Hay
Date
Nov. 20, 2024, 6:35 a.m.

Environment
qemu-arm64
qemu-x86_64

[   43.040889] ==================================================================
[   43.041680] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x16d0/0x4858
[   43.042558] Write of size 8 at addr fff00000c65bde30 by task kunit_try_catch/254
[   43.043219] 
[   43.044870] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241120 #1
[   43.046256] Tainted: [B]=BAD_PAGE, [N]=TEST
[   43.046796] Hardware name: linux,dummy-virt (DT)
[   43.047651] Call trace:
[   43.048209]  show_stack+0x20/0x38 (C)
[   43.048815]  dump_stack_lvl+0x8c/0xd0
[   43.049651]  print_report+0x118/0x5e0
[   43.050433]  kasan_report+0xc8/0x118
[   43.051126]  kasan_check_range+0x100/0x1a8
[   43.051746]  __kasan_check_write+0x20/0x30
[   43.052300]  kasan_atomics_helper+0x16d0/0x4858
[   43.053257]  kasan_atomics+0x198/0x2e8
[   43.053972]  kunit_try_run_case+0x14c/0x3d0
[   43.054735]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   43.055611]  kthread+0x24c/0x2d0
[   43.056328]  ret_from_fork+0x10/0x20
[   43.056897] 
[   43.057484] Allocated by task 254:
[   43.058102]  kasan_save_stack+0x3c/0x68
[   43.058821]  kasan_save_track+0x20/0x40
[   43.059364]  kasan_save_alloc_info+0x40/0x58
[   43.060205]  __kasan_kmalloc+0xd4/0xd8
[   43.060963]  __kmalloc_cache_noprof+0x15c/0x3c8
[   43.061602]  kasan_atomics+0xb8/0x2e8
[   43.062368]  kunit_try_run_case+0x14c/0x3d0
[   43.063120]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   43.063968]  kthread+0x24c/0x2d0
[   43.064652]  ret_from_fork+0x10/0x20
[   43.065150] 
[   43.065728] The buggy address belongs to the object at fff00000c65bde00
[   43.065728]  which belongs to the cache kmalloc-64 of size 64
[   43.067076] The buggy address is located 0 bytes to the right of
[   43.067076]  allocated 48-byte region [fff00000c65bde00, fff00000c65bde30)
[   43.068525] 
[   43.069083] The buggy address belongs to the physical page:
[   43.069720] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065bd
[   43.070718] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   43.071731] page_type: f5(slab)
[   43.072427] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   43.073476] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   43.074306] page dumped because: kasan: bad access detected
[   43.075160] 
[   43.075671] Memory state around the buggy address:
[   43.076415]  fff00000c65bdd00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   43.077271]  fff00000c65bdd80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   43.078067] >fff00000c65bde00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   43.078895]                                      ^
[   43.079508]  fff00000c65bde80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   43.080335]  fff00000c65bdf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   43.081144] ==================================================================
[   42.595035] ==================================================================
[   42.595782] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x126c/0x4858
[   42.596662] Write of size 8 at addr fff00000c65bde30 by task kunit_try_catch/254
[   42.597515] 
[   42.597899] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241120 #1
[   42.599068] Tainted: [B]=BAD_PAGE, [N]=TEST
[   42.599630] Hardware name: linux,dummy-virt (DT)
[   42.600246] Call trace:
[   42.600706]  show_stack+0x20/0x38 (C)
[   42.601392]  dump_stack_lvl+0x8c/0xd0
[   42.602013]  print_report+0x118/0x5e0
[   42.602691]  kasan_report+0xc8/0x118
[   42.603321]  kasan_check_range+0x100/0x1a8
[   42.604049]  __kasan_check_write+0x20/0x30
[   42.604663]  kasan_atomics_helper+0x126c/0x4858
[   42.605486]  kasan_atomics+0x198/0x2e8
[   42.606163]  kunit_try_run_case+0x14c/0x3d0
[   42.606814]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   42.607598]  kthread+0x24c/0x2d0
[   42.608194]  ret_from_fork+0x10/0x20
[   42.608814] 
[   42.609143] Allocated by task 254:
[   42.609705]  kasan_save_stack+0x3c/0x68
[   42.610234]  kasan_save_track+0x20/0x40
[   42.610929]  kasan_save_alloc_info+0x40/0x58
[   42.611551]  __kasan_kmalloc+0xd4/0xd8
[   42.612164]  __kmalloc_cache_noprof+0x15c/0x3c8
[   42.612801]  kasan_atomics+0xb8/0x2e8
[   42.613396]  kunit_try_run_case+0x14c/0x3d0
[   42.614001]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   42.614747]  kthread+0x24c/0x2d0
[   42.615397]  ret_from_fork+0x10/0x20
[   42.615927] 
[   42.616322] The buggy address belongs to the object at fff00000c65bde00
[   42.616322]  which belongs to the cache kmalloc-64 of size 64
[   42.617515] The buggy address is located 0 bytes to the right of
[   42.617515]  allocated 48-byte region [fff00000c65bde00, fff00000c65bde30)
[   42.618785] 
[   42.619166] The buggy address belongs to the physical page:
[   42.619800] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065bd
[   42.620746] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   42.621604] page_type: f5(slab)
[   42.622178] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   42.623102] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   42.624007] page dumped because: kasan: bad access detected
[   42.624769] 
[   42.625365] Memory state around the buggy address:
[   42.626080]  fff00000c65bdd00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   42.626855]  fff00000c65bdd80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   42.627709] >fff00000c65bde00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   42.628747]                                      ^
[   42.629622]  fff00000c65bde80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   42.630799]  fff00000c65bdf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   42.631881] ==================================================================
[   41.404222] ==================================================================
[   41.405093] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x6ec/0x4858
[   41.406118] Write of size 4 at addr fff00000c65bde30 by task kunit_try_catch/254
[   41.407549] 
[   41.408071] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241120 #1
[   41.409193] Tainted: [B]=BAD_PAGE, [N]=TEST
[   41.410040] Hardware name: linux,dummy-virt (DT)
[   41.410809] Call trace:
[   41.411383]  show_stack+0x20/0x38 (C)
[   41.412145]  dump_stack_lvl+0x8c/0xd0
[   41.412891]  print_report+0x118/0x5e0
[   41.413683]  kasan_report+0xc8/0x118
[   41.414182]  kasan_check_range+0x100/0x1a8
[   41.414766]  __kasan_check_write+0x20/0x30
[   41.415317]  kasan_atomics_helper+0x6ec/0x4858
[   41.416398]  kasan_atomics+0x198/0x2e8
[   41.417151]  kunit_try_run_case+0x14c/0x3d0
[   41.417953]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   41.418862]  kthread+0x24c/0x2d0
[   41.419560]  ret_from_fork+0x10/0x20
[   41.420297] 
[   41.420639] Allocated by task 254:
[   41.421392]  kasan_save_stack+0x3c/0x68
[   41.422132]  kasan_save_track+0x20/0x40
[   41.422786]  kasan_save_alloc_info+0x40/0x58
[   41.423418]  __kasan_kmalloc+0xd4/0xd8
[   41.424263]  __kmalloc_cache_noprof+0x15c/0x3c8
[   41.425130]  kasan_atomics+0xb8/0x2e8
[   41.425845]  kunit_try_run_case+0x14c/0x3d0
[   41.426434]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   41.427370]  kthread+0x24c/0x2d0
[   41.428087]  ret_from_fork+0x10/0x20
[   41.428857] 
[   41.429192] The buggy address belongs to the object at fff00000c65bde00
[   41.429192]  which belongs to the cache kmalloc-64 of size 64
[   41.430665] The buggy address is located 0 bytes to the right of
[   41.430665]  allocated 48-byte region [fff00000c65bde00, fff00000c65bde30)
[   41.432121] 
[   41.432701] The buggy address belongs to the physical page:
[   41.433311] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065bd
[   41.434123] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   41.434994] page_type: f5(slab)
[   41.435455] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   41.436370] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   41.437218] page dumped because: kasan: bad access detected
[   41.437828] 
[   41.438159] Memory state around the buggy address:
[   41.438667]  fff00000c65bdd00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   41.439545]  fff00000c65bdd80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   41.440342] >fff00000c65bde00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   41.441113]                                      ^
[   41.441632]  fff00000c65bde80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   41.442491]  fff00000c65bdf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   41.443318] ==================================================================
[   42.145210] ==================================================================
[   42.146371] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f58/0x4858
[   42.147285] Read of size 8 at addr fff00000c65bde30 by task kunit_try_catch/254
[   42.147924] 
[   42.148320] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241120 #1
[   42.149708] Tainted: [B]=BAD_PAGE, [N]=TEST
[   42.150435] Hardware name: linux,dummy-virt (DT)
[   42.151118] Call trace:
[   42.151579]  show_stack+0x20/0x38 (C)
[   42.152265]  dump_stack_lvl+0x8c/0xd0
[   42.152911]  print_report+0x118/0x5e0
[   42.153534]  kasan_report+0xc8/0x118
[   42.154117]  __asan_report_load8_noabort+0x20/0x30
[   42.154804]  kasan_atomics_helper+0x3f58/0x4858
[   42.155398]  kasan_atomics+0x198/0x2e8
[   42.156043]  kunit_try_run_case+0x14c/0x3d0
[   42.156733]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   42.157495]  kthread+0x24c/0x2d0
[   42.158056]  ret_from_fork+0x10/0x20
[   42.158659] 
[   42.159043] Allocated by task 254:
[   42.159547]  kasan_save_stack+0x3c/0x68
[   42.160203]  kasan_save_track+0x20/0x40
[   42.160836]  kasan_save_alloc_info+0x40/0x58
[   42.161519]  __kasan_kmalloc+0xd4/0xd8
[   42.162130]  __kmalloc_cache_noprof+0x15c/0x3c8
[   42.162838]  kasan_atomics+0xb8/0x2e8
[   42.163421]  kunit_try_run_case+0x14c/0x3d0
[   42.164073]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   42.164823]  kthread+0x24c/0x2d0
[   42.165404]  ret_from_fork+0x10/0x20
[   42.166046] 
[   42.166419] The buggy address belongs to the object at fff00000c65bde00
[   42.166419]  which belongs to the cache kmalloc-64 of size 64
[   42.167615] The buggy address is located 0 bytes to the right of
[   42.167615]  allocated 48-byte region [fff00000c65bde00, fff00000c65bde30)
[   42.168903] 
[   42.169236] The buggy address belongs to the physical page:
[   42.169924] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065bd
[   42.170937] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   42.171702] page_type: f5(slab)
[   42.172306] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   42.173165] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   42.174102] page dumped because: kasan: bad access detected
[   42.174760] 
[   42.175137] Memory state around the buggy address:
[   42.175776]  fff00000c65bdd00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   42.176647]  fff00000c65bdd80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   42.177520] >fff00000c65bde00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   42.178363]                                      ^
[   42.178950]  fff00000c65bde80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   42.179862]  fff00000c65bdf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   42.180651] ==================================================================
[   40.714682] ==================================================================
[   40.716377] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x40a8/0x4858
[   40.717185] Read of size 4 at addr fff00000c65bde30 by task kunit_try_catch/254
[   40.719089] 
[   40.719780] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241120 #1
[   40.721092] Tainted: [B]=BAD_PAGE, [N]=TEST
[   40.721938] Hardware name: linux,dummy-virt (DT)
[   40.722687] Call trace:
[   40.723354]  show_stack+0x20/0x38 (C)
[   40.724391]  dump_stack_lvl+0x8c/0xd0
[   40.724993]  print_report+0x118/0x5e0
[   40.725924]  kasan_report+0xc8/0x118
[   40.726562]  __asan_report_load4_noabort+0x20/0x30
[   40.727412]  kasan_atomics_helper+0x40a8/0x4858
[   40.728193]  kasan_atomics+0x198/0x2e8
[   40.728933]  kunit_try_run_case+0x14c/0x3d0
[   40.729785]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   40.730278]  kthread+0x24c/0x2d0
[   40.730705]  ret_from_fork+0x10/0x20
[   40.731224] 
[   40.731682] Allocated by task 254:
[   40.732364]  kasan_save_stack+0x3c/0x68
[   40.733109]  kasan_save_track+0x20/0x40
[   40.733808]  kasan_save_alloc_info+0x40/0x58
[   40.734659]  __kasan_kmalloc+0xd4/0xd8
[   40.735503]  __kmalloc_cache_noprof+0x15c/0x3c8
[   40.736313]  kasan_atomics+0xb8/0x2e8
[   40.737025]  kunit_try_run_case+0x14c/0x3d0
[   40.737877]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   40.739114]  kthread+0x24c/0x2d0
[   40.739605]  ret_from_fork+0x10/0x20
[   40.740538] 
[   40.740948] The buggy address belongs to the object at fff00000c65bde00
[   40.740948]  which belongs to the cache kmalloc-64 of size 64
[   40.743119] The buggy address is located 0 bytes to the right of
[   40.743119]  allocated 48-byte region [fff00000c65bde00, fff00000c65bde30)
[   40.744262] 
[   40.744971] The buggy address belongs to the physical page:
[   40.745711] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065bd
[   40.746792] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   40.747323] page_type: f5(slab)
[   40.747727] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   40.749156] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   40.750256] page dumped because: kasan: bad access detected
[   40.751110] 
[   40.751646] Memory state around the buggy address:
[   40.752474]  fff00000c65bdd00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   40.753735]  fff00000c65bdd80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   40.754872] >fff00000c65bde00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   40.755801]                                      ^
[   40.756531]  fff00000c65bde80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   40.757899]  fff00000c65bdf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   40.759000] ==================================================================
[   41.592487] ==================================================================
[   41.593303] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x934/0x4858
[   41.594203] Write of size 4 at addr fff00000c65bde30 by task kunit_try_catch/254
[   41.594809] 
[   41.595196] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241120 #1
[   41.596142] Tainted: [B]=BAD_PAGE, [N]=TEST
[   41.596674] Hardware name: linux,dummy-virt (DT)
[   41.597137] Call trace:
[   41.597583]  show_stack+0x20/0x38 (C)
[   41.598207]  dump_stack_lvl+0x8c/0xd0
[   41.598832]  print_report+0x118/0x5e0
[   41.599385]  kasan_report+0xc8/0x118
[   41.599908]  kasan_check_range+0x100/0x1a8
[   41.600558]  __kasan_check_write+0x20/0x30
[   41.601136]  kasan_atomics_helper+0x934/0x4858
[   41.601716]  kasan_atomics+0x198/0x2e8
[   41.602319]  kunit_try_run_case+0x14c/0x3d0
[   41.603009]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   41.603709]  kthread+0x24c/0x2d0
[   41.604278]  ret_from_fork+0x10/0x20
[   41.604851] 
[   41.605166] Allocated by task 254:
[   41.605705]  kasan_save_stack+0x3c/0x68
[   41.606209]  kasan_save_track+0x20/0x40
[   41.606809]  kasan_save_alloc_info+0x40/0x58
[   41.607409]  __kasan_kmalloc+0xd4/0xd8
[   41.607912]  __kmalloc_cache_noprof+0x15c/0x3c8
[   41.608599]  kasan_atomics+0xb8/0x2e8
[   41.609157]  kunit_try_run_case+0x14c/0x3d0
[   41.609760]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   41.610510]  kthread+0x24c/0x2d0
[   41.611046]  ret_from_fork+0x10/0x20
[   41.611551] 
[   41.611834] The buggy address belongs to the object at fff00000c65bde00
[   41.611834]  which belongs to the cache kmalloc-64 of size 64
[   41.613162] The buggy address is located 0 bytes to the right of
[   41.613162]  allocated 48-byte region [fff00000c65bde00, fff00000c65bde30)
[   41.614355] 
[   41.614728] The buggy address belongs to the physical page:
[   41.615381] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065bd
[   41.616077] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   41.616912] page_type: f5(slab)
[   41.617476] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   41.618244] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   41.619093] page dumped because: kasan: bad access detected
[   41.619794] 
[   41.620108] Memory state around the buggy address:
[   41.620769]  fff00000c65bdd00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   41.621539]  fff00000c65bdd80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   41.622345] >fff00000c65bde00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   41.623061]                                      ^
[   41.623651]  fff00000c65bde80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   41.624494]  fff00000c65bdf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   41.625109] ==================================================================
[   41.850831] ==================================================================
[   41.851571] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3dbc/0x4858
[   41.852357] Read of size 4 at addr fff00000c65bde30 by task kunit_try_catch/254
[   41.853109] 
[   41.853706] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241120 #1
[   41.854781] Tainted: [B]=BAD_PAGE, [N]=TEST
[   41.855296] Hardware name: linux,dummy-virt (DT)
[   41.856359] Call trace:
[   41.856940]  show_stack+0x20/0x38 (C)
[   41.857685]  dump_stack_lvl+0x8c/0xd0
[   41.858394]  print_report+0x118/0x5e0
[   41.859087]  kasan_report+0xc8/0x118
[   41.859789]  __asan_report_load4_noabort+0x20/0x30
[   41.860612]  kasan_atomics_helper+0x3dbc/0x4858
[   41.861377]  kasan_atomics+0x198/0x2e8
[   41.862076]  kunit_try_run_case+0x14c/0x3d0
[   41.862654]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   41.863320]  kthread+0x24c/0x2d0
[   41.863838]  ret_from_fork+0x10/0x20
[   41.864347] 
[   41.865219] Allocated by task 254:
[   41.865630]  kasan_save_stack+0x3c/0x68
[   41.866420]  kasan_save_track+0x20/0x40
[   41.866896]  kasan_save_alloc_info+0x40/0x58
[   41.867529]  __kasan_kmalloc+0xd4/0xd8
[   41.868015]  __kmalloc_cache_noprof+0x15c/0x3c8
[   41.868694]  kasan_atomics+0xb8/0x2e8
[   41.869238]  kunit_try_run_case+0x14c/0x3d0
[   41.869789]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   41.870520]  kthread+0x24c/0x2d0
[   41.870959]  ret_from_fork+0x10/0x20
[   41.871538] 
[   41.871892] The buggy address belongs to the object at fff00000c65bde00
[   41.871892]  which belongs to the cache kmalloc-64 of size 64
[   41.873058] The buggy address is located 0 bytes to the right of
[   41.873058]  allocated 48-byte region [fff00000c65bde00, fff00000c65bde30)
[   41.874189] 
[   41.874549] The buggy address belongs to the physical page:
[   41.875150] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065bd
[   41.875974] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   41.876728] page_type: f5(slab)
[   41.877257] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   41.878059] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   41.878757] page dumped because: kasan: bad access detected
[   41.879460] 
[   41.879806] Memory state around the buggy address:
[   41.880431]  fff00000c65bdd00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   41.881213]  fff00000c65bdd80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   41.882019] >fff00000c65bde00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   41.882775]                                      ^
[   41.883315]  fff00000c65bde80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   41.884519]  fff00000c65bdf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   41.885465] ==================================================================
[   42.896471] ==================================================================
[   42.897173] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x15b4/0x4858
[   42.898244] Write of size 8 at addr fff00000c65bde30 by task kunit_try_catch/254
[   42.899631] 
[   42.900042] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241120 #1
[   42.901226] Tainted: [B]=BAD_PAGE, [N]=TEST
[   42.901806] Hardware name: linux,dummy-virt (DT)
[   42.902354] Call trace:
[   42.902744]  show_stack+0x20/0x38 (C)
[   42.903380]  dump_stack_lvl+0x8c/0xd0
[   42.903927]  print_report+0x118/0x5e0
[   42.904467]  kasan_report+0xc8/0x118
[   42.904939]  kasan_check_range+0x100/0x1a8
[   42.905550]  __kasan_check_write+0x20/0x30
[   42.906154]  kasan_atomics_helper+0x15b4/0x4858
[   42.906783]  kasan_atomics+0x198/0x2e8
[   42.907262]  kunit_try_run_case+0x14c/0x3d0
[   42.907973]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   42.908796]  kthread+0x24c/0x2d0
[   42.909371]  ret_from_fork+0x10/0x20
[   42.910072] 
[   42.910453] Allocated by task 254:
[   42.911003]  kasan_save_stack+0x3c/0x68
[   42.911585]  kasan_save_track+0x20/0x40
[   42.912112]  kasan_save_alloc_info+0x40/0x58
[   42.912681]  __kasan_kmalloc+0xd4/0xd8
[   42.913292]  __kmalloc_cache_noprof+0x15c/0x3c8
[   42.913964]  kasan_atomics+0xb8/0x2e8
[   42.914428]  kunit_try_run_case+0x14c/0x3d0
[   42.915144]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   42.915829]  kthread+0x24c/0x2d0
[   42.916402]  ret_from_fork+0x10/0x20
[   42.916992] 
[   42.917319] The buggy address belongs to the object at fff00000c65bde00
[   42.917319]  which belongs to the cache kmalloc-64 of size 64
[   42.918588] The buggy address is located 0 bytes to the right of
[   42.918588]  allocated 48-byte region [fff00000c65bde00, fff00000c65bde30)
[   42.919866] 
[   42.920248] The buggy address belongs to the physical page:
[   42.920962] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065bd
[   42.921791] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   42.922569] page_type: f5(slab)
[   42.923044] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   42.923935] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   42.924786] page dumped because: kasan: bad access detected
[   42.925474] 
[   42.925807] Memory state around the buggy address:
[   42.926354]  fff00000c65bdd00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   42.927260]  fff00000c65bdd80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   42.928126] >fff00000c65bde00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   42.928968]                                      ^
[   42.929617]  fff00000c65bde80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   42.930486]  fff00000c65bdf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   42.931306] ==================================================================
[   42.672694] ==================================================================
[   42.673416] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1384/0x4858
[   42.674854] Write of size 8 at addr fff00000c65bde30 by task kunit_try_catch/254
[   42.675622] 
[   42.676035] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241120 #1
[   42.677309] Tainted: [B]=BAD_PAGE, [N]=TEST
[   42.677898] Hardware name: linux,dummy-virt (DT)
[   42.678604] Call trace:
[   42.679078]  show_stack+0x20/0x38 (C)
[   42.679768]  dump_stack_lvl+0x8c/0xd0
[   42.680389]  print_report+0x118/0x5e0
[   42.680982]  kasan_report+0xc8/0x118
[   42.681660]  kasan_check_range+0x100/0x1a8
[   42.682306]  __kasan_check_write+0x20/0x30
[   42.683023]  kasan_atomics_helper+0x1384/0x4858
[   42.683722]  kasan_atomics+0x198/0x2e8
[   42.684400]  kunit_try_run_case+0x14c/0x3d0
[   42.685038]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   42.685780]  kthread+0x24c/0x2d0
[   42.686349]  ret_from_fork+0x10/0x20
[   42.686943] 
[   42.687322] Allocated by task 254:
[   42.687913]  kasan_save_stack+0x3c/0x68
[   42.688508]  kasan_save_track+0x20/0x40
[   42.689068]  kasan_save_alloc_info+0x40/0x58
[   42.689756]  __kasan_kmalloc+0xd4/0xd8
[   42.690327]  __kmalloc_cache_noprof+0x15c/0x3c8
[   42.691013]  kasan_atomics+0xb8/0x2e8
[   42.691526]  kunit_try_run_case+0x14c/0x3d0
[   42.692253]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   42.692999]  kthread+0x24c/0x2d0
[   42.693623]  ret_from_fork+0x10/0x20
[   42.694187] 
[   42.694555] The buggy address belongs to the object at fff00000c65bde00
[   42.694555]  which belongs to the cache kmalloc-64 of size 64
[   42.695992] The buggy address is located 0 bytes to the right of
[   42.695992]  allocated 48-byte region [fff00000c65bde00, fff00000c65bde30)
[   42.696851] 
[   42.697023] The buggy address belongs to the physical page:
[   42.697306] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065bd
[   42.698474] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   42.699146] page_type: f5(slab)
[   42.699755] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   42.700702] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   42.701633] page dumped because: kasan: bad access detected
[   42.702251] 
[   42.702558] Memory state around the buggy address:
[   42.703118]  fff00000c65bdd00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   42.703882]  fff00000c65bdd80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   42.704593] >fff00000c65bde00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   42.705529]                                      ^
[   42.706221]  fff00000c65bde80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   42.707140]  fff00000c65bdf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   42.707949] ==================================================================
[   42.404202] ==================================================================
[   42.404945] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1058/0x4858
[   42.405772] Write of size 8 at addr fff00000c65bde30 by task kunit_try_catch/254
[   42.406589] 
[   42.407017] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241120 #1
[   42.408222] Tainted: [B]=BAD_PAGE, [N]=TEST
[   42.408751] Hardware name: linux,dummy-virt (DT)
[   42.409428] Call trace:
[   42.409908]  show_stack+0x20/0x38 (C)
[   42.410533]  dump_stack_lvl+0x8c/0xd0
[   42.411220]  print_report+0x118/0x5e0
[   42.411844]  kasan_report+0xc8/0x118
[   42.412378]  kasan_check_range+0x100/0x1a8
[   42.412960]  __kasan_check_write+0x20/0x30
[   42.413635]  kasan_atomics_helper+0x1058/0x4858
[   42.414324]  kasan_atomics+0x198/0x2e8
[   42.414978]  kunit_try_run_case+0x14c/0x3d0
[   42.415710]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   42.416477]  kthread+0x24c/0x2d0
[   42.417059]  ret_from_fork+0x10/0x20
[   42.417660] 
[   42.418048] Allocated by task 254:
[   42.418619]  kasan_save_stack+0x3c/0x68
[   42.419168]  kasan_save_track+0x20/0x40
[   42.419800]  kasan_save_alloc_info+0x40/0x58
[   42.420424]  __kasan_kmalloc+0xd4/0xd8
[   42.421048]  __kmalloc_cache_noprof+0x15c/0x3c8
[   42.421712]  kasan_atomics+0xb8/0x2e8
[   42.422333]  kunit_try_run_case+0x14c/0x3d0
[   42.422960]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   42.423652]  kthread+0x24c/0x2d0
[   42.424172]  ret_from_fork+0x10/0x20
[   42.424802] 
[   42.425190] The buggy address belongs to the object at fff00000c65bde00
[   42.425190]  which belongs to the cache kmalloc-64 of size 64
[   42.426389] The buggy address is located 0 bytes to the right of
[   42.426389]  allocated 48-byte region [fff00000c65bde00, fff00000c65bde30)
[   42.427726] 
[   42.428082] The buggy address belongs to the physical page:
[   42.428712] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065bd
[   42.429690] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   42.430547] page_type: f5(slab)
[   42.431119] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   42.431996] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   42.432889] page dumped because: kasan: bad access detected
[   42.433551] 
[   42.433931] Memory state around the buggy address:
[   42.434557]  fff00000c65bdd00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   42.435422]  fff00000c65bdd80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   42.436242] >fff00000c65bde00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   42.437078]                                      ^
[   42.437726]  fff00000c65bde80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   42.438532]  fff00000c65bdf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   42.439319] ==================================================================
[   41.482971] ==================================================================
[   41.484456] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x7cc/0x4858
[   41.485279] Write of size 4 at addr fff00000c65bde30 by task kunit_try_catch/254
[   41.487013] 
[   41.487580] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241120 #1
[   41.488595] Tainted: [B]=BAD_PAGE, [N]=TEST
[   41.489123] Hardware name: linux,dummy-virt (DT)
[   41.489736] Call trace:
[   41.490159]  show_stack+0x20/0x38 (C)
[   41.490786]  dump_stack_lvl+0x8c/0xd0
[   41.491370]  print_report+0x118/0x5e0
[   41.491931]  kasan_report+0xc8/0x118
[   41.492497]  kasan_check_range+0x100/0x1a8
[   41.493071]  __kasan_check_write+0x20/0x30
[   41.493586]  kasan_atomics_helper+0x7cc/0x4858
[   41.494257]  kasan_atomics+0x198/0x2e8
[   41.494869]  kunit_try_run_case+0x14c/0x3d0
[   41.495500]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   41.496163]  kthread+0x24c/0x2d0
[   41.496763]  ret_from_fork+0x10/0x20
[   41.497334] 
[   41.497680] Allocated by task 254:
[   41.498219]  kasan_save_stack+0x3c/0x68
[   41.498828]  kasan_save_track+0x20/0x40
[   41.499286]  kasan_save_alloc_info+0x40/0x58
[   41.499911]  __kasan_kmalloc+0xd4/0xd8
[   41.500472]  __kmalloc_cache_noprof+0x15c/0x3c8
[   41.501060]  kasan_atomics+0xb8/0x2e8
[   41.501594]  kunit_try_run_case+0x14c/0x3d0
[   41.502210]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   41.502939]  kthread+0x24c/0x2d0
[   41.503471]  ret_from_fork+0x10/0x20
[   41.504006] 
[   41.504369] The buggy address belongs to the object at fff00000c65bde00
[   41.504369]  which belongs to the cache kmalloc-64 of size 64
[   41.505537] The buggy address is located 0 bytes to the right of
[   41.505537]  allocated 48-byte region [fff00000c65bde00, fff00000c65bde30)
[   41.506668] 
[   41.507031] The buggy address belongs to the physical page:
[   41.507737] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065bd
[   41.508565] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   41.509331] page_type: f5(slab)
[   41.509884] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   41.510682] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   41.511461] page dumped because: kasan: bad access detected
[   41.512077] 
[   41.512456] Memory state around the buggy address:
[   41.513021]  fff00000c65bdd00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   41.513822]  fff00000c65bdd80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   41.514640] >fff00000c65bde00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   41.515303]                                      ^
[   41.515935]  fff00000c65bde80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   41.516829]  fff00000c65bdf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   41.517493] ==================================================================
[   41.163816] ==================================================================
[   41.164408] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x47c/0x4858
[   41.165114] Write of size 4 at addr fff00000c65bde30 by task kunit_try_catch/254
[   41.167025] 
[   41.167456] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241120 #1
[   41.169044] Tainted: [B]=BAD_PAGE, [N]=TEST
[   41.169835] Hardware name: linux,dummy-virt (DT)
[   41.171200] Call trace:
[   41.171650]  show_stack+0x20/0x38 (C)
[   41.172219]  dump_stack_lvl+0x8c/0xd0
[   41.172749]  print_report+0x118/0x5e0
[   41.173695]  kasan_report+0xc8/0x118
[   41.174377]  kasan_check_range+0x100/0x1a8
[   41.175281]  __kasan_check_write+0x20/0x30
[   41.175966]  kasan_atomics_helper+0x47c/0x4858
[   41.176714]  kasan_atomics+0x198/0x2e8
[   41.177279]  kunit_try_run_case+0x14c/0x3d0
[   41.177958]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   41.179762]  kthread+0x24c/0x2d0
[   41.180515]  ret_from_fork+0x10/0x20
[   41.181036] 
[   41.181743] Allocated by task 254:
[   41.182517]  kasan_save_stack+0x3c/0x68
[   41.183245]  kasan_save_track+0x20/0x40
[   41.183993]  kasan_save_alloc_info+0x40/0x58
[   41.184753]  __kasan_kmalloc+0xd4/0xd8
[   41.185589]  __kmalloc_cache_noprof+0x15c/0x3c8
[   41.186745]  kasan_atomics+0xb8/0x2e8
[   41.187193]  kunit_try_run_case+0x14c/0x3d0
[   41.187642]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   41.188386]  kthread+0x24c/0x2d0
[   41.189016]  ret_from_fork+0x10/0x20
[   41.189623] 
[   41.189975] The buggy address belongs to the object at fff00000c65bde00
[   41.189975]  which belongs to the cache kmalloc-64 of size 64
[   41.191326] The buggy address is located 0 bytes to the right of
[   41.191326]  allocated 48-byte region [fff00000c65bde00, fff00000c65bde30)
[   41.193237] 
[   41.193616] The buggy address belongs to the physical page:
[   41.194718] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065bd
[   41.195600] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   41.196464] page_type: f5(slab)
[   41.197078] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   41.198289] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   41.199157] page dumped because: kasan: bad access detected
[   41.199817] 
[   41.200181] Memory state around the buggy address:
[   41.200810]  fff00000c65bdd00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   41.202572]  fff00000c65bdd80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   41.203459] >fff00000c65bde00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   41.204252]                                      ^
[   41.204911]  fff00000c65bde80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   41.205653]  fff00000c65bdf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   41.206372] ==================================================================
[   41.924968] ==================================================================
[   41.925898] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3de4/0x4858
[   41.926906] Read of size 4 at addr fff00000c65bde30 by task kunit_try_catch/254
[   41.928303] 
[   41.928930] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241120 #1
[   41.930226] Tainted: [B]=BAD_PAGE, [N]=TEST
[   41.930828] Hardware name: linux,dummy-virt (DT)
[   41.931220] Call trace:
[   41.931657]  show_stack+0x20/0x38 (C)
[   41.932282]  dump_stack_lvl+0x8c/0xd0
[   41.932948]  print_report+0x118/0x5e0
[   41.933495]  kasan_report+0xc8/0x118
[   41.934012]  __asan_report_load4_noabort+0x20/0x30
[   41.934714]  kasan_atomics_helper+0x3de4/0x4858
[   41.935331]  kasan_atomics+0x198/0x2e8
[   41.935946]  kunit_try_run_case+0x14c/0x3d0
[   41.936550]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   41.937293]  kthread+0x24c/0x2d0
[   41.937753]  ret_from_fork+0x10/0x20
[   41.938345] 
[   41.938703] Allocated by task 254:
[   41.939198]  kasan_save_stack+0x3c/0x68
[   41.939815]  kasan_save_track+0x20/0x40
[   41.940372]  kasan_save_alloc_info+0x40/0x58
[   41.940938]  __kasan_kmalloc+0xd4/0xd8
[   41.941545]  __kmalloc_cache_noprof+0x15c/0x3c8
[   41.942131]  kasan_atomics+0xb8/0x2e8
[   41.942730]  kunit_try_run_case+0x14c/0x3d0
[   41.943270]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   41.944019]  kthread+0x24c/0x2d0
[   41.944587]  ret_from_fork+0x10/0x20
[   41.945175] 
[   41.945535] The buggy address belongs to the object at fff00000c65bde00
[   41.945535]  which belongs to the cache kmalloc-64 of size 64
[   41.946731] The buggy address is located 0 bytes to the right of
[   41.946731]  allocated 48-byte region [fff00000c65bde00, fff00000c65bde30)
[   41.947794] 
[   41.948164] The buggy address belongs to the physical page:
[   41.948896] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065bd
[   41.949797] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   41.950437] page_type: f5(slab)
[   41.950970] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   41.951894] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   41.952658] page dumped because: kasan: bad access detected
[   41.953365] 
[   41.953727] Memory state around the buggy address:
[   41.954216]  fff00000c65bdd00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   41.955134]  fff00000c65bdd80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   41.955811] >fff00000c65bde00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   41.956685]                                      ^
[   41.957275]  fff00000c65bde80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   41.958133]  fff00000c65bdf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   41.958842] ==================================================================
[   42.859309] ==================================================================
[   42.860004] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x154c/0x4858
[   42.860876] Write of size 8 at addr fff00000c65bde30 by task kunit_try_catch/254
[   42.861801] 
[   42.862153] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241120 #1
[   42.863326] Tainted: [B]=BAD_PAGE, [N]=TEST
[   42.863878] Hardware name: linux,dummy-virt (DT)
[   42.864554] Call trace:
[   42.865034]  show_stack+0x20/0x38 (C)
[   42.865685]  dump_stack_lvl+0x8c/0xd0
[   42.866330]  print_report+0x118/0x5e0
[   42.866981]  kasan_report+0xc8/0x118
[   42.867633]  kasan_check_range+0x100/0x1a8
[   42.868226]  __kasan_check_write+0x20/0x30
[   42.868887]  kasan_atomics_helper+0x154c/0x4858
[   42.869544]  kasan_atomics+0x198/0x2e8
[   42.870124]  kunit_try_run_case+0x14c/0x3d0
[   42.870776]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   42.871576]  kthread+0x24c/0x2d0
[   42.872117]  ret_from_fork+0x10/0x20
[   42.872788] 
[   42.873146] Allocated by task 254:
[   42.873640]  kasan_save_stack+0x3c/0x68
[   42.874253]  kasan_save_track+0x20/0x40
[   42.874829]  kasan_save_alloc_info+0x40/0x58
[   42.875516]  __kasan_kmalloc+0xd4/0xd8
[   42.876051]  __kmalloc_cache_noprof+0x15c/0x3c8
[   42.876657]  kasan_atomics+0xb8/0x2e8
[   42.877272]  kunit_try_run_case+0x14c/0x3d0
[   42.877860]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   42.878621]  kthread+0x24c/0x2d0
[   42.879190]  ret_from_fork+0x10/0x20
[   42.879743] 
[   42.880096] The buggy address belongs to the object at fff00000c65bde00
[   42.880096]  which belongs to the cache kmalloc-64 of size 64
[   42.881317] The buggy address is located 0 bytes to the right of
[   42.881317]  allocated 48-byte region [fff00000c65bde00, fff00000c65bde30)
[   42.882590] 
[   42.882943] The buggy address belongs to the physical page:
[   42.883676] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065bd
[   42.884563] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   42.885387] page_type: f5(slab)
[   42.885969] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   42.886796] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   42.887606] page dumped because: kasan: bad access detected
[   42.888188] 
[   42.888560] Memory state around the buggy address:
[   42.889076]  fff00000c65bdd00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   42.889913]  fff00000c65bdd80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   42.890842] >fff00000c65bde00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   42.891578]                                      ^
[   42.892261]  fff00000c65bde80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   42.893072]  fff00000c65bdf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   42.893857] ==================================================================
[   42.516454] ==================================================================
[   42.517174] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1190/0x4858
[   42.518089] Write of size 8 at addr fff00000c65bde30 by task kunit_try_catch/254
[   42.518902] 
[   42.519321] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241120 #1
[   42.520371] Tainted: [B]=BAD_PAGE, [N]=TEST
[   42.520989] Hardware name: linux,dummy-virt (DT)
[   42.521651] Call trace:
[   42.522048]  show_stack+0x20/0x38 (C)
[   42.522610]  dump_stack_lvl+0x8c/0xd0
[   42.523250]  print_report+0x118/0x5e0
[   42.523897]  kasan_report+0xc8/0x118
[   42.524512]  kasan_check_range+0x100/0x1a8
[   42.525044]  __kasan_check_write+0x20/0x30
[   42.525634]  kasan_atomics_helper+0x1190/0x4858
[   42.526276]  kasan_atomics+0x198/0x2e8
[   42.526927]  kunit_try_run_case+0x14c/0x3d0
[   42.527616]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   42.528353]  kthread+0x24c/0x2d0
[   42.528917]  ret_from_fork+0x10/0x20
[   42.529571] 
[   42.529931] Allocated by task 254:
[   42.530431]  kasan_save_stack+0x3c/0x68
[   42.531011]  kasan_save_track+0x20/0x40
[   42.531649]  kasan_save_alloc_info+0x40/0x58
[   42.532271]  __kasan_kmalloc+0xd4/0xd8
[   42.532886]  __kmalloc_cache_noprof+0x15c/0x3c8
[   42.533552]  kasan_atomics+0xb8/0x2e8
[   42.534151]  kunit_try_run_case+0x14c/0x3d0
[   42.534779]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   42.535524]  kthread+0x24c/0x2d0
[   42.536015]  ret_from_fork+0x10/0x20
[   42.536629] 
[   42.537010] The buggy address belongs to the object at fff00000c65bde00
[   42.537010]  which belongs to the cache kmalloc-64 of size 64
[   42.538223] The buggy address is located 0 bytes to the right of
[   42.538223]  allocated 48-byte region [fff00000c65bde00, fff00000c65bde30)
[   42.539535] 
[   42.539878] The buggy address belongs to the physical page:
[   42.540504] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065bd
[   42.541433] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   42.542228] page_type: f5(slab)
[   42.542836] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   42.543927] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   42.544937] page dumped because: kasan: bad access detected
[   42.545788] 
[   42.546283] Memory state around the buggy address:
[   42.547007]  fff00000c65bdd00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   42.548023]  fff00000c65bdd80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   42.548886] >fff00000c65bde00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   42.549834]                                      ^
[   42.550599]  fff00000c65bde80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   42.551556]  fff00000c65bdf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   42.552530] ==================================================================
[   41.444883] ==================================================================
[   41.445712] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x760/0x4858
[   41.447040] Write of size 4 at addr fff00000c65bde30 by task kunit_try_catch/254
[   41.447922] 
[   41.448276] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241120 #1
[   41.449372] Tainted: [B]=BAD_PAGE, [N]=TEST
[   41.449935] Hardware name: linux,dummy-virt (DT)
[   41.450501] Call trace:
[   41.450925]  show_stack+0x20/0x38 (C)
[   41.451571]  dump_stack_lvl+0x8c/0xd0
[   41.452183]  print_report+0x118/0x5e0
[   41.452815]  kasan_report+0xc8/0x118
[   41.453390]  kasan_check_range+0x100/0x1a8
[   41.454005]  __kasan_check_write+0x20/0x30
[   41.454649]  kasan_atomics_helper+0x760/0x4858
[   41.455383]  kasan_atomics+0x198/0x2e8
[   41.456014]  kunit_try_run_case+0x14c/0x3d0
[   41.456639]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   41.457294]  kthread+0x24c/0x2d0
[   41.457852]  ret_from_fork+0x10/0x20
[   41.458388] 
[   41.458758] Allocated by task 254:
[   41.459198]  kasan_save_stack+0x3c/0x68
[   41.459794]  kasan_save_track+0x20/0x40
[   41.460352]  kasan_save_alloc_info+0x40/0x58
[   41.461006]  __kasan_kmalloc+0xd4/0xd8
[   41.461594]  __kmalloc_cache_noprof+0x15c/0x3c8
[   41.462243]  kasan_atomics+0xb8/0x2e8
[   41.462712]  kunit_try_run_case+0x14c/0x3d0
[   41.463326]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   41.464305]  kthread+0x24c/0x2d0
[   41.464766]  ret_from_fork+0x10/0x20
[   41.465236] 
[   41.465646] The buggy address belongs to the object at fff00000c65bde00
[   41.465646]  which belongs to the cache kmalloc-64 of size 64
[   41.467142] The buggy address is located 0 bytes to the right of
[   41.467142]  allocated 48-byte region [fff00000c65bde00, fff00000c65bde30)
[   41.468675] 
[   41.469058] The buggy address belongs to the physical page:
[   41.469795] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065bd
[   41.470762] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   41.471614] page_type: f5(slab)
[   41.472051] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   41.472852] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   41.473644] page dumped because: kasan: bad access detected
[   41.474247] 
[   41.474597] Memory state around the buggy address:
[   41.475256]  fff00000c65bdd00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   41.476073]  fff00000c65bdd80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   41.476964] >fff00000c65bde00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   41.477862]                                      ^
[   41.478492]  fff00000c65bde80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   41.479374]  fff00000c65bdf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   41.480175] ==================================================================
[   40.983038] ==================================================================
[   40.983773] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x32c/0x4858
[   40.985953] Write of size 4 at addr fff00000c65bde30 by task kunit_try_catch/254
[   40.986568] 
[   40.986874] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241120 #1
[   40.988028] Tainted: [B]=BAD_PAGE, [N]=TEST
[   40.988603] Hardware name: linux,dummy-virt (DT)
[   40.989177] Call trace:
[   40.989588]  show_stack+0x20/0x38 (C)
[   40.990645]  dump_stack_lvl+0x8c/0xd0
[   40.991288]  print_report+0x118/0x5e0
[   40.991792]  kasan_report+0xc8/0x118
[   40.992316]  kasan_check_range+0x100/0x1a8
[   40.992864]  __kasan_check_write+0x20/0x30
[   40.994680]  kasan_atomics_helper+0x32c/0x4858
[   40.995855]  kasan_atomics+0x198/0x2e8
[   40.996637]  kunit_try_run_case+0x14c/0x3d0
[   40.997579]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   40.998137]  kthread+0x24c/0x2d0
[   40.999579]  ret_from_fork+0x10/0x20
[   41.000470] 
[   41.000837] Allocated by task 254:
[   41.001381]  kasan_save_stack+0x3c/0x68
[   41.002260]  kasan_save_track+0x20/0x40
[   41.002674]  kasan_save_alloc_info+0x40/0x58
[   41.003494]  __kasan_kmalloc+0xd4/0xd8
[   41.004023]  __kmalloc_cache_noprof+0x15c/0x3c8
[   41.005008]  kasan_atomics+0xb8/0x2e8
[   41.005836]  kunit_try_run_case+0x14c/0x3d0
[   41.007570]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   41.008437]  kthread+0x24c/0x2d0
[   41.008980]  ret_from_fork+0x10/0x20
[   41.010027] 
[   41.010234] The buggy address belongs to the object at fff00000c65bde00
[   41.010234]  which belongs to the cache kmalloc-64 of size 64
[   41.011496] The buggy address is located 0 bytes to the right of
[   41.011496]  allocated 48-byte region [fff00000c65bde00, fff00000c65bde30)
[   41.012746] 
[   41.013088] The buggy address belongs to the physical page:
[   41.014111] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065bd
[   41.015148] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   41.016293] page_type: f5(slab)
[   41.017670] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   41.019149] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   41.020077] page dumped because: kasan: bad access detected
[   41.020792] 
[   41.021143] Memory state around the buggy address:
[   41.022668]  fff00000c65bdd00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   41.023033]  fff00000c65bdd80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   41.023377] >fff00000c65bde00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   41.024031]                                      ^
[   41.025161]  fff00000c65bde80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   41.026509]  fff00000c65bdf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   41.027269] ==================================================================
[   41.960944] ==================================================================
[   41.961832] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xca0/0x4858
[   41.962631] Write of size 4 at addr fff00000c65bde30 by task kunit_try_catch/254
[   41.963390] 
[   41.963765] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241120 #1
[   41.964750] Tainted: [B]=BAD_PAGE, [N]=TEST
[   41.965382] Hardware name: linux,dummy-virt (DT)
[   41.965928] Call trace:
[   41.966359]  show_stack+0x20/0x38 (C)
[   41.967012]  dump_stack_lvl+0x8c/0xd0
[   41.967636]  print_report+0x118/0x5e0
[   41.968194]  kasan_report+0xc8/0x118
[   41.968720]  kasan_check_range+0x100/0x1a8
[   41.969374]  __kasan_check_write+0x20/0x30
[   41.969984]  kasan_atomics_helper+0xca0/0x4858
[   41.970676]  kasan_atomics+0x198/0x2e8
[   41.971281]  kunit_try_run_case+0x14c/0x3d0
[   41.971895]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   41.972611]  kthread+0x24c/0x2d0
[   41.973174]  ret_from_fork+0x10/0x20
[   41.973803] 
[   41.974126] Allocated by task 254:
[   41.974616]  kasan_save_stack+0x3c/0x68
[   41.975252]  kasan_save_track+0x20/0x40
[   41.975748]  kasan_save_alloc_info+0x40/0x58
[   41.976382]  __kasan_kmalloc+0xd4/0xd8
[   41.976861]  __kmalloc_cache_noprof+0x15c/0x3c8
[   41.977518]  kasan_atomics+0xb8/0x2e8
[   41.978095]  kunit_try_run_case+0x14c/0x3d0
[   41.978680]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   41.979410]  kthread+0x24c/0x2d0
[   41.979953]  ret_from_fork+0x10/0x20
[   41.980721] 
[   41.981085] The buggy address belongs to the object at fff00000c65bde00
[   41.981085]  which belongs to the cache kmalloc-64 of size 64
[   41.982070] The buggy address is located 0 bytes to the right of
[   41.982070]  allocated 48-byte region [fff00000c65bde00, fff00000c65bde30)
[   41.983197] 
[   41.983558] The buggy address belongs to the physical page:
[   41.984228] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065bd
[   41.985139] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   41.985872] page_type: f5(slab)
[   41.986412] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   41.987189] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   41.988059] page dumped because: kasan: bad access detected
[   41.988682] 
[   41.989030] Memory state around the buggy address:
[   41.989657]  fff00000c65bdd00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   41.990393]  fff00000c65bdd80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   41.991236] >fff00000c65bde00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   41.991938]                                      ^
[   41.992564]  fff00000c65bde80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   41.993422]  fff00000c65bdf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   41.994094] ==================================================================
[   41.119030] ==================================================================
[   41.119743] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x414/0x4858
[   41.120707] Write of size 4 at addr fff00000c65bde30 by task kunit_try_catch/254
[   41.122257] 
[   41.122657] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241120 #1
[   41.123672] Tainted: [B]=BAD_PAGE, [N]=TEST
[   41.124181] Hardware name: linux,dummy-virt (DT)
[   41.125707] Call trace:
[   41.126564]  show_stack+0x20/0x38 (C)
[   41.127311]  dump_stack_lvl+0x8c/0xd0
[   41.127950]  print_report+0x118/0x5e0
[   41.128582]  kasan_report+0xc8/0x118
[   41.129133]  kasan_check_range+0x100/0x1a8
[   41.129738]  __kasan_check_write+0x20/0x30
[   41.130382]  kasan_atomics_helper+0x414/0x4858
[   41.130945]  kasan_atomics+0x198/0x2e8
[   41.132164]  kunit_try_run_case+0x14c/0x3d0
[   41.132663]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   41.133641]  kthread+0x24c/0x2d0
[   41.134479]  ret_from_fork+0x10/0x20
[   41.135247] 
[   41.135650] Allocated by task 254:
[   41.136204]  kasan_save_stack+0x3c/0x68
[   41.136850]  kasan_save_track+0x20/0x40
[   41.137635]  kasan_save_alloc_info+0x40/0x58
[   41.138603]  __kasan_kmalloc+0xd4/0xd8
[   41.139213]  __kmalloc_cache_noprof+0x15c/0x3c8
[   41.140396]  kasan_atomics+0xb8/0x2e8
[   41.140961]  kunit_try_run_case+0x14c/0x3d0
[   41.141761]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   41.142836]  kthread+0x24c/0x2d0
[   41.143638]  ret_from_fork+0x10/0x20
[   41.144420] 
[   41.144909] The buggy address belongs to the object at fff00000c65bde00
[   41.144909]  which belongs to the cache kmalloc-64 of size 64
[   41.146483] The buggy address is located 0 bytes to the right of
[   41.146483]  allocated 48-byte region [fff00000c65bde00, fff00000c65bde30)
[   41.148266] 
[   41.148642] The buggy address belongs to the physical page:
[   41.149605] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065bd
[   41.150486] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   41.151207] page_type: f5(slab)
[   41.152048] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   41.153120] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   41.154194] page dumped because: kasan: bad access detected
[   41.155055] 
[   41.155322] Memory state around the buggy address:
[   41.156075]  fff00000c65bdd00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   41.157481]  fff00000c65bdd80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   41.158553] >fff00000c65bde00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   41.159306]                                      ^
[   41.159827]  fff00000c65bde80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   41.160714]  fff00000c65bdf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   41.161540] ==================================================================
[   43.006795] ==================================================================
[   43.007488] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3df4/0x4858
[   43.008335] Read of size 8 at addr fff00000c65bde30 by task kunit_try_catch/254
[   43.009138] 
[   43.009519] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241120 #1
[   43.010574] Tainted: [B]=BAD_PAGE, [N]=TEST
[   43.010999] Hardware name: linux,dummy-virt (DT)
[   43.011624] Call trace:
[   43.012009]  show_stack+0x20/0x38 (C)
[   43.012632]  dump_stack_lvl+0x8c/0xd0
[   43.013242]  print_report+0x118/0x5e0
[   43.013859]  kasan_report+0xc8/0x118
[   43.014374]  __asan_report_load8_noabort+0x20/0x30
[   43.015079]  kasan_atomics_helper+0x3df4/0x4858
[   43.015653]  kasan_atomics+0x198/0x2e8
[   43.016251]  kunit_try_run_case+0x14c/0x3d0
[   43.016812]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   43.017567]  kthread+0x24c/0x2d0
[   43.018021]  ret_from_fork+0x10/0x20
[   43.018649] 
[   43.018999] Allocated by task 254:
[   43.019516]  kasan_save_stack+0x3c/0x68
[   43.020075]  kasan_save_track+0x20/0x40
[   43.020594]  kasan_save_alloc_info+0x40/0x58
[   43.021209]  __kasan_kmalloc+0xd4/0xd8
[   43.021732]  __kmalloc_cache_noprof+0x15c/0x3c8
[   43.022377]  kasan_atomics+0xb8/0x2e8
[   43.022917]  kunit_try_run_case+0x14c/0x3d0
[   43.023409]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   43.024163]  kthread+0x24c/0x2d0
[   43.024639]  ret_from_fork+0x10/0x20
[   43.025245] 
[   43.025613] The buggy address belongs to the object at fff00000c65bde00
[   43.025613]  which belongs to the cache kmalloc-64 of size 64
[   43.026716] The buggy address is located 0 bytes to the right of
[   43.026716]  allocated 48-byte region [fff00000c65bde00, fff00000c65bde30)
[   43.027965] 
[   43.028284] The buggy address belongs to the physical page:
[   43.028992] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065bd
