Hay
Date
Nov. 26, 2024, 6:09 a.m.

Environment
qemu-arm64
qemu-x86_64

[   37.930867] ==================================================================
[   37.931664] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x17ec/0x4858
[   37.933082] Write of size 8 at addr fff00000c591a130 by task kunit_try_catch/254
[   37.933889] 
[   37.934326] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241126 #1
[   37.935437] Tainted: [B]=BAD_PAGE, [N]=TEST
[   37.936053] Hardware name: linux,dummy-virt (DT)
[   37.936646] Call trace:
[   37.937073]  show_stack+0x20/0x38 (C)
[   37.937730]  dump_stack_lvl+0x8c/0xd0
[   37.938381]  print_report+0x118/0x5e0
[   37.939003]  kasan_report+0xc8/0x118
[   37.939573]  kasan_check_range+0x100/0x1a8
[   37.940270]  __kasan_check_write+0x20/0x30
[   37.940894]  kasan_atomics_helper+0x17ec/0x4858
[   37.941526]  kasan_atomics+0x198/0x2e8
[   37.942185]  kunit_try_run_case+0x14c/0x3d0
[   37.942884]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.943605]  kthread+0x24c/0x2d0
[   37.944106]  ret_from_fork+0x10/0x20
[   37.944739] 
[   37.945134] Allocated by task 254:
[   37.945706]  kasan_save_stack+0x3c/0x68
[   37.946228]  kasan_save_track+0x20/0x40
[   37.946851]  kasan_save_alloc_info+0x40/0x58
[   37.947538]  __kasan_kmalloc+0xd4/0xd8
[   37.948052]  __kmalloc_cache_noprof+0x15c/0x3c8
[   37.948740]  kasan_atomics+0xb8/0x2e8
[   37.949281]  kunit_try_run_case+0x14c/0x3d0
[   37.950305]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.951058]  kthread+0x24c/0x2d0
[   37.951585]  ret_from_fork+0x10/0x20
[   37.952047] 
[   37.952419] The buggy address belongs to the object at fff00000c591a100
[   37.952419]  which belongs to the cache kmalloc-64 of size 64
[   37.953548] The buggy address is located 0 bytes to the right of
[   37.953548]  allocated 48-byte region [fff00000c591a100, fff00000c591a130)
[   37.954840] 
[   37.955232] The buggy address belongs to the physical page:
[   37.956018] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10591a
[   37.956830] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   37.957639] page_type: f5(slab)
[   37.958159] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   37.959010] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   37.959864] page dumped because: kasan: bad access detected
[   37.960499] 
[   37.960866] Memory state around the buggy address:
[   37.961431]  fff00000c591a000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   37.962305]  fff00000c591a080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   37.963103] >fff00000c591a100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   37.963881]                                      ^
[   37.964464]  fff00000c591a180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.965363]  fff00000c591a200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.966146] ==================================================================
[   35.547530] ==================================================================
[   35.548257] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1ec/0x4858
[   35.548682] Read of size 4 at addr fff00000c591a130 by task kunit_try_catch/254
[   35.549590] 
[   35.550006] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241126 #1
[   35.551248] Tainted: [B]=BAD_PAGE, [N]=TEST
[   35.551742] Hardware name: linux,dummy-virt (DT)
[   35.552444] Call trace:
[   35.552956]  show_stack+0x20/0x38 (C)
[   35.553619]  dump_stack_lvl+0x8c/0xd0
[   35.554372]  print_report+0x118/0x5e0
[   35.555119]  kasan_report+0xc8/0x118
[   35.555894]  kasan_check_range+0x100/0x1a8
[   35.556708]  __kasan_check_read+0x20/0x30
[   35.557315]  kasan_atomics_helper+0x1ec/0x4858
[   35.558190]  kasan_atomics+0x198/0x2e8
[   35.558857]  kunit_try_run_case+0x14c/0x3d0
[   35.559447]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.560266]  kthread+0x24c/0x2d0
[   35.560864]  ret_from_fork+0x10/0x20
[   35.561531] 
[   35.561923] Allocated by task 254:
[   35.562486]  kasan_save_stack+0x3c/0x68
[   35.563124]  kasan_save_track+0x20/0x40
[   35.563738]  kasan_save_alloc_info+0x40/0x58
[   35.564381]  __kasan_kmalloc+0xd4/0xd8
[   35.565004]  __kmalloc_cache_noprof+0x15c/0x3c8
[   35.565607]  kasan_atomics+0xb8/0x2e8
[   35.566231]  kunit_try_run_case+0x14c/0x3d0
[   35.566769]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.567566]  kthread+0x24c/0x2d0
[   35.568148]  ret_from_fork+0x10/0x20
[   35.568711] 
[   35.569035] The buggy address belongs to the object at fff00000c591a100
[   35.569035]  which belongs to the cache kmalloc-64 of size 64
[   35.570407] The buggy address is located 0 bytes to the right of
[   35.570407]  allocated 48-byte region [fff00000c591a100, fff00000c591a130)
[   35.571639] 
[   35.572039] The buggy address belongs to the physical page:
[   35.572789] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10591a
[   35.573614] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   35.574455] page_type: f5(slab)
[   35.574948] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   35.575881] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   35.576701] page dumped because: kasan: bad access detected
[   35.577486] 
[   35.577824] Memory state around the buggy address:
[   35.578558]  fff00000c591a000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.579500]  fff00000c591a080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.580355] >fff00000c591a100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   35.581172]                                      ^
[   35.581848]  fff00000c591a180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.582656]  fff00000c591a200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.583458] ==================================================================
[   37.512607] ==================================================================
[   37.513500] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x147c/0x4858
[   37.514235] Write of size 8 at addr fff00000c591a130 by task kunit_try_catch/254
[   37.515193] 
[   37.515531] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241126 #1
[   37.516670] Tainted: [B]=BAD_PAGE, [N]=TEST
[   37.517283] Hardware name: linux,dummy-virt (DT)
[   37.517788] Call trace:
[   37.518266]  show_stack+0x20/0x38 (C)
[   37.518896]  dump_stack_lvl+0x8c/0xd0
[   37.519480]  print_report+0x118/0x5e0
[   37.520087]  kasan_report+0xc8/0x118
[   37.520709]  kasan_check_range+0x100/0x1a8
[   37.521317]  __kasan_check_write+0x20/0x30
[   37.522012]  kasan_atomics_helper+0x147c/0x4858
[   37.522638]  kasan_atomics+0x198/0x2e8
[   37.523314]  kunit_try_run_case+0x14c/0x3d0
[   37.524038]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.524815]  kthread+0x24c/0x2d0
[   37.525316]  ret_from_fork+0x10/0x20
[   37.525965] 
[   37.526333] Allocated by task 254:
[   37.526896]  kasan_save_stack+0x3c/0x68
[   37.527412]  kasan_save_track+0x20/0x40
[   37.528086]  kasan_save_alloc_info+0x40/0x58
[   37.528683]  __kasan_kmalloc+0xd4/0xd8
[   37.529176]  __kmalloc_cache_noprof+0x15c/0x3c8
[   37.529940]  kasan_atomics+0xb8/0x2e8
[   37.530590]  kunit_try_run_case+0x14c/0x3d0
[   37.531280]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.532137]  kthread+0x24c/0x2d0
[   37.532693]  ret_from_fork+0x10/0x20
[   37.533337] 
[   37.533734] The buggy address belongs to the object at fff00000c591a100
[   37.533734]  which belongs to the cache kmalloc-64 of size 64
[   37.534999] The buggy address is located 0 bytes to the right of
[   37.534999]  allocated 48-byte region [fff00000c591a100, fff00000c591a130)
[   37.536278] 
[   37.536692] The buggy address belongs to the physical page:
[   37.537362] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10591a
[   37.538379] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   37.539178] page_type: f5(slab)
[   37.539777] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   37.540684] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   37.541657] page dumped because: kasan: bad access detected
[   37.542470] 
[   37.542853] Memory state around the buggy address:
[   37.543579]  fff00000c591a000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   37.544454]  fff00000c591a080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   37.545366] >fff00000c591a100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   37.546174]                                      ^
[   37.546835]  fff00000c591a180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.547706]  fff00000c591a200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.548541] ==================================================================
