
[   27.047037]  kasan_save_alloc_info+0x40/0x58
[   27.047634]  __kasan_kmalloc+0xd4/0xd8
[   27.048296]  __kmalloc_cache_noprof+0x154/0x320
[   27.048913]  kasan_atomics+0xb8/0x2e8
[   27.049540]  kunit_try_run_case+0x170/0x3f0
[   27.050015]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   27.050762]  kthread+0x24c/0x2d0
[   27.051251]  ret_from_fork+0x10/0x20
[   27.051866] 
[   27.052236] The buggy address belongs to the object at fff00000c4205580
[   27.052236]  which belongs to the cache kmalloc-64 of size 64
[   27.053467] The buggy address is located 0 bytes to the right of
[   27.053467]  allocated 48-byte region [fff00000c4205580, fff00000c42055b0)
[   27.054747] 
[   27.055107] The buggy address belongs to the physical page:
[   27.055813] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104205
[   27.056675] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   27.057452] page_type: f5(slab)
[   27.058019] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   27.058849] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   27.059626] page dumped because: kasan: bad access detected
[   27.060260] 
[   27.060617] Memory state around the buggy address:
[   27.061261]  fff00000c4205480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.062021]  fff00000c4205500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.062838] >fff00000c4205580: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   27.063604]                                      ^
[   27.064205]  fff00000c4205600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.065008]  fff00000c4205680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.065777] ==================================================================
[   26.272801] ==================================================================
[   26.273466] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x40c0/0x49c8
[   26.274470] Read of size 8 at addr fff00000c42055b0 by task kunit_try_catch/253
[   26.275160] 
[   26.275731] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G    B            N 6.12.33-rc1 #1
[   26.275845] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.275882] Hardware name: linux,dummy-virt (DT)
[   26.275924] Call trace:
[   26.275955]  dump_backtrace+0x9c/0x128
[   26.276105]  show_stack+0x20/0x38
[   26.276222]  dump_stack_lvl+0x8c/0xd0
[   26.276345]  print_report+0x118/0x5f0
[   26.276468]  kasan_report+0xdc/0x128
[   26.276589]  __asan_report_load8_noabort+0x20/0x30
[   26.276723]  kasan_atomics_helper+0x40c0/0x49c8
[   26.276865]  kasan_atomics+0x1a0/0x2e8
[   26.277016]  kunit_try_run_case+0x170/0x3f0
[   26.277139]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.277281]  kthread+0x24c/0x2d0
[   26.277390]  ret_from_fork+0x10/0x20
[   26.277501] 
[   26.284659] Allocated by task 253:
[   26.285128]  kasan_save_stack+0x3c/0x68
[   26.285907]  kasan_save_track+0x20/0x40
[   26.286551]  kasan_save_alloc_info+0x40/0x58
[   26.287202]  __kasan_kmalloc+0xd4/0xd8
[   26.287664]  __kmalloc_cache_noprof+0x154/0x320
[   26.288202]  kasan_atomics+0xb8/0x2e8
[   26.288650]  kunit_try_run_case+0x170/0x3f0
[   26.289458]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.290118]  kthread+0x24c/0x2d0
[   26.290627]  ret_from_fork+0x10/0x20
[   26.291182] 
[   26.291538] The buggy address belongs to the object at fff00000c4205580
[   26.291538]  which belongs to the cache kmalloc-64 of size 64
[   26.292933] The buggy address is located 0 bytes to the right of
[   26.292933]  allocated 48-byte region [fff00000c4205580, fff00000c42055b0)
[   26.294121] 
[   26.294447] The buggy address belongs to the physical page:
[   26.295060] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104205
[   26.295998] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   26.296759] page_type: f5(slab)
[   26.297339] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   26.298163] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   26.298972] page dumped because: kasan: bad access detected
[   26.299595] 
[   26.299948] Memory state around the buggy address:
[   26.300515]  fff00000c4205480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.301368]  fff00000c4205500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.302155] >fff00000c4205580: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   26.302973]                                      ^
[   26.303573]  fff00000c4205600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.304354]  fff00000c4205680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.305130] ==================================================================
[   26.029948] ==================================================================
[   26.030922] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xc64/0x49c8
[   26.031790] Write of size 4 at addr fff00000c42055b0 by task kunit_try_catch/253
[   26.032613] 
[   26.032998] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G    B            N 6.12.33-rc1 #1
[   26.033249] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.033317] Hardware name: linux,dummy-virt (DT)
[   26.033359] Call trace:
[   26.033390]  dump_backtrace+0x9c/0x128
[   26.033470]  show_stack+0x20/0x38
[   26.033588]  dump_stack_lvl+0x8c/0xd0
[   26.033752]  print_report+0x118/0x5f0
[   26.033881]  kasan_report+0xdc/0x128
[   26.034045]  kasan_check_range+0x100/0x1a8
[   26.034172]  __kasan_check_write+0x20/0x30
[   26.034229]  kasan_atomics_helper+0xc64/0x49c8
[   26.034284]  kasan_atomics+0x1a0/0x2e8
[   26.034336]  kunit_try_run_case+0x170/0x3f0
[   26.034384]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.034441]  kthread+0x24c/0x2d0
[   26.034492]  ret_from_fork+0x10/0x20
[   26.034549] 
[   26.041740] Allocated by task 253:
[   26.042214]  kasan_save_stack+0x3c/0x68
[   26.042865]  kasan_save_track+0x20/0x40
[   26.043433]  kasan_save_alloc_info+0x40/0x58
[   26.044053]  __kasan_kmalloc+0xd4/0xd8
[   26.044625]  __kmalloc_cache_noprof+0x154/0x320
[   26.045287]  kasan_atomics+0xb8/0x2e8
[   26.045892]  kunit_try_run_case+0x170/0x3f0
[   26.046479]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.047217]  kthread+0x24c/0x2d0
[   26.047785]  ret_from_fork+0x10/0x20
[   26.048373] 
[   26.048722] The buggy address belongs to the object at fff00000c4205580
[   26.048722]  which belongs to the cache kmalloc-64 of size 64
[   26.050010] The buggy address is located 0 bytes to the right of
[   26.050010]  allocated 48-byte region [fff00000c4205580, fff00000c42055b0)
[   26.051298] 
[   26.051678] The buggy address belongs to the physical page:
[   26.052289] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104205
[   26.053206] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   26.053987] page_type: f5(slab)
[   26.054466] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   26.055348] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   26.056157] page dumped because: kasan: bad access detected
[   26.056788] 
[   26.057117] Memory state around the buggy address:
[   26.057663]  fff00000c4205480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.058537]  fff00000c4205500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.059364] >fff00000c4205580: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   26.060247]                                      ^
[   26.060793]  fff00000c4205600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.061451]  fff00000c4205680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.062333] ==================================================================
[   27.137560] ==================================================================
[   27.138323] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f78/0x49c8
[   27.139174] Read of size 8 at addr fff00000c42055b0 by task kunit_try_catch/253
[   27.140000] 
[   27.140333] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G    B            N 6.12.33-rc1 #1
[   27.140553] Tainted: [B]=BAD_PAGE, [N]=TEST
[   27.140642] Hardware name: linux,dummy-virt (DT)
[   27.140738] Call trace:
[   27.140823]  dump_backtrace+0x9c/0x128
[   27.140951]  show_stack+0x20/0x38
[   27.141091]  dump_stack_lvl+0x8c/0xd0
[   27.141183]  print_report+0x118/0x5f0
[   27.141280]  kasan_report+0xdc/0x128
[   27.141395]  __asan_report_load8_noabort+0x20/0x30
[   27.141530]  kasan_atomics_helper+0x3f78/0x49c8
[   27.141666]  kasan_atomics+0x1a0/0x2e8
[   27.141793]  kunit_try_run_case+0x170/0x3f0
[   27.141893]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   27.141955]  kthread+0x24c/0x2d0
[   27.142038]  ret_from_fork+0x10/0x20
[   27.142092] 
[   27.149205] Allocated by task 253:
[   27.149616]  kasan_save_stack+0x3c/0x68
[   27.150213]  kasan_save_track+0x20/0x40
[   27.150721]  kasan_save_alloc_info+0x40/0x58
[   27.151222]  __kasan_kmalloc+0xd4/0xd8
[   27.151773]  __kmalloc_cache_noprof+0x154/0x320
[   27.152504]  kasan_atomics+0xb8/0x2e8
[   27.152979]  kunit_try_run_case+0x170/0x3f0
[   27.153563]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   27.154286]  kthread+0x24c/0x2d0
[   27.154708]  ret_from_fork+0x10/0x20
[   27.155250] 
[   27.155536] The buggy address belongs to the object at fff00000c4205580
[   27.155536]  which belongs to the cache kmalloc-64 of size 64
[   27.156678] The buggy address is located 0 bytes to the right of
[   27.156678]  allocated 48-byte region [fff00000c4205580, fff00000c42055b0)
[   27.157923] 
[   27.158287] The buggy address belongs to the physical page:
[   27.158887] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104205
[   27.159567] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   27.160356] page_type: f5(slab)
[   27.160856] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   27.161648] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   27.162448] page dumped because: kasan: bad access detected
[   27.163041] 
[   27.163333] Memory state around the buggy address:
[   27.163858]  fff00000c4205480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.164607]  fff00000c4205500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.165275] >fff00000c4205580: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   27.165899]                                      ^
[   27.166543]  fff00000c4205600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.167306]  fff00000c4205680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.168049] ==================================================================
[   26.306276] ==================================================================
[   26.307001] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xeb0/0x49c8
[   26.307856] Write of size 8 at addr fff00000c42055b0 by task kunit_try_catch/253
[   26.308694] 
[   26.309104] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G    B            N 6.12.33-rc1 #1
[   26.309311] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.309394] Hardware name: linux,dummy-virt (DT)
[   26.309485] Call trace:
[   26.309578]  dump_backtrace+0x9c/0x128
[   26.309731]  show_stack+0x20/0x38
[   26.309844]  dump_stack_lvl+0x8c/0xd0
[   26.309997]  print_report+0x118/0x5f0
[   26.310163]  kasan_report+0xdc/0x128
[   26.310314]  kasan_check_range+0x100/0x1a8
[   26.310435]  __kasan_check_write+0x20/0x30
[   26.310510]  kasan_atomics_helper+0xeb0/0x49c8
[   26.310565]  kasan_atomics+0x1a0/0x2e8
[   26.310616]  kunit_try_run_case+0x170/0x3f0
[   26.310665]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.310722]  kthread+0x24c/0x2d0
[   26.310771]  ret_from_fork+0x10/0x20
[   26.310819] 
[   26.318645] Allocated by task 253:
[   26.319021]  kasan_save_stack+0x3c/0x68
[   26.319398]  kasan_save_track+0x20/0x40
[   26.319765]  kasan_save_alloc_info+0x40/0x58
[   26.321031]  __kasan_kmalloc+0xd4/0xd8
[   26.321469]  __kmalloc_cache_noprof+0x154/0x320
[   26.322034]  kasan_atomics+0xb8/0x2e8
[   26.322564]  kunit_try_run_case+0x170/0x3f0
[   26.323175]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.323848]  kthread+0x24c/0x2d0
[   26.324466]  ret_from_fork+0x10/0x20
[   26.325038] 
[   26.325353] The buggy address belongs to the object at fff00000c4205580
[   26.325353]  which belongs to the cache kmalloc-64 of size 64
[   26.326478] The buggy address is located 0 bytes to the right of
[   26.326478]  allocated 48-byte region [fff00000c4205580, fff00000c42055b0)
[   26.327746] 
[   26.328139] The buggy address belongs to the physical page:
[   26.328810] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104205
[   26.329689] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   26.330501] page_type: f5(slab)
[   26.331026] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   26.331868] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   26.332822] page dumped because: kasan: bad access detected
[   26.333385] 
[   26.333660] Memory state around the buggy address:
[   26.334551]  fff00000c4205480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.335456]  fff00000c4205500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.336322] >fff00000c4205580: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   26.337194]                                      ^
[   26.337906]  fff00000c4205600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.338796]  fff00000c4205680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.339644] ==================================================================
[   27.233430] ==================================================================
[   27.234137] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x18a4/0x49c8
[   27.235383] Write of size 8 at addr fff00000c42055b0 by task kunit_try_catch/253
[   27.236276] 
[   27.236672] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G    B            N 6.12.33-rc1 #1
[   27.236948] Tainted: [B]=BAD_PAGE, [N]=TEST
[   27.237050] Hardware name: linux,dummy-virt (DT)
[   27.237142] Call trace:
[   27.237211]  dump_backtrace+0x9c/0x128
[   27.237334]  show_stack+0x20/0x38
[   27.237423]  dump_stack_lvl+0x8c/0xd0
[   27.237475]  print_report+0x118/0x5f0
[   27.237526]  kasan_report+0xdc/0x128
[   27.237574]  kasan_check_range+0x100/0x1a8
[   27.237624]  __kasan_check_write+0x20/0x30
[   27.237673]  kasan_atomics_helper+0x18a4/0x49c8
[   27.237730]  kasan_atomics+0x1a0/0x2e8
[   27.237781]  kunit_try_run_case+0x170/0x3f0
[   27.237832]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   27.237888]  kthread+0x24c/0x2d0
[   27.237939]  ret_from_fork+0x10/0x20
[   27.238027] 
[   27.245351] Allocated by task 253:
[   27.245946]  kasan_save_stack+0x3c/0x68
[   27.246526]  kasan_save_track+0x20/0x40
[   27.247218]  kasan_save_alloc_info+0x40/0x58
[   27.247859]  __kasan_kmalloc+0xd4/0xd8
[   27.248537]  __kmalloc_cache_noprof+0x154/0x320
[   27.249266]  kasan_atomics+0xb8/0x2e8
[   27.249795]  kunit_try_run_case+0x170/0x3f0
[   27.250444]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   27.251036]  kthread+0x24c/0x2d0
[   27.251603]  ret_from_fork+0x10/0x20
[   27.252162] 
[   27.252440] The buggy address belongs to the object at fff00000c4205580
[   27.252440]  which belongs to the cache kmalloc-64 of size 64
[   27.253528] The buggy address is located 0 bytes to the right of
[   27.253528]  allocated 48-byte region [fff00000c4205580, fff00000c42055b0)
[   27.254542] 
[   27.254818] The buggy address belongs to the physical page:
[   27.255584] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104205
[   27.256579] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   27.257386] page_type: f5(slab)
[   27.258017] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   27.258864] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   27.259757] page dumped because: kasan: bad access detected
[   27.260318] 
[   27.260664] Memory state around the buggy address:
[   27.261314]  fff00000c4205480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.262135]  fff00000c4205500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.262974] >fff00000c4205580: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   27.263709]                                      ^
[   27.264310]  fff00000c4205600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.265040]  fff00000c4205680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.265842] ==================================================================
[   25.687271] ==================================================================
[   25.688649] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x8d8/0x49c8
[   25.690871] Write of size 4 at addr fff00000c42055b0 by task kunit_try_catch/253
[   25.692090] 
[   25.692374] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G    B            N 6.12.33-rc1 #1
[   25.692571] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.692647] Hardware name: linux,dummy-virt (DT)
[   25.692734] Call trace:
[   25.692805]  dump_backtrace+0x9c/0x128
[   25.692920]  show_stack+0x20/0x38
[   25.693347]  dump_stack_lvl+0x8c/0xd0
[   25.693529]  print_report+0x118/0x5f0
[   25.693652]  kasan_report+0xdc/0x128
[   25.693754]  kasan_check_range+0x100/0x1a8
[   25.693864]  __kasan_check_write+0x20/0x30
[   25.693998]  kasan_atomics_helper+0x8d8/0x49c8
[   25.694124]  kasan_atomics+0x1a0/0x2e8
[   25.694237]  kunit_try_run_case+0x170/0x3f0
[   25.694349]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.694476]  kthread+0x24c/0x2d0
[   25.694580]  ret_from_fork+0x10/0x20
[   25.694681] 
[   25.703886] Allocated by task 253:
[   25.704400]  kasan_save_stack+0x3c/0x68
[   25.704922]  kasan_save_track+0x20/0x40
[   25.705519]  kasan_save_alloc_info+0x40/0x58
[   25.706145]  __kasan_kmalloc+0xd4/0xd8
[   25.706701]  __kmalloc_cache_noprof+0x154/0x320
[   25.707239]  kasan_atomics+0xb8/0x2e8
[   25.707811]  kunit_try_run_case+0x170/0x3f0
[   25.708420]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.709142]  kthread+0x24c/0x2d0
[   25.709618]  ret_from_fork+0x10/0x20
[   25.710111] 
[   25.710432] The buggy address belongs to the object at fff00000c4205580
[   25.710432]  which belongs to the cache kmalloc-64 of size 64
[   25.711540] The buggy address is located 0 bytes to the right of
[   25.711540]  allocated 48-byte region [fff00000c4205580, fff00000c42055b0)
[   25.712729] 
[   25.713097] The buggy address belongs to the physical page:
[   25.713755] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104205
[   25.714528] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   25.715223] page_type: f5(slab)
[   25.715666] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   25.716522] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   25.717318] page dumped because: kasan: bad access detected
[   25.718003] 
[   25.718326] Memory state around the buggy address:
[   25.718896]  fff00000c4205480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.719643]  fff00000c4205500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.720398] >fff00000c4205580: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   25.721200]                                      ^
[   25.721866]  fff00000c4205600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.722549]  fff00000c4205680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.723276] ==================================================================
[   25.792823] ==================================================================
[   25.793704] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x9e4/0x49c8
[   25.794579] Write of size 4 at addr fff00000c42055b0 by task kunit_try_catch/253
[   25.795625] 
[   25.796246] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G    B            N 6.12.33-rc1 #1
[   25.796422] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.796537] Hardware name: linux,dummy-virt (DT)
[   25.796632] Call trace:
[   25.796705]  dump_backtrace+0x9c/0x128
[   25.796796]  show_stack+0x20/0x38
[   25.796846]  dump_stack_lvl+0x8c/0xd0
[   25.796896]  print_report+0x118/0x5f0
[   25.796943]  kasan_report+0xdc/0x128
[   25.797026]  kasan_check_range+0x100/0x1a8
[   25.797077]  __kasan_check_write+0x20/0x30
[   25.797128]  kasan_atomics_helper+0x9e4/0x49c8
[   25.797183]  kasan_atomics+0x1a0/0x2e8
[   25.797233]  kunit_try_run_case+0x170/0x3f0
[   25.797283]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.797339]  kthread+0x24c/0x2d0
[   25.797394]  ret_from_fork+0x10/0x20
[   25.797444] 
[   25.804629] Allocated by task 253:
[   25.805229]  kasan_save_stack+0x3c/0x68
[   25.805714]  kasan_save_track+0x20/0x40
[   25.806293]  kasan_save_alloc_info+0x40/0x58
[   25.806832]  __kasan_kmalloc+0xd4/0xd8
[   25.807299]  __kmalloc_cache_noprof+0x154/0x320
[   25.807916]  kasan_atomics+0xb8/0x2e8
[   25.808430]  kunit_try_run_case+0x170/0x3f0
[   25.808918]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.809616]  kthread+0x24c/0x2d0
[   25.810034]  ret_from_fork+0x10/0x20
[   25.810506] 
[   25.810830] The buggy address belongs to the object at fff00000c4205580
[   25.810830]  which belongs to the cache kmalloc-64 of size 64
[   25.812065] The buggy address is located 0 bytes to the right of
[   25.812065]  allocated 48-byte region [fff00000c4205580, fff00000c42055b0)
[   25.813244] 
[   25.813557] The buggy address belongs to the physical page:
[   25.814087] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104205
[   25.814850] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   25.815652] page_type: f5(slab)
[   25.816165] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   25.817098] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   25.817861] page dumped because: kasan: bad access detected
[   25.818474] 
[   25.818772] Memory state around the buggy address:
[   25.819327]  fff00000c4205480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.820058]  fff00000c4205500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.820867] >fff00000c4205580: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   25.821481]                                      ^
[   25.822123]  fff00000c4205600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.823084]  fff00000c4205680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.823887] ==================================================================
[   25.292205] ==================================================================
[   25.293340] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3c8/0x49c8
[   25.294167] Write of size 4 at addr fff00000c42055b0 by task kunit_try_catch/253
[   25.295623] 
[   25.296132] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G    B            N 6.12.33-rc1 #1
[   25.296341] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.296424] Hardware name: linux,dummy-virt (DT)
[   25.296513] Call trace:
[   25.296677]  dump_backtrace+0x9c/0x128
[   25.296864]  show_stack+0x20/0x38
[   25.296918]  dump_stack_lvl+0x8c/0xd0
[   25.296999]  print_report+0x118/0x5f0
[   25.297054]  kasan_report+0xdc/0x128
[   25.297099]  kasan_check_range+0x100/0x1a8
[   25.297149]  __kasan_check_write+0x20/0x30
[   25.297196]  kasan_atomics_helper+0x3c8/0x49c8
[   25.297250]  kasan_atomics+0x1a0/0x2e8
[   25.297298]  kunit_try_run_case+0x170/0x3f0
[   25.297346]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.297402]  kthread+0x24c/0x2d0
[   25.297449]  ret_from_fork+0x10/0x20
[   25.297500] 
[   25.305600] Allocated by task 253:
[   25.306051]  kasan_save_stack+0x3c/0x68
[   25.306644]  kasan_save_track+0x20/0x40
[   25.308271]  kasan_save_alloc_info+0x40/0x58
[   25.309057]  __kasan_kmalloc+0xd4/0xd8
[   25.309620]  __kmalloc_cache_noprof+0x154/0x320
[   25.310232]  kasan_atomics+0xb8/0x2e8
[   25.310729]  kunit_try_run_case+0x170/0x3f0
[   25.311302]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.311941]  kthread+0x24c/0x2d0
[   25.312382]  ret_from_fork+0x10/0x20
[   25.312935] 
[   25.313546] The buggy address belongs to the object at fff00000c4205580
[   25.313546]  which belongs to the cache kmalloc-64 of size 64
[   25.314702] The buggy address is located 0 bytes to the right of
[   25.314702]  allocated 48-byte region [fff00000c4205580, fff00000c42055b0)
[   25.316453] 
[   25.316816] The buggy address belongs to the physical page:
[   25.317454] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104205
[   25.318178] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   25.318890] page_type: f5(slab)
[   25.319650] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   25.320705] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   25.321648] page dumped because: kasan: bad access detected
[   25.322290] 
[   25.322640] Memory state around the buggy address:
[   25.323237]  fff00000c4205480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.324318]  fff00000c4205500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.324646] >fff00000c4205580: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   25.325154]                                      ^
[   25.325661]  fff00000c4205600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.326425]  fff00000c4205680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.327159] ==================================================================
[   25.890441] ==================================================================
[   25.891258] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xb28/0x49c8
[   25.892126] Write of size 4 at addr fff00000c42055b0 by task kunit_try_catch/253
[   25.892889] 
[   25.893277] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G    B            N 6.12.33-rc1 #1
[   25.893489] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.893576] Hardware name: linux,dummy-virt (DT)
[   25.893673] Call trace:
[   25.893743]  dump_backtrace+0x9c/0x128
[   25.893868]  show_stack+0x20/0x38
[   25.893998]  dump_stack_lvl+0x8c/0xd0
[   25.894119]  print_report+0x118/0x5f0
[   25.894243]  kasan_report+0xdc/0x128
[   25.894356]  kasan_check_range+0x100/0x1a8
[   25.894475]  __kasan_check_write+0x20/0x30
[   25.894597]  kasan_atomics_helper+0xb28/0x49c8
[   25.894728]  kasan_atomics+0x1a0/0x2e8
[   25.894816]  kunit_try_run_case+0x170/0x3f0
[   25.894866]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.894923]  kthread+0x24c/0x2d0
[   25.895009]  ret_from_fork+0x10/0x20
[   25.895067] 
[   25.901824] Allocated by task 253:
[   25.902228]  kasan_save_stack+0x3c/0x68
[   25.902781]  kasan_save_track+0x20/0x40
[   25.903369]  kasan_save_alloc_info+0x40/0x58
[   25.904019]  __kasan_kmalloc+0xd4/0xd8
[   25.904504]  __kmalloc_cache_noprof+0x154/0x320
[   25.905058]  kasan_atomics+0xb8/0x2e8
[   25.905665]  kunit_try_run_case+0x170/0x3f0
[   25.906251]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.906871]  kthread+0x24c/0x2d0
[   25.907376]  ret_from_fork+0x10/0x20
[   25.907886] 
[   25.908213] The buggy address belongs to the object at fff00000c4205580
[   25.908213]  which belongs to the cache kmalloc-64 of size 64
[   25.909412] The buggy address is located 0 bytes to the right of
[   25.909412]  allocated 48-byte region [fff00000c4205580, fff00000c42055b0)
[   25.910574] 
[   25.910848] The buggy address belongs to the physical page:
[   25.911484] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104205
[   25.912398] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   25.913130] page_type: f5(slab)
[   25.913603] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   25.914374] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   25.915179] page dumped because: kasan: bad access detected
[   25.915816] 
[   25.916145] Memory state around the buggy address:
[   25.916627]  fff00000c4205480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.917514]  fff00000c4205500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.918229] >fff00000c4205580: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   25.919036]                                      ^
[   25.919568]  fff00000c4205600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.920361]  fff00000c4205680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.921109] ==================================================================
[   26.514701] ==================================================================
[   26.516182] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x10d8/0x49c8
[   26.516932] Write of size 8 at addr fff00000c42055b0 by task kunit_try_catch/253
[   26.517695] 
[   26.518262] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G    B            N 6.12.33-rc1 #1
[   26.518525] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.518637] Hardware name: linux,dummy-virt (DT)
[   26.518729] Call trace:
[   26.518802]  dump_backtrace+0x9c/0x128
[   26.518941]  show_stack+0x20/0x38
[   26.519089]  dump_stack_lvl+0x8c/0xd0
[   26.519197]  print_report+0x118/0x5f0
[   26.519253]  kasan_report+0xdc/0x128
[   26.519300]  kasan_check_range+0x100/0x1a8
[   26.519350]  __kasan_check_write+0x20/0x30
[   26.519401]  kasan_atomics_helper+0x10d8/0x49c8
[   26.519455]  kasan_atomics+0x1a0/0x2e8
[   26.519505]  kunit_try_run_case+0x170/0x3f0
[   26.519554]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.519609]  kthread+0x24c/0x2d0
[   26.519660]  ret_from_fork+0x10/0x20
[   26.519711] 
[   26.526884] Allocated by task 253:
[   26.527519]  kasan_save_stack+0x3c/0x68
[   26.528097]  kasan_save_track+0x20/0x40
[   26.528644]  kasan_save_alloc_info+0x40/0x58
[   26.529320]  __kasan_kmalloc+0xd4/0xd8
[   26.529765]  __kmalloc_cache_noprof+0x154/0x320
[   26.530565]  kasan_atomics+0xb8/0x2e8
[   26.531044]  kunit_try_run_case+0x170/0x3f0
[   26.531728]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.532462]  kthread+0x24c/0x2d0
[   26.533037]  ret_from_fork+0x10/0x20
[   26.533589] 
[   26.534017] The buggy address belongs to the object at fff00000c4205580
[   26.534017]  which belongs to the cache kmalloc-64 of size 64
[   26.535158] The buggy address is located 0 bytes to the right of
[   26.535158]  allocated 48-byte region [fff00000c4205580, fff00000c42055b0)
[   26.536438] 
[   26.536799] The buggy address belongs to the physical page:
[   26.537479] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104205
[   26.538390] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   26.539041] page_type: f5(slab)
[   26.539440] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   26.540561] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   26.541533] page dumped because: kasan: bad access detected
[   26.542149] 
[   26.542690] Memory state around the buggy address:
[   26.543589]  fff00000c4205480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.544452]  fff00000c4205500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.545287] >fff00000c4205580: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   26.546142]                                      ^
[   26.546848]  fff00000c4205600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.547593]  fff00000c4205680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.548491] ==================================================================
[   26.619144] ==================================================================
[   26.619714] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x121c/0x49c8
[   26.620854] Write of size 8 at addr fff00000c42055b0 by task kunit_try_catch/253
[   26.622425] 
[   26.623059] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G    B            N 6.12.33-rc1 #1
[   26.623281] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.623366] Hardware name: linux,dummy-virt (DT)
[   26.623447] Call trace:
[   26.623516]  dump_backtrace+0x9c/0x128
[   26.623630]  show_stack+0x20/0x38
[   26.623734]  dump_stack_lvl+0x8c/0xd0
[   26.623856]  print_report+0x118/0x5f0
[   26.624066]  kasan_report+0xdc/0x128
[   26.624172]  kasan_check_range+0x100/0x1a8
[   26.624227]  __kasan_check_write+0x20/0x30
[   26.624278]  kasan_atomics_helper+0x121c/0x49c8
[   26.624335]  kasan_atomics+0x1a0/0x2e8
[   26.624386]  kunit_try_run_case+0x170/0x3f0
[   26.624435]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.624491]  kthread+0x24c/0x2d0
[   26.624541]  ret_from_fork+0x10/0x20
[   26.624591] 
[   26.632326] Allocated by task 253:
[   26.632947]  kasan_save_stack+0x3c/0x68
[   26.633614]  kasan_save_track+0x20/0x40
[   26.634079]  kasan_save_alloc_info+0x40/0x58
[   26.634828]  __kasan_kmalloc+0xd4/0xd8
[   26.635504]  __kmalloc_cache_noprof+0x154/0x320
[   26.636217]  kasan_atomics+0xb8/0x2e8
[   26.636812]  kunit_try_run_case+0x170/0x3f0
[   26.637496]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.638090]  kthread+0x24c/0x2d0
[   26.638499]  ret_from_fork+0x10/0x20
[   26.638938] 
[   26.639679] The buggy address belongs to the object at fff00000c4205580
[   26.639679]  which belongs to the cache kmalloc-64 of size 64
[   26.640755] The buggy address is located 0 bytes to the right of
[   26.640755]  allocated 48-byte region [fff00000c4205580, fff00000c42055b0)
[   26.642064] 
[   26.642383] The buggy address belongs to the physical page:
[   26.643032] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104205
[   26.643810] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   26.644576] page_type: f5(slab)
[   26.645158] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   26.645988] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   26.646755] page dumped because: kasan: bad access detected
[   26.647354] 
[   26.647691] Memory state around the buggy address:
[   26.648250]  fff00000c4205480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.649011]  fff00000c4205500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.649835] >fff00000c4205580: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   26.650500]                                      ^
[   26.650988]  fff00000c4205600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.651541]  fff00000c4205680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.652098] ==================================================================
[   26.099305] ==================================================================
[   26.100042] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xd00/0x49c8
[   26.100740] Write of size 4 at addr fff00000c42055b0 by task kunit_try_catch/253
[   26.101469] 
[   26.102032] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G    B            N 6.12.33-rc1 #1
[   26.102275] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.102359] Hardware name: linux,dummy-virt (DT)
[   26.102452] Call trace:
[   26.102580]  dump_backtrace+0x9c/0x128
[   26.102736]  show_stack+0x20/0x38
[   26.102805]  dump_stack_lvl+0x8c/0xd0
[   26.102855]  print_report+0x118/0x5f0
[   26.102900]  kasan_report+0xdc/0x128
[   26.102946]  kasan_check_range+0x100/0x1a8
[   26.103030]  __kasan_check_write+0x20/0x30
[   26.103085]  kasan_atomics_helper+0xd00/0x49c8
[   26.103139]  kasan_atomics+0x1a0/0x2e8
[   26.103187]  kunit_try_run_case+0x170/0x3f0
[   26.103234]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.103290]  kthread+0x24c/0x2d0
[   26.103338]  ret_from_fork+0x10/0x20
[   26.103388] 
[   26.111312] Allocated by task 253:
[   26.111850]  kasan_save_stack+0x3c/0x68
[   26.112514]  kasan_save_track+0x20/0x40
[   26.113159]  kasan_save_alloc_info+0x40/0x58
[   26.113921]  __kasan_kmalloc+0xd4/0xd8
[   26.114579]  __kmalloc_cache_noprof+0x154/0x320
[   26.115396]  kasan_atomics+0xb8/0x2e8
[   26.115945]  kunit_try_run_case+0x170/0x3f0
[   26.116418]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.117057]  kthread+0x24c/0x2d0
[   26.117627]  ret_from_fork+0x10/0x20
[   26.118139] 
[   26.118660] The buggy address belongs to the object at fff00000c4205580
[   26.118660]  which belongs to the cache kmalloc-64 of size 64
[   26.119909] The buggy address is located 0 bytes to the right of
[   26.119909]  allocated 48-byte region [fff00000c4205580, fff00000c42055b0)
[   26.121367] 
[   26.121736] The buggy address belongs to the physical page:
[   26.122480] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104205
[   26.123436] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   26.124271] page_type: f5(slab)
[   26.124793] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   26.125682] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   26.126522] page dumped because: kasan: bad access detected
[   26.127225] 
[   26.127570] Memory state around the buggy address:
[   26.128313]  fff00000c4205480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.129135]  fff00000c4205500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.130005] >fff00000c4205580: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   26.130792]                                      ^
[   26.131444]  fff00000c4205600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.132278]  fff00000c4205680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.133109] ==================================================================
[   26.889659] ==================================================================
[   26.890422] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1584/0x49c8
[   26.891182] Write of size 8 at addr fff00000c42055b0 by task kunit_try_catch/253
[   26.892124] 
[   26.892512] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G    B            N 6.12.33-rc1 #1
[   26.892719] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.892851] Hardware name: linux,dummy-virt (DT)
[   26.892943] Call trace:
[   26.893069]  dump_backtrace+0x9c/0x128
[   26.893197]  show_stack+0x20/0x38
[   26.893317]  dump_stack_lvl+0x8c/0xd0
[   26.893419]  print_report+0x118/0x5f0
[   26.893473]  kasan_report+0xdc/0x128
[   26.893523]  kasan_check_range+0x100/0x1a8
[   26.893577]  __kasan_check_write+0x20/0x30
[   26.893628]  kasan_atomics_helper+0x1584/0x49c8
[   26.893683]  kasan_atomics+0x1a0/0x2e8
[   26.893735]  kunit_try_run_case+0x170/0x3f0
[   26.893784]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.893841]  kthread+0x24c/0x2d0
[   26.893892]  ret_from_fork+0x10/0x20
[   26.893940] 
[   26.901219] Allocated by task 253:
[   26.901675]  kasan_save_stack+0x3c/0x68
[   26.902435]  kasan_save_track+0x20/0x40
[   26.903112]  kasan_save_alloc_info+0x40/0x58
[   26.903756]  __kasan_kmalloc+0xd4/0xd8
[   26.904404]  __kmalloc_cache_noprof+0x154/0x320
[   26.905017]  kasan_atomics+0xb8/0x2e8
[   26.905619]  kunit_try_run_case+0x170/0x3f0
[   26.906227]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.906980]  kthread+0x24c/0x2d0
[   26.907482]  ret_from_fork+0x10/0x20
[   26.908011] 
[   26.908345] The buggy address belongs to the object at fff00000c4205580
[   26.908345]  which belongs to the cache kmalloc-64 of size 64
[   26.909604] The buggy address is located 0 bytes to the right of
[   26.909604]  allocated 48-byte region [fff00000c4205580, fff00000c42055b0)
[   26.910780] 