[   43.029743] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   43.030581] page_type: f5(slab)
[   43.031113] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   43.031876] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   43.032676] page dumped because: kasan: bad access detected
[   43.033362] 
[   43.033702] Memory state around the buggy address:
[   43.034262]  fff00000c65bdd00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   43.035138]  fff00000c65bdd80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   43.035860] >fff00000c65bde00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   43.036718]                                      ^
[   43.037217]  fff00000c65bde80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   43.038091]  fff00000c65bdf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   43.038792] ==================================================================
[   42.478546] ==================================================================
[   42.479680] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1128/0x4858
[   42.480534] Write of size 8 at addr fff00000c65bde30 by task kunit_try_catch/254
[   42.481094] 
[   42.481400] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241120 #1
[   42.482571] Tainted: [B]=BAD_PAGE, [N]=TEST
[   42.483218] Hardware name: linux,dummy-virt (DT)
[   42.483846] Call trace:
[   42.484329]  show_stack+0x20/0x38 (C)
[   42.485009]  dump_stack_lvl+0x8c/0xd0
[   42.485677]  print_report+0x118/0x5e0
[   42.486279]  kasan_report+0xc8/0x118
[   42.486967]  kasan_check_range+0x100/0x1a8
[   42.487624]  __kasan_check_write+0x20/0x30
[   42.488181]  kasan_atomics_helper+0x1128/0x4858
[   42.488911]  kasan_atomics+0x198/0x2e8
[   42.489527]  kunit_try_run_case+0x14c/0x3d0
[   42.490221]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   42.491008]  kthread+0x24c/0x2d0
[   42.491605]  ret_from_fork+0x10/0x20
[   42.492246] 
[   42.492620] Allocated by task 254:
[   42.493180]  kasan_save_stack+0x3c/0x68
[   42.493779]  kasan_save_track+0x20/0x40
[   42.494298]  kasan_save_alloc_info+0x40/0x58
[   42.495081]  __kasan_kmalloc+0xd4/0xd8
[   42.495976]  __kmalloc_cache_noprof+0x15c/0x3c8
[   42.496603]  kasan_atomics+0xb8/0x2e8
[   42.496862]  kunit_try_run_case+0x14c/0x3d0
[   42.497121]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   42.497410]  kthread+0x24c/0x2d0
[   42.497820]  ret_from_fork+0x10/0x20
[   42.498221] 
[   42.499115] The buggy address belongs to the object at fff00000c65bde00
[   42.499115]  which belongs to the cache kmalloc-64 of size 64
[   42.500657] The buggy address is located 0 bytes to the right of
[   42.500657]  allocated 48-byte region [fff00000c65bde00, fff00000c65bde30)
[   42.501969] 
[   42.502326] The buggy address belongs to the physical page:
[   42.502922] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065bd
[   42.503838] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   42.504639] page_type: f5(slab)
[   42.505246] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   42.506102] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   42.506988] page dumped because: kasan: bad access detected
[   42.507670] 
[   42.508025] Memory state around the buggy address:
[   42.508717]  fff00000c65bdd00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   42.509634]  fff00000c65bdd80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   42.510489] >fff00000c65bde00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   42.511269]                                      ^
[   42.511891]  fff00000c65bde80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   42.512722]  fff00000c65bdf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   42.513507] ==================================================================
[   40.760319] ==================================================================
[   40.760940] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f7c/0x4858
[   40.762423] Write of size 4 at addr fff00000c65bde30 by task kunit_try_catch/254
[   40.763291] 
[   40.763662] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241120 #1
[   40.764901] Tainted: [B]=BAD_PAGE, [N]=TEST
[   40.766117] Hardware name: linux,dummy-virt (DT)
[   40.766701] Call trace:
[   40.767173]  show_stack+0x20/0x38 (C)
[   40.767800]  dump_stack_lvl+0x8c/0xd0
[   40.768394]  print_report+0x118/0x5e0
[   40.768891]  kasan_report+0xc8/0x118
[   40.769790]  __asan_report_store4_noabort+0x20/0x30
[   40.770634]  kasan_atomics_helper+0x3f7c/0x4858
[   40.771138]  kasan_atomics+0x198/0x2e8
[   40.772144]  kunit_try_run_case+0x14c/0x3d0
[   40.772699]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   40.774237]  kthread+0x24c/0x2d0
[   40.774864]  ret_from_fork+0x10/0x20
[   40.775468] 
[   40.775842] Allocated by task 254:
[   40.776366]  kasan_save_stack+0x3c/0x68
[   40.776979]  kasan_save_track+0x20/0x40
[   40.777623]  kasan_save_alloc_info+0x40/0x58
[   40.778741]  __kasan_kmalloc+0xd4/0xd8
[   40.779953]  __kmalloc_cache_noprof+0x15c/0x3c8
[   40.780537]  kasan_atomics+0xb8/0x2e8
[   40.781014]  kunit_try_run_case+0x14c/0x3d0
[   40.782029]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   40.782844]  kthread+0x24c/0x2d0
[   40.783516]  ret_from_fork+0x10/0x20
[   40.784200] 
[   40.784726] The buggy address belongs to the object at fff00000c65bde00
[   40.784726]  which belongs to the cache kmalloc-64 of size 64
[   40.786982] The buggy address is located 0 bytes to the right of
[   40.786982]  allocated 48-byte region [fff00000c65bde00, fff00000c65bde30)
[   40.788629] 
[   40.788918] The buggy address belongs to the physical page:
[   40.790003] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065bd
[   40.791010] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   40.791991] page_type: f5(slab)
[   40.792703] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   40.794038] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   40.794957] page dumped because: kasan: bad access detected
[   40.795731] 
[   40.796313] Memory state around the buggy address:
[   40.797148]  fff00000c65bdd00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   40.798512]  fff00000c65bdd80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   40.799521] >fff00000c65bde00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   40.800325]                                      ^
[   40.800955]  fff00000c65bde80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   40.801939]  fff00000c65bdf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   40.802705] ==================================================================
[   43.083055] ==================================================================
[   43.083767] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e10/0x4858
[   43.084599] Read of size 8 at addr fff00000c65bde30 by task kunit_try_catch/254
[   43.086896] 
[   43.087201] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241120 #1
[   43.088255] Tainted: [B]=BAD_PAGE, [N]=TEST
[   43.088804] Hardware name: linux,dummy-virt (DT)
[   43.089331] Call trace:
[   43.089735]  show_stack+0x20/0x38 (C)
[   43.090345]  dump_stack_lvl+0x8c/0xd0
[   43.090957]  print_report+0x118/0x5e0
[   43.091495]  kasan_report+0xc8/0x118
[   43.092078]  __asan_report_load8_noabort+0x20/0x30
[   43.092773]  kasan_atomics_helper+0x3e10/0x4858
[   43.093465]  kasan_atomics+0x198/0x2e8
[   43.094062]  kunit_try_run_case+0x14c/0x3d0
[   43.094684]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   43.095299]  kthread+0x24c/0x2d0
[   43.095882]  ret_from_fork+0x10/0x20
[   43.096419] 
[   43.096778] Allocated by task 254:
[   43.097290]  kasan_save_stack+0x3c/0x68
[   43.097876]  kasan_save_track+0x20/0x40
[   43.098491]  kasan_save_alloc_info+0x40/0x58
[   43.099108]  __kasan_kmalloc+0xd4/0xd8
[   43.099660]  __kmalloc_cache_noprof+0x15c/0x3c8
[   43.100262]  kasan_atomics+0xb8/0x2e8
[   43.100843]  kunit_try_run_case+0x14c/0x3d0
[   43.101474]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   43.102139]  kthread+0x24c/0x2d0
[   43.102580]  ret_from_fork+0x10/0x20
[   43.103152] 
[   43.103504] The buggy address belongs to the object at fff00000c65bde00
[   43.103504]  which belongs to the cache kmalloc-64 of size 64
[   43.104665] The buggy address is located 0 bytes to the right of
[   43.104665]  allocated 48-byte region [fff00000c65bde00, fff00000c65bde30)
[   43.105914] 
[   43.106237] The buggy address belongs to the physical page:
[   43.106951] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065bd
[   43.107871] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   43.108572] page_type: f5(slab)
[   43.108996] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   43.109907] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   43.110810] page dumped because: kasan: bad access detected
[   43.111535] 
[   43.111875] Memory state around the buggy address:
[   43.112463]  fff00000c65bdd00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   43.113248]  fff00000c65bdd80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   43.114034] >fff00000c65bde00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   43.114787]                                      ^
[   43.115338]  fff00000c65bde80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   43.116099]  fff00000c65bdf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   43.116784] ==================================================================
[   41.359590] ==================================================================
[   41.360631] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x684/0x4858
[   41.362233] Write of size 4 at addr fff00000c65bde30 by task kunit_try_catch/254
[   41.364083] 
[   41.364639] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241120 #1
[   41.365978] Tainted: [B]=BAD_PAGE, [N]=TEST
[   41.366551] Hardware name: linux,dummy-virt (DT)
[   41.367102] Call trace:
[   41.367472]  show_stack+0x20/0x38 (C)
[   41.368000]  dump_stack_lvl+0x8c/0xd0
[   41.369277]  print_report+0x118/0x5e0
[   41.369821]  kasan_report+0xc8/0x118
[   41.370329]  kasan_check_range+0x100/0x1a8
[   41.370870]  __kasan_check_write+0x20/0x30
[   41.371397]  kasan_atomics_helper+0x684/0x4858
[   41.372605]  kasan_atomics+0x198/0x2e8
[   41.373197]  kunit_try_run_case+0x14c/0x3d0
[   41.373844]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   41.374872]  kthread+0x24c/0x2d0
[   41.375610]  ret_from_fork+0x10/0x20
[   41.376334] 
[   41.376677] Allocated by task 254:
[   41.377471]  kasan_save_stack+0x3c/0x68
[   41.378041]  kasan_save_track+0x20/0x40
[   41.378847]  kasan_save_alloc_info+0x40/0x58
[   41.379615]  __kasan_kmalloc+0xd4/0xd8
[   41.380327]  __kmalloc_cache_noprof+0x15c/0x3c8
[   41.380964]  kasan_atomics+0xb8/0x2e8
[   41.381757]  kunit_try_run_case+0x14c/0x3d0
[   41.382557]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   41.383412]  kthread+0x24c/0x2d0
[   41.383930]  ret_from_fork+0x10/0x20
[   41.384745] 
[   41.385260] The buggy address belongs to the object at fff00000c65bde00
[   41.385260]  which belongs to the cache kmalloc-64 of size 64
[   41.386724] The buggy address is located 0 bytes to the right of
[   41.386724]  allocated 48-byte region [fff00000c65bde00, fff00000c65bde30)
[   41.388278] 
[   41.388641] The buggy address belongs to the physical page:
[   41.389556] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065bd
[   41.390595] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   41.391368] page_type: f5(slab)
[   41.392162] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   41.393216] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   41.394216] page dumped because: kasan: bad access detected
[   41.394989] 
[   41.395337] Memory state around the buggy address:
[   41.396257]  fff00000c65bdd00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   41.397102]  fff00000c65bdd80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   41.398122] >fff00000c65bde00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   41.399085]                                      ^
[   41.399889]  fff00000c65bde80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   41.400867]  fff00000c65bdf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   41.401699] ==================================================================
[   42.440962] ==================================================================
[   42.441495] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x10c0/0x4858
[   42.442943] Write of size 8 at addr fff00000c65bde30 by task kunit_try_catch/254
[   42.443889] 
[   42.444328] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241120 #1
[   42.445539] Tainted: [B]=BAD_PAGE, [N]=TEST
[   42.446104] Hardware name: linux,dummy-virt (DT)
[   42.446648] Call trace:
[   42.447148]  show_stack+0x20/0x38 (C)
[   42.447863]  dump_stack_lvl+0x8c/0xd0
[   42.448468]  print_report+0x118/0x5e0
[   42.449118]  kasan_report+0xc8/0x118
[   42.449768]  kasan_check_range+0x100/0x1a8
[   42.450399]  __kasan_check_write+0x20/0x30
[   42.451075]  kasan_atomics_helper+0x10c0/0x4858
[   42.451736]  kasan_atomics+0x198/0x2e8
[   42.452419]  kunit_try_run_case+0x14c/0x3d0
[   42.453087]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   42.453888]  kthread+0x24c/0x2d0
[   42.454400]  ret_from_fork+0x10/0x20
[   42.455015] 
[   42.455395] Allocated by task 254:
[   42.455953]  kasan_save_stack+0x3c/0x68
[   42.456601]  kasan_save_track+0x20/0x40
[   42.457135]  kasan_save_alloc_info+0x40/0x58
[   42.457784]  __kasan_kmalloc+0xd4/0xd8
[   42.458309]  __kmalloc_cache_noprof+0x15c/0x3c8
[   42.459010]  kasan_atomics+0xb8/0x2e8
[   42.459499]  kunit_try_run_case+0x14c/0x3d0
[   42.460159]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   42.460863]  kthread+0x24c/0x2d0
[   42.461410]  ret_from_fork+0x10/0x20
[   42.461947] 
[   42.462320] The buggy address belongs to the object at fff00000c65bde00
[   42.462320]  which belongs to the cache kmalloc-64 of size 64
[   42.463591] The buggy address is located 0 bytes to the right of
[   42.463591]  allocated 48-byte region [fff00000c65bde00, fff00000c65bde30)
[   42.464943] 
[   42.465306] The buggy address belongs to the physical page:
[   42.465897] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065bd
[   42.466864] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   42.467642] page_type: f5(slab)
[   42.468152] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   42.469057] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   42.469932] page dumped because: kasan: bad access detected
[   42.470588] 
[   42.470960] Memory state around the buggy address:
[   42.471654]  fff00000c65bdd00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   42.472387]  fff00000c65bdd80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   42.473238] >fff00000c65bde00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   42.473985]                                      ^
[   42.474603]  fff00000c65bde80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   42.475514]  fff00000c65bdf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   42.476301] ==================================================================
[   40.806077] ==================================================================
[   40.806900] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1ec/0x4858
[   40.807636] Read of size 4 at addr fff00000c65bde30 by task kunit_try_catch/254
[   40.808201] 
[   40.808654] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241120 #1
[   40.809810] Tainted: [B]=BAD_PAGE, [N]=TEST
[   40.810746] Hardware name: linux,dummy-virt (DT)
[   40.811225] Call trace:
[   40.812680]  show_stack+0x20/0x38 (C)
[   40.813360]  dump_stack_lvl+0x8c/0xd0
[   40.814305]  print_report+0x118/0x5e0
[   40.815191]  kasan_report+0xc8/0x118
[   40.815760]  kasan_check_range+0x100/0x1a8
[   40.816435]  __kasan_check_read+0x20/0x30
[   40.817034]  kasan_atomics_helper+0x1ec/0x4858
[   40.817949]  kasan_atomics+0x198/0x2e8
[   40.818468]  kunit_try_run_case+0x14c/0x3d0
[   40.819336]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   40.820347]  kthread+0x24c/0x2d0
[   40.821093]  ret_from_fork+0x10/0x20
[   40.821900] 
[   40.822247] Allocated by task 254:
[   40.823117]  kasan_save_stack+0x3c/0x68
[   40.823686]  kasan_save_track+0x20/0x40
[   40.824324]  kasan_save_alloc_info+0x40/0x58
[   40.824894]  __kasan_kmalloc+0xd4/0xd8
[   40.825809]  __kmalloc_cache_noprof+0x15c/0x3c8
[   40.826526]  kasan_atomics+0xb8/0x2e8
[   40.828006]  kunit_try_run_case+0x14c/0x3d0
[   40.828623]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   40.828947]  kthread+0x24c/0x2d0
[   40.829173]  ret_from_fork+0x10/0x20
[   40.829615] 
[   40.830028] The buggy address belongs to the object at fff00000c65bde00
[   40.830028]  which belongs to the cache kmalloc-64 of size 64
[   40.831599] The buggy address is located 0 bytes to the right of
[   40.831599]  allocated 48-byte region [fff00000c65bde00, fff00000c65bde30)
[   40.832955] 
[   40.833539] The buggy address belongs to the physical page:
[   40.834662] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065bd
[   40.835364] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   40.836273] page_type: f5(slab)
[   40.836769] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   40.837807] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   40.838971] page dumped because: kasan: bad access detected
[   40.839285] 
[   40.839436] Memory state around the buggy address:
[   40.840335]  fff00000c65bdd00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   40.841198]  fff00000c65bdd80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   40.842313] >fff00000c65bde00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   40.843528]                                      ^
[   40.844154]  fff00000c65bde80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   40.844898]  fff00000c65bdf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   40.846040] ==================================================================
[   42.367908] ==================================================================
[   42.368872] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xff0/0x4858
[   42.369640] Write of size 8 at addr fff00000c65bde30 by task kunit_try_catch/254
[   42.370435] 
[   42.370847] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241120 #1
[   42.371938] Tainted: [B]=BAD_PAGE, [N]=TEST
[   42.372540] Hardware name: linux,dummy-virt (DT)
[   42.373099] Call trace:
[   42.373507]  show_stack+0x20/0x38 (C)
[   42.374134]  dump_stack_lvl+0x8c/0xd0
[   42.374664]  print_report+0x118/0x5e0
[   42.375263]  kasan_report+0xc8/0x118
[   42.375828]  kasan_check_range+0x100/0x1a8
[   42.376469]  __kasan_check_write+0x20/0x30
[   42.377109]  kasan_atomics_helper+0xff0/0x4858
[   42.377793]  kasan_atomics+0x198/0x2e8
[   42.378325]  kunit_try_run_case+0x14c/0x3d0
[   42.379053]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   42.379837]  kthread+0x24c/0x2d0
[   42.380460]  ret_from_fork+0x10/0x20
[   42.381033] 
[   42.381340] Allocated by task 254:
[   42.381881]  kasan_save_stack+0x3c/0x68
[   42.382430]  kasan_save_track+0x20/0x40
[   42.383000]  kasan_save_alloc_info+0x40/0x58
[   42.383643]  __kasan_kmalloc+0xd4/0xd8
[   42.384256]  __kmalloc_cache_noprof+0x15c/0x3c8
[   42.384926]  kasan_atomics+0xb8/0x2e8
[   42.385539]  kunit_try_run_case+0x14c/0x3d0
[   42.386172]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   42.386844]  kthread+0x24c/0x2d0
[   42.387372]  ret_from_fork+0x10/0x20
[   42.387980] 
[   42.388350] The buggy address belongs to the object at fff00000c65bde00
[   42.388350]  which belongs to the cache kmalloc-64 of size 64
[   42.389355] The buggy address is located 0 bytes to the right of
[   42.389355]  allocated 48-byte region [fff00000c65bde00, fff00000c65bde30)
[   42.390787] 
[   42.391151] The buggy address belongs to the physical page:
[   42.391882] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065bd
[   42.392690] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   42.393464] page_type: f5(slab)
[   42.394007] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   42.394966] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   42.395760] page dumped because: kasan: bad access detected
[   42.396476] 
[   42.396820] Memory state around the buggy address:
[   42.397401]  fff00000c65bdd00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   42.398251]  fff00000c65bdd80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   42.398988] >fff00000c65bde00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   42.399860]                                      ^
[   42.400514]  fff00000c65bde80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   42.401358]  fff00000c65bdf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   42.402022] ==================================================================
[   42.635123] ==================================================================
[   42.635879] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x12d8/0x4858
[   42.636793] Write of size 8 at addr fff00000c65bde30 by task kunit_try_catch/254
[   42.637682] 
[   42.638148] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241120 #1
[   42.639275] Tainted: [B]=BAD_PAGE, [N]=TEST
[   42.639882] Hardware name: linux,dummy-virt (DT)
[   42.640507] Call trace:
[   42.640988]  show_stack+0x20/0x38 (C)
[   42.641665]  dump_stack_lvl+0x8c/0xd0
[   42.642318]  print_report+0x118/0x5e0
[   42.643001]  kasan_report+0xc8/0x118
[   42.643564]  kasan_check_range+0x100/0x1a8
[   42.644282]  __kasan_check_write+0x20/0x30
[   42.644914]  kasan_atomics_helper+0x12d8/0x4858
[   42.645586]  kasan_atomics+0x198/0x2e8
[   42.646247]  kunit_try_run_case+0x14c/0x3d0
[   42.646949]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   42.647672]  kthread+0x24c/0x2d0
[   42.648302]  ret_from_fork+0x10/0x20
[   42.648956] 
[   42.649351] Allocated by task 254:
[   42.649941]  kasan_save_stack+0x3c/0x68
[   42.650500]  kasan_save_track+0x20/0x40
[   42.651151]  kasan_save_alloc_info+0x40/0x58
[   42.651752]  __kasan_kmalloc+0xd4/0xd8
[   42.652254]  __kmalloc_cache_noprof+0x15c/0x3c8
[   42.652834]  kasan_atomics+0xb8/0x2e8
[   42.653397]  kunit_try_run_case+0x14c/0x3d0
[   42.654071]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   42.654808]  kthread+0x24c/0x2d0
[   42.655364]  ret_from_fork+0x10/0x20
[   42.656041] 
[   42.656357] The buggy address belongs to the object at fff00000c65bde00
[   42.656357]  which belongs to the cache kmalloc-64 of size 64
[   42.657810] The buggy address is located 0 bytes to the right of
[   42.657810]  allocated 48-byte region [fff00000c65bde00, fff00000c65bde30)
[   42.659023] 
[   42.659481] The buggy address belongs to the physical page:
[   42.660241] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065bd
[   42.661160] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   42.661992] page_type: f5(slab)
[   42.662598] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   42.663416] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   42.664405] page dumped because: kasan: bad access detected
[   42.665061] 
[   42.665467] Memory state around the buggy address:
[   42.666112]  fff00000c65bdd00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   42.666893]  fff00000c65bdd80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   42.667720] >fff00000c65bde00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   42.668555]                                      ^
[   42.669220]  fff00000c65bde80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   42.670059]  fff00000c65bdf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   42.670869] ==================================================================
[   42.106758] ==================================================================
[   42.107542] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xdd4/0x4858
[   42.108937] Read of size 8 at addr fff00000c65bde30 by task kunit_try_catch/254
[   42.109848] 
[   42.110150] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241120 #1
[   42.111101] Tainted: [B]=BAD_PAGE, [N]=TEST
[   42.112600] Hardware name: linux,dummy-virt (DT)
[   42.113329] Call trace:
[   42.113748]  show_stack+0x20/0x38 (C)
[   42.114316]  dump_stack_lvl+0x8c/0xd0
[   42.114918]  print_report+0x118/0x5e0
[   42.115425]  kasan_report+0xc8/0x118
[   42.116048]  kasan_check_range+0x100/0x1a8
[   42.116740]  __kasan_check_read+0x20/0x30
[   42.117262]  kasan_atomics_helper+0xdd4/0x4858
[   42.117795]  kasan_atomics+0x198/0x2e8
[   42.118255]  kunit_try_run_case+0x14c/0x3d0
[   42.119306]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   42.120327]  kthread+0x24c/0x2d0
[   42.120805]  ret_from_fork+0x10/0x20
[   42.121402] 
[   42.121741] Allocated by task 254:
[   42.122263]  kasan_save_stack+0x3c/0x68
[   42.122804]  kasan_save_track+0x20/0x40
[   42.123420]  kasan_save_alloc_info+0x40/0x58
[   42.124023]  __kasan_kmalloc+0xd4/0xd8
[   42.124609]  __kmalloc_cache_noprof+0x15c/0x3c8
[   42.125170]  kasan_atomics+0xb8/0x2e8
[   42.125660]  kunit_try_run_case+0x14c/0x3d0
[   42.126308]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   42.126987]  kthread+0x24c/0x2d0
[   42.127553]  ret_from_fork+0x10/0x20
[   42.128090] 
[   42.128460] The buggy address belongs to the object at fff00000c65bde00
[   42.128460]  which belongs to the cache kmalloc-64 of size 64
[   42.129503] The buggy address is located 0 bytes to the right of
[   42.129503]  allocated 48-byte region [fff00000c65bde00, fff00000c65bde30)
[   42.130855] 
[   42.131205] The buggy address belongs to the physical page:
[   42.131808] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065bd
[   42.132813] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   42.133429] page_type: f5(slab)
[   42.133967] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   42.134892] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   42.135787] page dumped because: kasan: bad access detected
[   42.136355] 
[   42.136729] Memory state around the buggy address:
[   42.137373]  fff00000c65bdd00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   42.138133]  fff00000c65bdd80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   42.139006] >fff00000c65bde00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   42.139798]                                      ^
[   42.140360]  fff00000c65bde80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   42.141175]  fff00000c65bdf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   42.141867] ==================================================================
[   41.626952] ==================================================================
[   41.627714] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x99c/0x4858
[   41.628578] Write of size 4 at addr fff00000c65bde30 by task kunit_try_catch/254
[   41.629358] 
[   41.629723] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241120 #1
[   41.630839] Tainted: [B]=BAD_PAGE, [N]=TEST
[   41.631411] Hardware name: linux,dummy-virt (DT)
[   41.632088] Call trace:
[   41.632467]  show_stack+0x20/0x38 (C)
[   41.633097]  dump_stack_lvl+0x8c/0xd0
[   41.633737]  print_report+0x118/0x5e0
[   41.634223]  kasan_report+0xc8/0x118
[   41.634846]  kasan_check_range+0x100/0x1a8
[   41.635406]  __kasan_check_write+0x20/0x30
[   41.636107]  kasan_atomics_helper+0x99c/0x4858
[   41.636741]  kasan_atomics+0x198/0x2e8
[   41.637348]  kunit_try_run_case+0x14c/0x3d0
[   41.637959]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   41.638725]  kthread+0x24c/0x2d0
[   41.639196]  ret_from_fork+0x10/0x20
[   41.639819] 
[   41.640173] Allocated by task 254:
[   41.640698]  kasan_save_stack+0x3c/0x68
[   41.641227]  kasan_save_track+0x20/0x40
[   41.641862]  kasan_save_alloc_info+0x40/0x58
[   41.642463]  __kasan_kmalloc+0xd4/0xd8
[   41.643043]  __kmalloc_cache_noprof+0x15c/0x3c8
[   41.643674]  kasan_atomics+0xb8/0x2e8
[   41.644254]  kunit_try_run_case+0x14c/0x3d0
[   41.644839]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   41.645496]  kthread+0x24c/0x2d0
[   41.646034]  ret_from_fork+0x10/0x20
[   41.646607] 
[   41.646947] The buggy address belongs to the object at fff00000c65bde00
[   41.646947]  which belongs to the cache kmalloc-64 of size 64
[   41.648051] The buggy address is located 0 bytes to the right of
[   41.648051]  allocated 48-byte region [fff00000c65bde00, fff00000c65bde30)
[   41.649357] 
[   41.649721] The buggy address belongs to the physical page:
[   41.650336] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065bd
[   41.651292] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   41.652043] page_type: f5(slab)
[   41.652521] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   41.653484] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   41.654331] page dumped because: kasan: bad access detected
[   41.655109] 
[   41.655726] Memory state around the buggy address:
[   41.656419]  fff00000c65bdd00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   41.657192]  fff00000c65bdd80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   41.657987] >fff00000c65bde00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   41.658848]                                      ^
[   41.659469]  fff00000c65bde80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   41.660213]  fff00000c65bdf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   41.660921] ==================================================================
[   42.933120] ==================================================================
[   42.934961] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3db0/0x4858
[   42.935802] Read of size 8 at addr fff00000c65bde30 by task kunit_try_catch/254
[   42.936750] 
[   42.937144] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241120 #1
[   42.938277] Tainted: [B]=BAD_PAGE, [N]=TEST
[   42.938904] Hardware name: linux,dummy-virt (DT)
[   42.939524] Call trace:
[   42.939894]  show_stack+0x20/0x38 (C)
[   42.940396]  dump_stack_lvl+0x8c/0xd0
[   42.941037]  print_report+0x118/0x5e0
[   42.941603]  kasan_report+0xc8/0x118
[   42.942301]  __asan_report_load8_noabort+0x20/0x30
[   42.943049]  kasan_atomics_helper+0x3db0/0x4858
[   42.943803]  kasan_atomics+0x198/0x2e8
[   42.944472]  kunit_try_run_case+0x14c/0x3d0
[   42.945108]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   42.945915]  kthread+0x24c/0x2d0
[   42.946512]  ret_from_fork+0x10/0x20
[   42.947132] 
[   42.947513] Allocated by task 254:
[   42.948075]  kasan_save_stack+0x3c/0x68
[   42.948670]  kasan_save_track+0x20/0x40
[   42.949322]  kasan_save_alloc_info+0x40/0x58
[   42.949989]  __kasan_kmalloc+0xd4/0xd8
[   42.950595]  __kmalloc_cache_noprof+0x15c/0x3c8
[   42.951262]  kasan_atomics+0xb8/0x2e8
[   42.951855]  kunit_try_run_case+0x14c/0x3d0
[   42.952513]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   42.953270]  kthread+0x24c/0x2d0
[   42.953829]  ret_from_fork+0x10/0x20
[   42.954425] 
[   42.954826] The buggy address belongs to the object at fff00000c65bde00
[   42.954826]  which belongs to the cache kmalloc-64 of size 64
[   42.956215] The buggy address is located 0 bytes to the right of
[   42.956215]  allocated 48-byte region [fff00000c65bde00, fff00000c65bde30)
[   42.957611] 
[   42.958033] The buggy address belongs to the physical page:
[   42.958722] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065bd
[   42.959747] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   42.960459] page_type: f5(slab)
[   42.960879] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   42.961676] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   42.962511] page dumped because: kasan: bad access detected
[   42.963276] 
[   42.963708] Memory state around the buggy address:
[   42.964377]  fff00000c65bdd00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   42.965211]  fff00000c65bdd80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   42.966062] >fff00000c65bde00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   42.966906]                                      ^
[   42.967542]  fff00000c65bde80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   42.968278]  fff00000c65bdf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   42.968998] ==================================================================
[   42.183525] ==================================================================
[   42.184264] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xe44/0x4858
[   42.185054] Write of size 8 at addr fff00000c65bde30 by task kunit_try_catch/254
[   42.185742] 
[   42.186227] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241120 #1
[   42.187510] Tainted: [B]=BAD_PAGE, [N]=TEST
[   42.188053] Hardware name: linux,dummy-virt (DT)
[   42.188708] Call trace:
[   42.189217]  show_stack+0x20/0x38 (C)
[   42.189927]  dump_stack_lvl+0x8c/0xd0
[   42.190631]  print_report+0x118/0x5e0
[   42.191380]  kasan_report+0xc8/0x118
[   42.192190]  kasan_check_range+0x100/0x1a8
[   42.192885]  __kasan_check_write+0x20/0x30
[   42.193188]  kasan_atomics_helper+0xe44/0x4858
[   42.193552]  kasan_atomics+0x198/0x2e8
[   42.194371]  kunit_try_run_case+0x14c/0x3d0
[   42.195076]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   42.195840]  kthread+0x24c/0x2d0
[   42.196382]  ret_from_fork+0x10/0x20
[   42.197084] 
[   42.197405] Allocated by task 254:
[   42.197903]  kasan_save_stack+0x3c/0x68
[   42.198422]  kasan_save_track+0x20/0x40
[   42.199048]  kasan_save_alloc_info+0x40/0x58
[   42.199650]  __kasan_kmalloc+0xd4/0xd8
[   42.200174]  __kmalloc_cache_noprof+0x15c/0x3c8
[   42.200864]  kasan_atomics+0xb8/0x2e8
[   42.201359]  kunit_try_run_case+0x14c/0x3d0
[   42.202025]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   42.202646]  kthread+0x24c/0x2d0
[   42.203192]  ret_from_fork+0x10/0x20
[   42.203807] 
[   42.204162] The buggy address belongs to the object at fff00000c65bde00
[   42.204162]  which belongs to the cache kmalloc-64 of size 64
[   42.205217] The buggy address is located 0 bytes to the right of
[   42.205217]  allocated 48-byte region [fff00000c65bde00, fff00000c65bde30)
[   42.206643] 
[   42.207004] The buggy address belongs to the physical page:
[   42.207613] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065bd
[   42.208568] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   42.209410] page_type: f5(slab)
[   42.209996] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   42.210938] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   42.211797] page dumped because: kasan: bad access detected
[   42.212460] 
[   42.212800] Memory state around the buggy address:
[   42.213290]  fff00000c65bdd00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   42.214138]  fff00000c65bdd80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   42.215007] >fff00000c65bde00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   42.215772]                                      ^
[   42.216455]  fff00000c65bde80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   42.217193]  fff00000c65bdf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   42.218113] ==================================================================
[   41.208629] ==================================================================
[   41.209234] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4e4/0x4858
[   41.210312] Write of size 4 at addr fff00000c65bde30 by task kunit_try_catch/254
[   41.212204] 
[   41.212716] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241120 #1
[   41.214163] Tainted: [B]=BAD_PAGE, [N]=TEST
[   41.214777] Hardware name: linux,dummy-virt (DT)
[   41.215544] Call trace:
[   41.216003]  show_stack+0x20/0x38 (C)
[   41.216686]  dump_stack_lvl+0x8c/0xd0
[   41.217419]  print_report+0x118/0x5e0
[   41.217916]  kasan_report+0xc8/0x118
[   41.218566]  kasan_check_range+0x100/0x1a8
[   41.219209]  __kasan_check_write+0x20/0x30
[   41.219872]  kasan_atomics_helper+0x4e4/0x4858
[   41.220598]  kasan_atomics+0x198/0x2e8
[   41.221320]  kunit_try_run_case+0x14c/0x3d0
[   41.222032]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   41.222906]  kthread+0x24c/0x2d0
[   41.223494]  ret_from_fork+0x10/0x20
[   41.224056] 
[   41.224343] Allocated by task 254:
[   41.224919]  kasan_save_stack+0x3c/0x68
[   41.225414]  kasan_save_track+0x20/0x40
[   41.226026]  kasan_save_alloc_info+0x40/0x58
[   41.226640]  __kasan_kmalloc+0xd4/0xd8
[   41.227101]  __kmalloc_cache_noprof+0x15c/0x3c8
[   41.227627]  kasan_atomics+0xb8/0x2e8
[   41.228204]  kunit_try_run_case+0x14c/0x3d0
[   41.228848]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   41.229630]  kthread+0x24c/0x2d0
[   41.230079]  ret_from_fork+0x10/0x20
[   41.230647] 
[   41.230975] The buggy address belongs to the object at fff00000c65bde00
[   41.230975]  which belongs to the cache kmalloc-64 of size 64
[   41.231964] The buggy address is located 0 bytes to the right of
[   41.231964]  allocated 48-byte region [fff00000c65bde00, fff00000c65bde30)
[   41.233124] 
[   41.233557] The buggy address belongs to the physical page:
[   41.234265] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065bd
[   41.235306] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   41.235986] page_type: f5(slab)
[   41.236537] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   41.237371] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   41.238277] page dumped because: kasan: bad access detected
[   41.238971] 
[   41.239261] Memory state around the buggy address:
[   41.239887]  fff00000c65bdd00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   41.240814]  fff00000c65bdd80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   41.241490] >fff00000c65bde00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   41.242331]                                      ^
[   41.243027]  fff00000c65bde80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   41.243781]  fff00000c65bdf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   41.244601] ==================================================================
[   41.071888] ==================================================================
[   41.072716] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3ac/0x4858
[   41.074328] Write of size 4 at addr fff00000c65bde30 by task kunit_try_catch/254
[   41.075331] 
[   41.075718] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241120 #1
[   41.077566] Tainted: [B]=BAD_PAGE, [N]=TEST
[   41.078109] Hardware name: linux,dummy-virt (DT)
[   41.078978] Call trace:
[   41.079692]  show_stack+0x20/0x38 (C)
[   41.080276]  dump_stack_lvl+0x8c/0xd0
[   41.080954]  print_report+0x118/0x5e0
[   41.082594]  kasan_report+0xc8/0x118
[   41.083133]  kasan_check_range+0x100/0x1a8
[   41.083749]  __kasan_check_write+0x20/0x30
[   41.084326]  kasan_atomics_helper+0x3ac/0x4858
[   41.084995]  kasan_atomics+0x198/0x2e8
[   41.086133]  kunit_try_run_case+0x14c/0x3d0
[   41.086761]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   41.087513]  kthread+0x24c/0x2d0
[   41.088225]  ret_from_fork+0x10/0x20
[   41.088940] 
[   41.089376] Allocated by task 254:
[   41.090034]  kasan_save_stack+0x3c/0x68
[   41.090635]  kasan_save_track+0x20/0x40
[   41.091139]  kasan_save_alloc_info+0x40/0x58
[   41.092611]  __kasan_kmalloc+0xd4/0xd8
[   41.093118]  __kmalloc_cache_noprof+0x15c/0x3c8
[   41.093786]  kasan_atomics+0xb8/0x2e8
[   41.094615]  kunit_try_run_case+0x14c/0x3d0
[   41.095633]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   41.096479]  kthread+0x24c/0x2d0
[   41.097034]  ret_from_fork+0x10/0x20
[   41.097916] 
[   41.098461] The buggy address belongs to the object at fff00000c65bde00
[   41.098461]  which belongs to the cache kmalloc-64 of size 64
[   41.099899] The buggy address is located 0 bytes to the right of
[   41.099899]  allocated 48-byte region [fff00000c65bde00, fff00000c65bde30)
[   41.102408] 
[   41.102715] The buggy address belongs to the physical page:
[   41.103573] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065bd
[   41.104599] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   41.105559] page_type: f5(slab)
[   41.107171] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   41.108101] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   41.108952] page dumped because: kasan: bad access detected
[   41.109989] 
[   41.110197] Memory state around the buggy address:
[   41.110494]  fff00000c65bdd00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   41.111216]  fff00000c65bdd80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   41.112831] >fff00000c65bde00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   41.113794]                                      ^
[   41.114639]  fff00000c65bde80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   41.115569]  fff00000c65bdf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   41.116109] ==================================================================
[   41.284590] ==================================================================
[   41.285400] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x5b4/0x4858
[   41.286356] Write of size 4 at addr fff00000c65bde30 by task kunit_try_catch/254
[   41.287301] 
[   41.287746] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241120 #1
[   41.288803] Tainted: [B]=BAD_PAGE, [N]=TEST
[   41.289404] Hardware name: linux,dummy-virt (DT)
[   41.290064] Call trace:
[   41.290550]  show_stack+0x20/0x38 (C)
[   41.291157]  dump_stack_lvl+0x8c/0xd0
[   41.291822]  print_report+0x118/0x5e0
[   41.292515]  kasan_report+0xc8/0x118
[   41.293104]  kasan_check_range+0x100/0x1a8
[   41.293795]  __kasan_check_write+0x20/0x30
[   41.294426]  kasan_atomics_helper+0x5b4/0x4858
[   41.295119]  kasan_atomics+0x198/0x2e8
[   41.295737]  kunit_try_run_case+0x14c/0x3d0
[   41.296392]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   41.297163]  kthread+0x24c/0x2d0
[   41.297782]  ret_from_fork+0x10/0x20
[   41.298350] 
[   41.298750] Allocated by task 254:
[   41.299261]  kasan_save_stack+0x3c/0x68
[   41.299865]  kasan_save_track+0x20/0x40
[   41.300508]  kasan_save_alloc_info+0x40/0x58
[   41.301092]  __kasan_kmalloc+0xd4/0xd8
[   41.301718]  __kmalloc_cache_noprof+0x15c/0x3c8
[   41.302309]  kasan_atomics+0xb8/0x2e8
[   41.302910]  kunit_try_run_case+0x14c/0x3d0
[   41.303503]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   41.304224]  kthread+0x24c/0x2d0
[   41.304868]  ret_from_fork+0x10/0x20
[   41.305465] 
[   41.305838] The buggy address belongs to the object at fff00000c65bde00
[   41.305838]  which belongs to the cache kmalloc-64 of size 64
[   41.307071] The buggy address is located 0 bytes to the right of
[   41.307071]  allocated 48-byte region [fff00000c65bde00, fff00000c65bde30)
[   41.308308] 
[   41.308662] The buggy address belongs to the physical page:
[   41.309382] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065bd
[   41.310277] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   41.311086] page_type: f5(slab)
[   41.311680] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   41.312566] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   41.313404] page dumped because: kasan: bad access detected
[   41.314067] 
[   41.314413] Memory state around the buggy address:
[   41.315216]  fff00000c65bdd00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   41.316010]  fff00000c65bdd80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   41.316904] >fff00000c65bde00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   41.317713]                                      ^
[   41.318303]  fff00000c65bde80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   41.319141]  fff00000c65bdf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   41.319953] ==================================================================
[   40.936132] ==================================================================
[   40.936883] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x40fc/0x4858
[   40.937995] Read of size 4 at addr fff00000c65bde30 by task kunit_try_catch/254
[   40.940143] 
[   40.940695] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241120 #1
[   40.942154] Tainted: [B]=BAD_PAGE, [N]=TEST
[   40.942802] Hardware name: linux,dummy-virt (DT)
[   40.943385] Call trace:
[   40.943739]  show_stack+0x20/0x38 (C)
[   40.944409]  dump_stack_lvl+0x8c/0xd0
[   40.945061]  print_report+0x118/0x5e0
[   40.946102]  kasan_report+0xc8/0x118
[   40.947483]  __asan_report_load4_noabort+0x20/0x30
[   40.948143]  kasan_atomics_helper+0x40fc/0x4858
[   40.948779]  kasan_atomics+0x198/0x2e8
[   40.949195]  kunit_try_run_case+0x14c/0x3d0
[   40.949725]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   40.950223]  kthread+0x24c/0x2d0
[   40.951309]  ret_from_fork+0x10/0x20
[   40.951816] 
[   40.952194] Allocated by task 254:
[   40.952757]  kasan_save_stack+0x3c/0x68
[   40.953679]  kasan_save_track+0x20/0x40
[   40.954304]  kasan_save_alloc_info+0x40/0x58
[   40.954986]  __kasan_kmalloc+0xd4/0xd8
[   40.955438]  __kmalloc_cache_noprof+0x15c/0x3c8
[   40.957903]  kasan_atomics+0xb8/0x2e8
[   40.958313]  kunit_try_run_case+0x14c/0x3d0
[   40.959027]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   40.959830]  kthread+0x24c/0x2d0
[   40.960672]  ret_from_fork+0x10/0x20
[   40.961453] 
[   40.962195] The buggy address belongs to the object at fff00000c65bde00
[   40.962195]  which belongs to the cache kmalloc-64 of size 64
[   40.964226] The buggy address is located 0 bytes to the right of
[   40.964226]  allocated 48-byte region [fff00000c65bde00, fff00000c65bde30)
[   40.965620] 
[   40.965955] The buggy address belongs to the physical page:
[   40.967245] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065bd
[   40.968096] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   40.968971] page_type: f5(slab)
[   40.969834] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   40.971621] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   40.972633] page dumped because: kasan: bad access detected
[   40.973744] 
[   40.974020] Memory state around the buggy address:
[   40.974803]  fff00000c65bdd00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   40.975734]  fff00000c65bdd80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   40.976795] >fff00000c65bde00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   40.978700]                                      ^
[   40.979306]  fff00000c65bde80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   40.980091]  fff00000c65bdf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   40.980936] ==================================================================
[   42.971047] ==================================================================
[   42.971701] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1644/0x4858
[   42.972636] Write of size 8 at addr fff00000c65bde30 by task kunit_try_catch/254
[   42.973702] 
[   42.974272] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241120 #1
[   42.975361] Tainted: [B]=BAD_PAGE, [N]=TEST
[   42.976002] Hardware name: linux,dummy-virt (DT)
[   42.976585] Call trace:
[   42.976936]  show_stack+0x20/0x38 (C)
[   42.977561]  dump_stack_lvl+0x8c/0xd0
[   42.978178]  print_report+0x118/0x5e0
[   42.978793]  kasan_report+0xc8/0x118
[   42.979487]  kasan_check_range+0x100/0x1a8
[   42.980098]  __kasan_check_write+0x20/0x30
[   42.980653]  kasan_atomics_helper+0x1644/0x4858
[   42.981210]  kasan_atomics+0x198/0x2e8
[   42.981747]  kunit_try_run_case+0x14c/0x3d0
[   42.982471]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   42.983275]  kthread+0x24c/0x2d0
[   42.983833]  ret_from_fork+0x10/0x20
[   42.984511] 
[   42.984924] Allocated by task 254:
[   42.985526]  kasan_save_stack+0x3c/0x68
[   42.986149]  kasan_save_track+0x20/0x40
[   42.986805]  kasan_save_alloc_info+0x40/0x58
[   42.987356]  __kasan_kmalloc+0xd4/0xd8
[   42.988002]  __kmalloc_cache_noprof+0x15c/0x3c8
[   42.988544]  kasan_atomics+0xb8/0x2e8
[   42.988997]  kunit_try_run_case+0x14c/0x3d0
[   42.989624]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   42.990241]  kthread+0x24c/0x2d0
[   42.990790]  ret_from_fork+0x10/0x20
[   42.991316] 
[   42.991648] The buggy address belongs to the object at fff00000c65bde00
[   42.991648]  which belongs to the cache kmalloc-64 of size 64
[   42.992858] The buggy address is located 0 bytes to the right of
[   42.992858]  allocated 48-byte region [fff00000c65bde00, fff00000c65bde30)
[   42.993996] 
[   42.994336] The buggy address belongs to the physical page:
[   42.995083] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065bd
[   42.995814] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   42.996647] page_type: f5(slab)
[   42.997170] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   42.998074] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   42.998812] page dumped because: kasan: bad access detected
[   42.999492] 
[   42.999834] Memory state around the buggy address:
[   43.000465]  fff00000c65bdd00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   43.001253]  fff00000c65bdd80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   43.002016] >fff00000c65bde00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   43.002733]                                      ^
[   43.003370]  fff00000c65bde80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   43.004092]  fff00000c65bdf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   43.004986] ==================================================================
[   41.246722] ==================================================================
[   41.247598] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x54c/0x4858
[   41.248463] Write of size 4 at addr fff00000c65bde30 by task kunit_try_catch/254
[   41.249393] 
[   41.249786] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241120 #1
[   41.250953] Tainted: [B]=BAD_PAGE, [N]=TEST
[   41.251527] Hardware name: linux,dummy-virt (DT)
[   41.252167] Call trace:
[   41.252633]  show_stack+0x20/0x38 (C)
[   41.253370]  dump_stack_lvl+0x8c/0xd0
[   41.254075]  print_report+0x118/0x5e0
[   41.254590]  kasan_report+0xc8/0x118
[   41.255310]  kasan_check_range+0x100/0x1a8
[   41.256073]  __kasan_check_write+0x20/0x30
[   41.256808]  kasan_atomics_helper+0x54c/0x4858
[   41.257437]  kasan_atomics+0x198/0x2e8
[   41.258061]  kunit_try_run_case+0x14c/0x3d0
[   41.258775]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   41.259660]  kthread+0x24c/0x2d0
[   41.260114]  ret_from_fork+0x10/0x20
[   41.260829] 
[   41.261294] Allocated by task 254:
[   41.261874]  kasan_save_stack+0x3c/0x68
[   41.262635]  kasan_save_track+0x20/0x40
[   41.263240]  kasan_save_alloc_info+0x40/0x58
[   41.263978]  __kasan_kmalloc+0xd4/0xd8
[   41.264518]  __kmalloc_cache_noprof+0x15c/0x3c8
[   41.265338]  kasan_atomics+0xb8/0x2e8
[   41.265971]  kunit_try_run_case+0x14c/0x3d0
[   41.266572]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   41.267286]  kthread+0x24c/0x2d0
[   41.267877]  ret_from_fork+0x10/0x20
[   41.268398] 
[   41.268767] The buggy address belongs to the object at fff00000c65bde00
[   41.268767]  which belongs to the cache kmalloc-64 of size 64
[   41.270006] The buggy address is located 0 bytes to the right of
[   41.270006]  allocated 48-byte region [fff00000c65bde00, fff00000c65bde30)
[   41.271364] 
[   41.271728] The buggy address belongs to the physical page:
[   41.272495] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065bd
[   41.273310] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   41.274070] page_type: f5(slab)
[   41.274624] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   41.275539] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   41.276382] page dumped because: kasan: bad access detected
[   41.277026] 
[   41.277404] Memory state around the buggy address:
[   41.278023]  fff00000c65bdd00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   41.278850]  fff00000c65bdd80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   41.279634] >fff00000c65bde00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   41.280401]                                      ^
[   41.281046]  fff00000c65bde80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   41.281876]  fff00000c65bdf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   41.282693] ==================================================================
[   41.736888] ==================================================================
[   41.737808] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xad4/0x4858
[   41.738657] Write of size 4 at addr fff00000c65bde30 by task kunit_try_catch/254
[   41.739373] 
[   41.739955] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241120 #1
[   41.741029] Tainted: [B]=BAD_PAGE, [N]=TEST
[   41.742202] Hardware name: linux,dummy-virt (DT)
[   41.742739] Call trace:
[   41.743323]  show_stack+0x20/0x38 (C)
[   41.744087]  dump_stack_lvl+0x8c/0xd0
[   41.744834]  print_report+0x118/0x5e0
[   41.745592]  kasan_report+0xc8/0x118
[   41.746295]  kasan_check_range+0x100/0x1a8
[   41.747082]  __kasan_check_write+0x20/0x30
[   41.747817]  kasan_atomics_helper+0xad4/0x4858
[   41.748428]  kasan_atomics+0x198/0x2e8
[   41.749263]  kunit_try_run_case+0x14c/0x3d0
[   41.750045]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   41.750918]  kthread+0x24c/0x2d0
[   41.751622]  ret_from_fork+0x10/0x20
[   41.752362] 
[   41.752852] Allocated by task 254:
[   41.753415]  kasan_save_stack+0x3c/0x68
[   41.754167]  kasan_save_track+0x20/0x40
[   41.754723]  kasan_save_alloc_info+0x40/0x58
[   41.755272]  __kasan_kmalloc+0xd4/0xd8
[   41.756026]  __kmalloc_cache_noprof+0x15c/0x3c8
[   41.756636]  kasan_atomics+0xb8/0x2e8
[   41.757142]  kunit_try_run_case+0x14c/0x3d0
[   41.757782]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   41.758462]  kthread+0x24c/0x2d0
[   41.758988]  ret_from_fork+0x10/0x20
[   41.759581] 
[   41.759955] The buggy address belongs to the object at fff00000c65bde00
[   41.759955]  which belongs to the cache kmalloc-64 of size 64
[   41.761221] The buggy address is located 0 bytes to the right of
[   41.761221]  allocated 48-byte region [fff00000c65bde00, fff00000c65bde30)
[   41.762566] 
[   41.762889] The buggy address belongs to the physical page:
[   41.763629] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065bd
[   41.764540] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   41.765310] page_type: f5(slab)
[   41.765899] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   41.766782] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   41.767630] page dumped because: kasan: bad access detected
[   41.768303] 
[   41.768631] Memory state around the buggy address:
[   41.769303]  fff00000c65bdd00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   41.770105]  fff00000c65bdd80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   41.770969] >fff00000c65bde00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   41.771761]                                      ^
[   41.772407]  fff00000c65bde80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   41.773178]  fff00000c65bdf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   41.773999] ==================================================================
[   41.776198] ==================================================================
[   41.776961] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3dcc/0x4858
[   41.777817] Read of size 4 at addr fff00000c65bde30 by task kunit_try_catch/254
[   41.778726] 
[   41.779149] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241120 #1
[   41.780172] Tainted: [B]=BAD_PAGE, [N]=TEST
[   41.780780] Hardware name: linux,dummy-virt (DT)
[   41.781308] Call trace:
[   41.781778]  show_stack+0x20/0x38 (C)
[   41.782417]  dump_stack_lvl+0x8c/0xd0
[   41.783013]  print_report+0x118/0x5e0
[   41.783641]  kasan_report+0xc8/0x118
[   41.784267]  __asan_report_load4_noabort+0x20/0x30
[   41.784963]  kasan_atomics_helper+0x3dcc/0x4858
[   41.785642]  kasan_atomics+0x198/0x2e8
[   41.786211]  kunit_try_run_case+0x14c/0x3d0
[   41.786898]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   41.787688]  kthread+0x24c/0x2d0
[   41.788305]  ret_from_fork+0x10/0x20
[   41.788844] 
[   41.789217] Allocated by task 254:
[   41.789786]  kasan_save_stack+0x3c/0x68