[   35.822271] ==================================================================
[   35.823471] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x414/0x4858
[   35.824366] Write of size 4 at addr fff00000c591a130 by task kunit_try_catch/254
[   35.825410] 
[   35.825824] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241126 #1
[   35.827519] Tainted: [B]=BAD_PAGE, [N]=TEST
[   35.828344] Hardware name: linux,dummy-virt (DT)
[   35.828753] Call trace:
[   35.829374]  show_stack+0x20/0x38 (C)
[   35.829995]  dump_stack_lvl+0x8c/0xd0
[   35.830689]  print_report+0x118/0x5e0
[   35.831310]  kasan_report+0xc8/0x118
[   35.831858]  kasan_check_range+0x100/0x1a8
[   35.832649]  __kasan_check_write+0x20/0x30
[   35.833331]  kasan_atomics_helper+0x414/0x4858
[   35.834095]  kasan_atomics+0x198/0x2e8
[   35.834634]  kunit_try_run_case+0x14c/0x3d0
[   35.835283]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.836043]  kthread+0x24c/0x2d0
[   35.836637]  ret_from_fork+0x10/0x20
[   35.837240] 
[   35.837611] Allocated by task 254:
[   35.838178]  kasan_save_stack+0x3c/0x68
[   35.838727]  kasan_save_track+0x20/0x40
[   35.839341]  kasan_save_alloc_info+0x40/0x58
[   35.839946]  __kasan_kmalloc+0xd4/0xd8
[   35.840524]  __kmalloc_cache_noprof+0x15c/0x3c8
[   35.841207]  kasan_atomics+0xb8/0x2e8
[   35.841802]  kunit_try_run_case+0x14c/0x3d0
[   35.842349]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.843140]  kthread+0x24c/0x2d0
[   35.843699]  ret_from_fork+0x10/0x20
[   35.844250] 
[   35.844554] The buggy address belongs to the object at fff00000c591a100
[   35.844554]  which belongs to the cache kmalloc-64 of size 64
[   35.845965] The buggy address is located 0 bytes to the right of
[   35.845965]  allocated 48-byte region [fff00000c591a100, fff00000c591a130)
[   35.847393] 
[   35.847712] The buggy address belongs to the physical page:
[   35.848460] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10591a
[   35.849206] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   35.850085] page_type: f5(slab)
[   35.850637] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   35.851563] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   35.852521] page dumped because: kasan: bad access detected
[   35.853062] 
[   35.853430] Memory state around the buggy address:
[   35.854121]  fff00000c591a000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.855041]  fff00000c591a080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.855795] >fff00000c591a100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   35.856691]                                      ^
[   35.857285]  fff00000c591a180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.858119]  fff00000c591a200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.858865] ==================================================================
[   36.433547] ==================================================================
[   36.434279] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xad4/0x4858
[   36.435070] Write of size 4 at addr fff00000c591a130 by task kunit_try_catch/254
[   36.435728] 
[   36.436719] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241126 #1
[   36.438034] Tainted: [B]=BAD_PAGE, [N]=TEST
[   36.438774] Hardware name: linux,dummy-virt (DT)
[   36.439582] Call trace:
[   36.440221]  show_stack+0x20/0x38 (C)
[   36.441029]  dump_stack_lvl+0x8c/0xd0
[   36.441805]  print_report+0x118/0x5e0
[   36.442609]  kasan_report+0xc8/0x118
[   36.443383]  kasan_check_range+0x100/0x1a8
[   36.444205]  __kasan_check_write+0x20/0x30
[   36.444780]  kasan_atomics_helper+0xad4/0x4858
[   36.445379]  kasan_atomics+0x198/0x2e8
[   36.446440]  kunit_try_run_case+0x14c/0x3d0
[   36.447036]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.447954]  kthread+0x24c/0x2d0
[   36.448680]  ret_from_fork+0x10/0x20
[   36.449465] 
[   36.449995] Allocated by task 254:
[   36.450658]  kasan_save_stack+0x3c/0x68
[   36.451452]  kasan_save_track+0x20/0x40
[   36.452286]  kasan_save_alloc_info+0x40/0x58
[   36.453114]  __kasan_kmalloc+0xd4/0xd8
[   36.453885]  __kmalloc_cache_noprof+0x15c/0x3c8
[   36.454558]  kasan_atomics+0xb8/0x2e8
[   36.455070]  kunit_try_run_case+0x14c/0x3d0
[   36.455592]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.456682]  kthread+0x24c/0x2d0
[   36.457403]  ret_from_fork+0x10/0x20
[   36.458207] 
[   36.458744] The buggy address belongs to the object at fff00000c591a100
[   36.458744]  which belongs to the cache kmalloc-64 of size 64
[   36.460334] The buggy address is located 0 bytes to the right of
[   36.460334]  allocated 48-byte region [fff00000c591a100, fff00000c591a130)
[   36.461946] 
[   36.462495] The buggy address belongs to the physical page:
[   36.463208] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10591a
[   36.464062] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   36.464793] page_type: f5(slab)
[   36.465796] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   36.466882] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   36.467949] page dumped because: kasan: bad access detected
[   36.468806] 
[   36.469379] Memory state around the buggy address:
[   36.470110]  fff00000c591a000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   36.471175]  fff00000c591a080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   36.472213] >fff00000c591a100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   36.473235]                                      ^
[   36.474078]  fff00000c591a180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.475165]  fff00000c591a200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.476185] ==================================================================
[   35.586135] ==================================================================
[   35.587523] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x24c/0x4858
[   35.588366] Write of size 4 at addr fff00000c591a130 by task kunit_try_catch/254
[   35.590195] 
[   35.590617] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241126 #1
[   35.591659] Tainted: [B]=BAD_PAGE, [N]=TEST
[   35.592226] Hardware name: linux,dummy-virt (DT)
[   35.592759] Call trace:
[   35.593239]  show_stack+0x20/0x38 (C)
[   35.593896]  dump_stack_lvl+0x8c/0xd0
[   35.594556]  print_report+0x118/0x5e0
[   35.595206]  kasan_report+0xc8/0x118
[   35.595855]  kasan_check_range+0x100/0x1a8
[   35.596566]  __kasan_check_write+0x20/0x30
[   35.597274]  kasan_atomics_helper+0x24c/0x4858
[   35.597849]  kasan_atomics+0x198/0x2e8
[   35.598528]  kunit_try_run_case+0x14c/0x3d0
[   35.599131]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.599949]  kthread+0x24c/0x2d0
[   35.600509]  ret_from_fork+0x10/0x20
[   35.601177] 
[   35.601496] Allocated by task 254:
[   35.602045]  kasan_save_stack+0x3c/0x68
[   35.602544]  kasan_save_track+0x20/0x40
[   35.603168]  kasan_save_alloc_info+0x40/0x58
[   35.603825]  __kasan_kmalloc+0xd4/0xd8
[   35.604337]  __kmalloc_cache_noprof+0x15c/0x3c8
[   35.605000]  kasan_atomics+0xb8/0x2e8
[   35.605628]  kunit_try_run_case+0x14c/0x3d0
[   35.606268]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.607073]  kthread+0x24c/0x2d0
[   35.607607]  ret_from_fork+0x10/0x20
[   35.608222] 
[   35.608576] The buggy address belongs to the object at fff00000c591a100
[   35.608576]  which belongs to the cache kmalloc-64 of size 64
[   35.609738] The buggy address is located 0 bytes to the right of
[   35.609738]  allocated 48-byte region [fff00000c591a100, fff00000c591a130)
[   35.612085] 
[   35.612443] The buggy address belongs to the physical page:
[   35.613357] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10591a
[   35.614263] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   35.614849] page_type: f5(slab)
[   35.616191] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   35.617276] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   35.617896] page dumped because: kasan: bad access detected
[   35.618539] 
[   35.618858] Memory state around the buggy address:
[   35.619476]  fff00000c591a000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.620394]  fff00000c591a080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.621093] >fff00000c591a100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   35.621986]                                      ^
[   35.622607]  fff00000c591a180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.623444]  fff00000c591a200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.624231] ==================================================================
[   36.599421] ==================================================================