[   26.911117] The buggy address belongs to the physical page:
[   26.911702] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104205
[   26.912539] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   26.913378] page_type: f5(slab)
[   26.913982] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   26.914811] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   26.915659] page dumped because: kasan: bad access detected
[   26.916244] 
[   26.916602] Memory state around the buggy address:
[   26.917220]  fff00000c4205480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.918008]  fff00000c4205500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.918729] >fff00000c4205580: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   26.919635]                                      ^
[   26.920335]  fff00000c4205600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.921237]  fff00000c4205680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.922030] ==================================================================
[   27.170141] ==================================================================
[   27.170681] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1810/0x49c8
[   27.171614] Write of size 8 at addr fff00000c42055b0 by task kunit_try_catch/253
[   27.172374] 
[   27.172703] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G    B            N 6.12.33-rc1 #1
[   27.172885] Tainted: [B]=BAD_PAGE, [N]=TEST
[   27.172978] Hardware name: linux,dummy-virt (DT)
[   27.173058] Call trace:
[   27.173111]  dump_backtrace+0x9c/0x128
[   27.173214]  show_stack+0x20/0x38
[   27.173306]  dump_stack_lvl+0x8c/0xd0
[   27.173406]  print_report+0x118/0x5f0
[   27.173516]  kasan_report+0xdc/0x128
[   27.173638]  kasan_check_range+0x100/0x1a8
[   27.173754]  __kasan_check_write+0x20/0x30
[   27.173877]  kasan_atomics_helper+0x1810/0x49c8
[   27.174025]  kasan_atomics+0x1a0/0x2e8
[   27.174152]  kunit_try_run_case+0x170/0x3f0
[   27.174282]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   27.174423]  kthread+0x24c/0x2d0
[   27.174548]  ret_from_fork+0x10/0x20
[   27.174670] 
[   27.181251] Allocated by task 253:
[   27.181775]  kasan_save_stack+0x3c/0x68
[   27.182332]  kasan_save_track+0x20/0x40
[   27.182873]  kasan_save_alloc_info+0x40/0x58
[   27.183523]  __kasan_kmalloc+0xd4/0xd8
[   27.184037]  __kmalloc_cache_noprof+0x154/0x320
[   27.184543]  kasan_atomics+0xb8/0x2e8
[   27.185113]  kunit_try_run_case+0x170/0x3f0
[   27.185656]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   27.186352]  kthread+0x24c/0x2d0
[   27.186760]  ret_from_fork+0x10/0x20
[   27.187320] 
[   27.187656] The buggy address belongs to the object at fff00000c4205580
[   27.187656]  which belongs to the cache kmalloc-64 of size 64
[   27.188745] The buggy address is located 0 bytes to the right of
[   27.188745]  allocated 48-byte region [fff00000c4205580, fff00000c42055b0)
[   27.190002] 
[   27.190336] The buggy address belongs to the physical page:
[   27.191084] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104205
[   27.191894] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   27.192707] page_type: f5(slab)
[   27.193241] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   27.193916] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   27.194748] page dumped because: kasan: bad access detected
[   27.195419] 
[   27.195752] Memory state around the buggy address:
[   27.196276]  fff00000c4205480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.197163]  fff00000c4205500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.197930] >fff00000c4205580: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   27.198631]                                      ^
[   27.199400]  fff00000c4205600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.199916]  fff00000c4205680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.200802] ==================================================================

[   22.107158] ==================================================================
[   22.107900] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b56/0x5450
[   22.108711] Read of size 4 at addr ffff888102314eb0 by task kunit_try_catch/270
[   22.109336] 
[   22.109618] CPU: 1 UID: 0 PID: 270 Comm: kunit_try_catch Tainted: G    B            N 6.12.33-rc1 #1
[   22.109736] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.109776] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   22.109908] Call Trace:
[   22.109964]  <TASK>
[   22.110026]  dump_stack_lvl+0x73/0xb0
[   22.110107]  print_report+0xd1/0x640
[   22.110188]  ? __virt_addr_valid+0x1db/0x2d0
[   22.110285]  ? kasan_atomics_helper+0x4b56/0x5450
[   22.110361]  ? kasan_complete_mode_report_info+0x2a/0x200
[   22.110462]  ? kasan_atomics_helper+0x4b56/0x5450
[   22.110608]  kasan_report+0x140/0x180
[   22.110693]  ? kasan_atomics_helper+0x4b56/0x5450
[   22.110788]  __asan_report_load4_noabort+0x18/0x20
[   22.111009]  kasan_atomics_helper+0x4b56/0x5450
[   22.111050]  ? kasan_save_alloc_info+0x3b/0x50
[   22.111083]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   22.111118]  ? __kmalloc_cache_noprof+0x168/0x350
[   22.111149]  ? trace_hardirqs_on+0x37/0xe0
[   22.111187]  kasan_atomics+0x1dd/0x310
[   22.111214]  ? __pfx_kasan_atomics+0x10/0x10
[   22.111292]  ? __pfx_read_tsc+0x10/0x10
[   22.111321]  ? ktime_get_ts64+0x84/0x230
[   22.111358]  kunit_try_run_case+0x1a6/0x480
[   22.111390]  ? __pfx_kunit_try_run_case+0x10/0x10
[   22.111418]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   22.111447]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   22.111482]  ? __kthread_parkme+0x82/0x160
[   22.111509]  ? preempt_count_sub+0x50/0x80
[   22.111540]  ? __pfx_kunit_try_run_case+0x10/0x10
[   22.111567]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   22.111604]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   22.111640]  kthread+0x257/0x310
[   22.111664]  ? __pfx_kthread+0x10/0x10
[   22.111690]  ret_from_fork+0x41/0x80
[   22.111717]  ? __pfx_kthread+0x10/0x10
[   22.111742]  ret_from_fork_asm+0x1a/0x30
[   22.111782]  </TASK>
[   22.111795] 
[   22.129119] Allocated by task 270:
[   22.129566]  kasan_save_stack+0x45/0x70
[   22.129940]  kasan_save_track+0x18/0x40
[   22.130447]  kasan_save_alloc_info+0x3b/0x50
[   22.130955]  __kasan_kmalloc+0xb7/0xc0
[   22.131298]  __kmalloc_cache_noprof+0x168/0x350
[   22.131747]  kasan_atomics+0x96/0x310
[   22.132254]  kunit_try_run_case+0x1a6/0x480
[   22.132670]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   22.133097]  kthread+0x257/0x310
[   22.133581]  ret_from_fork+0x41/0x80
[   22.134094]  ret_from_fork_asm+0x1a/0x30
[   22.134436] 
[   22.134649] The buggy address belongs to the object at ffff888102314e80
[   22.134649]  which belongs to the cache kmalloc-64 of size 64
[   22.135691] The buggy address is located 0 bytes to the right of
[   22.135691]  allocated 48-byte region [ffff888102314e80, ffff888102314eb0)
[   22.136679] 
[   22.136870] The buggy address belongs to the physical page:
[   22.137243] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102314
[   22.137934] flags: 0x200000000000000(node=0|zone=2)
[   22.138494] page_type: f5(slab)
[   22.138866] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   22.139318] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   22.142407] page dumped because: kasan: bad access detected
[   22.142755] 
[   22.143732] Memory state around the buggy address:
[   22.144558]  ffff888102314d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.145101]  ffff888102314e00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.145478] >ffff888102314e80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   22.145822]                                      ^
[   22.146130]  ffff888102314f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.148847]  ffff888102314f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.149493] ==================================================================
[   22.404680] ==================================================================
[   22.406051] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x7c8/0x5450
[   22.408267] Write of size 4 at addr ffff888102314eb0 by task kunit_try_catch/270
[   22.408760] 
[   22.408980] CPU: 1 UID: 0 PID: 270 Comm: kunit_try_catch Tainted: G    B            N 6.12.33-rc1 #1
[   22.409095] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.409129] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   22.409182] Call Trace:
[   22.409246]  <TASK>
[   22.409298]  dump_stack_lvl+0x73/0xb0
[   22.409390]  print_report+0xd1/0x640
[   22.409473]  ? __virt_addr_valid+0x1db/0x2d0
[   22.409549]  ? kasan_atomics_helper+0x7c8/0x5450
[   22.409620]  ? kasan_complete_mode_report_info+0x2a/0x200
[   22.409693]  ? kasan_atomics_helper+0x7c8/0x5450
[   22.409774]  kasan_report+0x140/0x180
[   22.409862]  ? kasan_atomics_helper+0x7c8/0x5450
[   22.409953]  kasan_check_range+0x10c/0x1c0
[   22.410039]  __kasan_check_write+0x18/0x20
[   22.410117]  kasan_atomics_helper+0x7c8/0x5450
[   22.410198]  ? kasan_save_alloc_info+0x3b/0x50
[   22.410439]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   22.410533]  ? __kmalloc_cache_noprof+0x168/0x350
[   22.410587]  ? trace_hardirqs_on+0x37/0xe0
[   22.410655]  kasan_atomics+0x1dd/0x310
[   22.410706]  ? __pfx_kasan_atomics+0x10/0x10
[   22.410761]  ? __pfx_read_tsc+0x10/0x10
[   22.410808]  ? ktime_get_ts64+0x84/0x230
[   22.410886]  kunit_try_run_case+0x1a6/0x480
[   22.410944]  ? __pfx_kunit_try_run_case+0x10/0x10
[   22.410993]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   22.411047]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   22.411107]  ? __kthread_parkme+0x82/0x160
[   22.411156]  ? preempt_count_sub+0x50/0x80
[   22.411214]  ? __pfx_kunit_try_run_case+0x10/0x10
[   22.411296]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   22.411360]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   22.411422]  kthread+0x257/0x310
[   22.411468]  ? __pfx_kthread+0x10/0x10
[   22.411518]  ret_from_fork+0x41/0x80
[   22.411583]  ? __pfx_kthread+0x10/0x10
[   22.411647]  ret_from_fork_asm+0x1a/0x30
[   22.411739]  </TASK>
[   22.411772] 
[   22.434008] Allocated by task 270:
[   22.434253]  kasan_save_stack+0x45/0x70
[   22.434446]  kasan_save_track+0x18/0x40
[   22.434607]  kasan_save_alloc_info+0x3b/0x50
[   22.434775]  __kasan_kmalloc+0xb7/0xc0
[   22.435172]  __kmalloc_cache_noprof+0x168/0x350
[   22.436065]  kasan_atomics+0x96/0x310
[   22.436406]  kunit_try_run_case+0x1a6/0x480
[   22.436779]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   22.437435]  kthread+0x257/0x310
[   22.437809]  ret_from_fork+0x41/0x80
[   22.438151]  ret_from_fork_asm+0x1a/0x30
[   22.438536] 
[   22.438890] The buggy address belongs to the object at ffff888102314e80
[   22.438890]  which belongs to the cache kmalloc-64 of size 64
[   22.439907] The buggy address is located 0 bytes to the right of
[   22.439907]  allocated 48-byte region [ffff888102314e80, ffff888102314eb0)
[   22.441106] 
[   22.441356] The buggy address belongs to the physical page:
[   22.441862] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102314
[   22.442778] flags: 0x200000000000000(node=0|zone=2)
[   22.443496] page_type: f5(slab)
[   22.443844] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   22.444432] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   22.445071] page dumped because: kasan: bad access detected
[   22.445659] 
[   22.445998] Memory state around the buggy address:
[   22.446437]  ffff888102314d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.447113]  ffff888102314e00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.447902] >ffff888102314e80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   22.448520]                                      ^
[   22.449023]  ffff888102314f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.449679]  ffff888102314f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.450496] ==================================================================
[   22.579273] ==================================================================
[   22.580085] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa2c/0x5450
[   22.580594] Write of size 4 at addr ffff888102314eb0 by task kunit_try_catch/270
[   22.581173] 
[   22.581472] CPU: 1 UID: 0 PID: 270 Comm: kunit_try_catch Tainted: G    B            N 6.12.33-rc1 #1
[   22.581593] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.581635] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   22.581699] Call Trace:
[   22.581754]  <TASK>
[   22.581810]  dump_stack_lvl+0x73/0xb0
[   22.581937]  print_report+0xd1/0x640
[   22.582019]  ? __virt_addr_valid+0x1db/0x2d0
[   22.582099]  ? kasan_atomics_helper+0xa2c/0x5450
[   22.582177]  ? kasan_complete_mode_report_info+0x2a/0x200
[   22.582273]  ? kasan_atomics_helper+0xa2c/0x5450
[   22.582352]  kasan_report+0x140/0x180
[   22.582414]  ? kasan_atomics_helper+0xa2c/0x5450
[   22.582501]  kasan_check_range+0x10c/0x1c0
[   22.582577]  __kasan_check_write+0x18/0x20
[   22.582704]  kasan_atomics_helper+0xa2c/0x5450
[   22.582786]  ? kasan_save_alloc_info+0x3b/0x50
[   22.582906]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   22.582992]  ? __kmalloc_cache_noprof+0x168/0x350
[   22.583073]  ? trace_hardirqs_on+0x37/0xe0
[   22.583168]  kasan_atomics+0x1dd/0x310
[   22.583279]  ? __pfx_kasan_atomics+0x10/0x10
[   22.583362]  ? __pfx_read_tsc+0x10/0x10
[   22.583430]  ? ktime_get_ts64+0x84/0x230
[   22.583517]  kunit_try_run_case+0x1a6/0x480
[   22.583606]  ? __pfx_kunit_try_run_case+0x10/0x10
[   22.583689]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   22.583769]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   22.583873]  ? __kthread_parkme+0x82/0x160
[   22.583953]  ? preempt_count_sub+0x50/0x80
[   22.584041]  ? __pfx_kunit_try_run_case+0x10/0x10
[   22.584115]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   22.584201]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   22.584346]  kthread+0x257/0x310
[   22.584420]  ? __pfx_kthread+0x10/0x10
[   22.584492]  ret_from_fork+0x41/0x80
[   22.584563]  ? __pfx_kthread+0x10/0x10
[   22.584633]  ret_from_fork_asm+0x1a/0x30
[   22.584699]  </TASK>
[   22.584717] 
[   22.598097] Allocated by task 270:
[   22.598449]  kasan_save_stack+0x45/0x70
[   22.598785]  kasan_save_track+0x18/0x40
[   22.599245]  kasan_save_alloc_info+0x3b/0x50
[   22.599732]  __kasan_kmalloc+0xb7/0xc0
[   22.600151]  __kmalloc_cache_noprof+0x168/0x350
[   22.600632]  kasan_atomics+0x96/0x310
[   22.601190]  kunit_try_run_case+0x1a6/0x480
[   22.601640]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   22.602189]  kthread+0x257/0x310
[   22.602546]  ret_from_fork+0x41/0x80
[   22.602979]  ret_from_fork_asm+0x1a/0x30
[   22.603405] 
[   22.603613] The buggy address belongs to the object at ffff888102314e80
[   22.603613]  which belongs to the cache kmalloc-64 of size 64
[   22.604400] The buggy address is located 0 bytes to the right of
[   22.604400]  allocated 48-byte region [ffff888102314e80, ffff888102314eb0)
[   22.605102] 
[   22.605318] The buggy address belongs to the physical page:
[   22.605846] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102314
[   22.606833] flags: 0x200000000000000(node=0|zone=2)
[   22.607388] page_type: f5(slab)
[   22.607787] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   22.608392] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   22.609065] page dumped because: kasan: bad access detected
[   22.609533] 
[   22.609723] Memory state around the buggy address:
[   22.610063]  ffff888102314d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.610523]  ffff888102314e00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.611625] >ffff888102314e80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   22.612208]                                      ^
[   22.612696]  ffff888102314f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.613367]  ffff888102314f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.613917] ==================================================================
[   21.938646] ==================================================================
[   21.939366] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4ba4/0x5450
[   21.940499] Write of size 4 at addr ffff888102314eb0 by task kunit_try_catch/270
[   21.941499] 
[   21.941682] CPU: 1 UID: 0 PID: 270 Comm: kunit_try_catch Tainted: G    B            N 6.12.33-rc1 #1
[   21.941744] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.941761] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   21.941791] Call Trace:
[   21.941809]  <TASK>
[   21.941853]  dump_stack_lvl+0x73/0xb0
[   21.941913]  print_report+0xd1/0x640
[   21.941950]  ? __virt_addr_valid+0x1db/0x2d0
[   21.941986]  ? kasan_atomics_helper+0x4ba4/0x5450
[   21.942019]  ? kasan_complete_mode_report_info+0x2a/0x200
[   21.942052]  ? kasan_atomics_helper+0x4ba4/0x5450
[   21.942085]  kasan_report+0x140/0x180
[   21.942121]  ? kasan_atomics_helper+0x4ba4/0x5450
[   21.942163]  __asan_report_store4_noabort+0x1b/0x30
[   21.942195]  kasan_atomics_helper+0x4ba4/0x5450
[   21.942265]  ? kasan_save_alloc_info+0x3b/0x50
[   21.942358]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   21.942450]  ? __kmalloc_cache_noprof+0x168/0x350
[   21.942535]  ? trace_hardirqs_on+0x37/0xe0
[   21.942589]  kasan_atomics+0x1dd/0x310
[   21.942620]  ? __pfx_kasan_atomics+0x10/0x10
[   21.942653]  ? __pfx_read_tsc+0x10/0x10
[   21.942681]  ? ktime_get_ts64+0x84/0x230
[   21.942758]  kunit_try_run_case+0x1a6/0x480
[   21.942797]  ? __pfx_kunit_try_run_case+0x10/0x10
[   21.942846]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   21.942889]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   21.942926]  ? __kthread_parkme+0x82/0x160
[   21.942954]  ? preempt_count_sub+0x50/0x80
[   21.942984]  ? __pfx_kunit_try_run_case+0x10/0x10
[   21.943012]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   21.943049]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   21.943086]  kthread+0x257/0x310
[   21.943111]  ? __pfx_kthread+0x10/0x10
[   21.943139]  ret_from_fork+0x41/0x80
[   21.943167]  ? __pfx_kthread+0x10/0x10
[   21.943192]  ret_from_fork_asm+0x1a/0x30
[   21.943261]  </TASK>
[   21.943283] 
[   21.959493] Allocated by task 270:
[   21.959895]  kasan_save_stack+0x45/0x70
[   21.960354]  kasan_save_track+0x18/0x40
[   21.961029]  kasan_save_alloc_info+0x3b/0x50
[   21.961481]  __kasan_kmalloc+0xb7/0xc0
[   21.961922]  __kmalloc_cache_noprof+0x168/0x350
[   21.962334]  kasan_atomics+0x96/0x310
[   21.962626]  kunit_try_run_case+0x1a6/0x480
[   21.963069]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   21.963779]  kthread+0x257/0x310
[   21.964400]  ret_from_fork+0x41/0x80
[   21.965077]  ret_from_fork_asm+0x1a/0x30
[   21.965522] 
[   21.965904] The buggy address belongs to the object at ffff888102314e80
[   21.965904]  which belongs to the cache kmalloc-64 of size 64
[   21.967081] The buggy address is located 0 bytes to the right of
[   21.967081]  allocated 48-byte region [ffff888102314e80, ffff888102314eb0)
[   21.968200] 
[   21.968539] The buggy address belongs to the physical page:
[   21.969192] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102314
[   21.969952] flags: 0x200000000000000(node=0|zone=2)
[   21.970334] page_type: f5(slab)
[   21.970620] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   21.971374] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   21.972104] page dumped because: kasan: bad access detected
[   21.972644] 
[   21.972915] Memory state around the buggy address:
[   21.973423]  ffff888102314d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.974192]  ffff888102314e00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.974937] >ffff888102314e80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   21.975498]                                      ^
[   21.976241]  ffff888102314f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.976932]  ffff888102314f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.977537] ==================================================================
[   21.981106] ==================================================================
[   21.981784] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b8a/0x5450
[   21.982592] Read of size 4 at addr ffff888102314eb0 by task kunit_try_catch/270
[   21.983269] 
[   21.983596] CPU: 1 UID: 0 PID: 270 Comm: kunit_try_catch Tainted: G    B            N 6.12.33-rc1 #1
[   21.983766] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.983804] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   21.983947] Call Trace:
[   21.984028]  <TASK>
[   21.984084]  dump_stack_lvl+0x73/0xb0
[   21.984165]  print_report+0xd1/0x640
[   21.984284]  ? __virt_addr_valid+0x1db/0x2d0
[   21.984364]  ? kasan_atomics_helper+0x4b8a/0x5450
[   21.984437]  ? kasan_complete_mode_report_info+0x2a/0x200
[   21.984509]  ? kasan_atomics_helper+0x4b8a/0x5450
[   21.984559]  kasan_report+0x140/0x180
[   21.984595]  ? kasan_atomics_helper+0x4b8a/0x5450
[   21.984636]  __asan_report_load4_noabort+0x18/0x20
[   21.984666]  kasan_atomics_helper+0x4b8a/0x5450
[   21.984699]  ? kasan_save_alloc_info+0x3b/0x50
[   21.984727]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   21.984762]  ? __kmalloc_cache_noprof+0x168/0x350
[   21.984793]  ? trace_hardirqs_on+0x37/0xe0
[   21.984873]  kasan_atomics+0x1dd/0x310
[   21.984904]  ? __pfx_kasan_atomics+0x10/0x10
[   21.984934]  ? __pfx_read_tsc+0x10/0x10
[   21.984960]  ? ktime_get_ts64+0x84/0x230
[   21.984995]  kunit_try_run_case+0x1a6/0x480
[   21.985026]  ? __pfx_kunit_try_run_case+0x10/0x10
[   21.985054]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   21.985082]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   21.985118]  ? __kthread_parkme+0x82/0x160
[   21.985144]  ? preempt_count_sub+0x50/0x80
[   21.985174]  ? __pfx_kunit_try_run_case+0x10/0x10
[   21.985201]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   21.985264]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   21.985303]  kthread+0x257/0x310
[   21.985329]  ? __pfx_kthread+0x10/0x10
[   21.985355]  ret_from_fork+0x41/0x80
[   21.985384]  ? __pfx_kthread+0x10/0x10
[   21.985408]  ret_from_fork_asm+0x1a/0x30
[   21.985451]  </TASK>
[   21.985465] 
[   22.000982] Allocated by task 270:
[   22.001434]  kasan_save_stack+0x45/0x70
[   22.002003]  kasan_save_track+0x18/0x40
[   22.002475]  kasan_save_alloc_info+0x3b/0x50
[   22.002985]  __kasan_kmalloc+0xb7/0xc0
[   22.003465]  __kmalloc_cache_noprof+0x168/0x350
[   22.003929]  kasan_atomics+0x96/0x310
[   22.004428]  kunit_try_run_case+0x1a6/0x480
[   22.004815]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   22.005457]  kthread+0x257/0x310
[   22.005857]  ret_from_fork+0x41/0x80
[   22.006316]  ret_from_fork_asm+0x1a/0x30
[   22.006745] 
[   22.007059] The buggy address belongs to the object at ffff888102314e80
[   22.007059]  which belongs to the cache kmalloc-64 of size 64
[   22.008185] The buggy address is located 0 bytes to the right of
[   22.008185]  allocated 48-byte region [ffff888102314e80, ffff888102314eb0)
[   22.009260] 
[   22.009599] The buggy address belongs to the physical page:
[   22.010215] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102314
[   22.010978] flags: 0x200000000000000(node=0|zone=2)
[   22.011630] page_type: f5(slab)
[   22.012086] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   22.012733] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   22.013456] page dumped because: kasan: bad access detected
[   22.013990] 
[   22.014340] Memory state around the buggy address:
[   22.014808]  ffff888102314d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.015595]  ffff888102314e00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.016435] >ffff888102314e80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   22.016909]                                      ^
[   22.018300]  ffff888102314f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.018783]  ffff888102314f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.019295] ==================================================================
[   22.151772] ==================================================================
[   22.152816] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a1/0x5450
[   22.155552] Write of size 4 at addr ffff888102314eb0 by task kunit_try_catch/270
[   22.157452] 
[   22.157894] CPU: 1 UID: 0 PID: 270 Comm: kunit_try_catch Tainted: G    B            N 6.12.33-rc1 #1
[   22.158154] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.158193] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   22.158280] Call Trace:
[   22.158335]  <TASK>
[   22.158389]  dump_stack_lvl+0x73/0xb0
[   22.158465]  print_report+0xd1/0x640
[   22.158503]  ? __virt_addr_valid+0x1db/0x2d0
[   22.158540]  ? kasan_atomics_helper+0x4a1/0x5450
[   22.158575]  ? kasan_complete_mode_report_info+0x2a/0x200
[   22.158608]  ? kasan_atomics_helper+0x4a1/0x5450
[   22.158641]  kasan_report+0x140/0x180
[   22.158675]  ? kasan_atomics_helper+0x4a1/0x5450
[   22.158715]  kasan_check_range+0x10c/0x1c0
[   22.158745]  __kasan_check_write+0x18/0x20
[   22.158774]  kasan_atomics_helper+0x4a1/0x5450
[   22.158807]  ? kasan_save_alloc_info+0x3b/0x50
[   22.158886]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   22.158925]  ? __kmalloc_cache_noprof+0x168/0x350
[   22.158958]  ? trace_hardirqs_on+0x37/0xe0
[   22.158998]  kasan_atomics+0x1dd/0x310
[   22.159027]  ? __pfx_kasan_atomics+0x10/0x10
[   22.159057]  ? __pfx_read_tsc+0x10/0x10
[   22.159085]  ? ktime_get_ts64+0x84/0x230
[   22.159120]  kunit_try_run_case+0x1a6/0x480
[   22.159153]  ? __pfx_kunit_try_run_case+0x10/0x10
[   22.159181]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   22.159210]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   22.159294]  ? __kthread_parkme+0x82/0x160
[   22.159325]  ? preempt_count_sub+0x50/0x80
[   22.159357]  ? __pfx_kunit_try_run_case+0x10/0x10
[   22.159384]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   22.159421]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   22.159459]  kthread+0x257/0x310
[   22.159485]  ? __pfx_kthread+0x10/0x10
[   22.159510]  ret_from_fork+0x41/0x80
[   22.159541]  ? __pfx_kthread+0x10/0x10
[   22.159568]  ret_from_fork_asm+0x1a/0x30
[   22.159612]  </TASK>
[   22.159625] 
[   22.176976] Allocated by task 270:
[   22.177561]  kasan_save_stack+0x45/0x70
[   22.178199]  kasan_save_track+0x18/0x40
[   22.178678]  kasan_save_alloc_info+0x3b/0x50
[   22.179168]  __kasan_kmalloc+0xb7/0xc0
[   22.179857]  __kmalloc_cache_noprof+0x168/0x350
[   22.180355]  kasan_atomics+0x96/0x310
[   22.180789]  kunit_try_run_case+0x1a6/0x480
[   22.181358]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   22.181924]  kthread+0x257/0x310
[   22.182332]  ret_from_fork+0x41/0x80
[   22.182769]  ret_from_fork_asm+0x1a/0x30
[   22.183329] 
[   22.183644] The buggy address belongs to the object at ffff888102314e80
[   22.183644]  which belongs to the cache kmalloc-64 of size 64
[   22.184592] The buggy address is located 0 bytes to the right of
[   22.184592]  allocated 48-byte region [ffff888102314e80, ffff888102314eb0)
[   22.185587] 
[   22.185913] The buggy address belongs to the physical page:
[   22.186465] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102314
[   22.187292] flags: 0x200000000000000(node=0|zone=2)
[   22.187826] page_type: f5(slab)
[   22.188293] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   22.189115] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   22.189613] page dumped because: kasan: bad access detected
[   22.190266] 
[   22.190578] Memory state around the buggy address:
[   22.191107]  ffff888102314d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.191830]  ffff888102314e00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.192547] >ffff888102314e80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   22.193090]                                      ^
[   22.193646]  ffff888102314f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.194407]  ffff888102314f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.195140] ==================================================================
[   23.005079] ==================================================================
[   23.006650] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a38/0x5450
[   23.007343] Read of size 4 at addr ffff888102314eb0 by task kunit_try_catch/270
[   23.008011] 
[   23.008325] CPU: 1 UID: 0 PID: 270 Comm: kunit_try_catch Tainted: G    B            N 6.12.33-rc1 #1
[   23.008447] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.008488] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   23.008551] Call Trace:
[   23.008641]  <TASK>
[   23.008701]  dump_stack_lvl+0x73/0xb0
[   23.008788]  print_report+0xd1/0x640
[   23.008905]  ? __virt_addr_valid+0x1db/0x2d0
[   23.008951]  ? kasan_atomics_helper+0x4a38/0x5450
[   23.009021]  ? kasan_complete_mode_report_info+0x2a/0x200
[   23.009102]  ? kasan_atomics_helper+0x4a38/0x5450
[   23.009246]  kasan_report+0x140/0x180
[   23.009336]  ? kasan_atomics_helper+0x4a38/0x5450
[   23.009435]  __asan_report_load4_noabort+0x18/0x20
[   23.009555]  kasan_atomics_helper+0x4a38/0x5450
[   23.009644]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   23.009724]  ? __kmalloc_cache_noprof+0x168/0x350
[   23.009769]  ? trace_hardirqs_on+0x37/0xe0
[   23.009814]  kasan_atomics+0x1dd/0x310
[   23.009889]  ? __pfx_kasan_atomics+0x10/0x10
[   23.009924]  ? __pfx_read_tsc+0x10/0x10
[   23.009953]  ? ktime_get_ts64+0x84/0x230
[   23.009990]  kunit_try_run_case+0x1a6/0x480
[   23.010023]  ? __pfx_kunit_try_run_case+0x10/0x10
[   23.010053]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   23.010084]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   23.010121]  ? __kthread_parkme+0x82/0x160
[   23.010150]  ? preempt_count_sub+0x50/0x80
[   23.010181]  ? __pfx_kunit_try_run_case+0x10/0x10
[   23.010211]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   23.010278]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   23.010319]  kthread+0x257/0x310
[   23.010346]  ? __pfx_kthread+0x10/0x10
[   23.010374]  ret_from_fork+0x41/0x80
[   23.010406]  ? __pfx_kthread+0x10/0x10
[   23.010433]  ret_from_fork_asm+0x1a/0x30
[   23.010478]  </TASK>
[   23.010493] 
[   23.024870] Allocated by task 270:
[   23.025390]  kasan_save_stack+0x45/0x70
[   23.025797]  kasan_save_track+0x18/0x40
[   23.026410]  kasan_save_alloc_info+0x3b/0x50
[   23.026843]  __kasan_kmalloc+0xb7/0xc0
[   23.027246]  __kmalloc_cache_noprof+0x168/0x350
[   23.027715]  kasan_atomics+0x96/0x310
[   23.028156]  kunit_try_run_case+0x1a6/0x480
[   23.028515]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   23.028909]  kthread+0x257/0x310
[   23.029309]  ret_from_fork+0x41/0x80
[   23.029937]  ret_from_fork_asm+0x1a/0x30
[   23.030404] 
[   23.030650] The buggy address belongs to the object at ffff888102314e80
[   23.030650]  which belongs to the cache kmalloc-64 of size 64
[   23.031561] The buggy address is located 0 bytes to the right of
[   23.031561]  allocated 48-byte region [ffff888102314e80, ffff888102314eb0)
[   23.032510] 
[   23.032778] The buggy address belongs to the physical page:
[   23.033458] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102314
[   23.033941] flags: 0x200000000000000(node=0|zone=2)
[   23.034520] page_type: f5(slab)
[   23.034965] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   23.035652] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   23.036561] page dumped because: kasan: bad access detected
[   23.037135] 
[   23.037341] Memory state around the buggy address:
[   23.037675]  ffff888102314d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.038251]  ffff888102314e00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.038883] >ffff888102314e80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   23.039809]                                      ^
[   23.040375]  ffff888102314f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.041029]  ffff888102314f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.041570] ==================================================================
[   23.583743] ==================================================================
[   23.584309] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x15b7/0x5450
[   23.584790] Write of size 8 at addr ffff888102314eb0 by task kunit_try_catch/270
[   23.585570] 
[   23.585898] CPU: 1 UID: 0 PID: 270 Comm: kunit_try_catch Tainted: G    B            N 6.12.33-rc1 #1
[   23.585958] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.585975] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   23.586006] Call Trace:
[   23.586030]  <TASK>
[   23.586052]  dump_stack_lvl+0x73/0xb0
[   23.586090]  print_report+0xd1/0x640
[   23.586125]  ? __virt_addr_valid+0x1db/0x2d0
[   23.586159]  ? kasan_atomics_helper+0x15b7/0x5450
[   23.586193]  ? kasan_complete_mode_report_info+0x2a/0x200
[   23.586253]  ? kasan_atomics_helper+0x15b7/0x5450
[   23.587434]  kasan_report+0x140/0x180
[   23.587531]  ? kasan_atomics_helper+0x15b7/0x5450
[   23.587626]  kasan_check_range+0x10c/0x1c0
[   23.587703]  __kasan_check_write+0x18/0x20
[   23.587775]  kasan_atomics_helper+0x15b7/0x5450
[   23.587861]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   23.587944]  ? __kmalloc_cache_noprof+0x168/0x350
[   23.587999]  ? trace_hardirqs_on+0x37/0xe0
[   23.588044]  kasan_atomics+0x1dd/0x310
[   23.588076]  ? __pfx_kasan_atomics+0x10/0x10
[   23.588107]  ? __pfx_read_tsc+0x10/0x10
[   23.588137]  ? ktime_get_ts64+0x84/0x230
[   23.588173]  kunit_try_run_case+0x1a6/0x480
[   23.588206]  ? __pfx_kunit_try_run_case+0x10/0x10
[   23.588271]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   23.588347]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   23.588447]  ? __kthread_parkme+0x82/0x160
[   23.588550]  ? preempt_count_sub+0x50/0x80
[   23.588637]  ? __pfx_kunit_try_run_case+0x10/0x10
[   23.588705]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   23.588839]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   23.588948]  kthread+0x257/0x310
[   23.589014]  ? __pfx_kthread+0x10/0x10
[   23.589046]  ret_from_fork+0x41/0x80
[   23.589077]  ? __pfx_kthread+0x10/0x10
[   23.589104]  ret_from_fork_asm+0x1a/0x30
[   23.589146]  </TASK>
[   23.589161] 
[   23.602903] Allocated by task 270:
[   23.603367]  kasan_save_stack+0x45/0x70
[   23.603792]  kasan_save_track+0x18/0x40
[   23.604281]  kasan_save_alloc_info+0x3b/0x50
[   23.604771]  __kasan_kmalloc+0xb7/0xc0
[   23.605219]  __kmalloc_cache_noprof+0x168/0x350
[   23.605589]  kasan_atomics+0x96/0x310
[   23.606026]  kunit_try_run_case+0x1a6/0x480
[   23.606496]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   23.607120]  kthread+0x257/0x310
[   23.607436]  ret_from_fork+0x41/0x80
[   23.607734]  ret_from_fork_asm+0x1a/0x30
[   23.608168] 
[   23.608451] The buggy address belongs to the object at ffff888102314e80
[   23.608451]  which belongs to the cache kmalloc-64 of size 64
[   23.609686] The buggy address is located 0 bytes to the right of
[   23.609686]  allocated 48-byte region [ffff888102314e80, ffff888102314eb0)
[   23.610564] 
[   23.610761] The buggy address belongs to the physical page:
[   23.611508] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102314
[   23.612198] flags: 0x200000000000000(node=0|zone=2)
[   23.612746] page_type: f5(slab)
[   23.613352] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   23.613899] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   23.614829] page dumped because: kasan: bad access detected
[   23.615366] 
[   23.615597] Memory state around the buggy address:
[   23.616169]  ffff888102314d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.618788]  ffff888102314e00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.619320] >ffff888102314e80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   23.620182]                                      ^
[   23.620612]  ffff888102314f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.621485]  ffff888102314f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.622353] ==================================================================
[   22.067020] ==================================================================
[   22.067451] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e0/0x5450
[   22.068218] Read of size 4 at addr ffff888102314eb0 by task kunit_try_catch/270
[   22.069579] 
[   22.070098] CPU: 1 UID: 0 PID: 270 Comm: kunit_try_catch Tainted: G    B            N 6.12.33-rc1 #1
[   22.070218] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.070277] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   22.070334] Call Trace:
[   22.070386]  <TASK>
[   22.070434]  dump_stack_lvl+0x73/0xb0
[   22.070516]  print_report+0xd1/0x640
[   22.070599]  ? __virt_addr_valid+0x1db/0x2d0
[   22.070680]  ? kasan_atomics_helper+0x3e0/0x5450
[   22.070772]  ? kasan_complete_mode_report_info+0x2a/0x200
[   22.070929]  ? kasan_atomics_helper+0x3e0/0x5450
[   22.071026]  kasan_report+0x140/0x180
[   22.071105]  ? kasan_atomics_helper+0x3e0/0x5450
[   22.071182]  kasan_check_range+0x10c/0x1c0
[   22.071217]  __kasan_check_read+0x15/0x20
[   22.071291]  kasan_atomics_helper+0x3e0/0x5450
[   22.071328]  ? kasan_save_alloc_info+0x3b/0x50
[   22.071359]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   22.071395]  ? __kmalloc_cache_noprof+0x168/0x350
[   22.071425]  ? trace_hardirqs_on+0x37/0xe0
[   22.071465]  kasan_atomics+0x1dd/0x310
[   22.071493]  ? __pfx_kasan_atomics+0x10/0x10
[   22.071523]  ? __pfx_read_tsc+0x10/0x10
[   22.071550]  ? ktime_get_ts64+0x84/0x230
[   22.071586]  kunit_try_run_case+0x1a6/0x480
[   22.071619]  ? __pfx_kunit_try_run_case+0x10/0x10
[   22.071650]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   22.071680]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   22.071717]  ? __kthread_parkme+0x82/0x160
[   22.071743]  ? preempt_count_sub+0x50/0x80
[   22.071774]  ? __pfx_kunit_try_run_case+0x10/0x10
[   22.071802]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   22.071880]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   22.071924]  kthread+0x257/0x310
[   22.071951]  ? __pfx_kthread+0x10/0x10
[   22.071978]  ret_from_fork+0x41/0x80
[   22.072008]  ? __pfx_kthread+0x10/0x10
[   22.072033]  ret_from_fork_asm+0x1a/0x30
[   22.072074]  </TASK>
[   22.072087] 
[   22.088370] Allocated by task 270:
[   22.088784]  kasan_save_stack+0x45/0x70
[   22.089384]  kasan_save_track+0x18/0x40
[   22.089934]  kasan_save_alloc_info+0x3b/0x50
[   22.090474]  __kasan_kmalloc+0xb7/0xc0
[   22.091022]  __kmalloc_cache_noprof+0x168/0x350
[   22.091601]  kasan_atomics+0x96/0x310
[   22.092215]  kunit_try_run_case+0x1a6/0x480
[   22.092567]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   22.092995]  kthread+0x257/0x310
[   22.093370]  ret_from_fork+0x41/0x80
[   22.093770]  ret_from_fork_asm+0x1a/0x30
[   22.094328] 
[   22.094566] The buggy address belongs to the object at ffff888102314e80
[   22.094566]  which belongs to the cache kmalloc-64 of size 64
[   22.095658] The buggy address is located 0 bytes to the right of
[   22.095658]  allocated 48-byte region [ffff888102314e80, ffff888102314eb0)
[   22.096725] 
[   22.096963] The buggy address belongs to the physical page:
[   22.097369] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102314
[   22.098159] flags: 0x200000000000000(node=0|zone=2)
[   22.098752] page_type: f5(slab)
[   22.099213] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   22.099987] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   22.100746] page dumped because: kasan: bad access detected
[   22.101305] 
[   22.101522] Memory state around the buggy address:
[   22.102015]  ffff888102314d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.102680]  ffff888102314e00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.103430] >ffff888102314e80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   22.104073]                                      ^
[   22.104475]  ffff888102314f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.105166]  ffff888102314f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.105782] ==================================================================
[   24.345182] ==================================================================
[   24.345914] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x2007/0x5450
[   24.346555] Write of size 8 at addr ffff888102314eb0 by task kunit_try_catch/270
[   24.347146] 
[   24.347428] CPU: 1 UID: 0 PID: 270 Comm: kunit_try_catch Tainted: G    B            N 6.12.33-rc1 #1
[   24.347552] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.347594] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   24.347656] Call Trace:
[   24.347710]  <TASK>
[   24.347764]  dump_stack_lvl+0x73/0xb0
[   24.347892]  print_report+0xd1/0x640
[   24.347981]  ? __virt_addr_valid+0x1db/0x2d0
[   24.348062]  ? kasan_atomics_helper+0x2007/0x5450
[   24.348143]  ? kasan_complete_mode_report_info+0x2a/0x200
[   24.348219]  ? kasan_atomics_helper+0x2007/0x5450
[   24.348316]  kasan_report+0x140/0x180
[   24.348397]  ? kasan_atomics_helper+0x2007/0x5450
[   24.348494]  kasan_check_range+0x10c/0x1c0
[   24.348571]  __kasan_check_write+0x18/0x20
[   24.348646]  kasan_atomics_helper+0x2007/0x5450
[   24.348732]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   24.348854]  ? __kmalloc_cache_noprof+0x168/0x350
[   24.348939]  ? trace_hardirqs_on+0x37/0xe0
[   24.349035]  kasan_atomics+0x1dd/0x310
[   24.349115]  ? __pfx_kasan_atomics+0x10/0x10
[   24.349197]  ? __pfx_read_tsc+0x10/0x10
[   24.349285]  ? ktime_get_ts64+0x84/0x230
[   24.349366]  kunit_try_run_case+0x1a6/0x480
[   24.349438]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.349470]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   24.349504]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   24.349542]  ? __kthread_parkme+0x82/0x160
[   24.349570]  ? preempt_count_sub+0x50/0x80
[   24.349602]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.349631]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   24.349669]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.349707]  kthread+0x257/0x310
[   24.349733]  ? __pfx_kthread+0x10/0x10
[   24.349760]  ret_from_fork+0x41/0x80
[   24.349789]  ? __pfx_kthread+0x10/0x10
[   24.349835]  ret_from_fork_asm+0x1a/0x30
[   24.349915]  </TASK>
[   24.349931] 
[   24.368710] Allocated by task 270:
[   24.369668]  kasan_save_stack+0x45/0x70
[   24.370069]  kasan_save_track+0x18/0x40
[   24.370697]  kasan_save_alloc_info+0x3b/0x50
[   24.371500]  __kasan_kmalloc+0xb7/0xc0
[   24.372039]  __kmalloc_cache_noprof+0x168/0x350
[   24.372502]  kasan_atomics+0x96/0x310
[   24.372831]  kunit_try_run_case+0x1a6/0x480
[   24.373283]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.373759]  kthread+0x257/0x310
[   24.374087]  ret_from_fork+0x41/0x80
[   24.374448]  ret_from_fork_asm+0x1a/0x30
[   24.374895] 
[   24.375114] The buggy address belongs to the object at ffff888102314e80
[   24.375114]  which belongs to the cache kmalloc-64 of size 64
[   24.376480] The buggy address is located 0 bytes to the right of
[   24.376480]  allocated 48-byte region [ffff888102314e80, ffff888102314eb0)
[   24.378359] 
[   24.378925] The buggy address belongs to the physical page:
[   24.379489] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102314
[   24.380084] flags: 0x200000000000000(node=0|zone=2)
[   24.380746] page_type: f5(slab)
[   24.381415] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   24.382258] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   24.383878] page dumped because: kasan: bad access detected
[   24.384449] 
[   24.384940] Memory state around the buggy address:
[   24.385477]  ffff888102314d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.385721]  ffff888102314e00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.386552] >ffff888102314e80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   24.387427]                                      ^
[   24.387908]  ffff888102314f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.388471]  ffff888102314f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.389134] ==================================================================
[   24.561025] ==================================================================
[   24.561774] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4fa7/0x5450
[   24.562487] Read of size 8 at addr ffff888102314eb0 by task kunit_try_catch/270
[   24.563121] 
[   24.563476] CPU: 1 UID: 0 PID: 270 Comm: kunit_try_catch Tainted: G    B            N 6.12.33-rc1 #1
[   24.563598] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.563640] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   24.563724] Call Trace:
[   24.563807]  <TASK>
[   24.563890]  dump_stack_lvl+0x73/0xb0
[   24.563963]  print_report+0xd1/0x640
[   24.564042]  ? __virt_addr_valid+0x1db/0x2d0
[   24.564122]  ? kasan_atomics_helper+0x4fa7/0x5450
[   24.564199]  ? kasan_complete_mode_report_info+0x2a/0x200
[   24.564298]  ? kasan_atomics_helper+0x4fa7/0x5450
[   24.564378]  kasan_report+0x140/0x180
[   24.564458]  ? kasan_atomics_helper+0x4fa7/0x5450
[   24.564551]  __asan_report_load8_noabort+0x18/0x20
[   24.564627]  kasan_atomics_helper+0x4fa7/0x5450
[   24.564727]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   24.564875]  ? __kmalloc_cache_noprof+0x168/0x350
[   24.564955]  ? trace_hardirqs_on+0x37/0xe0
[   24.565045]  kasan_atomics+0x1dd/0x310
[   24.565117]  ? __pfx_kasan_atomics+0x10/0x10
[   24.565194]  ? __pfx_read_tsc+0x10/0x10
[   24.565283]  ? ktime_get_ts64+0x84/0x230
[   24.565367]  kunit_try_run_case+0x1a6/0x480
[   24.565422]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.565453]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   24.565484]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   24.565521]  ? __kthread_parkme+0x82/0x160
[   24.565550]  ? preempt_count_sub+0x50/0x80
[   24.565582]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.565611]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   24.565649]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.565687]  kthread+0x257/0x310
[   24.565713]  ? __pfx_kthread+0x10/0x10
[   24.565739]  ret_from_fork+0x41/0x80
[   24.565769]  ? __pfx_kthread+0x10/0x10
[   24.565794]  ret_from_fork_asm+0x1a/0x30
[   24.565872]  </TASK>
[   24.565891] 
[   24.579436] Allocated by task 270:
[   24.579824]  kasan_save_stack+0x45/0x70
[   24.580302]  kasan_save_track+0x18/0x40
[   24.580753]  kasan_save_alloc_info+0x3b/0x50
[   24.581306]  __kasan_kmalloc+0xb7/0xc0
[   24.581820]  __kmalloc_cache_noprof+0x168/0x350
[   24.582457]  kasan_atomics+0x96/0x310
[   24.582763]  kunit_try_run_case+0x1a6/0x480
[   24.583089]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.583508]  kthread+0x257/0x310
[   24.583987]  ret_from_fork+0x41/0x80
[   24.584445]  ret_from_fork_asm+0x1a/0x30
[   24.584847] 
[   24.585081] The buggy address belongs to the object at ffff888102314e80
[   24.585081]  which belongs to the cache kmalloc-64 of size 64
[   24.586304] The buggy address is located 0 bytes to the right of
[   24.586304]  allocated 48-byte region [ffff888102314e80, ffff888102314eb0)
[   24.587307] 
[   24.587494] The buggy address belongs to the physical page:
[   24.587853] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102314
[   24.588591] flags: 0x200000000000000(node=0|zone=2)
[   24.589458] page_type: f5(slab)
[   24.589891] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   24.590593] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   24.591316] page dumped because: kasan: bad access detected
[   24.591796] 
[   24.592027] Memory state around the buggy address:
[   24.592790]  ffff888102314d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.593366]  ffff888102314e00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.594997] >ffff888102314e80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   24.595755]                                      ^
[   24.596811]  ffff888102314f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.597571]  ffff888102314f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.598624] ==================================================================
[   24.600343] ==================================================================
[   24.601482] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x224d/0x5450
[   24.602316] Write of size 8 at addr ffff888102314eb0 by task kunit_try_catch/270
[   24.603362] 
[   24.603618] CPU: 1 UID: 0 PID: 270 Comm: kunit_try_catch Tainted: G    B            N 6.12.33-rc1 #1
[   24.603683] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.603701] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   24.603732] Call Trace:
[   24.603756]  <TASK>
[   24.603778]  dump_stack_lvl+0x73/0xb0
[   24.603829]  print_report+0xd1/0x640
[   24.604190]  ? __virt_addr_valid+0x1db/0x2d0
[   24.604348]  ? kasan_atomics_helper+0x224d/0x5450
[   24.604428]  ? kasan_complete_mode_report_info+0x2a/0x200
[   24.604470]  ? kasan_atomics_helper+0x224d/0x5450
[   24.604507]  kasan_report+0x140/0x180
[   24.604544]  ? kasan_atomics_helper+0x224d/0x5450
[   24.604586]  kasan_check_range+0x10c/0x1c0
[   24.604617]  __kasan_check_write+0x18/0x20
[   24.604648]  kasan_atomics_helper+0x224d/0x5450
[   24.604685]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   24.604722]  ? __kmalloc_cache_noprof+0x168/0x350
[   24.604753]  ? trace_hardirqs_on+0x37/0xe0
[   24.604793]  kasan_atomics+0x1dd/0x310
[   24.604833]  ? __pfx_kasan_atomics+0x10/0x10
[   24.604903]  ? __pfx_read_tsc+0x10/0x10
[   24.604933]  ? ktime_get_ts64+0x84/0x230
[   24.604971]  kunit_try_run_case+0x1a6/0x480
[   24.605005]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.605035]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   24.605066]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   24.605104]  ? __kthread_parkme+0x82/0x160
[   24.605132]  ? preempt_count_sub+0x50/0x80
[   24.605165]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.605194]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   24.605256]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.605300]  kthread+0x257/0x310
[   24.605328]  ? __pfx_kthread+0x10/0x10
[   24.605355]  ret_from_fork+0x41/0x80
[   24.605386]  ? __pfx_kthread+0x10/0x10
[   24.605413]  ret_from_fork_asm+0x1a/0x30
[   24.605455]  </TASK>
[   24.605471] 
[   24.619180] Allocated by task 270:
[   24.619523]  kasan_save_stack+0x45/0x70
[   24.619876]  kasan_save_track+0x18/0x40
[   24.620341]  kasan_save_alloc_info+0x3b/0x50
[   24.621000]  __kasan_kmalloc+0xb7/0xc0
[   24.621490]  __kmalloc_cache_noprof+0x168/0x350
[   24.622080]  kasan_atomics+0x96/0x310
[   24.622497]  kunit_try_run_case+0x1a6/0x480
[   24.623024]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.623540]  kthread+0x257/0x310
[   24.623825]  ret_from_fork+0x41/0x80
[   24.624133]  ret_from_fork_asm+0x1a/0x30
[   24.624536] 
[   24.624804] The buggy address belongs to the object at ffff888102314e80
[   24.624804]  which belongs to the cache kmalloc-64 of size 64
[   24.625844] The buggy address is located 0 bytes to the right of
[   24.625844]  allocated 48-byte region [ffff888102314e80, ffff888102314eb0)
[   24.626762] 
[   24.627097] The buggy address belongs to the physical page:
[   24.627649] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102314
[   24.628410] flags: 0x200000000000000(node=0|zone=2)
[   24.628985] page_type: f5(slab)
[   24.629354] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   24.630062] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   24.630625] page dumped because: kasan: bad access detected
[   24.630983] 
[   24.631160] Memory state around the buggy address:
[   24.631701]  ffff888102314d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.633407]  ffff888102314e00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.635492] >ffff888102314e80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   24.636374]                                      ^
[   24.636908]  ffff888102314f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.637671]  ffff888102314f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.638481] ==================================================================
[   22.236754] ==================================================================
[   22.238591] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x566/0x5450
[   22.239358] Write of size 4 at addr ffff888102314eb0 by task kunit_try_catch/270
[   22.239967] 
[   22.240337] CPU: 1 UID: 0 PID: 270 Comm: kunit_try_catch Tainted: G    B            N 6.12.33-rc1 #1
[   22.240459] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.240520] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   22.240612] Call Trace:
[   22.240670]  <TASK>
[   22.240724]  dump_stack_lvl+0x73/0xb0
[   22.240810]  print_report+0xd1/0x640
[   22.240911]  ? __virt_addr_valid+0x1db/0x2d0
[   22.240996]  ? kasan_atomics_helper+0x566/0x5450
[   22.241121]  ? kasan_complete_mode_report_info+0x2a/0x200
[   22.241205]  ? kasan_atomics_helper+0x566/0x5450
[   22.241308]  kasan_report+0x140/0x180
[   22.241374]  ? kasan_atomics_helper+0x566/0x5450
[   22.241418]  kasan_check_range+0x10c/0x1c0
[   22.241449]  __kasan_check_write+0x18/0x20
[   22.241480]  kasan_atomics_helper+0x566/0x5450
[   22.241516]  ? kasan_save_alloc_info+0x3b/0x50
[   22.241546]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   22.241582]  ? __kmalloc_cache_noprof+0x168/0x350
[   22.241613]  ? trace_hardirqs_on+0x37/0xe0
[   22.241652]  kasan_atomics+0x1dd/0x310
[   22.241681]  ? __pfx_kasan_atomics+0x10/0x10
[   22.241712]  ? __pfx_read_tsc+0x10/0x10
[   22.241738]  ? ktime_get_ts64+0x84/0x230
[   22.241774]  kunit_try_run_case+0x1a6/0x480
[   22.241807]  ? __pfx_kunit_try_run_case+0x10/0x10
[   22.241875]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   22.241911]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   22.241949]  ? __kthread_parkme+0x82/0x160
[   22.241977]  ? preempt_count_sub+0x50/0x80
[   22.242010]  ? __pfx_kunit_try_run_case+0x10/0x10
[   22.242038]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   22.242076]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   22.242115]  kthread+0x257/0x310
[   22.242141]  ? __pfx_kthread+0x10/0x10
[   22.242169]  ret_from_fork+0x41/0x80
[   22.242199]  ? __pfx_kthread+0x10/0x10
[   22.242249]  ret_from_fork_asm+0x1a/0x30
[   22.242295]  </TASK>
[   22.242311] 
[   22.256084] Allocated by task 270:
[   22.256540]  kasan_save_stack+0x45/0x70
[   22.257172]  kasan_save_track+0x18/0x40
[   22.257649]  kasan_save_alloc_info+0x3b/0x50
[   22.258213]  __kasan_kmalloc+0xb7/0xc0
[   22.258644]  __kmalloc_cache_noprof+0x168/0x350
[   22.259001]  kasan_atomics+0x96/0x310
[   22.259498]  kunit_try_run_case+0x1a6/0x480
[   22.259970]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   22.260551]  kthread+0x257/0x310
[   22.261025]  ret_from_fork+0x41/0x80
[   22.261453]  ret_from_fork_asm+0x1a/0x30
[   22.261901] 
[   22.262146] The buggy address belongs to the object at ffff888102314e80
[   22.262146]  which belongs to the cache kmalloc-64 of size 64
[   22.263152] The buggy address is located 0 bytes to the right of
[   22.263152]  allocated 48-byte region [ffff888102314e80, ffff888102314eb0)
[   22.264280] 
[   22.264451] The buggy address belongs to the physical page:
[   22.265041] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102314
[   22.265643] flags: 0x200000000000000(node=0|zone=2)
[   22.266004] page_type: f5(slab)
[   22.267519] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   22.269070] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   22.269673] page dumped because: kasan: bad access detected
[   22.270529] 
[   22.271010] Memory state around the buggy address:
[   22.271484]  ffff888102314d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.272091]  ffff888102314e00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.272622] >ffff888102314e80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   22.273119]                                      ^
[   22.273560]  ffff888102314f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.274150]  ffff888102314f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.274768] ==================================================================
[   22.196993] ==================================================================
[   22.197675] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b3c/0x5450
[   22.198512] Write of size 4 at addr ffff888102314eb0 by task kunit_try_catch/270
[   22.199336] 
[   22.199582] CPU: 1 UID: 0 PID: 270 Comm: kunit_try_catch Tainted: G    B            N 6.12.33-rc1 #1
[   22.199754] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.199850] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   22.199934] Call Trace:
[   22.200016]  <TASK>
[   22.200065]  dump_stack_lvl+0x73/0xb0
[   22.200145]  print_report+0xd1/0x640
[   22.200218]  ? __virt_addr_valid+0x1db/0x2d0
[   22.200397]  ? kasan_atomics_helper+0x4b3c/0x5450
[   22.200549]  ? kasan_complete_mode_report_info+0x2a/0x200
[   22.200630]  ? kasan_atomics_helper+0x4b3c/0x5450
[   22.200704]  kasan_report+0x140/0x180
[   22.200785]  ? kasan_atomics_helper+0x4b3c/0x5450
[   22.200875]  __asan_report_store4_noabort+0x1b/0x30
[   22.201011]  kasan_atomics_helper+0x4b3c/0x5450
[   22.201115]  ? kasan_save_alloc_info+0x3b/0x50
[   22.201188]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   22.201357]  ? __kmalloc_cache_noprof+0x168/0x350
[   22.201434]  ? trace_hardirqs_on+0x37/0xe0
[   22.201499]  kasan_atomics+0x1dd/0x310
[   22.201530]  ? __pfx_kasan_atomics+0x10/0x10
[   22.201562]  ? __pfx_read_tsc+0x10/0x10
[   22.201590]  ? ktime_get_ts64+0x84/0x230
[   22.201626]  kunit_try_run_case+0x1a6/0x480
[   22.201660]  ? __pfx_kunit_try_run_case+0x10/0x10
[   22.201688]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   22.201716]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   22.201755]  ? __kthread_parkme+0x82/0x160
[   22.201783]  ? preempt_count_sub+0x50/0x80
[   22.201818]  ? __pfx_kunit_try_run_case+0x10/0x10
[   22.201888]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   22.201927]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   22.201965]  kthread+0x257/0x310
[   22.201991]  ? __pfx_kthread+0x10/0x10
[   22.202016]  ret_from_fork+0x41/0x80
[   22.202045]  ? __pfx_kthread+0x10/0x10
[   22.202070]  ret_from_fork_asm+0x1a/0x30
[   22.202111]  </TASK>
[   22.202124] 
[   22.217889] Allocated by task 270:
[   22.218257]  kasan_save_stack+0x45/0x70
[   22.218747]  kasan_save_track+0x18/0x40
[   22.219195]  kasan_save_alloc_info+0x3b/0x50
[   22.219661]  __kasan_kmalloc+0xb7/0xc0
[   22.220320]  __kmalloc_cache_noprof+0x168/0x350
[   22.220666]  kasan_atomics+0x96/0x310
[   22.221044]  kunit_try_run_case+0x1a6/0x480
[   22.221773]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   22.222383]  kthread+0x257/0x310
[   22.222737]  ret_from_fork+0x41/0x80
[   22.223173]  ret_from_fork_asm+0x1a/0x30
[   22.223669] 
[   22.223912] The buggy address belongs to the object at ffff888102314e80
[   22.223912]  which belongs to the cache kmalloc-64 of size 64
[   22.224650] The buggy address is located 0 bytes to the right of
[   22.224650]  allocated 48-byte region [ffff888102314e80, ffff888102314eb0)
[   22.225476] 
[   22.225747] The buggy address belongs to the physical page:
[   22.226343] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102314
[   22.227191] flags: 0x200000000000000(node=0|zone=2)
[   22.227687] page_type: f5(slab)
[   22.228102] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   22.228809] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   22.229605] page dumped because: kasan: bad access detected
[   22.230184] 
[   22.230496] Memory state around the buggy address:
[   22.231012]  ffff888102314d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.231648]  ffff888102314e00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.232421] >ffff888102314e80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   22.233140]                                      ^
[   22.233626]  ffff888102314f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.234199]  ffff888102314f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.235007] ==================================================================
[   23.843114] ==================================================================
[   23.844551] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x194b/0x5450
[   23.845487] Write of size 8 at addr ffff888102314eb0 by task kunit_try_catch/270
[   23.846774] 
[   23.847008] CPU: 1 UID: 0 PID: 270 Comm: kunit_try_catch Tainted: G    B            N 6.12.33-rc1 #1
[   23.847268] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.847310] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   23.847360] Call Trace:
[   23.847388]  <TASK>
[   23.847415]  dump_stack_lvl+0x73/0xb0
[   23.847457]  print_report+0xd1/0x640
[   23.847494]  ? __virt_addr_valid+0x1db/0x2d0
[   23.847530]  ? kasan_atomics_helper+0x194b/0x5450
[   23.847564]  ? kasan_complete_mode_report_info+0x2a/0x200
[   23.847599]  ? kasan_atomics_helper+0x194b/0x5450
[   23.847637]  kasan_report+0x140/0x180
[   23.847675]  ? kasan_atomics_helper+0x194b/0x5450
[   23.847717]  kasan_check_range+0x10c/0x1c0
[   23.847748]  __kasan_check_write+0x18/0x20
[   23.847779]  kasan_atomics_helper+0x194b/0x5450
[   23.847823]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   23.847947]  ? __kmalloc_cache_noprof+0x168/0x350
[   23.848068]  ? trace_hardirqs_on+0x37/0xe0
[   23.848182]  kasan_atomics+0x1dd/0x310
[   23.848278]  ? __pfx_kasan_atomics+0x10/0x10
[   23.848318]  ? __pfx_read_tsc+0x10/0x10
[   23.848349]  ? ktime_get_ts64+0x84/0x230
[   23.848385]  kunit_try_run_case+0x1a6/0x480
[   23.848421]  ? __pfx_kunit_try_run_case+0x10/0x10
[   23.848452]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   23.848483]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   23.848521]  ? __kthread_parkme+0x82/0x160
[   23.848551]  ? preempt_count_sub+0x50/0x80
[   23.848585]  ? __pfx_kunit_try_run_case+0x10/0x10
[   23.848614]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   23.848651]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   23.848690]  kthread+0x257/0x310
[   23.848718]  ? __pfx_kthread+0x10/0x10
[   23.848746]  ret_from_fork+0x41/0x80
[   23.848777]  ? __pfx_kthread+0x10/0x10
[   23.848803]  ret_from_fork_asm+0x1a/0x30
[   23.848874]  </TASK>
[   23.848893] 
[   23.864461] Allocated by task 270:
[   23.865005]  kasan_save_stack+0x45/0x70
[   23.865530]  kasan_save_track+0x18/0x40
[   23.866046]  kasan_save_alloc_info+0x3b/0x50
[   23.866585]  __kasan_kmalloc+0xb7/0xc0
[   23.867076]  __kmalloc_cache_noprof+0x168/0x350
[   23.867564]  kasan_atomics+0x96/0x310
[   23.868156]  kunit_try_run_case+0x1a6/0x480
[   23.868696]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   23.869319]  kthread+0x257/0x310
[   23.869745]  ret_from_fork+0x41/0x80
[   23.870100]  ret_from_fork_asm+0x1a/0x30
[   23.870586] 
[   23.871026] The buggy address belongs to the object at ffff888102314e80
[   23.871026]  which belongs to the cache kmalloc-64 of size 64
[   23.872149] The buggy address is located 0 bytes to the right of
[   23.872149]  allocated 48-byte region [ffff888102314e80, ffff888102314eb0)
[   23.873137] 
[   23.873423] The buggy address belongs to the physical page:
[   23.874119] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102314
[   23.874892] flags: 0x200000000000000(node=0|zone=2)
[   23.875483] page_type: f5(slab)
[   23.875939] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   23.876682] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   23.877405] page dumped because: kasan: bad access detected
[   23.877906] 
[   23.878086] Memory state around the buggy address:
[   23.878536]  ffff888102314d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.879345]  ffff888102314e00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.880138] >ffff888102314e80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   23.880656]                                      ^
[   23.881188]  ffff888102314f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.881741]  ffff888102314f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.882509] ==================================================================
[   22.795608] ==================================================================
[   22.796163] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xd48/0x5450
[   22.796932] Write of size 4 at addr ffff888102314eb0 by task kunit_try_catch/270
[   22.797528] 
[   22.797820] CPU: 1 UID: 0 PID: 270 Comm: kunit_try_catch Tainted: G    B            N 6.12.33-rc1 #1
[   22.797959] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.797996] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   22.798058] Call Trace:
[   22.798116]  <TASK>
[   22.798175]  dump_stack_lvl+0x73/0xb0
[   22.798331]  print_report+0xd1/0x640
[   22.798449]  ? __virt_addr_valid+0x1db/0x2d0
[   22.798561]  ? kasan_atomics_helper+0xd48/0x5450
[   22.798673]  ? kasan_complete_mode_report_info+0x2a/0x200
[   22.798757]  ? kasan_atomics_helper+0xd48/0x5450
[   22.798840]  kasan_report+0x140/0x180
[   22.798921]  ? kasan_atomics_helper+0xd48/0x5450
[   22.799019]  kasan_check_range+0x10c/0x1c0
[   22.799096]  __kasan_check_write+0x18/0x20
[   22.799167]  kasan_atomics_helper+0xd48/0x5450
[   22.799297]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   22.799385]  ? __kmalloc_cache_noprof+0x168/0x350
[   22.799504]  ? trace_hardirqs_on+0x37/0xe0
[   22.799630]  kasan_atomics+0x1dd/0x310
[   22.799711]  ? __pfx_kasan_atomics+0x10/0x10
[   22.799791]  ? __pfx_read_tsc+0x10/0x10
[   22.799858]  ? ktime_get_ts64+0x84/0x230
[   22.799964]  kunit_try_run_case+0x1a6/0x480
[   22.800039]  ? __pfx_kunit_try_run_case+0x10/0x10
[   22.800087]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   22.800120]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   22.800157]  ? __kthread_parkme+0x82/0x160
[   22.800184]  ? preempt_count_sub+0x50/0x80
[   22.800217]  ? __pfx_kunit_try_run_case+0x10/0x10
[   22.800278]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   22.800317]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   22.800357]  kthread+0x257/0x310
[   22.800383]  ? __pfx_kthread+0x10/0x10
[   22.800411]  ret_from_fork+0x41/0x80
[   22.800440]  ? __pfx_kthread+0x10/0x10
[   22.800465]  ret_from_fork_asm+0x1a/0x30
[   22.800506]  </TASK>
[   22.800521] 
[   22.814566] Allocated by task 270:
[   22.815055]  kasan_save_stack+0x45/0x70
[   22.815556]  kasan_save_track+0x18/0x40
[   22.815997]  kasan_save_alloc_info+0x3b/0x50
[   22.816510]  __kasan_kmalloc+0xb7/0xc0
[   22.816990]  __kmalloc_cache_noprof+0x168/0x350
[   22.817488]  kasan_atomics+0x96/0x310
[   22.817935]  kunit_try_run_case+0x1a6/0x480
[   22.818410]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   22.818942]  kthread+0x257/0x310
[   22.819353]  ret_from_fork+0x41/0x80
[   22.819664]  ret_from_fork_asm+0x1a/0x30
[   22.820285] 
[   22.820561] The buggy address belongs to the object at ffff888102314e80
[   22.820561]  which belongs to the cache kmalloc-64 of size 64
[   22.821925] The buggy address is located 0 bytes to the right of
[   22.821925]  allocated 48-byte region [ffff888102314e80, ffff888102314eb0)
[   22.822887] 
[   22.823126] The buggy address belongs to the physical page:
[   22.823673] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102314
[   22.825440] flags: 0x200000000000000(node=0|zone=2)
[   22.827188] page_type: f5(slab)
[   22.827555] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   22.828020] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   22.828753] page dumped because: kasan: bad access detected
[   22.829597] 
[   22.829758] Memory state around the buggy address:
[   22.830589]  ffff888102314d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.831318]  ffff888102314e00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.832106] >ffff888102314e80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   22.833050]                                      ^
[   22.833538]  ffff888102314f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.834475]  ffff888102314f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.835012] ==================================================================
[   22.753254] ==================================================================
[   22.753897] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a86/0x5450
[   22.754483] Read of size 4 at addr ffff888102314eb0 by task kunit_try_catch/270
[   22.755089] 
[   22.756251] CPU: 1 UID: 0 PID: 270 Comm: kunit_try_catch Tainted: G    B            N 6.12.33-rc1 #1
[   22.756468] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.756585] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   22.756694] Call Trace:
[   22.756756]  <TASK>
[   22.756901]  dump_stack_lvl+0x73/0xb0
[   22.756992]  print_report+0xd1/0x640
[   22.757077]  ? __virt_addr_valid+0x1db/0x2d0
[   22.757146]  ? kasan_atomics_helper+0x4a86/0x5450
[   22.757186]  ? kasan_complete_mode_report_info+0x2a/0x200
[   22.757242]  ? kasan_atomics_helper+0x4a86/0x5450
[   22.757289]  kasan_report+0x140/0x180
[   22.757327]  ? kasan_atomics_helper+0x4a86/0x5450
[   22.757370]  __asan_report_load4_noabort+0x18/0x20
[   22.757403]  kasan_atomics_helper+0x4a86/0x5450
[   22.757440]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   22.757478]  ? __kmalloc_cache_noprof+0x168/0x350
[   22.757509]  ? trace_hardirqs_on+0x37/0xe0
[   22.757550]  kasan_atomics+0x1dd/0x310
[   22.757579]  ? __pfx_kasan_atomics+0x10/0x10
[   22.757610]  ? __pfx_read_tsc+0x10/0x10
[   22.757638]  ? ktime_get_ts64+0x84/0x230
[   22.757674]  kunit_try_run_case+0x1a6/0x480
[   22.757708]  ? __pfx_kunit_try_run_case+0x10/0x10
[   22.757737]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   22.757767]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   22.757803]  ? __kthread_parkme+0x82/0x160
[   22.757884]  ? preempt_count_sub+0x50/0x80
[   22.757919]  ? __pfx_kunit_try_run_case+0x10/0x10
[   22.757949]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   22.757986]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   22.758025]  kthread+0x257/0x310
[   22.758052]  ? __pfx_kthread+0x10/0x10
[   22.758078]  ret_from_fork+0x41/0x80
[   22.758109]  ? __pfx_kthread+0x10/0x10
[   22.758135]  ret_from_fork_asm+0x1a/0x30
[   22.758178]  </TASK>
[   22.758192] 
[   22.774777] Allocated by task 270:
[   22.775250]  kasan_save_stack+0x45/0x70
[   22.775756]  kasan_save_track+0x18/0x40
[   22.776421]  kasan_save_alloc_info+0x3b/0x50
[   22.776914]  __kasan_kmalloc+0xb7/0xc0
[   22.777373]  __kmalloc_cache_noprof+0x168/0x350
[   22.778028]  kasan_atomics+0x96/0x310
[   22.778521]  kunit_try_run_case+0x1a6/0x480
[   22.778998]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   22.779778]  kthread+0x257/0x310
[   22.780341]  ret_from_fork+0x41/0x80
[   22.780716]  ret_from_fork_asm+0x1a/0x30
[   22.781106] 
[   22.781357] The buggy address belongs to the object at ffff888102314e80
[   22.781357]  which belongs to the cache kmalloc-64 of size 64
[   22.782286] The buggy address is located 0 bytes to the right of
[   22.782286]  allocated 48-byte region [ffff888102314e80, ffff888102314eb0)
[   22.783927] 
[   22.784220] The buggy address belongs to the physical page:
[   22.785069] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102314
[   22.785738] flags: 0x200000000000000(node=0|zone=2)
[   22.786465] page_type: f5(slab)
[   22.787011] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   22.787649] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   22.788627] page dumped because: kasan: bad access detected
[   22.788999] 
[   22.789624] Memory state around the buggy address:
[   22.790320]  ffff888102314d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.791180]  ffff888102314e00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.791895] >ffff888102314e80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   22.792707]                                      ^
[   22.793361]  ffff888102314f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.793861]  ffff888102314f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.794408] ==================================================================
[   23.042777] ==================================================================
[   23.043585] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x107a/0x5450
[   23.044276] Write of size 4 at addr ffff888102314eb0 by task kunit_try_catch/270
[   23.044727] 
[   23.044941] CPU: 1 UID: 0 PID: 270 Comm: kunit_try_catch Tainted: G    B            N 6.12.33-rc1 #1
[   23.045059] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.045105] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   23.045250] Call Trace:
[   23.045314]  <TASK>
[   23.045370]  dump_stack_lvl+0x73/0xb0
[   23.045459]  print_report+0xd1/0x640
[   23.045540]  ? __virt_addr_valid+0x1db/0x2d0
[   23.045624]  ? kasan_atomics_helper+0x107a/0x5450
[   23.045740]  ? kasan_complete_mode_report_info+0x2a/0x200
[   23.045816]  ? kasan_atomics_helper+0x107a/0x5450
[   23.045880]  kasan_report+0x140/0x180
[   23.045960]  ? kasan_atomics_helper+0x107a/0x5450
[   23.046087]  kasan_check_range+0x10c/0x1c0
[   23.046172]  __kasan_check_write+0x18/0x20
[   23.046300]  kasan_atomics_helper+0x107a/0x5450
[   23.046402]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   23.046522]  ? __kmalloc_cache_noprof+0x168/0x350
[   23.046605]  ? trace_hardirqs_on+0x37/0xe0
[   23.046733]  kasan_atomics+0x1dd/0x310
[   23.046812]  ? __pfx_kasan_atomics+0x10/0x10
[   23.046907]  ? __pfx_read_tsc+0x10/0x10
[   23.046976]  ? ktime_get_ts64+0x84/0x230
[   23.047062]  kunit_try_run_case+0x1a6/0x480
[   23.047145]  ? __pfx_kunit_try_run_case+0x10/0x10
[   23.047216]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   23.047328]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   23.047407]  ? __kthread_parkme+0x82/0x160
[   23.047479]  ? preempt_count_sub+0x50/0x80
[   23.047556]  ? __pfx_kunit_try_run_case+0x10/0x10
[   23.047625]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   23.047706]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   23.047793]  kthread+0x257/0x310
[   23.047865]  ? __pfx_kthread+0x10/0x10
[   23.047935]  ret_from_fork+0x41/0x80
[   23.048004]  ? __pfx_kthread+0x10/0x10
[   23.048077]  ret_from_fork_asm+0x1a/0x30
[   23.048175]  </TASK>
[   23.048216] 
[   23.061691] Allocated by task 270:
[   23.062265]  kasan_save_stack+0x45/0x70
[   23.062662]  kasan_save_track+0x18/0x40
[   23.063085]  kasan_save_alloc_info+0x3b/0x50
[   23.063811]  __kasan_kmalloc+0xb7/0xc0
[   23.064173]  __kmalloc_cache_noprof+0x168/0x350
[   23.064539]  kasan_atomics+0x96/0x310
[   23.064843]  kunit_try_run_case+0x1a6/0x480
[   23.065238]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   23.065755]  kthread+0x257/0x310
[   23.066287]  ret_from_fork+0x41/0x80
[   23.066722]  ret_from_fork_asm+0x1a/0x30
[   23.067409] 
[   23.067682] The buggy address belongs to the object at ffff888102314e80
[   23.067682]  which belongs to the cache kmalloc-64 of size 64
[   23.068480] The buggy address is located 0 bytes to the right of
[   23.068480]  allocated 48-byte region [ffff888102314e80, ffff888102314eb0)
[   23.069423] 
[   23.069689] The buggy address belongs to the physical page:
[   23.070429] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102314
[   23.071338] flags: 0x200000000000000(node=0|zone=2)
[   23.071696] page_type: f5(slab)
[   23.072153] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   23.072825] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   23.073423] page dumped because: kasan: bad access detected
[   23.073785] 
[   23.074008] Memory state around the buggy address:
[   23.074473]  ffff888102314d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.075480]  ffff888102314e00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.075920] >ffff888102314e80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   23.076633]                                      ^
[   23.077819]  ffff888102314f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.078703]  ffff888102314f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.079642] ==================================================================
[   23.199264] ==================================================================
[   23.200155] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1218/0x5450
[   23.201626] Write of size 4 at addr ffff888102314eb0 by task kunit_try_catch/270
[   23.203150] 
[   23.203568] CPU: 1 UID: 0 PID: 270 Comm: kunit_try_catch Tainted: G    B            N 6.12.33-rc1 #1
[   23.203685] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.203727] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   23.203787] Call Trace:
[   23.203843]  <TASK>
[   23.203895]  dump_stack_lvl+0x73/0xb0
[   23.203980]  print_report+0xd1/0x640
[   23.204066]  ? __virt_addr_valid+0x1db/0x2d0
[   23.204145]  ? kasan_atomics_helper+0x1218/0x5450
[   23.204183]  ? kasan_complete_mode_report_info+0x2a/0x200
[   23.204218]  ? kasan_atomics_helper+0x1218/0x5450
[   23.204289]  kasan_report+0x140/0x180
[   23.204327]  ? kasan_atomics_helper+0x1218/0x5450
[   23.204369]  kasan_check_range+0x10c/0x1c0
[   23.204399]  __kasan_check_write+0x18/0x20
[   23.204430]  kasan_atomics_helper+0x1218/0x5450
[   23.204465]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   23.204502]  ? __kmalloc_cache_noprof+0x168/0x350
[   23.204532]  ? trace_hardirqs_on+0x37/0xe0
[   23.204570]  kasan_atomics+0x1dd/0x310
[   23.204599]  ? __pfx_kasan_atomics+0x10/0x10
[   23.204630]  ? __pfx_read_tsc+0x10/0x10
[   23.204656]  ? ktime_get_ts64+0x84/0x230
[   23.204692]  kunit_try_run_case+0x1a6/0x480
[   23.204724]  ? __pfx_kunit_try_run_case+0x10/0x10
[   23.204753]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   23.204784]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   23.204835]  ? __kthread_parkme+0x82/0x160
[   23.204895]  ? preempt_count_sub+0x50/0x80
[   23.204929]  ? __pfx_kunit_try_run_case+0x10/0x10
[   23.204959]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   23.204998]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   23.205036]  kthread+0x257/0x310
[   23.205062]  ? __pfx_kthread+0x10/0x10
[   23.205089]  ret_from_fork+0x41/0x80
[   23.205118]  ? __pfx_kthread+0x10/0x10
[   23.205145]  ret_from_fork_asm+0x1a/0x30
[   23.205185]  </TASK>
[   23.205200] 
[   23.227320] Allocated by task 270:
[   23.228168]  kasan_save_stack+0x45/0x70
[   23.229017]  kasan_save_track+0x18/0x40
[   23.229466]  kasan_save_alloc_info+0x3b/0x50
[   23.229854]  __kasan_kmalloc+0xb7/0xc0
[   23.230311]  __kmalloc_cache_noprof+0x168/0x350
[   23.230767]  kasan_atomics+0x96/0x310
[   23.231492]  kunit_try_run_case+0x1a6/0x480
[   23.231843]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   23.232730]  kthread+0x257/0x310
[   23.233303]  ret_from_fork+0x41/0x80
[   23.233753]  ret_from_fork_asm+0x1a/0x30
[   23.234221] 
[   23.234486] The buggy address belongs to the object at ffff888102314e80
[   23.234486]  which belongs to the cache kmalloc-64 of size 64
[   23.235486] The buggy address is located 0 bytes to the right of
[   23.235486]  allocated 48-byte region [ffff888102314e80, ffff888102314eb0)
[   23.236523] 
[   23.236773] The buggy address belongs to the physical page:
[   23.237245] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102314
[   23.238023] flags: 0x200000000000000(node=0|zone=2)
[   23.238517] page_type: f5(slab)
[   23.238932] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   23.239652] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   23.240332] page dumped because: kasan: bad access detected
[   23.240879] 
[   23.241116] Memory state around the buggy address:
[   23.241589]  ffff888102314d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.242253]  ffff888102314e00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.242892] >ffff888102314e80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   23.243546]                                      ^
[   23.244083]  ffff888102314f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.244708]  ffff888102314f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.245384] ==================================================================
[   23.375304] ==================================================================
[   23.375831] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x13b6/0x5450
[   23.376557] Read of size 8 at addr ffff888102314eb0 by task kunit_try_catch/270
[   23.377000] 
[   23.377213] CPU: 1 UID: 0 PID: 270 Comm: kunit_try_catch Tainted: G    B            N 6.12.33-rc1 #1
[   23.377330] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.377368] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   23.377421] Call Trace:
[   23.377470]  <TASK>
[   23.377513]  dump_stack_lvl+0x73/0xb0
[   23.377630]  print_report+0xd1/0x640
[   23.377729]  ? __virt_addr_valid+0x1db/0x2d0
[   23.377810]  ? kasan_atomics_helper+0x13b6/0x5450
[   23.377909]  ? kasan_complete_mode_report_info+0x2a/0x200
[   23.377998]  ? kasan_atomics_helper+0x13b6/0x5450
[   23.378096]  kasan_report+0x140/0x180
[   23.378184]  ? kasan_atomics_helper+0x13b6/0x5450
[   23.378302]  kasan_check_range+0x10c/0x1c0
[   23.378385]  __kasan_check_read+0x15/0x20
[   23.378462]  kasan_atomics_helper+0x13b6/0x5450
[   23.378544]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   23.378628]  ? __kmalloc_cache_noprof+0x168/0x350
[   23.378703]  ? trace_hardirqs_on+0x37/0xe0
[   23.378794]  kasan_atomics+0x1dd/0x310
[   23.378890]  ? __pfx_kasan_atomics+0x10/0x10
[   23.378972]  ? __pfx_read_tsc+0x10/0x10
[   23.379040]  ? ktime_get_ts64+0x84/0x230
[   23.379129]  kunit_try_run_case+0x1a6/0x480
[   23.379213]  ? __pfx_kunit_try_run_case+0x10/0x10
[   23.379323]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   23.379401]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   23.379481]  ? __kthread_parkme+0x82/0x160
[   23.379560]  ? preempt_count_sub+0x50/0x80
[   23.379641]  ? __pfx_kunit_try_run_case+0x10/0x10
[   23.379712]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   23.379794]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   23.379904]  kthread+0x257/0x310
[   23.379974]  ? __pfx_kthread+0x10/0x10
[   23.380044]  ret_from_fork+0x41/0x80
[   23.380113]  ? __pfx_kthread+0x10/0x10
[   23.380179]  ret_from_fork_asm+0x1a/0x30
[   23.380298]  </TASK>
[   23.380328] 
[   23.394573] Allocated by task 270:
[   23.394972]  kasan_save_stack+0x45/0x70
[   23.395528]  kasan_save_track+0x18/0x40
[   23.395859]  kasan_save_alloc_info+0x3b/0x50
[   23.396204]  __kasan_kmalloc+0xb7/0xc0
[   23.396594]  __kmalloc_cache_noprof+0x168/0x350
[   23.397081]  kasan_atomics+0x96/0x310
[   23.397506]  kunit_try_run_case+0x1a6/0x480
[   23.398266]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   23.398755]  kthread+0x257/0x310
[   23.399108]  ret_from_fork+0x41/0x80
[   23.400217]  ret_from_fork_asm+0x1a/0x30
[   23.400643] 
[   23.400838] The buggy address belongs to the object at ffff888102314e80
[   23.400838]  which belongs to the cache kmalloc-64 of size 64
[   23.403249] The buggy address is located 0 bytes to the right of
[   23.403249]  allocated 48-byte region [ffff888102314e80, ffff888102314eb0)
[   23.404677] 
[   23.404868] The buggy address belongs to the physical page:
[   23.405752] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102314
[   23.406728] flags: 0x200000000000000(node=0|zone=2)
[   23.407211] page_type: f5(slab)
[   23.407611] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   23.408184] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   23.408821] page dumped because: kasan: bad access detected
[   23.409303] 
[   23.409519] Memory state around the buggy address:
[   23.410033]  ffff888102314d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.410579]  ffff888102314e00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.411361] >ffff888102314e80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   23.411839]                                      ^
[   23.412439]  ffff888102314f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.412915]  ffff888102314f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.413630] ==================================================================
[   23.333007] ==================================================================
[   23.333614] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x49d0/0x5450
[   23.334357] Read of size 4 at addr ffff888102314eb0 by task kunit_try_catch/270
[   23.335422] 
[   23.335687] CPU: 1 UID: 0 PID: 270 Comm: kunit_try_catch Tainted: G    B            N 6.12.33-rc1 #1
[   23.335805] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.335938] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   23.336002] Call Trace:
[   23.336054]  <TASK>
[   23.336105]  dump_stack_lvl+0x73/0xb0
[   23.336184]  print_report+0xd1/0x640
[   23.336282]  ? __virt_addr_valid+0x1db/0x2d0
[   23.336364]  ? kasan_atomics_helper+0x49d0/0x5450
[   23.336441]  ? kasan_complete_mode_report_info+0x2a/0x200
[   23.336519]  ? kasan_atomics_helper+0x49d0/0x5450
[   23.336599]  kasan_report+0x140/0x180
[   23.336682]  ? kasan_atomics_helper+0x49d0/0x5450
[   23.336930]  __asan_report_load4_noabort+0x18/0x20
[   23.337018]  kasan_atomics_helper+0x49d0/0x5450
[   23.337104]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   23.337186]  ? __kmalloc_cache_noprof+0x168/0x350
[   23.337266]  ? trace_hardirqs_on+0x37/0xe0
[   23.337313]  kasan_atomics+0x1dd/0x310
[   23.337344]  ? __pfx_kasan_atomics+0x10/0x10
[   23.337375]  ? __pfx_read_tsc+0x10/0x10
[   23.337404]  ? ktime_get_ts64+0x84/0x230
[   23.337441]  kunit_try_run_case+0x1a6/0x480
[   23.337474]  ? __pfx_kunit_try_run_case+0x10/0x10
[   23.337503]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   23.337532]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   23.337569]  ? __kthread_parkme+0x82/0x160
[   23.337597]  ? preempt_count_sub+0x50/0x80
[   23.337628]  ? __pfx_kunit_try_run_case+0x10/0x10
[   23.337657]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   23.337697]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   23.337734]  kthread+0x257/0x310
[   23.337760]  ? __pfx_kthread+0x10/0x10
[   23.337787]  ret_from_fork+0x41/0x80
[   23.337838]  ? __pfx_kthread+0x10/0x10
[   23.337899]  ret_from_fork_asm+0x1a/0x30
[   23.337943]  </TASK>
[   23.337959] 
[   23.356760] Allocated by task 270:
[   23.357646]  kasan_save_stack+0x45/0x70
[   23.358053]  kasan_save_track+0x18/0x40
[   23.358461]  kasan_save_alloc_info+0x3b/0x50
[   23.358830]  __kasan_kmalloc+0xb7/0xc0
[   23.359285]  __kmalloc_cache_noprof+0x168/0x350
[   23.359705]  kasan_atomics+0x96/0x310
[   23.360253]  kunit_try_run_case+0x1a6/0x480
[   23.360641]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   23.361213]  kthread+0x257/0x310
[   23.361601]  ret_from_fork+0x41/0x80
[   23.362008]  ret_from_fork_asm+0x1a/0x30
[   23.362361] 
[   23.362588] The buggy address belongs to the object at ffff888102314e80
[   23.362588]  which belongs to the cache kmalloc-64 of size 64
[   23.363612] The buggy address is located 0 bytes to the right of
[   23.363612]  allocated 48-byte region [ffff888102314e80, ffff888102314eb0)
[   23.364441] 
[   23.364676] The buggy address belongs to the physical page:
[   23.365184] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102314
[   23.365801] flags: 0x200000000000000(node=0|zone=2)
[   23.366427] page_type: f5(slab)
[   23.366914] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   23.367553] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   23.368203] page dumped because: kasan: bad access detected
[   23.369566] 
[   23.369780] Memory state around the buggy address:
[   23.370258]  ffff888102314d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.370881]  ffff888102314e00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.371466] >ffff888102314e80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   23.372255]                                      ^
[   23.372616]  ffff888102314f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.373297]  ffff888102314f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.373941] ==================================================================
[   24.515951] ==================================================================
[   24.516572] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x218b/0x5450
[   24.517182] Write of size 8 at addr ffff888102314eb0 by task kunit_try_catch/270
[   24.517775] 
[   24.518077] CPU: 1 UID: 0 PID: 270 Comm: kunit_try_catch Tainted: G    B            N 6.12.33-rc1 #1
[   24.518182] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.518222] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   24.518305] Call Trace:
[   24.518357]  <TASK>
[   24.518408]  dump_stack_lvl+0x73/0xb0
[   24.518531]  print_report+0xd1/0x640
[   24.518609]  ? __virt_addr_valid+0x1db/0x2d0
[   24.518690]  ? kasan_atomics_helper+0x218b/0x5450
[   24.518766]  ? kasan_complete_mode_report_info+0x2a/0x200
[   24.518893]  ? kasan_atomics_helper+0x218b/0x5450
[   24.518997]  kasan_report+0x140/0x180
[   24.519110]  ? kasan_atomics_helper+0x218b/0x5450
[   24.519215]  kasan_check_range+0x10c/0x1c0
[   24.519333]  __kasan_check_write+0x18/0x20
[   24.519408]  kasan_atomics_helper+0x218b/0x5450
[   24.519485]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   24.519568]  ? __kmalloc_cache_noprof+0x168/0x350
[   24.519642]  ? trace_hardirqs_on+0x37/0xe0
[   24.519735]  kasan_atomics+0x1dd/0x310
[   24.519808]  ? __pfx_kasan_atomics+0x10/0x10
[   24.519967]  ? __pfx_read_tsc+0x10/0x10
[   24.520040]  ? ktime_get_ts64+0x84/0x230
[   24.520169]  kunit_try_run_case+0x1a6/0x480
[   24.520271]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.520342]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   24.520390]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   24.520430]  ? __kthread_parkme+0x82/0x160
[   24.520460]  ? preempt_count_sub+0x50/0x80
[   24.520492]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.520522]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   24.520560]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.520598]  kthread+0x257/0x310
[   24.520624]  ? __pfx_kthread+0x10/0x10
[   24.520651]  ret_from_fork+0x41/0x80
[   24.520680]  ? __pfx_kthread+0x10/0x10
[   24.520707]  ret_from_fork_asm+0x1a/0x30
[   24.520748]  </TASK>
[   24.520763] 
[   24.534488] Allocated by task 270:
[   24.535036]  kasan_save_stack+0x45/0x70
[   24.535492]  kasan_save_track+0x18/0x40
[   24.536104]  kasan_save_alloc_info+0x3b/0x50
[   24.536640]  __kasan_kmalloc+0xb7/0xc0
[   24.539582]  __kmalloc_cache_noprof+0x168/0x350
[   24.540002]  kasan_atomics+0x96/0x310
[   24.541668]  kunit_try_run_case+0x1a6/0x480
[   24.542202]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.543024]  kthread+0x257/0x310
[   24.543352]  ret_from_fork+0x41/0x80
[   24.543604]  ret_from_fork_asm+0x1a/0x30
[   24.544977] 
[   24.545640] The buggy address belongs to the object at ffff888102314e80
[   24.545640]  which belongs to the cache kmalloc-64 of size 64
[   24.546645] The buggy address is located 0 bytes to the right of
[   24.546645]  allocated 48-byte region [ffff888102314e80, ffff888102314eb0)
[   24.547297] 
[   24.548469] The buggy address belongs to the physical page:
[   24.549529] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102314
[   24.550405] flags: 0x200000000000000(node=0|zone=2)
[   24.550701] page_type: f5(slab)
[   24.550927] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   24.552197] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   24.553086] page dumped because: kasan: bad access detected
[   24.555142] 
[   24.555393] Memory state around the buggy address:
[   24.556075]  ffff888102314d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.556689]  ffff888102314e00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.557342] >ffff888102314e80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   24.557993]                                      ^
[   24.558540]  ffff888102314f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.559283]  ffff888102314f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.559955] ==================================================================
[   23.797190] ==================================================================
[   23.797975] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x18b2/0x5450
[   23.798643] Write of size 8 at addr ffff888102314eb0 by task kunit_try_catch/270
[   23.799133] 
[   23.799392] CPU: 1 UID: 0 PID: 270 Comm: kunit_try_catch Tainted: G    B            N 6.12.33-rc1 #1
[   23.799511] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.799550] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   23.799616] Call Trace:
[   23.799673]  <TASK>
[   23.799761]  dump_stack_lvl+0x73/0xb0
[   23.799871]  print_report+0xd1/0x640
[   23.799946]  ? __virt_addr_valid+0x1db/0x2d0
[   23.800028]  ? kasan_atomics_helper+0x18b2/0x5450
[   23.800106]  ? kasan_complete_mode_report_info+0x2a/0x200
[   23.800185]  ? kasan_atomics_helper+0x18b2/0x5450
[   23.800288]  kasan_report+0x140/0x180
[   23.800370]  ? kasan_atomics_helper+0x18b2/0x5450
[   23.800469]  kasan_check_range+0x10c/0x1c0
[   23.800545]  __kasan_check_write+0x18/0x20
[   23.800618]  kasan_atomics_helper+0x18b2/0x5450
[   23.800739]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   23.800863]  ? __kmalloc_cache_noprof+0x168/0x350
[   23.800947]  ? trace_hardirqs_on+0x37/0xe0
[   23.801034]  kasan_atomics+0x1dd/0x310
[   23.801109]  ? __pfx_kasan_atomics+0x10/0x10
[   23.801182]  ? __pfx_read_tsc+0x10/0x10
[   23.801272]  ? ktime_get_ts64+0x84/0x230
[   23.801356]  kunit_try_run_case+0x1a6/0x480
[   23.801436]  ? __pfx_kunit_try_run_case+0x10/0x10
[   23.801504]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   23.801576]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   23.801655]  ? __kthread_parkme+0x82/0x160
[   23.801723]  ? preempt_count_sub+0x50/0x80
[   23.801804]  ? __pfx_kunit_try_run_case+0x10/0x10
[   23.801896]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   23.801939]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   23.801980]  kthread+0x257/0x310
[   23.802007]  ? __pfx_kthread+0x10/0x10
[   23.802034]  ret_from_fork+0x41/0x80
[   23.802066]  ? __pfx_kthread+0x10/0x10
[   23.802093]  ret_from_fork_asm+0x1a/0x30
[   23.802135]  </TASK>
[   23.802149] 
[   23.820288] Allocated by task 270:
[   23.821550]  kasan_save_stack+0x45/0x70
[   23.822430]  kasan_save_track+0x18/0x40
[   23.822957]  kasan_save_alloc_info+0x3b/0x50
[   23.823425]  __kasan_kmalloc+0xb7/0xc0
[   23.823738]  __kmalloc_cache_noprof+0x168/0x350
[   23.824769]  kasan_atomics+0x96/0x310
[   23.825504]  kunit_try_run_case+0x1a6/0x480
[   23.825992]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   23.826751]  kthread+0x257/0x310
[   23.827216]  ret_from_fork+0x41/0x80
[   23.827580]  ret_from_fork_asm+0x1a/0x30
[   23.828328] 
[   23.828970] The buggy address belongs to the object at ffff888102314e80
[   23.828970]  which belongs to the cache kmalloc-64 of size 64
[   23.830263] The buggy address is located 0 bytes to the right of
[   23.830263]  allocated 48-byte region [ffff888102314e80, ffff888102314eb0)
[   23.831666] 
[   23.831852] The buggy address belongs to the physical page:
[   23.832472] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102314
[   23.833441] flags: 0x200000000000000(node=0|zone=2)
[   23.834456] page_type: f5(slab)
[   23.834780] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   23.835701] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   23.836422] page dumped because: kasan: bad access detected
[   23.836845] 
[   23.837013] Memory state around the buggy address:
[   23.837381]  ffff888102314d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.838346]  ffff888102314e00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.838805] >ffff888102314e80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   23.839457]                                      ^
[   23.839918]  ffff888102314f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.841024]  ffff888102314f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.841863] ==================================================================
[   24.640055] ==================================================================
[   24.641484] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x5117/0x5450
[   24.642300] Read of size 8 at addr ffff888102314eb0 by task kunit_try_catch/270
[   24.642787] 
[   24.642967] CPU: 1 UID: 0 PID: 270 Comm: kunit_try_catch Tainted: G    B            N 6.12.33-rc1 #1
[   24.643030] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.643048] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   24.643080] Call Trace:
[   24.643106]  <TASK>
[   24.643129]  dump_stack_lvl+0x73/0xb0
[   24.643170]  print_report+0xd1/0x640
[   24.643206]  ? __virt_addr_valid+0x1db/0x2d0
[   24.643291]  ? kasan_atomics_helper+0x5117/0x5450
[   24.643370]  ? kasan_complete_mode_report_info+0x2a/0x200
[   24.643452]  ? kasan_atomics_helper+0x5117/0x5450
[   24.643534]  kasan_report+0x140/0x180
[   24.643620]  ? kasan_atomics_helper+0x5117/0x5450
[   24.643715]  __asan_report_load8_noabort+0x18/0x20
[   24.643797]  kasan_atomics_helper+0x5117/0x5450
[   24.644324]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   24.644380]  ? __kmalloc_cache_noprof+0x168/0x350
[   24.644416]  ? trace_hardirqs_on+0x37/0xe0
[   24.644460]  kasan_atomics+0x1dd/0x310
[   24.644490]  ? __pfx_kasan_atomics+0x10/0x10
[   24.644521]  ? __pfx_read_tsc+0x10/0x10
[   24.644549]  ? ktime_get_ts64+0x84/0x230
[   24.644585]  kunit_try_run_case+0x1a6/0x480
[   24.644619]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.644650]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   24.644680]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   24.644717]  ? __kthread_parkme+0x82/0x160
[   24.644746]  ? preempt_count_sub+0x50/0x80
[   24.644778]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.644807]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   24.644900]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.644942]  kthread+0x257/0x310
[   24.644970]  ? __pfx_kthread+0x10/0x10
[   24.644997]  ret_from_fork+0x41/0x80
[   24.645027]  ? __pfx_kthread+0x10/0x10
[   24.645054]  ret_from_fork_asm+0x1a/0x30
[   24.645097]  </TASK>
[   24.645112] 
[   24.658667] Allocated by task 270:
[   24.659060]  kasan_save_stack+0x45/0x70
[   24.659703]  kasan_save_track+0x18/0x40
[   24.660024]  kasan_save_alloc_info+0x3b/0x50
[   24.660384]  __kasan_kmalloc+0xb7/0xc0
[   24.660800]  __kmalloc_cache_noprof+0x168/0x350
[   24.661342]  kasan_atomics+0x96/0x310
[   24.661755]  kunit_try_run_case+0x1a6/0x480
[   24.662421]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.663020]  kthread+0x257/0x310
[   24.663411]  ret_from_fork+0x41/0x80
[   24.663784]  ret_from_fork_asm+0x1a/0x30
[   24.664242] 
[   24.664472] The buggy address belongs to the object at ffff888102314e80
[   24.664472]  which belongs to the cache kmalloc-64 of size 64
[   24.665455] The buggy address is located 0 bytes to the right of
[   24.665455]  allocated 48-byte region [ffff888102314e80, ffff888102314eb0)
[   24.666524] 
[   24.666789] The buggy address belongs to the physical page:
[   24.668253] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102314
[   24.669765] flags: 0x200000000000000(node=0|zone=2)
[   24.670285] page_type: f5(slab)
[   24.670698] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   24.671308] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   24.671907] page dumped because: kasan: bad access detected
[   24.672488] 
[   24.672727] Memory state around the buggy address:
[   24.673176]  ffff888102314d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.673889]  ffff888102314e00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.674516] >ffff888102314e80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   24.675171]                                      ^
[   24.675579]  ffff888102314f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.676321]  ffff888102314f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.676971] ==================================================================
[   23.081511] ==================================================================
[   23.082797] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a1e/0x5450
[   23.084048] Read of size 4 at addr ffff888102314eb0 by task kunit_try_catch/270
[   23.084561] 
[   23.084675] CPU: 1 UID: 0 PID: 270 Comm: kunit_try_catch Tainted: G    B            N 6.12.33-rc1 #1
[   23.084740] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.084757] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   23.084789] Call Trace:
[   23.084830]  <TASK>
[   23.085085]  dump_stack_lvl+0x73/0xb0
[   23.085267]  print_report+0xd1/0x640
[   23.085371]  ? __virt_addr_valid+0x1db/0x2d0
[   23.085458]  ? kasan_atomics_helper+0x4a1e/0x5450
[   23.085536]  ? kasan_complete_mode_report_info+0x2a/0x200
[   23.085612]  ? kasan_atomics_helper+0x4a1e/0x5450
[   23.085671]  kasan_report+0x140/0x180
[   23.085712]  ? kasan_atomics_helper+0x4a1e/0x5450
[   23.085754]  __asan_report_load4_noabort+0x18/0x20
[   23.085789]  kasan_atomics_helper+0x4a1e/0x5450
[   23.085865]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   23.085910]  ? __kmalloc_cache_noprof+0x168/0x350
[   23.085943]  ? trace_hardirqs_on+0x37/0xe0
[   23.085984]  kasan_atomics+0x1dd/0x310
[   23.086014]  ? __pfx_kasan_atomics+0x10/0x10
[   23.086046]  ? __pfx_read_tsc+0x10/0x10
[   23.086075]  ? ktime_get_ts64+0x84/0x230
[   23.086112]  kunit_try_run_case+0x1a6/0x480
[   23.086146]  ? __pfx_kunit_try_run_case+0x10/0x10
[   23.086177]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   23.086208]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   23.086293]  ? __kthread_parkme+0x82/0x160
[   23.086338]  ? preempt_count_sub+0x50/0x80
[   23.086372]  ? __pfx_kunit_try_run_case+0x10/0x10
[   23.086402]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   23.086441]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   23.086481]  kthread+0x257/0x310
[   23.086508]  ? __pfx_kthread+0x10/0x10
[   23.086535]  ret_from_fork+0x41/0x80
[   23.086566]  ? __pfx_kthread+0x10/0x10
[   23.086592]  ret_from_fork_asm+0x1a/0x30
[   23.086635]  </TASK>
[   23.086650] 
[   23.100305] Allocated by task 270:
[   23.100722]  kasan_save_stack+0x45/0x70
[   23.101220]  kasan_save_track+0x18/0x40
[   23.101587]  kasan_save_alloc_info+0x3b/0x50
[   23.101966]  __kasan_kmalloc+0xb7/0xc0
[   23.102435]  __kmalloc_cache_noprof+0x168/0x350
[   23.102967]  kasan_atomics+0x96/0x310
[   23.103395]  kunit_try_run_case+0x1a6/0x480
[   23.103941]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   23.104514]  kthread+0x257/0x310
[   23.104942]  ret_from_fork+0x41/0x80
[   23.105270]  ret_from_fork_asm+0x1a/0x30
[   23.105695] 
[   23.106029] The buggy address belongs to the object at ffff888102314e80
[   23.106029]  which belongs to the cache kmalloc-64 of size 64
[   23.106994] The buggy address is located 0 bytes to the right of
[   23.106994]  allocated 48-byte region [ffff888102314e80, ffff888102314eb0)
[   23.108927] 
[   23.109517] The buggy address belongs to the physical page:
[   23.110349] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102314
[   23.111054] flags: 0x200000000000000(node=0|zone=2)
[   23.111434] page_type: f5(slab)
[   23.111771] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   23.112605] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   23.113127] page dumped because: kasan: bad access detected
[   23.113748] 
[   23.114217] Memory state around the buggy address:
[   23.114686]  ffff888102314d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.115557]  ffff888102314e00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.116323] >ffff888102314e80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   23.117265]                                      ^
[   23.117983]  ffff888102314f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.118618]  ffff888102314f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.119195] ==================================================================
[   22.322153] ==================================================================
[   22.323481] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x698/0x5450
[   22.324209] Write of size 4 at addr ffff888102314eb0 by task kunit_try_catch/270
[   22.324966] 
[   22.325264] CPU: 1 UID: 0 PID: 270 Comm: kunit_try_catch Tainted: G    B            N 6.12.33-rc1 #1
[   22.325428] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.325474] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   22.325540] Call Trace:
[   22.325597]  <TASK>
[   22.325654]  dump_stack_lvl+0x73/0xb0
[   22.325793]  print_report+0xd1/0x640
[   22.325917]  ? __virt_addr_valid+0x1db/0x2d0
[   22.326003]  ? kasan_atomics_helper+0x698/0x5450
[   22.326118]  ? kasan_complete_mode_report_info+0x2a/0x200
[   22.326203]  ? kasan_atomics_helper+0x698/0x5450
[   22.326296]  kasan_report+0x140/0x180
[   22.326338]  ? kasan_atomics_helper+0x698/0x5450
[   22.326379]  kasan_check_range+0x10c/0x1c0
[   22.326409]  __kasan_check_write+0x18/0x20
[   22.326458]  kasan_atomics_helper+0x698/0x5450
[   22.326521]  ? kasan_save_alloc_info+0x3b/0x50
[   22.326553]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   22.326589]  ? __kmalloc_cache_noprof+0x168/0x350
[   22.326620]  ? trace_hardirqs_on+0x37/0xe0
[   22.326660]  kasan_atomics+0x1dd/0x310
[   22.326690]  ? __pfx_kasan_atomics+0x10/0x10
[   22.326721]  ? __pfx_read_tsc+0x10/0x10
[   22.326749]  ? ktime_get_ts64+0x84/0x230
[   22.326785]  kunit_try_run_case+0x1a6/0x480
[   22.326846]  ? __pfx_kunit_try_run_case+0x10/0x10
[   22.326898]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   22.326932]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   22.326970]  ? __kthread_parkme+0x82/0x160
[   22.327000]  ? preempt_count_sub+0x50/0x80
[   22.327033]  ? __pfx_kunit_try_run_case+0x10/0x10
[   22.327061]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   22.327099]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   22.327136]  kthread+0x257/0x310
[   22.327161]  ? __pfx_kthread+0x10/0x10
[   22.327188]  ret_from_fork+0x41/0x80
[   22.327216]  ? __pfx_kthread+0x10/0x10
[   22.327286]  ret_from_fork_asm+0x1a/0x30
[   22.327328]  </TASK>
[   22.327345] 
[   22.341352] Allocated by task 270:
[   22.341803]  kasan_save_stack+0x45/0x70
[   22.342311]  kasan_save_track+0x18/0x40
[   22.342763]  kasan_save_alloc_info+0x3b/0x50
[   22.343298]  __kasan_kmalloc+0xb7/0xc0
[   22.343732]  __kmalloc_cache_noprof+0x168/0x350
[   22.344240]  kasan_atomics+0x96/0x310
[   22.344650]  kunit_try_run_case+0x1a6/0x480
[   22.345121]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   22.345543]  kthread+0x257/0x310
[   22.345841]  ret_from_fork+0x41/0x80
[   22.346150]  ret_from_fork_asm+0x1a/0x30
[   22.346603] 
[   22.346870] The buggy address belongs to the object at ffff888102314e80
[   22.346870]  which belongs to the cache kmalloc-64 of size 64
[   22.348194] The buggy address is located 0 bytes to the right of
[   22.348194]  allocated 48-byte region [ffff888102314e80, ffff888102314eb0)
[   22.348943] 
[   22.349300] The buggy address belongs to the physical page:
[   22.349840] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102314
[   22.351976] flags: 0x200000000000000(node=0|zone=2)
[   22.352508] page_type: f5(slab)
[   22.352897] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   22.353771] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   22.354717] page dumped because: kasan: bad access detected
[   22.355324] 
[   22.355545] Memory state around the buggy address:
[   22.356057]  ffff888102314d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.356743]  ffff888102314e00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.357190] >ffff888102314e80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   22.357865]                                      ^
[   22.358383]  ffff888102314f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.358950]  ffff888102314f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.359645] ==================================================================
[   23.160126] ==================================================================
[   23.161403] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a04/0x5450
[   23.162285] Read of size 4 at addr ffff888102314eb0 by task kunit_try_catch/270
[   23.163115] 
[   23.163480] CPU: 1 UID: 0 PID: 270 Comm: kunit_try_catch Tainted: G    B            N 6.12.33-rc1 #1
[   23.163650] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.163716] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   23.163781] Call Trace:
[   23.163833]  <TASK>
[   23.163887]  dump_stack_lvl+0x73/0xb0
[   23.163967]  print_report+0xd1/0x640
[   23.164068]  ? __virt_addr_valid+0x1db/0x2d0
[   23.164195]  ? kasan_atomics_helper+0x4a04/0x5450
[   23.164315]  ? kasan_complete_mode_report_info+0x2a/0x200
[   23.164399]  ? kasan_atomics_helper+0x4a04/0x5450
[   23.164568]  kasan_report+0x140/0x180
[   23.164654]  ? kasan_atomics_helper+0x4a04/0x5450
[   23.164747]  __asan_report_load4_noabort+0x18/0x20
[   23.164827]  kasan_atomics_helper+0x4a04/0x5450
[   23.164912]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   23.164996]  ? __kmalloc_cache_noprof+0x168/0x350
[   23.165129]  ? trace_hardirqs_on+0x37/0xe0
[   23.165309]  kasan_atomics+0x1dd/0x310
[   23.165417]  ? __pfx_kasan_atomics+0x10/0x10
[   23.165492]  ? __pfx_read_tsc+0x10/0x10
[   23.165561]  ? ktime_get_ts64+0x84/0x230
[   23.165610]  kunit_try_run_case+0x1a6/0x480
[   23.165647]  ? __pfx_kunit_try_run_case+0x10/0x10
[   23.165678]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   23.165711]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   23.165751]  ? __kthread_parkme+0x82/0x160
[   23.165780]  ? preempt_count_sub+0x50/0x80
[   23.165814]  ? __pfx_kunit_try_run_case+0x10/0x10
[   23.165887]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   23.165931]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   23.165970]  kthread+0x257/0x310
[   23.165998]  ? __pfx_kthread+0x10/0x10
[   23.166025]  ret_from_fork+0x41/0x80
[   23.166055]  ? __pfx_kthread+0x10/0x10
[   23.166082]  ret_from_fork_asm+0x1a/0x30
[   23.166123]  </TASK>
[   23.166138] 
[   23.180472] Allocated by task 270:
[   23.180933]  kasan_save_stack+0x45/0x70
[   23.181514]  kasan_save_track+0x18/0x40
[   23.182332]  kasan_save_alloc_info+0x3b/0x50
[   23.182866]  __kasan_kmalloc+0xb7/0xc0
[   23.183351]  __kmalloc_cache_noprof+0x168/0x350
[   23.183833]  kasan_atomics+0x96/0x310
[   23.184248]  kunit_try_run_case+0x1a6/0x480
[   23.184582]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   23.185019]  kthread+0x257/0x310
[   23.185423]  ret_from_fork+0x41/0x80
[   23.185993]  ret_from_fork_asm+0x1a/0x30
[   23.186510] 
[   23.186829] The buggy address belongs to the object at ffff888102314e80
[   23.186829]  which belongs to the cache kmalloc-64 of size 64
[   23.187683] The buggy address is located 0 bytes to the right of
[   23.187683]  allocated 48-byte region [ffff888102314e80, ffff888102314eb0)
[   23.188840] 
[   23.189217] The buggy address belongs to the physical page:
[   23.189908] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102314
[   23.190492] flags: 0x200000000000000(node=0|zone=2)
[   23.190847] page_type: f5(slab)
[   23.191311] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   23.192009] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   23.192902] page dumped because: kasan: bad access detected
[   23.193497] 
[   23.193757] Memory state around the buggy address:
[   23.194311]  ffff888102314d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.194757]  ffff888102314e00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.195332] >ffff888102314e80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   23.196003]                                      ^
[   23.196551]  ffff888102314f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.197325]  ffff888102314f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.198021] ==================================================================
[   23.414840] ==================================================================
[   23.415800] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4eb0/0x5450
[   23.416411] Read of size 8 at addr ffff888102314eb0 by task kunit_try_catch/270
[   23.417399] 
[   23.417676] CPU: 1 UID: 0 PID: 270 Comm: kunit_try_catch Tainted: G    B            N 6.12.33-rc1 #1
[   23.417838] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.417914] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   23.417982] Call Trace:
[   23.418039]  <TASK>
[   23.418091]  dump_stack_lvl+0x73/0xb0
[   23.418179]  print_report+0xd1/0x640
[   23.418281]  ? __virt_addr_valid+0x1db/0x2d0
[   23.418366]  ? kasan_atomics_helper+0x4eb0/0x5450
[   23.418462]  ? kasan_complete_mode_report_info+0x2a/0x200
[   23.418574]  ? kasan_atomics_helper+0x4eb0/0x5450
[   23.418653]  kasan_report+0x140/0x180
[   23.418736]  ? kasan_atomics_helper+0x4eb0/0x5450
[   23.418829]  __asan_report_load8_noabort+0x18/0x20
[   23.418938]  kasan_atomics_helper+0x4eb0/0x5450
[   23.419069]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   23.419186]  ? __kmalloc_cache_noprof+0x168/0x350
[   23.419293]  ? trace_hardirqs_on+0x37/0xe0
[   23.419386]  kasan_atomics+0x1dd/0x310
[   23.419447]  ? __pfx_kasan_atomics+0x10/0x10
[   23.419482]  ? __pfx_read_tsc+0x10/0x10
[   23.419510]  ? ktime_get_ts64+0x84/0x230
[   23.419548]  kunit_try_run_case+0x1a6/0x480
[   23.419583]  ? __pfx_kunit_try_run_case+0x10/0x10
[   23.419613]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   23.419644]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   23.419681]  ? __kthread_parkme+0x82/0x160
[   23.419710]  ? preempt_count_sub+0x50/0x80
[   23.419742]  ? __pfx_kunit_try_run_case+0x10/0x10
[   23.419772]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   23.419810]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   23.419892]  kthread+0x257/0x310
[   23.419925]  ? __pfx_kthread+0x10/0x10
[   23.419956]  ret_from_fork+0x41/0x80
[   23.419989]  ? __pfx_kthread+0x10/0x10
[   23.420019]  ret_from_fork_asm+0x1a/0x30
[   23.420062]  </TASK>
[   23.420077] 
[   23.435187] Allocated by task 270:
[   23.435643]  kasan_save_stack+0x45/0x70
[   23.436267]  kasan_save_track+0x18/0x40
[   23.436733]  kasan_save_alloc_info+0x3b/0x50
[   23.437326]  __kasan_kmalloc+0xb7/0xc0
[   23.437771]  __kmalloc_cache_noprof+0x168/0x350
[   23.438287]  kasan_atomics+0x96/0x310
[   23.438598]  kunit_try_run_case+0x1a6/0x480
[   23.439251]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   23.440078]  kthread+0x257/0x310
[   23.440536]  ret_from_fork+0x41/0x80
[   23.440994]  ret_from_fork_asm+0x1a/0x30
[   23.441418] 
[   23.441671] The buggy address belongs to the object at ffff888102314e80
[   23.441671]  which belongs to the cache kmalloc-64 of size 64
[   23.442855] The buggy address is located 0 bytes to the right of
[   23.442855]  allocated 48-byte region [ffff888102314e80, ffff888102314eb0)