[   41.790360]  kasan_save_track+0x20/0x40
[   41.790974]  kasan_save_alloc_info+0x40/0x58
[   41.791657]  __kasan_kmalloc+0xd4/0xd8
[   41.792192]  __kmalloc_cache_noprof+0x15c/0x3c8
[   41.792890]  kasan_atomics+0xb8/0x2e8
[   41.793420]  kunit_try_run_case+0x14c/0x3d0
[   41.794095]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   41.794761]  kthread+0x24c/0x2d0
[   41.795390]  ret_from_fork+0x10/0x20
[   41.795948] 
[   41.796332] The buggy address belongs to the object at fff00000c65bde00
[   41.796332]  which belongs to the cache kmalloc-64 of size 64
[   41.797549] The buggy address is located 0 bytes to the right of
[   41.797549]  allocated 48-byte region [fff00000c65bde00, fff00000c65bde30)
[   41.798786] 
[   41.799133] The buggy address belongs to the physical page:
[   41.799867] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065bd
[   41.800788] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   41.801620] page_type: f5(slab)
[   41.802120] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   41.802965] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   41.803799] page dumped because: kasan: bad access detected
[   41.804435] 
[   41.804880] Memory state around the buggy address:
[   41.805482]  fff00000c65bdd00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   41.806367]  fff00000c65bdd80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   41.807139] >fff00000c65bde00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   41.807983]                                      ^
[   41.808604]  fff00000c65bde80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   41.809434]  fff00000c65bdf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   41.810233] ==================================================================
[   42.746700] ==================================================================
[   42.747540] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1414/0x4858
[   42.748353] Write of size 8 at addr fff00000c65bde30 by task kunit_try_catch/254
[   42.749043] 
[   42.749482] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241120 #1
[   42.750430] Tainted: [B]=BAD_PAGE, [N]=TEST
[   42.751010] Hardware name: linux,dummy-virt (DT)
[   42.751607] Call trace:
[   42.752033]  show_stack+0x20/0x38 (C)
[   42.752681]  dump_stack_lvl+0x8c/0xd0
[   42.753224]  print_report+0x118/0x5e0
[   42.753843]  kasan_report+0xc8/0x118
[   42.754510]  kasan_check_range+0x100/0x1a8
[   42.755128]  __kasan_check_write+0x20/0x30
[   42.755707]  kasan_atomics_helper+0x1414/0x4858
[   42.756682]  kasan_atomics+0x198/0x2e8
[   42.757379]  kunit_try_run_case+0x14c/0x3d0
[   42.758133]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   42.759002]  kthread+0x24c/0x2d0
[   42.759710]  ret_from_fork+0x10/0x20
[   42.760462] 
[   42.760962] Allocated by task 254:
[   42.761560]  kasan_save_stack+0x3c/0x68
[   42.762155]  kasan_save_track+0x20/0x40
[   42.762948]  kasan_save_alloc_info+0x40/0x58
[   42.763723]  __kasan_kmalloc+0xd4/0xd8
[   42.764209]  __kmalloc_cache_noprof+0x15c/0x3c8
[   42.765054]  kasan_atomics+0xb8/0x2e8
[   42.765770]  kunit_try_run_case+0x14c/0x3d0
[   42.766580]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   42.767405]  kthread+0x24c/0x2d0
[   42.767944]  ret_from_fork+0x10/0x20
[   42.768426] 
[   42.769108] The buggy address belongs to the object at fff00000c65bde00
[   42.769108]  which belongs to the cache kmalloc-64 of size 64
[   42.769949] The buggy address is located 0 bytes to the right of
[   42.769949]  allocated 48-byte region [fff00000c65bde00, fff00000c65bde30)
[   42.770559] 
[   42.770724] The buggy address belongs to the physical page:
[   42.771004] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065bd
[   42.771381] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   42.772322] page_type: f5(slab)
[   42.773026] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   42.774190] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   42.775209] page dumped because: kasan: bad access detected
[   42.775985] 
[   42.776471] Memory state around the buggy address:
[   42.777239]  fff00000c65bdd00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   42.778041]  fff00000c65bdd80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   42.778784] >fff00000c65bde00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   42.779416]                                      ^
[   42.780100]  fff00000c65bde80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   42.780989]  fff00000c65bdf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   42.781762] ==================================================================
[   41.812711] ==================================================================
[   41.813410] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xb70/0x4858
[   41.815172] Write of size 4 at addr fff00000c65bde30 by task kunit_try_catch/254
[   41.816760] 
[   41.817552] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241120 #1
[   41.818509] Tainted: [B]=BAD_PAGE, [N]=TEST
[   41.819005] Hardware name: linux,dummy-virt (DT)
[   41.819746] Call trace:
[   41.820150]  show_stack+0x20/0x38 (C)
[   41.820886]  dump_stack_lvl+0x8c/0xd0
[   41.821569]  print_report+0x118/0x5e0
[   41.822205]  kasan_report+0xc8/0x118
[   41.822854]  kasan_check_range+0x100/0x1a8
[   41.823536]  __kasan_check_write+0x20/0x30
[   41.824209]  kasan_atomics_helper+0xb70/0x4858
[   41.824955]  kasan_atomics+0x198/0x2e8
[   41.825513]  kunit_try_run_case+0x14c/0x3d0
[   41.826232]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   41.827097]  kthread+0x24c/0x2d0
[   41.827586]  ret_from_fork+0x10/0x20
[   41.828177] 
[   41.828542] Allocated by task 254:
[   41.829096]  kasan_save_stack+0x3c/0x68
[   41.829609]  kasan_save_track+0x20/0x40
[   41.830231]  kasan_save_alloc_info+0x40/0x58
[   41.830920]  __kasan_kmalloc+0xd4/0xd8
[   41.831516]  __kmalloc_cache_noprof+0x15c/0x3c8
[   41.832163]  kasan_atomics+0xb8/0x2e8
[   41.832691]  kunit_try_run_case+0x14c/0x3d0
[   41.833316]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   41.833990]  kthread+0x24c/0x2d0
[   41.834559]  ret_from_fork+0x10/0x20
[   41.835203] 
[   41.835547] The buggy address belongs to the object at fff00000c65bde00
[   41.835547]  which belongs to the cache kmalloc-64 of size 64
[   41.836813] The buggy address is located 0 bytes to the right of
[   41.836813]  allocated 48-byte region [fff00000c65bde00, fff00000c65bde30)
[   41.838087] 
[   41.838482] The buggy address belongs to the physical page:
[   41.839218] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065bd
[   41.840141] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   41.840889] page_type: f5(slab)
[   41.841458] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   41.842350] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   41.843231] page dumped because: kasan: bad access detected
[   41.843864] 
[   41.844254] Memory state around the buggy address:
[   41.845000]  fff00000c65bdd00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   41.845754]  fff00000c65bdd80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   41.846625] >fff00000c65bde00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   41.847419]                                      ^
[   41.848045]  fff00000c65bde80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   41.848964]  fff00000c65bdf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   41.849379] ==================================================================
[   41.519295] ==================================================================
[   41.520044] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x894/0x4858
[   41.521765] Write of size 4 at addr fff00000c65bde30 by task kunit_try_catch/254
[   41.522504] 
[   41.522780] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241120 #1
[   41.524307] Tainted: [B]=BAD_PAGE, [N]=TEST
[   41.524927] Hardware name: linux,dummy-virt (DT)
[   41.525499] Call trace:
[   41.525883]  show_stack+0x20/0x38 (C)
[   41.526502]  dump_stack_lvl+0x8c/0xd0
[   41.527038]  print_report+0x118/0x5e0
[   41.527646]  kasan_report+0xc8/0x118
[   41.528214]  kasan_check_range+0x100/0x1a8
[   41.528870]  __kasan_check_write+0x20/0x30
[   41.529507]  kasan_atomics_helper+0x894/0x4858
[   41.530118]  kasan_atomics+0x198/0x2e8
[   41.530689]  kunit_try_run_case+0x14c/0x3d0
[   41.531278]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   41.531988]  kthread+0x24c/0x2d0
[   41.532574]  ret_from_fork+0x10/0x20
[   41.533165] 
[   41.533534] Allocated by task 254:
[   41.534051]  kasan_save_stack+0x3c/0x68
[   41.534532]  kasan_save_track+0x20/0x40
[   41.535171]  kasan_save_alloc_info+0x40/0x58
[   41.535722]  __kasan_kmalloc+0xd4/0xd8
[   41.536304]  __kmalloc_cache_noprof+0x15c/0x3c8
[   41.536935]  kasan_atomics+0xb8/0x2e8
[   41.537518]  kunit_try_run_case+0x14c/0x3d0
[   41.538087]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   41.538671]  kthread+0x24c/0x2d0
[   41.539197]  ret_from_fork+0x10/0x20
[   41.539718] 
[   41.540045] The buggy address belongs to the object at fff00000c65bde00
[   41.540045]  which belongs to the cache kmalloc-64 of size 64
[   41.541233] The buggy address is located 0 bytes to the right of
[   41.541233]  allocated 48-byte region [fff00000c65bde00, fff00000c65bde30)
[   41.542417] 
[   41.542761] The buggy address belongs to the physical page:
[   41.543455] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065bd
[   41.544325] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   41.545072] page_type: f5(slab)
[   41.545630] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   41.546420] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   41.547299] page dumped because: kasan: bad access detected
[   41.547928] 
[   41.548670] Memory state around the buggy address:
[   41.549177]  fff00000c65bdd00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   41.549952]  fff00000c65bdd80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   41.551065] >fff00000c65bde00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   41.552044]                                      ^
[   41.552594]  fff00000c65bde80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   41.553389]  fff00000c65bdf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   41.554119] ==================================================================
[   42.554522] ==================================================================
[   42.555179] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x11f8/0x4858
[   42.556790] Write of size 8 at addr fff00000c65bde30 by task kunit_try_catch/254
[   42.557570] 
[   42.558268] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241120 #1
[   42.559386] Tainted: [B]=BAD_PAGE, [N]=TEST
[   42.560257] Hardware name: linux,dummy-virt (DT)
[   42.560856] Call trace:
[   42.561238]  show_stack+0x20/0x38 (C)
[   42.562110]  dump_stack_lvl+0x8c/0xd0
[   42.562842]  print_report+0x118/0x5e0
[   42.563564]  kasan_report+0xc8/0x118
[   42.564320]  kasan_check_range+0x100/0x1a8
[   42.565031]  __kasan_check_write+0x20/0x30
[   42.565772]  kasan_atomics_helper+0x11f8/0x4858
[   42.566405]  kasan_atomics+0x198/0x2e8
[   42.566968]  kunit_try_run_case+0x14c/0x3d0
[   42.567840]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   42.568575]  kthread+0x24c/0x2d0
[   42.569080]  ret_from_fork+0x10/0x20
[   42.569570] 
[   42.569920] Allocated by task 254:
[   42.570472]  kasan_save_stack+0x3c/0x68
[   42.571077]  kasan_save_track+0x20/0x40
[   42.571738]  kasan_save_alloc_info+0x40/0x58
[   42.572359]  __kasan_kmalloc+0xd4/0xd8
[   42.573012]  __kmalloc_cache_noprof+0x15c/0x3c8
[   42.573682]  kasan_atomics+0xb8/0x2e8
[   42.574302]  kunit_try_run_case+0x14c/0x3d0
[   42.574965]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   42.575737]  kthread+0x24c/0x2d0
[   42.576284]  ret_from_fork+0x10/0x20
[   42.576930] 
[   42.577209] The buggy address belongs to the object at fff00000c65bde00
[   42.577209]  which belongs to the cache kmalloc-64 of size 64
[   42.578359] The buggy address is located 0 bytes to the right of
[   42.578359]  allocated 48-byte region [fff00000c65bde00, fff00000c65bde30)
[   42.579736] 
[   42.580085] The buggy address belongs to the physical page:
[   42.580865] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065bd
[   42.581796] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   42.582639] page_type: f5(slab)
[   42.583217] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   42.584125] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   42.585061] page dumped because: kasan: bad access detected
[   42.585748] 
[   42.586112] Memory state around the buggy address:
[   42.586822]  fff00000c65bdd00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   42.587719]  fff00000c65bdd80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   42.588592] >fff00000c65bde00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   42.589400]                                      ^
[   42.590026]  fff00000c65bde80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   42.590922]  fff00000c65bdf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   42.591750] ==================================================================
[   41.321903] ==================================================================
[   41.322683] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x61c/0x4858
[   41.323564] Write of size 4 at addr fff00000c65bde30 by task kunit_try_catch/254
[   41.324411] 
[   41.324914] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241120 #1
[   41.326123] Tainted: [B]=BAD_PAGE, [N]=TEST
[   41.326741] Hardware name: linux,dummy-virt (DT)
[   41.327295] Call trace:
[   41.327766]  show_stack+0x20/0x38 (C)
[   41.328360]  dump_stack_lvl+0x8c/0xd0
[   41.328993]  print_report+0x118/0x5e0
[   41.329675]  kasan_report+0xc8/0x118
[   41.330280]  kasan_check_range+0x100/0x1a8
[   41.330866]  __kasan_check_write+0x20/0x30
[   41.331566]  kasan_atomics_helper+0x61c/0x4858
[   41.332229]  kasan_atomics+0x198/0x2e8
[   41.332848]  kunit_try_run_case+0x14c/0x3d0
[   41.333535]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   41.334335]  kthread+0x24c/0x2d0
[   41.334951]  ret_from_fork+0x10/0x20
[   41.335573] 
[   41.335828] Allocated by task 254:
[   41.336658]  kasan_save_stack+0x3c/0x68
[   41.337274]  kasan_save_track+0x20/0x40
[   41.337758]  kasan_save_alloc_info+0x40/0x58
[   41.338414]  __kasan_kmalloc+0xd4/0xd8
[   41.338984]  __kmalloc_cache_noprof+0x15c/0x3c8
[   41.339688]  kasan_atomics+0xb8/0x2e8
[   41.340221]  kunit_try_run_case+0x14c/0x3d0
[   41.340904]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   41.341609]  kthread+0x24c/0x2d0
[   41.342178]  ret_from_fork+0x10/0x20
[   41.342714] 
[   41.343095] The buggy address belongs to the object at fff00000c65bde00
[   41.343095]  which belongs to the cache kmalloc-64 of size 64
[   41.344279] The buggy address is located 0 bytes to the right of
[   41.344279]  allocated 48-byte region [fff00000c65bde00, fff00000c65bde30)
[   41.345575] 
[   41.345956] The buggy address belongs to the physical page:
[   41.346618] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065bd
[   41.347584] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   41.348419] page_type: f5(slab)
[   41.348957] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   41.349854] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   41.350721] page dumped because: kasan: bad access detected
[   41.351341] 
[   41.351741] Memory state around the buggy address:
[   41.352336]  fff00000c65bdd00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   41.353177]  fff00000c65bdd80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   41.354098] >fff00000c65bde00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   41.354986]                                      ^
[   41.355690]  fff00000c65bde80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   41.356400]  fff00000c65bdf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   41.357530] ==================================================================
[   40.847912] ==================================================================
[   40.848824] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x24c/0x4858
[   40.849492] Write of size 4 at addr fff00000c65bde30 by task kunit_try_catch/254
[   40.851222] 
[   40.851615] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241120 #1
[   40.852817] Tainted: [B]=BAD_PAGE, [N]=TEST
[   40.854084] Hardware name: linux,dummy-virt (DT)
[   40.854678] Call trace:
[   40.855026]  show_stack+0x20/0x38 (C)
[   40.855722]  dump_stack_lvl+0x8c/0xd0
[   40.856362]  print_report+0x118/0x5e0
[   40.857010]  kasan_report+0xc8/0x118
[   40.857814]  kasan_check_range+0x100/0x1a8
[   40.858622]  __kasan_check_write+0x20/0x30
[   40.859078]  kasan_atomics_helper+0x24c/0x4858
[   40.859668]  kasan_atomics+0x198/0x2e8
[   40.860399]  kunit_try_run_case+0x14c/0x3d0
[   40.861158]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   40.862201]  kthread+0x24c/0x2d0
[   40.862707]  ret_from_fork+0x10/0x20
[   40.863297] 
[   40.863673] Allocated by task 254:
[   40.864248]  kasan_save_stack+0x3c/0x68
[   40.864885]  kasan_save_track+0x20/0x40
[   40.865814]  kasan_save_alloc_info+0x40/0x58
[   40.866544]  __kasan_kmalloc+0xd4/0xd8
[   40.866957]  __kmalloc_cache_noprof+0x15c/0x3c8
[   40.867507]  kasan_atomics+0xb8/0x2e8
[   40.868114]  kunit_try_run_case+0x14c/0x3d0
[   40.868808]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   40.869621]  kthread+0x24c/0x2d0
[   40.870203]  ret_from_fork+0x10/0x20
[   40.871195] 
[   40.871541] The buggy address belongs to the object at fff00000c65bde00
[   40.871541]  which belongs to the cache kmalloc-64 of size 64
[   40.872954] The buggy address is located 0 bytes to the right of
[   40.872954]  allocated 48-byte region [fff00000c65bde00, fff00000c65bde30)
[   40.874612] 
[   40.876186] The buggy address belongs to the physical page:
[   40.876783] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065bd
[   40.878286] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   40.879233] page_type: f5(slab)
[   40.879935] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   40.881026] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   40.882046] page dumped because: kasan: bad access detected
[   40.882649] 
[   40.882971] Memory state around the buggy address:
[   40.884310]  fff00000c65bdd00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   40.885386]  fff00000c65bdd80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   40.886501] >fff00000c65bde00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   40.887544]                                      ^
[   40.888576]  fff00000c65bde80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   40.889528]  fff00000c65bdf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   40.889938] ==================================================================
[   41.887021] ==================================================================
[   41.888209] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xc08/0x4858
[   41.889007] Write of size 4 at addr fff00000c65bde30 by task kunit_try_catch/254
[   41.890401] 
[   41.890703] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241120 #1
[   41.891657] Tainted: [B]=BAD_PAGE, [N]=TEST
[   41.892100] Hardware name: linux,dummy-virt (DT)
[   41.893134] Call trace:
[   41.893647]  show_stack+0x20/0x38 (C)
[   41.894329]  dump_stack_lvl+0x8c/0xd0
[   41.894919]  print_report+0x118/0x5e0
[   41.895569]  kasan_report+0xc8/0x118
[   41.896169]  kasan_check_range+0x100/0x1a8
[   41.896798]  __kasan_check_write+0x20/0x30
[   41.897466]  kasan_atomics_helper+0xc08/0x4858
[   41.898107]  kasan_atomics+0x198/0x2e8
[   41.898755]  kunit_try_run_case+0x14c/0x3d0
[   41.899394]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   41.900090]  kthread+0x24c/0x2d0
[   41.900705]  ret_from_fork+0x10/0x20
[   41.901277] 
[   41.901658] Allocated by task 254:
[   41.902179]  kasan_save_stack+0x3c/0x68
[   41.902713]  kasan_save_track+0x20/0x40
[   41.903340]  kasan_save_alloc_info+0x40/0x58
[   41.904020]  __kasan_kmalloc+0xd4/0xd8
[   41.904592]  __kmalloc_cache_noprof+0x15c/0x3c8
[   41.905257]  kasan_atomics+0xb8/0x2e8
[   41.905851]  kunit_try_run_case+0x14c/0x3d0
[   41.906425]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   41.907201]  kthread+0x24c/0x2d0
[   41.907787]  ret_from_fork+0x10/0x20
[   41.908408] 
[   41.908774] The buggy address belongs to the object at fff00000c65bde00
[   41.908774]  which belongs to the cache kmalloc-64 of size 64
[   41.909982] The buggy address is located 0 bytes to the right of
[   41.909982]  allocated 48-byte region [fff00000c65bde00, fff00000c65bde30)
[   41.911241] 
[   41.911684] The buggy address belongs to the physical page:
[   41.912307] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065bd
[   41.913302] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   41.914124] page_type: f5(slab)
[   41.914575] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   41.915314] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   41.916053] page dumped because: kasan: bad access detected
[   41.916657] 
[   41.917010] Memory state around the buggy address:
[   41.917591]  fff00000c65bdd00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   41.918510]  fff00000c65bdd80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   41.919530] >fff00000c65bde00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   41.920508]                                      ^
[   41.921110]  fff00000c65bde80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   41.921859]  fff00000c65bdf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   41.922981] ==================================================================
[   41.995885] ==================================================================
[   41.997154] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3dd8/0x4858
[   41.998216] Read of size 4 at addr fff00000c65bde30 by task kunit_try_catch/254
[   41.999644] 
[   42.000111] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241120 #1
[   42.002094] Tainted: [B]=BAD_PAGE, [N]=TEST
[   42.002845] Hardware name: linux,dummy-virt (DT)
[   42.003616] Call trace:
[   42.004009]  show_stack+0x20/0x38 (C)
[   42.004556]  dump_stack_lvl+0x8c/0xd0
[   42.005003]  print_report+0x118/0x5e0
[   42.006091]  kasan_report+0xc8/0x118
[   42.006607]  __asan_report_load4_noabort+0x20/0x30
[   42.007432]  kasan_atomics_helper+0x3dd8/0x4858
[   42.008274]  kasan_atomics+0x198/0x2e8
[   42.009009]  kunit_try_run_case+0x14c/0x3d0
[   42.009575]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   42.010249]  kthread+0x24c/0x2d0
[   42.010722]  ret_from_fork+0x10/0x20
[   42.011318] 
[   42.011685] Allocated by task 254:
[   42.012154]  kasan_save_stack+0x3c/0x68
[   42.012704]  kasan_save_track+0x20/0x40
[   42.013288]  kasan_save_alloc_info+0x40/0x58
[   42.013902]  __kasan_kmalloc+0xd4/0xd8
[   42.014513]  __kmalloc_cache_noprof+0x15c/0x3c8
[   42.015125]  kasan_atomics+0xb8/0x2e8
[   42.015636]  kunit_try_run_case+0x14c/0x3d0
[   42.016275]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   42.017023]  kthread+0x24c/0x2d0
[   42.017549]  ret_from_fork+0x10/0x20
[   42.018119] 
[   42.018484] The buggy address belongs to the object at fff00000c65bde00
[   42.018484]  which belongs to the cache kmalloc-64 of size 64
[   42.019579] The buggy address is located 0 bytes to the right of
[   42.019579]  allocated 48-byte region [fff00000c65bde00, fff00000c65bde30)
[   42.020914] 
[   42.021273] The buggy address belongs to the physical page:
[   42.021861] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065bd
[   42.022810] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   42.023661] page_type: f5(slab)
[   42.024141] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   42.025409] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   42.026137] page dumped because: kasan: bad access detected
[   42.026823] 
[   42.027173] Memory state around the buggy address:
[   42.027829]  fff00000c65bdd00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   42.028598]  fff00000c65bdd80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   42.029435] >fff00000c65bde00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   42.030278]                                      ^
[   42.030903]  fff00000c65bde80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   42.031741]  fff00000c65bdf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   42.032510] ==================================================================
[   43.196044] ==================================================================
[   43.197325] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x17ec/0x4858
[   43.198213] Write of size 8 at addr fff00000c65bde30 by task kunit_try_catch/254
[   43.199074] 
[   43.199461] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241120 #1
[   43.200670] Tainted: [B]=BAD_PAGE, [N]=TEST
[   43.201247] Hardware name: linux,dummy-virt (DT)
[   43.201855] Call trace:
[   43.202295]  show_stack+0x20/0x38 (C)
[   43.202980]  dump_stack_lvl+0x8c/0xd0
[   43.203650]  print_report+0x118/0x5e0
[   43.204197]  kasan_report+0xc8/0x118
[   43.204932]  kasan_check_range+0x100/0x1a8
[   43.205590]  __kasan_check_write+0x20/0x30
[   43.206217]  kasan_atomics_helper+0x17ec/0x4858
[   43.206920]  kasan_atomics+0x198/0x2e8
[   43.207484]  kunit_try_run_case+0x14c/0x3d0
[   43.208138]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   43.208933]  kthread+0x24c/0x2d0
[   43.209535]  ret_from_fork+0x10/0x20
[   43.210165] 
[   43.210566] Allocated by task 254:
[   43.211092]  kasan_save_stack+0x3c/0x68
[   43.211757]  kasan_save_track+0x20/0x40
[   43.212377]  kasan_save_alloc_info+0x40/0x58
[   43.213014]  __kasan_kmalloc+0xd4/0xd8
[   43.213551]  __kmalloc_cache_noprof+0x15c/0x3c8
[   43.214228]  kasan_atomics+0xb8/0x2e8
[   43.214824]  kunit_try_run_case+0x14c/0x3d0
[   43.215426]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   43.216189]  kthread+0x24c/0x2d0
[   43.216760]  ret_from_fork+0x10/0x20
[   43.217291] 
[   43.217670] The buggy address belongs to the object at fff00000c65bde00
[   43.217670]  which belongs to the cache kmalloc-64 of size 64
[   43.218963] The buggy address is located 0 bytes to the right of
[   43.218963]  allocated 48-byte region [fff00000c65bde00, fff00000c65bde30)
[   43.220267] 
[   43.220622] The buggy address belongs to the physical page:
[   43.221284] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065bd
[   43.222275] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   43.223004] page_type: f5(slab)
[   43.223586] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   43.224478] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   43.225229] page dumped because: kasan: bad access detected
[   43.225905] 
[   43.226288] Memory state around the buggy address:
[   43.226949]  fff00000c65bdd00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   43.227681]  fff00000c65bdd80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   43.228570] >fff00000c65bde00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   43.229352]                                      ^
[   43.229958]  fff00000c65bde80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   43.230788]  fff00000c65bdf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   43.231606] ==================================================================
[   42.219850] ==================================================================
[   42.220681] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e5c/0x4858
[   42.221771] Write of size 8 at addr fff00000c65bde30 by task kunit_try_catch/254
[   42.222703] 
[   42.223083] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241120 #1
[   42.224194] Tainted: [B]=BAD_PAGE, [N]=TEST
[   42.224709] Hardware name: linux,dummy-virt (DT)
[   42.225353] Call trace:
[   42.225780]  show_stack+0x20/0x38 (C)
[   42.226399]  dump_stack_lvl+0x8c/0xd0
[   42.227012]  print_report+0x118/0x5e0
[   42.227559]  kasan_report+0xc8/0x118
[   42.228167]  __asan_report_store8_noabort+0x20/0x30
[   42.228918]  kasan_atomics_helper+0x3e5c/0x4858
[   42.229563]  kasan_atomics+0x198/0x2e8
[   42.230073]  kunit_try_run_case+0x14c/0x3d0
[   42.230736]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   42.231415]  kthread+0x24c/0x2d0
[   42.231980]  ret_from_fork+0x10/0x20
[   42.232569] 
[   42.232904] Allocated by task 254:
[   42.233455]  kasan_save_stack+0x3c/0x68
[   42.234062]  kasan_save_track+0x20/0x40
[   42.234658]  kasan_save_alloc_info+0x40/0x58
[   42.235295]  __kasan_kmalloc+0xd4/0xd8
[   42.235833]  __kmalloc_cache_noprof+0x15c/0x3c8
[   42.236493]  kasan_atomics+0xb8/0x2e8
[   42.237064]  kunit_try_run_case+0x14c/0x3d0
[   42.237620]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   42.238355]  kthread+0x24c/0x2d0
[   42.238918]  ret_from_fork+0x10/0x20
[   42.239503] 
[   42.239846] The buggy address belongs to the object at fff00000c65bde00
[   42.239846]  which belongs to the cache kmalloc-64 of size 64
[   42.240992] The buggy address is located 0 bytes to the right of
[   42.240992]  allocated 48-byte region [fff00000c65bde00, fff00000c65bde30)
[   42.242146] 
[   42.242532] The buggy address belongs to the physical page:
[   42.243220] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065bd
[   42.244039] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   42.244872] page_type: f5(slab)
[   42.245404] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   42.246269] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   42.247192] page dumped because: kasan: bad access detected
[   42.247888] 
[   42.248257] Memory state around the buggy address:
[   42.248940]  fff00000c65bdd00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   42.249853]  fff00000c65bdd80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   42.250613] >fff00000c65bde00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   42.251498]                                      ^
[   42.252186]  fff00000c65bde80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   42.253025]  fff00000c65bdf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   42.253797] ==================================================================
[   42.822665] ==================================================================
[   42.823401] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x14e4/0x4858
[   42.824196] Write of size 8 at addr fff00000c65bde30 by task kunit_try_catch/254
[   42.825111] 
[   42.825521] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241120 #1
[   42.826591] Tainted: [B]=BAD_PAGE, [N]=TEST
[   42.827203] Hardware name: linux,dummy-virt (DT)
[   42.827880] Call trace:
[   42.828307]  show_stack+0x20/0x38 (C)
[   42.828981]  dump_stack_lvl+0x8c/0xd0
[   42.829565]  print_report+0x118/0x5e0
[   42.830207]  kasan_report+0xc8/0x118
[   42.830861]  kasan_check_range+0x100/0x1a8
[   42.831438]  __kasan_check_write+0x20/0x30
[   42.832146]  kasan_atomics_helper+0x14e4/0x4858
[   42.832791]  kasan_atomics+0x198/0x2e8
[   42.833401]  kunit_try_run_case+0x14c/0x3d0
[   42.834077]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   42.834882]  kthread+0x24c/0x2d0
[   42.835431]  ret_from_fork+0x10/0x20
[   42.836056] 
[   42.836413] Allocated by task 254:
[   42.836980]  kasan_save_stack+0x3c/0x68
[   42.837534]  kasan_save_track+0x20/0x40
[   42.838151]  kasan_save_alloc_info+0x40/0x58
[   42.838795]  __kasan_kmalloc+0xd4/0xd8
[   42.839407]  __kmalloc_cache_noprof+0x15c/0x3c8
[   42.839987]  kasan_atomics+0xb8/0x2e8
[   42.840614]  kunit_try_run_case+0x14c/0x3d0
[   42.841202]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   42.841953]  kthread+0x24c/0x2d0
[   42.842424]  ret_from_fork+0x10/0x20
[   42.843035] 
[   42.843424] The buggy address belongs to the object at fff00000c65bde00
[   42.843424]  which belongs to the cache kmalloc-64 of size 64
[   42.844698] The buggy address is located 0 bytes to the right of
[   42.844698]  allocated 48-byte region [fff00000c65bde00, fff00000c65bde30)
[   42.845995] 
[   42.846343] The buggy address belongs to the physical page:
[   42.846993] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065bd
[   42.847903] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   42.848730] page_type: f5(slab)
[   42.849225] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   42.850155] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   42.851038] page dumped because: kasan: bad access detected
[   42.851687] 
[   42.852071] Memory state around the buggy address:
[   42.852760]  fff00000c65bdd00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   42.853506]  fff00000c65bdd80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   42.854422] >fff00000c65bde00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   42.855221]                                      ^
[   42.855880]  fff00000c65bde80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   42.856787]  fff00000c65bdf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   42.857660] ==================================================================
[   41.662534] ==================================================================
[   41.663243] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa04/0x4858
[   41.664104] Write of size 4 at addr fff00000c65bde30 by task kunit_try_catch/254
[   41.665488] 
[   41.665886] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241120 #1
[   41.666847] Tainted: [B]=BAD_PAGE, [N]=TEST
[   41.667418] Hardware name: linux,dummy-virt (DT)
[   41.667960] Call trace:
[   41.668384]  show_stack+0x20/0x38 (C)
[   41.669029]  dump_stack_lvl+0x8c/0xd0
[   41.669672]  print_report+0x118/0x5e0
[   41.670266]  kasan_report+0xc8/0x118
[   41.670881]  kasan_check_range+0x100/0x1a8
[   41.671507]  __kasan_check_write+0x20/0x30
[   41.672151]  kasan_atomics_helper+0xa04/0x4858
[   41.672841]  kasan_atomics+0x198/0x2e8
[   41.673345]  kunit_try_run_case+0x14c/0x3d0
[   41.674033]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   41.674816]  kthread+0x24c/0x2d0
[   41.675272]  ret_from_fork+0x10/0x20
[   41.675899] 
[   41.676254] Allocated by task 254:
[   41.676787]  kasan_save_stack+0x3c/0x68
[   41.677314]  kasan_save_track+0x20/0x40
[   41.677909]  kasan_save_alloc_info+0x40/0x58
[   41.678396]  __kasan_kmalloc+0xd4/0xd8
[   41.678995]  __kmalloc_cache_noprof+0x15c/0x3c8
[   41.679684]  kasan_atomics+0xb8/0x2e8
[   41.680272]  kunit_try_run_case+0x14c/0x3d0
[   41.680918]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   41.681484]  kthread+0x24c/0x2d0
[   41.682017]  ret_from_fork+0x10/0x20
[   41.682597] 
[   41.682956] The buggy address belongs to the object at fff00000c65bde00
[   41.682956]  which belongs to the cache kmalloc-64 of size 64
[   41.684102] The buggy address is located 0 bytes to the right of
[   41.684102]  allocated 48-byte region [fff00000c65bde00, fff00000c65bde30)
[   41.685236] 
[   41.685607] The buggy address belongs to the physical page:
[   41.686191] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065bd
[   41.687042] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   41.687664] page_type: f5(slab)
[   41.688201] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   41.689127] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   41.689879] page dumped because: kasan: bad access detected
[   41.690560] 
[   41.690901] Memory state around the buggy address:
[   41.691407]  fff00000c65bdd00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   41.692251]  fff00000c65bdd80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   41.693063] >fff00000c65bde00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   41.693822]                                      ^
[   41.694489]  fff00000c65bde80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   41.695180]  fff00000c65bdf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   41.696037] ==================================================================
[   41.556168] ==================================================================
[   41.556908] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x42d8/0x4858
[   41.558490] Read of size 4 at addr fff00000c65bde30 by task kunit_try_catch/254
[   41.559331] 
[   41.559626] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241120 #1
[   41.560615] Tainted: [B]=BAD_PAGE, [N]=TEST
[   41.561321] Hardware name: linux,dummy-virt (DT)
[   41.561923] Call trace:
[   41.562244]  show_stack+0x20/0x38 (C)
[   41.562713]  dump_stack_lvl+0x8c/0xd0
[   41.563162]  print_report+0x118/0x5e0
[   41.563603]  kasan_report+0xc8/0x118
[   41.564073]  __asan_report_load4_noabort+0x20/0x30
[   41.564903]  kasan_atomics_helper+0x42d8/0x4858
[   41.565610]  kasan_atomics+0x198/0x2e8
[   41.566190]  kunit_try_run_case+0x14c/0x3d0
[   41.567431]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   41.568322]  kthread+0x24c/0x2d0
[   41.568854]  ret_from_fork+0x10/0x20
[   41.569454] 
[   41.569802] Allocated by task 254:
[   41.570295]  kasan_save_stack+0x3c/0x68
[   41.570912]  kasan_save_track+0x20/0x40
[   41.571476]  kasan_save_alloc_info+0x40/0x58
[   41.572013]  __kasan_kmalloc+0xd4/0xd8
[   41.572614]  __kmalloc_cache_noprof+0x15c/0x3c8
[   41.573179]  kasan_atomics+0xb8/0x2e8
[   41.573770]  kunit_try_run_case+0x14c/0x3d0
[   41.574275]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   41.574964]  kthread+0x24c/0x2d0
[   41.575434]  ret_from_fork+0x10/0x20
[   41.575957] 
[   41.576314] The buggy address belongs to the object at fff00000c65bde00
[   41.576314]  which belongs to the cache kmalloc-64 of size 64
[   41.577364] The buggy address is located 0 bytes to the right of
[   41.577364]  allocated 48-byte region [fff00000c65bde00, fff00000c65bde30)
[   41.578589] 
[   41.578935] The buggy address belongs to the physical page:
[   41.579594] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065bd
[   41.580388] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   41.581186] page_type: f5(slab)
[   41.581642] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   41.582559] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   41.583339] page dumped because: kasan: bad access detected
[   41.584044] 
[   41.584405] Memory state around the buggy address:
[   41.584961]  fff00000c65bdd00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   41.585806]  fff00000c65bdd80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   41.586677] >fff00000c65bde00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   41.587395]                                      ^
[   41.588030]  fff00000c65bde80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   41.588766]  fff00000c65bdf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   41.589528] ==================================================================
[   42.072114] ==================================================================
[   42.072874] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e04/0x4858
[   42.074721] Read of size 4 at addr fff00000c65bde30 by task kunit_try_catch/254
[   42.075646] 
[   42.075970] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241120 #1
[   42.077044] Tainted: [B]=BAD_PAGE, [N]=TEST
[   42.077522] Hardware name: linux,dummy-virt (DT)
[   42.078111] Call trace:
[   42.078524]  show_stack+0x20/0x38 (C)
[   42.079102]  dump_stack_lvl+0x8c/0xd0
[   42.079681]  print_report+0x118/0x5e0
[   42.080255]  kasan_report+0xc8/0x118
[   42.080762]  __asan_report_load4_noabort+0x20/0x30
[   42.081435]  kasan_atomics_helper+0x3e04/0x4858
[   42.082037]  kasan_atomics+0x198/0x2e8
[   42.082576]  kunit_try_run_case+0x14c/0x3d0
[   42.083163]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   42.083827]  kthread+0x24c/0x2d0
[   42.084408]  ret_from_fork+0x10/0x20
[   42.085062] 
[   42.085413] Allocated by task 254:
[   42.085935]  kasan_save_stack+0x3c/0x68
[   42.086399]  kasan_save_track+0x20/0x40
[   42.086856]  kasan_save_alloc_info+0x40/0x58
[   42.087375]  __kasan_kmalloc+0xd4/0xd8
[   42.087778]  __kmalloc_cache_noprof+0x15c/0x3c8
[   42.088069]  kasan_atomics+0xb8/0x2e8
[   42.088324]  kunit_try_run_case+0x14c/0x3d0
[   42.088792]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   42.089357]  kthread+0x24c/0x2d0
[   42.090731]  ret_from_fork+0x10/0x20
[   42.091734] 
[   42.092083] The buggy address belongs to the object at fff00000c65bde00
[   42.092083]  which belongs to the cache kmalloc-64 of size 64
[   42.093208] The buggy address is located 0 bytes to the right of
[   42.093208]  allocated 48-byte region [fff00000c65bde00, fff00000c65bde30)
[   42.094349] 
[   42.094716] The buggy address belongs to the physical page:
[   42.095344] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065bd
[   42.096230] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   42.096977] page_type: f5(slab)
[   42.097505] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   42.098304] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   42.099123] page dumped because: kasan: bad access detected
[   42.099730] 
[   42.100077] Memory state around the buggy address:
[   42.100582]  fff00000c65bdd00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   42.101433]  fff00000c65bdd80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   42.102237] >fff00000c65bde00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   42.102967]                                      ^
[   42.103582]  fff00000c65bde80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   42.104454]  fff00000c65bdf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   42.105133] ==================================================================
[   41.029008] ==================================================================
[   41.030371] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f94/0x4858
[   41.030963] Write of size 4 at addr fff00000c65bde30 by task kunit_try_catch/254
[   41.031991] 
[   41.032481] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241120 #1
[   41.033862] Tainted: [B]=BAD_PAGE, [N]=TEST
[   41.034743] Hardware name: linux,dummy-virt (DT)
[   41.035334] Call trace:
[   41.035625]  show_stack+0x20/0x38 (C)
[   41.036319]  dump_stack_lvl+0x8c/0xd0
[   41.036968]  print_report+0x118/0x5e0
[   41.037618]  kasan_report+0xc8/0x118
[   41.038949]  __asan_report_store4_noabort+0x20/0x30
[   41.039773]  kasan_atomics_helper+0x3f94/0x4858
[   41.040592]  kasan_atomics+0x198/0x2e8
[   41.041301]  kunit_try_run_case+0x14c/0x3d0
[   41.041997]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   41.043167]  kthread+0x24c/0x2d0
[   41.043664]  ret_from_fork+0x10/0x20
[   41.044173] 
[   41.044554] Allocated by task 254:
[   41.044972]  kasan_save_stack+0x3c/0x68
[   41.045871]  kasan_save_track+0x20/0x40
[   41.046525]  kasan_save_alloc_info+0x40/0x58
[   41.047749]  __kasan_kmalloc+0xd4/0xd8
[   41.048296]  __kmalloc_cache_noprof+0x15c/0x3c8
[   41.049059]  kasan_atomics+0xb8/0x2e8
[   41.049684]  kunit_try_run_case+0x14c/0x3d0
[   41.050339]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   41.051689]  kthread+0x24c/0x2d0
[   41.052155]  ret_from_fork+0x10/0x20
[   41.052733] 
[   41.053052] The buggy address belongs to the object at fff00000c65bde00
[   41.053052]  which belongs to the cache kmalloc-64 of size 64
[   41.054488] The buggy address is located 0 bytes to the right of
[   41.054488]  allocated 48-byte region [fff00000c65bde00, fff00000c65bde30)
[   41.056104] 
[   41.056609] The buggy address belongs to the physical page:
[   41.057520] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065bd
[   41.058677] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   41.059642] page_type: f5(slab)
[   41.060124] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   41.060617] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   41.062298] page dumped because: kasan: bad access detected
[   41.063147] 
[   41.063675] Memory state around the buggy address:
[   41.064257]  fff00000c65bdd00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   41.065279]  fff00000c65bdd80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   41.066306] >fff00000c65bde00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   41.067276]                                      ^
[   41.067854]  fff00000c65bde80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   41.068921]  fff00000c65bdf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   41.069841] ==================================================================
[   43.159167] ==================================================================
[   43.159784] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e20/0x4858
[   43.160705] Read of size 8 at addr fff00000c65bde30 by task kunit_try_catch/254
[   43.161950] 
[   43.162477] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241120 #1
[   43.163704] Tainted: [B]=BAD_PAGE, [N]=TEST
[   43.164425] Hardware name: linux,dummy-virt (DT)
[   43.165140] Call trace:
[   43.165718]  show_stack+0x20/0x38 (C)
[   43.166454]  dump_stack_lvl+0x8c/0xd0
[   43.166960]  print_report+0x118/0x5e0
[   43.167481]  kasan_report+0xc8/0x118
[   43.167984]  __asan_report_load8_noabort+0x20/0x30
[   43.168644]  kasan_atomics_helper+0x3e20/0x4858
[   43.169177]  kasan_atomics+0x198/0x2e8
[   43.170282]  kunit_try_run_case+0x14c/0x3d0
[   43.170899]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   43.171646]  kthread+0x24c/0x2d0
[   43.172281]  ret_from_fork+0x10/0x20
[   43.172848] 
[   43.173254] Allocated by task 254:
[   43.173773]  kasan_save_stack+0x3c/0x68
[   43.174416]  kasan_save_track+0x20/0x40
[   43.175121]  kasan_save_alloc_info+0x40/0x58
[   43.175715]  __kasan_kmalloc+0xd4/0xd8
[   43.176208]  __kmalloc_cache_noprof+0x15c/0x3c8
[   43.176795]  kasan_atomics+0xb8/0x2e8
[   43.177264]  kunit_try_run_case+0x14c/0x3d0
[   43.177828]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   43.178411]  kthread+0x24c/0x2d0
[   43.179024]  ret_from_fork+0x10/0x20
[   43.179673] 
[   43.180089] The buggy address belongs to the object at fff00000c65bde00
[   43.180089]  which belongs to the cache kmalloc-64 of size 64
[   43.181501] The buggy address is located 0 bytes to the right of
[   43.181501]  allocated 48-byte region [fff00000c65bde00, fff00000c65bde30)
[   43.182715] 
[   43.183193] The buggy address belongs to the physical page:
[   43.183977] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065bd
[   43.184818] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   43.185696] page_type: f5(slab)
[   43.186273] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   43.187120] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   43.187929] page dumped because: kasan: bad access detected
[   43.188645] 
[   43.189053] Memory state around the buggy address:
[   43.189622]  fff00000c65bdd00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   43.190398]  fff00000c65bdd80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   43.191151] >fff00000c65bde00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   43.191921]                                      ^
[   43.192517]  fff00000c65bde80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   43.193435]  fff00000c65bdf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   43.194302] ==================================================================
[   41.698342] ==================================================================
[   41.699122] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa6c/0x4858
[   41.699884] Write of size 4 at addr fff00000c65bde30 by task kunit_try_catch/254
[   41.701477] 
[   41.701763] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241120 #1
[   41.702713] Tainted: [B]=BAD_PAGE, [N]=TEST
[   41.703155] Hardware name: linux,dummy-virt (DT)
[   41.704256] Call trace:
[   41.705009]  show_stack+0x20/0x38 (C)
[   41.705531]  dump_stack_lvl+0x8c/0xd0
[   41.706135]  print_report+0x118/0x5e0
[   41.706727]  kasan_report+0xc8/0x118
[   41.707264]  kasan_check_range+0x100/0x1a8
[   41.707795]  __kasan_check_write+0x20/0x30
[   41.708381]  kasan_atomics_helper+0xa6c/0x4858
[   41.709064]  kasan_atomics+0x198/0x2e8
[   41.709643]  kunit_try_run_case+0x14c/0x3d0
[   41.710305]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   41.711027]  kthread+0x24c/0x2d0
[   41.711502]  ret_from_fork+0x10/0x20
[   41.712093] 
[   41.712452] Allocated by task 254:
[   41.712922]  kasan_save_stack+0x3c/0x68
[   41.713528]  kasan_save_track+0x20/0x40
[   41.714064]  kasan_save_alloc_info+0x40/0x58
[   41.714649]  __kasan_kmalloc+0xd4/0xd8
[   41.715171]  __kmalloc_cache_noprof+0x15c/0x3c8
[   41.715837]  kasan_atomics+0xb8/0x2e8
[   41.716403]  kunit_try_run_case+0x14c/0x3d0
[   41.717026]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   41.718019]  kthread+0x24c/0x2d0
[   41.718766]  ret_from_fork+0x10/0x20
[   41.719217] 
[   41.719581] The buggy address belongs to the object at fff00000c65bde00
[   41.719581]  which belongs to the cache kmalloc-64 of size 64
[   41.721165] The buggy address is located 0 bytes to the right of
[   41.721165]  allocated 48-byte region [fff00000c65bde00, fff00000c65bde30)
[   41.722681] 
[   41.723196] The buggy address belongs to the physical page:
[   41.723843] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065bd
[   41.724726] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   41.725930] page_type: f5(slab)
[   41.726386] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   41.727429] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   41.728427] page dumped because: kasan: bad access detected
[   41.729247] 
[   41.729742] Memory state around the buggy address:
[   41.730617]  fff00000c65bdd00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   41.731303]  fff00000c65bdd80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   41.732063] >fff00000c65bde00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   41.732788]                                      ^
[   41.733415]  fff00000c65bde80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   41.734245]  fff00000c65bdf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   41.734953] ==================================================================
[   42.294209] ==================================================================
[   42.295068] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf20/0x4858
[   42.295968] Write of size 8 at addr fff00000c65bde30 by task kunit_try_catch/254
[   42.296890] 
[   42.297306] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241120 #1
[   42.298971] Tainted: [B]=BAD_PAGE, [N]=TEST
[   42.299490] Hardware name: linux,dummy-virt (DT)
[   42.300107] Call trace:
[   42.300602]  show_stack+0x20/0x38 (C)
[   42.301225]  dump_stack_lvl+0x8c/0xd0
[   42.301913]  print_report+0x118/0x5e0
[   42.302569]  kasan_report+0xc8/0x118
[   42.303241]  kasan_check_range+0x100/0x1a8
[   42.303930]  __kasan_check_write+0x20/0x30
[   42.304609]  kasan_atomics_helper+0xf20/0x4858
[   42.305354]  kasan_atomics+0x198/0x2e8
[   42.305912]  kunit_try_run_case+0x14c/0x3d0
[   42.306612]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   42.307294]  kthread+0x24c/0x2d0
[   42.307824]  ret_from_fork+0x10/0x20
[   42.308432] 
[   42.308838] Allocated by task 254:
[   42.309269]  kasan_save_stack+0x3c/0x68
[   42.309895]  kasan_save_track+0x20/0x40
[   42.310460]  kasan_save_alloc_info+0x40/0x58
[   42.311077]  __kasan_kmalloc+0xd4/0xd8
[   42.311648]  __kmalloc_cache_noprof+0x15c/0x3c8
[   42.312332]  kasan_atomics+0xb8/0x2e8
[   42.312869]  kunit_try_run_case+0x14c/0x3d0
[   42.313417]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   42.314122]  kthread+0x24c/0x2d0
[   42.314655]  ret_from_fork+0x10/0x20
[   42.315260] 
[   42.315633] The buggy address belongs to the object at fff00000c65bde00
[   42.315633]  which belongs to the cache kmalloc-64 of size 64
[   42.316751] The buggy address is located 0 bytes to the right of
[   42.316751]  allocated 48-byte region [fff00000c65bde00, fff00000c65bde30)
[   42.317968] 
[   42.318338] The buggy address belongs to the physical page:
[   42.319518] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065bd
[   42.320369] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   42.321223] page_type: f5(slab)
[   42.321775] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   42.322556] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   42.323461] page dumped because: kasan: bad access detected
[   42.324079] 
[   42.324434] Memory state around the buggy address:
[   42.325095]  fff00000c65bdd00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   42.325877]  fff00000c65bdd80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   42.326722] >fff00000c65bde00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   42.327568]                                      ^
[   42.328146]  fff00000c65bde80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   42.328927]  fff00000c65bdf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   42.329780] ==================================================================
[   42.711074] ==================================================================
[   42.711839] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f04/0x4858
[   42.713628] Read of size 8 at addr fff00000c65bde30 by task kunit_try_catch/254
[   42.714754] 
[   42.715145] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241120 #1
[   42.716109] Tainted: [B]=BAD_PAGE, [N]=TEST
[   42.717092] Hardware name: linux,dummy-virt (DT)
[   42.717821] Call trace:
[   42.718206]  show_stack+0x20/0x38 (C)
[   42.718789]  dump_stack_lvl+0x8c/0xd0
[   42.719337]  print_report+0x118/0x5e0
[   42.719906]  kasan_report+0xc8/0x118
[   42.720408]  __asan_report_load8_noabort+0x20/0x30
[   42.721105]  kasan_atomics_helper+0x3f04/0x4858
[   42.721735]  kasan_atomics+0x198/0x2e8
[   42.722281]  kunit_try_run_case+0x14c/0x3d0
[   42.722874]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   42.723563]  kthread+0x24c/0x2d0
[   42.724120]  ret_from_fork+0x10/0x20
[   42.724720] 
[   42.725051] Allocated by task 254:
[   42.725580]  kasan_save_stack+0x3c/0x68
[   42.726125]  kasan_save_track+0x20/0x40
[   42.726749]  kasan_save_alloc_info+0x40/0x58
[   42.727369]  __kasan_kmalloc+0xd4/0xd8
[   42.727946]  __kmalloc_cache_noprof+0x15c/0x3c8
[   42.728644]  kasan_atomics+0xb8/0x2e8
[   42.729209]  kunit_try_run_case+0x14c/0x3d0
[   42.729823]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   42.730467]  kthread+0x24c/0x2d0
[   42.730948]  ret_from_fork+0x10/0x20
[   42.731435] 
[   42.731798] The buggy address belongs to the object at fff00000c65bde00
[   42.731798]  which belongs to the cache kmalloc-64 of size 64
[   42.732999] The buggy address is located 0 bytes to the right of
[   42.732999]  allocated 48-byte region [fff00000c65bde00, fff00000c65bde30)
[   42.734146] 
[   42.734510] The buggy address belongs to the physical page:
[   42.735244] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065bd
[   42.736041] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   42.736875] page_type: f5(slab)
[   42.737314] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   42.738253] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   42.739000] page dumped because: kasan: bad access detected
[   42.739709] 
[   42.740058] Memory state around the buggy address:
[   42.740624]  fff00000c65bdd00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   42.741409]  fff00000c65bdd80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   42.742104] >fff00000c65bde00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   42.742921]                                      ^
[   42.743571]  fff00000c65bde80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   42.744187]  fff00000c65bdf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   42.745000] ==================================================================
[   42.783964] ==================================================================
[   42.784823] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x147c/0x4858
[   42.785757] Write of size 8 at addr fff00000c65bde30 by task kunit_try_catch/254
[   42.786533] 