[   36.600512] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xc08/0x4858
[   36.601671] Write of size 4 at addr fff00000c591a130 by task kunit_try_catch/254
[   36.602436] 
[   36.603261] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241126 #1
[   36.604520] Tainted: [B]=BAD_PAGE, [N]=TEST
[   36.605277] Hardware name: linux,dummy-virt (DT)
[   36.605996] Call trace:
[   36.606479]  show_stack+0x20/0x38 (C)
[   36.607176]  dump_stack_lvl+0x8c/0xd0
[   36.607689]  print_report+0x118/0x5e0
[   36.608341]  kasan_report+0xc8/0x118
[   36.608985]  kasan_check_range+0x100/0x1a8
[   36.609554]  __kasan_check_write+0x20/0x30
[   36.610279]  kasan_atomics_helper+0xc08/0x4858
[   36.610948]  kasan_atomics+0x198/0x2e8
[   36.611643]  kunit_try_run_case+0x14c/0x3d0
[   36.612333]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.613119]  kthread+0x24c/0x2d0
[   36.613714]  ret_from_fork+0x10/0x20
[   36.614344] 
[   36.614708] Allocated by task 254:
[   36.615238]  kasan_save_stack+0x3c/0x68
[   36.615842]  kasan_save_track+0x20/0x40
[   36.616497]  kasan_save_alloc_info+0x40/0x58
[   36.617098]  __kasan_kmalloc+0xd4/0xd8
[   36.617749]  __kmalloc_cache_noprof+0x15c/0x3c8
[   36.618388]  kasan_atomics+0xb8/0x2e8
[   36.619059]  kunit_try_run_case+0x14c/0x3d0
[   36.619719]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.620459]  kthread+0x24c/0x2d0
[   36.621059]  ret_from_fork+0x10/0x20
[   36.621663] 
[   36.622114] The buggy address belongs to the object at fff00000c591a100
[   36.622114]  which belongs to the cache kmalloc-64 of size 64
[   36.623382] The buggy address is located 0 bytes to the right of
[   36.623382]  allocated 48-byte region [fff00000c591a100, fff00000c591a130)
[   36.624670] 
[   36.625107] The buggy address belongs to the physical page:
[   36.626276] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10591a
[   36.627229] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   36.628105] page_type: f5(slab)
[   36.628634] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   36.629596] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   36.630515] page dumped because: kasan: bad access detected
[   36.631200] 
[   36.631579] Memory state around the buggy address:
[   36.632315]  fff00000c591a000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   36.633083]  fff00000c591a080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   36.634036] >fff00000c591a100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   36.634821]                                      ^
[   36.635516]  fff00000c591a180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.636356]  fff00000c591a200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.637210] ==================================================================
[   36.392887] ==================================================================
[   36.393767] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa6c/0x4858
[   36.394672] Write of size 4 at addr fff00000c591a130 by task kunit_try_catch/254
[   36.395412] 
[   36.395813] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241126 #1
[   36.396804] Tainted: [B]=BAD_PAGE, [N]=TEST
[   36.397438] Hardware name: linux,dummy-virt (DT)
[   36.398106] Call trace:
[   36.398584]  show_stack+0x20/0x38 (C)
[   36.399201]  dump_stack_lvl+0x8c/0xd0
[   36.399761]  print_report+0x118/0x5e0
[   36.400392]  kasan_report+0xc8/0x118
[   36.400806]  kasan_check_range+0x100/0x1a8
[   36.401353]  __kasan_check_write+0x20/0x30
[   36.401875]  kasan_atomics_helper+0xa6c/0x4858
[   36.403606]  kasan_atomics+0x198/0x2e8
[   36.404522]  kunit_try_run_case+0x14c/0x3d0
[   36.405196]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.405886]  kthread+0x24c/0x2d0
[   36.406514]  ret_from_fork+0x10/0x20
[   36.407117] 
[   36.407450] Allocated by task 254:
[   36.408014]  kasan_save_stack+0x3c/0x68
[   36.408554]  kasan_save_track+0x20/0x40
[   36.409192]  kasan_save_alloc_info+0x40/0x58
[   36.409752]  __kasan_kmalloc+0xd4/0xd8
[   36.410379]  __kmalloc_cache_noprof+0x15c/0x3c8
[   36.411005]  kasan_atomics+0xb8/0x2e8
[   36.411601]  kunit_try_run_case+0x14c/0x3d0
[   36.412217]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.412980]  kthread+0x24c/0x2d0
[   36.413540]  ret_from_fork+0x10/0x20
[   36.414090] 
[   36.414463] The buggy address belongs to the object at fff00000c591a100
[   36.414463]  which belongs to the cache kmalloc-64 of size 64
[   36.415730] The buggy address is located 0 bytes to the right of
[   36.415730]  allocated 48-byte region [fff00000c591a100, fff00000c591a130)
[   36.417078] 
[   36.417457] The buggy address belongs to the physical page:
[   36.418166] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10591a
[   36.419065] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   36.419936] page_type: f5(slab)
[   36.420508] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   36.421402] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   36.422223] page dumped because: kasan: bad access detected
[   36.423367] 
[   36.423897] Memory state around the buggy address:
[   36.424712]  fff00000c591a000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   36.425703]  fff00000c591a080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   36.426733] >fff00000c591a100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   36.427735]                                      ^
[   36.428557]  fff00000c591a180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.429515]  fff00000c591a200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.430511] ==================================================================
[   36.757387] ==================================================================
[   36.758226] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xd3c/0x4858
[   36.759181] Write of size 4 at addr fff00000c591a130 by task kunit_try_catch/254
[   36.760072] 
[   36.760687] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241126 #1
[   36.761945] Tainted: [B]=BAD_PAGE, [N]=TEST
[   36.762473] Hardware name: linux,dummy-virt (DT)
[   36.763214] Call trace:
[   36.763607]  show_stack+0x20/0x38 (C)
[   36.764340]  dump_stack_lvl+0x8c/0xd0
[   36.764935]  print_report+0x118/0x5e0
[   36.765565]  kasan_report+0xc8/0x118
[   36.766103]  kasan_check_range+0x100/0x1a8
[   36.766657]  __kasan_check_write+0x20/0x30
[   36.767276]  kasan_atomics_helper+0xd3c/0x4858
[   36.767967]  kasan_atomics+0x198/0x2e8
[   36.768469]  kunit_try_run_case+0x14c/0x3d0
[   36.769154]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.770090]  kthread+0x24c/0x2d0
[   36.770740]  ret_from_fork+0x10/0x20
[   36.771438] 
[   36.771839] Allocated by task 254:
[   36.772446]  kasan_save_stack+0x3c/0x68
[   36.773131]  kasan_save_track+0x20/0x40
[   36.773785]  kasan_save_alloc_info+0x40/0x58
[   36.774384]  __kasan_kmalloc+0xd4/0xd8
[   36.775062]  __kmalloc_cache_noprof+0x15c/0x3c8
[   36.775590]  kasan_atomics+0xb8/0x2e8
[   36.776138]  kunit_try_run_case+0x14c/0x3d0
[   36.776922]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.777724]  kthread+0x24c/0x2d0
[   36.778362]  ret_from_fork+0x10/0x20
[   36.779004] 
[   36.779397] The buggy address belongs to the object at fff00000c591a100
[   36.779397]  which belongs to the cache kmalloc-64 of size 64
[   36.780710] The buggy address is located 0 bytes to the right of
[   36.780710]  allocated 48-byte region [fff00000c591a100, fff00000c591a130)
[   36.782066] 
[   36.782373] The buggy address belongs to the physical page:
[   36.783216] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10591a
[   36.784276] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   36.785066] page_type: f5(slab)
[   36.785708] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   36.786665] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   36.787548] page dumped because: kasan: bad access detected
[   36.788224] 
[   36.788621] Memory state around the buggy address:
[   36.789187]  fff00000c591a000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   36.790138]  fff00000c591a080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   36.790961] >fff00000c591a100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   36.791883]                                      ^
[   36.792511]  fff00000c591a180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.793382]  fff00000c591a200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.794262] ==================================================================
[   37.065594] ==================================================================