[   23.443947] 
[   23.444133] The buggy address belongs to the physical page:
[   23.444671] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102314
[   23.445532] flags: 0x200000000000000(node=0|zone=2)
[   23.446139] page_type: f5(slab)
[   23.446557] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   23.447386] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   23.448174] page dumped because: kasan: bad access detected
[   23.448738] 
[   23.449067] Memory state around the buggy address:
[   23.449579]  ffff888102314d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.450321]  ffff888102314e00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.451105] >ffff888102314e80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   23.451792]                                      ^
[   23.452387]  ffff888102314f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.453068]  ffff888102314f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.453751] ==================================================================
[   22.492920] ==================================================================
[   22.493535] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x8fa/0x5450
[   22.494444] Write of size 4 at addr ffff888102314eb0 by task kunit_try_catch/270
[   22.495271] 
[   22.495490] CPU: 1 UID: 0 PID: 270 Comm: kunit_try_catch Tainted: G    B            N 6.12.33-rc1 #1
[   22.495608] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.495645] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   22.495703] Call Trace:
[   22.495755]  <TASK>
[   22.495894]  dump_stack_lvl+0x73/0xb0
[   22.496044]  print_report+0xd1/0x640
[   22.496181]  ? __virt_addr_valid+0x1db/0x2d0
[   22.496348]  ? kasan_atomics_helper+0x8fa/0x5450
[   22.496469]  ? kasan_complete_mode_report_info+0x2a/0x200
[   22.496559]  ? kasan_atomics_helper+0x8fa/0x5450
[   22.496643]  kasan_report+0x140/0x180
[   22.496725]  ? kasan_atomics_helper+0x8fa/0x5450
[   22.496897]  kasan_check_range+0x10c/0x1c0
[   22.496985]  __kasan_check_write+0x18/0x20
[   22.497060]  kasan_atomics_helper+0x8fa/0x5450
[   22.497121]  ? kasan_save_alloc_info+0x3b/0x50
[   22.497157]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   22.497196]  ? __kmalloc_cache_noprof+0x168/0x350
[   22.497256]  ? trace_hardirqs_on+0x37/0xe0
[   22.497302]  kasan_atomics+0x1dd/0x310
[   22.497334]  ? __pfx_kasan_atomics+0x10/0x10
[   22.497367]  ? __pfx_read_tsc+0x10/0x10
[   22.497396]  ? ktime_get_ts64+0x84/0x230
[   22.497432]  kunit_try_run_case+0x1a6/0x480
[   22.497465]  ? __pfx_kunit_try_run_case+0x10/0x10
[   22.497494]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   22.497525]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   22.497562]  ? __kthread_parkme+0x82/0x160
[   22.497590]  ? preempt_count_sub+0x50/0x80
[   22.497621]  ? __pfx_kunit_try_run_case+0x10/0x10
[   22.497649]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   22.497686]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   22.497725]  kthread+0x257/0x310
[   22.497751]  ? __pfx_kthread+0x10/0x10
[   22.497778]  ret_from_fork+0x41/0x80
[   22.497807]  ? __pfx_kthread+0x10/0x10
[   22.497883]  ret_from_fork_asm+0x1a/0x30
[   22.497928]  </TASK>
[   22.497943] 
[   22.517830] Allocated by task 270:
[   22.518255]  kasan_save_stack+0x45/0x70
[   22.518600]  kasan_save_track+0x18/0x40
[   22.519660]  kasan_save_alloc_info+0x3b/0x50
[   22.520194]  __kasan_kmalloc+0xb7/0xc0
[   22.520558]  __kmalloc_cache_noprof+0x168/0x350
[   22.521582]  kasan_atomics+0x96/0x310
[   22.521889]  kunit_try_run_case+0x1a6/0x480
[   22.522612]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   22.523301]  kthread+0x257/0x310
[   22.523607]  ret_from_fork+0x41/0x80
[   22.524007]  ret_from_fork_asm+0x1a/0x30
[   22.524847] 
[   22.525058] The buggy address belongs to the object at ffff888102314e80
[   22.525058]  which belongs to the cache kmalloc-64 of size 64
[   22.526184] The buggy address is located 0 bytes to the right of
[   22.526184]  allocated 48-byte region [ffff888102314e80, ffff888102314eb0)
[   22.527296] 
[   22.527588] The buggy address belongs to the physical page:
[   22.528152] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102314
[   22.529176] flags: 0x200000000000000(node=0|zone=2)
[   22.529573] page_type: f5(slab)
[   22.529910] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   22.531039] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   22.531606] page dumped because: kasan: bad access detected
[   22.532857] 
[   22.533028] Memory state around the buggy address:
[   22.533352]  ffff888102314d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.534318]  ffff888102314e00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.534843] >ffff888102314e80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   22.535369]                                      ^
[   22.535735]  ffff888102314f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.537388]  ffff888102314f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.537886] ==================================================================
[   23.709289] ==================================================================
[   23.710134] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1780/0x5450
[   23.710850] Write of size 8 at addr ffff888102314eb0 by task kunit_try_catch/270
[   23.711493] 
[   23.711743] CPU: 1 UID: 0 PID: 270 Comm: kunit_try_catch Tainted: G    B            N 6.12.33-rc1 #1
[   23.711879] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.711918] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   23.711982] Call Trace:
[   23.712032]  <TASK>
[   23.712082]  dump_stack_lvl+0x73/0xb0
[   23.712164]  print_report+0xd1/0x640
[   23.712262]  ? __virt_addr_valid+0x1db/0x2d0
[   23.712347]  ? kasan_atomics_helper+0x1780/0x5450
[   23.712427]  ? kasan_complete_mode_report_info+0x2a/0x200
[   23.712552]  ? kasan_atomics_helper+0x1780/0x5450
[   23.712674]  kasan_report+0x140/0x180
[   23.712765]  ? kasan_atomics_helper+0x1780/0x5450
[   23.712929]  kasan_check_range+0x10c/0x1c0
[   23.713026]  __kasan_check_write+0x18/0x20
[   23.713098]  kasan_atomics_helper+0x1780/0x5450
[   23.713182]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   23.713287]  ? __kmalloc_cache_noprof+0x168/0x350
[   23.713364]  ? trace_hardirqs_on+0x37/0xe0
[   23.713491]  kasan_atomics+0x1dd/0x310
[   23.713571]  ? __pfx_kasan_atomics+0x10/0x10
[   23.713646]  ? __pfx_read_tsc+0x10/0x10
[   23.713755]  ? ktime_get_ts64+0x84/0x230
[   23.713842]  kunit_try_run_case+0x1a6/0x480
[   23.713958]  ? __pfx_kunit_try_run_case+0x10/0x10
[   23.714030]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   23.714104]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   23.714243]  ? __kthread_parkme+0x82/0x160
[   23.714321]  ? preempt_count_sub+0x50/0x80
[   23.714402]  ? __pfx_kunit_try_run_case+0x10/0x10
[   23.714451]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   23.714492]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   23.714532]  kthread+0x257/0x310
[   23.714559]  ? __pfx_kthread+0x10/0x10
[   23.714587]  ret_from_fork+0x41/0x80
[   23.714617]  ? __pfx_kthread+0x10/0x10
[   23.714644]  ret_from_fork_asm+0x1a/0x30
[   23.714686]  </TASK>
[   23.714701] 
[   23.733717] Allocated by task 270:
[   23.734435]  kasan_save_stack+0x45/0x70
[   23.735167]  kasan_save_track+0x18/0x40
[   23.735550]  kasan_save_alloc_info+0x3b/0x50
[   23.736168]  __kasan_kmalloc+0xb7/0xc0
[   23.736595]  __kmalloc_cache_noprof+0x168/0x350
[   23.737451]  kasan_atomics+0x96/0x310
[   23.737772]  kunit_try_run_case+0x1a6/0x480
[   23.738490]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   23.739075]  kthread+0x257/0x310
[   23.739379]  ret_from_fork+0x41/0x80
[   23.739731]  ret_from_fork_asm+0x1a/0x30
[   23.740673] 
[   23.740863] The buggy address belongs to the object at ffff888102314e80
[   23.740863]  which belongs to the cache kmalloc-64 of size 64
[   23.742267] The buggy address is located 0 bytes to the right of
[   23.742267]  allocated 48-byte region [ffff888102314e80, ffff888102314eb0)
[   23.743408] 
[   23.743639] The buggy address belongs to the physical page:
[   23.745882] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102314
[   23.746383] flags: 0x200000000000000(node=0|zone=2)
[   23.746706] page_type: f5(slab)
[   23.746966] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   23.747387] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   23.747761] page dumped because: kasan: bad access detected
[   23.748048] 
[   23.748212] Memory state around the buggy address:
[   23.751144]  ffff888102314d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.752951]  ffff888102314e00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.754657] >ffff888102314e80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   23.756142]                                      ^
[   23.756560]  ffff888102314f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.757167]  ffff888102314f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.757791] ==================================================================
[   24.222899] ==================================================================
[   24.223623] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1eab/0x5450
[   24.224213] Write of size 8 at addr ffff888102314eb0 by task kunit_try_catch/270
[   24.224815] 
[   24.225083] CPU: 1 UID: 0 PID: 270 Comm: kunit_try_catch Tainted: G    B            N 6.12.33-rc1 #1
[   24.225207] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.225264] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   24.225331] Call Trace:
[   24.225390]  <TASK>
[   24.225448]  dump_stack_lvl+0x73/0xb0
[   24.225543]  print_report+0xd1/0x640
[   24.225631]  ? __virt_addr_valid+0x1db/0x2d0
[   24.225711]  ? kasan_atomics_helper+0x1eab/0x5450
[   24.225785]  ? kasan_complete_mode_report_info+0x2a/0x200
[   24.225869]  ? kasan_atomics_helper+0x1eab/0x5450
[   24.225955]  kasan_report+0x140/0x180
[   24.226041]  ? kasan_atomics_helper+0x1eab/0x5450
[   24.226137]  kasan_check_range+0x10c/0x1c0
[   24.226218]  __kasan_check_write+0x18/0x20
[   24.226301]  kasan_atomics_helper+0x1eab/0x5450
[   24.226368]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   24.226453]  ? __kmalloc_cache_noprof+0x168/0x350
[   24.226531]  ? trace_hardirqs_on+0x37/0xe0
[   24.226621]  kasan_atomics+0x1dd/0x310
[   24.226698]  ? __pfx_kasan_atomics+0x10/0x10
[   24.226778]  ? __pfx_read_tsc+0x10/0x10
[   24.226849]  ? ktime_get_ts64+0x84/0x230
[   24.226936]  kunit_try_run_case+0x1a6/0x480
[   24.227015]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.227105]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   24.227180]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   24.227293]  ? __kthread_parkme+0x82/0x160
[   24.227371]  ? preempt_count_sub+0x50/0x80
[   24.227450]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.227518]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   24.227600]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.227687]  kthread+0x257/0x310
[   24.227760]  ? __pfx_kthread+0x10/0x10
[   24.227834]  ret_from_fork+0x41/0x80
[   24.227930]  ? __pfx_kthread+0x10/0x10
[   24.228002]  ret_from_fork_asm+0x1a/0x30
[   24.228102]  </TASK>
[   24.228140] 
[   24.240971] Allocated by task 270:
[   24.241368]  kasan_save_stack+0x45/0x70
[   24.241746]  kasan_save_track+0x18/0x40
[   24.242178]  kasan_save_alloc_info+0x3b/0x50
[   24.242633]  __kasan_kmalloc+0xb7/0xc0
[   24.243045]  __kmalloc_cache_noprof+0x168/0x350
[   24.243427]  kasan_atomics+0x96/0x310
[   24.243748]  kunit_try_run_case+0x1a6/0x480
[   24.244180]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.244702]  kthread+0x257/0x310
[   24.245089]  ret_from_fork+0x41/0x80
[   24.245515]  ret_from_fork_asm+0x1a/0x30
[   24.245998] 
[   24.246247] The buggy address belongs to the object at ffff888102314e80
[   24.246247]  which belongs to the cache kmalloc-64 of size 64
[   24.246982] The buggy address is located 0 bytes to the right of
[   24.246982]  allocated 48-byte region [ffff888102314e80, ffff888102314eb0)
[   24.247906] 
[   24.248097] The buggy address belongs to the physical page:
[   24.248759] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102314
[   24.249494] flags: 0x200000000000000(node=0|zone=2)
[   24.250063] page_type: f5(slab)
[   24.250377] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   24.251080] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   24.251684] page dumped because: kasan: bad access detected
[   24.252178] 
[   24.252434] Memory state around the buggy address:
[   24.252865]  ffff888102314d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.253447]  ffff888102314e00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.254050] >ffff888102314e80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   24.254619]                                      ^
[   24.255134]  ffff888102314f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.255605]  ffff888102314f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.256039] ==================================================================
[   23.885385] ==================================================================
[   23.886100] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x19e4/0x5450
[   23.886871] Write of size 8 at addr ffff888102314eb0 by task kunit_try_catch/270
[   23.887941] 
[   23.888248] CPU: 1 UID: 0 PID: 270 Comm: kunit_try_catch Tainted: G    B            N 6.12.33-rc1 #1
[   23.888363] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.888384] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   23.888418] Call Trace:
[   23.888444]  <TASK>
[   23.888467]  dump_stack_lvl+0x73/0xb0
[   23.888531]  print_report+0xd1/0x640
[   23.888907]  ? __virt_addr_valid+0x1db/0x2d0
[   23.888952]  ? kasan_atomics_helper+0x19e4/0x5450
[   23.888988]  ? kasan_complete_mode_report_info+0x2a/0x200
[   23.889025]  ? kasan_atomics_helper+0x19e4/0x5450
[   23.889061]  kasan_report+0x140/0x180
[   23.889097]  ? kasan_atomics_helper+0x19e4/0x5450
[   23.889140]  kasan_check_range+0x10c/0x1c0
[   23.889172]  __kasan_check_write+0x18/0x20
[   23.889203]  kasan_atomics_helper+0x19e4/0x5450
[   23.889267]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   23.889309]  ? __kmalloc_cache_noprof+0x168/0x350
[   23.889340]  ? trace_hardirqs_on+0x37/0xe0
[   23.889378]  kasan_atomics+0x1dd/0x310
[   23.889408]  ? __pfx_kasan_atomics+0x10/0x10
[   23.889439]  ? __pfx_read_tsc+0x10/0x10
[   23.889470]  ? ktime_get_ts64+0x84/0x230
[   23.889508]  kunit_try_run_case+0x1a6/0x480
[   23.889541]  ? __pfx_kunit_try_run_case+0x10/0x10
[   23.889569]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   23.889599]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   23.889635]  ? __kthread_parkme+0x82/0x160
[   23.889664]  ? preempt_count_sub+0x50/0x80
[   23.889695]  ? __pfx_kunit_try_run_case+0x10/0x10
[   23.889724]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   23.889761]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   23.889799]  kthread+0x257/0x310
[   23.889840]  ? __pfx_kthread+0x10/0x10
[   23.889895]  ret_from_fork+0x41/0x80
[   23.889928]  ? __pfx_kthread+0x10/0x10
[   23.889954]  ret_from_fork_asm+0x1a/0x30
[   23.889996]  </TASK>
[   23.890010] 
[   23.904087] Allocated by task 270:
[   23.904563]  kasan_save_stack+0x45/0x70
[   23.905097]  kasan_save_track+0x18/0x40
[   23.905519]  kasan_save_alloc_info+0x3b/0x50
[   23.905855]  __kasan_kmalloc+0xb7/0xc0
[   23.906211]  __kmalloc_cache_noprof+0x168/0x350
[   23.906674]  kasan_atomics+0x96/0x310
[   23.907187]  kunit_try_run_case+0x1a6/0x480
[   23.907608]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   23.908245]  kthread+0x257/0x310
[   23.908615]  ret_from_fork+0x41/0x80
[   23.909139]  ret_from_fork_asm+0x1a/0x30
[   23.909630] 
[   23.909832] The buggy address belongs to the object at ffff888102314e80
[   23.909832]  which belongs to the cache kmalloc-64 of size 64
[   23.910631] The buggy address is located 0 bytes to the right of
[   23.910631]  allocated 48-byte region [ffff888102314e80, ffff888102314eb0)
[   23.911760] 
[   23.911947] The buggy address belongs to the physical page:
[   23.912326] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102314
[   23.913127] flags: 0x200000000000000(node=0|zone=2)
[   23.913638] page_type: f5(slab)
[   23.914006] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   23.914867] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   23.915483] page dumped because: kasan: bad access detected
[   23.915844] 
[   23.916080] Memory state around the buggy address:
[   23.916627]  ffff888102314d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.917504]  ffff888102314e00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.917956] >ffff888102314e80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   23.918486]                                      ^
[   23.918958]  ffff888102314f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.919781]  ffff888102314f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.920472] ==================================================================
[   24.389934] ==================================================================
[   24.390525] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4f9a/0x5450
[   24.391167] Read of size 8 at addr ffff888102314eb0 by task kunit_try_catch/270
[   24.391748] 
[   24.392048] CPU: 1 UID: 0 PID: 270 Comm: kunit_try_catch Tainted: G    B            N 6.12.33-rc1 #1
[   24.392168] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.392207] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   24.392287] Call Trace:
[   24.392340]  <TASK>
[   24.392392]  dump_stack_lvl+0x73/0xb0
[   24.392476]  print_report+0xd1/0x640
[   24.392554]  ? __virt_addr_valid+0x1db/0x2d0
[   24.392638]  ? kasan_atomics_helper+0x4f9a/0x5450
[   24.392717]  ? kasan_complete_mode_report_info+0x2a/0x200
[   24.392795]  ? kasan_atomics_helper+0x4f9a/0x5450
[   24.392927]  kasan_report+0x140/0x180
[   24.393011]  ? kasan_atomics_helper+0x4f9a/0x5450
[   24.393106]  __asan_report_load8_noabort+0x18/0x20
[   24.393189]  kasan_atomics_helper+0x4f9a/0x5450
[   24.393294]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   24.393378]  ? __kmalloc_cache_noprof+0x168/0x350
[   24.393456]  ? trace_hardirqs_on+0x37/0xe0
[   24.393549]  kasan_atomics+0x1dd/0x310
[   24.393629]  ? __pfx_kasan_atomics+0x10/0x10
[   24.393699]  ? __pfx_read_tsc+0x10/0x10
[   24.393768]  ? ktime_get_ts64+0x84/0x230
[   24.393895]  kunit_try_run_case+0x1a6/0x480
[   24.393984]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.394059]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   24.394136]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   24.394220]  ? __kthread_parkme+0x82/0x160
[   24.394315]  ? preempt_count_sub+0x50/0x80
[   24.394392]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.394462]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   24.394545]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.394637]  kthread+0x257/0x310
[   24.394705]  ? __pfx_kthread+0x10/0x10
[   24.394770]  ret_from_fork+0x41/0x80
[   24.394802]  ? __pfx_kthread+0x10/0x10
[   24.394870]  ret_from_fork_asm+0x1a/0x30
[   24.394918]  </TASK>
[   24.394934] 
[   24.410676] Allocated by task 270:
[   24.411147]  kasan_save_stack+0x45/0x70
[   24.412391]  kasan_save_track+0x18/0x40
[   24.412717]  kasan_save_alloc_info+0x3b/0x50
[   24.413214]  __kasan_kmalloc+0xb7/0xc0
[   24.413913]  __kmalloc_cache_noprof+0x168/0x350
[   24.414529]  kasan_atomics+0x96/0x310
[   24.415173]  kunit_try_run_case+0x1a6/0x480
[   24.415603]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.415830]  kthread+0x257/0x310
[   24.416243]  ret_from_fork+0x41/0x80
[   24.416645]  ret_from_fork_asm+0x1a/0x30
[   24.417080] 
[   24.417304] The buggy address belongs to the object at ffff888102314e80
[   24.417304]  which belongs to the cache kmalloc-64 of size 64
[   24.418142] The buggy address is located 0 bytes to the right of
[   24.418142]  allocated 48-byte region [ffff888102314e80, ffff888102314eb0)
[   24.419847] 
[   24.420269] The buggy address belongs to the physical page:
[   24.420983] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102314
[   24.421569] flags: 0x200000000000000(node=0|zone=2)
[   24.421964] page_type: f5(slab)
[   24.422311] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   24.422949] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   24.424156] page dumped because: kasan: bad access detected
[   24.424700] 
[   24.425193] Memory state around the buggy address:
[   24.425519]  ffff888102314d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.426209]  ffff888102314e00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.427081] >ffff888102314e80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   24.427742]                                      ^
[   24.428364]  ffff888102314f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.429078]  ffff888102314f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.429653] ==================================================================
[   24.188084] ==================================================================
[   24.188640] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1e13/0x5450
[   24.189188] Write of size 8 at addr ffff888102314eb0 by task kunit_try_catch/270
[   24.189904] 
[   24.190170] CPU: 1 UID: 0 PID: 270 Comm: kunit_try_catch Tainted: G    B            N 6.12.33-rc1 #1
[   24.190312] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.190353] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   24.190416] Call Trace:
[   24.190472]  <TASK>
[   24.190545]  dump_stack_lvl+0x73/0xb0
[   24.190657]  print_report+0xd1/0x640
[   24.190735]  ? __virt_addr_valid+0x1db/0x2d0
[   24.190816]  ? kasan_atomics_helper+0x1e13/0x5450
[   24.190937]  ? kasan_complete_mode_report_info+0x2a/0x200
[   24.191022]  ? kasan_atomics_helper+0x1e13/0x5450
[   24.191103]  kasan_report+0x140/0x180
[   24.191186]  ? kasan_atomics_helper+0x1e13/0x5450
[   24.191313]  kasan_check_range+0x10c/0x1c0
[   24.191376]  __kasan_check_write+0x18/0x20
[   24.191437]  kasan_atomics_helper+0x1e13/0x5450
[   24.191521]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   24.191630]  ? __kmalloc_cache_noprof+0x168/0x350
[   24.191732]  ? trace_hardirqs_on+0x37/0xe0
[   24.191826]  kasan_atomics+0x1dd/0x310
[   24.191945]  ? __pfx_kasan_atomics+0x10/0x10
[   24.192055]  ? __pfx_read_tsc+0x10/0x10
[   24.192126]  ? ktime_get_ts64+0x84/0x230
[   24.192214]  kunit_try_run_case+0x1a6/0x480
[   24.192320]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.192386]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   24.192463]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   24.192549]  ? __kthread_parkme+0x82/0x160
[   24.192623]  ? preempt_count_sub+0x50/0x80
[   24.192704]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.192778]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   24.192863]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.192954]  kthread+0x257/0x310
[   24.193022]  ? __pfx_kthread+0x10/0x10
[   24.193090]  ret_from_fork+0x41/0x80
[   24.193160]  ? __pfx_kthread+0x10/0x10
[   24.193217]  ret_from_fork_asm+0x1a/0x30
[   24.193298]  </TASK>
[   24.193314] 
[   24.206168] Allocated by task 270:
[   24.206547]  kasan_save_stack+0x45/0x70
[   24.207159]  kasan_save_track+0x18/0x40
[   24.207536]  kasan_save_alloc_info+0x3b/0x50
[   24.207876]  __kasan_kmalloc+0xb7/0xc0
[   24.208305]  __kmalloc_cache_noprof+0x168/0x350
[   24.208865]  kasan_atomics+0x96/0x310
[   24.209259]  kunit_try_run_case+0x1a6/0x480
[   24.209640]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.210186]  kthread+0x257/0x310
[   24.210571]  ret_from_fork+0x41/0x80
[   24.210981]  ret_from_fork_asm+0x1a/0x30
[   24.211378] 
[   24.211623] The buggy address belongs to the object at ffff888102314e80
[   24.211623]  which belongs to the cache kmalloc-64 of size 64
[   24.212308] The buggy address is located 0 bytes to the right of
[   24.212308]  allocated 48-byte region [ffff888102314e80, ffff888102314eb0)
[   24.213499] 
[   24.213778] The buggy address belongs to the physical page:
[   24.214262] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102314
[   24.214866] flags: 0x200000000000000(node=0|zone=2)
[   24.215287] page_type: f5(slab)
[   24.215580] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   24.216210] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   24.217086] page dumped because: kasan: bad access detected
[   24.217546] 
[   24.217744] Memory state around the buggy address:
[   24.218381]  ffff888102314d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.218881]  ffff888102314e00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.219361] >ffff888102314e80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   24.219790]                                      ^
[   24.220128]  ffff888102314f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.220774]  ffff888102314f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.221433] ==================================================================
[   22.836216] ==================================================================
[   22.837842] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xde1/0x5450
[   22.838392] Write of size 4 at addr ffff888102314eb0 by task kunit_try_catch/270
[   22.839712] 
[   22.840149] CPU: 1 UID: 0 PID: 270 Comm: kunit_try_catch Tainted: G    B            N 6.12.33-rc1 #1
[   22.840293] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.840334] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   22.840385] Call Trace:
[   22.840426]  <TASK>
[   22.840464]  dump_stack_lvl+0x73/0xb0
[   22.840525]  print_report+0xd1/0x640
[   22.840577]  ? __virt_addr_valid+0x1db/0x2d0
[   22.840631]  ? kasan_atomics_helper+0xde1/0x5450
[   22.840682]  ? kasan_complete_mode_report_info+0x2a/0x200
[   22.840740]  ? kasan_atomics_helper+0xde1/0x5450
[   22.840800]  kasan_report+0x140/0x180
[   22.840862]  ? kasan_atomics_helper+0xde1/0x5450
[   22.840927]  kasan_check_range+0x10c/0x1c0
[   22.840975]  __kasan_check_write+0x18/0x20
[   22.841025]  kasan_atomics_helper+0xde1/0x5450
[   22.841081]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   22.841142]  ? __kmalloc_cache_noprof+0x168/0x350
[   22.841194]  ? trace_hardirqs_on+0x37/0xe0
[   22.841276]  kasan_atomics+0x1dd/0x310
[   22.841330]  ? __pfx_kasan_atomics+0x10/0x10
[   22.841390]  ? __pfx_read_tsc+0x10/0x10
[   22.841622]  ? ktime_get_ts64+0x84/0x230
[   22.841774]  kunit_try_run_case+0x1a6/0x480
[   22.841845]  ? __pfx_kunit_try_run_case+0x10/0x10
[   22.841905]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   22.841942]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   22.841982]  ? __kthread_parkme+0x82/0x160
[   22.842012]  ? preempt_count_sub+0x50/0x80
[   22.842045]  ? __pfx_kunit_try_run_case+0x10/0x10
[   22.842073]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   22.842111]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   22.842150]  kthread+0x257/0x310
[   22.842178]  ? __pfx_kthread+0x10/0x10
[   22.842206]  ret_from_fork+0x41/0x80
[   22.842277]  ? __pfx_kthread+0x10/0x10
[   22.842319]  ret_from_fork_asm+0x1a/0x30
[   22.842362]  </TASK>
[   22.842378] 
[   22.857254] Allocated by task 270:
[   22.857621]  kasan_save_stack+0x45/0x70
[   22.857919]  kasan_save_track+0x18/0x40
[   22.858461]  kasan_save_alloc_info+0x3b/0x50
[   22.858856]  __kasan_kmalloc+0xb7/0xc0
[   22.859360]  __kmalloc_cache_noprof+0x168/0x350
[   22.859779]  kasan_atomics+0x96/0x310
[   22.860218]  kunit_try_run_case+0x1a6/0x480
[   22.860676]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   22.861400]  kthread+0x257/0x310
[   22.861838]  ret_from_fork+0x41/0x80
[   22.862074]  ret_from_fork_asm+0x1a/0x30
[   22.864596] 
[   22.866410] The buggy address belongs to the object at ffff888102314e80
[   22.866410]  which belongs to the cache kmalloc-64 of size 64
[   22.867349] The buggy address is located 0 bytes to the right of
[   22.867349]  allocated 48-byte region [ffff888102314e80, ffff888102314eb0)
[   22.868380] 
[   22.868593] The buggy address belongs to the physical page:
[   22.869116] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102314
[   22.869789] flags: 0x200000000000000(node=0|zone=2)
[   22.870198] page_type: f5(slab)
[   22.870561] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   22.871425] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   22.872063] page dumped because: kasan: bad access detected
[   22.872539] 
[   22.872773] Memory state around the buggy address:
[   22.873214]  ffff888102314d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.873877]  ffff888102314e00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.874503] >ffff888102314e80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   22.875110]                                      ^
[   22.875568]  ffff888102314f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.876241]  ffff888102314f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.876793] ==================================================================
[   24.106310] ==================================================================
[   24.107350] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1ce2/0x5450
[   24.108040] Write of size 8 at addr ffff888102314eb0 by task kunit_try_catch/270
[   24.108487] 
[   24.109186] CPU: 1 UID: 0 PID: 270 Comm: kunit_try_catch Tainted: G    B            N 6.12.33-rc1 #1
[   24.109296] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.109337] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   24.109400] Call Trace:
[   24.109590]  <TASK>
[   24.109644]  dump_stack_lvl+0x73/0xb0
[   24.109691]  print_report+0xd1/0x640
[   24.109728]  ? __virt_addr_valid+0x1db/0x2d0
[   24.109765]  ? kasan_atomics_helper+0x1ce2/0x5450
[   24.109799]  ? kasan_complete_mode_report_info+0x2a/0x200
[   24.109855]  ? kasan_atomics_helper+0x1ce2/0x5450
[   24.109902]  kasan_report+0x140/0x180
[   24.109939]  ? kasan_atomics_helper+0x1ce2/0x5450
[   24.109982]  kasan_check_range+0x10c/0x1c0
[   24.110013]  __kasan_check_write+0x18/0x20
[   24.110044]  kasan_atomics_helper+0x1ce2/0x5450
[   24.110082]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   24.110118]  ? __kmalloc_cache_noprof+0x168/0x350
[   24.110150]  ? trace_hardirqs_on+0x37/0xe0
[   24.110190]  kasan_atomics+0x1dd/0x310
[   24.110220]  ? __pfx_kasan_atomics+0x10/0x10
[   24.110276]  ? __pfx_read_tsc+0x10/0x10
[   24.110306]  ? ktime_get_ts64+0x84/0x230
[   24.110342]  kunit_try_run_case+0x1a6/0x480
[   24.110377]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.110407]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   24.110439]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   24.110476]  ? __kthread_parkme+0x82/0x160
[   24.110503]  ? preempt_count_sub+0x50/0x80
[   24.110537]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.110567]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   24.110605]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.110645]  kthread+0x257/0x310
[   24.110673]  ? __pfx_kthread+0x10/0x10
[   24.110700]  ret_from_fork+0x41/0x80
[   24.110730]  ? __pfx_kthread+0x10/0x10
[   24.110757]  ret_from_fork_asm+0x1a/0x30
[   24.110799]  </TASK>
[   24.110815] 
[   24.129602] Allocated by task 270:
[   24.129982]  kasan_save_stack+0x45/0x70
[   24.130421]  kasan_save_track+0x18/0x40
[   24.130775]  kasan_save_alloc_info+0x3b/0x50
[   24.131712]  __kasan_kmalloc+0xb7/0xc0
[   24.132017]  __kmalloc_cache_noprof+0x168/0x350
[   24.132708]  kasan_atomics+0x96/0x310
[   24.133364]  kunit_try_run_case+0x1a6/0x480
[   24.134026]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.134485]  kthread+0x257/0x310
[   24.135309]  ret_from_fork+0x41/0x80
[   24.135579]  ret_from_fork_asm+0x1a/0x30
[   24.136329] 
[   24.136690] The buggy address belongs to the object at ffff888102314e80
[   24.136690]  which belongs to the cache kmalloc-64 of size 64
[   24.137524] The buggy address is located 0 bytes to the right of
[   24.137524]  allocated 48-byte region [ffff888102314e80, ffff888102314eb0)
[   24.138458] 
[   24.138736] The buggy address belongs to the physical page:
[   24.139302] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102314
[   24.140055] flags: 0x200000000000000(node=0|zone=2)
[   24.140567] page_type: f5(slab)
[   24.141001] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   24.141623] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   24.142402] page dumped because: kasan: bad access detected
[   24.142935] 
[   24.143223] Memory state around the buggy address:
[   24.143702]  ffff888102314d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.144343]  ffff888102314e00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.145005] >ffff888102314e80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   24.145609]                                      ^
[   24.146125]  ffff888102314f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.146681]  ffff888102314f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.147403] ==================================================================
[   24.150054] ==================================================================
[   24.150484] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1d7b/0x5450
[   24.151395] Write of size 8 at addr ffff888102314eb0 by task kunit_try_catch/270
[   24.152009] 
[   24.152335] CPU: 1 UID: 0 PID: 270 Comm: kunit_try_catch Tainted: G    B            N 6.12.33-rc1 #1
[   24.152482] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.152523] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   24.152582] Call Trace:
[   24.152637]  <TASK>
[   24.152690]  dump_stack_lvl+0x73/0xb0
[   24.152771]  print_report+0xd1/0x640
[   24.152896]  ? __virt_addr_valid+0x1db/0x2d0
[   24.152984]  ? kasan_atomics_helper+0x1d7b/0x5450
[   24.153065]  ? kasan_complete_mode_report_info+0x2a/0x200
[   24.153144]  ? kasan_atomics_helper+0x1d7b/0x5450
[   24.153269]  kasan_report+0x140/0x180
[   24.153358]  ? kasan_atomics_helper+0x1d7b/0x5450
[   24.153455]  kasan_check_range+0x10c/0x1c0
[   24.153560]  __kasan_check_write+0x18/0x20
[   24.153665]  kasan_atomics_helper+0x1d7b/0x5450
[   24.153748]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   24.153792]  ? __kmalloc_cache_noprof+0x168/0x350
[   24.153838]  ? trace_hardirqs_on+0x37/0xe0
[   24.153903]  kasan_atomics+0x1dd/0x310
[   24.153933]  ? __pfx_kasan_atomics+0x10/0x10
[   24.153964]  ? __pfx_read_tsc+0x10/0x10
[   24.153991]  ? ktime_get_ts64+0x84/0x230
[   24.154027]  kunit_try_run_case+0x1a6/0x480
[   24.154061]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.154089]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   24.154119]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   24.154154]  ? __kthread_parkme+0x82/0x160
[   24.154183]  ? preempt_count_sub+0x50/0x80
[   24.154216]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.154275]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   24.154315]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.154353]  kthread+0x257/0x310
[   24.154379]  ? __pfx_kthread+0x10/0x10
[   24.154407]  ret_from_fork+0x41/0x80
[   24.154438]  ? __pfx_kthread+0x10/0x10
[   24.154464]  ret_from_fork_asm+0x1a/0x30
[   24.154506]  </TASK>
[   24.154521] 
[   24.168459] Allocated by task 270:
[   24.168768]  kasan_save_stack+0x45/0x70
[   24.170453]  kasan_save_track+0x18/0x40
[   24.170775]  kasan_save_alloc_info+0x3b/0x50
[   24.171574]  __kasan_kmalloc+0xb7/0xc0
[   24.172190]  __kmalloc_cache_noprof+0x168/0x350
[   24.172683]  kasan_atomics+0x96/0x310
[   24.173360]  kunit_try_run_case+0x1a6/0x480
[   24.173843]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.174352]  kthread+0x257/0x310
[   24.174736]  ret_from_fork+0x41/0x80
[   24.175091]  ret_from_fork_asm+0x1a/0x30
[   24.175445] 
[   24.175634] The buggy address belongs to the object at ffff888102314e80
[   24.175634]  which belongs to the cache kmalloc-64 of size 64
[   24.176719] The buggy address is located 0 bytes to the right of
[   24.176719]  allocated 48-byte region [ffff888102314e80, ffff888102314eb0)
[   24.177547] 
[   24.177804] The buggy address belongs to the physical page:
[   24.178372] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102314
[   24.179246] flags: 0x200000000000000(node=0|zone=2)
[   24.179687] page_type: f5(slab)
[   24.180320] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   24.180937] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   24.181683] page dumped because: kasan: bad access detected
[   24.182251] 
[   24.182530] Memory state around the buggy address:
[   24.183029]  ffff888102314d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.183570]  ffff888102314e00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.184129] >ffff888102314e80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   24.184965]                                      ^
[   24.185424]  ffff888102314f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.185901]  ffff888102314f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.186627] ==================================================================
[   22.539461] ==================================================================
[   22.539899] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x993/0x5450
[   22.541045] Write of size 4 at addr ffff888102314eb0 by task kunit_try_catch/270
[   22.541653] 
[   22.542347] CPU: 1 UID: 0 PID: 270 Comm: kunit_try_catch Tainted: G    B            N 6.12.33-rc1 #1
[   22.542478] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.542522] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   22.542579] Call Trace:
[   22.542615]  <TASK>
[   22.542654]  dump_stack_lvl+0x73/0xb0
[   22.542699]  print_report+0xd1/0x640
[   22.542735]  ? __virt_addr_valid+0x1db/0x2d0
[   22.542778]  ? kasan_atomics_helper+0x993/0x5450
[   22.542816]  ? kasan_complete_mode_report_info+0x2a/0x200
[   22.543053]  ? kasan_atomics_helper+0x993/0x5450
[   22.543095]  kasan_report+0x140/0x180
[   22.543133]  ? kasan_atomics_helper+0x993/0x5450
[   22.543175]  kasan_check_range+0x10c/0x1c0
[   22.543207]  __kasan_check_write+0x18/0x20
[   22.543278]  kasan_atomics_helper+0x993/0x5450
[   22.543316]  ? kasan_save_alloc_info+0x3b/0x50
[   22.543347]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   22.543385]  ? __kmalloc_cache_noprof+0x168/0x350