[   42.786965] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241120 #1
[   42.788209] Tainted: [B]=BAD_PAGE, [N]=TEST
[   42.788809] Hardware name: linux,dummy-virt (DT)
[   42.789331] Call trace:
[   42.789808]  show_stack+0x20/0x38 (C)
[   42.790496]  dump_stack_lvl+0x8c/0xd0
[   42.791093]  print_report+0x118/0x5e0
[   42.791745]  kasan_report+0xc8/0x118
[   42.792285]  kasan_check_range+0x100/0x1a8
[   42.792984]  __kasan_check_write+0x20/0x30
[   42.793661]  kasan_atomics_helper+0x147c/0x4858
[   42.794338]  kasan_atomics+0x198/0x2e8
[   42.794997]  kunit_try_run_case+0x14c/0x3d0
[   42.795558]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   42.796386]  kthread+0x24c/0x2d0
[   42.796996]  ret_from_fork+0x10/0x20
[   42.797626] 
[   42.798014] Allocated by task 254:
[   42.798606]  kasan_save_stack+0x3c/0x68
[   42.799190]  kasan_save_track+0x20/0x40
[   42.799752]  kasan_save_alloc_info+0x40/0x58
[   42.800468]  __kasan_kmalloc+0xd4/0xd8
[   42.801030]  __kmalloc_cache_noprof+0x15c/0x3c8
[   42.801753]  kasan_atomics+0xb8/0x2e8
[   42.802277]  kunit_try_run_case+0x14c/0x3d0
[   42.802957]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   42.803664]  kthread+0x24c/0x2d0
[   42.804237]  ret_from_fork+0x10/0x20
[   42.804779] 
[   42.805208] The buggy address belongs to the object at fff00000c65bde00
[   42.805208]  which belongs to the cache kmalloc-64 of size 64
[   42.806590] The buggy address is located 0 bytes to the right of
[   42.806590]  allocated 48-byte region [fff00000c65bde00, fff00000c65bde30)
[   42.807873] 
[   42.808214] The buggy address belongs to the physical page:
[   42.808973] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065bd
[   42.809792] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   42.810661] page_type: f5(slab)
[   42.811194] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   42.812077] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   42.812945] page dumped because: kasan: bad access detected
[   42.813652] 
[   42.814034] Memory state around the buggy address:
[   42.814744]  fff00000c65bdd00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   42.815589]  fff00000c65bdd80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   42.816435] >fff00000c65bde00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   42.817249]                                      ^
[   42.817863]  fff00000c65bde80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   42.818716]  fff00000c65bdf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   42.819528] ==================================================================
[   42.331501] ==================================================================
[   42.332311] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf88/0x4858
[   42.333205] Write of size 8 at addr fff00000c65bde30 by task kunit_try_catch/254
[   42.334636] 
[   42.335070] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241120 #1
[   42.336209] Tainted: [B]=BAD_PAGE, [N]=TEST
[   42.336730] Hardware name: linux,dummy-virt (DT)
[   42.337362] Call trace:
[   42.337831]  show_stack+0x20/0x38 (C)
[   42.338455]  dump_stack_lvl+0x8c/0xd0
[   42.338985]  print_report+0x118/0x5e0
[   42.339599]  kasan_report+0xc8/0x118
[   42.340198]  kasan_check_range+0x100/0x1a8
[   42.340738]  __kasan_check_write+0x20/0x30
[   42.341378]  kasan_atomics_helper+0xf88/0x4858
[   42.342015]  kasan_atomics+0x198/0x2e8
[   42.342541]  kunit_try_run_case+0x14c/0x3d0
[   42.343196]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   42.343922]  kthread+0x24c/0x2d0
[   42.344415]  ret_from_fork+0x10/0x20
[   42.345097] 
[   42.345425] Allocated by task 254:
[   42.345874]  kasan_save_stack+0x3c/0x68
[   42.346493]  kasan_save_track+0x20/0x40
[   42.347088]  kasan_save_alloc_info+0x40/0x58
[   42.347628]  __kasan_kmalloc+0xd4/0xd8
[   42.348209]  __kmalloc_cache_noprof+0x15c/0x3c8
[   42.348782]  kasan_atomics+0xb8/0x2e8
[   42.349349]  kunit_try_run_case+0x14c/0x3d0
[   42.349873]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   42.350628]  kthread+0x24c/0x2d0
[   42.351052]  ret_from_fork+0x10/0x20
[   42.351825] 
[   42.352462] The buggy address belongs to the object at fff00000c65bde00
[   42.352462]  which belongs to the cache kmalloc-64 of size 64
[   42.353830] The buggy address is located 0 bytes to the right of
[   42.353830]  allocated 48-byte region [fff00000c65bde00, fff00000c65bde30)
[   42.354423] 
[   42.354855] The buggy address belongs to the physical page:
[   42.355659] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065bd
[   42.356716] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   42.357590] page_type: f5(slab)
[   42.358094] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   42.359015] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   42.359387] page dumped because: kasan: bad access detected
[   42.359940] 
[   42.360317] Memory state around the buggy address:
[   42.360994]  fff00000c65bdd00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   42.361865]  fff00000c65bdd80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   42.362852] >fff00000c65bde00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   42.363610]                                      ^
[   42.364303]  fff00000c65bde80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   42.365164]  fff00000c65bdf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   42.365889] ==================================================================
[   40.891106] ==================================================================
[   40.891904] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x2b0/0x4858
[   40.892673] Read of size 4 at addr fff00000c65bde30 by task kunit_try_catch/254
[   40.893993] 
[   40.894432] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241120 #1
[   40.896165] Tainted: [B]=BAD_PAGE, [N]=TEST
[   40.897480] Hardware name: linux,dummy-virt (DT)
[   40.898065] Call trace:
[   40.898664]  show_stack+0x20/0x38 (C)
[   40.899201]  dump_stack_lvl+0x8c/0xd0
[   40.899795]  print_report+0x118/0x5e0
[   40.900564]  kasan_report+0xc8/0x118
[   40.901193]  kasan_check_range+0x100/0x1a8
[   40.901937]  __kasan_check_read+0x20/0x30
[   40.902826]  kasan_atomics_helper+0x2b0/0x4858
[   40.903560]  kasan_atomics+0x198/0x2e8
[   40.904201]  kunit_try_run_case+0x14c/0x3d0
[   40.904880]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   40.905737]  kthread+0x24c/0x2d0
[   40.906536]  ret_from_fork+0x10/0x20
[   40.906959] 
[   40.907203] Allocated by task 254:
[   40.907582]  kasan_save_stack+0x3c/0x68
[   40.908063]  kasan_save_track+0x20/0x40
[   40.908749]  kasan_save_alloc_info+0x40/0x58
[   40.909475]  __kasan_kmalloc+0xd4/0xd8
[   40.910124]  __kmalloc_cache_noprof+0x15c/0x3c8
[   40.910850]  kasan_atomics+0xb8/0x2e8
[   40.911360]  kunit_try_run_case+0x14c/0x3d0
[   40.912269]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   40.913009]  kthread+0x24c/0x2d0
[   40.913858]  ret_from_fork+0x10/0x20
[   40.914652] 
[   40.915171] The buggy address belongs to the object at fff00000c65bde00
[   40.915171]  which belongs to the cache kmalloc-64 of size 64
[   40.916581] The buggy address is located 0 bytes to the right of
[   40.916581]  allocated 48-byte region [fff00000c65bde00, fff00000c65bde30)
[   40.918352] 
[   40.919227] The buggy address belongs to the physical page:
[   40.920055] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065bd
[   40.920969] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   40.922765] page_type: f5(slab)
[   40.923468] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   40.924149] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   40.925107] page dumped because: kasan: bad access detected
[   40.926363] 
[   40.926753] Memory state around the buggy address:
[   40.927319]  fff00000c65bdd00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   40.928076]  fff00000c65bdd80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   40.929316] >fff00000c65bde00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   40.930544]                                      ^
[   40.931087]  fff00000c65bde80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   40.932854]  fff00000c65bdf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   40.933937] ==================================================================
[   42.034462] ==================================================================
[   42.035167] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xd3c/0x4858
[   42.035853] Write of size 4 at addr fff00000c65bde30 by task kunit_try_catch/254
[   42.036428] 
[   42.036825] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241120 #1
[   42.038034] Tainted: [B]=BAD_PAGE, [N]=TEST
[   42.038721] Hardware name: linux,dummy-virt (DT)
[   42.039359] Call trace:
[   42.039847]  show_stack+0x20/0x38 (C)
[   42.040522]  dump_stack_lvl+0x8c/0xd0
[   42.041177]  print_report+0x118/0x5e0
[   42.041820]  kasan_report+0xc8/0x118
[   42.042464]  kasan_check_range+0x100/0x1a8
[   42.043138]  __kasan_check_write+0x20/0x30
[   42.043771]  kasan_atomics_helper+0xd3c/0x4858
[   42.044499]  kasan_atomics+0x198/0x2e8
[   42.045025]  kunit_try_run_case+0x14c/0x3d0
[   42.045742]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   42.046439]  kthread+0x24c/0x2d0
[   42.047056]  ret_from_fork+0x10/0x20
[   42.047723] 
[   42.048099] Allocated by task 254:
[   42.048583]  kasan_save_stack+0x3c/0x68
[   42.049202]  kasan_save_track+0x20/0x40
[   42.049835]  kasan_save_alloc_info+0x40/0x58
[   42.050414]  __kasan_kmalloc+0xd4/0xd8
[   42.050978]  __kmalloc_cache_noprof+0x15c/0x3c8
[   42.051603]  kasan_atomics+0xb8/0x2e8
[   42.052079]  kunit_try_run_case+0x14c/0x3d0
[   42.052919]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   42.053723]  kthread+0x24c/0x2d0
[   42.054340]  ret_from_fork+0x10/0x20
[   42.054961] 
[   42.055387] The buggy address belongs to the object at fff00000c65bde00
[   42.055387]  which belongs to the cache kmalloc-64 of size 64
[   42.056830] The buggy address is located 0 bytes to the right of
[   42.056830]  allocated 48-byte region [fff00000c65bde00, fff00000c65bde30)
[   42.058114] 
[   42.058414] The buggy address belongs to the physical page:
[   42.059092] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065bd
[   42.059936] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   42.060795] page_type: f5(slab)
[   42.061380] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   42.062393] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   42.063354] page dumped because: kasan: bad access detected
[   42.064162] 
[   42.064594] Memory state around the buggy address:
[   42.065216]  fff00000c65bdd00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   42.065967]  fff00000c65bdd80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   42.066830] >fff00000c65bde00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   42.067660]                                      ^
[   42.068253]  fff00000c65bde80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   42.069033]  fff00000c65bdf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   42.069817] ==================================================================
[   43.118614] ==================================================================
[   43.119361] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x175c/0x4858
[   43.120069] Write of size 8 at addr fff00000c65bde30 by task kunit_try_catch/254
[   43.120779] 
[   43.121036] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241120 #1
[   43.123112] Tainted: [B]=BAD_PAGE, [N]=TEST
[   43.123673] Hardware name: linux,dummy-virt (DT)
[   43.124209] Call trace:
[   43.124667]  show_stack+0x20/0x38 (C)
[   43.125279]  dump_stack_lvl+0x8c/0xd0
[   43.125885]  print_report+0x118/0x5e0
[   43.126514]  kasan_report+0xc8/0x118
[   43.127102]  kasan_check_range+0x100/0x1a8
[   43.127715]  __kasan_check_write+0x20/0x30
[   43.128306]  kasan_atomics_helper+0x175c/0x4858
[   43.128990]  kasan_atomics+0x198/0x2e8
[   43.129612]  kunit_try_run_case+0x14c/0x3d0
[   43.130254]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   43.130964]  kthread+0x24c/0x2d0
[   43.131536]  ret_from_fork+0x10/0x20
[   43.132106] 
[   43.132425] Allocated by task 254:
[   43.132966]  kasan_save_stack+0x3c/0x68
[   43.133499]  kasan_save_track+0x20/0x40
[   43.134088]  kasan_save_alloc_info+0x40/0x58
[   43.134723]  __kasan_kmalloc+0xd4/0xd8
[   43.135212]  __kmalloc_cache_noprof+0x15c/0x3c8
[   43.135873]  kasan_atomics+0xb8/0x2e8
[   43.136378]  kunit_try_run_case+0x14c/0x3d0
[   43.136983]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   43.137720]  kthread+0x24c/0x2d0
[   43.138223]  ret_from_fork+0x10/0x20
[   43.139094] 
[   43.139601] The buggy address belongs to the object at fff00000c65bde00
[   43.139601]  which belongs to the cache kmalloc-64 of size 64
[   43.141147] The buggy address is located 0 bytes to the right of
[   43.141147]  allocated 48-byte region [fff00000c65bde00, fff00000c65bde30)
[   43.142589] 
[   43.142916] The buggy address belongs to the physical page:
[   43.143810] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065bd
[   43.144687] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   43.145613] page_type: f5(slab)
[   43.146296] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   43.147325] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   43.148321] page dumped because: kasan: bad access detected
[   43.149135] 
[   43.149460] Memory state around the buggy address:
[   43.150025]  fff00000c65bdd00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   43.151121]  fff00000c65bdd80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   43.152105] >fff00000c65bde00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   43.153056]                                      ^
[   43.153870]  fff00000c65bde80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   43.154847]  fff00000c65bdf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   43.155783] ==================================================================
[   42.257057] ==================================================================
[   42.258121] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xeb8/0x4858
[   42.259092] Write of size 8 at addr fff00000c65bde30 by task kunit_try_catch/254
[   42.260026] 
[   42.260521] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241120 #1
[   42.261705] Tainted: [B]=BAD_PAGE, [N]=TEST
[   42.262326] Hardware name: linux,dummy-virt (DT)
[   42.262991] Call trace:
[   42.263499]  show_stack+0x20/0x38 (C)
[   42.264178]  dump_stack_lvl+0x8c/0xd0
[   42.264818]  print_report+0x118/0x5e0
[   42.265531]  kasan_report+0xc8/0x118
[   42.266163]  kasan_check_range+0x100/0x1a8
[   42.266872]  __kasan_check_write+0x20/0x30
[   42.267539]  kasan_atomics_helper+0xeb8/0x4858
[   42.268225]  kasan_atomics+0x198/0x2e8
[   42.268861]  kunit_try_run_case+0x14c/0x3d0
[   42.269567]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   42.270332]  kthread+0x24c/0x2d0
[   42.270932]  ret_from_fork+0x10/0x20
[   42.271517] 
[   42.271902] Allocated by task 254:
[   42.272409]  kasan_save_stack+0x3c/0x68
[   42.273061]  kasan_save_track+0x20/0x40
[   42.273647]  kasan_save_alloc_info+0x40/0x58
[   42.274300]  __kasan_kmalloc+0xd4/0xd8
[   42.274947]  __kmalloc_cache_noprof+0x15c/0x3c8
[   42.275658]  kasan_atomics+0xb8/0x2e8
[   42.276271]  kunit_try_run_case+0x14c/0x3d0
[   42.276881]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   42.277628]  kthread+0x24c/0x2d0
[   42.278147]  ret_from_fork+0x10/0x20
[   42.278779] 
[   42.279087] The buggy address belongs to the object at fff00000c65bde00
[   42.279087]  which belongs to the cache kmalloc-64 of size 64
[   42.280081] The buggy address is located 0 bytes to the right of
[   42.280081]  allocated 48-byte region [fff00000c65bde00, fff00000c65bde30)
[   42.281430] 
[   42.281822] The buggy address belongs to the physical page:
[   42.282403] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065bd
[   42.283284] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   42.284136] page_type: f5(slab)
[   42.284738] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   42.285635] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   42.286371] page dumped because: kasan: bad access detected
[   42.287107] 
[   42.287409] Memory state around the buggy address:
[   42.288042]  fff00000c65bdd00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   42.288877]  fff00000c65bdd80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   42.289683] >fff00000c65bde00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   42.290371]                                      ^
[   42.291026]  fff00000c65bde80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   42.291700]  fff00000c65bdf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   42.292558] ==================================================================

[   32.720732] ==================================================================
[   32.722731] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e0/0x5450
[   32.723966] Read of size 4 at addr ffff8881029f94b0 by task kunit_try_catch/272
[   32.725097] 
[   32.725535] CPU: 1 UID: 0 PID: 272 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241120 #1
[   32.727433] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.727985] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   32.729660] Call Trace:
[   32.729879]  <TASK>
[   32.730186]  dump_stack_lvl+0x73/0xb0
[   32.730603]  print_report+0xd1/0x640
[   32.731563]  ? __virt_addr_valid+0x1db/0x2d0
[   32.732043]  ? kasan_complete_mode_report_info+0x2a/0x200
[   32.732511]  kasan_report+0x102/0x140
[   32.733366]  ? kasan_atomics_helper+0x3e0/0x5450
[   32.733994]  ? kasan_atomics_helper+0x3e0/0x5450
[   32.734782]  kasan_check_range+0x10c/0x1c0
[   32.735543]  __kasan_check_read+0x15/0x20
[   32.736003]  kasan_atomics_helper+0x3e0/0x5450
[   32.737527]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   32.738076]  ? __kmalloc_cache_noprof+0x184/0x410
[   32.738910]  ? kasan_save_alloc_info+0x3b/0x50
[   32.739618]  ? kasan_atomics+0x153/0x310
[   32.740185]  kasan_atomics+0x1dd/0x310
[   32.740597]  ? __pfx_kasan_atomics+0x10/0x10
[   32.741541]  ? __pfx_read_tsc+0x10/0x10
[   32.742476]  ? ktime_get_ts64+0x84/0x230
[   32.743087]  kunit_try_run_case+0x1b3/0x490
[   32.744025]  ? __pfx_kunit_try_run_case+0x10/0x10
[   32.744730]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   32.745455]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   32.745998]  ? __kthread_parkme+0x82/0x160
[   32.746994]  ? preempt_count_sub+0x50/0x80
[   32.747879]  ? __pfx_kunit_try_run_case+0x10/0x10
[   32.748344]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   32.749469]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   32.750079]  kthread+0x257/0x310
[   32.751846]  ? __pfx_kthread+0x10/0x10
[   32.752098]  ret_from_fork+0x41/0x80
[   32.752334]  ? __pfx_kthread+0x10/0x10
[   32.752573]  ret_from_fork_asm+0x1a/0x30
[   32.752899]  </TASK>
[   32.753063] 
[   32.753191] Allocated by task 272:
[   32.753398]  kasan_save_stack+0x3d/0x60
[   32.753644]  kasan_save_track+0x18/0x40
[   32.756009]  kasan_save_alloc_info+0x3b/0x50
[   32.757904]  __kasan_kmalloc+0xb7/0xc0
[   32.759141]  __kmalloc_cache_noprof+0x184/0x410
[   32.760417]  kasan_atomics+0x96/0x310
[   32.761930]  kunit_try_run_case+0x1b3/0x490
[   32.763359]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   32.765005]  kthread+0x257/0x310
[   32.765715]  ret_from_fork+0x41/0x80
[   32.766596]  ret_from_fork_asm+0x1a/0x30
[   32.767036] 
[   32.767296] The buggy address belongs to the object at ffff8881029f9480
[   32.767296]  which belongs to the cache kmalloc-64 of size 64
[   32.769110] The buggy address is located 0 bytes to the right of
[   32.769110]  allocated 48-byte region [ffff8881029f9480, ffff8881029f94b0)
[   32.770582] 
[   32.770991] The buggy address belongs to the physical page:
[   32.771587] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029f9
[   32.772238] flags: 0x200000000000000(node=0|zone=2)
[   32.772601] page_type: f5(slab)
[   32.773331] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   32.773997] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   32.774998] page dumped because: kasan: bad access detected
[   32.775818] 
[   32.775960] Memory state around the buggy address:
[   32.777000]  ffff8881029f9380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.778340]  ffff8881029f9400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.779513] >ffff8881029f9480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   32.780874]                                      ^
[   32.781886]  ffff8881029f9500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.782676]  ffff8881029f9580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.783470] ==================================================================
[   32.839315] ==================================================================
[   32.840099] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a1/0x5450
[   32.841306] Write of size 4 at addr ffff8881029f94b0 by task kunit_try_catch/272
[   32.842739] 
[   32.842951] CPU: 1 UID: 0 PID: 272 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241120 #1
[   32.844328] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.844629] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   32.845850] Call Trace:
[   32.846250]  <TASK>
[   32.846476]  dump_stack_lvl+0x73/0xb0
[   32.846888]  print_report+0xd1/0x640
[   32.847739]  ? __virt_addr_valid+0x1db/0x2d0
[   32.848372]  ? kasan_complete_mode_report_info+0x2a/0x200
[   32.849205]  kasan_report+0x102/0x140
[   32.849576]  ? kasan_atomics_helper+0x4a1/0x5450
[   32.850287]  ? kasan_atomics_helper+0x4a1/0x5450
[   32.851198]  kasan_check_range+0x10c/0x1c0
[   32.851598]  __kasan_check_write+0x18/0x20
[   32.852455]  kasan_atomics_helper+0x4a1/0x5450
[   32.853306]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   32.854496]  ? __kmalloc_cache_noprof+0x184/0x410
[   32.855001]  ? kasan_save_alloc_info+0x3b/0x50
[   32.855560]  ? kasan_atomics+0x153/0x310
[   32.856191]  kasan_atomics+0x1dd/0x310
[   32.856526]  ? __pfx_kasan_atomics+0x10/0x10
[   32.857084]  ? __pfx_read_tsc+0x10/0x10
[   32.857425]  ? ktime_get_ts64+0x84/0x230
[   32.857880]  kunit_try_run_case+0x1b3/0x490
[   32.858465]  ? __pfx_kunit_try_run_case+0x10/0x10
[   32.859023]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   32.859483]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   32.860032]  ? __kthread_parkme+0x82/0x160
[   32.860527]  ? preempt_count_sub+0x50/0x80
[   32.861110]  ? __pfx_kunit_try_run_case+0x10/0x10
[   32.861582]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   32.862268]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   32.863053]  kthread+0x257/0x310
[   32.863454]  ? __pfx_kthread+0x10/0x10
[   32.864052]  ret_from_fork+0x41/0x80
[   32.864340]  ? __pfx_kthread+0x10/0x10
[   32.864917]  ret_from_fork_asm+0x1a/0x30
[   32.865388]  </TASK>
[   32.865790] 
[   32.866314] Allocated by task 272:
[   32.866585]  kasan_save_stack+0x3d/0x60
[   32.867202]  kasan_save_track+0x18/0x40
[   32.867783]  kasan_save_alloc_info+0x3b/0x50
[   32.868156]  __kasan_kmalloc+0xb7/0xc0
[   32.868743]  __kmalloc_cache_noprof+0x184/0x410
[   32.869258]  kasan_atomics+0x96/0x310
[   32.869579]  kunit_try_run_case+0x1b3/0x490
[   32.870243]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   32.870995]  kthread+0x257/0x310
[   32.871298]  ret_from_fork+0x41/0x80
[   32.871898]  ret_from_fork_asm+0x1a/0x30
[   32.872317] 
[   32.872572] The buggy address belongs to the object at ffff8881029f9480
[   32.872572]  which belongs to the cache kmalloc-64 of size 64
[   32.873777] The buggy address is located 0 bytes to the right of
[   32.873777]  allocated 48-byte region [ffff8881029f9480, ffff8881029f94b0)
[   32.874931] 
[   32.875238] The buggy address belongs to the physical page:
[   32.875827] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029f9
[   32.876488] flags: 0x200000000000000(node=0|zone=2)
[   32.877125] page_type: f5(slab)
[   32.877420] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   32.878463] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   32.879360] page dumped because: kasan: bad access detected
[   32.880001] 
[   32.880225] Memory state around the buggy address:
[   32.880656]  ffff8881029f9380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.881276]  ffff8881029f9400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.882132] >ffff8881029f9480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   32.882802]                                      ^
[   32.883384]  ffff8881029f9500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.884119]  ffff8881029f9580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.884849] ==================================================================
[   35.168921] ==================================================================
[   35.169793] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1f44/0x5450
[   35.170243] Write of size 8 at addr ffff8881029f94b0 by task kunit_try_catch/272
[   35.170981] 
[   35.171188] CPU: 1 UID: 0 PID: 272 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241120 #1
[   35.173789] Tainted: [B]=BAD_PAGE, [N]=TEST
[   35.174087] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   35.174669] Call Trace:
[   35.175041]  <TASK>
[   35.175316]  dump_stack_lvl+0x73/0xb0
[   35.175661]  print_report+0xd1/0x640
[   35.176112]  ? __virt_addr_valid+0x1db/0x2d0
[   35.176848]  ? kasan_complete_mode_report_info+0x2a/0x200
[   35.177356]  kasan_report+0x102/0x140
[   35.177825]  ? kasan_atomics_helper+0x1f44/0x5450
[   35.178403]  ? kasan_atomics_helper+0x1f44/0x5450
[   35.178999]  kasan_check_range+0x10c/0x1c0
[   35.179499]  __kasan_check_write+0x18/0x20
[   35.180001]  kasan_atomics_helper+0x1f44/0x5450
[   35.180499]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   35.181114]  ? __kmalloc_cache_noprof+0x184/0x410
[   35.181567]  ? kasan_save_alloc_info+0x3b/0x50
[   35.182097]  ? kasan_atomics+0x153/0x310
[   35.182758]  kasan_atomics+0x1dd/0x310
[   35.183120]  ? __pfx_kasan_atomics+0x10/0x10
[   35.183776]  ? __pfx_read_tsc+0x10/0x10
[   35.184092]  ? ktime_get_ts64+0x84/0x230
[   35.184670]  kunit_try_run_case+0x1b3/0x490
[   35.185165]  ? __pfx_kunit_try_run_case+0x10/0x10
[   35.185685]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   35.186348]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   35.186892]  ? __kthread_parkme+0x82/0x160
[   35.187347]  ? preempt_count_sub+0x50/0x80
[   35.187941]  ? __pfx_kunit_try_run_case+0x10/0x10
[   35.188354]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   35.189129]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   35.189696]  kthread+0x257/0x310
[   35.190211]  ? __pfx_kthread+0x10/0x10
[   35.190784]  ret_from_fork+0x41/0x80
[   35.191077]  ? __pfx_kthread+0x10/0x10
[   35.191645]  ret_from_fork_asm+0x1a/0x30
[   35.192111]  </TASK>
[   35.192470] 
[   35.192746] Allocated by task 272:
[   35.193164]  kasan_save_stack+0x3d/0x60
[   35.193726]  kasan_save_track+0x18/0x40
[   35.194079]  kasan_save_alloc_info+0x3b/0x50
[   35.194547]  __kasan_kmalloc+0xb7/0xc0
[   35.195082]  __kmalloc_cache_noprof+0x184/0x410
[   35.195555]  kasan_atomics+0x96/0x310
[   35.196100]  kunit_try_run_case+0x1b3/0x490
[   35.196716]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   35.197232]  kthread+0x257/0x310
[   35.197730]  ret_from_fork+0x41/0x80
[   35.198085]  ret_from_fork_asm+0x1a/0x30
[   35.198490] 
[   35.198860] The buggy address belongs to the object at ffff8881029f9480
[   35.198860]  which belongs to the cache kmalloc-64 of size 64
[   35.199851] The buggy address is located 0 bytes to the right of
[   35.199851]  allocated 48-byte region [ffff8881029f9480, ffff8881029f94b0)
[   35.201110] 
[   35.201364] The buggy address belongs to the physical page:
[   35.201997] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029f9
[   35.202679] flags: 0x200000000000000(node=0|zone=2)
[   35.203036] page_type: f5(slab)
[   35.203450] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   35.204129] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   35.204931] page dumped because: kasan: bad access detected
[   35.205533] 
[   35.205894] Memory state around the buggy address:
[   35.206480]  ffff8881029f9380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.207280]  ffff8881029f9400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.208041] >ffff8881029f9480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   35.208755]                                      ^
[   35.209121]  ffff8881029f9500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.210511]  ffff8881029f9580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.211054] ==================================================================
[   32.564794] ==================================================================
[   32.565633] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4ba4/0x5450
[   32.566343] Write of size 4 at addr ffff8881029f94b0 by task kunit_try_catch/272
[   32.567292] 
[   32.567896] CPU: 1 UID: 0 PID: 272 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241120 #1
[   32.568480] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.569388] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   32.570116] Call Trace:
[   32.570318]  <TASK>
[   32.571041]  dump_stack_lvl+0x73/0xb0
[   32.571618]  print_report+0xd1/0x640
[   32.572312]  ? __virt_addr_valid+0x1db/0x2d0
[   32.572734]  ? kasan_complete_mode_report_info+0x2a/0x200
[   32.573242]  kasan_report+0x102/0x140
[   32.573625]  ? kasan_atomics_helper+0x4ba4/0x5450
[   32.574891]  ? kasan_atomics_helper+0x4ba4/0x5450
[   32.575543]  __asan_report_store4_noabort+0x1b/0x30
[   32.575964]  kasan_atomics_helper+0x4ba4/0x5450
[   32.576542]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   32.577162]  ? __kmalloc_cache_noprof+0x184/0x410
[   32.577878]  ? kasan_save_alloc_info+0x3b/0x50
[   32.578306]  ? kasan_atomics+0x153/0x310
[   32.578783]  kasan_atomics+0x1dd/0x310
[   32.579333]  ? __pfx_kasan_atomics+0x10/0x10
[   32.580156]  ? __pfx_read_tsc+0x10/0x10
[   32.580681]  ? ktime_get_ts64+0x84/0x230
[   32.581863]  kunit_try_run_case+0x1b3/0x490
[   32.582587]  ? __pfx_kunit_try_run_case+0x10/0x10
[   32.583398]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   32.584384]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   32.585358]  ? __kthread_parkme+0x82/0x160
[   32.585862]  ? preempt_count_sub+0x50/0x80
[   32.586302]  ? __pfx_kunit_try_run_case+0x10/0x10
[   32.586804]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   32.587524]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   32.588043]  kthread+0x257/0x310
[   32.588516]  ? __pfx_kthread+0x10/0x10
[   32.589051]  ret_from_fork+0x41/0x80
[   32.589401]  ? __pfx_kthread+0x10/0x10
[   32.589857]  ret_from_fork_asm+0x1a/0x30
[   32.590450]  </TASK>
[   32.590937] 
[   32.591094] Allocated by task 272:
[   32.591780]  kasan_save_stack+0x3d/0x60
[   32.592063]  kasan_save_track+0x18/0x40
[   32.592482]  kasan_save_alloc_info+0x3b/0x50
[   32.593239]  __kasan_kmalloc+0xb7/0xc0
[   32.593622]  __kmalloc_cache_noprof+0x184/0x410
[   32.594101]  kasan_atomics+0x96/0x310
[   32.594858]  kunit_try_run_case+0x1b3/0x490
[   32.595246]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   32.595985]  kthread+0x257/0x310
[   32.596741]  ret_from_fork+0x41/0x80
[   32.597230]  ret_from_fork_asm+0x1a/0x30
[   32.597532] 
[   32.597764] The buggy address belongs to the object at ffff8881029f9480
[   32.597764]  which belongs to the cache kmalloc-64 of size 64
[   32.598679] The buggy address is located 0 bytes to the right of
[   32.598679]  allocated 48-byte region [ffff8881029f9480, ffff8881029f94b0)
[   32.600287] 
[   32.600466] The buggy address belongs to the physical page:
[   32.601150] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029f9
[   32.601859] flags: 0x200000000000000(node=0|zone=2)
[   32.602182] page_type: f5(slab)
[   32.602852] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   32.603505] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   32.604523] page dumped because: kasan: bad access detected
[   32.605079] 
[   32.605503] Memory state around the buggy address:
[   32.605830]  ffff8881029f9380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.606536]  ffff8881029f9400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.607526] >ffff8881029f9480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   32.608407]                                      ^
[   32.608811]  ffff8881029f9500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.609591]  ffff8881029f9580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.610304] ==================================================================
[   35.446851] ==================================================================
[   35.447881] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x218b/0x5450
[   35.448485] Write of size 8 at addr ffff8881029f94b0 by task kunit_try_catch/272
[   35.449144] 
[   35.449382] CPU: 1 UID: 0 PID: 272 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241120 #1
[   35.450317] Tainted: [B]=BAD_PAGE, [N]=TEST
[   35.450796] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   35.451527] Call Trace:
[   35.452485]  <TASK>
[   35.452804]  dump_stack_lvl+0x73/0xb0
[   35.453083]  print_report+0xd1/0x640
[   35.453401]  ? __virt_addr_valid+0x1db/0x2d0
[   35.453901]  ? kasan_complete_mode_report_info+0x2a/0x200
[   35.454489]  kasan_report+0x102/0x140
[   35.454990]  ? kasan_atomics_helper+0x218b/0x5450
[   35.455515]  ? kasan_atomics_helper+0x218b/0x5450
[   35.456061]  kasan_check_range+0x10c/0x1c0
[   35.456442]  __kasan_check_write+0x18/0x20
[   35.457298]  kasan_atomics_helper+0x218b/0x5450
[   35.457913]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   35.458430]  ? __kmalloc_cache_noprof+0x184/0x410
[   35.458871]  ? kasan_save_alloc_info+0x3b/0x50
[   35.459250]  ? kasan_atomics+0x153/0x310
[   35.459767]  kasan_atomics+0x1dd/0x310
[   35.460143]  ? __pfx_kasan_atomics+0x10/0x10
[   35.460678]  ? __pfx_read_tsc+0x10/0x10
[   35.461074]  ? ktime_get_ts64+0x84/0x230
[   35.461450]  kunit_try_run_case+0x1b3/0x490
[   35.461913]  ? __pfx_kunit_try_run_case+0x10/0x10
[   35.462254]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   35.462871]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   35.463478]  ? __kthread_parkme+0x82/0x160
[   35.463952]  ? preempt_count_sub+0x50/0x80
[   35.464352]  ? __pfx_kunit_try_run_case+0x10/0x10
[   35.464853]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   35.465509]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   35.466473]  kthread+0x257/0x310
[   35.467124]  ? __pfx_kthread+0x10/0x10
[   35.467787]  ret_from_fork+0x41/0x80
[   35.468181]  ? __pfx_kthread+0x10/0x10
[   35.468489]  ret_from_fork_asm+0x1a/0x30
[   35.469136]  </TASK>
[   35.469342] 
[   35.469589] Allocated by task 272:
[   35.470474]  kasan_save_stack+0x3d/0x60
[   35.470945]  kasan_save_track+0x18/0x40
[   35.471334]  kasan_save_alloc_info+0x3b/0x50
[   35.471762]  __kasan_kmalloc+0xb7/0xc0
[   35.472558]  __kmalloc_cache_noprof+0x184/0x410
[   35.473312]  kasan_atomics+0x96/0x310
[   35.473996]  kunit_try_run_case+0x1b3/0x490
[   35.474593]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   35.475252]  kthread+0x257/0x310
[   35.475584]  ret_from_fork+0x41/0x80
[   35.476175]  ret_from_fork_asm+0x1a/0x30
[   35.476590] 
[   35.476972] The buggy address belongs to the object at ffff8881029f9480
[   35.476972]  which belongs to the cache kmalloc-64 of size 64
[   35.477804] The buggy address is located 0 bytes to the right of
[   35.477804]  allocated 48-byte region [ffff8881029f9480, ffff8881029f94b0)
[   35.479744] 
[   35.479912] The buggy address belongs to the physical page:
[   35.480620] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029f9
[   35.481820] flags: 0x200000000000000(node=0|zone=2)
[   35.482438] page_type: f5(slab)
[   35.482932] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   35.483660] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   35.484604] page dumped because: kasan: bad access detected
[   35.485169] 
[   35.485418] Memory state around the buggy address:
[   35.486235]  ffff8881029f9380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.487043]  ffff8881029f9400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.488211] >ffff8881029f9480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   35.488846]                                      ^
[   35.489249]  ffff8881029f9500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.489859]  ffff8881029f9580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.490653] ==================================================================
[   33.558591] ==================================================================
[   33.559529] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xd48/0x5450
[   33.560043] Write of size 4 at addr ffff8881029f94b0 by task kunit_try_catch/272
[   33.560552] 
[   33.562632] CPU: 1 UID: 0 PID: 272 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241120 #1
[   33.563745] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.564266] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   33.565220] Call Trace:
[   33.565555]  <TASK>
[   33.565929]  dump_stack_lvl+0x73/0xb0
[   33.566429]  print_report+0xd1/0x640
[   33.566943]  ? __virt_addr_valid+0x1db/0x2d0
[   33.567443]  ? kasan_complete_mode_report_info+0x2a/0x200
[   33.568077]  kasan_report+0x102/0x140
[   33.568533]  ? kasan_atomics_helper+0xd48/0x5450
[   33.569116]  ? kasan_atomics_helper+0xd48/0x5450
[   33.569728]  kasan_check_range+0x10c/0x1c0
[   33.570130]  __kasan_check_write+0x18/0x20
[   33.570667]  kasan_atomics_helper+0xd48/0x5450
[   33.571148]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   33.571813]  ? __kmalloc_cache_noprof+0x184/0x410
[   33.572234]  ? kasan_save_alloc_info+0x3b/0x50
[   33.572754]  ? kasan_atomics+0x153/0x310
[   33.573151]  kasan_atomics+0x1dd/0x310
[   33.573614]  ? __pfx_kasan_atomics+0x10/0x10
[   33.574173]  ? __pfx_read_tsc+0x10/0x10
[   33.574744]  ? ktime_get_ts64+0x84/0x230
[   33.575233]  kunit_try_run_case+0x1b3/0x490
[   33.576463]  ? __pfx_kunit_try_run_case+0x10/0x10
[   33.577286]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   33.577808]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   33.578168]  ? __kthread_parkme+0x82/0x160
[   33.578762]  ? preempt_count_sub+0x50/0x80
[   33.579140]  ? __pfx_kunit_try_run_case+0x10/0x10
[   33.579582]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   33.580314]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   33.581429]  kthread+0x257/0x310
[   33.581869]  ? __pfx_kthread+0x10/0x10
[   33.582524]  ret_from_fork+0x41/0x80
[   33.583007]  ? __pfx_kthread+0x10/0x10
[   33.583418]  ret_from_fork_asm+0x1a/0x30
[   33.584541]  </TASK>
[   33.584757] 
[   33.584944] Allocated by task 272:
[   33.585887]  kasan_save_stack+0x3d/0x60
[   33.586548]  kasan_save_track+0x18/0x40
[   33.586932]  kasan_save_alloc_info+0x3b/0x50
[   33.587360]  __kasan_kmalloc+0xb7/0xc0
[   33.588304]  __kmalloc_cache_noprof+0x184/0x410
[   33.588724]  kasan_atomics+0x96/0x310
[   33.589278]  kunit_try_run_case+0x1b3/0x490
[   33.590129]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   33.590613]  kthread+0x257/0x310
[   33.591256]  ret_from_fork+0x41/0x80
[   33.591442]  ret_from_fork_asm+0x1a/0x30
[   33.591632] 
[   33.591804] The buggy address belongs to the object at ffff8881029f9480
[   33.591804]  which belongs to the cache kmalloc-64 of size 64
[   33.593379] The buggy address is located 0 bytes to the right of
[   33.593379]  allocated 48-byte region [ffff8881029f9480, ffff8881029f94b0)
[   33.594590] 
[   33.594893] The buggy address belongs to the physical page:
[   33.595411] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029f9
[   33.596460] flags: 0x200000000000000(node=0|zone=2)
[   33.597098] page_type: f5(slab)
[   33.597730] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   33.598365] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   33.599211] page dumped because: kasan: bad access detected
[   33.600263] 
[   33.600715] Memory state around the buggy address:
[   33.601048]  ffff8881029f9380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.601639]  ffff8881029f9400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.602425] >ffff8881029f9480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   33.603028]                                      ^
[   33.603457]  ffff8881029f9500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.604053]  ffff8881029f9580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.604896] ==================================================================
[   34.008183] ==================================================================
[   34.009346] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1218/0x5450
[   34.010083] Write of size 4 at addr ffff8881029f94b0 by task kunit_try_catch/272
[   34.011571] 
[   34.011878] CPU: 1 UID: 0 PID: 272 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241120 #1
[   34.013240] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.013923] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   34.014636] Call Trace:
[   34.015360]  <TASK>
[   34.015875]  dump_stack_lvl+0x73/0xb0
[   34.016492]  print_report+0xd1/0x640
[   34.017012]  ? __virt_addr_valid+0x1db/0x2d0
[   34.017776]  ? kasan_complete_mode_report_info+0x2a/0x200
[   34.018323]  kasan_report+0x102/0x140
[   34.019068]  ? kasan_atomics_helper+0x1218/0x5450
[   34.019737]  ? kasan_atomics_helper+0x1218/0x5450
[   34.020424]  kasan_check_range+0x10c/0x1c0
[   34.021091]  __kasan_check_write+0x18/0x20
[   34.021567]  kasan_atomics_helper+0x1218/0x5450
[   34.022361]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   34.023281]  ? __kmalloc_cache_noprof+0x184/0x410
[   34.024135]  ? kasan_save_alloc_info+0x3b/0x50
[   34.024739]  ? kasan_atomics+0x153/0x310
[   34.025262]  kasan_atomics+0x1dd/0x310
[   34.026356]  ? __pfx_kasan_atomics+0x10/0x10
[   34.026766]  ? __pfx_read_tsc+0x10/0x10
[   34.027384]  ? ktime_get_ts64+0x84/0x230
[   34.027972]  kunit_try_run_case+0x1b3/0x490
[   34.028407]  ? __pfx_kunit_try_run_case+0x10/0x10
[   34.029257]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   34.029738]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   34.030463]  ? __kthread_parkme+0x82/0x160
[   34.031079]  ? preempt_count_sub+0x50/0x80
[   34.031564]  ? __pfx_kunit_try_run_case+0x10/0x10
[   34.032142]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   34.033279]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   34.033747]  kthread+0x257/0x310
[   34.034353]  ? __pfx_kthread+0x10/0x10
[   34.035083]  ret_from_fork+0x41/0x80
[   34.035491]  ? __pfx_kthread+0x10/0x10
[   34.035901]  ret_from_fork_asm+0x1a/0x30
[   34.036333]  </TASK>
[   34.036527] 
[   34.036808] Allocated by task 272:
[   34.037235]  kasan_save_stack+0x3d/0x60
[   34.037629]  kasan_save_track+0x18/0x40
[   34.038551]  kasan_save_alloc_info+0x3b/0x50
[   34.038999]  __kasan_kmalloc+0xb7/0xc0
[   34.039395]  __kmalloc_cache_noprof+0x184/0x410
[   34.040042]  kasan_atomics+0x96/0x310
[   34.040392]  kunit_try_run_case+0x1b3/0x490
[   34.040998]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   34.041583]  kthread+0x257/0x310
[   34.041994]  ret_from_fork+0x41/0x80
[   34.042466]  ret_from_fork_asm+0x1a/0x30
[   34.042987] 
[   34.043245] The buggy address belongs to the object at ffff8881029f9480
[   34.043245]  which belongs to the cache kmalloc-64 of size 64
[   34.044347] The buggy address is located 0 bytes to the right of
[   34.044347]  allocated 48-byte region [ffff8881029f9480, ffff8881029f94b0)
[   34.045524] 
[   34.045895] The buggy address belongs to the physical page:
[   34.046364] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029f9
[   34.047233] flags: 0x200000000000000(node=0|zone=2)
[   34.047765] page_type: f5(slab)
[   34.048239] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   34.048913] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   34.049747] page dumped because: kasan: bad access detected
[   34.050318] 
[   34.050549] Memory state around the buggy address:
[   34.051083]  ffff8881029f9380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   34.051941]  ffff8881029f9400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   34.052474] >ffff8881029f9480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   34.053300]                                      ^
[   34.053732]  ffff8881029f9500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.054535]  ffff8881029f9580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.055245] ==================================================================
[   32.518648] ==================================================================
[   32.519618] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4bbe/0x5450
[   32.520233] Read of size 4 at addr ffff8881029f94b0 by task kunit_try_catch/272
[   32.520935] 
[   32.521108] CPU: 1 UID: 0 PID: 272 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241120 #1
[   32.522689] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.523520] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   32.524590] Call Trace:
[   32.525055]  <TASK>
[   32.526047]  dump_stack_lvl+0x73/0xb0
[   32.526506]  print_report+0xd1/0x640
[   32.527191]  ? __virt_addr_valid+0x1db/0x2d0
[   32.528060]  ? kasan_complete_mode_report_info+0x2a/0x200
[   32.529015]  kasan_report+0x102/0x140
[   32.529466]  ? kasan_atomics_helper+0x4bbe/0x5450
[   32.529975]  ? kasan_atomics_helper+0x4bbe/0x5450
[   32.530490]  __asan_report_load4_noabort+0x18/0x20
[   32.531028]  kasan_atomics_helper+0x4bbe/0x5450
[   32.531544]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   32.532241]  ? __kmalloc_cache_noprof+0x184/0x410
[   32.532810]  ? kasan_save_alloc_info+0x3b/0x50
[   32.533240]  ? kasan_atomics+0x153/0x310
[   32.533676]  kasan_atomics+0x1dd/0x310
[   32.534305]  ? __pfx_kasan_atomics+0x10/0x10
[   32.534928]  ? __pfx_read_tsc+0x10/0x10
[   32.535327]  ? ktime_get_ts64+0x84/0x230
[   32.535674]  kunit_try_run_case+0x1b3/0x490
[   32.536202]  ? __pfx_kunit_try_run_case+0x10/0x10
[   32.536815]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   32.537444]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   32.538091]  ? __kthread_parkme+0x82/0x160
[   32.538494]  ? preempt_count_sub+0x50/0x80
[   32.538822]  ? __pfx_kunit_try_run_case+0x10/0x10
[   32.539869]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   32.540641]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   32.541263]  kthread+0x257/0x310
[   32.541853]  ? __pfx_kthread+0x10/0x10
[   32.542312]  ret_from_fork+0x41/0x80
[   32.542762]  ? __pfx_kthread+0x10/0x10
[   32.543260]  ret_from_fork_asm+0x1a/0x30
[   32.543592]  </TASK>
[   32.544288] 
[   32.544500] Allocated by task 272:
[   32.544856]  kasan_save_stack+0x3d/0x60
[   32.545338]  kasan_save_track+0x18/0x40
[   32.545821]  kasan_save_alloc_info+0x3b/0x50
[   32.546531]  __kasan_kmalloc+0xb7/0xc0
[   32.546833]  __kmalloc_cache_noprof+0x184/0x410
[   32.547414]  kasan_atomics+0x96/0x310
[   32.547926]  kunit_try_run_case+0x1b3/0x490
[   32.548564]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   32.548953]  kthread+0x257/0x310
[   32.549200]  ret_from_fork+0x41/0x80
[   32.549783]  ret_from_fork_asm+0x1a/0x30
[   32.550477] 
[   32.550771] The buggy address belongs to the object at ffff8881029f9480
[   32.550771]  which belongs to the cache kmalloc-64 of size 64
[   32.551756] The buggy address is located 0 bytes to the right of
[   32.551756]  allocated 48-byte region [ffff8881029f9480, ffff8881029f94b0)
[   32.553174] 
[   32.553553] The buggy address belongs to the physical page:
[   32.554098] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029f9
[   32.555074] flags: 0x200000000000000(node=0|zone=2)
[   32.555419] page_type: f5(slab)
[   32.555673] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   32.556529] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   32.557137] page dumped because: kasan: bad access detected
[   32.557838] 
[   32.558064] Memory state around the buggy address:
[   32.558377]  ffff8881029f9380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.559470]  ffff8881029f9400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.560420] >ffff8881029f9480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   32.561099]                                      ^
[   32.561424]  ffff8881029f9500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.562238]  ffff8881029f9580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.563057] ==================================================================
[   34.147248] ==================================================================
[   34.148076] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x49d0/0x5450
[   34.148689] Read of size 4 at addr ffff8881029f94b0 by task kunit_try_catch/272
[   34.149169] 
[   34.149431] CPU: 1 UID: 0 PID: 272 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241120 #1
[   34.150437] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.150774] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   34.151685] Call Trace:
[   34.151917]  <TASK>
[   34.152107]  dump_stack_lvl+0x73/0xb0
[   34.152587]  print_report+0xd1/0x640
[   34.153114]  ? __virt_addr_valid+0x1db/0x2d0
[   34.153688]  ? kasan_complete_mode_report_info+0x2a/0x200
[   34.154227]  kasan_report+0x102/0x140
[   34.154727]  ? kasan_atomics_helper+0x49d0/0x5450
[   34.155058]  ? kasan_atomics_helper+0x49d0/0x5450
[   34.155745]  __asan_report_load4_noabort+0x18/0x20
[   34.156237]  kasan_atomics_helper+0x49d0/0x5450
[   34.156740]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   34.157309]  ? __kmalloc_cache_noprof+0x184/0x410
[   34.157893]  ? kasan_save_alloc_info+0x3b/0x50
[   34.158260]  ? kasan_atomics+0x153/0x310
[   34.158592]  kasan_atomics+0x1dd/0x310
[   34.159163]  ? __pfx_kasan_atomics+0x10/0x10
[   34.159675]  ? __pfx_read_tsc+0x10/0x10
[   34.160175]  ? ktime_get_ts64+0x84/0x230
[   34.160589]  kunit_try_run_case+0x1b3/0x490
[   34.160979]  ? __pfx_kunit_try_run_case+0x10/0x10
[   34.161574]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   34.162188]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   34.162660]  ? __kthread_parkme+0x82/0x160
[   34.162985]  ? preempt_count_sub+0x50/0x80
[   34.163444]  ? __pfx_kunit_try_run_case+0x10/0x10
[   34.163891]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   34.164354]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   34.165065]  kthread+0x257/0x310
[   34.165379]  ? __pfx_kthread+0x10/0x10
[   34.165827]  ret_from_fork+0x41/0x80
[   34.166281]  ? __pfx_kthread+0x10/0x10
[   34.166568]  ret_from_fork_asm+0x1a/0x30
[   34.167138]  </TASK>
[   34.167412] 
[   34.167738] Allocated by task 272:
[   34.168130]  kasan_save_stack+0x3d/0x60
[   34.168518]  kasan_save_track+0x18/0x40
[   34.169049]  kasan_save_alloc_info+0x3b/0x50
[   34.169380]  __kasan_kmalloc+0xb7/0xc0
[   34.169728]  __kmalloc_cache_noprof+0x184/0x410
[   34.170285]  kasan_atomics+0x96/0x310
[   34.170867]  kunit_try_run_case+0x1b3/0x490
[   34.171328]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   34.172781]  kthread+0x257/0x310
[   34.173040]  ret_from_fork+0x41/0x80
[   34.173343]  ret_from_fork_asm+0x1a/0x30
[   34.174270] 
[   34.174425] The buggy address belongs to the object at ffff8881029f9480
[   34.174425]  which belongs to the cache kmalloc-64 of size 64
[   34.175472] The buggy address is located 0 bytes to the right of
[   34.175472]  allocated 48-byte region [ffff8881029f9480, ffff8881029f94b0)
[   34.177284] 
[   34.177538] The buggy address belongs to the physical page:
[   34.178357] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029f9
[   34.179934] flags: 0x200000000000000(node=0|zone=2)
[   34.180920] page_type: f5(slab)
[   34.181528] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   34.182523] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   34.183473] page dumped because: kasan: bad access detected
[   34.183893] 
[   34.184153] Memory state around the buggy address:
[   34.184569]  ffff8881029f9380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   34.185279]  ffff8881029f9400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   34.186316] >ffff8881029f9480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   34.186991]                                      ^
[   34.187599]  ffff8881029f9500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.188393]  ffff8881029f9580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.189096] ==================================================================
[   33.325479] ==================================================================
[   33.327310] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa2c/0x5450
[   33.328128] Write of size 4 at addr ffff8881029f94b0 by task kunit_try_catch/272
[   33.328772] 
[   33.328993] CPU: 1 UID: 0 PID: 272 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241120 #1
[   33.329812] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.330201] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   33.331040] Call Trace:
[   33.331252]  <TASK>
[   33.331541]  dump_stack_lvl+0x73/0xb0
[   33.332093]  print_report+0xd1/0x640
[   33.332476]  ? __virt_addr_valid+0x1db/0x2d0
[   33.332936]  ? kasan_complete_mode_report_info+0x2a/0x200
[   33.333353]  kasan_report+0x102/0x140
[   33.333890]  ? kasan_atomics_helper+0xa2c/0x5450
[   33.334449]  ? kasan_atomics_helper+0xa2c/0x5450
[   33.335026]  kasan_check_range+0x10c/0x1c0
[   33.335351]  __kasan_check_write+0x18/0x20
[   33.335934]  kasan_atomics_helper+0xa2c/0x5450
[   33.336350]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   33.336832]  ? __kmalloc_cache_noprof+0x184/0x410
[   33.337155]  ? kasan_save_alloc_info+0x3b/0x50
[   33.337779]  ? kasan_atomics+0x153/0x310
[   33.338297]  kasan_atomics+0x1dd/0x310
[   33.338853]  ? __pfx_kasan_atomics+0x10/0x10
[   33.339331]  ? __pfx_read_tsc+0x10/0x10
[   33.339792]  ? ktime_get_ts64+0x84/0x230
[   33.340292]  kunit_try_run_case+0x1b3/0x490
[   33.340654]  ? __pfx_kunit_try_run_case+0x10/0x10
[   33.341197]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   33.341770]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   33.342337]  ? __kthread_parkme+0x82/0x160
[   33.342758]  ? preempt_count_sub+0x50/0x80
[   33.343230]  ? __pfx_kunit_try_run_case+0x10/0x10
[   33.343818]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   33.344214]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   33.344925]  kthread+0x257/0x310
[   33.345354]  ? __pfx_kthread+0x10/0x10
[   33.345814]  ret_from_fork+0x41/0x80
[   33.346268]  ? __pfx_kthread+0x10/0x10
[   33.346742]  ret_from_fork_asm+0x1a/0x30
[   33.347245]  </TASK>
[   33.347440] 
[   33.347727] Allocated by task 272:
[   33.348138]  kasan_save_stack+0x3d/0x60
[   33.348655]  kasan_save_track+0x18/0x40
[   33.349062]  kasan_save_alloc_info+0x3b/0x50
[   33.349642]  __kasan_kmalloc+0xb7/0xc0
[   33.349963]  __kmalloc_cache_noprof+0x184/0x410
[   33.350487]  kasan_atomics+0x96/0x310
[   33.350890]  kunit_try_run_case+0x1b3/0x490
[   33.351310]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   33.351845]  kthread+0x257/0x310
[   33.352201]  ret_from_fork+0x41/0x80
[   33.352678]  ret_from_fork_asm+0x1a/0x30
[   33.353125] 
[   33.353321] The buggy address belongs to the object at ffff8881029f9480
[   33.353321]  which belongs to the cache kmalloc-64 of size 64
[   33.354223] The buggy address is located 0 bytes to the right of
[   33.354223]  allocated 48-byte region [ffff8881029f9480, ffff8881029f94b0)
[   33.355484] 
[   33.356376] The buggy address belongs to the physical page:
[   33.356858] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029f9
[   33.357458] flags: 0x200000000000000(node=0|zone=2)
[   33.358589] page_type: f5(slab)
[   33.359427] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   33.360089] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   33.360678] page dumped because: kasan: bad access detected