[   37.066534] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf88/0x4858
[   37.068097] Write of size 8 at addr fff00000c591a130 by task kunit_try_catch/254
[   37.069975] 
[   37.070390] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241126 #1
[   37.071624] Tainted: [B]=BAD_PAGE, [N]=TEST
[   37.072256] Hardware name: linux,dummy-virt (DT)
[   37.072823] Call trace:
[   37.073302]  show_stack+0x20/0x38 (C)
[   37.073959]  dump_stack_lvl+0x8c/0xd0
[   37.074592]  print_report+0x118/0x5e0
[   37.075210]  kasan_report+0xc8/0x118
[   37.075873]  kasan_check_range+0x100/0x1a8
[   37.076500]  __kasan_check_write+0x20/0x30
[   37.077189]  kasan_atomics_helper+0xf88/0x4858
[   37.077887]  kasan_atomics+0x198/0x2e8
[   37.078554]  kunit_try_run_case+0x14c/0x3d0
[   37.079166]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.079954]  kthread+0x24c/0x2d0
[   37.080551]  ret_from_fork+0x10/0x20
[   37.081123] 
[   37.081485] Allocated by task 254:
[   37.082036]  kasan_save_stack+0x3c/0x68
[   37.082658]  kasan_save_track+0x20/0x40
[   37.083195]  kasan_save_alloc_info+0x40/0x58
[   37.083853]  __kasan_kmalloc+0xd4/0xd8
[   37.084491]  __kmalloc_cache_noprof+0x15c/0x3c8
[   37.085131]  kasan_atomics+0xb8/0x2e8
[   37.085635]  kunit_try_run_case+0x14c/0x3d0
[   37.086306]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.087039]  kthread+0x24c/0x2d0
[   37.087599]  ret_from_fork+0x10/0x20
[   37.088183] 
[   37.088549] The buggy address belongs to the object at fff00000c591a100
[   37.088549]  which belongs to the cache kmalloc-64 of size 64
[   37.089813] The buggy address is located 0 bytes to the right of
[   37.089813]  allocated 48-byte region [fff00000c591a100, fff00000c591a130)
[   37.091086] 
[   37.091412] The buggy address belongs to the physical page:
[   37.092153] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10591a
[   37.093005] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   37.093841] page_type: f5(slab)
[   37.094428] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   37.095360] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   37.096163] page dumped because: kasan: bad access detected
[   37.096833] 
[   37.097197] Memory state around the buggy address:
[   37.097875]  fff00000c591a000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   37.098714]  fff00000c591a080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   37.099448] >fff00000c591a100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   37.100382]                                      ^
[   37.101087]  fff00000c591a180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.101776]  fff00000c591a200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.102682] ==================================================================
[   35.784153] ==================================================================
[   35.784925] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3ac/0x4858
[   35.785821] Write of size 4 at addr fff00000c591a130 by task kunit_try_catch/254
[   35.788137] 
[   35.788505] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241126 #1
[   35.789574] Tainted: [B]=BAD_PAGE, [N]=TEST
[   35.790086] Hardware name: linux,dummy-virt (DT)
[   35.790752] Call trace:
[   35.791174]  show_stack+0x20/0x38 (C)
[   35.791749]  dump_stack_lvl+0x8c/0xd0
[   35.792358]  print_report+0x118/0x5e0
[   35.792925]  kasan_report+0xc8/0x118
[   35.793496]  kasan_check_range+0x100/0x1a8
[   35.794080]  __kasan_check_write+0x20/0x30
[   35.794765]  kasan_atomics_helper+0x3ac/0x4858
[   35.795431]  kasan_atomics+0x198/0x2e8
[   35.796094]  kunit_try_run_case+0x14c/0x3d0
[   35.796770]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.797591]  kthread+0x24c/0x2d0
[   35.798137]  ret_from_fork+0x10/0x20
[   35.798724] 
[   35.799076] Allocated by task 254:
[   35.799637]  kasan_save_stack+0x3c/0x68
[   35.800274]  kasan_save_track+0x20/0x40
[   35.800852]  kasan_save_alloc_info+0x40/0x58
[   35.801546]  __kasan_kmalloc+0xd4/0xd8
[   35.802108]  __kmalloc_cache_noprof+0x15c/0x3c8
[   35.802796]  kasan_atomics+0xb8/0x2e8
[   35.803366]  kunit_try_run_case+0x14c/0x3d0
[   35.804031]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.804761]  kthread+0x24c/0x2d0
[   35.805350]  ret_from_fork+0x10/0x20
[   35.805864] 
[   35.806194] The buggy address belongs to the object at fff00000c591a100
[   35.806194]  which belongs to the cache kmalloc-64 of size 64
[   35.807511] The buggy address is located 0 bytes to the right of
[   35.807511]  allocated 48-byte region [fff00000c591a100, fff00000c591a130)
[   35.808765] 
[   35.809163] The buggy address belongs to the physical page:
[   35.809890] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10591a
[   35.810875] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   35.811661] page_type: f5(slab)
[   35.812230] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   35.813116] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   35.813935] page dumped because: kasan: bad access detected
[   35.814465] 
[   35.814829] Memory state around the buggy address:
[   35.815500]  fff00000c591a000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.816274]  fff00000c591a080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.817083] >fff00000c591a100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   35.817932]                                      ^
[   35.818616]  fff00000c591a180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.819423]  fff00000c591a200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.820259] ==================================================================
[   36.124133] ==================================================================
[   36.125004] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x760/0x4858
[   36.125628] Write of size 4 at addr fff00000c591a130 by task kunit_try_catch/254
[   36.126855] 
[   36.127379] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241126 #1
[   36.128876] Tainted: [B]=BAD_PAGE, [N]=TEST
[   36.129499] Hardware name: linux,dummy-virt (DT)
[   36.130297] Call trace:
[   36.130852]  show_stack+0x20/0x38 (C)
[   36.131417]  dump_stack_lvl+0x8c/0xd0
[   36.132034]  print_report+0x118/0x5e0
[   36.132642]  kasan_report+0xc8/0x118
[   36.133355]  kasan_check_range+0x100/0x1a8
[   36.134031]  __kasan_check_write+0x20/0x30
[   36.134608]  kasan_atomics_helper+0x760/0x4858
[   36.135220]  kasan_atomics+0x198/0x2e8
[   36.135769]  kunit_try_run_case+0x14c/0x3d0
[   36.136389]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.137223]  kthread+0x24c/0x2d0
[   36.137735]  ret_from_fork+0x10/0x20
[   36.138313] 
[   36.138666] Allocated by task 254:
[   36.139234]  kasan_save_stack+0x3c/0x68
[   36.139801]  kasan_save_track+0x20/0x40
[   36.140384]  kasan_save_alloc_info+0x40/0x58
[   36.141009]  __kasan_kmalloc+0xd4/0xd8
[   36.141563]  __kmalloc_cache_noprof+0x15c/0x3c8
[   36.142174]  kasan_atomics+0xb8/0x2e8
[   36.142691]  kunit_try_run_case+0x14c/0x3d0
[   36.143309]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.144090]  kthread+0x24c/0x2d0
[   36.144673]  ret_from_fork+0x10/0x20
[   36.145227] 
[   36.145625] The buggy address belongs to the object at fff00000c591a100
[   36.145625]  which belongs to the cache kmalloc-64 of size 64
[   36.146773] The buggy address is located 0 bytes to the right of
[   36.146773]  allocated 48-byte region [fff00000c591a100, fff00000c591a130)
[   36.148029] 
[   36.148401] The buggy address belongs to the physical page:
[   36.149085] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10591a
[   36.149924] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   36.150672] page_type: f5(slab)
[   36.151257] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   36.152128] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   36.152863] page dumped because: kasan: bad access detected
[   36.153603] 
[   36.153981] Memory state around the buggy address:
[   36.154662]  fff00000c591a000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   36.155522]  fff00000c591a080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   36.156374] >fff00000c591a100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   36.157178]                                      ^
[   36.157742]  fff00000c591a180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.158623]  fff00000c591a200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.159529] ==================================================================
[   37.213558] ==================================================================
[   37.214295] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1128/0x4858