[   22.543416]  ? trace_hardirqs_on+0x37/0xe0
[   22.543459]  kasan_atomics+0x1dd/0x310
[   22.543487]  ? __pfx_kasan_atomics+0x10/0x10
[   22.543518]  ? __pfx_read_tsc+0x10/0x10
[   22.543545]  ? ktime_get_ts64+0x84/0x230
[   22.543581]  kunit_try_run_case+0x1a6/0x480
[   22.543614]  ? __pfx_kunit_try_run_case+0x10/0x10
[   22.543643]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   22.543674]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   22.543711]  ? __kthread_parkme+0x82/0x160
[   22.543741]  ? preempt_count_sub+0x50/0x80
[   22.543774]  ? __pfx_kunit_try_run_case+0x10/0x10
[   22.543804]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   22.543870]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   22.543913]  kthread+0x257/0x310
[   22.543941]  ? __pfx_kthread+0x10/0x10
[   22.543969]  ret_from_fork+0x41/0x80
[   22.544000]  ? __pfx_kthread+0x10/0x10
[   22.544025]  ret_from_fork_asm+0x1a/0x30
[   22.544067]  </TASK>
[   22.544082] 
[   22.561028] Allocated by task 270:
[   22.561455]  kasan_save_stack+0x45/0x70
[   22.561940]  kasan_save_track+0x18/0x40
[   22.562381]  kasan_save_alloc_info+0x3b/0x50
[   22.562885]  __kasan_kmalloc+0xb7/0xc0
[   22.563358]  __kmalloc_cache_noprof+0x168/0x350
[   22.564798]  kasan_atomics+0x96/0x310
[   22.565348]  kunit_try_run_case+0x1a6/0x480
[   22.565710]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   22.566203]  kthread+0x257/0x310
[   22.566563]  ret_from_fork+0x41/0x80
[   22.566967]  ret_from_fork_asm+0x1a/0x30
[   22.567421] 
[   22.567634] The buggy address belongs to the object at ffff888102314e80
[   22.567634]  which belongs to the cache kmalloc-64 of size 64
[   22.568603] The buggy address is located 0 bytes to the right of
[   22.568603]  allocated 48-byte region [ffff888102314e80, ffff888102314eb0)
[   22.569526] 
[   22.569762] The buggy address belongs to the physical page:
[   22.570214] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102314
[   22.570936] flags: 0x200000000000000(node=0|zone=2)
[   22.571422] page_type: f5(slab)
[   22.571725] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   22.572437] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   22.573051] page dumped because: kasan: bad access detected
[   22.573552] 
[   22.573801] Memory state around the buggy address:
[   22.574314]  ffff888102314d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.574900]  ffff888102314e00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.575579] >ffff888102314e80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   22.576137]                                      ^
[   22.576628]  ffff888102314f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.577210]  ffff888102314f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.577794] ==================================================================
[   23.292307] ==================================================================
[   23.293699] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x12e7/0x5450
[   23.294532] Write of size 4 at addr ffff888102314eb0 by task kunit_try_catch/270
[   23.296139] 
[   23.296397] CPU: 1 UID: 0 PID: 270 Comm: kunit_try_catch Tainted: G    B            N 6.12.33-rc1 #1
[   23.296519] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.296558] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   23.296635] Call Trace:
[   23.296663]  <TASK>
[   23.296715]  dump_stack_lvl+0x73/0xb0
[   23.296769]  print_report+0xd1/0x640
[   23.296806]  ? __virt_addr_valid+0x1db/0x2d0
[   23.296981]  ? kasan_atomics_helper+0x12e7/0x5450
[   23.297024]  ? kasan_complete_mode_report_info+0x2a/0x200
[   23.297060]  ? kasan_atomics_helper+0x12e7/0x5450
[   23.297095]  kasan_report+0x140/0x180
[   23.297131]  ? kasan_atomics_helper+0x12e7/0x5450
[   23.297172]  kasan_check_range+0x10c/0x1c0
[   23.297203]  __kasan_check_write+0x18/0x20
[   23.297260]  kasan_atomics_helper+0x12e7/0x5450
[   23.297302]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   23.297340]  ? __kmalloc_cache_noprof+0x168/0x350
[   23.297371]  ? trace_hardirqs_on+0x37/0xe0
[   23.297409]  kasan_atomics+0x1dd/0x310
[   23.297438]  ? __pfx_kasan_atomics+0x10/0x10
[   23.297471]  ? __pfx_read_tsc+0x10/0x10
[   23.297499]  ? ktime_get_ts64+0x84/0x230
[   23.297535]  kunit_try_run_case+0x1a6/0x480
[   23.297570]  ? __pfx_kunit_try_run_case+0x10/0x10
[   23.297599]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   23.297628]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   23.297665]  ? __kthread_parkme+0x82/0x160
[   23.297694]  ? preempt_count_sub+0x50/0x80
[   23.297726]  ? __pfx_kunit_try_run_case+0x10/0x10
[   23.297756]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   23.297795]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   23.297848]  kthread+0x257/0x310
[   23.297904]  ? __pfx_kthread+0x10/0x10
[   23.297932]  ret_from_fork+0x41/0x80
[   23.297963]  ? __pfx_kthread+0x10/0x10
[   23.297990]  ret_from_fork_asm+0x1a/0x30
[   23.298033]  </TASK>
[   23.298048] 
[   23.315216] Allocated by task 270:
[   23.315520]  kasan_save_stack+0x45/0x70
[   23.315851]  kasan_save_track+0x18/0x40
[   23.316337]  kasan_save_alloc_info+0x3b/0x50
[   23.316810]  __kasan_kmalloc+0xb7/0xc0
[   23.317315]  __kmalloc_cache_noprof+0x168/0x350
[   23.317753]  kasan_atomics+0x96/0x310
[   23.318236]  kunit_try_run_case+0x1a6/0x480
[   23.318668]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   23.319117]  kthread+0x257/0x310
[   23.319522]  ret_from_fork+0x41/0x80
[   23.320029]  ret_from_fork_asm+0x1a/0x30
[   23.320522] 
[   23.320793] The buggy address belongs to the object at ffff888102314e80
[   23.320793]  which belongs to the cache kmalloc-64 of size 64
[   23.321869] The buggy address is located 0 bytes to the right of
[   23.321869]  allocated 48-byte region [ffff888102314e80, ffff888102314eb0)
[   23.322885] 
[   23.323123] The buggy address belongs to the physical page:
[   23.323659] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102314
[   23.324391] flags: 0x200000000000000(node=0|zone=2)
[   23.324960] page_type: f5(slab)
[   23.325316] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   23.326108] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   23.326725] page dumped because: kasan: bad access detected
[   23.327287] 
[   23.327522] Memory state around the buggy address:
[   23.327977]  ffff888102314d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.328551]  ffff888102314e00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.329216] >ffff888102314e80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   23.329781]                                      ^
[   23.330165]  ffff888102314f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.330867]  ffff888102314f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.331565] ==================================================================
[   24.257487] ==================================================================
[   24.260287] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1f44/0x5450
[   24.260776] Write of size 8 at addr ffff888102314eb0 by task kunit_try_catch/270
[   24.261247] 
[   24.261623] CPU: 1 UID: 0 PID: 270 Comm: kunit_try_catch Tainted: G    B            N 6.12.33-rc1 #1
[   24.261743] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.261783] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   24.261846] Call Trace:
[   24.262803]  <TASK>
[   24.262859]  dump_stack_lvl+0x73/0xb0
[   24.262959]  print_report+0xd1/0x640
[   24.263042]  ? __virt_addr_valid+0x1db/0x2d0
[   24.263125]  ? kasan_atomics_helper+0x1f44/0x5450
[   24.263201]  ? kasan_complete_mode_report_info+0x2a/0x200
[   24.263312]  ? kasan_atomics_helper+0x1f44/0x5450
[   24.263392]  kasan_report+0x140/0x180
[   24.263475]  ? kasan_atomics_helper+0x1f44/0x5450
[   24.263568]  kasan_check_range+0x10c/0x1c0
[   24.263644]  __kasan_check_write+0x18/0x20
[   24.263719]  kasan_atomics_helper+0x1f44/0x5450
[   24.263770]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   24.263808]  ? __kmalloc_cache_noprof+0x168/0x350
[   24.264728]  ? trace_hardirqs_on+0x37/0xe0
[   24.264823]  kasan_atomics+0x1dd/0x310
[   24.264899]  ? __pfx_kasan_atomics+0x10/0x10
[   24.264976]  ? __pfx_read_tsc+0x10/0x10
[   24.265048]  ? ktime_get_ts64+0x84/0x230
[   24.265195]  kunit_try_run_case+0x1a6/0x480
[   24.265273]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.265305]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   24.265339]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   24.265378]  ? __kthread_parkme+0x82/0x160
[   24.265407]  ? preempt_count_sub+0x50/0x80
[   24.265442]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.265472]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   24.265510]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.265549]  kthread+0x257/0x310
[   24.265576]  ? __pfx_kthread+0x10/0x10
[   24.265603]  ret_from_fork+0x41/0x80
[   24.265634]  ? __pfx_kthread+0x10/0x10
[   24.265660]  ret_from_fork_asm+0x1a/0x30
[   24.265702]  </TASK>
[   24.265718] 
[   24.289426] Allocated by task 270:
[   24.290093]  kasan_save_stack+0x45/0x70
[   24.290716]  kasan_save_track+0x18/0x40
[   24.291171]  kasan_save_alloc_info+0x3b/0x50
[   24.291648]  __kasan_kmalloc+0xb7/0xc0
[   24.292074]  __kmalloc_cache_noprof+0x168/0x350
[   24.292583]  kasan_atomics+0x96/0x310
[   24.293099]  kunit_try_run_case+0x1a6/0x480
[   24.293507]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.294126]  kthread+0x257/0x310
[   24.294508]  ret_from_fork+0x41/0x80
[   24.295005]  ret_from_fork_asm+0x1a/0x30
[   24.295444] 
[   24.295679] The buggy address belongs to the object at ffff888102314e80
[   24.295679]  which belongs to the cache kmalloc-64 of size 64
[   24.296724] The buggy address is located 0 bytes to the right of
[   24.296724]  allocated 48-byte region [ffff888102314e80, ffff888102314eb0)
[   24.297791] 
[   24.298077] The buggy address belongs to the physical page:
[   24.298634] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102314
[   24.299383] flags: 0x200000000000000(node=0|zone=2)
[   24.299799] page_type: f5(slab)
[   24.300276] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   24.300999] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   24.301626] page dumped because: kasan: bad access detected
[   24.302167] 
[   24.302426] Memory state around the buggy address:
[   24.302906]  ffff888102314d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.303528]  ffff888102314e00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.304150] >ffff888102314e80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   24.304662]                                      ^
[   24.305105]  ffff888102314f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.305792]  ffff888102314f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.306442] ==================================================================
[   21.892335] ==================================================================
[   21.893542] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4bbe/0x5450
[   21.894235] Read of size 4 at addr ffff888102314eb0 by task kunit_try_catch/270
[   21.895472] 
[   21.895695] CPU: 1 UID: 0 PID: 270 Comm: kunit_try_catch Tainted: G    B            N 6.12.33-rc1 #1
[   21.895813] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.895850] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   21.895912] Call Trace:
[   21.895949]  <TASK>
[   21.896000]  dump_stack_lvl+0x73/0xb0
[   21.896084]  print_report+0xd1/0x640
[   21.896160]  ? __virt_addr_valid+0x1db/0x2d0
[   21.896261]  ? kasan_atomics_helper+0x4bbe/0x5450
[   21.896340]  ? kasan_complete_mode_report_info+0x2a/0x200
[   21.896422]  ? kasan_atomics_helper+0x4bbe/0x5450
[   21.896512]  kasan_report+0x140/0x180
[   21.896597]  ? kasan_atomics_helper+0x4bbe/0x5450
[   21.896686]  __asan_report_load4_noabort+0x18/0x20
[   21.896764]  kasan_atomics_helper+0x4bbe/0x5450
[   21.896825]  ? kasan_save_alloc_info+0x3b/0x50
[   21.896936]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   21.896975]  ? __kmalloc_cache_noprof+0x168/0x350
[   21.897006]  ? trace_hardirqs_on+0x37/0xe0
[   21.897047]  kasan_atomics+0x1dd/0x310
[   21.897076]  ? __pfx_kasan_atomics+0x10/0x10
[   21.897106]  ? __pfx_read_tsc+0x10/0x10
[   21.897133]  ? ktime_get_ts64+0x84/0x230
[   21.897169]  kunit_try_run_case+0x1a6/0x480
[   21.897202]  ? __pfx_kunit_try_run_case+0x10/0x10
[   21.897259]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   21.897293]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   21.897330]  ? __kthread_parkme+0x82/0x160
[   21.897357]  ? preempt_count_sub+0x50/0x80
[   21.897388]  ? __pfx_kunit_try_run_case+0x10/0x10
[   21.897416]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   21.897466]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   21.897566]  kthread+0x257/0x310
[   21.897602]  ? __pfx_kthread+0x10/0x10
[   21.897630]  ret_from_fork+0x41/0x80
[   21.897660]  ? __pfx_kthread+0x10/0x10
[   21.897684]  ret_from_fork_asm+0x1a/0x30
[   21.897727]  </TASK>
[   21.897741] 
[   21.915240] Allocated by task 270:
[   21.915882]  kasan_save_stack+0x45/0x70
[   21.916350]  kasan_save_track+0x18/0x40
[   21.917021]  kasan_save_alloc_info+0x3b/0x50
[   21.917656]  __kasan_kmalloc+0xb7/0xc0
[   21.918155]  __kmalloc_cache_noprof+0x168/0x350
[   21.918856]  kasan_atomics+0x96/0x310
[   21.919290]  kunit_try_run_case+0x1a6/0x480
[   21.919902]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   21.920415]  kthread+0x257/0x310
[   21.921055]  ret_from_fork+0x41/0x80
[   21.921646]  ret_from_fork_asm+0x1a/0x30
[   21.922094] 
[   21.922373] The buggy address belongs to the object at ffff888102314e80
[   21.922373]  which belongs to the cache kmalloc-64 of size 64
[   21.923578] The buggy address is located 0 bytes to the right of
[   21.923578]  allocated 48-byte region [ffff888102314e80, ffff888102314eb0)
[   21.924971] 
[   21.925203] The buggy address belongs to the physical page:
[   21.925994] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102314
[   21.926632] flags: 0x200000000000000(node=0|zone=2)
[   21.927362] page_type: f5(slab)
[   21.927869] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   21.928699] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   21.929389] page dumped because: kasan: bad access detected
[   21.929935] 
[   21.930142] Memory state around the buggy address:
[   21.930609]  ffff888102314d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.931136]  ffff888102314e00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.932284] >ffff888102314e80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   21.933290]                                      ^
[   21.933910]  ffff888102314f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.934642]  ffff888102314f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.935533] ==================================================================
[   23.968982] ==================================================================
[   23.969483] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1b23/0x5450
[   23.971452] Write of size 8 at addr ffff888102314eb0 by task kunit_try_catch/270
[   23.972029] 
[   23.972629] CPU: 1 UID: 0 PID: 270 Comm: kunit_try_catch Tainted: G    B            N 6.12.33-rc1 #1
[   23.972702] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.972743] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   23.972804] Call Trace:
[   23.972858]  <TASK>
[   23.973089]  dump_stack_lvl+0x73/0xb0
[   23.973136]  print_report+0xd1/0x640
[   23.973173]  ? __virt_addr_valid+0x1db/0x2d0
[   23.973209]  ? kasan_atomics_helper+0x1b23/0x5450
[   23.973273]  ? kasan_complete_mode_report_info+0x2a/0x200
[   23.973310]  ? kasan_atomics_helper+0x1b23/0x5450
[   23.973346]  kasan_report+0x140/0x180
[   23.973383]  ? kasan_atomics_helper+0x1b23/0x5450
[   23.973425]  kasan_check_range+0x10c/0x1c0
[   23.973457]  __kasan_check_write+0x18/0x20
[   23.973488]  kasan_atomics_helper+0x1b23/0x5450
[   23.973525]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   23.973562]  ? __kmalloc_cache_noprof+0x168/0x350
[   23.973593]  ? trace_hardirqs_on+0x37/0xe0
[   23.973633]  kasan_atomics+0x1dd/0x310
[   23.973663]  ? __pfx_kasan_atomics+0x10/0x10
[   23.973694]  ? __pfx_read_tsc+0x10/0x10
[   23.973722]  ? ktime_get_ts64+0x84/0x230
[   23.973759]  kunit_try_run_case+0x1a6/0x480
[   23.973792]  ? __pfx_kunit_try_run_case+0x10/0x10
[   23.973829]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   23.973883]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   23.973922]  ? __kthread_parkme+0x82/0x160
[   23.973950]  ? preempt_count_sub+0x50/0x80
[   23.973985]  ? __pfx_kunit_try_run_case+0x10/0x10
[   23.974016]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   23.974053]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   23.974092]  kthread+0x257/0x310
[   23.974120]  ? __pfx_kthread+0x10/0x10
[   23.974148]  ret_from_fork+0x41/0x80
[   23.974178]  ? __pfx_kthread+0x10/0x10
[   23.974205]  ret_from_fork_asm+0x1a/0x30
[   23.974269]  </TASK>
[   23.974286] 
[   23.991783] Allocated by task 270:
[   23.992074]  kasan_save_stack+0x45/0x70
[   23.993779]  kasan_save_track+0x18/0x40
[   23.994598]  kasan_save_alloc_info+0x3b/0x50
[   23.996266]  __kasan_kmalloc+0xb7/0xc0
[   23.996953]  __kmalloc_cache_noprof+0x168/0x350
[   23.997469]  kasan_atomics+0x96/0x310
[   23.997846]  kunit_try_run_case+0x1a6/0x480
[   23.998305]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   23.998793]  kthread+0x257/0x310
[   23.999515]  ret_from_fork+0x41/0x80
[   23.999841]  ret_from_fork_asm+0x1a/0x30
[   24.000567] 
[   24.001016] The buggy address belongs to the object at ffff888102314e80
[   24.001016]  which belongs to the cache kmalloc-64 of size 64
[   24.001622] The buggy address is located 0 bytes to the right of
[   24.001622]  allocated 48-byte region [ffff888102314e80, ffff888102314eb0)
[   24.003052] 
[   24.003410] The buggy address belongs to the physical page:
[   24.004239] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102314
[   24.005072] flags: 0x200000000000000(node=0|zone=2)
[   24.005456] page_type: f5(slab)
[   24.005722] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   24.007303] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   24.007760] page dumped because: kasan: bad access detected
[   24.008095] 
[   24.009542] Memory state around the buggy address:
[   24.011398]  ffff888102314d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.011872]  ffff888102314e00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.012489] >ffff888102314e80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   24.014215]                                      ^
[   24.014569]  ffff888102314f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.014996]  ffff888102314f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.015402] ==================================================================
[   23.455139] ==================================================================
[   23.455719] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1468/0x5450
[   23.456724] Write of size 8 at addr ffff888102314eb0 by task kunit_try_catch/270
[   23.457581] 
[   23.457966] CPU: 1 UID: 0 PID: 270 Comm: kunit_try_catch Tainted: G    B            N 6.12.33-rc1 #1
[   23.458118] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.458160] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   23.458239] Call Trace:
[   23.458296]  <TASK>
[   23.458348]  dump_stack_lvl+0x73/0xb0
[   23.458440]  print_report+0xd1/0x640
[   23.458604]  ? __virt_addr_valid+0x1db/0x2d0
[   23.458694]  ? kasan_atomics_helper+0x1468/0x5450
[   23.458747]  ? kasan_complete_mode_report_info+0x2a/0x200
[   23.458785]  ? kasan_atomics_helper+0x1468/0x5450
[   23.458849]  kasan_report+0x140/0x180
[   23.458905]  ? kasan_atomics_helper+0x1468/0x5450
[   23.458949]  kasan_check_range+0x10c/0x1c0
[   23.458981]  __kasan_check_write+0x18/0x20
[   23.459012]  kasan_atomics_helper+0x1468/0x5450
[   23.459051]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   23.459087]  ? __kmalloc_cache_noprof+0x168/0x350
[   23.459119]  ? trace_hardirqs_on+0x37/0xe0
[   23.459157]  kasan_atomics+0x1dd/0x310
[   23.459186]  ? __pfx_kasan_atomics+0x10/0x10
[   23.459216]  ? __pfx_read_tsc+0x10/0x10
[   23.459284]  ? ktime_get_ts64+0x84/0x230
[   23.459324]  kunit_try_run_case+0x1a6/0x480
[   23.459359]  ? __pfx_kunit_try_run_case+0x10/0x10
[   23.459389]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   23.459419]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   23.459456]  ? __kthread_parkme+0x82/0x160
[   23.459484]  ? preempt_count_sub+0x50/0x80
[   23.459516]  ? __pfx_kunit_try_run_case+0x10/0x10
[   23.459546]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   23.459583]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   23.459623]  kthread+0x257/0x310
[   23.459653]  ? __pfx_kthread+0x10/0x10
[   23.459683]  ret_from_fork+0x41/0x80
[   23.459715]  ? __pfx_kthread+0x10/0x10
[   23.459742]  ret_from_fork_asm+0x1a/0x30
[   23.459784]  </TASK>
[   23.459800] 
[   23.475527] Allocated by task 270:
[   23.476022]  kasan_save_stack+0x45/0x70
[   23.476711]  kasan_save_track+0x18/0x40
[   23.477289]  kasan_save_alloc_info+0x3b/0x50
[   23.477909]  __kasan_kmalloc+0xb7/0xc0
[   23.478341]  __kmalloc_cache_noprof+0x168/0x350
[   23.478890]  kasan_atomics+0x96/0x310
[   23.481953]  kunit_try_run_case+0x1a6/0x480
[   23.483087]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   23.484242]  kthread+0x257/0x310
[   23.485172]  ret_from_fork+0x41/0x80
[   23.486390]  ret_from_fork_asm+0x1a/0x30
[   23.487266] 
[   23.487450] The buggy address belongs to the object at ffff888102314e80
[   23.487450]  which belongs to the cache kmalloc-64 of size 64
[   23.488067] The buggy address is located 0 bytes to the right of
[   23.488067]  allocated 48-byte region [ffff888102314e80, ffff888102314eb0)
[   23.492162] 
[   23.492478] The buggy address belongs to the physical page:
[   23.493574] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102314
[   23.494174] flags: 0x200000000000000(node=0|zone=2)
[   23.494662] page_type: f5(slab)
[   23.495095] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   23.495848] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   23.496873] page dumped because: kasan: bad access detected
[   23.497387] 
[   23.497548] Memory state around the buggy address:
[   23.498645]  ffff888102314d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.499370]  ffff888102314e00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.499930] >ffff888102314e80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   23.500725]                                      ^
[   23.501801]  ffff888102314f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.502707]  ffff888102314f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.503452] ==================================================================
[   24.307710] ==================================================================
[   24.308347] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4f73/0x5450
[   24.309053] Read of size 8 at addr ffff888102314eb0 by task kunit_try_catch/270
[   24.309636] 
[   24.309993] CPU: 1 UID: 0 PID: 270 Comm: kunit_try_catch Tainted: G    B            N 6.12.33-rc1 #1
[   24.310113] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.310174] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   24.310275] Call Trace:
[   24.310333]  <TASK>
[   24.310383]  dump_stack_lvl+0x73/0xb0
[   24.310467]  print_report+0xd1/0x640
[   24.310547]  ? __virt_addr_valid+0x1db/0x2d0
[   24.310630]  ? kasan_atomics_helper+0x4f73/0x5450
[   24.310710]  ? kasan_complete_mode_report_info+0x2a/0x200
[   24.310792]  ? kasan_atomics_helper+0x4f73/0x5450
[   24.310954]  kasan_report+0x140/0x180
[   24.311038]  ? kasan_atomics_helper+0x4f73/0x5450
[   24.311134]  __asan_report_load8_noabort+0x18/0x20
[   24.311211]  kasan_atomics_helper+0x4f73/0x5450
[   24.311324]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   24.311411]  ? __kmalloc_cache_noprof+0x168/0x350
[   24.311506]  ? trace_hardirqs_on+0x37/0xe0
[   24.311624]  kasan_atomics+0x1dd/0x310
[   24.311746]  ? __pfx_kasan_atomics+0x10/0x10
[   24.311864]  ? __pfx_read_tsc+0x10/0x10
[   24.311937]  ? ktime_get_ts64+0x84/0x230
[   24.312011]  kunit_try_run_case+0x1a6/0x480
[   24.312048]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.312080]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   24.312112]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   24.312148]  ? __kthread_parkme+0x82/0x160
[   24.312176]  ? preempt_count_sub+0x50/0x80
[   24.312208]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.312266]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   24.312307]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.312344]  kthread+0x257/0x310
[   24.312371]  ? __pfx_kthread+0x10/0x10
[   24.312398]  ret_from_fork+0x41/0x80
[   24.312428]  ? __pfx_kthread+0x10/0x10
[   24.312454]  ret_from_fork_asm+0x1a/0x30
[   24.312495]  </TASK>
[   24.312510] 
[   24.325723] Allocated by task 270:
[   24.326164]  kasan_save_stack+0x45/0x70
[   24.326729]  kasan_save_track+0x18/0x40
[   24.327183]  kasan_save_alloc_info+0x3b/0x50
[   24.327710]  __kasan_kmalloc+0xb7/0xc0
[   24.328113]  __kmalloc_cache_noprof+0x168/0x350
[   24.328645]  kasan_atomics+0x96/0x310
[   24.329092]  kunit_try_run_case+0x1a6/0x480
[   24.329569]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.330004]  kthread+0x257/0x310
[   24.330323]  ret_from_fork+0x41/0x80
[   24.330722]  ret_from_fork_asm+0x1a/0x30
[   24.331219] 
[   24.331583] The buggy address belongs to the object at ffff888102314e80
[   24.331583]  which belongs to the cache kmalloc-64 of size 64
[   24.332674] The buggy address is located 0 bytes to the right of
[   24.332674]  allocated 48-byte region [ffff888102314e80, ffff888102314eb0)
[   24.333704] 
[   24.333935] The buggy address belongs to the physical page:
[   24.334322] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102314
[   24.335093] flags: 0x200000000000000(node=0|zone=2)
[   24.335636] page_type: f5(slab)
[   24.336114] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   24.336865] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   24.337560] page dumped because: kasan: bad access detected
[   24.338075] 
[   24.338410] Memory state around the buggy address:
[   24.339631]  ffff888102314d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.340156]  ffff888102314e00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.340679] >ffff888102314e80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   24.341198]                                      ^
[   24.342529]  ffff888102314f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.343214]  ffff888102314f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.343913] ==================================================================
[   23.668114] ==================================================================
[   23.668641] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x16e8/0x5450
[   23.669543] Write of size 8 at addr ffff888102314eb0 by task kunit_try_catch/270
[   23.670219] 
[   23.670666] CPU: 1 UID: 0 PID: 270 Comm: kunit_try_catch Tainted: G    B            N 6.12.33-rc1 #1
[   23.670784] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.670821] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   23.671038] Call Trace:
[   23.671442]  <TASK>
[   23.671506]  dump_stack_lvl+0x73/0xb0
[   23.671621]  print_report+0xd1/0x640
[   23.671663]  ? __virt_addr_valid+0x1db/0x2d0
[   23.671719]  ? kasan_atomics_helper+0x16e8/0x5450
[   23.671759]  ? kasan_complete_mode_report_info+0x2a/0x200
[   23.671795]  ? kasan_atomics_helper+0x16e8/0x5450
[   23.671850]  kasan_report+0x140/0x180
[   23.671896]  ? kasan_atomics_helper+0x16e8/0x5450
[   23.671940]  kasan_check_range+0x10c/0x1c0
[   23.671971]  __kasan_check_write+0x18/0x20
[   23.672002]  kasan_atomics_helper+0x16e8/0x5450
[   23.672039]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   23.672076]  ? __kmalloc_cache_noprof+0x168/0x350
[   23.672107]  ? trace_hardirqs_on+0x37/0xe0
[   23.672146]  kasan_atomics+0x1dd/0x310
[   23.672175]  ? __pfx_kasan_atomics+0x10/0x10
[   23.672206]  ? __pfx_read_tsc+0x10/0x10
[   23.672257]  ? ktime_get_ts64+0x84/0x230
[   23.672299]  kunit_try_run_case+0x1a6/0x480
[   23.672335]  ? __pfx_kunit_try_run_case+0x10/0x10
[   23.672366]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   23.672397]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   23.672435]  ? __kthread_parkme+0x82/0x160
[   23.672463]  ? preempt_count_sub+0x50/0x80
[   23.672495]  ? __pfx_kunit_try_run_case+0x10/0x10
[   23.672523]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   23.672562]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   23.672599]  kthread+0x257/0x310
[   23.672625]  ? __pfx_kthread+0x10/0x10
[   23.672653]  ret_from_fork+0x41/0x80
[   23.672683]  ? __pfx_kthread+0x10/0x10
[   23.672710]  ret_from_fork_asm+0x1a/0x30
[   23.672753]  </TASK>
[   23.672768] 
[   23.689775] Allocated by task 270:
[   23.690160]  kasan_save_stack+0x45/0x70
[   23.690552]  kasan_save_track+0x18/0x40
[   23.690923]  kasan_save_alloc_info+0x3b/0x50
[   23.692214]  __kasan_kmalloc+0xb7/0xc0
[   23.692777]  __kmalloc_cache_noprof+0x168/0x350
[   23.693413]  kasan_atomics+0x96/0x310
[   23.694045]  kunit_try_run_case+0x1a6/0x480
[   23.694512]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   23.695246]  kthread+0x257/0x310
[   23.695665]  ret_from_fork+0x41/0x80
[   23.695988]  ret_from_fork_asm+0x1a/0x30
[   23.696466] 
[   23.696693] The buggy address belongs to the object at ffff888102314e80
[   23.696693]  which belongs to the cache kmalloc-64 of size 64
[   23.697702] The buggy address is located 0 bytes to the right of
[   23.697702]  allocated 48-byte region [ffff888102314e80, ffff888102314eb0)
[   23.698803] 
[   23.699072] The buggy address belongs to the physical page:
[   23.699633] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102314
[   23.700371] flags: 0x200000000000000(node=0|zone=2)
[   23.700800] page_type: f5(slab)
[   23.701177] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   23.701884] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   23.702493] page dumped because: kasan: bad access detected
[   23.703106] 
[   23.703385] Memory state around the buggy address:
[   23.703834]  ffff888102314d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.704478]  ffff888102314e00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.705273] >ffff888102314e80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   23.705843]                                      ^
[   23.706381]  ffff888102314f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.707012]  ffff888102314f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.708029] ==================================================================
[   22.664127] ==================================================================
[   22.665286] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xb6b/0x5450
[   22.665867] Write of size 4 at addr ffff888102314eb0 by task kunit_try_catch/270
[   22.667089] 
[   22.667206] CPU: 1 UID: 0 PID: 270 Comm: kunit_try_catch Tainted: G    B            N 6.12.33-rc1 #1
[   22.667343] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.667386] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   22.667453] Call Trace:
[   22.667506]  <TASK>
[   22.667562]  dump_stack_lvl+0x73/0xb0
[   22.667654]  print_report+0xd1/0x640
[   22.667741]  ? __virt_addr_valid+0x1db/0x2d0
[   22.667838]  ? kasan_atomics_helper+0xb6b/0x5450
[   22.667924]  ? kasan_complete_mode_report_info+0x2a/0x200
[   22.668012]  ? kasan_atomics_helper+0xb6b/0x5450
[   22.668064]  kasan_report+0x140/0x180
[   22.668104]  ? kasan_atomics_helper+0xb6b/0x5450
[   22.668147]  kasan_check_range+0x10c/0x1c0
[   22.668178]  __kasan_check_write+0x18/0x20
[   22.668210]  kasan_atomics_helper+0xb6b/0x5450
[   22.668272]  ? kasan_save_alloc_info+0x3b/0x50
[   22.668304]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   22.668342]  ? __kmalloc_cache_noprof+0x168/0x350
[   22.668373]  ? trace_hardirqs_on+0x37/0xe0
[   22.668413]  kasan_atomics+0x1dd/0x310
[   22.668444]  ? __pfx_kasan_atomics+0x10/0x10
[   22.668474]  ? __pfx_read_tsc+0x10/0x10
[   22.668502]  ? ktime_get_ts64+0x84/0x230
[   22.668538]  kunit_try_run_case+0x1a6/0x480
[   22.668573]  ? __pfx_kunit_try_run_case+0x10/0x10
[   22.668602]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   22.668632]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   22.668670]  ? __kthread_parkme+0x82/0x160
[   22.668698]  ? preempt_count_sub+0x50/0x80
[   22.668729]  ? __pfx_kunit_try_run_case+0x10/0x10
[   22.668758]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   22.668795]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   22.668857]  kthread+0x257/0x310
[   22.668890]  ? __pfx_kthread+0x10/0x10
[   22.668918]  ret_from_fork+0x41/0x80
[   22.668948]  ? __pfx_kthread+0x10/0x10
[   22.668975]  ret_from_fork_asm+0x1a/0x30
[   22.669016]  </TASK>
[   22.669031] 
[   22.691639] Allocated by task 270:
[   22.692484]  kasan_save_stack+0x45/0x70
[   22.693094]  kasan_save_track+0x18/0x40
[   22.693549]  kasan_save_alloc_info+0x3b/0x50
[   22.693927]  __kasan_kmalloc+0xb7/0xc0
[   22.694346]  __kmalloc_cache_noprof+0x168/0x350
[   22.694730]  kasan_atomics+0x96/0x310
[   22.695217]  kunit_try_run_case+0x1a6/0x480
[   22.696270]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   22.696924]  kthread+0x257/0x310
[   22.697438]  ret_from_fork+0x41/0x80
[   22.697973]  ret_from_fork_asm+0x1a/0x30
[   22.698536] 
[   22.698931] The buggy address belongs to the object at ffff888102314e80
[   22.698931]  which belongs to the cache kmalloc-64 of size 64
[   22.700212] The buggy address is located 0 bytes to the right of
[   22.700212]  allocated 48-byte region [ffff888102314e80, ffff888102314eb0)
[   22.701158] 
[   22.701442] The buggy address belongs to the physical page:
[   22.701970] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102314
[   22.702645] flags: 0x200000000000000(node=0|zone=2)
[   22.703165] page_type: f5(slab)
[   22.703502] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   22.704201] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   22.704882] page dumped because: kasan: bad access detected
[   22.705439] 
[   22.705801] Memory state around the buggy address:
[   22.706315]  ffff888102314d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.707001]  ffff888102314e00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.708154] >ffff888102314e80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   22.708784]                                      ^
[   22.709742]  ffff888102314f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.710350]  ffff888102314f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.710965] ==================================================================
[   23.759312] ==================================================================
[   23.760093] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1819/0x5450
[   23.761689] Write of size 8 at addr ffff888102314eb0 by task kunit_try_catch/270
[   23.762443] 
[   23.762729] CPU: 1 UID: 0 PID: 270 Comm: kunit_try_catch Tainted: G    B            N 6.12.33-rc1 #1
[   23.762889] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.762935] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   23.762997] Call Trace:
[   23.763093]  <TASK>
[   23.763147]  dump_stack_lvl+0x73/0xb0
[   23.763266]  print_report+0xd1/0x640
[   23.763347]  ? __virt_addr_valid+0x1db/0x2d0
[   23.763388]  ? kasan_atomics_helper+0x1819/0x5450
[   23.763423]  ? kasan_complete_mode_report_info+0x2a/0x200
[   23.763457]  ? kasan_atomics_helper+0x1819/0x5450
[   23.763528]  kasan_report+0x140/0x180
[   23.763582]  ? kasan_atomics_helper+0x1819/0x5450
[   23.763630]  kasan_check_range+0x10c/0x1c0
[   23.763663]  __kasan_check_write+0x18/0x20
[   23.763695]  kasan_atomics_helper+0x1819/0x5450
[   23.763732]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   23.763769]  ? __kmalloc_cache_noprof+0x168/0x350
[   23.763802]  ? trace_hardirqs_on+0x37/0xe0
[   23.763887]  kasan_atomics+0x1dd/0x310
[   23.763920]  ? __pfx_kasan_atomics+0x10/0x10
[   23.763951]  ? __pfx_read_tsc+0x10/0x10
[   23.763980]  ? ktime_get_ts64+0x84/0x230
[   23.764017]  kunit_try_run_case+0x1a6/0x480
[   23.764052]  ? __pfx_kunit_try_run_case+0x10/0x10
[   23.764082]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   23.764112]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   23.764149]  ? __kthread_parkme+0x82/0x160
[   23.764177]  ? preempt_count_sub+0x50/0x80
[   23.764208]  ? __pfx_kunit_try_run_case+0x10/0x10
[   23.764268]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   23.764310]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   23.764349]  kthread+0x257/0x310
[   23.764376]  ? __pfx_kthread+0x10/0x10
[   23.764403]  ret_from_fork+0x41/0x80
[   23.764433]  ? __pfx_kthread+0x10/0x10
[   23.764460]  ret_from_fork_asm+0x1a/0x30
[   23.764503]  </TASK>
[   23.764518] 
[   23.779792] Allocated by task 270:
[   23.780297]  kasan_save_stack+0x45/0x70
[   23.780766]  kasan_save_track+0x18/0x40
[   23.781188]  kasan_save_alloc_info+0x3b/0x50
[   23.781711]  __kasan_kmalloc+0xb7/0xc0
[   23.782214]  __kmalloc_cache_noprof+0x168/0x350
[   23.782744]  kasan_atomics+0x96/0x310
[   23.783190]  kunit_try_run_case+0x1a6/0x480
[   23.783668]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   23.784257]  kthread+0x257/0x310
[   23.784569]  ret_from_fork+0x41/0x80
[   23.784937]  ret_from_fork_asm+0x1a/0x30
[   23.785280] 
[   23.785522] The buggy address belongs to the object at ffff888102314e80
[   23.785522]  which belongs to the cache kmalloc-64 of size 64
[   23.786681] The buggy address is located 0 bytes to the right of
[   23.786681]  allocated 48-byte region [ffff888102314e80, ffff888102314eb0)
[   23.787723] 
[   23.787966] The buggy address belongs to the physical page:
[   23.788376] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102314
[   23.789113] flags: 0x200000000000000(node=0|zone=2)
[   23.789664] page_type: f5(slab)
[   23.790123] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   23.790876] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   23.791398] page dumped because: kasan: bad access detected
[   23.791982] 