[   33.361117] 
[   33.361366] Memory state around the buggy address:
[   33.361750]  ffff8881029f9380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.362492]  ffff8881029f9400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.363535] >ffff8881029f9480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   33.364486]                                      ^
[   33.364893]  ffff8881029f9500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.365420]  ffff8881029f9580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.366477] ==================================================================
[   33.081454] ==================================================================
[   33.082495] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x730/0x5450
[   33.083369] Write of size 4 at addr ffff8881029f94b0 by task kunit_try_catch/272
[   33.084199] 
[   33.084454] CPU: 1 UID: 0 PID: 272 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241120 #1
[   33.085469] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.086017] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   33.086861] Call Trace:
[   33.087084]  <TASK>
[   33.087278]  dump_stack_lvl+0x73/0xb0
[   33.087878]  print_report+0xd1/0x640
[   33.088335]  ? __virt_addr_valid+0x1db/0x2d0
[   33.088878]  ? kasan_complete_mode_report_info+0x2a/0x200
[   33.089532]  kasan_report+0x102/0x140
[   33.089978]  ? kasan_atomics_helper+0x730/0x5450
[   33.090582]  ? kasan_atomics_helper+0x730/0x5450
[   33.091030]  kasan_check_range+0x10c/0x1c0
[   33.091565]  __kasan_check_write+0x18/0x20
[   33.092118]  kasan_atomics_helper+0x730/0x5450
[   33.092537]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   33.093277]  ? __kmalloc_cache_noprof+0x184/0x410
[   33.093815]  ? kasan_save_alloc_info+0x3b/0x50
[   33.094327]  ? kasan_atomics+0x153/0x310
[   33.094897]  kasan_atomics+0x1dd/0x310
[   33.095366]  ? __pfx_kasan_atomics+0x10/0x10
[   33.096023]  ? __pfx_read_tsc+0x10/0x10
[   33.096372]  ? ktime_get_ts64+0x84/0x230
[   33.096949]  kunit_try_run_case+0x1b3/0x490
[   33.097481]  ? __pfx_kunit_try_run_case+0x10/0x10
[   33.098030]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   33.098679]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   33.099318]  ? __kthread_parkme+0x82/0x160
[   33.099873]  ? preempt_count_sub+0x50/0x80
[   33.100339]  ? __pfx_kunit_try_run_case+0x10/0x10
[   33.100961]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   33.101570]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   33.102278]  kthread+0x257/0x310
[   33.102681]  ? __pfx_kthread+0x10/0x10
[   33.103222]  ret_from_fork+0x41/0x80
[   33.103717]  ? __pfx_kthread+0x10/0x10
[   33.104205]  ret_from_fork_asm+0x1a/0x30
[   33.104819]  </TASK>
[   33.105086] 
[   33.105320] Allocated by task 272:
[   33.105650]  kasan_save_stack+0x3d/0x60
[   33.106963]  kasan_save_track+0x18/0x40
[   33.107304]  kasan_save_alloc_info+0x3b/0x50
[   33.107755]  __kasan_kmalloc+0xb7/0xc0
[   33.108157]  __kmalloc_cache_noprof+0x184/0x410
[   33.108562]  kasan_atomics+0x96/0x310
[   33.109023]  kunit_try_run_case+0x1b3/0x490
[   33.109430]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   33.110645]  kthread+0x257/0x310
[   33.111097]  ret_from_fork+0x41/0x80
[   33.111908]  ret_from_fork_asm+0x1a/0x30
[   33.112176] 
[   33.112455] The buggy address belongs to the object at ffff8881029f9480
[   33.112455]  which belongs to the cache kmalloc-64 of size 64
[   33.114352] The buggy address is located 0 bytes to the right of
[   33.114352]  allocated 48-byte region [ffff8881029f9480, ffff8881029f94b0)
[   33.116046] 
[   33.116198] The buggy address belongs to the physical page:
[   33.117245] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029f9
[   33.117831] flags: 0x200000000000000(node=0|zone=2)
[   33.118509] page_type: f5(slab)
[   33.118997] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   33.120113] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   33.120694] page dumped because: kasan: bad access detected
[   33.121402] 
[   33.121722] Memory state around the buggy address:
[   33.122438]  ffff8881029f9380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.123293]  ffff8881029f9400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.124086] >ffff8881029f9480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   33.125068]                                      ^
[   33.125747]  ffff8881029f9500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.126439]  ffff8881029f9580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.127552] ==================================================================
[   33.182687] ==================================================================
[   33.183955] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x861/0x5450
[   33.184934] Write of size 4 at addr ffff8881029f94b0 by task kunit_try_catch/272
[   33.186177] 
[   33.186383] CPU: 1 UID: 0 PID: 272 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241120 #1
[   33.187813] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.188288] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   33.189365] Call Trace:
[   33.189921]  <TASK>
[   33.190219]  dump_stack_lvl+0x73/0xb0
[   33.191057]  print_report+0xd1/0x640
[   33.191457]  ? __virt_addr_valid+0x1db/0x2d0
[   33.192171]  ? kasan_complete_mode_report_info+0x2a/0x200
[   33.192680]  kasan_report+0x102/0x140
[   33.193438]  ? kasan_atomics_helper+0x861/0x5450
[   33.194002]  ? kasan_atomics_helper+0x861/0x5450
[   33.194495]  kasan_check_range+0x10c/0x1c0
[   33.195404]  __kasan_check_write+0x18/0x20
[   33.196093]  kasan_atomics_helper+0x861/0x5450
[   33.196564]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   33.197469]  ? __kmalloc_cache_noprof+0x184/0x410
[   33.198158]  ? kasan_save_alloc_info+0x3b/0x50
[   33.198908]  ? kasan_atomics+0x153/0x310
[   33.199298]  kasan_atomics+0x1dd/0x310
[   33.199688]  ? __pfx_kasan_atomics+0x10/0x10
[   33.200518]  ? __pfx_read_tsc+0x10/0x10
[   33.201130]  ? ktime_get_ts64+0x84/0x230
[   33.201872]  kunit_try_run_case+0x1b3/0x490
[   33.202521]  ? __pfx_kunit_try_run_case+0x10/0x10
[   33.203143]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   33.203832]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   33.204443]  ? __kthread_parkme+0x82/0x160
[   33.205181]  ? preempt_count_sub+0x50/0x80
[   33.205851]  ? __pfx_kunit_try_run_case+0x10/0x10
[   33.206519]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   33.207110]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   33.208025]  kthread+0x257/0x310
[   33.208594]  ? __pfx_kthread+0x10/0x10
[   33.209286]  ret_from_fork+0x41/0x80
[   33.210014]  ? __pfx_kthread+0x10/0x10
[   33.210430]  ret_from_fork_asm+0x1a/0x30
[   33.210922]  </TASK>
[   33.211187] 
[   33.211390] Allocated by task 272:
[   33.212427]  kasan_save_stack+0x3d/0x60
[   33.212817]  kasan_save_track+0x18/0x40
[   33.213514]  kasan_save_alloc_info+0x3b/0x50
[   33.213892]  __kasan_kmalloc+0xb7/0xc0
[   33.214694]  __kmalloc_cache_noprof+0x184/0x410
[   33.215201]  kasan_atomics+0x96/0x310
[   33.215890]  kunit_try_run_case+0x1b3/0x490
[   33.216575]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   33.217429]  kthread+0x257/0x310
[   33.217737]  ret_from_fork+0x41/0x80
[   33.218437]  ret_from_fork_asm+0x1a/0x30
[   33.218951] 
[   33.219193] The buggy address belongs to the object at ffff8881029f9480
[   33.219193]  which belongs to the cache kmalloc-64 of size 64
[   33.220873] The buggy address is located 0 bytes to the right of
[   33.220873]  allocated 48-byte region [ffff8881029f9480, ffff8881029f94b0)
[   33.222637] 
[   33.223041] The buggy address belongs to the physical page:
[   33.223646] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029f9
[   33.224738] flags: 0x200000000000000(node=0|zone=2)
[   33.225271] page_type: f5(slab)
[   33.226194] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   33.226879] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   33.227556] page dumped because: kasan: bad access detected
[   33.228439] 
[   33.228742] Memory state around the buggy address:
[   33.229397]  ffff8881029f9380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.230402]  ffff8881029f9400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.231075] >ffff8881029f9480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   33.231928]                                      ^
[   33.232448]  ffff8881029f9500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.233399]  ffff8881029f9580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.234301] ==================================================================
[   33.235232] ==================================================================
[   33.237136] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x8fa/0x5450
[   33.237786] Write of size 4 at addr ffff8881029f94b0 by task kunit_try_catch/272
[   33.238846] 
[   33.239124] CPU: 1 UID: 0 PID: 272 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241120 #1
[   33.240399] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.240779] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   33.241869] Call Trace:
[   33.242239]  <TASK>
[   33.242451]  dump_stack_lvl+0x73/0xb0
[   33.242984]  print_report+0xd1/0x640
[   33.243454]  ? __virt_addr_valid+0x1db/0x2d0
[   33.244258]  ? kasan_complete_mode_report_info+0x2a/0x200
[   33.244774]  kasan_report+0x102/0x140
[   33.245279]  ? kasan_atomics_helper+0x8fa/0x5450
[   33.246015]  ? kasan_atomics_helper+0x8fa/0x5450
[   33.246444]  kasan_check_range+0x10c/0x1c0
[   33.247194]  __kasan_check_write+0x18/0x20
[   33.247678]  kasan_atomics_helper+0x8fa/0x5450
[   33.248158]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   33.248783]  ? __kmalloc_cache_noprof+0x184/0x410
[   33.249399]  ? kasan_save_alloc_info+0x3b/0x50
[   33.250091]  ? kasan_atomics+0x153/0x310
[   33.250590]  kasan_atomics+0x1dd/0x310
[   33.251097]  ? __pfx_kasan_atomics+0x10/0x10
[   33.251791]  ? __pfx_read_tsc+0x10/0x10
[   33.252205]  ? ktime_get_ts64+0x84/0x230
[   33.252671]  kunit_try_run_case+0x1b3/0x490
[   33.253092]  ? __pfx_kunit_try_run_case+0x10/0x10
[   33.253665]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   33.254165]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   33.254534]  ? __kthread_parkme+0x82/0x160
[   33.255057]  ? preempt_count_sub+0x50/0x80
[   33.255604]  ? __pfx_kunit_try_run_case+0x10/0x10
[   33.256287]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   33.256962]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   33.257597]  kthread+0x257/0x310
[   33.258010]  ? __pfx_kthread+0x10/0x10
[   33.258438]  ret_from_fork+0x41/0x80
[   33.258933]  ? __pfx_kthread+0x10/0x10
[   33.259548]  ret_from_fork_asm+0x1a/0x30
[   33.260084]  </TASK>
[   33.260342] 
[   33.260592] Allocated by task 272:
[   33.261018]  kasan_save_stack+0x3d/0x60
[   33.261413]  kasan_save_track+0x18/0x40
[   33.261904]  kasan_save_alloc_info+0x3b/0x50
[   33.262621]  __kasan_kmalloc+0xb7/0xc0
[   33.263044]  __kmalloc_cache_noprof+0x184/0x410
[   33.263354]  kasan_atomics+0x96/0x310
[   33.263722]  kunit_try_run_case+0x1b3/0x490
[   33.264359]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   33.264874]  kthread+0x257/0x310
[   33.265230]  ret_from_fork+0x41/0x80
[   33.265545]  ret_from_fork_asm+0x1a/0x30
[   33.266389] 
[   33.266549] The buggy address belongs to the object at ffff8881029f9480
[   33.266549]  which belongs to the cache kmalloc-64 of size 64
[   33.267331] The buggy address is located 0 bytes to the right of
[   33.267331]  allocated 48-byte region [ffff8881029f9480, ffff8881029f94b0)
[   33.269563] 
[   33.269942] The buggy address belongs to the physical page:
[   33.270352] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029f9
[   33.271133] flags: 0x200000000000000(node=0|zone=2)
[   33.271590] page_type: f5(slab)
[   33.271929] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   33.272636] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   33.273222] page dumped because: kasan: bad access detected
[   33.273733] 
[   33.273984] Memory state around the buggy address:
[   33.274318]  ffff8881029f9380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.275070]  ffff8881029f9400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.275569] >ffff8881029f9480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   33.276376]                                      ^
[   33.276831]  ffff8881029f9500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.277431]  ffff8881029f9580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.277958] ==================================================================
[   34.704921] ==================================================================
[   34.705984] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x194b/0x5450
[   34.706731] Write of size 8 at addr ffff8881029f94b0 by task kunit_try_catch/272
[   34.707299] 
[   34.707627] CPU: 1 UID: 0 PID: 272 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241120 #1
[   34.708833] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.709246] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   34.710311] Call Trace:
[   34.710645]  <TASK>
[   34.710862]  dump_stack_lvl+0x73/0xb0
[   34.711425]  print_report+0xd1/0x640
[   34.712130]  ? __virt_addr_valid+0x1db/0x2d0
[   34.712526]  ? kasan_complete_mode_report_info+0x2a/0x200
[   34.713061]  kasan_report+0x102/0x140
[   34.713494]  ? kasan_atomics_helper+0x194b/0x5450
[   34.713995]  ? kasan_atomics_helper+0x194b/0x5450
[   34.714726]  kasan_check_range+0x10c/0x1c0
[   34.715222]  __kasan_check_write+0x18/0x20
[   34.715644]  kasan_atomics_helper+0x194b/0x5450
[   34.716730]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   34.717312]  ? __kmalloc_cache_noprof+0x184/0x410
[   34.717763]  ? kasan_save_alloc_info+0x3b/0x50
[   34.718245]  ? kasan_atomics+0x153/0x310
[   34.718820]  kasan_atomics+0x1dd/0x310
[   34.719132]  ? __pfx_kasan_atomics+0x10/0x10
[   34.719753]  ? __pfx_read_tsc+0x10/0x10
[   34.720075]  ? ktime_get_ts64+0x84/0x230
[   34.720522]  kunit_try_run_case+0x1b3/0x490
[   34.721136]  ? __pfx_kunit_try_run_case+0x10/0x10
[   34.721669]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   34.722158]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   34.722544]  ? __kthread_parkme+0x82/0x160
[   34.723077]  ? preempt_count_sub+0x50/0x80
[   34.723576]  ? __pfx_kunit_try_run_case+0x10/0x10
[   34.724031]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   34.724663]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   34.725291]  kthread+0x257/0x310
[   34.725561]  ? __pfx_kthread+0x10/0x10
[   34.726023]  ret_from_fork+0x41/0x80
[   34.726516]  ? __pfx_kthread+0x10/0x10
[   34.727049]  ret_from_fork_asm+0x1a/0x30
[   34.727463]  </TASK>
[   34.727754] 
[   34.727916] Allocated by task 272:
[   34.728265]  kasan_save_stack+0x3d/0x60
[   34.728829]  kasan_save_track+0x18/0x40
[   34.729260]  kasan_save_alloc_info+0x3b/0x50
[   34.729725]  __kasan_kmalloc+0xb7/0xc0
[   34.730077]  __kmalloc_cache_noprof+0x184/0x410
[   34.730392]  kasan_atomics+0x96/0x310
[   34.730917]  kunit_try_run_case+0x1b3/0x490
[   34.731423]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   34.732108]  kthread+0x257/0x310
[   34.732380]  ret_from_fork+0x41/0x80
[   34.732766]  ret_from_fork_asm+0x1a/0x30
[   34.733212] 
[   34.733374] The buggy address belongs to the object at ffff8881029f9480
[   34.733374]  which belongs to the cache kmalloc-64 of size 64
[   34.734535] The buggy address is located 0 bytes to the right of
[   34.734535]  allocated 48-byte region [ffff8881029f9480, ffff8881029f94b0)
[   34.735587] 
[   34.735898] The buggy address belongs to the physical page:
[   34.736400] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029f9
[   34.737116] flags: 0x200000000000000(node=0|zone=2)
[   34.737649] page_type: f5(slab)
[   34.738021] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   34.738576] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   34.739301] page dumped because: kasan: bad access detected
[   34.739756] 
[   34.740017] Memory state around the buggy address:
[   34.740480]  ffff8881029f9380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   34.741113]  ffff8881029f9400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   34.741834] >ffff8881029f9480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   34.742286]                                      ^
[   34.742806]  ffff8881029f9500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.743594]  ffff8881029f9580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.744239] ==================================================================
[   35.491974] ==================================================================
[   35.493738] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4fa7/0x5450
[   35.495176] Read of size 8 at addr ffff8881029f94b0 by task kunit_try_catch/272
[   35.496155] 
[   35.496999] CPU: 1 UID: 0 PID: 272 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241120 #1
[   35.498125] Tainted: [B]=BAD_PAGE, [N]=TEST
[   35.498398] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   35.500028] Call Trace:
[   35.500275]  <TASK>
[   35.500462]  dump_stack_lvl+0x73/0xb0
[   35.501244]  print_report+0xd1/0x640
[   35.501939]  ? __virt_addr_valid+0x1db/0x2d0
[   35.502380]  ? kasan_complete_mode_report_info+0x2a/0x200
[   35.503290]  kasan_report+0x102/0x140
[   35.503823]  ? kasan_atomics_helper+0x4fa7/0x5450
[   35.504058]  ? kasan_atomics_helper+0x4fa7/0x5450
[   35.504279]  __asan_report_load8_noabort+0x18/0x20
[   35.504491]  kasan_atomics_helper+0x4fa7/0x5450
[   35.504871]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   35.505606]  ? __kmalloc_cache_noprof+0x184/0x410
[   35.506464]  ? kasan_save_alloc_info+0x3b/0x50
[   35.507003]  ? kasan_atomics+0x153/0x310
[   35.507526]  kasan_atomics+0x1dd/0x310
[   35.508062]  ? __pfx_kasan_atomics+0x10/0x10
[   35.508536]  ? __pfx_read_tsc+0x10/0x10
[   35.508996]  ? ktime_get_ts64+0x84/0x230
[   35.509411]  kunit_try_run_case+0x1b3/0x490
[   35.510032]  ? __pfx_kunit_try_run_case+0x10/0x10
[   35.510444]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   35.510978]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   35.511436]  ? __kthread_parkme+0x82/0x160
[   35.511839]  ? preempt_count_sub+0x50/0x80
[   35.512183]  ? __pfx_kunit_try_run_case+0x10/0x10
[   35.512755]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   35.513242]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   35.513794]  kthread+0x257/0x310
[   35.514232]  ? __pfx_kthread+0x10/0x10
[   35.514523]  ret_from_fork+0x41/0x80
[   35.514881]  ? __pfx_kthread+0x10/0x10
[   35.515318]  ret_from_fork_asm+0x1a/0x30
[   35.515877]  </TASK>
[   35.516177] 
[   35.516375] Allocated by task 272:
[   35.516666]  kasan_save_stack+0x3d/0x60
[   35.516969]  kasan_save_track+0x18/0x40
[   35.517397]  kasan_save_alloc_info+0x3b/0x50
[   35.517985]  __kasan_kmalloc+0xb7/0xc0
[   35.518458]  __kmalloc_cache_noprof+0x184/0x410
[   35.518992]  kasan_atomics+0x96/0x310
[   35.519365]  kunit_try_run_case+0x1b3/0x490
[   35.519935]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   35.520418]  kthread+0x257/0x310
[   35.520750]  ret_from_fork+0x41/0x80
[   35.521244]  ret_from_fork_asm+0x1a/0x30
[   35.521663] 
[   35.521894] The buggy address belongs to the object at ffff8881029f9480
[   35.521894]  which belongs to the cache kmalloc-64 of size 64
[   35.522845] The buggy address is located 0 bytes to the right of
[   35.522845]  allocated 48-byte region [ffff8881029f9480, ffff8881029f94b0)
[   35.524106] 
[   35.524294] The buggy address belongs to the physical page:
[   35.524898] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029f9
[   35.525346] flags: 0x200000000000000(node=0|zone=2)
[   35.525923] page_type: f5(slab)
[   35.526357] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   35.527135] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   35.527876] page dumped because: kasan: bad access detected
[   35.528384] 
[   35.528584] Memory state around the buggy address:
[   35.529143]  ffff8881029f9380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.529763]  ffff8881029f9400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.530356] >ffff8881029f9480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   35.530874]                                      ^
[   35.531179]  ffff8881029f9500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.532048]  ffff8881029f9580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.532785] ==================================================================
[   34.515830] ==================================================================
[   34.516363] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x16e8/0x5450
[   34.517230] Write of size 8 at addr ffff8881029f94b0 by task kunit_try_catch/272
[   34.518121] 
[   34.518404] CPU: 1 UID: 0 PID: 272 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241120 #1
[   34.519213] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.519489] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   34.520768] Call Trace:
[   34.521233]  <TASK>
[   34.521687]  dump_stack_lvl+0x73/0xb0
[   34.522213]  print_report+0xd1/0x640
[   34.522576]  ? __virt_addr_valid+0x1db/0x2d0
[   34.523273]  ? kasan_complete_mode_report_info+0x2a/0x200
[   34.524047]  kasan_report+0x102/0x140
[   34.524571]  ? kasan_atomics_helper+0x16e8/0x5450
[   34.525274]  ? kasan_atomics_helper+0x16e8/0x5450
[   34.525906]  kasan_check_range+0x10c/0x1c0
[   34.526429]  __kasan_check_write+0x18/0x20
[   34.527040]  kasan_atomics_helper+0x16e8/0x5450
[   34.527580]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   34.528239]  ? __kmalloc_cache_noprof+0x184/0x410
[   34.528869]  ? kasan_save_alloc_info+0x3b/0x50
[   34.529404]  ? kasan_atomics+0x153/0x310
[   34.529988]  kasan_atomics+0x1dd/0x310
[   34.530409]  ? __pfx_kasan_atomics+0x10/0x10
[   34.531118]  ? __pfx_read_tsc+0x10/0x10
[   34.531563]  ? ktime_get_ts64+0x84/0x230
[   34.532131]  kunit_try_run_case+0x1b3/0x490
[   34.532750]  ? __pfx_kunit_try_run_case+0x10/0x10
[   34.533258]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   34.533905]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   34.534448]  ? __kthread_parkme+0x82/0x160
[   34.535151]  ? preempt_count_sub+0x50/0x80
[   34.535745]  ? __pfx_kunit_try_run_case+0x10/0x10
[   34.536268]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   34.537157]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   34.537867]  kthread+0x257/0x310
[   34.538386]  ? __pfx_kthread+0x10/0x10
[   34.538686]  ret_from_fork+0x41/0x80
[   34.539283]  ? __pfx_kthread+0x10/0x10
[   34.539899]  ret_from_fork_asm+0x1a/0x30
[   34.540347]  </TASK>
[   34.540603] 
[   34.540779] Allocated by task 272:
[   34.541217]  kasan_save_stack+0x3d/0x60
[   34.541584]  kasan_save_track+0x18/0x40
[   34.542135]  kasan_save_alloc_info+0x3b/0x50
[   34.542448]  __kasan_kmalloc+0xb7/0xc0
[   34.542747]  __kmalloc_cache_noprof+0x184/0x410
[   34.543391]  kasan_atomics+0x96/0x310
[   34.544143]  kunit_try_run_case+0x1b3/0x490
[   34.544761]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   34.545131]  kthread+0x257/0x310
[   34.545385]  ret_from_fork+0x41/0x80
[   34.546163]  ret_from_fork_asm+0x1a/0x30
[   34.546836] 
[   34.547061] The buggy address belongs to the object at ffff8881029f9480
[   34.547061]  which belongs to the cache kmalloc-64 of size 64
[   34.548427] The buggy address is located 0 bytes to the right of
[   34.548427]  allocated 48-byte region [ffff8881029f9480, ffff8881029f94b0)
[   34.549910] 
[   34.550194] The buggy address belongs to the physical page:
[   34.550968] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029f9
[   34.551975] flags: 0x200000000000000(node=0|zone=2)
[   34.552677] page_type: f5(slab)
[   34.553294] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   34.554237] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   34.555062] page dumped because: kasan: bad access detected
[   34.555798] 
[   34.556129] Memory state around the buggy address:
[   34.556665]  ffff8881029f9380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   34.557395]  ffff8881029f9400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   34.558373] >ffff8881029f9480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   34.559033]                                      ^
[   34.559643]  ffff8881029f9500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.560426]  ffff8881029f9580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.561306] ==================================================================
[   34.745369] ==================================================================
[   34.746123] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x19e4/0x5450
[   34.746698] Write of size 8 at addr ffff8881029f94b0 by task kunit_try_catch/272
[   34.747468] 
[   34.748751] CPU: 1 UID: 0 PID: 272 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241120 #1
[   34.749397] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.749580] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   34.750767] Call Trace:
[   34.751056]  <TASK>
[   34.751315]  dump_stack_lvl+0x73/0xb0
[   34.752162]  print_report+0xd1/0x640
[   34.753342]  ? __virt_addr_valid+0x1db/0x2d0
[   34.754000]  ? kasan_complete_mode_report_info+0x2a/0x200
[   34.754721]  kasan_report+0x102/0x140
[   34.755382]  ? kasan_atomics_helper+0x19e4/0x5450
[   34.756274]  ? kasan_atomics_helper+0x19e4/0x5450
[   34.756683]  kasan_check_range+0x10c/0x1c0
[   34.757340]  __kasan_check_write+0x18/0x20
[   34.758255]  kasan_atomics_helper+0x19e4/0x5450
[   34.759320]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   34.760152]  ? __kmalloc_cache_noprof+0x184/0x410
[   34.761054]  ? kasan_save_alloc_info+0x3b/0x50
[   34.761511]  ? kasan_atomics+0x153/0x310
[   34.762243]  kasan_atomics+0x1dd/0x310
[   34.763026]  ? __pfx_kasan_atomics+0x10/0x10
[   34.763469]  ? __pfx_read_tsc+0x10/0x10
[   34.763924]  ? ktime_get_ts64+0x84/0x230
[   34.765952]  kunit_try_run_case+0x1b3/0x490
[   34.766587]  ? __pfx_kunit_try_run_case+0x10/0x10
[   34.767120]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   34.767438]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   34.768244]  ? __kthread_parkme+0x82/0x160
[   34.768614]  ? preempt_count_sub+0x50/0x80
[   34.769161]  ? __pfx_kunit_try_run_case+0x10/0x10
[   34.769898]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   34.770374]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   34.770849]  kthread+0x257/0x310
[   34.771295]  ? __pfx_kthread+0x10/0x10
[   34.771735]  ret_from_fork+0x41/0x80
[   34.772115]  ? __pfx_kthread+0x10/0x10
[   34.772421]  ret_from_fork_asm+0x1a/0x30
[   34.773082]  </TASK>
[   34.773310] 
[   34.773559] Allocated by task 272:
[   34.774068]  kasan_save_stack+0x3d/0x60
[   34.774367]  kasan_save_track+0x18/0x40
[   34.774645]  kasan_save_alloc_info+0x3b/0x50
[   34.775346]  __kasan_kmalloc+0xb7/0xc0
[   34.776015]  __kmalloc_cache_noprof+0x184/0x410
[   34.776474]  kasan_atomics+0x96/0x310
[   34.776850]  kunit_try_run_case+0x1b3/0x490
[   34.777147]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   34.777596]  kthread+0x257/0x310
[   34.778058]  ret_from_fork+0x41/0x80
[   34.778399]  ret_from_fork_asm+0x1a/0x30
[   34.778684] 
[   34.778864] The buggy address belongs to the object at ffff8881029f9480
[   34.778864]  which belongs to the cache kmalloc-64 of size 64
[   34.780129] The buggy address is located 0 bytes to the right of
[   34.780129]  allocated 48-byte region [ffff8881029f9480, ffff8881029f94b0)
[   34.782736] 
[   34.783129] The buggy address belongs to the physical page:
[   34.783686] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029f9
[   34.784308] flags: 0x200000000000000(node=0|zone=2)
[   34.785071] page_type: f5(slab)
[   34.785419] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   34.786238] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   34.787518] page dumped because: kasan: bad access detected
[   34.788661] 
[   34.789005] Memory state around the buggy address:
[   34.789555]  ffff8881029f9380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   34.790466]  ffff8881029f9400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   34.791144] >ffff8881029f9480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   34.791420]                                      ^
[   34.791631]  ffff8881029f9500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.792316]  ffff8881029f9580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.792768] ==================================================================
[   33.031613] ==================================================================
[   33.032478] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x698/0x5450
[   33.033578] Write of size 4 at addr ffff8881029f94b0 by task kunit_try_catch/272
[   33.035218] 
[   33.035412] CPU: 1 UID: 0 PID: 272 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241120 #1
[   33.036907] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.037623] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   33.038535] Call Trace:
[   33.039258]  <TASK>
[   33.039543]  dump_stack_lvl+0x73/0xb0
[   33.040245]  print_report+0xd1/0x640
[   33.040845]  ? __virt_addr_valid+0x1db/0x2d0
[   33.041422]  ? kasan_complete_mode_report_info+0x2a/0x200
[   33.042201]  kasan_report+0x102/0x140
[   33.043095]  ? kasan_atomics_helper+0x698/0x5450
[   33.043538]  ? kasan_atomics_helper+0x698/0x5450
[   33.044331]  kasan_check_range+0x10c/0x1c0
[   33.045094]  __kasan_check_write+0x18/0x20
[   33.045683]  kasan_atomics_helper+0x698/0x5450
[   33.046367]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   33.046876]  ? __kmalloc_cache_noprof+0x184/0x410
[   33.047673]  ? kasan_save_alloc_info+0x3b/0x50
[   33.048045]  ? kasan_atomics+0x153/0x310
[   33.048729]  kasan_atomics+0x1dd/0x310
[   33.049183]  ? __pfx_kasan_atomics+0x10/0x10
[   33.050038]  ? __pfx_read_tsc+0x10/0x10
[   33.050354]  ? ktime_get_ts64+0x84/0x230
[   33.051317]  kunit_try_run_case+0x1b3/0x490
[   33.052258]  ? __pfx_kunit_try_run_case+0x10/0x10
[   33.052645]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   33.053326]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   33.054085]  ? __kthread_parkme+0x82/0x160
[   33.054642]  ? preempt_count_sub+0x50/0x80
[   33.055296]  ? __pfx_kunit_try_run_case+0x10/0x10
[   33.055998]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   33.056852]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   33.057494]  kthread+0x257/0x310
[   33.058066]  ? __pfx_kthread+0x10/0x10
[   33.058613]  ret_from_fork+0x41/0x80
[   33.059068]  ? __pfx_kthread+0x10/0x10
[   33.059455]  ret_from_fork_asm+0x1a/0x30
[   33.060284]  </TASK>
[   33.060529] 
[   33.060680] Allocated by task 272:
[   33.061498]  kasan_save_stack+0x3d/0x60
[   33.062199]  kasan_save_track+0x18/0x40
[   33.062794]  kasan_save_alloc_info+0x3b/0x50
[   33.063306]  __kasan_kmalloc+0xb7/0xc0
[   33.063665]  __kmalloc_cache_noprof+0x184/0x410
[   33.064117]  kasan_atomics+0x96/0x310
[   33.064491]  kunit_try_run_case+0x1b3/0x490
[   33.065477]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   33.066162]  kthread+0x257/0x310
[   33.066790]  ret_from_fork+0x41/0x80
[   33.067357]  ret_from_fork_asm+0x1a/0x30
[   33.068137] 
[   33.068323] The buggy address belongs to the object at ffff8881029f9480
[   33.068323]  which belongs to the cache kmalloc-64 of size 64
[   33.069355] The buggy address is located 0 bytes to the right of
[   33.069355]  allocated 48-byte region [ffff8881029f9480, ffff8881029f94b0)
[   33.070594] 
[   33.070905] The buggy address belongs to the physical page:
[   33.071442] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029f9
[   33.072274] flags: 0x200000000000000(node=0|zone=2)
[   33.072713] page_type: f5(slab)
[   33.073268] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   33.073931] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   33.074644] page dumped because: kasan: bad access detected
[   33.075103] 
[   33.075261] Memory state around the buggy address:
[   33.075764]  ffff8881029f9380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.076803]  ffff8881029f9400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.077463] >ffff8881029f9480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   33.078169]                                      ^
[   33.078818]  ffff8881029f9500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.079449]  ffff8881029f9580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.080173] ==================================================================
[   32.668922] ==================================================================
[   32.670292] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b70/0x5450
[   32.671446] Write of size 4 at addr ffff8881029f94b0 by task kunit_try_catch/272
[   32.673045] 
[   32.673214] CPU: 1 UID: 0 PID: 272 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241120 #1
[   32.675267] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.675765] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   32.677022] Call Trace:
[   32.677391]  <TASK>
[   32.677872]  dump_stack_lvl+0x73/0xb0
[   32.678590]  print_report+0xd1/0x640
[   32.679526]  ? __virt_addr_valid+0x1db/0x2d0
[   32.680161]  ? kasan_complete_mode_report_info+0x2a/0x200
[   32.681047]  kasan_report+0x102/0x140
[   32.681399]  ? kasan_atomics_helper+0x4b70/0x5450
[   32.681843]  ? kasan_atomics_helper+0x4b70/0x5450
[   32.682299]  __asan_report_store4_noabort+0x1b/0x30
[   32.683404]  kasan_atomics_helper+0x4b70/0x5450
[   32.683927]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   32.684528]  ? __kmalloc_cache_noprof+0x184/0x410
[   32.685147]  ? kasan_save_alloc_info+0x3b/0x50
[   32.685990]  ? kasan_atomics+0x153/0x310
[   32.686614]  kasan_atomics+0x1dd/0x310
[   32.687057]  ? __pfx_kasan_atomics+0x10/0x10
[   32.688324]  ? __pfx_read_tsc+0x10/0x10
[   32.688926]  ? ktime_get_ts64+0x84/0x230
[   32.689667]  kunit_try_run_case+0x1b3/0x490
[   32.690097]  ? __pfx_kunit_try_run_case+0x10/0x10
[   32.690535]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   32.691455]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   32.691929]  ? __kthread_parkme+0x82/0x160
[   32.692883]  ? preempt_count_sub+0x50/0x80
[   32.693840]  ? __pfx_kunit_try_run_case+0x10/0x10
[   32.694243]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   32.695095]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   32.696055]  kthread+0x257/0x310
[   32.696772]  ? __pfx_kthread+0x10/0x10
[   32.697331]  ret_from_fork+0x41/0x80
[   32.698388]  ? __pfx_kthread+0x10/0x10
[   32.698797]  ret_from_fork_asm+0x1a/0x30
[   32.699219]  </TASK>
[   32.699475] 
[   32.699650] Allocated by task 272:
[   32.700751]  kasan_save_stack+0x3d/0x60
[   32.701350]  kasan_save_track+0x18/0x40
[   32.701971]  kasan_save_alloc_info+0x3b/0x50
[   32.702509]  __kasan_kmalloc+0xb7/0xc0
[   32.703151]  __kmalloc_cache_noprof+0x184/0x410
[   32.703571]  kasan_atomics+0x96/0x310
[   32.703954]  kunit_try_run_case+0x1b3/0x490
[   32.704348]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   32.704955]  kthread+0x257/0x310
[   32.705204]  ret_from_fork+0x41/0x80
[   32.706205]  ret_from_fork_asm+0x1a/0x30
[   32.706885] 
[   32.707038] The buggy address belongs to the object at ffff8881029f9480
[   32.707038]  which belongs to the cache kmalloc-64 of size 64
[   32.708222] The buggy address is located 0 bytes to the right of
[   32.708222]  allocated 48-byte region [ffff8881029f9480, ffff8881029f94b0)
[   32.709038] 
[   32.709323] The buggy address belongs to the physical page:
[   32.710061] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029f9
[   32.710845] flags: 0x200000000000000(node=0|zone=2)
[   32.711161] page_type: f5(slab)
[   32.711719] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   32.712646] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   32.713284] page dumped because: kasan: bad access detected
[   32.713633] 
[   32.714171] Memory state around the buggy address:
[   32.715006]  ffff8881029f9380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.715945]  ffff8881029f9400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.716566] >ffff8881029f9480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   32.717730]                                      ^
[   32.718186]  ffff8881029f9500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.718938]  ffff8881029f9580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.719819] ==================================================================
[   33.736417] ==================================================================
[   33.737684] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xfaa/0x5450
[   33.738249] Write of size 4 at addr ffff8881029f94b0 by task kunit_try_catch/272
[   33.739306] 
[   33.739547] CPU: 1 UID: 0 PID: 272 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241120 #1
[   33.740548] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.741145] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   33.742122] Call Trace:
[   33.742334]  <TASK>
[   33.742755]  dump_stack_lvl+0x73/0xb0
[   33.743341]  print_report+0xd1/0x640
[   33.744052]  ? __virt_addr_valid+0x1db/0x2d0
[   33.744585]  ? kasan_complete_mode_report_info+0x2a/0x200
[   33.745095]  kasan_report+0x102/0x140
[   33.745798]  ? kasan_atomics_helper+0xfaa/0x5450
[   33.746329]  ? kasan_atomics_helper+0xfaa/0x5450
[   33.747048]  kasan_check_range+0x10c/0x1c0
[   33.747801]  __kasan_check_write+0x18/0x20
[   33.748024]  kasan_atomics_helper+0xfaa/0x5450
[   33.748235]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   33.748454]  ? __kmalloc_cache_noprof+0x184/0x410
[   33.748923]  ? kasan_save_alloc_info+0x3b/0x50
[   33.749931]  ? kasan_atomics+0x153/0x310
[   33.750794]  kasan_atomics+0x1dd/0x310
[   33.751452]  ? __pfx_kasan_atomics+0x10/0x10
[   33.752018]  ? __pfx_read_tsc+0x10/0x10
[   33.752419]  ? ktime_get_ts64+0x84/0x230
[   33.752861]  kunit_try_run_case+0x1b3/0x490
[   33.753776]  ? __pfx_kunit_try_run_case+0x10/0x10
[   33.754447]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   33.755293]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   33.755904]  ? __kthread_parkme+0x82/0x160
[   33.756454]  ? preempt_count_sub+0x50/0x80
[   33.757007]  ? __pfx_kunit_try_run_case+0x10/0x10
[   33.757432]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   33.758150]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   33.758770]  kthread+0x257/0x310
[   33.759227]  ? __pfx_kthread+0x10/0x10
[   33.759658]  ret_from_fork+0x41/0x80
[   33.760001]  ? __pfx_kthread+0x10/0x10
[   33.760359]  ret_from_fork_asm+0x1a/0x30
[   33.760796]  </TASK>
[   33.761115] 
[   33.761327] Allocated by task 272:
[   33.761655]  kasan_save_stack+0x3d/0x60
[   33.762005]  kasan_save_track+0x18/0x40
[   33.762343]  kasan_save_alloc_info+0x3b/0x50
[   33.762927]  __kasan_kmalloc+0xb7/0xc0
[   33.763347]  __kmalloc_cache_noprof+0x184/0x410
[   33.763843]  kasan_atomics+0x96/0x310
[   33.764127]  kunit_try_run_case+0x1b3/0x490
[   33.764582]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   33.765241]  kthread+0x257/0x310
[   33.765642]  ret_from_fork+0x41/0x80
[   33.766069]  ret_from_fork_asm+0x1a/0x30
[   33.766357] 
[   33.766512] The buggy address belongs to the object at ffff8881029f9480
[   33.766512]  which belongs to the cache kmalloc-64 of size 64
[   33.767897] The buggy address is located 0 bytes to the right of
[   33.767897]  allocated 48-byte region [ffff8881029f9480, ffff8881029f94b0)
[   33.768782] 
[   33.768942] The buggy address belongs to the physical page:
[   33.769525] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029f9
[   33.770321] flags: 0x200000000000000(node=0|zone=2)
[   33.770845] page_type: f5(slab)
[   33.771126] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   33.771837] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   33.772369] page dumped because: kasan: bad access detected
[   33.772765] 
[   33.773024] Memory state around the buggy address:
[   33.773581]  ffff8881029f9380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.774317]  ffff8881029f9400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.774823] >ffff8881029f9480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   33.775243]                                      ^
[   33.775843]  ffff8881029f9500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.776580]  ffff8881029f9580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.777401] ==================================================================
[   33.368141] ==================================================================
[   33.370323] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xac8/0x5450
[   33.371140] Write of size 4 at addr ffff8881029f94b0 by task kunit_try_catch/272
[   33.372294] 
[   33.372518] CPU: 1 UID: 0 PID: 272 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241120 #1
[   33.373857] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.374382] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   33.375387] Call Trace:
[   33.375663]  <TASK>
[   33.375862]  dump_stack_lvl+0x73/0xb0
[   33.376565]  print_report+0xd1/0x640
[   33.377126]  ? __virt_addr_valid+0x1db/0x2d0
[   33.377583]  ? kasan_complete_mode_report_info+0x2a/0x200
[   33.378809]  kasan_report+0x102/0x140
[   33.379411]  ? kasan_atomics_helper+0xac8/0x5450
[   33.380126]  ? kasan_atomics_helper+0xac8/0x5450
[   33.380819]  kasan_check_range+0x10c/0x1c0
[   33.381429]  __kasan_check_write+0x18/0x20
[   33.382547]  kasan_atomics_helper+0xac8/0x5450
[   33.383048]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   33.383553]  ? __kmalloc_cache_noprof+0x184/0x410
[   33.384152]  ? kasan_save_alloc_info+0x3b/0x50
[   33.384607]  ? kasan_atomics+0x153/0x310
[   33.385580]  kasan_atomics+0x1dd/0x310
[   33.386297]  ? __pfx_kasan_atomics+0x10/0x10
[   33.386851]  ? __pfx_read_tsc+0x10/0x10
[   33.387265]  ? ktime_get_ts64+0x84/0x230
[   33.387799]  kunit_try_run_case+0x1b3/0x490
[   33.388255]  ? __pfx_kunit_try_run_case+0x10/0x10
[   33.388984]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   33.389637]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   33.390233]  ? __kthread_parkme+0x82/0x160
[   33.390993]  ? preempt_count_sub+0x50/0x80
[   33.391445]  ? __pfx_kunit_try_run_case+0x10/0x10
[   33.392532]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   33.393247]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   33.393811]  kthread+0x257/0x310
[   33.394133]  ? __pfx_kthread+0x10/0x10
[   33.394618]  ret_from_fork+0x41/0x80
[   33.395092]  ? __pfx_kthread+0x10/0x10
[   33.395428]  ret_from_fork_asm+0x1a/0x30
[   33.396099]  </TASK>
[   33.396329] 
[   33.396603] Allocated by task 272:
[   33.397020]  kasan_save_stack+0x3d/0x60
[   33.397350]  kasan_save_track+0x18/0x40
[   33.397892]  kasan_save_alloc_info+0x3b/0x50
[   33.398265]  __kasan_kmalloc+0xb7/0xc0
[   33.398542]  __kmalloc_cache_noprof+0x184/0x410
[   33.399419]  kasan_atomics+0x96/0x310
[   33.400187]  kunit_try_run_case+0x1b3/0x490
[   33.400870]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   33.401440]  kthread+0x257/0x310
[   33.402446]  ret_from_fork+0x41/0x80
[   33.403013]  ret_from_fork_asm+0x1a/0x30
[   33.403501] 
[   33.403678] The buggy address belongs to the object at ffff8881029f9480
[   33.403678]  which belongs to the cache kmalloc-64 of size 64
[   33.404815] The buggy address is located 0 bytes to the right of
[   33.404815]  allocated 48-byte region [ffff8881029f9480, ffff8881029f94b0)
[   33.406024] 
[   33.406196] The buggy address belongs to the physical page:
[   33.406910] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029f9
[   33.407571] flags: 0x200000000000000(node=0|zone=2)
[   33.408069] page_type: f5(slab)
[   33.408490] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   33.409192] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   33.409799] page dumped because: kasan: bad access detected
[   33.410620] 
[   33.410889] Memory state around the buggy address:
[   33.411474]  ffff8881029f9380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.412111]  ffff8881029f9400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.412989] >ffff8881029f9480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   33.413493]                                      ^
[   33.414229]  ffff8881029f9500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.414996]  ffff8881029f9580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.415650] ==================================================================
[   35.069492] ==================================================================
[   35.071175] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1e13/0x5450
[   35.071990] Write of size 8 at addr ffff8881029f94b0 by task kunit_try_catch/272
[   35.073290] 
[   35.073477] CPU: 1 UID: 0 PID: 272 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241120 #1
[   35.074699] Tainted: [B]=BAD_PAGE, [N]=TEST
[   35.075313] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   35.076419] Call Trace:
[   35.076781]  <TASK>
[   35.077129]  dump_stack_lvl+0x73/0xb0
[   35.077416]  print_report+0xd1/0x640
[   35.077877]  ? __virt_addr_valid+0x1db/0x2d0
[   35.078568]  ? kasan_complete_mode_report_info+0x2a/0x200
[   35.079281]  kasan_report+0x102/0x140
[   35.079751]  ? kasan_atomics_helper+0x1e13/0x5450
[   35.080296]  ? kasan_atomics_helper+0x1e13/0x5450
[   35.080885]  kasan_check_range+0x10c/0x1c0
[   35.081415]  __kasan_check_write+0x18/0x20
[   35.082087]  kasan_atomics_helper+0x1e13/0x5450
[   35.082495]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   35.083160]  ? __kmalloc_cache_noprof+0x184/0x410
[   35.083780]  ? kasan_save_alloc_info+0x3b/0x50
[   35.084166]  ? kasan_atomics+0x153/0x310
[   35.084738]  kasan_atomics+0x1dd/0x310
[   35.085124]  ? __pfx_kasan_atomics+0x10/0x10
[   35.085688]  ? __pfx_read_tsc+0x10/0x10
[   35.086237]  ? ktime_get_ts64+0x84/0x230
[   35.086770]  kunit_try_run_case+0x1b3/0x490
[   35.087305]  ? __pfx_kunit_try_run_case+0x10/0x10
[   35.087805]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   35.088329]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   35.088746]  ? __kthread_parkme+0x82/0x160
[   35.089212]  ? preempt_count_sub+0x50/0x80
[   35.089698]  ? __pfx_kunit_try_run_case+0x10/0x10
[   35.090139]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   35.090682]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   35.091283]  kthread+0x257/0x310
[   35.091573]  ? __pfx_kthread+0x10/0x10
[   35.092134]  ret_from_fork+0x41/0x80
[   35.092562]  ? __pfx_kthread+0x10/0x10
[   35.093063]  ret_from_fork_asm+0x1a/0x30
[   35.093560]  </TASK>
[   35.094001] 
[   35.094258] Allocated by task 272:
[   35.094734]  kasan_save_stack+0x3d/0x60
[   35.095285]  kasan_save_track+0x18/0x40
[   35.095905]  kasan_save_alloc_info+0x3b/0x50
[   35.096256]  __kasan_kmalloc+0xb7/0xc0
[   35.096862]  __kmalloc_cache_noprof+0x184/0x410
[   35.097273]  kasan_atomics+0x96/0x310
[   35.097887]  kunit_try_run_case+0x1b3/0x490
[   35.098363]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   35.098970]  kthread+0x257/0x310
[   35.099440]  ret_from_fork+0x41/0x80
[   35.099946]  ret_from_fork_asm+0x1a/0x30
[   35.100521] 
[   35.100799] The buggy address belongs to the object at ffff8881029f9480
[   35.100799]  which belongs to the cache kmalloc-64 of size 64
[   35.101964] The buggy address is located 0 bytes to the right of
[   35.101964]  allocated 48-byte region [ffff8881029f9480, ffff8881029f94b0)
[   35.103202] 
[   35.103496] The buggy address belongs to the physical page:
[   35.104088] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029f9
[   35.104816] flags: 0x200000000000000(node=0|zone=2)
[   35.105349] page_type: f5(slab)
[   35.105810] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   35.106525] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   35.107306] page dumped because: kasan: bad access detected
[   35.107771] 
[   35.108081] Memory state around the buggy address:
[   35.108583]  ffff8881029f9380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.109302]  ffff8881029f9400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.110026] >ffff8881029f9480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   35.110975]                                      ^
[   35.111532]  ffff8881029f9500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.112375]  ffff8881029f9580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.113407] ==================================================================
[   34.278294] ==================================================================
[   34.279021] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1468/0x5450
[   34.279747] Write of size 8 at addr ffff8881029f94b0 by task kunit_try_catch/272
[   34.280453] 
[   34.280776] CPU: 1 UID: 0 PID: 272 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241120 #1
[   34.281746] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.282170] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   34.282955] Call Trace:
[   34.283341]  <TASK>
[   34.283715]  dump_stack_lvl+0x73/0xb0
[   34.284072]  print_report+0xd1/0x640
[   34.284524]  ? __virt_addr_valid+0x1db/0x2d0
[   34.285213]  ? kasan_complete_mode_report_info+0x2a/0x200
[   34.285848]  kasan_report+0x102/0x140
[   34.286147]  ? kasan_atomics_helper+0x1468/0x5450
[   34.286871]  ? kasan_atomics_helper+0x1468/0x5450
[   34.287302]  kasan_check_range+0x10c/0x1c0
[   34.287952]  __kasan_check_write+0x18/0x20
[   34.288404]  kasan_atomics_helper+0x1468/0x5450
[   34.289021]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   34.289447]  ? __kmalloc_cache_noprof+0x184/0x410
[   34.289959]  ? kasan_save_alloc_info+0x3b/0x50
[   34.290296]  ? kasan_atomics+0x153/0x310
[   34.290869]  kasan_atomics+0x1dd/0x310
[   34.291454]  ? __pfx_kasan_atomics+0x10/0x10
[   34.291861]  ? __pfx_read_tsc+0x10/0x10
[   34.292388]  ? ktime_get_ts64+0x84/0x230
[   34.293000]  kunit_try_run_case+0x1b3/0x490
[   34.293476]  ? __pfx_kunit_try_run_case+0x10/0x10
[   34.294038]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   34.294674]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   34.295226]  ? __kthread_parkme+0x82/0x160
[   34.295694]  ? preempt_count_sub+0x50/0x80
[   34.296234]  ? __pfx_kunit_try_run_case+0x10/0x10
[   34.296850]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   34.297384]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   34.298143]  kthread+0x257/0x310
[   34.298509]  ? __pfx_kthread+0x10/0x10
[   34.299033]  ret_from_fork+0x41/0x80
[   34.299880]  ? __pfx_kthread+0x10/0x10
[   34.300300]  ret_from_fork_asm+0x1a/0x30
[   34.301198]  </TASK>
[   34.301619] 
[   34.301886] Allocated by task 272:
[   34.302590]  kasan_save_stack+0x3d/0x60
[   34.302899]  kasan_save_track+0x18/0x40
[   34.303487]  kasan_save_alloc_info+0x3b/0x50
[   34.304448]  __kasan_kmalloc+0xb7/0xc0
[   34.305099]  __kmalloc_cache_noprof+0x184/0x410
[   34.305634]  kasan_atomics+0x96/0x310
[   34.306328]  kunit_try_run_case+0x1b3/0x490
[   34.307137]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   34.307578]  kthread+0x257/0x310
[   34.308173]  ret_from_fork+0x41/0x80
[   34.308536]  ret_from_fork_asm+0x1a/0x30
[   34.309380] 
[   34.309573] The buggy address belongs to the object at ffff8881029f9480
[   34.309573]  which belongs to the cache kmalloc-64 of size 64
[   34.311320] The buggy address is located 0 bytes to the right of
[   34.311320]  allocated 48-byte region [ffff8881029f9480, ffff8881029f94b0)
[   34.312688] 
[   34.312891] The buggy address belongs to the physical page:
[   34.313541] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029f9
[   34.315092] flags: 0x200000000000000(node=0|zone=2)
[   34.315506] page_type: f5(slab)
[   34.315946] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   34.317069] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   34.318011] page dumped because: kasan: bad access detected
[   34.318656] 
[   34.318990] Memory state around the buggy address:
[   34.319779]  ffff8881029f9380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   34.320687]  ffff8881029f9400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   34.321442] >ffff8881029f9480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   34.322299]                                      ^
[   34.323086]  ffff8881029f9500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.324145]  ffff8881029f9580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.324745] ==================================================================
[   32.978832] ==================================================================
[   32.979933] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x5ff/0x5450
[   32.981091] Write of size 4 at addr ffff8881029f94b0 by task kunit_try_catch/272
[   32.981940] 
[   32.982139] CPU: 1 UID: 0 PID: 272 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241120 #1
[   32.983526] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.983968] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   32.985136] Call Trace:
[   32.985346]  <TASK>
[   32.985796]  dump_stack_lvl+0x73/0xb0
[   32.986434]  print_report+0xd1/0x640
[   32.987112]  ? __virt_addr_valid+0x1db/0x2d0
[   32.987610]  ? kasan_complete_mode_report_info+0x2a/0x200
[   32.988302]  kasan_report+0x102/0x140
[   32.988716]  ? kasan_atomics_helper+0x5ff/0x5450
[   32.989049]  ? kasan_atomics_helper+0x5ff/0x5450
[   32.989953]  kasan_check_range+0x10c/0x1c0
[   32.990647]  __kasan_check_write+0x18/0x20
[   32.991157]  kasan_atomics_helper+0x5ff/0x5450
[   32.991904]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   32.992458]  ? __kmalloc_cache_noprof+0x184/0x410
[   32.992967]  ? kasan_save_alloc_info+0x3b/0x50
[   32.993660]  ? kasan_atomics+0x153/0x310
[   32.994301]  kasan_atomics+0x1dd/0x310
[   32.994752]  ? __pfx_kasan_atomics+0x10/0x10
[   32.995433]  ? __pfx_read_tsc+0x10/0x10
[   32.996174]  ? ktime_get_ts64+0x84/0x230
[   32.997197]  kunit_try_run_case+0x1b3/0x490
[   32.997553]  ? __pfx_kunit_try_run_case+0x10/0x10
[   32.998178]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   32.998591]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   32.999112]  ? __kthread_parkme+0x82/0x160
[   32.999553]  ? preempt_count_sub+0x50/0x80
[   33.000118]  ? __pfx_kunit_try_run_case+0x10/0x10
[   33.000609]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   33.001652]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   33.002298]  kthread+0x257/0x310
[   33.002759]  ? __pfx_kthread+0x10/0x10
[   33.003267]  ret_from_fork+0x41/0x80
[   33.003609]  ? __pfx_kthread+0x10/0x10
[   33.004057]  ret_from_fork_asm+0x1a/0x30
[   33.004551]  </TASK>
[   33.005038] 
[   33.005195] Allocated by task 272:
[   33.005667]  kasan_save_stack+0x3d/0x60
[   33.006016]  kasan_save_track+0x18/0x40
[   33.006626]  kasan_save_alloc_info+0x3b/0x50
[   33.007104]  __kasan_kmalloc+0xb7/0xc0
[   33.007406]  __kmalloc_cache_noprof+0x184/0x410
[   33.008213]  kasan_atomics+0x96/0x310
[   33.008568]  kunit_try_run_case+0x1b3/0x490
[   33.009152]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   33.009689]  kthread+0x257/0x310
[   33.010087]  ret_from_fork+0x41/0x80
[   33.010446]  ret_from_fork_asm+0x1a/0x30
[   33.011036] 
[   33.011387] The buggy address belongs to the object at ffff8881029f9480
[   33.011387]  which belongs to the cache kmalloc-64 of size 64
[   33.012349] The buggy address is located 0 bytes to the right of
[   33.012349]  allocated 48-byte region [ffff8881029f9480, ffff8881029f94b0)
[   33.013256] 
[   33.013510] The buggy address belongs to the physical page:
[   33.014348] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029f9
[   33.015182] flags: 0x200000000000000(node=0|zone=2)
[   33.017355] page_type: f5(slab)
[   33.017577] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   33.018003] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   33.018398] page dumped because: kasan: bad access detected
[   33.018691] 