[   37.215063] Write of size 8 at addr fff00000c591a130 by task kunit_try_catch/254
[   37.215771] 
[   37.216187] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241126 #1
[   37.217443] Tainted: [B]=BAD_PAGE, [N]=TEST
[   37.217980] Hardware name: linux,dummy-virt (DT)
[   37.218640] Call trace:
[   37.219033]  show_stack+0x20/0x38 (C)
[   37.219681]  dump_stack_lvl+0x8c/0xd0
[   37.220537]  print_report+0x118/0x5e0
[   37.221170]  kasan_report+0xc8/0x118
[   37.221775]  kasan_check_range+0x100/0x1a8
[   37.222476]  __kasan_check_write+0x20/0x30
[   37.223153]  kasan_atomics_helper+0x1128/0x4858
[   37.223891]  kasan_atomics+0x198/0x2e8
[   37.224517]  kunit_try_run_case+0x14c/0x3d0
[   37.225224]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.226032]  kthread+0x24c/0x2d0
[   37.226613]  ret_from_fork+0x10/0x20
[   37.227282] 
[   37.227624] Allocated by task 254:
[   37.228102]  kasan_save_stack+0x3c/0x68
[   37.228735]  kasan_save_track+0x20/0x40
[   37.229260]  kasan_save_alloc_info+0x40/0x58
[   37.229941]  __kasan_kmalloc+0xd4/0xd8
[   37.230477]  __kmalloc_cache_noprof+0x15c/0x3c8
[   37.231071]  kasan_atomics+0xb8/0x2e8
[   37.231674]  kunit_try_run_case+0x14c/0x3d0
[   37.232296]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.232916]  kthread+0x24c/0x2d0
[   37.233482]  ret_from_fork+0x10/0x20
[   37.234094] 
[   37.234477] The buggy address belongs to the object at fff00000c591a100
[   37.234477]  which belongs to the cache kmalloc-64 of size 64
[   37.235713] The buggy address is located 0 bytes to the right of
[   37.235713]  allocated 48-byte region [fff00000c591a100, fff00000c591a130)
[   37.236937] 
[   37.237312] The buggy address belongs to the physical page:
[   37.238043] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10591a
[   37.238817] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   37.239615] page_type: f5(slab)
[   37.240180] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   37.241029] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   37.241891] page dumped because: kasan: bad access detected
[   37.242437] 
[   37.242819] Memory state around the buggy address:
[   37.243513]  fff00000c591a000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   37.244231]  fff00000c591a080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   37.245163] >fff00000c591a100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   37.246093]                                      ^
[   37.246803]  fff00000c591a180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.247624]  fff00000c591a200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.248391] ==================================================================
[   37.665378] ==================================================================
[   37.666217] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3db0/0x4858
[   37.667101] Read of size 8 at addr fff00000c591a130 by task kunit_try_catch/254
[   37.667806] 
[   37.668202] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241126 #1
[   37.669514] Tainted: [B]=BAD_PAGE, [N]=TEST
[   37.670165] Hardware name: linux,dummy-virt (DT)
[   37.670754] Call trace:
[   37.671270]  show_stack+0x20/0x38 (C)
[   37.671952]  dump_stack_lvl+0x8c/0xd0
[   37.672588]  print_report+0x118/0x5e0
[   37.673354]  kasan_report+0xc8/0x118
[   37.674037]  __asan_report_load8_noabort+0x20/0x30
[   37.674683]  kasan_atomics_helper+0x3db0/0x4858
[   37.675414]  kasan_atomics+0x198/0x2e8
[   37.676105]  kunit_try_run_case+0x14c/0x3d0
[   37.676732]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.677572]  kthread+0x24c/0x2d0
[   37.678178]  ret_from_fork+0x10/0x20
[   37.678844] 
[   37.679235] Allocated by task 254:
[   37.679821]  kasan_save_stack+0x3c/0x68
[   37.680426]  kasan_save_track+0x20/0x40
[   37.681048]  kasan_save_alloc_info+0x40/0x58
[   37.681752]  __kasan_kmalloc+0xd4/0xd8
[   37.682333]  __kmalloc_cache_noprof+0x15c/0x3c8
[   37.683086]  kasan_atomics+0xb8/0x2e8
[   37.683637]  kunit_try_run_case+0x14c/0x3d0
[   37.684332]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.685068]  kthread+0x24c/0x2d0
[   37.685659]  ret_from_fork+0x10/0x20
[   37.686202] 
[   37.686628] The buggy address belongs to the object at fff00000c591a100
[   37.686628]  which belongs to the cache kmalloc-64 of size 64
[   37.687883] The buggy address is located 0 bytes to the right of
[   37.687883]  allocated 48-byte region [fff00000c591a100, fff00000c591a130)
[   37.689216] 
[   37.689563] The buggy address belongs to the physical page:
[   37.690296] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10591a
[   37.691215] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   37.692099] page_type: f5(slab)
[   37.692580] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   37.693529] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   37.694459] page dumped because: kasan: bad access detected
[   37.695162] 
[   37.695514] Memory state around the buggy address:
[   37.696246]  fff00000c591a000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   37.697051]  fff00000c591a080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   37.697962] >fff00000c591a100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   37.698815]                                      ^
[   37.699449]  fff00000c591a180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.700346]  fff00000c591a200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.701237] ==================================================================
[   36.242090] ==================================================================
[   36.243506] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x42d8/0x4858
[   36.244351] Read of size 4 at addr fff00000c591a130 by task kunit_try_catch/254
[   36.245169] 
[   36.245560] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241126 #1
[   36.247363] Tainted: [B]=BAD_PAGE, [N]=TEST
[   36.248152] Hardware name: linux,dummy-virt (DT)
[   36.248832] Call trace:
[   36.249280]  show_stack+0x20/0x38 (C)
[   36.249941]  dump_stack_lvl+0x8c/0xd0
[   36.250445]  print_report+0x118/0x5e0
[   36.250974]  kasan_report+0xc8/0x118
[   36.251595]  __asan_report_load4_noabort+0x20/0x30
[   36.252339]  kasan_atomics_helper+0x42d8/0x4858
[   36.253068]  kasan_atomics+0x198/0x2e8
[   36.253692]  kunit_try_run_case+0x14c/0x3d0
[   36.254412]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.255131]  kthread+0x24c/0x2d0
[   36.255769]  ret_from_fork+0x10/0x20
[   36.256426] 
[   36.256787] Allocated by task 254:
[   36.257348]  kasan_save_stack+0x3c/0x68
[   36.257957]  kasan_save_track+0x20/0x40
[   36.258558]  kasan_save_alloc_info+0x40/0x58
[   36.259244]  __kasan_kmalloc+0xd4/0xd8
[   36.259860]  __kmalloc_cache_noprof+0x15c/0x3c8
[   36.260502]  kasan_atomics+0xb8/0x2e8
[   36.261092]  kunit_try_run_case+0x14c/0x3d0
[   36.261751]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.262833]  kthread+0x24c/0x2d0
[   36.263344]  ret_from_fork+0x10/0x20
[   36.263851] 
[   36.264516] The buggy address belongs to the object at fff00000c591a100
[   36.264516]  which belongs to the cache kmalloc-64 of size 64
[   36.265619] The buggy address is located 0 bytes to the right of
[   36.265619]  allocated 48-byte region [fff00000c591a100, fff00000c591a130)
[   36.266998] 
[   36.267378] The buggy address belongs to the physical page:
[   36.268215] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10591a
[   36.269233] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   36.270437] page_type: f5(slab)
[   36.270891] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   36.272030] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   36.273122] page dumped because: kasan: bad access detected
[   36.274015] 
[   36.274568] Memory state around the buggy address:
[   36.275417]  fff00000c591a000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   36.276426]  fff00000c591a080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   36.277248] >fff00000c591a100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   36.278288]                                      ^
[   36.279001]  fff00000c591a180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.279716]  fff00000c591a200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.280571] ==================================================================
[   37.473717] ==================================================================
[   37.474581] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1414/0x4858
[   37.476098] Write of size 8 at addr fff00000c591a130 by task kunit_try_catch/254
[   37.477120] 