[   23.792283] Memory state around the buggy address:
[   23.792719]  ffff888102314d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.793219]  ffff888102314e00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.793935] >ffff888102314e80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   23.794590]                                      ^
[   23.795121]  ffff888102314f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.795655]  ffff888102314f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.796108] ==================================================================
[   22.963962] ==================================================================
[   22.965327] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xfaa/0x5450
[   22.966692] Write of size 4 at addr ffff888102314eb0 by task kunit_try_catch/270
[   22.967758] 
[   22.968000] CPU: 1 UID: 0 PID: 270 Comm: kunit_try_catch Tainted: G    B            N 6.12.33-rc1 #1
[   22.968110] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.968153] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   22.968217] Call Trace:
[   22.968443]  <TASK>
[   22.968472]  dump_stack_lvl+0x73/0xb0
[   22.968518]  print_report+0xd1/0x640
[   22.968555]  ? __virt_addr_valid+0x1db/0x2d0
[   22.968592]  ? kasan_atomics_helper+0xfaa/0x5450
[   22.968626]  ? kasan_complete_mode_report_info+0x2a/0x200
[   22.968660]  ? kasan_atomics_helper+0xfaa/0x5450
[   22.968694]  kasan_report+0x140/0x180
[   22.968730]  ? kasan_atomics_helper+0xfaa/0x5450
[   22.968771]  kasan_check_range+0x10c/0x1c0
[   22.968802]  __kasan_check_write+0x18/0x20
[   22.968855]  kasan_atomics_helper+0xfaa/0x5450
[   22.968903]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   22.968941]  ? __kmalloc_cache_noprof+0x168/0x350
[   22.968973]  ? trace_hardirqs_on+0x37/0xe0
[   22.969014]  kasan_atomics+0x1dd/0x310
[   22.969044]  ? __pfx_kasan_atomics+0x10/0x10
[   22.969076]  ? __pfx_read_tsc+0x10/0x10
[   22.969106]  ? ktime_get_ts64+0x84/0x230
[   22.969143]  kunit_try_run_case+0x1a6/0x480
[   22.969178]  ? __pfx_kunit_try_run_case+0x10/0x10
[   22.969207]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   22.969272]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   22.969312]  ? __kthread_parkme+0x82/0x160
[   22.969341]  ? preempt_count_sub+0x50/0x80
[   22.969373]  ? __pfx_kunit_try_run_case+0x10/0x10
[   22.969403]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   22.969442]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   22.969481]  kthread+0x257/0x310
[   22.969508]  ? __pfx_kthread+0x10/0x10
[   22.969535]  ret_from_fork+0x41/0x80
[   22.969567]  ? __pfx_kthread+0x10/0x10
[   22.969594]  ret_from_fork_asm+0x1a/0x30
[   22.969636]  </TASK>
[   22.969651] 
[   22.987199] Allocated by task 270:
[   22.987632]  kasan_save_stack+0x45/0x70
[   22.988070]  kasan_save_track+0x18/0x40
[   22.988524]  kasan_save_alloc_info+0x3b/0x50
[   22.988903]  __kasan_kmalloc+0xb7/0xc0
[   22.989322]  __kmalloc_cache_noprof+0x168/0x350
[   22.989888]  kasan_atomics+0x96/0x310
[   22.990345]  kunit_try_run_case+0x1a6/0x480
[   22.990738]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   22.991201]  kthread+0x257/0x310
[   22.991628]  ret_from_fork+0x41/0x80
[   22.992112]  ret_from_fork_asm+0x1a/0x30
[   22.992607] 
[   22.992887] The buggy address belongs to the object at ffff888102314e80
[   22.992887]  which belongs to the cache kmalloc-64 of size 64
[   22.993886] The buggy address is located 0 bytes to the right of
[   22.993886]  allocated 48-byte region [ffff888102314e80, ffff888102314eb0)
[   22.994906] 
[   22.995137] The buggy address belongs to the physical page:
[   22.995685] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102314
[   22.996415] flags: 0x200000000000000(node=0|zone=2)
[   22.996901] page_type: f5(slab)
[   22.997267] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   22.997992] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   22.998672] page dumped because: kasan: bad access detected
[   22.999271] 
[   22.999538] Memory state around the buggy address:
[   22.999990]  ffff888102314d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.000593]  ffff888102314e00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.001208] >ffff888102314e80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   23.001804]                                      ^
[   23.002352]  ffff888102314f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.002915]  ffff888102314f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.003583] ==================================================================
[   22.712947] ==================================================================
[   22.713636] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xc71/0x5450
[   22.714376] Write of size 4 at addr ffff888102314eb0 by task kunit_try_catch/270
[   22.715093] 
[   22.715413] CPU: 1 UID: 0 PID: 270 Comm: kunit_try_catch Tainted: G    B            N 6.12.33-rc1 #1
[   22.715570] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.715616] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   22.715680] Call Trace:
[   22.715769]  <TASK>
[   22.715825]  dump_stack_lvl+0x73/0xb0
[   22.715912]  print_report+0xd1/0x640
[   22.715993]  ? __virt_addr_valid+0x1db/0x2d0
[   22.716076]  ? kasan_atomics_helper+0xc71/0x5450
[   22.716151]  ? kasan_complete_mode_report_info+0x2a/0x200
[   22.716252]  ? kasan_atomics_helper+0xc71/0x5450
[   22.716377]  kasan_report+0x140/0x180
[   22.716491]  ? kasan_atomics_helper+0xc71/0x5450
[   22.716594]  kasan_check_range+0x10c/0x1c0
[   22.716675]  __kasan_check_write+0x18/0x20
[   22.716750]  kasan_atomics_helper+0xc71/0x5450
[   22.716833]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   22.716925]  ? __kmalloc_cache_noprof+0x168/0x350
[   22.716964]  ? trace_hardirqs_on+0x37/0xe0
[   22.717005]  kasan_atomics+0x1dd/0x310
[   22.717034]  ? __pfx_kasan_atomics+0x10/0x10
[   22.717067]  ? __pfx_read_tsc+0x10/0x10
[   22.717096]  ? ktime_get_ts64+0x84/0x230
[   22.717132]  kunit_try_run_case+0x1a6/0x480
[   22.717166]  ? __pfx_kunit_try_run_case+0x10/0x10
[   22.717196]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   22.717255]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   22.717299]  ? __kthread_parkme+0x82/0x160
[   22.717328]  ? preempt_count_sub+0x50/0x80
[   22.717361]  ? __pfx_kunit_try_run_case+0x10/0x10
[   22.717391]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   22.717429]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   22.717469]  kthread+0x257/0x310
[   22.717495]  ? __pfx_kthread+0x10/0x10
[   22.717523]  ret_from_fork+0x41/0x80
[   22.717553]  ? __pfx_kthread+0x10/0x10
[   22.717582]  ret_from_fork_asm+0x1a/0x30
[   22.717624]  </TASK>
[   22.717639] 
[   22.732427] Allocated by task 270:
[   22.732881]  kasan_save_stack+0x45/0x70
[   22.733390]  kasan_save_track+0x18/0x40
[   22.733963]  kasan_save_alloc_info+0x3b/0x50
[   22.734508]  __kasan_kmalloc+0xb7/0xc0
[   22.735014]  __kmalloc_cache_noprof+0x168/0x350
[   22.735631]  kasan_atomics+0x96/0x310
[   22.736098]  kunit_try_run_case+0x1a6/0x480
[   22.736570]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   22.737380]  kthread+0x257/0x310
[   22.737749]  ret_from_fork+0x41/0x80
[   22.738478]  ret_from_fork_asm+0x1a/0x30
[   22.739679] 
[   22.740931] The buggy address belongs to the object at ffff888102314e80
[   22.740931]  which belongs to the cache kmalloc-64 of size 64
[   22.741655] The buggy address is located 0 bytes to the right of
[   22.741655]  allocated 48-byte region [ffff888102314e80, ffff888102314eb0)
[   22.743135] 
[   22.743473] The buggy address belongs to the physical page:
[   22.744003] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102314
[   22.744779] flags: 0x200000000000000(node=0|zone=2)
[   22.745295] page_type: f5(slab)
[   22.745687] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   22.746336] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   22.746964] page dumped because: kasan: bad access detected
[   22.747418] 
[   22.747648] Memory state around the buggy address:
[   22.748120]  ffff888102314d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.748621]  ffff888102314e00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.749177] >ffff888102314e80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   22.749760]                                      ^
[   22.750274]  ffff888102314f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.750911]  ffff888102314f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.751474] ==================================================================
[   23.120605] ==================================================================
[   23.121459] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1149/0x5450
[   23.122002] Write of size 4 at addr ffff888102314eb0 by task kunit_try_catch/270
[   23.122737] 
[   23.122929] CPU: 1 UID: 0 PID: 270 Comm: kunit_try_catch Tainted: G    B            N 6.12.33-rc1 #1
[   23.123028] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.123060] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   23.123109] Call Trace:
[   23.123157]  <TASK>
[   23.123201]  dump_stack_lvl+0x73/0xb0
[   23.123341]  print_report+0xd1/0x640
[   23.123425]  ? __virt_addr_valid+0x1db/0x2d0
[   23.123548]  ? kasan_atomics_helper+0x1149/0x5450
[   23.123636]  ? kasan_complete_mode_report_info+0x2a/0x200
[   23.123716]  ? kasan_atomics_helper+0x1149/0x5450
[   23.123797]  kasan_report+0x140/0x180
[   23.123901]  ? kasan_atomics_helper+0x1149/0x5450
[   23.124035]  kasan_check_range+0x10c/0x1c0
[   23.124116]  __kasan_check_write+0x18/0x20
[   23.124246]  kasan_atomics_helper+0x1149/0x5450
[   23.124338]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   23.124425]  ? __kmalloc_cache_noprof+0x168/0x350
[   23.124502]  ? trace_hardirqs_on+0x37/0xe0
[   23.124636]  kasan_atomics+0x1dd/0x310
[   23.124715]  ? __pfx_kasan_atomics+0x10/0x10
[   23.124784]  ? __pfx_read_tsc+0x10/0x10
[   23.124821]  ? ktime_get_ts64+0x84/0x230
[   23.124905]  kunit_try_run_case+0x1a6/0x480
[   23.124984]  ? __pfx_kunit_try_run_case+0x10/0x10
[   23.125103]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   23.125204]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   23.125310]  ? __kthread_parkme+0x82/0x160
[   23.125419]  ? preempt_count_sub+0x50/0x80
[   23.125507]  ? __pfx_kunit_try_run_case+0x10/0x10
[   23.125580]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   23.125663]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   23.125716]  kthread+0x257/0x310
[   23.125744]  ? __pfx_kthread+0x10/0x10
[   23.125774]  ret_from_fork+0x41/0x80
[   23.125805]  ? __pfx_kthread+0x10/0x10
[   23.125864]  ret_from_fork_asm+0x1a/0x30
[   23.125915]  </TASK>
[   23.125932] 
[   23.140625] Allocated by task 270:
[   23.141001]  kasan_save_stack+0x45/0x70
[   23.141481]  kasan_save_track+0x18/0x40
[   23.142280]  kasan_save_alloc_info+0x3b/0x50
[   23.142927]  __kasan_kmalloc+0xb7/0xc0
[   23.143454]  __kmalloc_cache_noprof+0x168/0x350
[   23.143864]  kasan_atomics+0x96/0x310
[   23.144297]  kunit_try_run_case+0x1a6/0x480
[   23.144637]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   23.145416]  kthread+0x257/0x310
[   23.145818]  ret_from_fork+0x41/0x80
[   23.146338]  ret_from_fork_asm+0x1a/0x30
[   23.146891] 
[   23.147167] The buggy address belongs to the object at ffff888102314e80
[   23.147167]  which belongs to the cache kmalloc-64 of size 64
[   23.148310] The buggy address is located 0 bytes to the right of
[   23.148310]  allocated 48-byte region [ffff888102314e80, ffff888102314eb0)
[   23.149369] 
[   23.149561] The buggy address belongs to the physical page:
[   23.150006] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102314
[   23.150801] flags: 0x200000000000000(node=0|zone=2)
[   23.151394] page_type: f5(slab)
[   23.151915] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   23.152683] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   23.153522] page dumped because: kasan: bad access detected
[   23.154091] 
[   23.154308] Memory state around the buggy address:
[   23.154647]  ffff888102314d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.155155]  ffff888102314e00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.155875] >ffff888102314e80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   23.156755]                                      ^
[   23.157684]  ffff888102314f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.158458]  ffff888102314f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.158896] ==================================================================
[   23.247152] ==================================================================
[   23.248723] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x49ea/0x5450
[   23.249514] Read of size 4 at addr ffff888102314eb0 by task kunit_try_catch/270
[   23.250136] 
[   23.250453] CPU: 1 UID: 0 PID: 270 Comm: kunit_try_catch Tainted: G    B            N 6.12.33-rc1 #1
[   23.250580] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.250625] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   23.250707] Call Trace:
[   23.250788]  <TASK>
[   23.250875]  dump_stack_lvl+0x73/0xb0
[   23.250926]  print_report+0xd1/0x640
[   23.250963]  ? __virt_addr_valid+0x1db/0x2d0
[   23.251045]  ? kasan_atomics_helper+0x49ea/0x5450
[   23.251123]  ? kasan_complete_mode_report_info+0x2a/0x200
[   23.251206]  ? kasan_atomics_helper+0x49ea/0x5450
[   23.251323]  kasan_report+0x140/0x180
[   23.251449]  ? kasan_atomics_helper+0x49ea/0x5450
[   23.251583]  __asan_report_load4_noabort+0x18/0x20
[   23.251659]  kasan_atomics_helper+0x49ea/0x5450
[   23.251717]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   23.251757]  ? __kmalloc_cache_noprof+0x168/0x350
[   23.251791]  ? trace_hardirqs_on+0x37/0xe0
[   23.251870]  kasan_atomics+0x1dd/0x310
[   23.251909]  ? __pfx_kasan_atomics+0x10/0x10
[   23.251941]  ? __pfx_read_tsc+0x10/0x10
[   23.251970]  ? ktime_get_ts64+0x84/0x230
[   23.252006]  kunit_try_run_case+0x1a6/0x480
[   23.252041]  ? __pfx_kunit_try_run_case+0x10/0x10
[   23.252071]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   23.252101]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   23.252139]  ? __kthread_parkme+0x82/0x160
[   23.252168]  ? preempt_count_sub+0x50/0x80
[   23.252202]  ? __pfx_kunit_try_run_case+0x10/0x10
[   23.252260]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   23.252303]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   23.252343]  kthread+0x257/0x310
[   23.252370]  ? __pfx_kthread+0x10/0x10
[   23.252397]  ret_from_fork+0x41/0x80
[   23.252427]  ? __pfx_kthread+0x10/0x10
[   23.252454]  ret_from_fork_asm+0x1a/0x30
[   23.252499]  </TASK>
[   23.252514] 
[   23.270636] Allocated by task 270:
[   23.271296]  kasan_save_stack+0x45/0x70
[   23.271687]  kasan_save_track+0x18/0x40
[   23.272485]  kasan_save_alloc_info+0x3b/0x50
[   23.273140]  __kasan_kmalloc+0xb7/0xc0
[   23.273687]  __kmalloc_cache_noprof+0x168/0x350
[   23.274246]  kasan_atomics+0x96/0x310
[   23.274709]  kunit_try_run_case+0x1a6/0x480
[   23.275321]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   23.275858]  kthread+0x257/0x310
[   23.276338]  ret_from_fork+0x41/0x80
[   23.276682]  ret_from_fork_asm+0x1a/0x30
[   23.277110] 
[   23.277593] The buggy address belongs to the object at ffff888102314e80
[   23.277593]  which belongs to the cache kmalloc-64 of size 64
[   23.279119] The buggy address is located 0 bytes to the right of
[   23.279119]  allocated 48-byte region [ffff888102314e80, ffff888102314eb0)
[   23.280654] 
[   23.280843] The buggy address belongs to the physical page:
[   23.281451] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102314
[   23.282615] flags: 0x200000000000000(node=0|zone=2)
[   23.282922] page_type: f5(slab)
[   23.283470] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   23.284559] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   23.285119] page dumped because: kasan: bad access detected
[   23.285753] 
[   23.286201] Memory state around the buggy address:
[   23.286729]  ffff888102314d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.288018]  ffff888102314e00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.288521] >ffff888102314e80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   23.289438]                                      ^
[   23.289756]  ffff888102314f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.290733]  ffff888102314f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.291302] ==================================================================
[   23.544666] ==================================================================
[   23.545278] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x151e/0x5450
[   23.545962] Write of size 8 at addr ffff888102314eb0 by task kunit_try_catch/270
[   23.546689] 
[   23.546952] CPU: 1 UID: 0 PID: 270 Comm: kunit_try_catch Tainted: G    B            N 6.12.33-rc1 #1
[   23.547098] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.547172] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   23.547272] Call Trace:
[   23.547335]  <TASK>
[   23.547387]  dump_stack_lvl+0x73/0xb0
[   23.547518]  print_report+0xd1/0x640
[   23.547602]  ? __virt_addr_valid+0x1db/0x2d0
[   23.547642]  ? kasan_atomics_helper+0x151e/0x5450
[   23.547679]  ? kasan_complete_mode_report_info+0x2a/0x200
[   23.547713]  ? kasan_atomics_helper+0x151e/0x5450
[   23.547773]  kasan_report+0x140/0x180
[   23.547839]  ? kasan_atomics_helper+0x151e/0x5450
[   23.547941]  kasan_check_range+0x10c/0x1c0
[   23.548016]  __kasan_check_write+0x18/0x20
[   23.548111]  kasan_atomics_helper+0x151e/0x5450
[   23.548246]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   23.548336]  ? __kmalloc_cache_noprof+0x168/0x350
[   23.548414]  ? trace_hardirqs_on+0x37/0xe0
[   23.548504]  kasan_atomics+0x1dd/0x310
[   23.548576]  ? __pfx_kasan_atomics+0x10/0x10
[   23.548646]  ? __pfx_read_tsc+0x10/0x10
[   23.548717]  ? ktime_get_ts64+0x84/0x230
[   23.548798]  kunit_try_run_case+0x1a6/0x480
[   23.548884]  ? __pfx_kunit_try_run_case+0x10/0x10
[   23.548957]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   23.549052]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   23.549163]  ? __kthread_parkme+0x82/0x160
[   23.549254]  ? preempt_count_sub+0x50/0x80
[   23.549337]  ? __pfx_kunit_try_run_case+0x10/0x10
[   23.549407]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   23.549490]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   23.549574]  kthread+0x257/0x310
[   23.549643]  ? __pfx_kthread+0x10/0x10
[   23.549711]  ret_from_fork+0x41/0x80
[   23.549778]  ? __pfx_kthread+0x10/0x10
[   23.549808]  ret_from_fork_asm+0x1a/0x30
[   23.549888]  </TASK>
[   23.549904] 
[   23.565095] Allocated by task 270:
[   23.565723]  kasan_save_stack+0x45/0x70
[   23.566262]  kasan_save_track+0x18/0x40
[   23.566726]  kasan_save_alloc_info+0x3b/0x50
[   23.567350]  __kasan_kmalloc+0xb7/0xc0
[   23.567668]  __kmalloc_cache_noprof+0x168/0x350
[   23.568135]  kasan_atomics+0x96/0x310
[   23.568595]  kunit_try_run_case+0x1a6/0x480
[   23.569109]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   23.569659]  kthread+0x257/0x310
[   23.570220]  ret_from_fork+0x41/0x80
[   23.570644]  ret_from_fork_asm+0x1a/0x30
[   23.571142] 
[   23.571440] The buggy address belongs to the object at ffff888102314e80
[   23.571440]  which belongs to the cache kmalloc-64 of size 64
[   23.572417] The buggy address is located 0 bytes to the right of
[   23.572417]  allocated 48-byte region [ffff888102314e80, ffff888102314eb0)
[   23.573565] 
[   23.573845] The buggy address belongs to the physical page:
[   23.574380] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102314
[   23.575050] flags: 0x200000000000000(node=0|zone=2)
[   23.575561] page_type: f5(slab)
[   23.575966] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   23.576542] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   23.577176] page dumped because: kasan: bad access detected
[   23.577706] 
[   23.577985] Memory state around the buggy address:
[   23.578494]  ffff888102314d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.579163]  ffff888102314e00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.579839] >ffff888102314e80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   23.580405]                                      ^
[   23.580886]  ffff888102314f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.581638]  ffff888102314f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.582413] ==================================================================
[   23.921834] ==================================================================
[   23.922536] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1a80/0x5450
[   23.923246] Write of size 8 at addr ffff888102314eb0 by task kunit_try_catch/270
[   23.924598] 
[   23.924856] CPU: 1 UID: 0 PID: 270 Comm: kunit_try_catch Tainted: G    B            N 6.12.33-rc1 #1
[   23.925033] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.925069] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   23.925118] Call Trace:
[   23.925168]  <TASK>
[   23.925219]  dump_stack_lvl+0x73/0xb0
[   23.925382]  print_report+0xd1/0x640
[   23.925521]  ? __virt_addr_valid+0x1db/0x2d0
[   23.925663]  ? kasan_atomics_helper+0x1a80/0x5450
[   23.925751]  ? kasan_complete_mode_report_info+0x2a/0x200
[   23.925884]  ? kasan_atomics_helper+0x1a80/0x5450
[   23.925974]  kasan_report+0x140/0x180
[   23.926062]  ? kasan_atomics_helper+0x1a80/0x5450
[   23.926157]  kasan_check_range+0x10c/0x1c0
[   23.926248]  __kasan_check_write+0x18/0x20
[   23.926327]  kasan_atomics_helper+0x1a80/0x5450
[   23.926413]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   23.926496]  ? __kmalloc_cache_noprof+0x168/0x350
[   23.926571]  ? trace_hardirqs_on+0x37/0xe0
[   23.926659]  kasan_atomics+0x1dd/0x310
[   23.926735]  ? __pfx_kasan_atomics+0x10/0x10
[   23.926876]  ? __pfx_read_tsc+0x10/0x10
[   23.926955]  ? ktime_get_ts64+0x84/0x230
[   23.927101]  kunit_try_run_case+0x1a6/0x480
[   23.927193]  ? __pfx_kunit_try_run_case+0x10/0x10
[   23.927294]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   23.927370]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   23.927507]  ? __kthread_parkme+0x82/0x160
[   23.927589]  ? preempt_count_sub+0x50/0x80
[   23.927673]  ? __pfx_kunit_try_run_case+0x10/0x10
[   23.927747]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   23.927831]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   23.927978]  kthread+0x257/0x310
[   23.928052]  ? __pfx_kthread+0x10/0x10
[   23.928179]  ret_from_fork+0x41/0x80
[   23.928273]  ? __pfx_kthread+0x10/0x10
[   23.928345]  ret_from_fork_asm+0x1a/0x30
[   23.928396]  </TASK>
[   23.928413] 
[   23.947894] Allocated by task 270:
[   23.948390]  kasan_save_stack+0x45/0x70
[   23.949070]  kasan_save_track+0x18/0x40
[   23.949425]  kasan_save_alloc_info+0x3b/0x50
[   23.949764]  __kasan_kmalloc+0xb7/0xc0
[   23.950745]  __kmalloc_cache_noprof+0x168/0x350
[   23.951321]  kasan_atomics+0x96/0x310
[   23.951700]  kunit_try_run_case+0x1a6/0x480
[   23.952468]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   23.952835]  kthread+0x257/0x310
[   23.953461]  ret_from_fork+0x41/0x80
[   23.953852]  ret_from_fork_asm+0x1a/0x30
[   23.954341] 
[   23.954531] The buggy address belongs to the object at ffff888102314e80
[   23.954531]  which belongs to the cache kmalloc-64 of size 64
[   23.956519] The buggy address is located 0 bytes to the right of
[   23.956519]  allocated 48-byte region [ffff888102314e80, ffff888102314eb0)
[   23.957779] 
[   23.958005] The buggy address belongs to the physical page:
[   23.958465] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102314
[   23.959625] flags: 0x200000000000000(node=0|zone=2)
[   23.960088] page_type: f5(slab)
[   23.960483] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   23.961419] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   23.962172] page dumped because: kasan: bad access detected
[   23.962790] 
[   23.963220] Memory state around the buggy address:
[   23.963960]  ffff888102314d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.964478]  ffff888102314e00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.965183] >ffff888102314e80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   23.965777]                                      ^
[   23.966465]  ffff888102314f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.967205]  ffff888102314f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.967984] ==================================================================
[   23.505695] ==================================================================
[   23.506867] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x50d6/0x5450
[   23.507836] Write of size 8 at addr ffff888102314eb0 by task kunit_try_catch/270
[   23.509142] 
[   23.509466] CPU: 1 UID: 0 PID: 270 Comm: kunit_try_catch Tainted: G    B            N 6.12.33-rc1 #1
[   23.509591] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.509631] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   23.509694] Call Trace:
[   23.509774]  <TASK>
[   23.509851]  dump_stack_lvl+0x73/0xb0
[   23.509958]  print_report+0xd1/0x640
[   23.510001]  ? __virt_addr_valid+0x1db/0x2d0
[   23.510039]  ? kasan_atomics_helper+0x50d6/0x5450
[   23.510073]  ? kasan_complete_mode_report_info+0x2a/0x200
[   23.510107]  ? kasan_atomics_helper+0x50d6/0x5450
[   23.510142]  kasan_report+0x140/0x180
[   23.510177]  ? kasan_atomics_helper+0x50d6/0x5450
[   23.510219]  __asan_report_store8_noabort+0x1b/0x30
[   23.510282]  kasan_atomics_helper+0x50d6/0x5450
[   23.510322]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   23.510360]  ? __kmalloc_cache_noprof+0x168/0x350
[   23.510392]  ? trace_hardirqs_on+0x37/0xe0
[   23.510433]  kasan_atomics+0x1dd/0x310
[   23.510464]  ? __pfx_kasan_atomics+0x10/0x10
[   23.510496]  ? __pfx_read_tsc+0x10/0x10
[   23.510525]  ? ktime_get_ts64+0x84/0x230
[   23.510560]  kunit_try_run_case+0x1a6/0x480
[   23.510594]  ? __pfx_kunit_try_run_case+0x10/0x10
[   23.510624]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   23.510654]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   23.510691]  ? __kthread_parkme+0x82/0x160
[   23.510720]  ? preempt_count_sub+0x50/0x80
[   23.510752]  ? __pfx_kunit_try_run_case+0x10/0x10
[   23.510781]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   23.510827]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   23.510898]  kthread+0x257/0x310
[   23.510927]  ? __pfx_kthread+0x10/0x10
[   23.510955]  ret_from_fork+0x41/0x80
[   23.510985]  ? __pfx_kthread+0x10/0x10
[   23.511012]  ret_from_fork_asm+0x1a/0x30
[   23.511056]  </TASK>
[   23.511071] 
[   23.525645] Allocated by task 270:
[   23.526211]  kasan_save_stack+0x45/0x70
[   23.526681]  kasan_save_track+0x18/0x40
[   23.527814]  kasan_save_alloc_info+0x3b/0x50
[   23.528249]  __kasan_kmalloc+0xb7/0xc0
[   23.528649]  __kmalloc_cache_noprof+0x168/0x350
[   23.529097]  kasan_atomics+0x96/0x310
[   23.529681]  kunit_try_run_case+0x1a6/0x480
[   23.530284]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   23.530782]  kthread+0x257/0x310
[   23.531144]  ret_from_fork+0x41/0x80
[   23.531583]  ret_from_fork_asm+0x1a/0x30
[   23.532098] 
[   23.532351] The buggy address belongs to the object at ffff888102314e80
[   23.532351]  which belongs to the cache kmalloc-64 of size 64
[   23.533258] The buggy address is located 0 bytes to the right of
[   23.533258]  allocated 48-byte region [ffff888102314e80, ffff888102314eb0)
[   23.534464] 
[   23.534693] The buggy address belongs to the physical page:
[   23.535202] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102314
[   23.535947] flags: 0x200000000000000(node=0|zone=2)
[   23.536434] page_type: f5(slab)
[   23.536873] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   23.537501] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   23.538177] page dumped because: kasan: bad access detected
[   23.538704] 
[   23.538958] Memory state around the buggy address:
[   23.539497]  ffff888102314d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.540247]  ffff888102314e00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.540850] >ffff888102314e80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   23.541415]                                      ^
[   23.541908]  ffff888102314f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.542612]  ffff888102314f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.543307] ==================================================================
[   23.623887] ==================================================================
[   23.624477] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1650/0x5450
[   23.625529] Write of size 8 at addr ffff888102314eb0 by task kunit_try_catch/270
[   23.626167] 
[   23.626398] CPU: 1 UID: 0 PID: 270 Comm: kunit_try_catch Tainted: G    B            N 6.12.33-rc1 #1
[   23.626507] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.626545] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   23.626600] Call Trace:
[   23.626644]  <TASK>
[   23.626685]  dump_stack_lvl+0x73/0xb0
[   23.626757]  print_report+0xd1/0x640
[   23.626833]  ? __virt_addr_valid+0x1db/0x2d0
[   23.626907]  ? kasan_atomics_helper+0x1650/0x5450
[   23.626976]  ? kasan_complete_mode_report_info+0x2a/0x200
[   23.627053]  ? kasan_atomics_helper+0x1650/0x5450
[   23.627134]  kasan_report+0x140/0x180
[   23.627203]  ? kasan_atomics_helper+0x1650/0x5450
[   23.627326]  kasan_check_range+0x10c/0x1c0
[   23.627456]  __kasan_check_write+0x18/0x20
[   23.627610]  kasan_atomics_helper+0x1650/0x5450
[   23.627729]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   23.627813]  ? __kmalloc_cache_noprof+0x168/0x350
[   23.627964]  ? trace_hardirqs_on+0x37/0xe0
[   23.628060]  kasan_atomics+0x1dd/0x310
[   23.628132]  ? __pfx_kasan_atomics+0x10/0x10
[   23.628208]  ? __pfx_read_tsc+0x10/0x10
[   23.628296]  ? ktime_get_ts64+0x84/0x230
[   23.628380]  kunit_try_run_case+0x1a6/0x480
[   23.628425]  ? __pfx_kunit_try_run_case+0x10/0x10
[   23.628457]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   23.628488]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   23.628532]  ? __kthread_parkme+0x82/0x160
[   23.628601]  ? preempt_count_sub+0x50/0x80
[   23.628738]  ? __pfx_kunit_try_run_case+0x10/0x10
[   23.628848]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   23.628942]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   23.629082]  kthread+0x257/0x310
[   23.629189]  ? __pfx_kthread+0x10/0x10
[   23.629282]  ret_from_fork+0x41/0x80
[   23.629326]  ? __pfx_kthread+0x10/0x10
[   23.629356]  ret_from_fork_asm+0x1a/0x30
[   23.629403]  </TASK>
[   23.629418] 
[   23.647658] Allocated by task 270:
[   23.648618]  kasan_save_stack+0x45/0x70
[   23.649402]  kasan_save_track+0x18/0x40
[   23.650160]  kasan_save_alloc_info+0x3b/0x50
[   23.650600]  __kasan_kmalloc+0xb7/0xc0
[   23.650926]  __kmalloc_cache_noprof+0x168/0x350
[   23.651442]  kasan_atomics+0x96/0x310
[   23.651825]  kunit_try_run_case+0x1a6/0x480
[   23.652270]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   23.652715]  kthread+0x257/0x310
[   23.653123]  ret_from_fork+0x41/0x80
[   23.653550]  ret_from_fork_asm+0x1a/0x30
[   23.653983] 
[   23.654214] The buggy address belongs to the object at ffff888102314e80
[   23.654214]  which belongs to the cache kmalloc-64 of size 64
[   23.655022] The buggy address is located 0 bytes to the right of
[   23.655022]  allocated 48-byte region [ffff888102314e80, ffff888102314eb0)
[   23.656043] 
[   23.656354] The buggy address belongs to the physical page:
[   23.656831] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102314
[   23.657738] flags: 0x200000000000000(node=0|zone=2)
[   23.658472] page_type: f5(slab)
[   23.658735] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   23.659971] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   23.660778] page dumped because: kasan: bad access detected
[   23.661520] 
[   23.661750] Memory state around the buggy address:
[   23.662176]  ffff888102314d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.662977]  ffff888102314e00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.663515] >ffff888102314e80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   23.664441]                                      ^
[   23.665266]  ffff888102314f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.666256]  ffff888102314f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.666907] ==================================================================
[   24.475821] ==================================================================
[   24.476806] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4fb4/0x5450
[   24.477575] Read of size 8 at addr ffff888102314eb0 by task kunit_try_catch/270
[   24.478824] 
[   24.479281] CPU: 1 UID: 0 PID: 270 Comm: kunit_try_catch Tainted: G    B            N 6.12.33-rc1 #1
[   24.479415] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.479436] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   24.479486] Call Trace:
[   24.479518]  <TASK>
[   24.479568]  dump_stack_lvl+0x73/0xb0
[   24.479614]  print_report+0xd1/0x640
[   24.479650]  ? __virt_addr_valid+0x1db/0x2d0
[   24.479686]  ? kasan_atomics_helper+0x4fb4/0x5450
[   24.479719]  ? kasan_complete_mode_report_info+0x2a/0x200
[   24.479753]  ? kasan_atomics_helper+0x4fb4/0x5450
[   24.479788]  kasan_report+0x140/0x180
[   24.479831]  ? kasan_atomics_helper+0x4fb4/0x5450
[   24.479962]  __asan_report_load8_noabort+0x18/0x20
[   24.480033]  kasan_atomics_helper+0x4fb4/0x5450
[   24.480073]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   24.480111]  ? __kmalloc_cache_noprof+0x168/0x350
[   24.480143]  ? trace_hardirqs_on+0x37/0xe0
[   24.480182]  kasan_atomics+0x1dd/0x310
[   24.480210]  ? __pfx_kasan_atomics+0x10/0x10
[   24.480267]  ? __pfx_read_tsc+0x10/0x10
[   24.480299]  ? ktime_get_ts64+0x84/0x230
[   24.480337]  kunit_try_run_case+0x1a6/0x480
[   24.480370]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.480400]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   24.480431]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   24.480468]  ? __kthread_parkme+0x82/0x160
[   24.480498]  ? preempt_count_sub+0x50/0x80
[   24.480532]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.480564]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   24.480602]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.480640]  kthread+0x257/0x310
[   24.480666]  ? __pfx_kthread+0x10/0x10
[   24.480692]  ret_from_fork+0x41/0x80
[   24.480723]  ? __pfx_kthread+0x10/0x10
[   24.480748]  ret_from_fork_asm+0x1a/0x30
[   24.480791]  </TASK>
[   24.480806] 
[   24.496738] Allocated by task 270:
[   24.497270]  kasan_save_stack+0x45/0x70
[   24.498150]  kasan_save_track+0x18/0x40
[   24.498852]  kasan_save_alloc_info+0x3b/0x50
[   24.499454]  __kasan_kmalloc+0xb7/0xc0
[   24.499755]  __kmalloc_cache_noprof+0x168/0x350
[   24.500636]  kasan_atomics+0x96/0x310
[   24.501043]  kunit_try_run_case+0x1a6/0x480
[   24.501550]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.502101]  kthread+0x257/0x310
[   24.502530]  ret_from_fork+0x41/0x80
[   24.502959]  ret_from_fork_asm+0x1a/0x30
[   24.503379] 
[   24.503613] The buggy address belongs to the object at ffff888102314e80
[   24.503613]  which belongs to the cache kmalloc-64 of size 64
[   24.504633] The buggy address is located 0 bytes to the right of
[   24.504633]  allocated 48-byte region [ffff888102314e80, ffff888102314eb0)
[   24.505641] 
[   24.505980] The buggy address belongs to the physical page:
[   24.506401] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102314
[   24.507171] flags: 0x200000000000000(node=0|zone=2)
[   24.507716] page_type: f5(slab)
[   24.508109] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   24.508769] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   24.509378] page dumped because: kasan: bad access detected
[   24.509995] 
[   24.510250] Memory state around the buggy address:
[   24.510654]  ffff888102314d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.511374]  ffff888102314e00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.511964] >ffff888102314e80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   24.512622]                                      ^
[   24.513088]  ffff888102314f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.513678]  ffff888102314f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.514310] ==================================================================
[   24.430886] ==================================================================
[   24.431427] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x20c9/0x5450
[   24.433327] Write of size 8 at addr ffff888102314eb0 by task kunit_try_catch/270
[   24.433934] 
[   24.434529] CPU: 1 UID: 0 PID: 270 Comm: kunit_try_catch Tainted: G    B            N 6.12.33-rc1 #1
[   24.434651] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.434995] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   24.435041] Call Trace:
[   24.435069]  <TASK>
[   24.435092]  dump_stack_lvl+0x73/0xb0
[   24.435133]  print_report+0xd1/0x640
[   24.435167]  ? __virt_addr_valid+0x1db/0x2d0
[   24.435203]  ? kasan_atomics_helper+0x20c9/0x5450
[   24.435273]  ? kasan_complete_mode_report_info+0x2a/0x200
[   24.435311]  ? kasan_atomics_helper+0x20c9/0x5450
[   24.435346]  kasan_report+0x140/0x180
[   24.435381]  ? kasan_atomics_helper+0x20c9/0x5450
[   24.435423]  kasan_check_range+0x10c/0x1c0
[   24.435454]  __kasan_check_write+0x18/0x20
[   24.435486]  kasan_atomics_helper+0x20c9/0x5450
[   24.435524]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   24.435563]  ? __kmalloc_cache_noprof+0x168/0x350
[   24.435594]  ? trace_hardirqs_on+0x37/0xe0
[   24.435633]  kasan_atomics+0x1dd/0x310
[   24.435663]  ? __pfx_kasan_atomics+0x10/0x10
[   24.435694]  ? __pfx_read_tsc+0x10/0x10
[   24.435722]  ? ktime_get_ts64+0x84/0x230
[   24.435758]  kunit_try_run_case+0x1a6/0x480
[   24.435791]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.435827]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   24.435897]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   24.435937]  ? __kthread_parkme+0x82/0x160
[   24.435968]  ? preempt_count_sub+0x50/0x80
[   24.436000]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.436029]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   24.436067]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.436105]  kthread+0x257/0x310