[   33.020560] Memory state around the buggy address:
[   33.022302]  ffff8881029f9380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.024080]  ffff8881029f9400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.025796] >ffff8881029f9480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   33.027507]                                      ^
[   33.028555]  ffff8881029f9500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.029354]  ffff8881029f9580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.030293] ==================================================================
[   33.912956] ==================================================================
[   33.913878] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1149/0x5450
[   33.914869] Write of size 4 at addr ffff8881029f94b0 by task kunit_try_catch/272
[   33.915542] 
[   33.915857] CPU: 1 UID: 0 PID: 272 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241120 #1
[   33.916893] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.917222] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   33.918146] Call Trace:
[   33.918427]  <TASK>
[   33.918717]  dump_stack_lvl+0x73/0xb0
[   33.919136]  print_report+0xd1/0x640
[   33.919454]  ? __virt_addr_valid+0x1db/0x2d0
[   33.920145]  ? kasan_complete_mode_report_info+0x2a/0x200
[   33.920692]  kasan_report+0x102/0x140
[   33.921058]  ? kasan_atomics_helper+0x1149/0x5450
[   33.921472]  ? kasan_atomics_helper+0x1149/0x5450
[   33.921883]  kasan_check_range+0x10c/0x1c0
[   33.922325]  __kasan_check_write+0x18/0x20
[   33.922913]  kasan_atomics_helper+0x1149/0x5450
[   33.923511]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   33.924172]  ? __kmalloc_cache_noprof+0x184/0x410
[   33.924670]  ? kasan_save_alloc_info+0x3b/0x50
[   33.925205]  ? kasan_atomics+0x153/0x310
[   33.925590]  kasan_atomics+0x1dd/0x310
[   33.926019]  ? __pfx_kasan_atomics+0x10/0x10
[   33.926492]  ? __pfx_read_tsc+0x10/0x10
[   33.926997]  ? ktime_get_ts64+0x84/0x230
[   33.927418]  kunit_try_run_case+0x1b3/0x490
[   33.927938]  ? __pfx_kunit_try_run_case+0x10/0x10
[   33.928268]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   33.928643]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   33.929266]  ? __kthread_parkme+0x82/0x160
[   33.929851]  ? preempt_count_sub+0x50/0x80
[   33.930192]  ? __pfx_kunit_try_run_case+0x10/0x10
[   33.930793]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   33.931424]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   33.931990]  kthread+0x257/0x310
[   33.932278]  ? __pfx_kthread+0x10/0x10
[   33.932564]  ret_from_fork+0x41/0x80
[   33.933108]  ? __pfx_kthread+0x10/0x10
[   33.933648]  ret_from_fork_asm+0x1a/0x30
[   33.934034]  </TASK>
[   33.934240] 
[   33.934433] Allocated by task 272:
[   33.934931]  kasan_save_stack+0x3d/0x60
[   33.935439]  kasan_save_track+0x18/0x40
[   33.935947]  kasan_save_alloc_info+0x3b/0x50
[   33.936338]  __kasan_kmalloc+0xb7/0xc0
[   33.936662]  __kmalloc_cache_noprof+0x184/0x410
[   33.937190]  kasan_atomics+0x96/0x310
[   33.937550]  kunit_try_run_case+0x1b3/0x490
[   33.938126]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   33.938757]  kthread+0x257/0x310
[   33.939031]  ret_from_fork+0x41/0x80
[   33.939439]  ret_from_fork_asm+0x1a/0x30
[   33.939999] 
[   33.940234] The buggy address belongs to the object at ffff8881029f9480
[   33.940234]  which belongs to the cache kmalloc-64 of size 64
[   33.941237] The buggy address is located 0 bytes to the right of
[   33.941237]  allocated 48-byte region [ffff8881029f9480, ffff8881029f94b0)
[   33.942284] 
[   33.942534] The buggy address belongs to the physical page:
[   33.942983] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029f9
[   33.943797] flags: 0x200000000000000(node=0|zone=2)
[   33.944216] page_type: f5(slab)
[   33.944503] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   33.945262] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   33.945758] page dumped because: kasan: bad access detected
[   33.946402] 
[   33.946730] Memory state around the buggy address:
[   33.947132]  ffff8881029f9380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.947659]  ffff8881029f9400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.948447] >ffff8881029f9480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   33.949250]                                      ^
[   33.950293]  ffff8881029f9500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.951871]  ffff8881029f9580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.953013] ==================================================================
[   33.468880] ==================================================================
[   33.470884] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xc71/0x5450
[   33.471474] Write of size 4 at addr ffff8881029f94b0 by task kunit_try_catch/272
[   33.472341] 
[   33.472517] CPU: 1 UID: 0 PID: 272 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241120 #1
[   33.474107] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.474614] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   33.475778] Call Trace:
[   33.476056]  <TASK>
[   33.476316]  dump_stack_lvl+0x73/0xb0
[   33.476849]  print_report+0xd1/0x640
[   33.477525]  ? __virt_addr_valid+0x1db/0x2d0
[   33.478283]  ? kasan_complete_mode_report_info+0x2a/0x200
[   33.478851]  kasan_report+0x102/0x140
[   33.479207]  ? kasan_atomics_helper+0xc71/0x5450
[   33.479578]  ? kasan_atomics_helper+0xc71/0x5450
[   33.479849]  kasan_check_range+0x10c/0x1c0
[   33.480054]  __kasan_check_write+0x18/0x20
[   33.480244]  kasan_atomics_helper+0xc71/0x5450
[   33.480450]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   33.481345]  ? __kmalloc_cache_noprof+0x184/0x410
[   33.482357]  ? kasan_save_alloc_info+0x3b/0x50
[   33.482936]  ? kasan_atomics+0x153/0x310
[   33.483483]  kasan_atomics+0x1dd/0x310
[   33.484212]  ? __pfx_kasan_atomics+0x10/0x10
[   33.484548]  ? __pfx_read_tsc+0x10/0x10
[   33.485064]  ? ktime_get_ts64+0x84/0x230
[   33.485682]  kunit_try_run_case+0x1b3/0x490
[   33.486501]  ? __pfx_kunit_try_run_case+0x10/0x10
[   33.487048]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   33.487560]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   33.488450]  ? __kthread_parkme+0x82/0x160
[   33.489362]  ? preempt_count_sub+0x50/0x80
[   33.490099]  ? __pfx_kunit_try_run_case+0x10/0x10
[   33.490427]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   33.491227]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   33.491792]  kthread+0x257/0x310
[   33.492313]  ? __pfx_kthread+0x10/0x10
[   33.492969]  ret_from_fork+0x41/0x80
[   33.493379]  ? __pfx_kthread+0x10/0x10
[   33.494307]  ret_from_fork_asm+0x1a/0x30
[   33.495299]  </TASK>
[   33.495495] 
[   33.495687] Allocated by task 272:
[   33.496131]  kasan_save_stack+0x3d/0x60
[   33.496599]  kasan_save_track+0x18/0x40
[   33.497300]  kasan_save_alloc_info+0x3b/0x50
[   33.498060]  __kasan_kmalloc+0xb7/0xc0
[   33.498499]  __kmalloc_cache_noprof+0x184/0x410
[   33.499287]  kasan_atomics+0x96/0x310
[   33.499777]  kunit_try_run_case+0x1b3/0x490
[   33.500395]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   33.501045]  kthread+0x257/0x310
[   33.501231]  ret_from_fork+0x41/0x80
[   33.501407]  ret_from_fork_asm+0x1a/0x30
[   33.501595] 
[   33.501795] The buggy address belongs to the object at ffff8881029f9480
[   33.501795]  which belongs to the cache kmalloc-64 of size 64
[   33.502896] The buggy address is located 0 bytes to the right of
[   33.502896]  allocated 48-byte region [ffff8881029f9480, ffff8881029f94b0)
[   33.503655] 
[   33.503929] The buggy address belongs to the physical page:
[   33.504662] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029f9
[   33.505694] flags: 0x200000000000000(node=0|zone=2)
[   33.506072] page_type: f5(slab)
[   33.506325] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   33.507251] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   33.508367] page dumped because: kasan: bad access detected
[   33.508824] 
[   33.508984] Memory state around the buggy address:
[   33.509674]  ffff8881029f9380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.510605]  ffff8881029f9400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.511322] >ffff8881029f9480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   33.512171]                                      ^
[   33.512484]  ffff8881029f9500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.513330]  ffff8881029f9580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.514367] ==================================================================
[   34.877183] ==================================================================
[   34.878214] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1c19/0x5450
[   34.878854] Write of size 8 at addr ffff8881029f94b0 by task kunit_try_catch/272
[   34.883155] 
[   34.883318] CPU: 1 UID: 0 PID: 272 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241120 #1
[   34.883858] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.884100] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   34.884532] Call Trace:
[   34.886339]  <TASK>
[   34.887105]  dump_stack_lvl+0x73/0xb0
[   34.888278]  print_report+0xd1/0x640
[   34.889428]  ? __virt_addr_valid+0x1db/0x2d0
[   34.891042]  ? kasan_complete_mode_report_info+0x2a/0x200
[   34.892631]  kasan_report+0x102/0x140
[   34.893242]  ? kasan_atomics_helper+0x1c19/0x5450
[   34.894110]  ? kasan_atomics_helper+0x1c19/0x5450
[   34.894912]  kasan_check_range+0x10c/0x1c0
[   34.895400]  __kasan_check_write+0x18/0x20
[   34.896092]  kasan_atomics_helper+0x1c19/0x5450
[   34.896912]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   34.897580]  ? __kmalloc_cache_noprof+0x184/0x410
[   34.898097]  ? kasan_save_alloc_info+0x3b/0x50
[   34.898572]  ? kasan_atomics+0x153/0x310
[   34.898981]  kasan_atomics+0x1dd/0x310
[   34.900010]  ? __pfx_kasan_atomics+0x10/0x10
[   34.900291]  ? __pfx_read_tsc+0x10/0x10
[   34.900484]  ? ktime_get_ts64+0x84/0x230
[   34.901201]  kunit_try_run_case+0x1b3/0x490
[   34.902343]  ? __pfx_kunit_try_run_case+0x10/0x10
[   34.903133]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   34.903908]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   34.904478]  ? __kthread_parkme+0x82/0x160
[   34.905294]  ? preempt_count_sub+0x50/0x80
[   34.905715]  ? __pfx_kunit_try_run_case+0x10/0x10
[   34.906389]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   34.907099]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   34.907610]  kthread+0x257/0x310
[   34.908263]  ? __pfx_kthread+0x10/0x10
[   34.909145]  ret_from_fork+0x41/0x80
[   34.909492]  ? __pfx_kthread+0x10/0x10
[   34.909775]  ret_from_fork_asm+0x1a/0x30
[   34.910689]  </TASK>
[   34.911011] 
[   34.911254] Allocated by task 272:
[   34.911582]  kasan_save_stack+0x3d/0x60
[   34.912536]  kasan_save_track+0x18/0x40
[   34.912999]  kasan_save_alloc_info+0x3b/0x50
[   34.913406]  __kasan_kmalloc+0xb7/0xc0
[   34.914547]  __kmalloc_cache_noprof+0x184/0x410
[   34.915152]  kasan_atomics+0x96/0x310
[   34.915597]  kunit_try_run_case+0x1b3/0x490
[   34.916342]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   34.917058]  kthread+0x257/0x310
[   34.917312]  ret_from_fork+0x41/0x80
[   34.918246]  ret_from_fork_asm+0x1a/0x30
[   34.918592] 
[   34.918938] The buggy address belongs to the object at ffff8881029f9480
[   34.918938]  which belongs to the cache kmalloc-64 of size 64
[   34.920222] The buggy address is located 0 bytes to the right of
[   34.920222]  allocated 48-byte region [ffff8881029f9480, ffff8881029f94b0)
[   34.922015] 
[   34.922463] The buggy address belongs to the physical page:
[   34.923348] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029f9
[   34.924264] flags: 0x200000000000000(node=0|zone=2)
[   34.924869] page_type: f5(slab)
[   34.925531] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   34.926308] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   34.926950] page dumped because: kasan: bad access detected
[   34.927430] 
[   34.927639] Memory state around the buggy address:
[   34.928787]  ffff8881029f9380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   34.929678]  ffff8881029f9400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   34.930516] >ffff8881029f9480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   34.931386]                                      ^
[   34.932084]  ffff8881029f9500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.932973]  ffff8881029f9580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.933893] ==================================================================
[   34.421190] ==================================================================
[   34.421811] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x15b7/0x5450
[   34.422659] Write of size 8 at addr ffff8881029f94b0 by task kunit_try_catch/272
[   34.423138] 
[   34.423408] CPU: 1 UID: 0 PID: 272 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241120 #1
[   34.424207] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.424689] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   34.425319] Call Trace:
[   34.425527]  <TASK>
[   34.425887]  dump_stack_lvl+0x73/0xb0
[   34.426392]  print_report+0xd1/0x640
[   34.427079]  ? __virt_addr_valid+0x1db/0x2d0
[   34.427532]  ? kasan_complete_mode_report_info+0x2a/0x200
[   34.428256]  kasan_report+0x102/0x140
[   34.428546]  ? kasan_atomics_helper+0x15b7/0x5450
[   34.429162]  ? kasan_atomics_helper+0x15b7/0x5450
[   34.429659]  kasan_check_range+0x10c/0x1c0
[   34.430066]  __kasan_check_write+0x18/0x20
[   34.430370]  kasan_atomics_helper+0x15b7/0x5450
[   34.430893]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   34.431533]  ? __kmalloc_cache_noprof+0x184/0x410
[   34.432209]  ? kasan_save_alloc_info+0x3b/0x50
[   34.432579]  ? kasan_atomics+0x153/0x310
[   34.433057]  kasan_atomics+0x1dd/0x310
[   34.433356]  ? __pfx_kasan_atomics+0x10/0x10
[   34.433920]  ? __pfx_read_tsc+0x10/0x10
[   34.434811]  ? ktime_get_ts64+0x84/0x230
[   34.435887]  kunit_try_run_case+0x1b3/0x490
[   34.436365]  ? __pfx_kunit_try_run_case+0x10/0x10
[   34.436880]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   34.437329]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   34.438365]  ? __kthread_parkme+0x82/0x160
[   34.438806]  ? preempt_count_sub+0x50/0x80
[   34.439497]  ? __pfx_kunit_try_run_case+0x10/0x10
[   34.440059]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   34.441013]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   34.441773]  kthread+0x257/0x310
[   34.442331]  ? __pfx_kthread+0x10/0x10
[   34.442952]  ret_from_fork+0x41/0x80
[   34.443352]  ? __pfx_kthread+0x10/0x10
[   34.444125]  ret_from_fork_asm+0x1a/0x30
[   34.444582]  </TASK>
[   34.445253] 
[   34.445396] Allocated by task 272:
[   34.445844]  kasan_save_stack+0x3d/0x60
[   34.446599]  kasan_save_track+0x18/0x40
[   34.447301]  kasan_save_alloc_info+0x3b/0x50
[   34.447988]  __kasan_kmalloc+0xb7/0xc0
[   34.448174]  __kmalloc_cache_noprof+0x184/0x410
[   34.448373]  kasan_atomics+0x96/0x310
[   34.448550]  kunit_try_run_case+0x1b3/0x490
[   34.449317]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   34.450270]  kthread+0x257/0x310
[   34.450993]  ret_from_fork+0x41/0x80
[   34.451626]  ret_from_fork_asm+0x1a/0x30
[   34.452288] 
[   34.452544] The buggy address belongs to the object at ffff8881029f9480
[   34.452544]  which belongs to the cache kmalloc-64 of size 64
[   34.453576] The buggy address is located 0 bytes to the right of
[   34.453576]  allocated 48-byte region [ffff8881029f9480, ffff8881029f94b0)
[   34.454919] 
[   34.455151] The buggy address belongs to the physical page:
[   34.455972] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029f9
[   34.456519] flags: 0x200000000000000(node=0|zone=2)
[   34.457141] page_type: f5(slab)
[   34.457489] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   34.458182] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   34.459020] page dumped because: kasan: bad access detected
[   34.459403] 
[   34.459694] Memory state around the buggy address:
[   34.460581]  ffff8881029f9380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   34.461690]  ffff8881029f9400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   34.462201] >ffff8881029f9480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   34.462985]                                      ^
[   34.463469]  ffff8881029f9500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.464342]  ffff8881029f9580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.465225] ==================================================================
[   34.610091] ==================================================================
[   34.610993] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1819/0x5450
[   34.611982] Write of size 8 at addr ffff8881029f94b0 by task kunit_try_catch/272
[   34.612726] 
[   34.613194] CPU: 1 UID: 0 PID: 272 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241120 #1
[   34.614362] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.614637] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   34.616719] Call Trace:
[   34.617193]  <TASK>
[   34.617387]  dump_stack_lvl+0x73/0xb0
[   34.617671]  print_report+0xd1/0x640
[   34.617949]  ? __virt_addr_valid+0x1db/0x2d0
[   34.618249]  ? kasan_complete_mode_report_info+0x2a/0x200
[   34.618577]  kasan_report+0x102/0x140
[   34.621413]  ? kasan_atomics_helper+0x1819/0x5450
[   34.622493]  ? kasan_atomics_helper+0x1819/0x5450
[   34.623995]  kasan_check_range+0x10c/0x1c0
[   34.625291]  __kasan_check_write+0x18/0x20
[   34.626857]  kasan_atomics_helper+0x1819/0x5450
[   34.628016]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   34.628929]  ? __kmalloc_cache_noprof+0x184/0x410
[   34.629166]  ? kasan_save_alloc_info+0x3b/0x50
[   34.629378]  ? kasan_atomics+0x153/0x310
[   34.629579]  kasan_atomics+0x1dd/0x310
[   34.630307]  ? __pfx_kasan_atomics+0x10/0x10
[   34.630948]  ? __pfx_read_tsc+0x10/0x10
[   34.631454]  ? ktime_get_ts64+0x84/0x230
[   34.632068]  kunit_try_run_case+0x1b3/0x490
[   34.632547]  ? __pfx_kunit_try_run_case+0x10/0x10
[   34.633170]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   34.633519]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   34.634059]  ? __kthread_parkme+0x82/0x160
[   34.634730]  ? preempt_count_sub+0x50/0x80
[   34.635266]  ? __pfx_kunit_try_run_case+0x10/0x10
[   34.635830]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   34.636452]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   34.637100]  kthread+0x257/0x310
[   34.637477]  ? __pfx_kthread+0x10/0x10
[   34.637893]  ret_from_fork+0x41/0x80
[   34.638437]  ? __pfx_kthread+0x10/0x10
[   34.639057]  ret_from_fork_asm+0x1a/0x30
[   34.639532]  </TASK>
[   34.640006] 
[   34.640288] Allocated by task 272:
[   34.640816]  kasan_save_stack+0x3d/0x60
[   34.641267]  kasan_save_track+0x18/0x40
[   34.641944]  kasan_save_alloc_info+0x3b/0x50
[   34.642460]  __kasan_kmalloc+0xb7/0xc0
[   34.643003]  __kmalloc_cache_noprof+0x184/0x410
[   34.643485]  kasan_atomics+0x96/0x310
[   34.644057]  kunit_try_run_case+0x1b3/0x490
[   34.644416]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   34.645240]  kthread+0x257/0x310
[   34.645543]  ret_from_fork+0x41/0x80
[   34.646154]  ret_from_fork_asm+0x1a/0x30
[   34.646509] 
[   34.646894] The buggy address belongs to the object at ffff8881029f9480
[   34.646894]  which belongs to the cache kmalloc-64 of size 64
[   34.648041] The buggy address is located 0 bytes to the right of
[   34.648041]  allocated 48-byte region [ffff8881029f9480, ffff8881029f94b0)
[   34.649334] 
[   34.649582] The buggy address belongs to the physical page:
[   34.650317] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029f9
[   34.651127] flags: 0x200000000000000(node=0|zone=2)
[   34.651581] page_type: f5(slab)
[   34.652010] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   34.652589] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   34.653405] page dumped because: kasan: bad access detected
[   34.654099] 
[   34.654349] Memory state around the buggy address:
[   34.654986]  ffff8881029f9380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   34.655828]  ffff8881029f9400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   34.656547] >ffff8881029f9480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   34.657213]                                      ^
[   34.657823]  ffff8881029f9500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.658268]  ffff8881029f9580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.658935] ==================================================================
[   35.262019] ==================================================================
[   35.263587] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x2007/0x5450
[   35.264226] Write of size 8 at addr ffff8881029f94b0 by task kunit_try_catch/272
[   35.265069] 
[   35.265280] CPU: 1 UID: 0 PID: 272 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241120 #1
[   35.266250] Tainted: [B]=BAD_PAGE, [N]=TEST
[   35.266523] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   35.267615] Call Trace:
[   35.268000]  <TASK>
[   35.268214]  dump_stack_lvl+0x73/0xb0
[   35.268507]  print_report+0xd1/0x640
[   35.268941]  ? __virt_addr_valid+0x1db/0x2d0
[   35.269489]  ? kasan_complete_mode_report_info+0x2a/0x200
[   35.270281]  kasan_report+0x102/0x140
[   35.270842]  ? kasan_atomics_helper+0x2007/0x5450
[   35.271351]  ? kasan_atomics_helper+0x2007/0x5450
[   35.272658]  kasan_check_range+0x10c/0x1c0
[   35.273319]  __kasan_check_write+0x18/0x20
[   35.274253]  kasan_atomics_helper+0x2007/0x5450
[   35.275000]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   35.275663]  ? __kmalloc_cache_noprof+0x184/0x410
[   35.276585]  ? kasan_save_alloc_info+0x3b/0x50
[   35.277288]  ? kasan_atomics+0x153/0x310
[   35.278073]  kasan_atomics+0x1dd/0x310
[   35.278499]  ? __pfx_kasan_atomics+0x10/0x10
[   35.279304]  ? __pfx_read_tsc+0x10/0x10
[   35.279881]  ? ktime_get_ts64+0x84/0x230
[   35.280328]  kunit_try_run_case+0x1b3/0x490
[   35.281327]  ? __pfx_kunit_try_run_case+0x10/0x10
[   35.281760]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   35.282451]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   35.283226]  ? __kthread_parkme+0x82/0x160
[   35.283643]  ? preempt_count_sub+0x50/0x80
[   35.284523]  ? __pfx_kunit_try_run_case+0x10/0x10
[   35.285217]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   35.285797]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   35.286611]  kthread+0x257/0x310
[   35.287193]  ? __pfx_kthread+0x10/0x10
[   35.287789]  ret_from_fork+0x41/0x80
[   35.288526]  ? __pfx_kthread+0x10/0x10
[   35.289257]  ret_from_fork_asm+0x1a/0x30
[   35.289620]  </TASK>
[   35.289831] 
[   35.290477] Allocated by task 272:
[   35.290758]  kasan_save_stack+0x3d/0x60
[   35.291648]  kasan_save_track+0x18/0x40
[   35.292474]  kasan_save_alloc_info+0x3b/0x50
[   35.293280]  __kasan_kmalloc+0xb7/0xc0
[   35.293686]  __kmalloc_cache_noprof+0x184/0x410
[   35.294243]  kasan_atomics+0x96/0x310
[   35.294627]  kunit_try_run_case+0x1b3/0x490
[   35.295756]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   35.296331]  kthread+0x257/0x310
[   35.297022]  ret_from_fork+0x41/0x80
[   35.297733]  ret_from_fork_asm+0x1a/0x30
[   35.298137] 
[   35.298389] The buggy address belongs to the object at ffff8881029f9480
[   35.298389]  which belongs to the cache kmalloc-64 of size 64
[   35.299796] The buggy address is located 0 bytes to the right of
[   35.299796]  allocated 48-byte region [ffff8881029f9480, ffff8881029f94b0)
[   35.300746] 
[   35.300916] The buggy address belongs to the physical page:
[   35.301438] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029f9
[   35.302579] flags: 0x200000000000000(node=0|zone=2)
[   35.302865] page_type: f5(slab)
[   35.303025] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   35.303314] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   35.303596] page dumped because: kasan: bad access detected
[   35.304334] 
[   35.304763] Memory state around the buggy address:
[   35.305272]  ffff8881029f9380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.306876]  ffff8881029f9400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.307623] >ffff8881029f9480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   35.308225]                                      ^
[   35.308644]  ffff8881029f9500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.309288]  ffff8881029f9580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.309807] ==================================================================
[   34.325568] ==================================================================
[   34.327393] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x50d6/0x5450
[   34.328112] Write of size 8 at addr ffff8881029f94b0 by task kunit_try_catch/272
[   34.329364] 
[   34.329500] CPU: 1 UID: 0 PID: 272 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241120 #1
[   34.330418] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.331551] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   34.332529] Call Trace:
[   34.333271]  <TASK>
[   34.333523]  dump_stack_lvl+0x73/0xb0
[   34.334263]  print_report+0xd1/0x640
[   34.335074]  ? __virt_addr_valid+0x1db/0x2d0
[   34.335727]  ? kasan_complete_mode_report_info+0x2a/0x200
[   34.336395]  kasan_report+0x102/0x140
[   34.336759]  ? kasan_atomics_helper+0x50d6/0x5450
[   34.337240]  ? kasan_atomics_helper+0x50d6/0x5450
[   34.338172]  __asan_report_store8_noabort+0x1b/0x30
[   34.338946]  kasan_atomics_helper+0x50d6/0x5450
[   34.339563]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   34.340257]  ? __kmalloc_cache_noprof+0x184/0x410
[   34.340886]  ? kasan_save_alloc_info+0x3b/0x50
[   34.341472]  ? kasan_atomics+0x153/0x310
[   34.341942]  kasan_atomics+0x1dd/0x310
[   34.342592]  ? __pfx_kasan_atomics+0x10/0x10
[   34.343306]  ? __pfx_read_tsc+0x10/0x10
[   34.343665]  ? ktime_get_ts64+0x84/0x230
[   34.344340]  kunit_try_run_case+0x1b3/0x490
[   34.345012]  ? __pfx_kunit_try_run_case+0x10/0x10
[   34.345926]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   34.346236]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   34.346534]  ? __kthread_parkme+0x82/0x160
[   34.346976]  ? preempt_count_sub+0x50/0x80
[   34.347378]  ? __pfx_kunit_try_run_case+0x10/0x10
[   34.348322]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   34.349140]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   34.349459]  kthread+0x257/0x310
[   34.349931]  ? __pfx_kthread+0x10/0x10
[   34.352130]  ret_from_fork+0x41/0x80
[   34.352401]  ? __pfx_kthread+0x10/0x10
[   34.352649]  ret_from_fork_asm+0x1a/0x30
[   34.353094]  </TASK>
[   34.353666] 
[   34.353940] Allocated by task 272:
[   34.354197]  kasan_save_stack+0x3d/0x60
[   34.354461]  kasan_save_track+0x18/0x40
[   34.354768]  kasan_save_alloc_info+0x3b/0x50
[   34.355251]  __kasan_kmalloc+0xb7/0xc0
[   34.355528]  __kmalloc_cache_noprof+0x184/0x410
[   34.356397]  kasan_atomics+0x96/0x310
[   34.357941]  kunit_try_run_case+0x1b3/0x490
[   34.358927]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   34.359247]  kthread+0x257/0x310
[   34.359465]  ret_from_fork+0x41/0x80
[   34.359831]  ret_from_fork_asm+0x1a/0x30
[   34.361384] 
[   34.362006] The buggy address belongs to the object at ffff8881029f9480
[   34.362006]  which belongs to the cache kmalloc-64 of size 64
[   34.364475] The buggy address is located 0 bytes to the right of
[   34.364475]  allocated 48-byte region [ffff8881029f9480, ffff8881029f94b0)
[   34.365480] 
[   34.365797] The buggy address belongs to the physical page:
[   34.366220] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029f9
[   34.366950] flags: 0x200000000000000(node=0|zone=2)
[   34.367489] page_type: f5(slab)
[   34.368044] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   34.368661] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   34.369514] page dumped because: kasan: bad access detected
[   34.370116] 
[   34.370372] Memory state around the buggy address:
[   34.371119]  ffff8881029f9380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   34.371854]  ffff8881029f9400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   34.372397] >ffff8881029f9480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   34.373198]                                      ^
[   34.373800]  ffff8881029f9500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.374542]  ffff8881029f9580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.375301] ==================================================================
[   34.466742] ==================================================================
[   34.468347] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1650/0x5450
[   34.469910] Write of size 8 at addr ffff8881029f94b0 by task kunit_try_catch/272
[   34.470550] 
[   34.470945] CPU: 1 UID: 0 PID: 272 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241120 #1
[   34.472162] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.472526] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   34.474236] Call Trace:
[   34.474534]  <TASK>
[   34.475360]  dump_stack_lvl+0x73/0xb0
[   34.475763]  print_report+0xd1/0x640
[   34.476303]  ? __virt_addr_valid+0x1db/0x2d0
[   34.476913]  ? kasan_complete_mode_report_info+0x2a/0x200
[   34.477377]  kasan_report+0x102/0x140
[   34.477761]  ? kasan_atomics_helper+0x1650/0x5450
[   34.478605]  ? kasan_atomics_helper+0x1650/0x5450
[   34.479245]  kasan_check_range+0x10c/0x1c0
[   34.479947]  __kasan_check_write+0x18/0x20
[   34.480332]  kasan_atomics_helper+0x1650/0x5450
[   34.480824]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   34.481293]  ? __kmalloc_cache_noprof+0x184/0x410
[   34.481833]  ? kasan_save_alloc_info+0x3b/0x50
[   34.482203]  ? kasan_atomics+0x153/0x310
[   34.482875]  kasan_atomics+0x1dd/0x310
[   34.483499]  ? __pfx_kasan_atomics+0x10/0x10
[   34.484134]  ? __pfx_read_tsc+0x10/0x10
[   34.484797]  ? ktime_get_ts64+0x84/0x230
[   34.485354]  kunit_try_run_case+0x1b3/0x490
[   34.486089]  ? __pfx_kunit_try_run_case+0x10/0x10
[   34.486717]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   34.487244]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   34.487934]  ? __kthread_parkme+0x82/0x160
[   34.488460]  ? preempt_count_sub+0x50/0x80
[   34.488940]  ? __pfx_kunit_try_run_case+0x10/0x10
[   34.489647]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   34.490345]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   34.490981]  kthread+0x257/0x310
[   34.491424]  ? __pfx_kthread+0x10/0x10
[   34.492098]  ret_from_fork+0x41/0x80
[   34.492728]  ? __pfx_kthread+0x10/0x10
[   34.493412]  ret_from_fork_asm+0x1a/0x30
[   34.494070]  </TASK>
[   34.494550] 
[   34.494923] Allocated by task 272:
[   34.495352]  kasan_save_stack+0x3d/0x60
[   34.496026]  kasan_save_track+0x18/0x40
[   34.496530]  kasan_save_alloc_info+0x3b/0x50
[   34.497119]  __kasan_kmalloc+0xb7/0xc0
[   34.497516]  __kmalloc_cache_noprof+0x184/0x410
[   34.498218]  kasan_atomics+0x96/0x310
[   34.498656]  kunit_try_run_case+0x1b3/0x490
[   34.499206]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   34.499841]  kthread+0x257/0x310
[   34.500134]  ret_from_fork+0x41/0x80
[   34.500768]  ret_from_fork_asm+0x1a/0x30
[   34.501275] 
[   34.501646] The buggy address belongs to the object at ffff8881029f9480
[   34.501646]  which belongs to the cache kmalloc-64 of size 64
[   34.503014] The buggy address is located 0 bytes to the right of
[   34.503014]  allocated 48-byte region [ffff8881029f9480, ffff8881029f94b0)
[   34.504265] 
[   34.504529] The buggy address belongs to the physical page:
[   34.505258] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029f9
[   34.506046] flags: 0x200000000000000(node=0|zone=2)
[   34.506681] page_type: f5(slab)
[   34.507106] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   34.507886] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   34.508560] page dumped because: kasan: bad access detected
[   34.509298] 
[   34.509509] Memory state around the buggy address:
[   34.510185]  ffff8881029f9380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   34.511028]  ffff8881029f9400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   34.511829] >ffff8881029f9480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   34.512524]                                      ^
[   34.513099]  ffff8881029f9500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.513880]  ffff8881029f9580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.514668] ==================================================================
[   33.649507] ==================================================================
[   33.650252] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xe79/0x5450
[   33.650901] Write of size 4 at addr ffff8881029f94b0 by task kunit_try_catch/272
[   33.651840] 
[   33.652014] CPU: 1 UID: 0 PID: 272 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241120 #1
[   33.653321] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.653758] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   33.654659] Call Trace:
[   33.654893]  <TASK>
[   33.655207]  dump_stack_lvl+0x73/0xb0
[   33.655722]  print_report+0xd1/0x640
[   33.656168]  ? __virt_addr_valid+0x1db/0x2d0
[   33.656604]  ? kasan_complete_mode_report_info+0x2a/0x200
[   33.657107]  kasan_report+0x102/0x140
[   33.657394]  ? kasan_atomics_helper+0xe79/0x5450
[   33.657893]  ? kasan_atomics_helper+0xe79/0x5450
[   33.658579]  kasan_check_range+0x10c/0x1c0
[   33.659223]  __kasan_check_write+0x18/0x20
[   33.659870]  kasan_atomics_helper+0xe79/0x5450
[   33.660249]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   33.660921]  ? __kmalloc_cache_noprof+0x184/0x410
[   33.661370]  ? kasan_save_alloc_info+0x3b/0x50
[   33.662062]  ? kasan_atomics+0x153/0x310
[   33.662458]  kasan_atomics+0x1dd/0x310
[   33.663017]  ? __pfx_kasan_atomics+0x10/0x10
[   33.663382]  ? __pfx_read_tsc+0x10/0x10
[   33.663854]  ? ktime_get_ts64+0x84/0x230
[   33.664440]  kunit_try_run_case+0x1b3/0x490
[   33.665023]  ? __pfx_kunit_try_run_case+0x10/0x10
[   33.665491]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   33.666099]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   33.666662]  ? __kthread_parkme+0x82/0x160
[   33.667168]  ? preempt_count_sub+0x50/0x80
[   33.667739]  ? __pfx_kunit_try_run_case+0x10/0x10
[   33.668158]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   33.668792]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   33.669451]  kthread+0x257/0x310
[   33.670085]  ? __pfx_kthread+0x10/0x10
[   33.670443]  ret_from_fork+0x41/0x80
[   33.670925]  ? __pfx_kthread+0x10/0x10
[   33.671728]  ret_from_fork_asm+0x1a/0x30
[   33.672456]  </TASK>
[   33.672749] 
[   33.672977] Allocated by task 272:
[   33.673473]  kasan_save_stack+0x3d/0x60
[   33.674070]  kasan_save_track+0x18/0x40
[   33.674497]  kasan_save_alloc_info+0x3b/0x50
[   33.674969]  __kasan_kmalloc+0xb7/0xc0
[   33.675249]  __kmalloc_cache_noprof+0x184/0x410
[   33.675764]  kasan_atomics+0x96/0x310
[   33.676263]  kunit_try_run_case+0x1b3/0x490
[   33.676805]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   33.677300]  kthread+0x257/0x310
[   33.677676]  ret_from_fork+0x41/0x80
[   33.678017]  ret_from_fork_asm+0x1a/0x30
[   33.678440] 
[   33.678652] The buggy address belongs to the object at ffff8881029f9480
[   33.678652]  which belongs to the cache kmalloc-64 of size 64
[   33.679649] The buggy address is located 0 bytes to the right of
[   33.679649]  allocated 48-byte region [ffff8881029f9480, ffff8881029f94b0)
[   33.680595] 
[   33.680901] The buggy address belongs to the physical page:
[   33.681393] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029f9
[   33.681919] flags: 0x200000000000000(node=0|zone=2)
[   33.682252] page_type: f5(slab)
[   33.682672] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   33.683546] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   33.684431] page dumped because: kasan: bad access detected
[   33.685062] 
[   33.685220] Memory state around the buggy address:
[   33.685525]  ffff8881029f9380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.686301]  ffff8881029f9400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.686977] >ffff8881029f9480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   33.687546]                                      ^
[   33.687954]  ffff8881029f9500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.688574]  ffff8881029f9580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.689107] ==================================================================
[   33.818595] ==================================================================
[   33.821481] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x107a/0x5450
[   33.822305] Write of size 4 at addr ffff8881029f94b0 by task kunit_try_catch/272
[   33.822690] 
[   33.822870] CPU: 1 UID: 0 PID: 272 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241120 #1
[   33.824074] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.824569] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   33.826739] Call Trace:
[   33.826934]  <TASK>
[   33.827111]  dump_stack_lvl+0x73/0xb0
[   33.827371]  print_report+0xd1/0x640
[   33.828207]  ? __virt_addr_valid+0x1db/0x2d0
[   33.829074]  ? kasan_complete_mode_report_info+0x2a/0x200
[   33.830122]  kasan_report+0x102/0x140
[   33.830526]  ? kasan_atomics_helper+0x107a/0x5450
[   33.831370]  ? kasan_atomics_helper+0x107a/0x5450
[   33.831663]  kasan_check_range+0x10c/0x1c0
[   33.832409]  __kasan_check_write+0x18/0x20
[   33.833286]  kasan_atomics_helper+0x107a/0x5450
[   33.834021]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   33.834594]  ? __kmalloc_cache_noprof+0x184/0x410
[   33.835182]  ? kasan_save_alloc_info+0x3b/0x50
[   33.835641]  ? kasan_atomics+0x153/0x310
[   33.836210]  kasan_atomics+0x1dd/0x310
[   33.837002]  ? __pfx_kasan_atomics+0x10/0x10
[   33.837470]  ? __pfx_read_tsc+0x10/0x10
[   33.838267]  ? ktime_get_ts64+0x84/0x230
[   33.839229]  kunit_try_run_case+0x1b3/0x490
[   33.839661]  ? __pfx_kunit_try_run_case+0x10/0x10
[   33.840175]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   33.840739]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   33.841649]  ? __kthread_parkme+0x82/0x160
[   33.842117]  ? preempt_count_sub+0x50/0x80
[   33.842564]  ? __pfx_kunit_try_run_case+0x10/0x10
[   33.843316]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   33.844062]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   33.844610]  kthread+0x257/0x310
[   33.845564]  ? __pfx_kthread+0x10/0x10
[   33.846123]  ret_from_fork+0x41/0x80
[   33.846895]  ? __pfx_kthread+0x10/0x10
[   33.847527]  ret_from_fork_asm+0x1a/0x30
[   33.848051]  </TASK>
[   33.848314] 
[   33.848520] Allocated by task 272:
[   33.849769]  kasan_save_stack+0x3d/0x60
[   33.850032]  kasan_save_track+0x18/0x40
[   33.850925]  kasan_save_alloc_info+0x3b/0x50
[   33.851565]  __kasan_kmalloc+0xb7/0xc0
[   33.852040]  __kmalloc_cache_noprof+0x184/0x410
[   33.852527]  kasan_atomics+0x96/0x310
[   33.853152]  kunit_try_run_case+0x1b3/0x490
[   33.853607]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   33.854717]  kthread+0x257/0x310
[   33.855174]  ret_from_fork+0x41/0x80
[   33.855879]  ret_from_fork_asm+0x1a/0x30
[   33.856177] 
[   33.856679] The buggy address belongs to the object at ffff8881029f9480
[   33.856679]  which belongs to the cache kmalloc-64 of size 64
[   33.858483] The buggy address is located 0 bytes to the right of
[   33.858483]  allocated 48-byte region [ffff8881029f9480, ffff8881029f94b0)
[   33.860305] 
[   33.860525] The buggy address belongs to the physical page:
[   33.861051] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029f9
[   33.862188] flags: 0x200000000000000(node=0|zone=2)
[   33.862771] page_type: f5(slab)
[   33.863184] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   33.864133] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   33.864758] page dumped because: kasan: bad access detected
[   33.865420] 
[   33.865873] Memory state around the buggy address:
[   33.866257]  ffff8881029f9380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.867211]  ffff8881029f9400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.867940] >ffff8881029f9480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   33.868541]                                      ^
[   33.869408]  ffff8881029f9500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.870072]  ffff8881029f9580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.870756] ==================================================================
[   32.885823] ==================================================================
[   32.886326] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b3c/0x5450
[   32.887754] Write of size 4 at addr ffff8881029f94b0 by task kunit_try_catch/272
[   32.888548] 
[   32.888868] CPU: 1 UID: 0 PID: 272 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241120 #1
[   32.889724] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.890045] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   32.890857] Call Trace:
[   32.891151]  <TASK>
[   32.891401]  dump_stack_lvl+0x73/0xb0
[   32.891924]  print_report+0xd1/0x640
[   32.892331]  ? __virt_addr_valid+0x1db/0x2d0
[   32.892883]  ? kasan_complete_mode_report_info+0x2a/0x200
[   32.893356]  kasan_report+0x102/0x140
[   32.893802]  ? kasan_atomics_helper+0x4b3c/0x5450
[   32.894318]  ? kasan_atomics_helper+0x4b3c/0x5450
[   32.894878]  __asan_report_store4_noabort+0x1b/0x30
[   32.895409]  kasan_atomics_helper+0x4b3c/0x5450
[   32.895934]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   32.896416]  ? __kmalloc_cache_noprof+0x184/0x410
[   32.896859]  ? kasan_save_alloc_info+0x3b/0x50
[   32.897429]  ? kasan_atomics+0x153/0x310
[   32.897872]  kasan_atomics+0x1dd/0x310
[   32.898377]  ? __pfx_kasan_atomics+0x10/0x10
[   32.898901]  ? __pfx_read_tsc+0x10/0x10
[   32.899296]  ? ktime_get_ts64+0x84/0x230
[   32.899669]  kunit_try_run_case+0x1b3/0x490
[   32.900167]  ? __pfx_kunit_try_run_case+0x10/0x10
[   32.900534]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   32.901179]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   32.901647]  ? __kthread_parkme+0x82/0x160
[   32.902071]  ? preempt_count_sub+0x50/0x80
[   32.902519]  ? __pfx_kunit_try_run_case+0x10/0x10
[   32.902991]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   32.903639]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   32.904175]  kthread+0x257/0x310
[   32.904470]  ? __pfx_kthread+0x10/0x10
[   32.904899]  ret_from_fork+0x41/0x80
[   32.905310]  ? __pfx_kthread+0x10/0x10
[   32.905651]  ret_from_fork_asm+0x1a/0x30
[   32.906196]  </TASK>
[   32.906491] 
[   32.906778] Allocated by task 272:
[   32.907132]  kasan_save_stack+0x3d/0x60
[   32.907553]  kasan_save_track+0x18/0x40
[   32.908085]  kasan_save_alloc_info+0x3b/0x50
[   32.908412]  __kasan_kmalloc+0xb7/0xc0
[   32.908929]  __kmalloc_cache_noprof+0x184/0x410
[   32.909374]  kasan_atomics+0x96/0x310
[   32.909742]  kunit_try_run_case+0x1b3/0x490
[   32.910202]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   32.910901]  kthread+0x257/0x310
[   32.911229]  ret_from_fork+0x41/0x80
[   32.911524]  ret_from_fork_asm+0x1a/0x30
[   32.912022] 
[   32.912179] The buggy address belongs to the object at ffff8881029f9480
[   32.912179]  which belongs to the cache kmalloc-64 of size 64
[   32.913470] The buggy address is located 0 bytes to the right of
[   32.913470]  allocated 48-byte region [ffff8881029f9480, ffff8881029f94b0)
[   32.914427] 
[   32.914745] The buggy address belongs to the physical page:
[   32.915175] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029f9
[   32.915901] flags: 0x200000000000000(node=0|zone=2)
[   32.916228] page_type: f5(slab)
[   32.916477] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   32.917318] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   32.918382] page dumped because: kasan: bad access detected
[   32.919418] 
[   32.919522] Memory state around the buggy address:
[   32.920259]  ffff8881029f9380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.921516]  ffff8881029f9400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.922240] >ffff8881029f9480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   32.922516]                                      ^
[   32.922817]  ffff8881029f9500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.924216]  ffff8881029f9580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.925078] ==================================================================
[   34.235901] ==================================================================
[   34.236809] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4eb0/0x5450
[   34.237510] Read of size 8 at addr ffff8881029f94b0 by task kunit_try_catch/272
[   34.238241] 
[   34.238484] CPU: 1 UID: 0 PID: 272 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241120 #1
[   34.239569] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.240041] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   34.240822] Call Trace:
[   34.241157]  <TASK>
[   34.241501]  dump_stack_lvl+0x73/0xb0
[   34.242030]  print_report+0xd1/0x640
[   34.242511]  ? __virt_addr_valid+0x1db/0x2d0
[   34.243082]  ? kasan_complete_mode_report_info+0x2a/0x200
[   34.243652]  kasan_report+0x102/0x140
[   34.244110]  ? kasan_atomics_helper+0x4eb0/0x5450
[   34.244586]  ? kasan_atomics_helper+0x4eb0/0x5450
[   34.245149]  __asan_report_load8_noabort+0x18/0x20
[   34.245849]  kasan_atomics_helper+0x4eb0/0x5450
[   34.246346]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   34.246989]  ? __kmalloc_cache_noprof+0x184/0x410
[   34.247574]  ? kasan_save_alloc_info+0x3b/0x50
[   34.248132]  ? kasan_atomics+0x153/0x310
[   34.248549]  kasan_atomics+0x1dd/0x310
[   34.249140]  ? __pfx_kasan_atomics+0x10/0x10
[   34.249743]  ? __pfx_read_tsc+0x10/0x10
[   34.250147]  ? ktime_get_ts64+0x84/0x230
[   34.250751]  kunit_try_run_case+0x1b3/0x490
[   34.251307]  ? __pfx_kunit_try_run_case+0x10/0x10
[   34.251937]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   34.252363]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   34.253102]  ? __kthread_parkme+0x82/0x160
[   34.253455]  ? preempt_count_sub+0x50/0x80
[   34.254090]  ? __pfx_kunit_try_run_case+0x10/0x10
[   34.254567]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   34.255176]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   34.255747]  kthread+0x257/0x310
[   34.256162]  ? __pfx_kthread+0x10/0x10
[   34.256601]  ret_from_fork+0x41/0x80
[   34.257091]  ? __pfx_kthread+0x10/0x10
[   34.257575]  ret_from_fork_asm+0x1a/0x30
[   34.258106]  </TASK>
[   34.258452] 
[   34.258808] Allocated by task 272:
[   34.259167]  kasan_save_stack+0x3d/0x60
[   34.259731]  kasan_save_track+0x18/0x40
[   34.260237]  kasan_save_alloc_info+0x3b/0x50
[   34.260801]  __kasan_kmalloc+0xb7/0xc0
[   34.261143]  __kmalloc_cache_noprof+0x184/0x410
[   34.261796]  kasan_atomics+0x96/0x310
[   34.262163]  kunit_try_run_case+0x1b3/0x490
[   34.262593]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   34.263353]  kthread+0x257/0x310
[   34.263655]  ret_from_fork+0x41/0x80
[   34.264188]  ret_from_fork_asm+0x1a/0x30
[   34.264817] 
[   34.265018] The buggy address belongs to the object at ffff8881029f9480
[   34.265018]  which belongs to the cache kmalloc-64 of size 64
[   34.266127] The buggy address is located 0 bytes to the right of
[   34.266127]  allocated 48-byte region [ffff8881029f9480, ffff8881029f94b0)
[   34.267310] 
[   34.267593] The buggy address belongs to the physical page:
[   34.268341] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029f9
[   34.269175] flags: 0x200000000000000(node=0|zone=2)
[   34.269732] page_type: f5(slab)
[   34.270095] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   34.270859] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   34.271624] page dumped because: kasan: bad access detected
[   34.272114] 
[   34.272363] Memory state around the buggy address:
[   34.272938]  ffff8881029f9380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   34.273571]  ffff8881029f9400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   34.274465] >ffff8881029f9480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   34.275147]                                      ^
[   34.275522]  ffff8881029f9500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.276394]  ffff8881029f9580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.277041] ==================================================================
[   33.129815] ==================================================================
[   33.131016] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x7c8/0x5450
[   33.131722] Write of size 4 at addr ffff8881029f94b0 by task kunit_try_catch/272
[   33.133203] 
[   33.133540] CPU: 1 UID: 0 PID: 272 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241120 #1
[   33.134797] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.135213] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   33.136306] Call Trace:
[   33.136879]  <TASK>
[   33.137100]  dump_stack_lvl+0x73/0xb0
[   33.137515]  print_report+0xd1/0x640
[   33.138339]  ? __virt_addr_valid+0x1db/0x2d0
[   33.139118]  ? kasan_complete_mode_report_info+0x2a/0x200
[   33.139650]  kasan_report+0x102/0x140
[   33.140282]  ? kasan_atomics_helper+0x7c8/0x5450
[   33.140808]  ? kasan_atomics_helper+0x7c8/0x5450
[   33.141588]  kasan_check_range+0x10c/0x1c0
[   33.142250]  __kasan_check_write+0x18/0x20
[   33.142729]  kasan_atomics_helper+0x7c8/0x5450
[   33.143429]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   33.144201]  ? __kmalloc_cache_noprof+0x184/0x410
[   33.144667]  ? kasan_save_alloc_info+0x3b/0x50
[   33.145550]  ? kasan_atomics+0x153/0x310
[   33.146334]  kasan_atomics+0x1dd/0x310
[   33.146839]  ? __pfx_kasan_atomics+0x10/0x10
[   33.147586]  ? __pfx_read_tsc+0x10/0x10
[   33.148096]  ? ktime_get_ts64+0x84/0x230
[   33.149023]  kunit_try_run_case+0x1b3/0x490
[   33.149679]  ? __pfx_kunit_try_run_case+0x10/0x10
[   33.150223]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   33.151180]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   33.151665]  ? __kthread_parkme+0x82/0x160
[   33.152551]  ? preempt_count_sub+0x50/0x80
[   33.153437]  ? __pfx_kunit_try_run_case+0x10/0x10
[   33.153920]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   33.154501]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   33.155292]  kthread+0x257/0x310
[   33.155929]  ? __pfx_kthread+0x10/0x10
[   33.156511]  ret_from_fork+0x41/0x80
[   33.157135]  ? __pfx_kthread+0x10/0x10
[   33.157524]  ret_from_fork_asm+0x1a/0x30
[   33.158309]  </TASK>
[   33.158814] 
[   33.159102] Allocated by task 272:
[   33.159460]  kasan_save_stack+0x3d/0x60
[   33.160089]  kasan_save_track+0x18/0x40
[   33.160888]  kasan_save_alloc_info+0x3b/0x50
[   33.161292]  __kasan_kmalloc+0xb7/0xc0
[   33.162190]  __kmalloc_cache_noprof+0x184/0x410
[   33.162584]  kasan_atomics+0x96/0x310
[   33.163268]  kunit_try_run_case+0x1b3/0x490
[   33.164122]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   33.164610]  kthread+0x257/0x310
[   33.165138]  ret_from_fork+0x41/0x80
[   33.165556]  ret_from_fork_asm+0x1a/0x30
[   33.166356] 
[   33.166606] The buggy address belongs to the object at ffff8881029f9480
[   33.166606]  which belongs to the cache kmalloc-64 of size 64
[   33.168141] The buggy address is located 0 bytes to the right of
[   33.168141]  allocated 48-byte region [ffff8881029f9480, ffff8881029f94b0)
[   33.169545] 
[   33.170108] The buggy address belongs to the physical page:
[   33.170680] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029f9
[   33.171462] flags: 0x200000000000000(node=0|zone=2)
[   33.172258] page_type: f5(slab)
[   33.172716] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   33.173618] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   33.174335] page dumped because: kasan: bad access detected
[   33.175365] 
[   33.175629] Memory state around the buggy address:
[   33.176760]  ffff8881029f9380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.177358]  ffff8881029f9400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.178023] >ffff8881029f9480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   33.179188]                                      ^
[   33.179604]  ffff8881029f9500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.180445]  ffff8881029f9580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.181441] ==================================================================
[   33.689957] ==================================================================
[   33.690871] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf11/0x5450
[   33.691670] Write of size 4 at addr ffff8881029f94b0 by task kunit_try_catch/272
[   33.692467] 
[   33.692786] CPU: 1 UID: 0 PID: 272 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241120 #1
[   33.693586] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.693925] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   33.694428] Call Trace:
[   33.694757]  <TASK>
[   33.695032]  dump_stack_lvl+0x73/0xb0
[   33.695519]  print_report+0xd1/0x640
[   33.696053]  ? __virt_addr_valid+0x1db/0x2d0
[   33.696574]  ? kasan_complete_mode_report_info+0x2a/0x200
[   33.697077]  kasan_report+0x102/0x140
[   33.697364]  ? kasan_atomics_helper+0xf11/0x5450
[   33.697821]  ? kasan_atomics_helper+0xf11/0x5450
[   33.698400]  kasan_check_range+0x10c/0x1c0
[   33.698975]  __kasan_check_write+0x18/0x20
[   33.699472]  kasan_atomics_helper+0xf11/0x5450
[   33.700097]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   33.700582]  ? __kmalloc_cache_noprof+0x184/0x410
[   33.700994]  ? kasan_save_alloc_info+0x3b/0x50
[   33.701541]  ? kasan_atomics+0x153/0x310
[   33.702374]  kasan_atomics+0x1dd/0x310
[   33.703275]  ? __pfx_kasan_atomics+0x10/0x10
[   33.704225]  ? __pfx_read_tsc+0x10/0x10
[   33.705117]  ? ktime_get_ts64+0x84/0x230
[   33.705652]  kunit_try_run_case+0x1b3/0x490
[   33.706031]  ? __pfx_kunit_try_run_case+0x10/0x10
[   33.706533]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   33.707025]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   33.707692]  ? __kthread_parkme+0x82/0x160
[   33.708196]  ? preempt_count_sub+0x50/0x80
[   33.708967]  ? __pfx_kunit_try_run_case+0x10/0x10
[   33.709656]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   33.710295]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   33.711126]  kthread+0x257/0x310
[   33.711882]  ? __pfx_kthread+0x10/0x10
[   33.712285]  ret_from_fork+0x41/0x80
[   33.712642]  ? __pfx_kthread+0x10/0x10
[   33.713433]  ret_from_fork_asm+0x1a/0x30
[   33.714091]  </TASK>
[   33.714352] 
[   33.714537] Allocated by task 272:
[   33.715767]  kasan_save_stack+0x3d/0x60
[   33.716154]  kasan_save_track+0x18/0x40
[   33.716521]  kasan_save_alloc_info+0x3b/0x50
[   33.717032]  __kasan_kmalloc+0xb7/0xc0
[   33.717427]  __kmalloc_cache_noprof+0x184/0x410
[   33.718077]  kasan_atomics+0x96/0x310
[   33.718464]  kunit_try_run_case+0x1b3/0x490
[   33.718914]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   33.719879]  kthread+0x257/0x310
[   33.720164]  ret_from_fork+0x41/0x80
[   33.720752]  ret_from_fork_asm+0x1a/0x30
[   33.721263] 
[   33.721634] The buggy address belongs to the object at ffff8881029f9480
[   33.721634]  which belongs to the cache kmalloc-64 of size 64
[   33.722769] The buggy address is located 0 bytes to the right of
[   33.722769]  allocated 48-byte region [ffff8881029f9480, ffff8881029f94b0)
[   33.724172] 
[   33.724547] The buggy address belongs to the physical page:
[   33.725155] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029f9
[   33.726150] flags: 0x200000000000000(node=0|zone=2)
[   33.726832] page_type: f5(slab)
[   33.727104] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   33.728035] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   33.728908] page dumped because: kasan: bad access detected
[   33.729448] 
[   33.729878] Memory state around the buggy address:
[   33.730368]  ffff8881029f9380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.731243]  ffff8881029f9400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.731990] >ffff8881029f9480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   33.732694]                                      ^
[   33.733235]  ffff8881029f9500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.734236]  ffff8881029f9580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.735092] ==================================================================
[   33.280014] ==================================================================
[   33.282398] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x993/0x5450
[   33.282811] Write of size 4 at addr ffff8881029f94b0 by task kunit_try_catch/272
[   33.283191] 
[   33.284827] CPU: 1 UID: 0 PID: 272 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241120 #1
[   33.286961] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.288215] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   33.290094] Call Trace:
[   33.290536]  <TASK>
[   33.290732]  dump_stack_lvl+0x73/0xb0
[   33.291000]  print_report+0xd1/0x640
[   33.291252]  ? __virt_addr_valid+0x1db/0x2d0
[   33.291524]  ? kasan_complete_mode_report_info+0x2a/0x200
[   33.293071]  kasan_report+0x102/0x140
[   33.293537]  ? kasan_atomics_helper+0x993/0x5450
[   33.294124]  ? kasan_atomics_helper+0x993/0x5450
[   33.294766]  kasan_check_range+0x10c/0x1c0
[   33.295206]  __kasan_check_write+0x18/0x20
[   33.295670]  kasan_atomics_helper+0x993/0x5450
[   33.296049]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   33.296446]  ? __kmalloc_cache_noprof+0x184/0x410
[   33.297090]  ? kasan_save_alloc_info+0x3b/0x50
[   33.297728]  ? kasan_atomics+0x153/0x310
[   33.298097]  kasan_atomics+0x1dd/0x310
[   33.298478]  ? __pfx_kasan_atomics+0x10/0x10
[   33.299096]  ? __pfx_read_tsc+0x10/0x10
[   33.299546]  ? ktime_get_ts64+0x84/0x230
[   33.299976]  kunit_try_run_case+0x1b3/0x490
[   33.300291]  ? __pfx_kunit_try_run_case+0x10/0x10
[   33.300906]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   33.301443]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   33.302037]  ? __kthread_parkme+0x82/0x160
[   33.302365]  ? preempt_count_sub+0x50/0x80
[   33.302936]  ? __pfx_kunit_try_run_case+0x10/0x10
[   33.303270]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   33.304019]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   33.304442]  kthread+0x257/0x310
[   33.304936]  ? __pfx_kthread+0x10/0x10
[   33.305402]  ret_from_fork+0x41/0x80
[   33.305843]  ? __pfx_kthread+0x10/0x10
[   33.306254]  ret_from_fork_asm+0x1a/0x30
[   33.306805]  </TASK>
[   33.307039] 
[   33.307196] Allocated by task 272:
[   33.307591]  kasan_save_stack+0x3d/0x60
[   33.308128]  kasan_save_track+0x18/0x40
[   33.308465]  kasan_save_alloc_info+0x3b/0x50
[   33.308952]  __kasan_kmalloc+0xb7/0xc0
[   33.309233]  __kmalloc_cache_noprof+0x184/0x410
[   33.309857]  kasan_atomics+0x96/0x310
[   33.310361]  kunit_try_run_case+0x1b3/0x490
[   33.310803]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   33.311384]  kthread+0x257/0x310
[   33.311881]  ret_from_fork+0x41/0x80
[   33.312252]  ret_from_fork_asm+0x1a/0x30
[   33.312539] 
[   33.312869] The buggy address belongs to the object at ffff8881029f9480
[   33.312869]  which belongs to the cache kmalloc-64 of size 64
[   33.314127] The buggy address is located 0 bytes to the right of
[   33.314127]  allocated 48-byte region [ffff8881029f9480, ffff8881029f94b0)
[   33.315247] 
[   33.315456] The buggy address belongs to the physical page:
[   33.315865] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029f9
[   33.316792] flags: 0x200000000000000(node=0|zone=2)
[   33.317182] page_type: f5(slab)
[   33.317434] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   33.318315] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   33.319129] page dumped because: kasan: bad access detected
[   33.319489] 
[   33.319792] Memory state around the buggy address:
[   33.320339]  ffff8881029f9380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.320931]  ffff8881029f9400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.321635] >ffff8881029f9480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   33.322289]                                      ^
[   33.322873]  ffff8881029f9500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.323501]  ffff8881029f9580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.324468] ==================================================================
[   32.612739] ==================================================================
[   32.613673] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b8a/0x5450
[   32.614607] Read of size 4 at addr ffff8881029f94b0 by task kunit_try_catch/272
[   32.616268] 
[   32.616457] CPU: 1 UID: 0 PID: 272 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241120 #1
[   32.617555] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.618874] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   32.619825] Call Trace:
[   32.620018]  <TASK>
[   32.620594]  dump_stack_lvl+0x73/0xb0
[   32.621468]  print_report+0xd1/0x640
[   32.621894]  ? __virt_addr_valid+0x1db/0x2d0
[   32.622340]  ? kasan_complete_mode_report_info+0x2a/0x200
[   32.623282]  kasan_report+0x102/0x140
[   32.624047]  ? kasan_atomics_helper+0x4b8a/0x5450
[   32.624567]  ? kasan_atomics_helper+0x4b8a/0x5450
[   32.625419]  __asan_report_load4_noabort+0x18/0x20
[   32.626345]  kasan_atomics_helper+0x4b8a/0x5450
[   32.626883]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   32.627210]  ? __kmalloc_cache_noprof+0x184/0x410
[   32.628532]  ? kasan_save_alloc_info+0x3b/0x50
[   32.628879]  ? kasan_atomics+0x153/0x310
[   32.629718]  kasan_atomics+0x1dd/0x310
[   32.630774]  ? __pfx_kasan_atomics+0x10/0x10
[   32.631348]  ? __pfx_read_tsc+0x10/0x10
[   32.631771]  ? ktime_get_ts64+0x84/0x230
[   32.632196]  kunit_try_run_case+0x1b3/0x490
[   32.632645]  ? __pfx_kunit_try_run_case+0x10/0x10
[   32.633243]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   32.634421]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   32.634764]  ? __kthread_parkme+0x82/0x160
[   32.635467]  ? preempt_count_sub+0x50/0x80
[   32.636393]  ? __pfx_kunit_try_run_case+0x10/0x10
[   32.636618]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   32.637109]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   32.638502]  kthread+0x257/0x310
[   32.639043]  ? __pfx_kthread+0x10/0x10
[   32.639540]  ret_from_fork+0x41/0x80
[   32.639953]  ? __pfx_kthread+0x10/0x10
[   32.640742]  ret_from_fork_asm+0x1a/0x30
[   32.641240]  </TASK>
[   32.641509] 
[   32.641685] Allocated by task 272:
[   32.641949]  kasan_save_stack+0x3d/0x60
[   32.643231]  kasan_save_track+0x18/0x40
[   32.643571]  kasan_save_alloc_info+0x3b/0x50
[   32.644222]  __kasan_kmalloc+0xb7/0xc0
[   32.644835]  __kmalloc_cache_noprof+0x184/0x410
[   32.645800]  kasan_atomics+0x96/0x310
[   32.646198]  kunit_try_run_case+0x1b3/0x490
[   32.646634]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   32.647728]  kthread+0x257/0x310
[   32.648049]  ret_from_fork+0x41/0x80
[   32.648885]  ret_from_fork_asm+0x1a/0x30
[   32.649654] 
[   32.649887] The buggy address belongs to the object at ffff8881029f9480
[   32.649887]  which belongs to the cache kmalloc-64 of size 64
[   32.651863] The buggy address is located 0 bytes to the right of
[   32.651863]  allocated 48-byte region [ffff8881029f9480, ffff8881029f94b0)
[   32.653931] 
[   32.654533] The buggy address belongs to the physical page:
[   32.655389] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029f9
[   32.656164] flags: 0x200000000000000(node=0|zone=2)
[   32.656852] page_type: f5(slab)
[   32.657686] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   32.658647] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   32.659639] page dumped because: kasan: bad access detected
[   32.660516] 
[   32.660745] Memory state around the buggy address:
[   32.661915]  ffff8881029f9380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.662569]  ffff8881029f9400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.663549] >ffff8881029f9480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   32.664297]                                      ^
[   32.665062]  ffff8881029f9500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.665921]  ffff8881029f9580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.667063] ==================================================================
[   33.605683] ==================================================================
[   33.606343] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xde1/0x5450
[   33.606837] Write of size 4 at addr ffff8881029f94b0 by task kunit_try_catch/272
[   33.607807] 
[   33.608177] CPU: 1 UID: 0 PID: 272 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241120 #1
[   33.609096] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.609526] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   33.610249] Call Trace:
[   33.610518]  <TASK>
[   33.610930]  dump_stack_lvl+0x73/0xb0
[   33.611431]  print_report+0xd1/0x640
[   33.611939]  ? __virt_addr_valid+0x1db/0x2d0
[   33.612371]  ? kasan_complete_mode_report_info+0x2a/0x200
[   33.612976]  kasan_report+0x102/0x140
[   33.613432]  ? kasan_atomics_helper+0xde1/0x5450
[   33.614024]  ? kasan_atomics_helper+0xde1/0x5450
[   33.614541]  kasan_check_range+0x10c/0x1c0
[   33.614931]  __kasan_check_write+0x18/0x20
[   33.615233]  kasan_atomics_helper+0xde1/0x5450
[   33.615925]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   33.616542]  ? __kmalloc_cache_noprof+0x184/0x410
[   33.617223]  ? kasan_save_alloc_info+0x3b/0x50
[   33.617957]  ? kasan_atomics+0x153/0x310
[   33.618553]  kasan_atomics+0x1dd/0x310
[   33.619114]  ? __pfx_kasan_atomics+0x10/0x10
[   33.619533]  ? __pfx_read_tsc+0x10/0x10
[   33.620080]  ? ktime_get_ts64+0x84/0x230
[   33.620758]  kunit_try_run_case+0x1b3/0x490
[   33.621181]  ? __pfx_kunit_try_run_case+0x10/0x10
[   33.621857]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   33.622318]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   33.623002]  ? __kthread_parkme+0x82/0x160
[   33.623731]  ? preempt_count_sub+0x50/0x80
[   33.624243]  ? __pfx_kunit_try_run_case+0x10/0x10
[   33.624841]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   33.625511]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   33.626144]  kthread+0x257/0x310
[   33.626757]  ? __pfx_kthread+0x10/0x10
[   33.627167]  ret_from_fork+0x41/0x80
[   33.627787]  ? __pfx_kthread+0x10/0x10
[   33.628191]  ret_from_fork_asm+0x1a/0x30
[   33.628879]  </TASK>
[   33.629151] 
[   33.629514] Allocated by task 272:
[   33.629945]  kasan_save_stack+0x3d/0x60
[   33.630646]  kasan_save_track+0x18/0x40
[   33.630970]  kasan_save_alloc_info+0x3b/0x50
[   33.631540]  __kasan_kmalloc+0xb7/0xc0
[   33.631952]  __kmalloc_cache_noprof+0x184/0x410
[   33.632441]  kasan_atomics+0x96/0x310
[   33.632924]  kunit_try_run_case+0x1b3/0x490
[   33.633307]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   33.633903]  kthread+0x257/0x310
[   33.634306]  ret_from_fork+0x41/0x80
[   33.634582]  ret_from_fork_asm+0x1a/0x30
[   33.634934] 
[   33.635165] The buggy address belongs to the object at ffff8881029f9480
[   33.635165]  which belongs to the cache kmalloc-64 of size 64
[   33.636681] The buggy address is located 0 bytes to the right of
[   33.636681]  allocated 48-byte region [ffff8881029f9480, ffff8881029f94b0)
[   33.637945] 
[   33.638116] The buggy address belongs to the physical page:
[   33.638457] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029f9
[   33.639436] flags: 0x200000000000000(node=0|zone=2)
[   33.640145] page_type: f5(slab)
[   33.640719] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   33.641490] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   33.641996] page dumped because: kasan: bad access detected
[   33.642879] 
[   33.643191] Memory state around the buggy address:
[   33.643854]  ffff8881029f9380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.644471]  ffff8881029f9400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.645407] >ffff8881029f9480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   33.646185]                                      ^
[   33.646821]  ffff8881029f9500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.647494]  ffff8881029f9580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.648228] ==================================================================
[   34.056450] ==================================================================
[   34.057149] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x49ea/0x5450
[   34.058152] Read of size 4 at addr ffff8881029f94b0 by task kunit_try_catch/272
[   34.058569] 
[   34.058791] CPU: 1 UID: 0 PID: 272 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241120 #1
[   34.059959] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.060282] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   34.060859] Call Trace:
[   34.061131]  <TASK>
[   34.061579]  dump_stack_lvl+0x73/0xb0
[   34.062436]  print_report+0xd1/0x640
[   34.063122]  ? __virt_addr_valid+0x1db/0x2d0
[   34.063900]  ? kasan_complete_mode_report_info+0x2a/0x200
[   34.064757]  kasan_report+0x102/0x140
[   34.065045]  ? kasan_atomics_helper+0x49ea/0x5450
[   34.065688]  ? kasan_atomics_helper+0x49ea/0x5450
[   34.066588]  __asan_report_load4_noabort+0x18/0x20
[   34.067312]  kasan_atomics_helper+0x49ea/0x5450
[   34.067685]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   34.068333]  ? __kmalloc_cache_noprof+0x184/0x410
[   34.068972]  ? kasan_save_alloc_info+0x3b/0x50
[   34.069399]  ? kasan_atomics+0x153/0x310
[   34.069793]  kasan_atomics+0x1dd/0x310
[   34.070359]  ? __pfx_kasan_atomics+0x10/0x10
[   34.071044]  ? __pfx_read_tsc+0x10/0x10
[   34.071553]  ? ktime_get_ts64+0x84/0x230
[   34.072002]  kunit_try_run_case+0x1b3/0x490
[   34.072539]  ? __pfx_kunit_try_run_case+0x10/0x10
[   34.073017]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   34.073554]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   34.074130]  ? __kthread_parkme+0x82/0x160
[   34.074595]  ? preempt_count_sub+0x50/0x80
[   34.075096]  ? __pfx_kunit_try_run_case+0x10/0x10
[   34.075564]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   34.076345]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   34.076970]  kthread+0x257/0x310
[   34.077474]  ? __pfx_kthread+0x10/0x10
[   34.077906]  ret_from_fork+0x41/0x80
[   34.078321]  ? __pfx_kthread+0x10/0x10
[   34.079266]  ret_from_fork_asm+0x1a/0x30
[   34.079979]  </TASK>
[   34.080151] 
[   34.080291] Allocated by task 272:
[   34.080502]  kasan_save_stack+0x3d/0x60
[   34.080777]  kasan_save_track+0x18/0x40
[   34.081020]  kasan_save_alloc_info+0x3b/0x50
[   34.081279]  __kasan_kmalloc+0xb7/0xc0
[   34.081516]  __kmalloc_cache_noprof+0x184/0x410
[   34.083249]  kasan_atomics+0x96/0x310
[   34.085551]  kunit_try_run_case+0x1b3/0x490
[   34.086795]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   34.087512]  kthread+0x257/0x310
[   34.088477]  ret_from_fork+0x41/0x80
[   34.089151]  ret_from_fork_asm+0x1a/0x30
[   34.089773] 
[   34.089914] The buggy address belongs to the object at ffff8881029f9480
[   34.089914]  which belongs to the cache kmalloc-64 of size 64
[   34.090509] The buggy address is located 0 bytes to the right of
[   34.090509]  allocated 48-byte region [ffff8881029f9480, ffff8881029f94b0)
[   34.093236] 
[   34.093422] The buggy address belongs to the physical page:
[   34.094880] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029f9
[   34.095627] flags: 0x200000000000000(node=0|zone=2)
[   34.096747] page_type: f5(slab)
[   34.096995] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   34.097664] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   34.098423] page dumped because: kasan: bad access detected
[   34.098821] 
[   34.099176] Memory state around the buggy address:
[   34.099791]  ffff8881029f9380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   34.100688]  ffff8881029f9400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   34.101767] >ffff8881029f9480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   34.102228]                                      ^
[   34.102755]  ffff8881029f9500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.103382]  ffff8881029f9580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.104272] ==================================================================
[   35.211511] ==================================================================
[   35.213529] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4f73/0x5450
[   35.214239] Read of size 8 at addr ffff8881029f94b0 by task kunit_try_catch/272
[   35.215165] 
[   35.216181] CPU: 1 UID: 0 PID: 272 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241120 #1
[   35.217121] Tainted: [B]=BAD_PAGE, [N]=TEST
[   35.217366] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   35.218171] Call Trace:
[   35.218454]  <TASK>
[   35.219050]  dump_stack_lvl+0x73/0xb0
[   35.219451]  print_report+0xd1/0x640
[   35.219895]  ? __virt_addr_valid+0x1db/0x2d0
[   35.220652]  ? kasan_complete_mode_report_info+0x2a/0x200
[   35.221316]  kasan_report+0x102/0x140
[   35.221745]  ? kasan_atomics_helper+0x4f73/0x5450
[   35.222444]  ? kasan_atomics_helper+0x4f73/0x5450
[   35.223360]  __asan_report_load8_noabort+0x18/0x20
[   35.223839]  kasan_atomics_helper+0x4f73/0x5450
[   35.224257]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   35.224665]  ? __kmalloc_cache_noprof+0x184/0x410
[   35.225489]  ? kasan_save_alloc_info+0x3b/0x50
[   35.226258]  ? kasan_atomics+0x153/0x310
[   35.226812]  kasan_atomics+0x1dd/0x310
[   35.227189]  ? __pfx_kasan_atomics+0x10/0x10
[   35.228480]  ? __pfx_read_tsc+0x10/0x10
[   35.228955]  ? ktime_get_ts64+0x84/0x230
[   35.229391]  kunit_try_run_case+0x1b3/0x490
[   35.229786]  ? __pfx_kunit_try_run_case+0x10/0x10
[   35.230322]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   35.231469]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   35.232578]  ? __kthread_parkme+0x82/0x160
[   35.233280]  ? preempt_count_sub+0x50/0x80
[   35.234178]  ? __pfx_kunit_try_run_case+0x10/0x10
[   35.235206]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   35.236065]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   35.236565]  kthread+0x257/0x310
[   35.237087]  ? __pfx_kthread+0x10/0x10
[   35.237435]  ret_from_fork+0x41/0x80
[   35.238235]  ? __pfx_kthread+0x10/0x10
[   35.238496]  ret_from_fork_asm+0x1a/0x30
[   35.239349]  </TASK>
[   35.239630] 
[   35.239874] Allocated by task 272:
[   35.240140]  kasan_save_stack+0x3d/0x60
[   35.240615]  kasan_save_track+0x18/0x40
[   35.241024]  kasan_save_alloc_info+0x3b/0x50
[   35.242286]  __kasan_kmalloc+0xb7/0xc0
[   35.242649]  __kmalloc_cache_noprof+0x184/0x410
[   35.243487]  kasan_atomics+0x96/0x310
[   35.243802]  kunit_try_run_case+0x1b3/0x490
[   35.244539]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   35.245161]  kthread+0x257/0x310
[   35.245328]  ret_from_fork+0x41/0x80
[   35.245504]  ret_from_fork_asm+0x1a/0x30
[   35.245775] 
[   35.246241] The buggy address belongs to the object at ffff8881029f9480
[   35.246241]  which belongs to the cache kmalloc-64 of size 64
[   35.248335] The buggy address is located 0 bytes to the right of
[   35.248335]  allocated 48-byte region [ffff8881029f9480, ffff8881029f94b0)
[   35.250748] 
[   35.251185] The buggy address belongs to the physical page:
[   35.251472] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029f9
[   35.251971] flags: 0x200000000000000(node=0|zone=2)
[   35.252524] page_type: f5(slab)
[   35.252797] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   35.253658] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   35.254495] page dumped because: kasan: bad access detected
[   35.255322] 
[   35.255618] Memory state around the buggy address:
[   35.256090]  ffff8881029f9380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.256913]  ffff8881029f9400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.257693] >ffff8881029f9480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   35.258658]                                      ^
[   35.259249]  ffff8881029f9500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.260061]  ffff8881029f9580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.260795] ==================================================================
[   33.515543] ==================================================================
[   33.516713] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a86/0x5450
[   33.517338] Read of size 4 at addr ffff8881029f94b0 by task kunit_try_catch/272
[   33.518037] 
[   33.518611] CPU: 1 UID: 0 PID: 272 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241120 #1
[   33.519374] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.519647] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   33.520658] Call Trace:
[   33.521145]  <TASK>
[   33.521491]  dump_stack_lvl+0x73/0xb0
[   33.521801]  print_report+0xd1/0x640
[   33.522100]  ? __virt_addr_valid+0x1db/0x2d0
[   33.522752]  ? kasan_complete_mode_report_info+0x2a/0x200
[   33.523419]  kasan_report+0x102/0x140
[   33.524041]  ? kasan_atomics_helper+0x4a86/0x5450
[   33.524617]  ? kasan_atomics_helper+0x4a86/0x5450
[   33.525196]  __asan_report_load4_noabort+0x18/0x20
[   33.525683]  kasan_atomics_helper+0x4a86/0x5450
[   33.526126]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   33.526463]  ? __kmalloc_cache_noprof+0x184/0x410
[   33.527341]  ? kasan_save_alloc_info+0x3b/0x50
[   33.528088]  ? kasan_atomics+0x153/0x310
[   33.528623]  kasan_atomics+0x1dd/0x310
[   33.529108]  ? __pfx_kasan_atomics+0x10/0x10
[   33.529432]  ? __pfx_read_tsc+0x10/0x10
[   33.530160]  ? ktime_get_ts64+0x84/0x230
[   33.530670]  kunit_try_run_case+0x1b3/0x490
[   33.531099]  ? __pfx_kunit_try_run_case+0x10/0x10
[   33.531642]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   33.532401]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   33.533071]  ? __kthread_parkme+0x82/0x160
[   33.533505]  ? preempt_count_sub+0x50/0x80
[   33.534120]  ? __pfx_kunit_try_run_case+0x10/0x10
[   33.534450]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   33.535241]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   33.536014]  kthread+0x257/0x310
[   33.536510]  ? __pfx_kthread+0x10/0x10
[   33.537025]  ret_from_fork+0x41/0x80
[   33.537307]  ? __pfx_kthread+0x10/0x10
[   33.537945]  ret_from_fork_asm+0x1a/0x30
[   33.538578]  </TASK>
[   33.538983] 
[   33.539145] Allocated by task 272:
[   33.539774]  kasan_save_stack+0x3d/0x60
[   33.540368]  kasan_save_track+0x18/0x40
[   33.540826]  kasan_save_alloc_info+0x3b/0x50
[   33.541380]  __kasan_kmalloc+0xb7/0xc0
[   33.541907]  __kmalloc_cache_noprof+0x184/0x410
[   33.542533]  kasan_atomics+0x96/0x310
[   33.542947]  kunit_try_run_case+0x1b3/0x490
[   33.544170]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   33.544916]  kthread+0x257/0x310
[   33.545136]  ret_from_fork+0x41/0x80
[   33.545370]  ret_from_fork_asm+0x1a/0x30
[   33.545639] 
[   33.545811] The buggy address belongs to the object at ffff8881029f9480
[   33.545811]  which belongs to the cache kmalloc-64 of size 64
[   33.546497] The buggy address is located 0 bytes to the right of
[   33.546497]  allocated 48-byte region [ffff8881029f9480, ffff8881029f94b0)
[   33.547428] 
[   33.547572] The buggy address belongs to the physical page:
[   33.547971] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029f9
[   33.548374] flags: 0x200000000000000(node=0|zone=2)
[   33.548799] page_type: f5(slab)
[   33.549049] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   33.549882] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   33.550474] page dumped because: kasan: bad access detected
[   33.550850] 
[   33.550996] Memory state around the buggy address:
[   33.551287]  ffff8881029f9380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.553194]  ffff8881029f9400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.555511] >ffff8881029f9480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   33.555985]                                      ^
[   33.556263]  ffff8881029f9500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.556664]  ffff8881029f9580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.557197] ==================================================================
[   33.416443] ==================================================================
[   33.417768] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xb6b/0x5450
[   33.418548] Write of size 4 at addr ffff8881029f94b0 by task kunit_try_catch/272
[   33.419985] 
[   33.420176] CPU: 1 UID: 0 PID: 272 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241120 #1
[   33.421240] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.421758] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   33.423196] Call Trace:
[   33.423847]  <TASK>
[   33.424118]  dump_stack_lvl+0x73/0xb0
[   33.424541]  print_report+0xd1/0x640
[   33.425659]  ? __virt_addr_valid+0x1db/0x2d0
[   33.426124]  ? kasan_complete_mode_report_info+0x2a/0x200
[   33.426860]  kasan_report+0x102/0x140
[   33.427417]  ? kasan_atomics_helper+0xb6b/0x5450
[   33.428300]  ? kasan_atomics_helper+0xb6b/0x5450
[   33.429003]  kasan_check_range+0x10c/0x1c0
[   33.429593]  __kasan_check_write+0x18/0x20
[   33.430203]  kasan_atomics_helper+0xb6b/0x5450
[   33.430954]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   33.431618]  ? __kmalloc_cache_noprof+0x184/0x410
[   33.432292]  ? kasan_save_alloc_info+0x3b/0x50
[   33.432810]  ? kasan_atomics+0x153/0x310
[   33.433219]  kasan_atomics+0x1dd/0x310
[   33.433593]  ? __pfx_kasan_atomics+0x10/0x10
[   33.434542]  ? __pfx_read_tsc+0x10/0x10
[   33.435168]  ? ktime_get_ts64+0x84/0x230
[   33.435781]  kunit_try_run_case+0x1b3/0x490
[   33.436487]  ? __pfx_kunit_try_run_case+0x10/0x10
[   33.437281]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   33.438179]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   33.439253]  ? __kthread_parkme+0x82/0x160
[   33.439616]  ? preempt_count_sub+0x50/0x80
[   33.440180]  ? __pfx_kunit_try_run_case+0x10/0x10
[   33.440965]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   33.441733]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   33.442284]  kthread+0x257/0x310
[   33.442642]  ? __pfx_kthread+0x10/0x10
[   33.443472]  ret_from_fork+0x41/0x80
[   33.444106]  ? __pfx_kthread+0x10/0x10
[   33.444800]  ret_from_fork_asm+0x1a/0x30
[   33.445395]  </TASK>
[   33.445764] 
[   33.445914] Allocated by task 272:
[   33.446280]  kasan_save_stack+0x3d/0x60
[   33.446695]  kasan_save_track+0x18/0x40
[   33.447653]  kasan_save_alloc_info+0x3b/0x50
[   33.448270]  __kasan_kmalloc+0xb7/0xc0
[   33.448949]  __kmalloc_cache_noprof+0x184/0x410
[   33.449413]  kasan_atomics+0x96/0x310
[   33.450492]  kunit_try_run_case+0x1b3/0x490
[   33.450990]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   33.451509]  kthread+0x257/0x310
[   33.452374]  ret_from_fork+0x41/0x80
[   33.452730]  ret_from_fork_asm+0x1a/0x30
[   33.453526] 
[   33.453728] The buggy address belongs to the object at ffff8881029f9480
[   33.453728]  which belongs to the cache kmalloc-64 of size 64
[   33.454637] The buggy address is located 0 bytes to the right of
[   33.454637]  allocated 48-byte region [ffff8881029f9480, ffff8881029f94b0)
[   33.456207] 
[   33.456659] The buggy address belongs to the physical page:
[   33.457516] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029f9
[   33.458236] flags: 0x200000000000000(node=0|zone=2)
[   33.459051] page_type: f5(slab)
[   33.459489] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   33.460752] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   33.461402] page dumped because: kasan: bad access detected
[   33.462410] 
[   33.462595] Memory state around the buggy address:
[   33.462955]  ffff8881029f9380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.463812]  ffff8881029f9400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.464400] >ffff8881029f9480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   33.465599]                                      ^
[   33.466103]  ffff8881029f9500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.466830]  ffff8881029f9580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.467646] ==================================================================
[   32.784514] ==================================================================
[   32.785151] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b56/0x5450
[   32.785884] Read of size 4 at addr ffff8881029f94b0 by task kunit_try_catch/272
[   32.786823] 
[   32.787299] CPU: 1 UID: 0 PID: 272 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241120 #1
[   32.788345] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.788844] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   32.789944] Call Trace:
[   32.790356]  <TASK>
[   32.790658]  dump_stack_lvl+0x73/0xb0
[   32.791096]  print_report+0xd1/0x640
[   32.791572]  ? __virt_addr_valid+0x1db/0x2d0
[   32.792551]  ? kasan_complete_mode_report_info+0x2a/0x200
[   32.793118]  kasan_report+0x102/0x140
[   32.793401]  ? kasan_atomics_helper+0x4b56/0x5450
[   32.794136]  ? kasan_atomics_helper+0x4b56/0x5450
[   32.794935]  __asan_report_load4_noabort+0x18/0x20
[   32.795465]  kasan_atomics_helper+0x4b56/0x5450
[   32.795960]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   32.796739]  ? __kmalloc_cache_noprof+0x184/0x410
[   32.797282]  ? kasan_save_alloc_info+0x3b/0x50
[   32.797736]  ? kasan_atomics+0x153/0x310
[   32.798211]  kasan_atomics+0x1dd/0x310
[   32.798555]  ? __pfx_kasan_atomics+0x10/0x10
[   32.799656]  ? __pfx_read_tsc+0x10/0x10
[   32.801014]  ? ktime_get_ts64+0x84/0x230
[   32.801584]  kunit_try_run_case+0x1b3/0x490
[   32.802175]  ? __pfx_kunit_try_run_case+0x10/0x10
[   32.803150]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   32.804113]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   32.805275]  ? __kthread_parkme+0x82/0x160
[   32.805639]  ? preempt_count_sub+0x50/0x80
[   32.806136]  ? __pfx_kunit_try_run_case+0x10/0x10
[   32.806874]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   32.807917]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   32.808856]  kthread+0x257/0x310
[   32.809216]  ? __pfx_kthread+0x10/0x10
[   32.810566]  ret_from_fork+0x41/0x80
[   32.810979]  ? __pfx_kthread+0x10/0x10
[   32.811461]  ret_from_fork_asm+0x1a/0x30
[   32.812127]  </TASK>
[   32.812604] 
[   32.812797] Allocated by task 272:
[   32.813836]  kasan_save_stack+0x3d/0x60
[   32.814239]  kasan_save_track+0x18/0x40
[   32.815025]  kasan_save_alloc_info+0x3b/0x50
[   32.815672]  __kasan_kmalloc+0xb7/0xc0
[   32.816105]  __kmalloc_cache_noprof+0x184/0x410
[   32.817033]  kasan_atomics+0x96/0x310
[   32.817509]  kunit_try_run_case+0x1b3/0x490
[   32.818258]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   32.819070]  kthread+0x257/0x310
[   32.819685]  ret_from_fork+0x41/0x80
[   32.820077]  ret_from_fork_asm+0x1a/0x30
[   32.820534] 
[   32.820784] The buggy address belongs to the object at ffff8881029f9480
[   32.820784]  which belongs to the cache kmalloc-64 of size 64
[   32.822748] The buggy address is located 0 bytes to the right of
[   32.822748]  allocated 48-byte region [ffff8881029f9480, ffff8881029f94b0)
[   32.824203] 
[   32.824865] The buggy address belongs to the physical page:
[   32.825616] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029f9
[   32.826577] flags: 0x200000000000000(node=0|zone=2)
[   32.827127] page_type: f5(slab)
[   32.827418] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   32.828653] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   32.829674] page dumped because: kasan: bad access detected
[   32.830177] 
[   32.830392] Memory state around the buggy address:
[   32.831346]  ffff8881029f9380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.832255]  ffff8881029f9400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.832940] >ffff8881029f9480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   32.833598]                                      ^
[   32.835033]  ffff8881029f9500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.836230]  ffff8881029f9580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.838109] ==================================================================
[   35.402274] ==================================================================
[   35.402821] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4fb4/0x5450
[   35.403474] Read of size 8 at addr ffff8881029f94b0 by task kunit_try_catch/272
[   35.404246] 
[   35.404512] CPU: 1 UID: 0 PID: 272 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241120 #1
[   35.405513] Tainted: [B]=BAD_PAGE, [N]=TEST
[   35.406106] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   35.406930] Call Trace:
[   35.407272]  <TASK>
[   35.407566]  dump_stack_lvl+0x73/0xb0
[   35.407962]  print_report+0xd1/0x640
[   35.408499]  ? __virt_addr_valid+0x1db/0x2d0
[   35.408897]  ? kasan_complete_mode_report_info+0x2a/0x200
[   35.409576]  kasan_report+0x102/0x140
[   35.410020]  ? kasan_atomics_helper+0x4fb4/0x5450
[   35.410545]  ? kasan_atomics_helper+0x4fb4/0x5450
[   35.411676]  __asan_report_load8_noabort+0x18/0x20
[   35.413360]  kasan_atomics_helper+0x4fb4/0x5450
[   35.414616]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   35.415282]  ? __kmalloc_cache_noprof+0x184/0x410
[   35.416592]  ? kasan_save_alloc_info+0x3b/0x50
[   35.416905]  ? kasan_atomics+0x153/0x310
[   35.417188]  kasan_atomics+0x1dd/0x310
[   35.417466]  ? __pfx_kasan_atomics+0x10/0x10
[   35.418640]  ? __pfx_read_tsc+0x10/0x10
[   35.419961]  ? ktime_get_ts64+0x84/0x230
[   35.420445]  kunit_try_run_case+0x1b3/0x490
[   35.421056]  ? __pfx_kunit_try_run_case+0x10/0x10
[   35.421406]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   35.421831]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   35.422277]  ? __kthread_parkme+0x82/0x160
[   35.424220]  ? preempt_count_sub+0x50/0x80
[   35.424534]  ? __pfx_kunit_try_run_case+0x10/0x10
[   35.424948]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   35.425445]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   35.425928]  kthread+0x257/0x310
[   35.426184]  ? __pfx_kthread+0x10/0x10
[   35.426522]  ret_from_fork+0x41/0x80
[   35.426841]  ? __pfx_kthread+0x10/0x10
[   35.427097]  ret_from_fork_asm+0x1a/0x30
[   35.427395]  </TASK>
[   35.427562] 
[   35.427799] Allocated by task 272:
[   35.428148]  kasan_save_stack+0x3d/0x60
[   35.428656]  kasan_save_track+0x18/0x40
[   35.429147]  kasan_save_alloc_info+0x3b/0x50
[   35.429458]  __kasan_kmalloc+0xb7/0xc0
[   35.430005]  __kmalloc_cache_noprof+0x184/0x410
[   35.430453]  kasan_atomics+0x96/0x310
[   35.430922]  kunit_try_run_case+0x1b3/0x490
[   35.431242]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   35.431896]  kthread+0x257/0x310
[   35.432298]  ret_from_fork+0x41/0x80
[   35.432676]  ret_from_fork_asm+0x1a/0x30
[   35.432999] 
[   35.433161] The buggy address belongs to the object at ffff8881029f9480
[   35.433161]  which belongs to the cache kmalloc-64 of size 64
[   35.434039] The buggy address is located 0 bytes to the right of
[   35.434039]  allocated 48-byte region [ffff8881029f9480, ffff8881029f94b0)
[   35.435467] 
[   35.435791] The buggy address belongs to the physical page:
[   35.436404] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029f9
[   35.437017] flags: 0x200000000000000(node=0|zone=2)
[   35.437586] page_type: f5(slab)
[   35.437974] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   35.438690] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   35.439282] page dumped because: kasan: bad access detected
[   35.439858] 
[   35.440108] Memory state around the buggy address:
[   35.440467]  ffff8881029f9380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.441158]  ffff8881029f9400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.441807] >ffff8881029f9480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   35.442295]                                      ^
[   35.442743]  ffff8881029f9500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.443526]  ffff8881029f9580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.445208] ==================================================================
[   35.025114] ==================================================================
[   35.025920] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1d7b/0x5450
[   35.026625] Write of size 8 at addr ffff8881029f94b0 by task kunit_try_catch/272
[   35.027117] 
[   35.027404] CPU: 1 UID: 0 PID: 272 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241120 #1
[   35.028525] Tainted: [B]=BAD_PAGE, [N]=TEST
[   35.029122] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   35.030163] Call Trace:
[   35.030513]  <TASK>
[   35.030799]  dump_stack_lvl+0x73/0xb0
[   35.031359]  print_report+0xd1/0x640
[   35.031935]  ? __virt_addr_valid+0x1db/0x2d0
[   35.032260]  ? kasan_complete_mode_report_info+0x2a/0x200
[   35.033099]  kasan_report+0x102/0x140
[   35.033506]  ? kasan_atomics_helper+0x1d7b/0x5450
[   35.034104]  ? kasan_atomics_helper+0x1d7b/0x5450
[   35.034448]  kasan_check_range+0x10c/0x1c0
[   35.035088]  __kasan_check_write+0x18/0x20
[   35.035675]  kasan_atomics_helper+0x1d7b/0x5450
[   35.036083]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   35.036501]  ? __kmalloc_cache_noprof+0x184/0x410
[   35.037542]  ? kasan_save_alloc_info+0x3b/0x50
[   35.038075]  ? kasan_atomics+0x153/0x310
[   35.038747]  kasan_atomics+0x1dd/0x310
[   35.039049]  ? __pfx_kasan_atomics+0x10/0x10
[   35.039618]  ? __pfx_read_tsc+0x10/0x10
[   35.040152]  ? ktime_get_ts64+0x84/0x230
[   35.040724]  kunit_try_run_case+0x1b3/0x490
[   35.041105]  ? __pfx_kunit_try_run_case+0x10/0x10
[   35.041606]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   35.042284]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   35.042739]  ? __kthread_parkme+0x82/0x160
[   35.043273]  ? preempt_count_sub+0x50/0x80
[   35.043655]  ? __pfx_kunit_try_run_case+0x10/0x10
[   35.044296]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   35.044984]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   35.045516]  kthread+0x257/0x310
[   35.045967]  ? __pfx_kthread+0x10/0x10
[   35.046264]  ret_from_fork+0x41/0x80
[   35.046796]  ? __pfx_kthread+0x10/0x10
[   35.047253]  ret_from_fork_asm+0x1a/0x30
[   35.047905]  </TASK>
[   35.048215] 
[   35.048411] Allocated by task 272:
[   35.048919]  kasan_save_stack+0x3d/0x60
[   35.049326]  kasan_save_track+0x18/0x40
[   35.049607]  kasan_save_alloc_info+0x3b/0x50
[   35.050258]  __kasan_kmalloc+0xb7/0xc0
[   35.050765]  __kmalloc_cache_noprof+0x184/0x410
[   35.051079]  kasan_atomics+0x96/0x310
[   35.051568]  kunit_try_run_case+0x1b3/0x490
[   35.052021]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   35.052371]  kthread+0x257/0x310
[   35.052965]  ret_from_fork+0x41/0x80
[   35.053525]  ret_from_fork_asm+0x1a/0x30
[   35.054032] 
[   35.054238] The buggy address belongs to the object at ffff8881029f9480
[   35.054238]  which belongs to the cache kmalloc-64 of size 64
[   35.055310] The buggy address is located 0 bytes to the right of
[   35.055310]  allocated 48-byte region [ffff8881029f9480, ffff8881029f94b0)
[   35.056829] 
[   35.057082] The buggy address belongs to the physical page:
[   35.057502] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029f9
[   35.058296] flags: 0x200000000000000(node=0|zone=2)
[   35.058804] page_type: f5(slab)
[   35.059167] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   35.060061] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   35.060817] page dumped because: kasan: bad access detected
[   35.061253] 
[   35.061355] Memory state around the buggy address:
[   35.061554]  ffff8881029f9380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.063265]  ffff8881029f9400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.064559] >ffff8881029f9480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   35.065885]                                      ^
[   35.066560]  ffff8881029f9500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.067621]  ffff8881029f9580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.068589] ==================================================================
[   35.310886] ==================================================================
[   35.311543] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4f9a/0x5450
[   35.312085] Read of size 8 at addr ffff8881029f94b0 by task kunit_try_catch/272
[   35.312798] 
[   35.313074] CPU: 1 UID: 0 PID: 272 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241120 #1
[   35.314018] Tainted: [B]=BAD_PAGE, [N]=TEST
[   35.314397] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   35.315185] Call Trace:
[   35.315440]  <TASK>
[   35.315795]  dump_stack_lvl+0x73/0xb0
[   35.316186]  print_report+0xd1/0x640
[   35.316576]  ? __virt_addr_valid+0x1db/0x2d0
[   35.316972]  ? kasan_complete_mode_report_info+0x2a/0x200
[   35.317555]  kasan_report+0x102/0x140
[   35.318022]  ? kasan_atomics_helper+0x4f9a/0x5450
[   35.318648]  ? kasan_atomics_helper+0x4f9a/0x5450
[   35.319047]  __asan_report_load8_noabort+0x18/0x20
[   35.319526]  kasan_atomics_helper+0x4f9a/0x5450
[   35.320062]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   35.320728]  ? __kmalloc_cache_noprof+0x184/0x410
[   35.321155]  ? kasan_save_alloc_info+0x3b/0x50
[   35.321595]  ? kasan_atomics+0x153/0x310
[   35.321972]  kasan_atomics+0x1dd/0x310
[   35.322460]  ? __pfx_kasan_atomics+0x10/0x10
[   35.322911]  ? __pfx_read_tsc+0x10/0x10
[   35.323308]  ? ktime_get_ts64+0x84/0x230
[   35.323781]  kunit_try_run_case+0x1b3/0x490
[   35.324244]  ? __pfx_kunit_try_run_case+0x10/0x10
[   35.324812]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   35.325299]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   35.325923]  ? __kthread_parkme+0x82/0x160
[   35.326383]  ? preempt_count_sub+0x50/0x80
[   35.326966]  ? __pfx_kunit_try_run_case+0x10/0x10
[   35.327376]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   35.327873]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   35.328532]  kthread+0x257/0x310
[   35.328946]  ? __pfx_kthread+0x10/0x10
[   35.329388]  ret_from_fork+0x41/0x80
[   35.329884]  ? __pfx_kthread+0x10/0x10
[   35.330295]  ret_from_fork_asm+0x1a/0x30
[   35.330880]  </TASK>
[   35.331108] 
[   35.331358] Allocated by task 272:
[   35.331700]  kasan_save_stack+0x3d/0x60
[   35.332150]  kasan_save_track+0x18/0x40
[   35.332512]  kasan_save_alloc_info+0x3b/0x50
[   35.332995]  __kasan_kmalloc+0xb7/0xc0
[   35.333278]  __kmalloc_cache_noprof+0x184/0x410
[   35.333901]  kasan_atomics+0x96/0x310
[   35.335258]  kunit_try_run_case+0x1b3/0x490
[   35.335808]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   35.336968]  kthread+0x257/0x310
[   35.337340]  ret_from_fork+0x41/0x80
[   35.338155]  ret_from_fork_asm+0x1a/0x30
[   35.338773] 
[   35.339089] The buggy address belongs to the object at ffff8881029f9480
[   35.339089]  which belongs to the cache kmalloc-64 of size 64
[   35.340677] The buggy address is located 0 bytes to the right of
[   35.340677]  allocated 48-byte region [ffff8881029f9480, ffff8881029f94b0)
[   35.341887] 
[   35.342043] The buggy address belongs to the physical page:
[   35.342679] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029f9
[   35.343957] flags: 0x200000000000000(node=0|zone=2)
[   35.344508] page_type: f5(slab)
[   35.345129] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   35.345690] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   35.346425] page dumped because: kasan: bad access detected
[   35.347338] 
[   35.347531] Memory state around the buggy address:
[   35.348276]  ffff8881029f9380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.349140]  ffff8881029f9400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.350350] >ffff8881029f9480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   35.351261]                                      ^
[   35.351753]  ffff8881029f9500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.352454]  ffff8881029f9580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.353196] ==================================================================
[   35.533966] ==================================================================
[   35.535288] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x224d/0x5450
[   35.535893] Write of size 8 at addr ffff8881029f94b0 by task kunit_try_catch/272
[   35.536553] 
[   35.536791] CPU: 1 UID: 0 PID: 272 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241120 #1
[   35.537693] Tainted: [B]=BAD_PAGE, [N]=TEST
[   35.538051] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   35.538644] Call Trace:
[   35.538962]  <TASK>
[   35.539271]  dump_stack_lvl+0x73/0xb0
[   35.539692]  print_report+0xd1/0x640
[   35.540092]  ? __virt_addr_valid+0x1db/0x2d0
[   35.540486]  ? kasan_complete_mode_report_info+0x2a/0x200
[   35.541113]  kasan_report+0x102/0x140
[   35.541484]  ? kasan_atomics_helper+0x224d/0x5450
[   35.541940]  ? kasan_atomics_helper+0x224d/0x5450
[   35.542378]  kasan_check_range+0x10c/0x1c0
[   35.542854]  __kasan_check_write+0x18/0x20
[   35.543159]  kasan_atomics_helper+0x224d/0x5450
[   35.543590]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   35.544187]  ? __kmalloc_cache_noprof+0x184/0x410
[   35.544543]  ? kasan_save_alloc_info+0x3b/0x50
[   35.545130]  ? kasan_atomics+0x153/0x310
[   35.545685]  kasan_atomics+0x1dd/0x310
[   35.546023]  ? __pfx_kasan_atomics+0x10/0x10
[   35.546353]  ? __pfx_read_tsc+0x10/0x10
[   35.546884]  ? ktime_get_ts64+0x84/0x230
[   35.547409]  kunit_try_run_case+0x1b3/0x490
[   35.548016]  ? __pfx_kunit_try_run_case+0x10/0x10
[   35.548485]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   35.548954]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   35.549414]  ? __kthread_parkme+0x82/0x160
[   35.549955]  ? preempt_count_sub+0x50/0x80
[   35.550326]  ? __pfx_kunit_try_run_case+0x10/0x10
[   35.550777]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   35.551470]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   35.552041]  kthread+0x257/0x310
[   35.552328]  ? __pfx_kthread+0x10/0x10
[   35.552818]  ret_from_fork+0x41/0x80
[   35.553101]  ? __pfx_kthread+0x10/0x10
[   35.553565]  ret_from_fork_asm+0x1a/0x30
[   35.554162]  </TASK>
[   35.554490] 
[   35.554741] Allocated by task 272:
[   35.555167]  kasan_save_stack+0x3d/0x60
[   35.555456]  kasan_save_track+0x18/0x40
[   35.555895]  kasan_save_alloc_info+0x3b/0x50
[   35.556442]  __kasan_kmalloc+0xb7/0xc0
[   35.556859]  __kmalloc_cache_noprof+0x184/0x410
[   35.557229]  kasan_atomics+0x96/0x310
[   35.557801]  kunit_try_run_case+0x1b3/0x490
[   35.558213]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   35.558599]  kthread+0x257/0x310
[   35.559089]  ret_from_fork+0x41/0x80
[   35.559535]  ret_from_fork_asm+0x1a/0x30
[   35.560081] 
[   35.560283] The buggy address belongs to the object at ffff8881029f9480
[   35.560283]  which belongs to the cache kmalloc-64 of size 64
[   35.561226] The buggy address is located 0 bytes to the right of
[   35.561226]  allocated 48-byte region [ffff8881029f9480, ffff8881029f94b0)
[   35.562429] 
[   35.562591] The buggy address belongs to the physical page:
[   35.563194] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029f9
[   35.564032] flags: 0x200000000000000(node=0|zone=2)
[   35.564475] page_type: f5(slab)
[   35.565266] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   35.566138] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   35.566976] page dumped because: kasan: bad access detected
[   35.567543] 
[   35.567906] Memory state around the buggy address:
[   35.568259]  ffff8881029f9380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.568994]  ffff8881029f9400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.569654] >ffff8881029f9480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   35.570523]                                      ^
[   35.571056]  ffff8881029f9500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.571882]  ffff8881029f9580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.572544] ==================================================================
[   33.954028] ==================================================================
[   33.955510] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a04/0x5450
[   33.956724] Read of size 4 at addr ffff8881029f94b0 by task kunit_try_catch/272
[   33.957457] 
[   33.958260] CPU: 1 UID: 0 PID: 272 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241120 #1
[   33.959336] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.960124] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   33.961233] Call Trace:
[   33.961590]  <TASK>
[   33.962242]  dump_stack_lvl+0x73/0xb0
[   33.962550]  print_report+0xd1/0x640
[   33.963295]  ? __virt_addr_valid+0x1db/0x2d0
[   33.964027]  ? kasan_complete_mode_report_info+0x2a/0x200
[   33.964763]  kasan_report+0x102/0x140
[   33.965434]  ? kasan_atomics_helper+0x4a04/0x5450
[   33.965996]  ? kasan_atomics_helper+0x4a04/0x5450
[   33.966872]  __asan_report_load4_noabort+0x18/0x20
[   33.967546]  kasan_atomics_helper+0x4a04/0x5450
[   33.968105]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   33.968948]  ? __kmalloc_cache_noprof+0x184/0x410
[   33.969606]  ? kasan_save_alloc_info+0x3b/0x50
[   33.970293]  ? kasan_atomics+0x153/0x310
[   33.970951]  kasan_atomics+0x1dd/0x310
[   33.971290]  ? __pfx_kasan_atomics+0x10/0x10
[   33.972156]  ? __pfx_read_tsc+0x10/0x10
[   33.972714]  ? ktime_get_ts64+0x84/0x230
[   33.973220]  kunit_try_run_case+0x1b3/0x490
[   33.974144]  ? __pfx_kunit_try_run_case+0x10/0x10
[   33.974661]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   33.975183]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   33.975646]  ? __kthread_parkme+0x82/0x160
[   33.976561]  ? preempt_count_sub+0x50/0x80
[   33.977323]  ? __pfx_kunit_try_run_case+0x10/0x10
[   33.978027]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   33.978844]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   33.979566]  kthread+0x257/0x310
[   33.980108]  ? __pfx_kthread+0x10/0x10
[   33.980788]  ret_from_fork+0x41/0x80
[   33.981590]  ? __pfx_kthread+0x10/0x10
[   33.982243]  ret_from_fork_asm+0x1a/0x30
[   33.982828]  </TASK>
[   33.983188] 
[   33.983350] Allocated by task 272:
[   33.984329]  kasan_save_stack+0x3d/0x60
[   33.985138]  kasan_save_track+0x18/0x40
[   33.985790]  kasan_save_alloc_info+0x3b/0x50
[   33.986306]  __kasan_kmalloc+0xb7/0xc0
[   33.987131]  __kmalloc_cache_noprof+0x184/0x410
[   33.987557]  kasan_atomics+0x96/0x310
[   33.988269]  kunit_try_run_case+0x1b3/0x490
[   33.988962]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   33.989494]  kthread+0x257/0x310
[   33.990359]  ret_from_fork+0x41/0x80
[   33.990763]  ret_from_fork_asm+0x1a/0x30
[   33.991501] 
[   33.991846] The buggy address belongs to the object at ffff8881029f9480
[   33.991846]  which belongs to the cache kmalloc-64 of size 64
[   33.993122] The buggy address is located 0 bytes to the right of
[   33.993122]  allocated 48-byte region [ffff8881029f9480, ffff8881029f94b0)
[   33.994567] 
[   33.995036] The buggy address belongs to the physical page:
[   33.995882] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029f9
[   33.996409] flags: 0x200000000000000(node=0|zone=2)
[   33.997075] page_type: f5(slab)
[   33.997973] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   33.998933] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   33.999804] page dumped because: kasan: bad access detected
[   34.000346] 
[   34.000934] Memory state around the buggy address:
[   34.001585]  ffff8881029f9380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   34.002427]  ffff8881029f9400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   34.003349] >ffff8881029f9480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   34.004415]                                      ^
[   34.004878]  ffff8881029f9500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.005547]  ffff8881029f9580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.006415] ==================================================================
[   35.354430] ==================================================================
[   35.355510] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x20c9/0x5450
[   35.356626] Write of size 8 at addr ffff8881029f94b0 by task kunit_try_catch/272
[   35.357986] 
[   35.359006] CPU: 1 UID: 0 PID: 272 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241120 #1
[   35.360469] Tainted: [B]=BAD_PAGE, [N]=TEST
[   35.360910] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   35.361941] Call Trace:
[   35.362399]  <TASK>
[   35.363159]  dump_stack_lvl+0x73/0xb0
[   35.363527]  print_report+0xd1/0x640
[   35.364023]  ? __virt_addr_valid+0x1db/0x2d0
[   35.364493]  ? kasan_complete_mode_report_info+0x2a/0x200
[   35.365668]  kasan_report+0x102/0x140
[   35.366064]  ? kasan_atomics_helper+0x20c9/0x5450
[   35.366551]  ? kasan_atomics_helper+0x20c9/0x5450
[   35.367348]  kasan_check_range+0x10c/0x1c0
[   35.368067]  __kasan_check_write+0x18/0x20
[   35.368521]  kasan_atomics_helper+0x20c9/0x5450
[   35.369272]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   35.370080]  ? __kmalloc_cache_noprof+0x184/0x410
[   35.370556]  ? kasan_save_alloc_info+0x3b/0x50
[   35.371689]  ? kasan_atomics+0x153/0x310
[   35.372146]  kasan_atomics+0x1dd/0x310
[   35.372527]  ? __pfx_kasan_atomics+0x10/0x10
[   35.373694]  ? __pfx_read_tsc+0x10/0x10
[   35.374077]  ? ktime_get_ts64+0x84/0x230
[   35.375039]  kunit_try_run_case+0x1b3/0x490
[   35.375484]  ? __pfx_kunit_try_run_case+0x10/0x10
[   35.376278]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   35.377336]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   35.377748]  ? __kthread_parkme+0x82/0x160
[   35.378210]  ? preempt_count_sub+0x50/0x80
[   35.379085]  ? __pfx_kunit_try_run_case+0x10/0x10
[   35.379532]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   35.380432]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   35.381329]  kthread+0x257/0x310
[   35.381889]  ? __pfx_kthread+0x10/0x10
[   35.382432]  ret_from_fork+0x41/0x80
[   35.383114]  ? __pfx_kthread+0x10/0x10
[   35.383328]  ret_from_fork_asm+0x1a/0x30
[   35.383535]  </TASK>
[   35.383789] 
[   35.383956] Allocated by task 272:
[   35.384206]  kasan_save_stack+0x3d/0x60
[   35.384647]  kasan_save_track+0x18/0x40
[   35.384971]  kasan_save_alloc_info+0x3b/0x50
[   35.385280]  __kasan_kmalloc+0xb7/0xc0
[   35.385554]  __kmalloc_cache_noprof+0x184/0x410
[   35.386207]  kasan_atomics+0x96/0x310
[   35.386833]  kunit_try_run_case+0x1b3/0x490
[   35.387434]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   35.387962]  kthread+0x257/0x310
[   35.388216]  ret_from_fork+0x41/0x80
[   35.388480]  ret_from_fork_asm+0x1a/0x30
[   35.388969] 
[   35.389282] The buggy address belongs to the object at ffff8881029f9480
[   35.389282]  which belongs to the cache kmalloc-64 of size 64
[   35.390289] The buggy address is located 0 bytes to the right of
[   35.390289]  allocated 48-byte region [ffff8881029f9480, ffff8881029f94b0)
[   35.391421] 
[   35.391758] The buggy address belongs to the physical page:
[   35.392311] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029f9
[   35.393156] flags: 0x200000000000000(node=0|zone=2)
[   35.393798] page_type: f5(slab)
[   35.394158] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   35.394955] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   35.395757] page dumped because: kasan: bad access detected
[   35.396252] 
[   35.396457] Memory state around the buggy address:
[   35.396961]  ffff8881029f9380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.397590]  ffff8881029f9400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.398341] >ffff8881029f9480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   35.399092]                                      ^
[   35.399532]  ffff8881029f9500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.400267]  ffff8881029f9580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.400996] ==================================================================