[   37.477455] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241126 #1
[   37.478304] Tainted: [B]=BAD_PAGE, [N]=TEST
[   37.478925] Hardware name: linux,dummy-virt (DT)
[   37.479593] Call trace:
[   37.480075]  show_stack+0x20/0x38 (C)
[   37.480741]  dump_stack_lvl+0x8c/0xd0
[   37.481405]  print_report+0x118/0x5e0
[   37.482030]  kasan_report+0xc8/0x118
[   37.482676]  kasan_check_range+0x100/0x1a8
[   37.483239]  __kasan_check_write+0x20/0x30
[   37.483932]  kasan_atomics_helper+0x1414/0x4858
[   37.484487]  kasan_atomics+0x198/0x2e8
[   37.485139]  kunit_try_run_case+0x14c/0x3d0
[   37.485758]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.486605]  kthread+0x24c/0x2d0
[   37.487212]  ret_from_fork+0x10/0x20
[   37.487847] 
[   37.488213] Allocated by task 254:
[   37.488758]  kasan_save_stack+0x3c/0x68
[   37.489357]  kasan_save_track+0x20/0x40
[   37.489995]  kasan_save_alloc_info+0x40/0x58
[   37.490590]  __kasan_kmalloc+0xd4/0xd8
[   37.491077]  __kmalloc_cache_noprof+0x15c/0x3c8
[   37.491746]  kasan_atomics+0xb8/0x2e8
[   37.492340]  kunit_try_run_case+0x14c/0x3d0
[   37.493012]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.493781]  kthread+0x24c/0x2d0
[   37.494363]  ret_from_fork+0x10/0x20
[   37.494979] 
[   37.495357] The buggy address belongs to the object at fff00000c591a100
[   37.495357]  which belongs to the cache kmalloc-64 of size 64
[   37.496735] The buggy address is located 0 bytes to the right of
[   37.496735]  allocated 48-byte region [fff00000c591a100, fff00000c591a130)
[   37.498216] 
[   37.498594] The buggy address belongs to the physical page:
[   37.499351] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10591a
[   37.500213] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   37.501059] page_type: f5(slab)
[   37.501626] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   37.502538] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   37.503414] page dumped because: kasan: bad access detected
[   37.504094] 
[   37.504446] Memory state around the buggy address:
[   37.505616]  fff00000c591a000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   37.506536]  fff00000c591a080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   37.507320] >fff00000c591a100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   37.508043]                                      ^
[   37.508718]  fff00000c591a180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.509531]  fff00000c591a200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.510361] ==================================================================
[   35.861729] ==================================================================
[   35.862684] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x47c/0x4858
[   35.863499] Write of size 4 at addr fff00000c591a130 by task kunit_try_catch/254
[   35.863874] 
[   35.864328] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241126 #1
[   35.865881] Tainted: [B]=BAD_PAGE, [N]=TEST
[   35.866416] Hardware name: linux,dummy-virt (DT)
[   35.866940] Call trace:
[   35.867348]  show_stack+0x20/0x38 (C)
[   35.867935]  dump_stack_lvl+0x8c/0xd0
[   35.868523]  print_report+0x118/0x5e0
[   35.869090]  kasan_report+0xc8/0x118
[   35.869715]  kasan_check_range+0x100/0x1a8
[   35.870395]  __kasan_check_write+0x20/0x30
[   35.871101]  kasan_atomics_helper+0x47c/0x4858
[   35.871715]  kasan_atomics+0x198/0x2e8
[   35.872387]  kunit_try_run_case+0x14c/0x3d0
[   35.873042]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.873696]  kthread+0x24c/0x2d0
[   35.874299]  ret_from_fork+0x10/0x20
[   35.874944] 
[   35.875358] Allocated by task 254:
[   35.875931]  kasan_save_stack+0x3c/0x68
[   35.876501]  kasan_save_track+0x20/0x40
[   35.877072]  kasan_save_alloc_info+0x40/0x58
[   35.877736]  __kasan_kmalloc+0xd4/0xd8
[   35.878241]  __kmalloc_cache_noprof+0x15c/0x3c8
[   35.878935]  kasan_atomics+0xb8/0x2e8
[   35.879530]  kunit_try_run_case+0x14c/0x3d0
[   35.880097]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.880819]  kthread+0x24c/0x2d0
[   35.881411]  ret_from_fork+0x10/0x20
[   35.881872] 
[   35.882256] The buggy address belongs to the object at fff00000c591a100
[   35.882256]  which belongs to the cache kmalloc-64 of size 64
[   35.883524] The buggy address is located 0 bytes to the right of
[   35.883524]  allocated 48-byte region [fff00000c591a100, fff00000c591a130)
[   35.884686] 
[   35.885086] The buggy address belongs to the physical page:
[   35.885684] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10591a
[   35.886639] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   35.887387] page_type: f5(slab)
[   35.887885] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   35.888798] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   35.889745] page dumped because: kasan: bad access detected
[   35.890329] 
[   35.890698] Memory state around the buggy address:
[   35.891392]  fff00000c591a000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.892156]  fff00000c591a080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.893002] >fff00000c591a100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   35.893804]                                      ^
[   35.894428]  fff00000c591a180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.895358]  fff00000c591a200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.895998] ==================================================================
[   37.104073] ==================================================================
[   37.104879] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xff0/0x4858
[   37.105767] Write of size 8 at addr fff00000c591a130 by task kunit_try_catch/254
[   37.106553] 
[   37.106983] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241126 #1
[   37.108236] Tainted: [B]=BAD_PAGE, [N]=TEST
[   37.108766] Hardware name: linux,dummy-virt (DT)
[   37.109403] Call trace:
[   37.109863]  show_stack+0x20/0x38 (C)
[   37.110562]  dump_stack_lvl+0x8c/0xd0
[   37.111098]  print_report+0x118/0x5e0
[   37.111739]  kasan_report+0xc8/0x118
[   37.112380]  kasan_check_range+0x100/0x1a8
[   37.112954]  __kasan_check_write+0x20/0x30
[   37.113631]  kasan_atomics_helper+0xff0/0x4858
[   37.114205]  kasan_atomics+0x198/0x2e8
[   37.114865]  kunit_try_run_case+0x14c/0x3d0
[   37.115617]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.116410]  kthread+0x24c/0x2d0
[   37.117077]  ret_from_fork+0x10/0x20
[   37.117692] 
[   37.118055] Allocated by task 254:
[   37.118493]  kasan_save_stack+0x3c/0x68
[   37.119123]  kasan_save_track+0x20/0x40
[   37.119617]  kasan_save_alloc_info+0x40/0x58
[   37.120293]  __kasan_kmalloc+0xd4/0xd8
[   37.120843]  __kmalloc_cache_noprof+0x15c/0x3c8
[   37.121422]  kasan_atomics+0xb8/0x2e8
[   37.122036]  kunit_try_run_case+0x14c/0x3d0
[   37.122700]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.123345]  kthread+0x24c/0x2d0
[   37.123924]  ret_from_fork+0x10/0x20
[   37.124444] 
[   37.124808] The buggy address belongs to the object at fff00000c591a100
[   37.124808]  which belongs to the cache kmalloc-64 of size 64
[   37.126056] The buggy address is located 0 bytes to the right of
[   37.126056]  allocated 48-byte region [fff00000c591a100, fff00000c591a130)
[   37.127310] 
[   37.127640] The buggy address belongs to the physical page:
[   37.128258] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10591a
[   37.129194] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   37.130006] page_type: f5(slab)
[   37.130574] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   37.131558] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   37.132488] page dumped because: kasan: bad access detected
[   37.133210] 
[   37.133583] Memory state around the buggy address:
[   37.134091]  fff00000c591a000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   37.135028]  fff00000c591a080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   37.135823] >fff00000c591a100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   37.136588]                                      ^
[   37.137238]  fff00000c591a180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.137942]  fff00000c591a200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.138831] ==================================================================
[   37.893614] ==================================================================
[   37.894272] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e20/0x4858
[   37.895235] Read of size 8 at addr fff00000c591a130 by task kunit_try_catch/254
[   37.896149] 
[   37.896622] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241126 #1