[   24.436133]  ? __pfx_kthread+0x10/0x10
[   24.436160]  ret_from_fork+0x41/0x80
[   24.436190]  ? __pfx_kthread+0x10/0x10
[   24.436215]  ret_from_fork_asm+0x1a/0x30
[   24.436284]  </TASK>
[   24.436299] 
[   24.453996] Allocated by task 270:
[   24.454303]  kasan_save_stack+0x45/0x70
[   24.454631]  kasan_save_track+0x18/0x40
[   24.456277]  kasan_save_alloc_info+0x3b/0x50
[   24.456582]  __kasan_kmalloc+0xb7/0xc0
[   24.457354]  __kmalloc_cache_noprof+0x168/0x350
[   24.458033]  kasan_atomics+0x96/0x310
[   24.458463]  kunit_try_run_case+0x1a6/0x480
[   24.458821]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.459357]  kthread+0x257/0x310
[   24.459673]  ret_from_fork+0x41/0x80
[   24.460683]  ret_from_fork_asm+0x1a/0x30
[   24.461127] 
[   24.461593] The buggy address belongs to the object at ffff888102314e80
[   24.461593]  which belongs to the cache kmalloc-64 of size 64
[   24.462925] The buggy address is located 0 bytes to the right of
[   24.462925]  allocated 48-byte region [ffff888102314e80, ffff888102314eb0)
[   24.464394] 
[   24.464556] The buggy address belongs to the physical page:
[   24.465299] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102314
[   24.466187] flags: 0x200000000000000(node=0|zone=2)
[   24.466597] page_type: f5(slab)
[   24.466994] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   24.467839] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   24.468652] page dumped because: kasan: bad access detected
[   24.469397] 
[   24.469766] Memory state around the buggy address:
[   24.470191]  ffff888102314d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.471006]  ffff888102314e00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.471746] >ffff888102314e80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   24.472444]                                      ^
[   24.473094]  ffff888102314f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.473599]  ffff888102314f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.474481] ==================================================================
[   22.452494] ==================================================================
[   22.453143] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x861/0x5450
[   22.453898] Write of size 4 at addr ffff888102314eb0 by task kunit_try_catch/270
[   22.454337] 
[   22.454595] CPU: 1 UID: 0 PID: 270 Comm: kunit_try_catch Tainted: G    B            N 6.12.33-rc1 #1
[   22.454715] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.454755] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   22.454864] Call Trace:
[   22.454996]  <TASK>
[   22.455054]  dump_stack_lvl+0x73/0xb0
[   22.455136]  print_report+0xd1/0x640
[   22.455217]  ? __virt_addr_valid+0x1db/0x2d0
[   22.455336]  ? kasan_atomics_helper+0x861/0x5450
[   22.455416]  ? kasan_complete_mode_report_info+0x2a/0x200
[   22.455482]  ? kasan_atomics_helper+0x861/0x5450
[   22.455520]  kasan_report+0x140/0x180
[   22.455557]  ? kasan_atomics_helper+0x861/0x5450
[   22.455598]  kasan_check_range+0x10c/0x1c0
[   22.455629]  __kasan_check_write+0x18/0x20
[   22.455660]  kasan_atomics_helper+0x861/0x5450
[   22.455693]  ? kasan_save_alloc_info+0x3b/0x50
[   22.455727]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   22.455765]  ? __kmalloc_cache_noprof+0x168/0x350
[   22.455797]  ? trace_hardirqs_on+0x37/0xe0
[   22.455865]  kasan_atomics+0x1dd/0x310
[   22.455900]  ? __pfx_kasan_atomics+0x10/0x10
[   22.455932]  ? __pfx_read_tsc+0x10/0x10
[   22.455959]  ? ktime_get_ts64+0x84/0x230
[   22.455996]  kunit_try_run_case+0x1a6/0x480
[   22.456031]  ? __pfx_kunit_try_run_case+0x10/0x10
[   22.456059]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   22.456089]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   22.456127]  ? __kthread_parkme+0x82/0x160
[   22.456154]  ? preempt_count_sub+0x50/0x80
[   22.456187]  ? __pfx_kunit_try_run_case+0x10/0x10
[   22.456216]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   22.456285]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   22.456325]  kthread+0x257/0x310
[   22.456353]  ? __pfx_kthread+0x10/0x10
[   22.456382]  ret_from_fork+0x41/0x80
[   22.456412]  ? __pfx_kthread+0x10/0x10
[   22.456440]  ret_from_fork_asm+0x1a/0x30
[   22.456483]  </TASK>
[   22.456500] 
[   22.473289] Allocated by task 270:
[   22.473773]  kasan_save_stack+0x45/0x70
[   22.474395]  kasan_save_track+0x18/0x40
[   22.474886]  kasan_save_alloc_info+0x3b/0x50
[   22.475415]  __kasan_kmalloc+0xb7/0xc0
[   22.476030]  __kmalloc_cache_noprof+0x168/0x350
[   22.476502]  kasan_atomics+0x96/0x310
[   22.477025]  kunit_try_run_case+0x1a6/0x480
[   22.477503]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   22.478130]  kthread+0x257/0x310
[   22.478563]  ret_from_fork+0x41/0x80
[   22.479053]  ret_from_fork_asm+0x1a/0x30
[   22.479438] 
[   22.479625] The buggy address belongs to the object at ffff888102314e80
[   22.479625]  which belongs to the cache kmalloc-64 of size 64
[   22.480720] The buggy address is located 0 bytes to the right of
[   22.480720]  allocated 48-byte region [ffff888102314e80, ffff888102314eb0)
[   22.481622] 
[   22.481952] The buggy address belongs to the physical page:
[   22.482580] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102314
[   22.483387] flags: 0x200000000000000(node=0|zone=2)
[   22.483806] page_type: f5(slab)
[   22.484334] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   22.485068] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   22.485771] page dumped because: kasan: bad access detected
[   22.486415] 
[   22.486631] Memory state around the buggy address:
[   22.487215]  ffff888102314d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.487895]  ffff888102314e00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.488524] >ffff888102314e80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   22.489284]                                      ^
[   22.489771]  ffff888102314f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.490449]  ffff888102314f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.491216] ==================================================================
[   22.277025] ==================================================================
[   22.278150] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x5ff/0x5450
[   22.278808] Write of size 4 at addr ffff888102314eb0 by task kunit_try_catch/270
[   22.279578] 
[   22.279779] CPU: 1 UID: 0 PID: 270 Comm: kunit_try_catch Tainted: G    B            N 6.12.33-rc1 #1
[   22.279865] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.279886] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   22.279920] Call Trace:
[   22.279947]  <TASK>
[   22.279970]  dump_stack_lvl+0x73/0xb0
[   22.280012]  print_report+0xd1/0x640
[   22.280048]  ? __virt_addr_valid+0x1db/0x2d0
[   22.280083]  ? kasan_atomics_helper+0x5ff/0x5450
[   22.280117]  ? kasan_complete_mode_report_info+0x2a/0x200
[   22.280150]  ? kasan_atomics_helper+0x5ff/0x5450
[   22.280185]  kasan_report+0x140/0x180
[   22.280239]  ? kasan_atomics_helper+0x5ff/0x5450
[   22.280334]  kasan_check_range+0x10c/0x1c0
[   22.280411]  __kasan_check_write+0x18/0x20
[   22.280491]  kasan_atomics_helper+0x5ff/0x5450
[   22.280570]  ? kasan_save_alloc_info+0x3b/0x50
[   22.280649]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   22.280734]  ? __kmalloc_cache_noprof+0x168/0x350
[   22.280811]  ? trace_hardirqs_on+0x37/0xe0
[   22.280911]  kasan_atomics+0x1dd/0x310
[   22.280989]  ? __pfx_kasan_atomics+0x10/0x10
[   22.281133]  ? __pfx_read_tsc+0x10/0x10
[   22.281205]  ? ktime_get_ts64+0x84/0x230
[   22.281311]  kunit_try_run_case+0x1a6/0x480
[   22.281396]  ? __pfx_kunit_try_run_case+0x10/0x10
[   22.281469]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   22.281524]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   22.281565]  ? __kthread_parkme+0x82/0x160
[   22.281595]  ? preempt_count_sub+0x50/0x80
[   22.281626]  ? __pfx_kunit_try_run_case+0x10/0x10
[   22.281656]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   22.281694]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   22.281733]  kthread+0x257/0x310
[   22.281760]  ? __pfx_kthread+0x10/0x10
[   22.281788]  ret_from_fork+0x41/0x80
[   22.281830]  ? __pfx_kthread+0x10/0x10
[   22.281889]  ret_from_fork_asm+0x1a/0x30
[   22.281932]  </TASK>
[   22.281948] 
[   22.301172] Allocated by task 270:
[   22.301762]  kasan_save_stack+0x45/0x70
[   22.302167]  kasan_save_track+0x18/0x40
[   22.302902]  kasan_save_alloc_info+0x3b/0x50
[   22.303514]  __kasan_kmalloc+0xb7/0xc0
[   22.304057]  __kmalloc_cache_noprof+0x168/0x350
[   22.304493]  kasan_atomics+0x96/0x310
[   22.304841]  kunit_try_run_case+0x1a6/0x480
[   22.305638]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   22.306364]  kthread+0x257/0x310
[   22.306886]  ret_from_fork+0x41/0x80
[   22.307275]  ret_from_fork_asm+0x1a/0x30
[   22.307927] 
[   22.308164] The buggy address belongs to the object at ffff888102314e80
[   22.308164]  which belongs to the cache kmalloc-64 of size 64
[   22.309371] The buggy address is located 0 bytes to the right of
[   22.309371]  allocated 48-byte region [ffff888102314e80, ffff888102314eb0)
[   22.310709] 
[   22.310978] The buggy address belongs to the physical page:
[   22.311464] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102314
[   22.312349] flags: 0x200000000000000(node=0|zone=2)
[   22.312941] page_type: f5(slab)
[   22.313560] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   22.314269] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   22.315140] page dumped because: kasan: bad access detected
[   22.315807] 
[   22.316130] Memory state around the buggy address:
[   22.316806]  ffff888102314d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.317398]  ffff888102314e00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.318268] >ffff888102314e80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   22.319038]                                      ^
[   22.319670]  ffff888102314f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.320394]  ffff888102314f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.320973] ==================================================================
[   24.062342] ==================================================================
[   24.062786] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4f32/0x5450
[   24.064696] Read of size 8 at addr ffff888102314eb0 by task kunit_try_catch/270
[   24.065527] 
[   24.065789] CPU: 1 UID: 0 PID: 270 Comm: kunit_try_catch Tainted: G    B            N 6.12.33-rc1 #1
[   24.065971] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.066029] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   24.066092] Call Trace:
[   24.066147]  <TASK>
[   24.066197]  dump_stack_lvl+0x73/0xb0
[   24.066288]  print_report+0xd1/0x640
[   24.066324]  ? __virt_addr_valid+0x1db/0x2d0
[   24.066362]  ? kasan_atomics_helper+0x4f32/0x5450
[   24.066397]  ? kasan_complete_mode_report_info+0x2a/0x200
[   24.066430]  ? kasan_atomics_helper+0x4f32/0x5450
[   24.066465]  kasan_report+0x140/0x180
[   24.066501]  ? kasan_atomics_helper+0x4f32/0x5450
[   24.066544]  __asan_report_load8_noabort+0x18/0x20
[   24.066576]  kasan_atomics_helper+0x4f32/0x5450
[   24.066612]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   24.066649]  ? __kmalloc_cache_noprof+0x168/0x350
[   24.066680]  ? trace_hardirqs_on+0x37/0xe0
[   24.066719]  kasan_atomics+0x1dd/0x310
[   24.066748]  ? __pfx_kasan_atomics+0x10/0x10
[   24.066778]  ? __pfx_read_tsc+0x10/0x10
[   24.066806]  ? ktime_get_ts64+0x84/0x230
[   24.066889]  kunit_try_run_case+0x1a6/0x480
[   24.066926]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.066956]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   24.066986]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   24.067022]  ? __kthread_parkme+0x82/0x160
[   24.067048]  ? preempt_count_sub+0x50/0x80
[   24.067082]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.067111]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   24.067149]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.067186]  kthread+0x257/0x310
[   24.067212]  ? __pfx_kthread+0x10/0x10
[   24.067277]  ret_from_fork+0x41/0x80
[   24.067311]  ? __pfx_kthread+0x10/0x10
[   24.067337]  ret_from_fork_asm+0x1a/0x30
[   24.067379]  </TASK>
[   24.067394] 
[   24.084494] Allocated by task 270:
[   24.084875]  kasan_save_stack+0x45/0x70
[   24.085307]  kasan_save_track+0x18/0x40
[   24.085697]  kasan_save_alloc_info+0x3b/0x50
[   24.086132]  __kasan_kmalloc+0xb7/0xc0
[   24.086668]  __kmalloc_cache_noprof+0x168/0x350
[   24.087018]  kasan_atomics+0x96/0x310
[   24.087784]  kunit_try_run_case+0x1a6/0x480
[   24.088376]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.088940]  kthread+0x257/0x310
[   24.089521]  ret_from_fork+0x41/0x80
[   24.089917]  ret_from_fork_asm+0x1a/0x30
[   24.090377] 
[   24.090605] The buggy address belongs to the object at ffff888102314e80
[   24.090605]  which belongs to the cache kmalloc-64 of size 64
[   24.091719] The buggy address is located 0 bytes to the right of
[   24.091719]  allocated 48-byte region [ffff888102314e80, ffff888102314eb0)
[   24.092832] 
[   24.093462] The buggy address belongs to the physical page:
[   24.094277] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102314
[   24.095304] flags: 0x200000000000000(node=0|zone=2)
[   24.095731] page_type: f5(slab)
[   24.096541] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   24.097242] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   24.097847] page dumped because: kasan: bad access detected
[   24.098577] 
[   24.098753] Memory state around the buggy address:
[   24.099697]  ffff888102314d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.100352]  ffff888102314e00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.100979] >ffff888102314e80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   24.101827]                                      ^
[   24.102659]  ffff888102314f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.103567]  ffff888102314f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.104477] ==================================================================
[   22.022119] ==================================================================
[   22.022770] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b70/0x5450
[   22.023575] Write of size 4 at addr ffff888102314eb0 by task kunit_try_catch/270
[   22.024079] 
[   22.024852] CPU: 1 UID: 0 PID: 270 Comm: kunit_try_catch Tainted: G    B            N 6.12.33-rc1 #1
[   22.024951] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.024987] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   22.025047] Call Trace:
[   22.025268]  <TASK>
[   22.025310]  dump_stack_lvl+0x73/0xb0
[   22.025354]  print_report+0xd1/0x640
[   22.025390]  ? __virt_addr_valid+0x1db/0x2d0
[   22.025425]  ? kasan_atomics_helper+0x4b70/0x5450
[   22.025461]  ? kasan_complete_mode_report_info+0x2a/0x200
[   22.025495]  ? kasan_atomics_helper+0x4b70/0x5450
[   22.025529]  kasan_report+0x140/0x180
[   22.025563]  ? kasan_atomics_helper+0x4b70/0x5450
[   22.025602]  __asan_report_store4_noabort+0x1b/0x30
[   22.025634]  kasan_atomics_helper+0x4b70/0x5450
[   22.025667]  ? kasan_save_alloc_info+0x3b/0x50
[   22.025696]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   22.025731]  ? __kmalloc_cache_noprof+0x168/0x350
[   22.025761]  ? trace_hardirqs_on+0x37/0xe0
[   22.025800]  kasan_atomics+0x1dd/0x310
[   22.025852]  ? __pfx_kasan_atomics+0x10/0x10
[   22.025892]  ? __pfx_read_tsc+0x10/0x10
[   22.025919]  ? ktime_get_ts64+0x84/0x230
[   22.025955]  kunit_try_run_case+0x1a6/0x480
[   22.025989]  ? __pfx_kunit_try_run_case+0x10/0x10
[   22.026018]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   22.026048]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   22.026085]  ? __kthread_parkme+0x82/0x160
[   22.026112]  ? preempt_count_sub+0x50/0x80
[   22.026144]  ? __pfx_kunit_try_run_case+0x10/0x10
[   22.026172]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   22.026208]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   22.026271]  kthread+0x257/0x310
[   22.026298]  ? __pfx_kthread+0x10/0x10
[   22.026324]  ret_from_fork+0x41/0x80
[   22.026354]  ? __pfx_kthread+0x10/0x10
[   22.026380]  ret_from_fork_asm+0x1a/0x30
[   22.026422]  </TASK>
[   22.026436] 
[   22.045420] Allocated by task 270:
[   22.045783]  kasan_save_stack+0x45/0x70
[   22.046825]  kasan_save_track+0x18/0x40
[   22.047462]  kasan_save_alloc_info+0x3b/0x50
[   22.047765]  __kasan_kmalloc+0xb7/0xc0
[   22.048384]  __kmalloc_cache_noprof+0x168/0x350
[   22.048845]  kasan_atomics+0x96/0x310
[   22.049188]  kunit_try_run_case+0x1a6/0x480
[   22.049876]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   22.050636]  kthread+0x257/0x310
[   22.051553]  ret_from_fork+0x41/0x80
[   22.051834]  ret_from_fork_asm+0x1a/0x30
[   22.052459] 
[   22.052619] The buggy address belongs to the object at ffff888102314e80
[   22.052619]  which belongs to the cache kmalloc-64 of size 64
[   22.054150] The buggy address is located 0 bytes to the right of
[   22.054150]  allocated 48-byte region [ffff888102314e80, ffff888102314eb0)
[   22.055627] 
[   22.056138] The buggy address belongs to the physical page:
[   22.056783] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102314
[   22.057469] flags: 0x200000000000000(node=0|zone=2)
[   22.057853] page_type: f5(slab)
[   22.058661] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   22.059247] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   22.060207] page dumped because: kasan: bad access detected
[   22.060798] 
[   22.061058] Memory state around the buggy address:
[   22.061691]  ffff888102314d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.062440]  ffff888102314e00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.063182] >ffff888102314e80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   22.063918]                                      ^
[   22.064395]  ffff888102314f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.065135]  ffff888102314f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.065729] ==================================================================
[   24.017150] ==================================================================
[   24.018437] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1c19/0x5450
[   24.019872] Write of size 8 at addr ffff888102314eb0 by task kunit_try_catch/270
[   24.021488] 
[   24.021669] CPU: 1 UID: 0 PID: 270 Comm: kunit_try_catch Tainted: G    B            N 6.12.33-rc1 #1
[   24.021770] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.021800] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   24.021849] Call Trace:
[   24.021889]  <TASK>
[   24.021930]  dump_stack_lvl+0x73/0xb0
[   24.021993]  print_report+0xd1/0x640
[   24.022054]  ? __virt_addr_valid+0x1db/0x2d0
[   24.022115]  ? kasan_atomics_helper+0x1c19/0x5450
[   24.022175]  ? kasan_complete_mode_report_info+0x2a/0x200
[   24.022272]  ? kasan_atomics_helper+0x1c19/0x5450
[   24.022333]  kasan_report+0x140/0x180
[   24.022392]  ? kasan_atomics_helper+0x1c19/0x5450
[   24.022459]  kasan_check_range+0x10c/0x1c0
[   24.022511]  __kasan_check_write+0x18/0x20
[   24.022565]  kasan_atomics_helper+0x1c19/0x5450
[   24.022641]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   24.022705]  ? __kmalloc_cache_noprof+0x168/0x350
[   24.022760]  ? trace_hardirqs_on+0x37/0xe0
[   24.022828]  kasan_atomics+0x1dd/0x310
[   24.022877]  ? __pfx_kasan_atomics+0x10/0x10
[   24.022932]  ? __pfx_read_tsc+0x10/0x10
[   24.022980]  ? ktime_get_ts64+0x84/0x230
[   24.023041]  kunit_try_run_case+0x1a6/0x480
[   24.023359]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.023431]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   24.023547]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   24.023628]  ? __kthread_parkme+0x82/0x160
[   24.023699]  ? preempt_count_sub+0x50/0x80
[   24.023782]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.023856]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   24.023933]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.023975]  kthread+0x257/0x310
[   24.024004]  ? __pfx_kthread+0x10/0x10
[   24.024031]  ret_from_fork+0x41/0x80
[   24.024061]  ? __pfx_kthread+0x10/0x10
[   24.024087]  ret_from_fork_asm+0x1a/0x30
[   24.024130]  </TASK>
[   24.024146] 
[   24.044914] Allocated by task 270:
[   24.045354]  kasan_save_stack+0x45/0x70
[   24.045803]  kasan_save_track+0x18/0x40
[   24.046165]  kasan_save_alloc_info+0x3b/0x50
[   24.046639]  __kasan_kmalloc+0xb7/0xc0
[   24.047117]  __kmalloc_cache_noprof+0x168/0x350
[   24.047506]  kasan_atomics+0x96/0x310
[   24.047967]  kunit_try_run_case+0x1a6/0x480
[   24.048434]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.048997]  kthread+0x257/0x310
[   24.049404]  ret_from_fork+0x41/0x80
[   24.049758]  ret_from_fork_asm+0x1a/0x30
[   24.050120] 
[   24.050365] The buggy address belongs to the object at ffff888102314e80
[   24.050365]  which belongs to the cache kmalloc-64 of size 64
[   24.051384] The buggy address is located 0 bytes to the right of
[   24.051384]  allocated 48-byte region [ffff888102314e80, ffff888102314eb0)
[   24.052241] 
[   24.052481] The buggy address belongs to the physical page:
[   24.053029] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102314
[   24.053710] flags: 0x200000000000000(node=0|zone=2)
[   24.054130] page_type: f5(slab)
[   24.054444] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   24.055155] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   24.055882] page dumped because: kasan: bad access detected
[   24.056336] 
[   24.056565] Memory state around the buggy address:
[   24.057031]  ffff888102314d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.057588]  ffff888102314e00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.058213] >ffff888102314e80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   24.058762]                                      ^
[   24.059163]  ffff888102314f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.059802]  ffff888102314f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.060729] ==================================================================
[   22.361203] ==================================================================
[   22.362082] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x730/0x5450
[   22.362773] Write of size 4 at addr ffff888102314eb0 by task kunit_try_catch/270
[   22.363384] 
[   22.363683] CPU: 1 UID: 0 PID: 270 Comm: kunit_try_catch Tainted: G    B            N 6.12.33-rc1 #1
[   22.363797] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.363841] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   22.363930] Call Trace:
[   22.363987]  <TASK>
[   22.364038]  dump_stack_lvl+0x73/0xb0
[   22.364126]  print_report+0xd1/0x640
[   22.364204]  ? __virt_addr_valid+0x1db/0x2d0
[   22.364303]  ? kasan_atomics_helper+0x730/0x5450
[   22.364383]  ? kasan_complete_mode_report_info+0x2a/0x200
[   22.364462]  ? kasan_atomics_helper+0x730/0x5450
[   22.364542]  kasan_report+0x140/0x180
[   22.364628]  ? kasan_atomics_helper+0x730/0x5450
[   22.364720]  kasan_check_range+0x10c/0x1c0
[   22.364798]  __kasan_check_write+0x18/0x20
[   22.364871]  kasan_atomics_helper+0x730/0x5450
[   22.364949]  ? kasan_save_alloc_info+0x3b/0x50
[   22.365067]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   22.365157]  ? __kmalloc_cache_noprof+0x168/0x350
[   22.365253]  ? trace_hardirqs_on+0x37/0xe0
[   22.365348]  kasan_atomics+0x1dd/0x310
[   22.365421]  ? __pfx_kasan_atomics+0x10/0x10
[   22.365495]  ? __pfx_read_tsc+0x10/0x10
[   22.365558]  ? ktime_get_ts64+0x84/0x230
[   22.365638]  kunit_try_run_case+0x1a6/0x480
[   22.365717]  ? __pfx_kunit_try_run_case+0x10/0x10
[   22.365786]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   22.365861]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   22.365945]  ? __kthread_parkme+0x82/0x160
[   22.365989]  ? preempt_count_sub+0x50/0x80
[   22.366024]  ? __pfx_kunit_try_run_case+0x10/0x10
[   22.366053]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   22.366091]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   22.366129]  kthread+0x257/0x310
[   22.366157]  ? __pfx_kthread+0x10/0x10
[   22.366185]  ret_from_fork+0x41/0x80
[   22.366215]  ? __pfx_kthread+0x10/0x10
[   22.366272]  ret_from_fork_asm+0x1a/0x30
[   22.366314]  </TASK>
[   22.366330] 
[   22.380538] Allocated by task 270:
[   22.380934]  kasan_save_stack+0x45/0x70
[   22.381458]  kasan_save_track+0x18/0x40
[   22.381777]  kasan_save_alloc_info+0x3b/0x50
[   22.382551]  __kasan_kmalloc+0xb7/0xc0
[   22.383302]  __kmalloc_cache_noprof+0x168/0x350
[   22.384790]  kasan_atomics+0x96/0x310
[   22.386064]  kunit_try_run_case+0x1a6/0x480
[   22.387612]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   22.388363]  kthread+0x257/0x310
[   22.388516]  ret_from_fork+0x41/0x80
[   22.388674]  ret_from_fork_asm+0x1a/0x30
[   22.388905] 
[   22.389297] The buggy address belongs to the object at ffff888102314e80
[   22.389297]  which belongs to the cache kmalloc-64 of size 64
[   22.391438] The buggy address is located 0 bytes to the right of
[   22.391438]  allocated 48-byte region [ffff888102314e80, ffff888102314eb0)
[   22.392660] 
[   22.393543] The buggy address belongs to the physical page:
[   22.393944] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102314
[   22.394692] flags: 0x200000000000000(node=0|zone=2)
[   22.395611] page_type: f5(slab)
[   22.396124] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   22.396830] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   22.397496] page dumped because: kasan: bad access detected
[   22.398313] 
[   22.398503] Memory state around the buggy address:
[   22.398822]  ffff888102314d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.399610]  ffff888102314e00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.400694] >ffff888102314e80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   22.401514]                                      ^
[   22.401984]  ffff888102314f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.402803]  ffff888102314f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.403400] ==================================================================
[   22.878379] ==================================================================
[   22.878920] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xe79/0x5450
[   22.881644] Write of size 4 at addr ffff888102314eb0 by task kunit_try_catch/270
[   22.882272] 
[   22.882509] CPU: 1 UID: 0 PID: 270 Comm: kunit_try_catch Tainted: G    B            N 6.12.33-rc1 #1
[   22.882631] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.882672] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   22.882737] Call Trace:
[   22.882796]  <TASK>
[   22.882857]  dump_stack_lvl+0x73/0xb0
[   22.882947]  print_report+0xd1/0x640
[   22.883032]  ? __virt_addr_valid+0x1db/0x2d0
[   22.883119]  ? kasan_atomics_helper+0xe79/0x5450
[   22.883200]  ? kasan_complete_mode_report_info+0x2a/0x200
[   22.883319]  ? kasan_atomics_helper+0xe79/0x5450
[   22.883400]  kasan_report+0x140/0x180
[   22.883483]  ? kasan_atomics_helper+0xe79/0x5450
[   22.883581]  kasan_check_range+0x10c/0x1c0
[   22.883660]  __kasan_check_write+0x18/0x20
[   22.883750]  kasan_atomics_helper+0xe79/0x5450
[   22.883856]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   22.883944]  ? __kmalloc_cache_noprof+0x168/0x350
[   22.884031]  ? trace_hardirqs_on+0x37/0xe0
[   22.884121]  kasan_atomics+0x1dd/0x310
[   22.884203]  ? __pfx_kasan_atomics+0x10/0x10
[   22.884275]  ? __pfx_read_tsc+0x10/0x10
[   22.884329]  ? ktime_get_ts64+0x84/0x230
[   22.884386]  kunit_try_run_case+0x1a6/0x480
[   22.884436]  ? __pfx_kunit_try_run_case+0x10/0x10
[   22.884482]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   22.884529]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   22.884592]  ? __kthread_parkme+0x82/0x160
[   22.884636]  ? preempt_count_sub+0x50/0x80
[   22.884688]  ? __pfx_kunit_try_run_case+0x10/0x10
[   22.884732]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   22.884796]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   22.884858]  kthread+0x257/0x310
[   22.884902]  ? __pfx_kthread+0x10/0x10
[   22.884945]  ret_from_fork+0x41/0x80
[   22.884991]  ? __pfx_kthread+0x10/0x10
[   22.885032]  ret_from_fork_asm+0x1a/0x30
[   22.885098]  </TASK>
[   22.885130] 
[   22.898734] Allocated by task 270:
[   22.899070]  kasan_save_stack+0x45/0x70
[   22.899376]  kasan_save_track+0x18/0x40
[   22.899607]  kasan_save_alloc_info+0x3b/0x50
[   22.899855]  __kasan_kmalloc+0xb7/0xc0
[   22.900071]  __kmalloc_cache_noprof+0x168/0x350
[   22.901620]  kasan_atomics+0x96/0x310
[   22.901971]  kunit_try_run_case+0x1a6/0x480
[   22.902433]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   22.902859]  kthread+0x257/0x310
[   22.903147]  ret_from_fork+0x41/0x80
[   22.903494]  ret_from_fork_asm+0x1a/0x30
[   22.903779] 
[   22.904040] The buggy address belongs to the object at ffff888102314e80
[   22.904040]  which belongs to the cache kmalloc-64 of size 64
[   22.905207] The buggy address is located 0 bytes to the right of
[   22.905207]  allocated 48-byte region [ffff888102314e80, ffff888102314eb0)
[   22.906278] 
[   22.906521] The buggy address belongs to the physical page:
[   22.907191] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102314
[   22.907867] flags: 0x200000000000000(node=0|zone=2)
[   22.909582] page_type: f5(slab)
[   22.910037] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   22.910677] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   22.911295] page dumped because: kasan: bad access detected
[   22.911657] 
[   22.911863] Memory state around the buggy address:
[   22.912238]  ffff888102314d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.912593]  ffff888102314e00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.912967] >ffff888102314e80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   22.913669]                                      ^
[   22.914153]  ffff888102314f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.915015]  ffff888102314f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.915486] ==================================================================
[   22.918455] ==================================================================
[   22.919343] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf11/0x5450
[   22.920129] Write of size 4 at addr ffff888102314eb0 by task kunit_try_catch/270
[   22.920898] 
[   22.921078] CPU: 1 UID: 0 PID: 270 Comm: kunit_try_catch Tainted: G    B            N 6.12.33-rc1 #1
[   22.921170] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.921197] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   22.921259] Call Trace:
[   22.921302]  <TASK>
[   22.921339]  dump_stack_lvl+0x73/0xb0
[   22.921399]  print_report+0xd1/0x640
[   22.921452]  ? __virt_addr_valid+0x1db/0x2d0
[   22.921505]  ? kasan_atomics_helper+0xf11/0x5450
[   22.921556]  ? kasan_complete_mode_report_info+0x2a/0x200
[   22.921636]  ? kasan_atomics_helper+0xf11/0x5450
[   22.921714]  kasan_report+0x140/0x180
[   22.921792]  ? kasan_atomics_helper+0xf11/0x5450
[   22.921931]  kasan_check_range+0x10c/0x1c0
[   22.921996]  __kasan_check_write+0x18/0x20
[   22.922066]  kasan_atomics_helper+0xf11/0x5450
[   22.922154]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   22.922256]  ? __kmalloc_cache_noprof+0x168/0x350
[   22.922339]  ? trace_hardirqs_on+0x37/0xe0
[   22.922436]  kasan_atomics+0x1dd/0x310
[   22.922511]  ? __pfx_kasan_atomics+0x10/0x10
[   22.922587]  ? __pfx_read_tsc+0x10/0x10
[   22.922657]  ? ktime_get_ts64+0x84/0x230
[   22.922738]  kunit_try_run_case+0x1a6/0x480
[   22.922801]  ? __pfx_kunit_try_run_case+0x10/0x10
[   22.922866]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   22.922945]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   22.923030]  ? __kthread_parkme+0x82/0x160
[   22.923118]  ? preempt_count_sub+0x50/0x80
[   22.923207]  ? __pfx_kunit_try_run_case+0x10/0x10
[   22.923314]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   22.923407]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   22.923496]  kthread+0x257/0x310
[   22.923574]  ? __pfx_kthread+0x10/0x10
[   22.923645]  ret_from_fork+0x41/0x80
[   22.923719]  ? __pfx_kthread+0x10/0x10
[   22.923788]  ret_from_fork_asm+0x1a/0x30
[   22.923889]  </TASK>
[   22.923930] 
[   22.938107] Allocated by task 270:
[   22.938537]  kasan_save_stack+0x45/0x70
[   22.939164]  kasan_save_track+0x18/0x40
[   22.939674]  kasan_save_alloc_info+0x3b/0x50
[   22.940300]  __kasan_kmalloc+0xb7/0xc0
[   22.940573]  __kmalloc_cache_noprof+0x168/0x350
[   22.940884]  kasan_atomics+0x96/0x310
[   22.942605]  kunit_try_run_case+0x1a6/0x480
[   22.943678]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   22.944274]  kthread+0x257/0x310
[   22.945502]  ret_from_fork+0x41/0x80
[   22.946333]  ret_from_fork_asm+0x1a/0x30
[   22.946675] 
[   22.946861] The buggy address belongs to the object at ffff888102314e80
[   22.946861]  which belongs to the cache kmalloc-64 of size 64
[   22.947422] The buggy address is located 0 bytes to the right of
[   22.947422]  allocated 48-byte region [ffff888102314e80, ffff888102314eb0)
[   22.947984] 
[   22.949138] The buggy address belongs to the physical page:
[   22.949474] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102314
[   22.950091] flags: 0x200000000000000(node=0|zone=2)
[   22.950609] page_type: f5(slab)
[   22.951130] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   22.952130] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   22.953513] page dumped because: kasan: bad access detected
[   22.954838] 
[   22.955136] Memory state around the buggy address:
[   22.955894]  ffff888102314d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.956625]  ffff888102314e00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.957058] >ffff888102314e80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   22.959815]                                      ^
[   22.960621]  ffff888102314f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.961164]  ffff888102314f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.962955] ==================================================================
[   22.617871] ==================================================================
[   22.619463] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xac8/0x5450
[   22.620266] Write of size 4 at addr ffff888102314eb0 by task kunit_try_catch/270
[   22.620864] 
[   22.621250] CPU: 1 UID: 0 PID: 270 Comm: kunit_try_catch Tainted: G    B            N 6.12.33-rc1 #1
[   22.621326] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.621344] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   22.621378] Call Trace:
[   22.621403]  <TASK>
[   22.621428]  dump_stack_lvl+0x73/0xb0
[   22.621470]  print_report+0xd1/0x640
[   22.621506]  ? __virt_addr_valid+0x1db/0x2d0
[   22.621544]  ? kasan_atomics_helper+0xac8/0x5450
[   22.621580]  ? kasan_complete_mode_report_info+0x2a/0x200
[   22.621613]  ? kasan_atomics_helper+0xac8/0x5450
[   22.621648]  kasan_report+0x140/0x180
[   22.621682]  ? kasan_atomics_helper+0xac8/0x5450
[   22.621722]  kasan_check_range+0x10c/0x1c0
[   22.621752]  __kasan_check_write+0x18/0x20
[   22.621782]  kasan_atomics_helper+0xac8/0x5450
[   22.621823]  ? kasan_save_alloc_info+0x3b/0x50
[   22.621940]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   22.622179]  ? __kmalloc_cache_noprof+0x168/0x350
[   22.622286]  ? trace_hardirqs_on+0x37/0xe0
[   22.622380]  kasan_atomics+0x1dd/0x310
[   22.622456]  ? __pfx_kasan_atomics+0x10/0x10
[   22.622533]  ? __pfx_read_tsc+0x10/0x10
[   22.622605]  ? ktime_get_ts64+0x84/0x230
[   22.622687]  kunit_try_run_case+0x1a6/0x480
[   22.622767]  ? __pfx_kunit_try_run_case+0x10/0x10
[   22.622850]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   22.622896]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   22.622936]  ? __kthread_parkme+0x82/0x160
[   22.622966]  ? preempt_count_sub+0x50/0x80
[   22.622999]  ? __pfx_kunit_try_run_case+0x10/0x10
[   22.623028]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   22.623066]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   22.623105]  kthread+0x257/0x310
[   22.623131]  ? __pfx_kthread+0x10/0x10
[   22.623160]  ret_from_fork+0x41/0x80
[   22.623190]  ? __pfx_kthread+0x10/0x10
[   22.623217]  ret_from_fork_asm+0x1a/0x30
[   22.623301]  </TASK>
[   22.623317] 
[   22.642676] Allocated by task 270:
[   22.643631]  kasan_save_stack+0x45/0x70
[   22.644574]  kasan_save_track+0x18/0x40
[   22.644947]  kasan_save_alloc_info+0x3b/0x50
[   22.645518]  __kasan_kmalloc+0xb7/0xc0
[   22.646163]  __kmalloc_cache_noprof+0x168/0x350
[   22.646623]  kasan_atomics+0x96/0x310
[   22.647312]  kunit_try_run_case+0x1a6/0x480
[   22.647989]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   22.648473]  kthread+0x257/0x310
[   22.648817]  ret_from_fork+0x41/0x80
[   22.649190]  ret_from_fork_asm+0x1a/0x30
[   22.649939] 
[   22.650175] The buggy address belongs to the object at ffff888102314e80
[   22.650175]  which belongs to the cache kmalloc-64 of size 64
[   22.651580] The buggy address is located 0 bytes to the right of
[   22.651580]  allocated 48-byte region [ffff888102314e80, ffff888102314eb0)
[   22.653204] 
[   22.653423] The buggy address belongs to the physical page:
[   22.653756] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102314
[   22.654664] flags: 0x200000000000000(node=0|zone=2)
[   22.655408] page_type: f5(slab)
[   22.655801] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   22.656770] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   22.657588] page dumped because: kasan: bad access detected
[   22.658065] 
[   22.658284] Memory state around the buggy address:
[   22.658737]  ffff888102314d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.659621]  ffff888102314e00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.660327] >ffff888102314e80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   22.660933]                                      ^
[   22.661320]  ffff888102314f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.662216]  ffff888102314f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.662904] ==================================================================