[   33.871819] ==================================================================
[   33.872951] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a1e/0x5450
[   33.873793] Read of size 4 at addr ffff8881029f94b0 by task kunit_try_catch/272
[   33.875357] 
[   33.875576] CPU: 1 UID: 0 PID: 272 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241120 #1
[   33.876522] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.877312] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   33.878425] Call Trace:
[   33.878734]  <TASK>
[   33.878959]  dump_stack_lvl+0x73/0xb0
[   33.879376]  print_report+0xd1/0x640
[   33.880204]  ? __virt_addr_valid+0x1db/0x2d0
[   33.880829]  ? kasan_complete_mode_report_info+0x2a/0x200
[   33.881487]  kasan_report+0x102/0x140
[   33.882281]  ? kasan_atomics_helper+0x4a1e/0x5450
[   33.882936]  ? kasan_atomics_helper+0x4a1e/0x5450
[   33.883168]  __asan_report_load4_noabort+0x18/0x20
[   33.883381]  kasan_atomics_helper+0x4a1e/0x5450
[   33.883593]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   33.884531]  ? __kmalloc_cache_noprof+0x184/0x410
[   33.885414]  ? kasan_save_alloc_info+0x3b/0x50
[   33.886285]  ? kasan_atomics+0x153/0x310
[   33.886820]  kasan_atomics+0x1dd/0x310
[   33.887110]  ? __pfx_kasan_atomics+0x10/0x10
[   33.887472]  ? __pfx_read_tsc+0x10/0x10
[   33.887929]  ? ktime_get_ts64+0x84/0x230
[   33.888254]  kunit_try_run_case+0x1b3/0x490
[   33.888851]  ? __pfx_kunit_try_run_case+0x10/0x10
[   33.889181]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   33.889815]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   33.890266]  ? __kthread_parkme+0x82/0x160
[   33.890759]  ? preempt_count_sub+0x50/0x80
[   33.891213]  ? __pfx_kunit_try_run_case+0x10/0x10
[   33.891665]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   33.892210]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   33.892830]  kthread+0x257/0x310
[   33.893237]  ? __pfx_kthread+0x10/0x10
[   33.893581]  ret_from_fork+0x41/0x80
[   33.894152]  ? __pfx_kthread+0x10/0x10
[   33.894540]  ret_from_fork_asm+0x1a/0x30
[   33.895128]  </TASK>
[   33.895394] 
[   33.895665] Allocated by task 272:
[   33.895929]  kasan_save_stack+0x3d/0x60
[   33.896415]  kasan_save_track+0x18/0x40
[   33.896824]  kasan_save_alloc_info+0x3b/0x50
[   33.897351]  __kasan_kmalloc+0xb7/0xc0
[   33.897878]  __kmalloc_cache_noprof+0x184/0x410
[   33.898258]  kasan_atomics+0x96/0x310
[   33.898762]  kunit_try_run_case+0x1b3/0x490
[   33.899128]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   33.899496]  kthread+0x257/0x310
[   33.899998]  ret_from_fork+0x41/0x80
[   33.900392]  ret_from_fork_asm+0x1a/0x30
[   33.900827] 
[   33.901064] The buggy address belongs to the object at ffff8881029f9480
[   33.901064]  which belongs to the cache kmalloc-64 of size 64
[   33.902178] The buggy address is located 0 bytes to the right of
[   33.902178]  allocated 48-byte region [ffff8881029f9480, ffff8881029f94b0)
[   33.903186] 
[   33.903428] The buggy address belongs to the physical page:
[   33.903971] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029f9
[   33.904686] flags: 0x200000000000000(node=0|zone=2)
[   33.905169] page_type: f5(slab)
[   33.905529] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   33.906271] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   33.906945] page dumped because: kasan: bad access detected
[   33.907278] 
[   33.907439] Memory state around the buggy address:
[   33.907907]  ffff8881029f9380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.908739]  ffff8881029f9400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.909274] >ffff8881029f9480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   33.909757]                                      ^
[   33.910138]  ffff8881029f9500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.910991]  ffff8881029f9580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.911822] ==================================================================
[   34.659888] ==================================================================
[   34.660473] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x18b2/0x5450
[   34.660919] Write of size 8 at addr ffff8881029f94b0 by task kunit_try_catch/272
[   34.662243] 
[   34.662512] CPU: 1 UID: 0 PID: 272 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241120 #1
[   34.663632] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.664148] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   34.664992] Call Trace:
[   34.665276]  <TASK>
[   34.665567]  dump_stack_lvl+0x73/0xb0
[   34.665961]  print_report+0xd1/0x640
[   34.666327]  ? __virt_addr_valid+0x1db/0x2d0
[   34.666895]  ? kasan_complete_mode_report_info+0x2a/0x200
[   34.667346]  kasan_report+0x102/0x140
[   34.667848]  ? kasan_atomics_helper+0x18b2/0x5450
[   34.668289]  ? kasan_atomics_helper+0x18b2/0x5450
[   34.668727]  kasan_check_range+0x10c/0x1c0
[   34.669503]  __kasan_check_write+0x18/0x20
[   34.669907]  kasan_atomics_helper+0x18b2/0x5450
[   34.670343]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   34.671046]  ? __kmalloc_cache_noprof+0x184/0x410
[   34.671947]  ? kasan_save_alloc_info+0x3b/0x50
[   34.672338]  ? kasan_atomics+0x153/0x310
[   34.673058]  kasan_atomics+0x1dd/0x310
[   34.673468]  ? __pfx_kasan_atomics+0x10/0x10
[   34.674746]  ? __pfx_read_tsc+0x10/0x10
[   34.675342]  ? ktime_get_ts64+0x84/0x230
[   34.675834]  kunit_try_run_case+0x1b3/0x490
[   34.676277]  ? __pfx_kunit_try_run_case+0x10/0x10
[   34.676798]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   34.677300]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   34.678022]  ? __kthread_parkme+0x82/0x160
[   34.678673]  ? preempt_count_sub+0x50/0x80
[   34.679640]  ? __pfx_kunit_try_run_case+0x10/0x10
[   34.680339]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   34.681376]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   34.682233]  kthread+0x257/0x310
[   34.682951]  ? __pfx_kthread+0x10/0x10
[   34.683386]  ret_from_fork+0x41/0x80
[   34.684298]  ? __pfx_kthread+0x10/0x10
[   34.684922]  ret_from_fork_asm+0x1a/0x30
[   34.685437]  </TASK>
[   34.685715] 
[   34.685994] Allocated by task 272:
[   34.686265]  kasan_save_stack+0x3d/0x60
[   34.686737]  kasan_save_track+0x18/0x40
[   34.687046]  kasan_save_alloc_info+0x3b/0x50
[   34.687661]  __kasan_kmalloc+0xb7/0xc0
[   34.687990]  __kmalloc_cache_noprof+0x184/0x410
[   34.688632]  kasan_atomics+0x96/0x310
[   34.689012]  kunit_try_run_case+0x1b3/0x490
[   34.689526]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   34.690236]  kthread+0x257/0x310
[   34.690502]  ret_from_fork+0x41/0x80
[   34.691078]  ret_from_fork_asm+0x1a/0x30
[   34.691452] 
[   34.691682] The buggy address belongs to the object at ffff8881029f9480
[   34.691682]  which belongs to the cache kmalloc-64 of size 64
[   34.692996] The buggy address is located 0 bytes to the right of
[   34.692996]  allocated 48-byte region [ffff8881029f9480, ffff8881029f94b0)
[   34.694146] 
[   34.694403] The buggy address belongs to the physical page:
[   34.694763] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029f9
[   34.695586] flags: 0x200000000000000(node=0|zone=2)
[   34.696474] page_type: f5(slab)
[   34.696785] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   34.697646] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   34.698300] page dumped because: kasan: bad access detected
[   34.698836] 
[   34.699089] Memory state around the buggy address:
[   34.699515]  ffff8881029f9380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   34.700239]  ffff8881029f9400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   34.700922] >ffff8881029f9480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   34.701403]                                      ^
[   34.702158]  ffff8881029f9500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.702574]  ffff8881029f9580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.703448] ==================================================================
[   34.190569] ==================================================================
[   34.192182] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x13b6/0x5450
[   34.193020] Read of size 8 at addr ffff8881029f94b0 by task kunit_try_catch/272
[   34.193900] 
[   34.194249] CPU: 1 UID: 0 PID: 272 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241120 #1
[   34.195435] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.196261] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   34.197302] Call Trace:
[   34.197512]  <TASK>
[   34.197874]  dump_stack_lvl+0x73/0xb0
[   34.198625]  print_report+0xd1/0x640
[   34.198939]  ? __virt_addr_valid+0x1db/0x2d0
[   34.199743]  ? kasan_complete_mode_report_info+0x2a/0x200
[   34.200690]  kasan_report+0x102/0x140
[   34.201362]  ? kasan_atomics_helper+0x13b6/0x5450
[   34.201719]  ? kasan_atomics_helper+0x13b6/0x5450
[   34.202614]  kasan_check_range+0x10c/0x1c0
[   34.203274]  __kasan_check_read+0x15/0x20
[   34.203990]  kasan_atomics_helper+0x13b6/0x5450
[   34.204569]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   34.205175]  ? __kmalloc_cache_noprof+0x184/0x410
[   34.205933]  ? kasan_save_alloc_info+0x3b/0x50
[   34.206486]  ? kasan_atomics+0x153/0x310
[   34.207083]  kasan_atomics+0x1dd/0x310
[   34.207445]  ? __pfx_kasan_atomics+0x10/0x10
[   34.208127]  ? __pfx_read_tsc+0x10/0x10
[   34.208465]  ? ktime_get_ts64+0x84/0x230
[   34.209133]  kunit_try_run_case+0x1b3/0x490
[   34.209759]  ? __pfx_kunit_try_run_case+0x10/0x10
[   34.210190]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   34.210551]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   34.211256]  ? __kthread_parkme+0x82/0x160
[   34.211834]  ? preempt_count_sub+0x50/0x80
[   34.212238]  ? __pfx_kunit_try_run_case+0x10/0x10
[   34.212920]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   34.213349]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   34.214137]  kthread+0x257/0x310
[   34.214515]  ? __pfx_kthread+0x10/0x10
[   34.215058]  ret_from_fork+0x41/0x80
[   34.215537]  ? __pfx_kthread+0x10/0x10
[   34.216079]  ret_from_fork_asm+0x1a/0x30
[   34.216467]  </TASK>
[   34.216753] 
[   34.217053] Allocated by task 272:
[   34.217579]  kasan_save_stack+0x3d/0x60
[   34.218030]  kasan_save_track+0x18/0x40
[   34.218383]  kasan_save_alloc_info+0x3b/0x50
[   34.218997]  __kasan_kmalloc+0xb7/0xc0
[   34.219444]  __kmalloc_cache_noprof+0x184/0x410
[   34.219900]  kasan_atomics+0x96/0x310
[   34.220514]  kunit_try_run_case+0x1b3/0x490
[   34.221101]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   34.221695]  kthread+0x257/0x310
[   34.221986]  ret_from_fork+0x41/0x80
[   34.222380]  ret_from_fork_asm+0x1a/0x30
[   34.223041] 
[   34.223282] The buggy address belongs to the object at ffff8881029f9480
[   34.223282]  which belongs to the cache kmalloc-64 of size 64
[   34.224289] The buggy address is located 0 bytes to the right of
[   34.224289]  allocated 48-byte region [ffff8881029f9480, ffff8881029f94b0)
[   34.225427] 
[   34.225592] The buggy address belongs to the physical page:
[   34.226390] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029f9
[   34.227095] flags: 0x200000000000000(node=0|zone=2)
[   34.227786] page_type: f5(slab)
[   34.228221] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   34.229044] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   34.229652] page dumped because: kasan: bad access detected
[   34.230316] 
[   34.230484] Memory state around the buggy address:
[   34.231090]  ffff8881029f9380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   34.231926]  ffff8881029f9400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   34.232489] >ffff8881029f9480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   34.233169]                                      ^
[   34.233735]  ffff8881029f9500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.234266]  ffff8881029f9580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.235034] ==================================================================
[   34.935174] ==================================================================
[   34.935893] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4f32/0x5450
[   34.937684] Read of size 8 at addr ffff8881029f94b0 by task kunit_try_catch/272
[   34.938329] 
[   34.938539] CPU: 1 UID: 0 PID: 272 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241120 #1
[   34.939682] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.940822] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   34.941571] Call Trace:
[   34.941972]  <TASK>
[   34.942295]  dump_stack_lvl+0x73/0xb0
[   34.942860]  print_report+0xd1/0x640
[   34.943442]  ? __virt_addr_valid+0x1db/0x2d0
[   34.944130]  ? kasan_complete_mode_report_info+0x2a/0x200
[   34.944772]  kasan_report+0x102/0x140
[   34.945372]  ? kasan_atomics_helper+0x4f32/0x5450
[   34.945960]  ? kasan_atomics_helper+0x4f32/0x5450
[   34.946384]  __asan_report_load8_noabort+0x18/0x20
[   34.947047]  kasan_atomics_helper+0x4f32/0x5450
[   34.947467]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   34.948131]  ? __kmalloc_cache_noprof+0x184/0x410
[   34.948506]  ? kasan_save_alloc_info+0x3b/0x50
[   34.949195]  ? kasan_atomics+0x153/0x310
[   34.949678]  kasan_atomics+0x1dd/0x310
[   34.950289]  ? __pfx_kasan_atomics+0x10/0x10
[   34.950859]  ? __pfx_read_tsc+0x10/0x10
[   34.951470]  ? ktime_get_ts64+0x84/0x230
[   34.951889]  kunit_try_run_case+0x1b3/0x490
[   34.952652]  ? __pfx_kunit_try_run_case+0x10/0x10
[   34.953200]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   34.953844]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   34.954209]  ? __kthread_parkme+0x82/0x160
[   34.954874]  ? preempt_count_sub+0x50/0x80
[   34.955351]  ? __pfx_kunit_try_run_case+0x10/0x10
[   34.955891]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   34.956301]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   34.957293]  kthread+0x257/0x310
[   34.957630]  ? __pfx_kthread+0x10/0x10
[   34.958030]  ret_from_fork+0x41/0x80
[   34.958482]  ? __pfx_kthread+0x10/0x10
[   34.959040]  ret_from_fork_asm+0x1a/0x30
[   34.959514]  </TASK>
[   34.959729] 
[   34.960036] Allocated by task 272:
[   34.960523]  kasan_save_stack+0x3d/0x60
[   34.961187]  kasan_save_track+0x18/0x40
[   34.961643]  kasan_save_alloc_info+0x3b/0x50
[   34.961970]  __kasan_kmalloc+0xb7/0xc0
[   34.962491]  __kmalloc_cache_noprof+0x184/0x410
[   34.963211]  kasan_atomics+0x96/0x310
[   34.963550]  kunit_try_run_case+0x1b3/0x490
[   34.964119]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   34.964872]  kthread+0x257/0x310
[   34.965175]  ret_from_fork+0x41/0x80
[   34.965570]  ret_from_fork_asm+0x1a/0x30
[   34.966037] 
[   34.966350] The buggy address belongs to the object at ffff8881029f9480
[   34.966350]  which belongs to the cache kmalloc-64 of size 64
[   34.967343] The buggy address is located 0 bytes to the right of
[   34.967343]  allocated 48-byte region [ffff8881029f9480, ffff8881029f94b0)
[   34.968656] 
[   34.968851] The buggy address belongs to the physical page:
[   34.969470] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029f9
[   34.970335] flags: 0x200000000000000(node=0|zone=2)
[   34.970948] page_type: f5(slab)
[   34.971197] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   34.971644] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   34.972663] page dumped because: kasan: bad access detected
[   34.973170] 
[   34.973346] Memory state around the buggy address:
[   34.973648]  ffff8881029f9380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   34.974308]  ffff8881029f9400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   34.975491] >ffff8881029f9480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   34.976244]                                      ^
[   34.976552]  ffff8881029f9500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.977737]  ffff8881029f9580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.978807] ==================================================================
[   35.115101] ==================================================================
[   35.116554] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1eab/0x5450
[   35.117554] Write of size 8 at addr ffff8881029f94b0 by task kunit_try_catch/272
[   35.118752] 
[   35.118924] CPU: 1 UID: 0 PID: 272 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241120 #1
[   35.119866] Tainted: [B]=BAD_PAGE, [N]=TEST
[   35.120503] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   35.121481] Call Trace:
[   35.122108]  <TASK>
[   35.122578]  dump_stack_lvl+0x73/0xb0
[   35.123299]  print_report+0xd1/0x640
[   35.123994]  ? __virt_addr_valid+0x1db/0x2d0
[   35.124441]  ? kasan_complete_mode_report_info+0x2a/0x200
[   35.124990]  kasan_report+0x102/0x140
[   35.125385]  ? kasan_atomics_helper+0x1eab/0x5450
[   35.126314]  ? kasan_atomics_helper+0x1eab/0x5450
[   35.127390]  kasan_check_range+0x10c/0x1c0
[   35.128137]  __kasan_check_write+0x18/0x20
[   35.128510]  kasan_atomics_helper+0x1eab/0x5450
[   35.129267]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   35.130397]  ? __kmalloc_cache_noprof+0x184/0x410
[   35.130836]  ? kasan_save_alloc_info+0x3b/0x50
[   35.131422]  ? kasan_atomics+0x153/0x310
[   35.132228]  kasan_atomics+0x1dd/0x310
[   35.132617]  ? __pfx_kasan_atomics+0x10/0x10
[   35.133470]  ? __pfx_read_tsc+0x10/0x10
[   35.134144]  ? ktime_get_ts64+0x84/0x230
[   35.134576]  kunit_try_run_case+0x1b3/0x490
[   35.135241]  ? __pfx_kunit_try_run_case+0x10/0x10
[   35.136034]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   35.136640]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   35.137340]  ? __kthread_parkme+0x82/0x160
[   35.137998]  ? preempt_count_sub+0x50/0x80
[   35.138526]  ? __pfx_kunit_try_run_case+0x10/0x10
[   35.139409]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   35.140276]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   35.141036]  kthread+0x257/0x310
[   35.141399]  ? __pfx_kthread+0x10/0x10
[   35.141828]  ret_from_fork+0x41/0x80
[   35.142613]  ? __pfx_kthread+0x10/0x10
[   35.142938]  ret_from_fork_asm+0x1a/0x30
[   35.143474]  </TASK>
[   35.144884] 
[   35.145021] Allocated by task 272:
[   35.145228]  kasan_save_stack+0x3d/0x60
[   35.145472]  kasan_save_track+0x18/0x40
[   35.145738]  kasan_save_alloc_info+0x3b/0x50
[   35.146006]  __kasan_kmalloc+0xb7/0xc0
[   35.146249]  __kmalloc_cache_noprof+0x184/0x410
[   35.146452]  kasan_atomics+0x96/0x310
[   35.146629]  kunit_try_run_case+0x1b3/0x490
[   35.147911]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   35.149201]  kthread+0x257/0x310
[   35.150263]  ret_from_fork+0x41/0x80
[   35.151174]  ret_from_fork_asm+0x1a/0x30
[   35.152264] 
[   35.153335] The buggy address belongs to the object at ffff8881029f9480
[   35.153335]  which belongs to the cache kmalloc-64 of size 64
[   35.154909] The buggy address is located 0 bytes to the right of
[   35.154909]  allocated 48-byte region [ffff8881029f9480, ffff8881029f94b0)
[   35.156118] 
[   35.156292] The buggy address belongs to the physical page:
[   35.157395] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029f9
[   35.158266] flags: 0x200000000000000(node=0|zone=2)
[   35.158572] page_type: f5(slab)
[   35.158821] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   35.160247] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   35.161611] page dumped because: kasan: bad access detected
[   35.162162] 
[   35.162459] Memory state around the buggy address:
[   35.162992]  ffff8881029f9380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.163864]  ffff8881029f9400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.164547] >ffff8881029f9480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   35.165442]                                      ^
[   35.165966]  ffff8881029f9500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.166561]  ffff8881029f9580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.167362] ==================================================================
[   35.573540] ==================================================================
[   35.574407] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x5117/0x5450
[   35.575322] Read of size 8 at addr ffff8881029f94b0 by task kunit_try_catch/272
[   35.576578] 
[   35.577116] CPU: 1 UID: 0 PID: 272 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241120 #1
[   35.578123] Tainted: [B]=BAD_PAGE, [N]=TEST
[   35.578305] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   35.578649] Call Trace:
[   35.578872]  <TASK>
[   35.579065]  dump_stack_lvl+0x73/0xb0
[   35.579571]  print_report+0xd1/0x640
[   35.579976]  ? __virt_addr_valid+0x1db/0x2d0
[   35.580188]  ? kasan_complete_mode_report_info+0x2a/0x200
[   35.580424]  kasan_report+0x102/0x140
[   35.580605]  ? kasan_atomics_helper+0x5117/0x5450
[   35.581758]  ? kasan_atomics_helper+0x5117/0x5450
[   35.582147]  __asan_report_load8_noabort+0x18/0x20
[   35.582511]  kasan_atomics_helper+0x5117/0x5450
[   35.583202]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   35.584026]  ? __kmalloc_cache_noprof+0x184/0x410
[   35.584574]  ? kasan_save_alloc_info+0x3b/0x50
[   35.585332]  ? kasan_atomics+0x153/0x310
[   35.585950]  kasan_atomics+0x1dd/0x310
[   35.586500]  ? __pfx_kasan_atomics+0x10/0x10
[   35.587180]  ? __pfx_read_tsc+0x10/0x10
[   35.587741]  ? ktime_get_ts64+0x84/0x230
[   35.588239]  kunit_try_run_case+0x1b3/0x490
[   35.588670]  ? __pfx_kunit_try_run_case+0x10/0x10
[   35.589141]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   35.589591]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   35.590196]  ? __kthread_parkme+0x82/0x160
[   35.590502]  ? preempt_count_sub+0x50/0x80
[   35.591354]  ? __pfx_kunit_try_run_case+0x10/0x10
[   35.592093]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   35.592952]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   35.593740]  kthread+0x257/0x310
[   35.594058]  ? __pfx_kthread+0x10/0x10
[   35.594684]  ret_from_fork+0x41/0x80
[   35.595221]  ? __pfx_kthread+0x10/0x10
[   35.595815]  ret_from_fork_asm+0x1a/0x30
[   35.596340]  </TASK>
[   35.596568] 
[   35.596950] Allocated by task 272:
[   35.597381]  kasan_save_stack+0x3d/0x60
[   35.597976]  kasan_save_track+0x18/0x40
[   35.598668]  kasan_save_alloc_info+0x3b/0x50
[   35.599341]  __kasan_kmalloc+0xb7/0xc0
[   35.599901]  __kmalloc_cache_noprof+0x184/0x410
[   35.600500]  kasan_atomics+0x96/0x310
[   35.600976]  kunit_try_run_case+0x1b3/0x490
[   35.601553]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   35.602213]  kthread+0x257/0x310
[   35.602594]  ret_from_fork+0x41/0x80
[   35.603274]  ret_from_fork_asm+0x1a/0x30
[   35.603826] 
[   35.604171] The buggy address belongs to the object at ffff8881029f9480
[   35.604171]  which belongs to the cache kmalloc-64 of size 64
[   35.605355] The buggy address is located 0 bytes to the right of
[   35.605355]  allocated 48-byte region [ffff8881029f9480, ffff8881029f94b0)
[   35.606526] 
[   35.606845] The buggy address belongs to the physical page:
[   35.607646] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029f9
[   35.608457] flags: 0x200000000000000(node=0|zone=2)
[   35.609127] page_type: f5(slab)
[   35.609389] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   35.610228] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   35.611071] page dumped because: kasan: bad access detected
[   35.611668] 
[   35.611938] Memory state around the buggy address:
[   35.612532]  ffff8881029f9380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.613289]  ffff8881029f9400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.614072] >ffff8881029f9480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   35.614834]                                      ^
[   35.615283]  ffff8881029f9500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.616080]  ffff8881029f9580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.616862] ==================================================================
[   32.926748] ==================================================================
[   32.927718] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x566/0x5450
[   32.928960] Write of size 4 at addr ffff8881029f94b0 by task kunit_try_catch/272
[   32.930408] 
[   32.930637] CPU: 1 UID: 0 PID: 272 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241120 #1
[   32.931416] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.932202] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   32.932990] Call Trace:
[   32.933265]  <TASK>
[   32.933500]  dump_stack_lvl+0x73/0xb0
[   32.934559]  print_report+0xd1/0x640
[   32.935190]  ? __virt_addr_valid+0x1db/0x2d0
[   32.936012]  ? kasan_complete_mode_report_info+0x2a/0x200
[   32.936775]  kasan_report+0x102/0x140
[   32.937312]  ? kasan_atomics_helper+0x566/0x5450
[   32.938209]  ? kasan_atomics_helper+0x566/0x5450
[   32.938943]  kasan_check_range+0x10c/0x1c0
[   32.939422]  __kasan_check_write+0x18/0x20
[   32.940063]  kasan_atomics_helper+0x566/0x5450
[   32.940691]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   32.941399]  ? __kmalloc_cache_noprof+0x184/0x410
[   32.942075]  ? kasan_save_alloc_info+0x3b/0x50
[   32.942597]  ? kasan_atomics+0x153/0x310
[   32.943682]  kasan_atomics+0x1dd/0x310
[   32.944044]  ? __pfx_kasan_atomics+0x10/0x10
[   32.944838]  ? __pfx_read_tsc+0x10/0x10
[   32.945161]  ? ktime_get_ts64+0x84/0x230
[   32.945898]  kunit_try_run_case+0x1b3/0x490
[   32.946390]  ? __pfx_kunit_try_run_case+0x10/0x10
[   32.947466]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   32.947916]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   32.948426]  ? __kthread_parkme+0x82/0x160
[   32.949162]  ? preempt_count_sub+0x50/0x80
[   32.949799]  ? __pfx_kunit_try_run_case+0x10/0x10
[   32.950323]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   32.951223]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   32.951776]  kthread+0x257/0x310
[   32.952141]  ? __pfx_kthread+0x10/0x10
[   32.952540]  ret_from_fork+0x41/0x80
[   32.953049]  ? __pfx_kthread+0x10/0x10
[   32.954162]  ret_from_fork_asm+0x1a/0x30
[   32.954586]  </TASK>
[   32.954991] 
[   32.955173] Allocated by task 272:
[   32.956121]  kasan_save_stack+0x3d/0x60
[   32.956534]  kasan_save_track+0x18/0x40
[   32.957226]  kasan_save_alloc_info+0x3b/0x50
[   32.958154]  __kasan_kmalloc+0xb7/0xc0
[   32.958724]  __kmalloc_cache_noprof+0x184/0x410
[   32.959643]  kasan_atomics+0x96/0x310
[   32.960125]  kunit_try_run_case+0x1b3/0x490
[   32.960627]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   32.961433]  kthread+0x257/0x310
[   32.962349]  ret_from_fork+0x41/0x80
[   32.962644]  ret_from_fork_asm+0x1a/0x30
[   32.963357] 
[   32.963547] The buggy address belongs to the object at ffff8881029f9480
[   32.963547]  which belongs to the cache kmalloc-64 of size 64
[   32.964571] The buggy address is located 0 bytes to the right of
[   32.964571]  allocated 48-byte region [ffff8881029f9480, ffff8881029f94b0)
[   32.966522] 
[   32.966939] The buggy address belongs to the physical page:
[   32.967259] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029f9
[   32.968386] flags: 0x200000000000000(node=0|zone=2)
[   32.968788] page_type: f5(slab)
[   32.969530] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   32.970388] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   32.971643] page dumped because: kasan: bad access detected
[   32.972103] 
[   32.972314] Memory state around the buggy address:
[   32.973241]  ffff8881029f9380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.973519]  ffff8881029f9400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.973943] >ffff8881029f9480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   32.975083]                                      ^
[   32.975398]  ffff8881029f9500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.976320]  ffff8881029f9580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.977522] ==================================================================
[   33.778479] ==================================================================
[   33.779182] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a38/0x5450
[   33.780290] Read of size 4 at addr ffff8881029f94b0 by task kunit_try_catch/272
[   33.780799] 
[   33.781049] CPU: 1 UID: 0 PID: 272 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241120 #1
[   33.782113] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.782513] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   33.783234] Call Trace:
[   33.783580]  <TASK>
[   33.783849]  dump_stack_lvl+0x73/0xb0
[   33.784258]  print_report+0xd1/0x640
[   33.784591]  ? __virt_addr_valid+0x1db/0x2d0
[   33.785041]  ? kasan_complete_mode_report_info+0x2a/0x200
[   33.785406]  kasan_report+0x102/0x140
[   33.785962]  ? kasan_atomics_helper+0x4a38/0x5450
[   33.786552]  ? kasan_atomics_helper+0x4a38/0x5450
[   33.787754]  __asan_report_load4_noabort+0x18/0x20
[   33.788090]  kasan_atomics_helper+0x4a38/0x5450
[   33.788419]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   33.789059]  ? __kmalloc_cache_noprof+0x184/0x410
[   33.789440]  ? kasan_save_alloc_info+0x3b/0x50
[   33.790032]  ? kasan_atomics+0x153/0x310
[   33.790490]  kasan_atomics+0x1dd/0x310
[   33.791022]  ? __pfx_kasan_atomics+0x10/0x10
[   33.791365]  ? __pfx_read_tsc+0x10/0x10
[   33.791922]  ? ktime_get_ts64+0x84/0x230
[   33.792252]  kunit_try_run_case+0x1b3/0x490
[   33.792849]  ? __pfx_kunit_try_run_case+0x10/0x10
[   33.793254]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   33.793871]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   33.794238]  ? __kthread_parkme+0x82/0x160
[   33.794799]  ? preempt_count_sub+0x50/0x80
[   33.795203]  ? __pfx_kunit_try_run_case+0x10/0x10
[   33.795670]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   33.796318]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   33.796819]  kthread+0x257/0x310
[   33.797269]  ? __pfx_kthread+0x10/0x10
[   33.797737]  ret_from_fork+0x41/0x80
[   33.798213]  ? __pfx_kthread+0x10/0x10
[   33.798637]  ret_from_fork_asm+0x1a/0x30
[   33.799109]  </TASK>
[   33.799386] 
[   33.799561] Allocated by task 272:
[   33.799991]  kasan_save_stack+0x3d/0x60
[   33.800274]  kasan_save_track+0x18/0x40
[   33.800810]  kasan_save_alloc_info+0x3b/0x50
[   33.801318]  __kasan_kmalloc+0xb7/0xc0
[   33.801658]  __kmalloc_cache_noprof+0x184/0x410
[   33.802179]  kasan_atomics+0x96/0x310
[   33.802586]  kunit_try_run_case+0x1b3/0x490
[   33.803129]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   33.803480]  kthread+0x257/0x310
[   33.803966]  ret_from_fork+0x41/0x80
[   33.804411]  ret_from_fork_asm+0x1a/0x30
[   33.804962] 
[   33.805193] The buggy address belongs to the object at ffff8881029f9480
[   33.805193]  which belongs to the cache kmalloc-64 of size 64
[   33.806231] The buggy address is located 0 bytes to the right of
[   33.806231]  allocated 48-byte region [ffff8881029f9480, ffff8881029f94b0)
[   33.807269] 
[   33.807443] The buggy address belongs to the physical page:
[   33.808024] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029f9
[   33.808817] flags: 0x200000000000000(node=0|zone=2)
[   33.809261] page_type: f5(slab)
[   33.809509] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   33.810431] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   33.811035] page dumped because: kasan: bad access detected
[   33.811674] 
[   33.811882] Memory state around the buggy address:
[   33.812254]  ffff8881029f9380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.813434]  ffff8881029f9400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.815172] >ffff8881029f9480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   33.815529]                                      ^
[   33.815832]  ffff8881029f9500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.816196]  ffff8881029f9580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.816485] ==================================================================
[   34.979882] ==================================================================
[   34.981873] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1ce2/0x5450
[   34.982841] Write of size 8 at addr ffff8881029f94b0 by task kunit_try_catch/272
[   34.983756] 
[   34.983983] CPU: 1 UID: 0 PID: 272 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241120 #1
[   34.985169] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.985692] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   34.986780] Call Trace:
[   34.987242]  <TASK>
[   34.987689]  dump_stack_lvl+0x73/0xb0
[   34.988340]  print_report+0xd1/0x640
[   34.989416]  ? __virt_addr_valid+0x1db/0x2d0
[   34.990211]  ? kasan_complete_mode_report_info+0x2a/0x200
[   34.990783]  kasan_report+0x102/0x140
[   34.991133]  ? kasan_atomics_helper+0x1ce2/0x5450
[   34.991528]  ? kasan_atomics_helper+0x1ce2/0x5450
[   34.992059]  kasan_check_range+0x10c/0x1c0
[   34.992560]  __kasan_check_write+0x18/0x20
[   34.993131]  kasan_atomics_helper+0x1ce2/0x5450
[   34.993785]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   34.994276]  ? __kmalloc_cache_noprof+0x184/0x410
[   34.994812]  ? kasan_save_alloc_info+0x3b/0x50
[   34.995428]  ? kasan_atomics+0x153/0x310
[   34.995990]  kasan_atomics+0x1dd/0x310
[   34.996380]  ? __pfx_kasan_atomics+0x10/0x10
[   34.996827]  ? __pfx_read_tsc+0x10/0x10
[   34.997226]  ? ktime_get_ts64+0x84/0x230
[   34.997629]  kunit_try_run_case+0x1b3/0x490
[   34.998237]  ? __pfx_kunit_try_run_case+0x10/0x10
[   34.998686]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   34.999203]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   34.999845]  ? __kthread_parkme+0x82/0x160
[   35.000361]  ? preempt_count_sub+0x50/0x80
[   35.000938]  ? __pfx_kunit_try_run_case+0x10/0x10
[   35.001456]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   35.002107]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   35.002727]  kthread+0x257/0x310
[   35.003123]  ? __pfx_kthread+0x10/0x10
[   35.003562]  ret_from_fork+0x41/0x80
[   35.004146]  ? __pfx_kthread+0x10/0x10
[   35.004699]  ret_from_fork_asm+0x1a/0x30
[   35.005168]  </TASK>
[   35.005382] 
[   35.005767] Allocated by task 272:
[   35.006206]  kasan_save_stack+0x3d/0x60
[   35.006779]  kasan_save_track+0x18/0x40
[   35.007262]  kasan_save_alloc_info+0x3b/0x50
[   35.007772]  __kasan_kmalloc+0xb7/0xc0
[   35.008065]  __kmalloc_cache_noprof+0x184/0x410
[   35.008717]  kasan_atomics+0x96/0x310
[   35.009039]  kunit_try_run_case+0x1b3/0x490
[   35.009533]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   35.010103]  kthread+0x257/0x310
[   35.010571]  ret_from_fork+0x41/0x80
[   35.011173]  ret_from_fork_asm+0x1a/0x30
[   35.011672] 
[   35.011996] The buggy address belongs to the object at ffff8881029f9480
[   35.011996]  which belongs to the cache kmalloc-64 of size 64
[   35.013054] The buggy address is located 0 bytes to the right of
[   35.013054]  allocated 48-byte region [ffff8881029f9480, ffff8881029f94b0)
[   35.014280] 
[   35.014438] The buggy address belongs to the physical page:
[   35.015130] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029f9
[   35.015783] flags: 0x200000000000000(node=0|zone=2)
[   35.016450] page_type: f5(slab)
[   35.016871] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   35.017649] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   35.018442] page dumped because: kasan: bad access detected
[   35.019038] 
[   35.019299] Memory state around the buggy address:
[   35.019737]  ffff8881029f9380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.020592]  ffff8881029f9400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.021365] >ffff8881029f9480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   35.021956]                                      ^
[   35.022588]  ffff8881029f9500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.023294]  ffff8881029f9580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.023982] ==================================================================
[   34.105725] ==================================================================
[   34.106664] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x12e7/0x5450
[   34.108197] Write of size 4 at addr ffff8881029f94b0 by task kunit_try_catch/272
[   34.108991] 
[   34.109193] CPU: 1 UID: 0 PID: 272 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241120 #1
[   34.110135] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.110647] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   34.111397] Call Trace:
[   34.111840]  <TASK>
[   34.112169]  dump_stack_lvl+0x73/0xb0
[   34.112655]  print_report+0xd1/0x640
[   34.113010]  ? __virt_addr_valid+0x1db/0x2d0
[   34.113590]  ? kasan_complete_mode_report_info+0x2a/0x200
[   34.114316]  kasan_report+0x102/0x140
[   34.114921]  ? kasan_atomics_helper+0x12e7/0x5450
[   34.115329]  ? kasan_atomics_helper+0x12e7/0x5450
[   34.115944]  kasan_check_range+0x10c/0x1c0
[   34.116303]  __kasan_check_write+0x18/0x20
[   34.116819]  kasan_atomics_helper+0x12e7/0x5450
[   34.117360]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   34.117940]  ? __kmalloc_cache_noprof+0x184/0x410
[   34.118292]  ? kasan_save_alloc_info+0x3b/0x50
[   34.118972]  ? kasan_atomics+0x153/0x310
[   34.119438]  kasan_atomics+0x1dd/0x310
[   34.119992]  ? __pfx_kasan_atomics+0x10/0x10
[   34.120350]  ? __pfx_read_tsc+0x10/0x10
[   34.120954]  ? ktime_get_ts64+0x84/0x230
[   34.121460]  kunit_try_run_case+0x1b3/0x490
[   34.122027]  ? __pfx_kunit_try_run_case+0x10/0x10
[   34.122453]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   34.123083]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   34.123528]  ? __kthread_parkme+0x82/0x160
[   34.124138]  ? preempt_count_sub+0x50/0x80
[   34.124564]  ? __pfx_kunit_try_run_case+0x10/0x10
[   34.125057]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   34.125684]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   34.126209]  kthread+0x257/0x310
[   34.126737]  ? __pfx_kthread+0x10/0x10
[   34.127163]  ret_from_fork+0x41/0x80
[   34.127536]  ? __pfx_kthread+0x10/0x10
[   34.128029]  ret_from_fork_asm+0x1a/0x30
[   34.128501]  </TASK>
[   34.128897] 
[   34.129087] Allocated by task 272:
[   34.129340]  kasan_save_stack+0x3d/0x60
[   34.129881]  kasan_save_track+0x18/0x40
[   34.130446]  kasan_save_alloc_info+0x3b/0x50
[   34.130938]  __kasan_kmalloc+0xb7/0xc0
[   34.131428]  __kmalloc_cache_noprof+0x184/0x410
[   34.132050]  kasan_atomics+0x96/0x310
[   34.132345]  kunit_try_run_case+0x1b3/0x490
[   34.132788]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   34.133472]  kthread+0x257/0x310
[   34.133914]  ret_from_fork+0x41/0x80
[   34.134410]  ret_from_fork_asm+0x1a/0x30
[   34.134951] 
[   34.135191] The buggy address belongs to the object at ffff8881029f9480
[   34.135191]  which belongs to the cache kmalloc-64 of size 64
[   34.136339] The buggy address is located 0 bytes to the right of
[   34.136339]  allocated 48-byte region [ffff8881029f9480, ffff8881029f94b0)
[   34.137509] 
[   34.137818] The buggy address belongs to the physical page:
[   34.138419] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029f9
[   34.139202] flags: 0x200000000000000(node=0|zone=2)
[   34.139896] page_type: f5(slab)
[   34.140172] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   34.140978] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   34.141803] page dumped because: kasan: bad access detected
[   34.142315] 
[   34.142490] Memory state around the buggy address:
[   34.143016]  ffff8881029f9380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   34.143645]  ffff8881029f9400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   34.144197] >ffff8881029f9480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   34.144758]                                      ^
[   34.145066]  ffff8881029f9500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.145863]  ffff8881029f9580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.146478] ==================================================================
[   34.838526] ==================================================================
[   34.839082] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1b23/0x5450
[   34.839686] Write of size 8 at addr ffff8881029f94b0 by task kunit_try_catch/272
[   34.840484] 
[   34.841238] CPU: 1 UID: 0 PID: 272 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241120 #1
[   34.841949] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.842489] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   34.843398] Call Trace:
[   34.843611]  <TASK>
[   34.844072]  dump_stack_lvl+0x73/0xb0
[   34.844537]  print_report+0xd1/0x640
[   34.845034]  ? __virt_addr_valid+0x1db/0x2d0
[   34.845578]  ? kasan_complete_mode_report_info+0x2a/0x200
[   34.846074]  kasan_report+0x102/0x140
[   34.846462]  ? kasan_atomics_helper+0x1b23/0x5450
[   34.847007]  ? kasan_atomics_helper+0x1b23/0x5450
[   34.847479]  kasan_check_range+0x10c/0x1c0
[   34.847951]  __kasan_check_write+0x18/0x20
[   34.848304]  kasan_atomics_helper+0x1b23/0x5450
[   34.848905]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   34.849339]  ? __kmalloc_cache_noprof+0x184/0x410
[   34.849849]  ? kasan_save_alloc_info+0x3b/0x50
[   34.850192]  ? kasan_atomics+0x153/0x310
[   34.850506]  kasan_atomics+0x1dd/0x310
[   34.851031]  ? __pfx_kasan_atomics+0x10/0x10
[   34.851591]  ? __pfx_read_tsc+0x10/0x10
[   34.852053]  ? ktime_get_ts64+0x84/0x230
[   34.852362]  kunit_try_run_case+0x1b3/0x490
[   34.852729]  ? __pfx_kunit_try_run_case+0x10/0x10
[   34.853303]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   34.854074]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   34.854557]  ? __kthread_parkme+0x82/0x160
[   34.854950]  ? preempt_count_sub+0x50/0x80
[   34.855260]  ? __pfx_kunit_try_run_case+0x10/0x10
[   34.855861]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   34.856564]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   34.857291]  kthread+0x257/0x310
[   34.857578]  ? __pfx_kthread+0x10/0x10
[   34.857887]  ret_from_fork+0x41/0x80
[   34.858385]  ? __pfx_kthread+0x10/0x10
[   34.858885]  ret_from_fork_asm+0x1a/0x30
[   34.859390]  </TASK>
[   34.859670] 
[   34.859873] Allocated by task 272:
[   34.860119]  kasan_save_stack+0x3d/0x60
[   34.860515]  kasan_save_track+0x18/0x40
[   34.861052]  kasan_save_alloc_info+0x3b/0x50
[   34.861566]  __kasan_kmalloc+0xb7/0xc0
[   34.862040]  __kmalloc_cache_noprof+0x184/0x410
[   34.862564]  kasan_atomics+0x96/0x310
[   34.862863]  kunit_try_run_case+0x1b3/0x490
[   34.863636]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   34.864154]  kthread+0x257/0x310
[   34.864477]  ret_from_fork+0x41/0x80
[   34.864851]  ret_from_fork_asm+0x1a/0x30
[   34.865232] 
[   34.865391] The buggy address belongs to the object at ffff8881029f9480
[   34.865391]  which belongs to the cache kmalloc-64 of size 64
[   34.866045] The buggy address is located 0 bytes to the right of
[   34.866045]  allocated 48-byte region [ffff8881029f9480, ffff8881029f94b0)
[   34.867687] 
[   34.867888] The buggy address belongs to the physical page:
[   34.868220] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029f9
[   34.868699] flags: 0x200000000000000(node=0|zone=2)
[   34.869270] page_type: f5(slab)
[   34.869719] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   34.870553] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   34.871278] page dumped because: kasan: bad access detected
[   34.871765] 
[   34.871948] Memory state around the buggy address:
[   34.872256]  ffff8881029f9380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   34.872855]  ffff8881029f9400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   34.873551] >ffff8881029f9480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   34.874277]                                      ^
[   34.874992]  ffff8881029f9500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.875404]  ffff8881029f9580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.876001] ==================================================================
[   34.562471] ==================================================================
[   34.563271] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1780/0x5450
[   34.564165] Write of size 8 at addr ffff8881029f94b0 by task kunit_try_catch/272
[   34.565082] 
[   34.565328] CPU: 1 UID: 0 PID: 272 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241120 #1
[   34.566489] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.566924] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   34.567914] Call Trace:
[   34.568137]  <TASK>
[   34.568572]  dump_stack_lvl+0x73/0xb0
[   34.569167]  print_report+0xd1/0x640
[   34.569609]  ? __virt_addr_valid+0x1db/0x2d0
[   34.570361]  ? kasan_complete_mode_report_info+0x2a/0x200
[   34.571127]  kasan_report+0x102/0x140
[   34.571574]  ? kasan_atomics_helper+0x1780/0x5450
[   34.572169]  ? kasan_atomics_helper+0x1780/0x5450
[   34.572927]  kasan_check_range+0x10c/0x1c0
[   34.573351]  __kasan_check_write+0x18/0x20
[   34.573969]  kasan_atomics_helper+0x1780/0x5450
[   34.574550]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   34.575248]  ? __kmalloc_cache_noprof+0x184/0x410
[   34.575899]  ? kasan_save_alloc_info+0x3b/0x50
[   34.576946]  ? kasan_atomics+0x153/0x310
[   34.577432]  kasan_atomics+0x1dd/0x310
[   34.578383]  ? __pfx_kasan_atomics+0x10/0x10
[   34.578793]  ? __pfx_read_tsc+0x10/0x10
[   34.579367]  ? ktime_get_ts64+0x84/0x230
[   34.580065]  kunit_try_run_case+0x1b3/0x490
[   34.580596]  ? __pfx_kunit_try_run_case+0x10/0x10
[   34.581274]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   34.581871]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   34.582438]  ? __kthread_parkme+0x82/0x160
[   34.582967]  ? preempt_count_sub+0x50/0x80
[   34.583619]  ? __pfx_kunit_try_run_case+0x10/0x10
[   34.584061]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   34.584773]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   34.585373]  kthread+0x257/0x310
[   34.585820]  ? __pfx_kthread+0x10/0x10
[   34.586343]  ret_from_fork+0x41/0x80
[   34.586635]  ? __pfx_kthread+0x10/0x10
[   34.587305]  ret_from_fork_asm+0x1a/0x30
[   34.587919]  </TASK>
[   34.588230] 
[   34.588484] Allocated by task 272:
[   34.589083]  kasan_save_stack+0x3d/0x60
[   34.589524]  kasan_save_track+0x18/0x40
[   34.590175]  kasan_save_alloc_info+0x3b/0x50
[   34.590928]  __kasan_kmalloc+0xb7/0xc0
[   34.591434]  __kmalloc_cache_noprof+0x184/0x410
[   34.592159]  kasan_atomics+0x96/0x310
[   34.592606]  kunit_try_run_case+0x1b3/0x490
[   34.593087]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   34.593969]  kthread+0x257/0x310
[   34.594327]  ret_from_fork+0x41/0x80
[   34.594961]  ret_from_fork_asm+0x1a/0x30
[   34.595439] 
[   34.595742] The buggy address belongs to the object at ffff8881029f9480
[   34.595742]  which belongs to the cache kmalloc-64 of size 64
[   34.597045] The buggy address is located 0 bytes to the right of
[   34.597045]  allocated 48-byte region [ffff8881029f9480, ffff8881029f94b0)
[   34.598203] 
[   34.598575] The buggy address belongs to the physical page:
[   34.599269] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029f9
[   34.600148] flags: 0x200000000000000(node=0|zone=2)
[   34.600957] page_type: f5(slab)
[   34.601350] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   34.602475] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   34.603240] page dumped because: kasan: bad access detected
[   34.604013] 
[   34.604227] Memory state around the buggy address:
[   34.604985]  ffff8881029f9380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   34.605687]  ffff8881029f9400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   34.606214] >ffff8881029f9480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   34.606875]                                      ^
[   34.607235]  ffff8881029f9500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.608114]  ffff8881029f9580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.608912] ==================================================================
[   34.377379] ==================================================================
[   34.378204] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x151e/0x5450
[   34.378971] Write of size 8 at addr ffff8881029f94b0 by task kunit_try_catch/272
[   34.379991] 
[   34.380231] CPU: 1 UID: 0 PID: 272 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241120 #1
[   34.381099] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.381480] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   34.382463] Call Trace:
[   34.382814]  <TASK>
[   34.383126]  dump_stack_lvl+0x73/0xb0
[   34.383521]  print_report+0xd1/0x640
[   34.384024]  ? __virt_addr_valid+0x1db/0x2d0
[   34.384475]  ? kasan_complete_mode_report_info+0x2a/0x200
[   34.385045]  kasan_report+0x102/0x140
[   34.385519]  ? kasan_atomics_helper+0x151e/0x5450
[   34.386096]  ? kasan_atomics_helper+0x151e/0x5450
[   34.386533]  kasan_check_range+0x10c/0x1c0
[   34.387204]  __kasan_check_write+0x18/0x20
[   34.387522]  kasan_atomics_helper+0x151e/0x5450
[   34.388190]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   34.388756]  ? __kmalloc_cache_noprof+0x184/0x410
[   34.389311]  ? kasan_save_alloc_info+0x3b/0x50
[   34.389890]  ? kasan_atomics+0x153/0x310
[   34.390415]  kasan_atomics+0x1dd/0x310
[   34.390933]  ? __pfx_kasan_atomics+0x10/0x10
[   34.391482]  ? __pfx_read_tsc+0x10/0x10
[   34.391997]  ? ktime_get_ts64+0x84/0x230
[   34.392521]  kunit_try_run_case+0x1b3/0x490
[   34.392995]  ? __pfx_kunit_try_run_case+0x10/0x10
[   34.393589]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   34.394161]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   34.394495]  ? __kthread_parkme+0x82/0x160
[   34.395021]  ? preempt_count_sub+0x50/0x80
[   34.395651]  ? __pfx_kunit_try_run_case+0x10/0x10
[   34.396119]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   34.396768]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   34.397323]  kthread+0x257/0x310
[   34.397800]  ? __pfx_kthread+0x10/0x10
[   34.398234]  ret_from_fork+0x41/0x80
[   34.398751]  ? __pfx_kthread+0x10/0x10
[   34.399180]  ret_from_fork_asm+0x1a/0x30
[   34.399721]  </TASK>
[   34.400100] 
[   34.400326] Allocated by task 272:
[   34.400746]  kasan_save_stack+0x3d/0x60
[   34.401351]  kasan_save_track+0x18/0x40
[   34.401835]  kasan_save_alloc_info+0x3b/0x50
[   34.402181]  __kasan_kmalloc+0xb7/0xc0
[   34.402747]  __kmalloc_cache_noprof+0x184/0x410
[   34.403302]  kasan_atomics+0x96/0x310
[   34.403882]  kunit_try_run_case+0x1b3/0x490
[   34.404322]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   34.405050]  kthread+0x257/0x310
[   34.405368]  ret_from_fork+0x41/0x80
[   34.405934]  ret_from_fork_asm+0x1a/0x30
[   34.406286] 
[   34.406547] The buggy address belongs to the object at ffff8881029f9480
[   34.406547]  which belongs to the cache kmalloc-64 of size 64
[   34.407949] The buggy address is located 0 bytes to the right of
[   34.407949]  allocated 48-byte region [ffff8881029f9480, ffff8881029f94b0)
[   34.409695] 
[   34.409982] The buggy address belongs to the physical page:
[   34.410423] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029f9
[   34.411326] flags: 0x200000000000000(node=0|zone=2)
[   34.412141] page_type: f5(slab)
[   34.412386] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   34.413140] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   34.413816] page dumped because: kasan: bad access detected
[   34.414303] 
[   34.414600] Memory state around the buggy address:
[   34.415058]  ffff8881029f9380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   34.415967]  ffff8881029f9400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   34.416814] >ffff8881029f9480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   34.417417]                                      ^
[   34.418260]  ffff8881029f9500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.419111]  ffff8881029f9580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.420181] ==================================================================
[   34.794020] ==================================================================
[   34.794931] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1a80/0x5450
[   34.795578] Write of size 8 at addr ffff8881029f94b0 by task kunit_try_catch/272
[   34.797865] 
[   34.798203] CPU: 1 UID: 0 PID: 272 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241120 #1
[   34.799532] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.799972] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   34.801105] Call Trace:
[   34.801346]  <TASK>
[   34.801533]  dump_stack_lvl+0x73/0xb0
[   34.802411]  print_report+0xd1/0x640
[   34.802867]  ? __virt_addr_valid+0x1db/0x2d0
[   34.803314]  ? kasan_complete_mode_report_info+0x2a/0x200
[   34.803820]  kasan_report+0x102/0x140
[   34.804199]  ? kasan_atomics_helper+0x1a80/0x5450
[   34.804655]  ? kasan_atomics_helper+0x1a80/0x5450
[   34.805909]  kasan_check_range+0x10c/0x1c0
[   34.806503]  __kasan_check_write+0x18/0x20
[   34.807225]  kasan_atomics_helper+0x1a80/0x5450
[   34.807607]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   34.808407]  ? __kmalloc_cache_noprof+0x184/0x410
[   34.809017]  ? kasan_save_alloc_info+0x3b/0x50
[   34.809742]  ? kasan_atomics+0x153/0x310
[   34.810391]  kasan_atomics+0x1dd/0x310
[   34.810955]  ? __pfx_kasan_atomics+0x10/0x10
[   34.811452]  ? __pfx_read_tsc+0x10/0x10
[   34.812213]  ? ktime_get_ts64+0x84/0x230
[   34.812967]  kunit_try_run_case+0x1b3/0x490
[   34.813610]  ? __pfx_kunit_try_run_case+0x10/0x10
[   34.814307]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   34.815112]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   34.815608]  ? __kthread_parkme+0x82/0x160
[   34.816392]  ? preempt_count_sub+0x50/0x80
[   34.817186]  ? __pfx_kunit_try_run_case+0x10/0x10
[   34.817769]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   34.818337]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   34.818745]  kthread+0x257/0x310
[   34.819017]  ? __pfx_kthread+0x10/0x10
[   34.819482]  ret_from_fork+0x41/0x80
[   34.819865]  ? __pfx_kthread+0x10/0x10
[   34.820311]  ret_from_fork_asm+0x1a/0x30
[   34.820858]  </TASK>
[   34.821183] 
[   34.821342] Allocated by task 272:
[   34.821761]  kasan_save_stack+0x3d/0x60
[   34.822089]  kasan_save_track+0x18/0x40
[   34.822541]  kasan_save_alloc_info+0x3b/0x50
[   34.823047]  __kasan_kmalloc+0xb7/0xc0
[   34.823436]  __kmalloc_cache_noprof+0x184/0x410
[   34.823840]  kasan_atomics+0x96/0x310
[   34.824297]  kunit_try_run_case+0x1b3/0x490
[   34.824772]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   34.825345]  kthread+0x257/0x310
[   34.825871]  ret_from_fork+0x41/0x80
[   34.826204]  ret_from_fork_asm+0x1a/0x30
[   34.826592] 
[   34.826890] The buggy address belongs to the object at ffff8881029f9480
[   34.826890]  which belongs to the cache kmalloc-64 of size 64
[   34.827953] The buggy address is located 0 bytes to the right of
[   34.827953]  allocated 48-byte region [ffff8881029f9480, ffff8881029f94b0)
[   34.829077] 
[   34.829245] The buggy address belongs to the physical page:
[   34.829782] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029f9
[   34.830671] flags: 0x200000000000000(node=0|zone=2)
[   34.831107] page_type: f5(slab)
[   34.831354] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   34.831992] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   34.832767] page dumped because: kasan: bad access detected
[   34.833267] 
[   34.833473] Memory state around the buggy address:
[   34.833911]  ffff8881029f9380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   34.834489]  ffff8881029f9400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   34.835109] >ffff8881029f9480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   34.835519]                                      ^
[   34.835974]  ffff8881029f9500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.836610]  ffff8881029f9580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.837078] ==================================================================