[   37.897642] Tainted: [B]=BAD_PAGE, [N]=TEST
[   37.898311] Hardware name: linux,dummy-virt (DT)
[   37.898941] Call trace:
[   37.899410]  show_stack+0x20/0x38 (C)
[   37.900144]  dump_stack_lvl+0x8c/0xd0
[   37.900821]  print_report+0x118/0x5e0
[   37.901432]  kasan_report+0xc8/0x118
[   37.902106]  __asan_report_load8_noabort+0x20/0x30
[   37.902787]  kasan_atomics_helper+0x3e20/0x4858
[   37.903541]  kasan_atomics+0x198/0x2e8
[   37.904170]  kunit_try_run_case+0x14c/0x3d0
[   37.904838]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.905693]  kthread+0x24c/0x2d0
[   37.906344]  ret_from_fork+0x10/0x20
[   37.906921] 
[   37.907336] Allocated by task 254:
[   37.907873]  kasan_save_stack+0x3c/0x68
[   37.908571]  kasan_save_track+0x20/0x40
[   37.909173]  kasan_save_alloc_info+0x40/0x58
[   37.909879]  __kasan_kmalloc+0xd4/0xd8
[   37.910432]  __kmalloc_cache_noprof+0x15c/0x3c8
[   37.911181]  kasan_atomics+0xb8/0x2e8
[   37.911729]  kunit_try_run_case+0x14c/0x3d0
[   37.912453]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.913134]  kthread+0x24c/0x2d0
[   37.913731]  ret_from_fork+0x10/0x20
[   37.914309] 
[   37.914739] The buggy address belongs to the object at fff00000c591a100
[   37.914739]  which belongs to the cache kmalloc-64 of size 64
[   37.915936] The buggy address is located 0 bytes to the right of
[   37.915936]  allocated 48-byte region [fff00000c591a100, fff00000c591a130)
[   37.917309] 
[   37.917722] The buggy address belongs to the physical page:
[   37.918375] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10591a
[   37.919412] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   37.920166] page_type: f5(slab)
[   37.920766] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   37.921638] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   37.922530] page dumped because: kasan: bad access detected
[   37.923221] 
[   37.923615] Memory state around the buggy address:
[   37.924192]  fff00000c591a000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   37.925120]  fff00000c591a080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   37.926055] >fff00000c591a100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   37.926871]                                      ^
[   37.927532]  fff00000c591a180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.928381]  fff00000c591a200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.929248] ==================================================================
[   37.702786] ==================================================================
[   37.703527] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1644/0x4858
[   37.704541] Write of size 8 at addr fff00000c591a130 by task kunit_try_catch/254
[   37.705490] 
[   37.705926] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241126 #1
[   37.707069] Tainted: [B]=BAD_PAGE, [N]=TEST
[   37.707642] Hardware name: linux,dummy-virt (DT)
[   37.708351] Call trace:
[   37.708762]  show_stack+0x20/0x38 (C)
[   37.709488]  dump_stack_lvl+0x8c/0xd0
[   37.710189]  print_report+0x118/0x5e0
[   37.710745]  kasan_report+0xc8/0x118
[   37.711424]  kasan_check_range+0x100/0x1a8
[   37.712050]  __kasan_check_write+0x20/0x30
[   37.712737]  kasan_atomics_helper+0x1644/0x4858
[   37.713550]  kasan_atomics+0x198/0x2e8
[   37.714238]  kunit_try_run_case+0x14c/0x3d0
[   37.714997]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.715734]  kthread+0x24c/0x2d0
[   37.716368]  ret_from_fork+0x10/0x20
[   37.716977] 
[   37.717329] Allocated by task 254:
[   37.717876]  kasan_save_stack+0x3c/0x68
[   37.718485]  kasan_save_track+0x20/0x40
[   37.719162]  kasan_save_alloc_info+0x40/0x58
[   37.719754]  __kasan_kmalloc+0xd4/0xd8
[   37.720422]  __kmalloc_cache_noprof+0x15c/0x3c8
[   37.721045]  kasan_atomics+0xb8/0x2e8
[   37.721685]  kunit_try_run_case+0x14c/0x3d0
[   37.722312]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.723214]  kthread+0x24c/0x2d0
[   37.723784]  ret_from_fork+0x10/0x20
[   37.724525] 
[   37.724986] The buggy address belongs to the object at fff00000c591a100
[   37.724986]  which belongs to the cache kmalloc-64 of size 64
[   37.726371] The buggy address is located 0 bytes to the right of
[   37.726371]  allocated 48-byte region [fff00000c591a100, fff00000c591a130)
[   37.727798] 
[   37.728327] The buggy address belongs to the physical page:
[   37.729120] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10591a
[   37.730227] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   37.731205] page_type: f5(slab)
[   37.731665] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   37.732483] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   37.733306] page dumped because: kasan: bad access detected
[   37.734029] 
[   37.734580] Memory state around the buggy address:
[   37.735373]  fff00000c591a000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   37.736325]  fff00000c591a080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   37.737271] >fff00000c591a100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   37.738117]                                      ^
[   37.738806]  fff00000c591a180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.739638]  fff00000c591a200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.740489] ==================================================================
[   36.050077] ==================================================================
[   36.051451] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x684/0x4858
[   36.052620] Write of size 4 at addr fff00000c591a130 by task kunit_try_catch/254
[   36.053436] 
[   36.053720] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241126 #1
[   36.054659] Tainted: [B]=BAD_PAGE, [N]=TEST
[   36.055336] Hardware name: linux,dummy-virt (DT)
[   36.056009] Call trace:
[   36.056477]  show_stack+0x20/0x38 (C)
[   36.057140]  dump_stack_lvl+0x8c/0xd0
[   36.057750]  print_report+0x118/0x5e0
[   36.058437]  kasan_report+0xc8/0x118
[   36.059001]  kasan_check_range+0x100/0x1a8
[   36.059533]  __kasan_check_write+0x20/0x30
[   36.060230]  kasan_atomics_helper+0x684/0x4858
[   36.060816]  kasan_atomics+0x198/0x2e8
[   36.061482]  kunit_try_run_case+0x14c/0x3d0
[   36.062089]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.062852]  kthread+0x24c/0x2d0
[   36.063417]  ret_from_fork+0x10/0x20
[   36.064081] 
[   36.064447] Allocated by task 254:
[   36.065017]  kasan_save_stack+0x3c/0x68
[   36.065548]  kasan_save_track+0x20/0x40
[   36.066177]  kasan_save_alloc_info+0x40/0x58
[   36.066850]  __kasan_kmalloc+0xd4/0xd8
[   36.067405]  __kmalloc_cache_noprof+0x15c/0x3c8
[   36.067946]  kasan_atomics+0xb8/0x2e8
[   36.068563]  kunit_try_run_case+0x14c/0x3d0
[   36.069109]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.069874]  kthread+0x24c/0x2d0
[   36.070403]  ret_from_fork+0x10/0x20
[   36.071045] 
[   36.071405] The buggy address belongs to the object at fff00000c591a100
[   36.071405]  which belongs to the cache kmalloc-64 of size 64
[   36.072490] The buggy address is located 0 bytes to the right of
[   36.072490]  allocated 48-byte region [fff00000c591a100, fff00000c591a130)
[   36.073853] 
[   36.074244] The buggy address belongs to the physical page:
[   36.074850] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10591a
[   36.075890] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   36.076645] page_type: f5(slab)
[   36.077150] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   36.078041] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   36.078771] page dumped because: kasan: bad access detected
[   36.079525] 
[   36.079859] Memory state around the buggy address:
[   36.080526]  fff00000c591a000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   36.081239]  fff00000c591a080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   36.082166] >fff00000c591a100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   36.082972]                                      ^
[   36.083645]  fff00000c591a180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.084402]  fff00000c591a200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.085331] ==================================================================
[   36.987478] ==================================================================
[   36.988195] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xeb8/0x4858
[   36.989209] Write of size 8 at addr fff00000c591a130 by task kunit_try_catch/254
[   36.990060] 
[   36.990524] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241126 #1
[   36.991630] Tainted: [B]=BAD_PAGE, [N]=TEST
[   36.992254] Hardware name: linux,dummy-virt (DT)
[   36.992964] Call trace:
[   36.993420]  show_stack+0x20/0x38 (C)
[   36.994121]  dump_stack_lvl+0x8c/0xd0
[   36.994740]  print_report+0x118/0x5e0
[   36.995431]  kasan_report+0xc8/0x118
[   36.996129]  kasan_check_range+0x100/0x1a8
[   36.996720]  __kasan_check_write+0x20/0x30
[   36.997472]  kasan_atomics_helper+0xeb8/0x4858
[   36.998101]  kasan_atomics+0x198/0x2e8
[   36.998785]  kunit_try_run_case+0x14c/0x3d0
[   36.999487]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.000260]  kthread+0x24c/0x2d0
[   37.000849]  ret_from_fork+0x10/0x20
[   37.001483] 
[   37.001793] Allocated by task 254:
[   37.002409]  kasan_save_stack+0x3c/0x68
[   37.003072]  kasan_save_track+0x20/0x40
[   37.003644]  kasan_save_alloc_info+0x40/0x58
[   37.004356]  __kasan_kmalloc+0xd4/0xd8
[   37.004951]  __kmalloc_cache_noprof+0x15c/0x3c8
[   37.005711]  kasan_atomics+0xb8/0x2e8
[   37.006284]  kunit_try_run_case+0x14c/0x3d0
[   37.007004]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.007671]  kthread+0x24c/0x2d0
[   37.008299]  ret_from_fork+0x10/0x20
[   37.008923] 
[   37.009297] The buggy address belongs to the object at fff00000c591a100
[   37.009297]  which belongs to the cache kmalloc-64 of size 64
[   37.010534] The buggy address is located 0 bytes to the right of
[   37.010534]  allocated 48-byte region [fff00000c591a100, fff00000c591a130)
[   37.011938] 
[   37.012341] The buggy address belongs to the physical page:
[   37.013095] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10591a
[   37.014018] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   37.014836] page_type: f5(slab)
[   37.015501] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   37.016435] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   37.017384] page dumped because: kasan: bad access detected
[   37.018074] 
[   37.018435] Memory state around the buggy address:
[   37.019190]  fff00000c591a000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   37.019994]  fff00000c591a080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   37.020851] >fff00000c591a100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   37.021688]                                      ^
[   37.022323]  fff00000c591a180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.023172]  fff00000c591a200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.024096] ==================================================================
[   37.817369] ==================================================================
[   37.818140] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e10/0x4858
[   37.818895] Read of size 8 at addr fff00000c591a130 by task kunit_try_catch/254
[   37.819727] 
[   37.820147] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241126 #1
[   37.821078] Tainted: [B]=BAD_PAGE, [N]=TEST
[   37.821676] Hardware name: linux,dummy-virt (DT)
[   37.822347] Call trace:
[   37.822804]  show_stack+0x20/0x38 (C)
[   37.823458]  dump_stack_lvl+0x8c/0xd0
[   37.824109]  print_report+0x118/0x5e0
[   37.824757]  kasan_report+0xc8/0x118
[   37.825274]  __asan_report_load8_noabort+0x20/0x30
[   37.826087]  kasan_atomics_helper+0x3e10/0x4858
[   37.826785]  kasan_atomics+0x198/0x2e8
[   37.827378]  kunit_try_run_case+0x14c/0x3d0
[   37.827930]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.828701]  kthread+0x24c/0x2d0
[   37.829283]  ret_from_fork+0x10/0x20
[   37.830002] 
[   37.830465] Allocated by task 254:
[   37.831029]  kasan_save_stack+0x3c/0x68
[   37.831655]  kasan_save_track+0x20/0x40
[   37.832274]  kasan_save_alloc_info+0x40/0x58
[   37.833014]  __kasan_kmalloc+0xd4/0xd8
[   37.833642]  __kmalloc_cache_noprof+0x15c/0x3c8
[   37.834327]  kasan_atomics+0xb8/0x2e8
[   37.834998]  kunit_try_run_case+0x14c/0x3d0
[   37.835674]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.836472]  kthread+0x24c/0x2d0
[   37.837098]  ret_from_fork+0x10/0x20
[   37.837652] 
[   37.838049] The buggy address belongs to the object at fff00000c591a100
[   37.838049]  which belongs to the cache kmalloc-64 of size 64
[   37.839285] The buggy address is located 0 bytes to the right of
[   37.839285]  allocated 48-byte region [fff00000c591a100, fff00000c591a130)
[   37.840645] 
[   37.841033] The buggy address belongs to the physical page:
[   37.841809] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10591a
[   37.842638] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   37.843549] page_type: f5(slab)
[   37.844134] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   37.844995] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   37.845941] page dumped because: kasan: bad access detected
[   37.846645] 
[   37.847037] Memory state around the buggy address:
[   37.847738]  fff00000c591a000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   37.848534]  fff00000c591a080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   37.849450] >fff00000c591a100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   37.850296]                                      ^
[   37.850897]  fff00000c591a180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.851787]  fff00000c591a200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.852649] ==================================================================
[   37.026138] ==================================================================
[   37.027146] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf20/0x4858
[   37.028583] Write of size 8 at addr fff00000c591a130 by task kunit_try_catch/254
[   37.029220] 
[   37.029626] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241126 #1
[   37.030771] Tainted: [B]=BAD_PAGE, [N]=TEST
[   37.031388] Hardware name: linux,dummy-virt (DT)
[   37.031880] Call trace:
[   37.032397]  show_stack+0x20/0x38 (C)
[   37.033117]  dump_stack_lvl+0x8c/0xd0
[   37.033783]  print_report+0x118/0x5e0
[   37.034521]  kasan_report+0xc8/0x118
[   37.035160]  kasan_check_range+0x100/0x1a8
[   37.035933]  __kasan_check_write+0x20/0x30
[   37.036578]  kasan_atomics_helper+0xf20/0x4858
[   37.037327]  kasan_atomics+0x198/0x2e8
[   37.038032]  kunit_try_run_case+0x14c/0x3d0
[   37.038841]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.039749]  kthread+0x24c/0x2d0
[   37.040308]  ret_from_fork+0x10/0x20
[   37.040875] 
[   37.041265] Allocated by task 254:
[   37.041813]  kasan_save_stack+0x3c/0x68
[   37.042403]  kasan_save_track+0x20/0x40
[   37.043079]  kasan_save_alloc_info+0x40/0x58
[   37.043773]  __kasan_kmalloc+0xd4/0xd8
[   37.044426]  __kmalloc_cache_noprof+0x15c/0x3c8
[   37.045135]  kasan_atomics+0xb8/0x2e8
[   37.045810]  kunit_try_run_case+0x14c/0x3d0
[   37.046457]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.047281]  kthread+0x24c/0x2d0
[   37.047824]  ret_from_fork+0x10/0x20
[   37.048490] 
[   37.048883] The buggy address belongs to the object at fff00000c591a100
[   37.048883]  which belongs to the cache kmalloc-64 of size 64
[   37.050153] The buggy address is located 0 bytes to the right of
[   37.050153]  allocated 48-byte region [fff00000c591a100, fff00000c591a130)
[   37.051493] 
[   37.051875] The buggy address belongs to the physical page:
[   37.052528] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10591a
[   37.053577] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   37.054361] page_type: f5(slab)
[   37.054977] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   37.055885] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   37.056821] page dumped because: kasan: bad access detected
[   37.057507] 
[   37.057918] Memory state around the buggy address:
[   37.058523]  fff00000c591a000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   37.059404]  fff00000c591a080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   37.060295] >fff00000c591a100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   37.061159]                                      ^
[   37.061774]  fff00000c591a180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.062665]  fff00000c591a200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.063503] ==================================================================
[   35.461921] ==================================================================
[   35.463261] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x40a8/0x4858
[   35.464165] Read of size 4 at addr fff00000c591a130 by task kunit_try_catch/254
[   35.465284] 
[   35.465775] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241126 #1
[   35.467370] Tainted: [B]=BAD_PAGE, [N]=TEST
[   35.468065] Hardware name: linux,dummy-virt (DT)
[   35.468798] Call trace:
[   35.469366]  show_stack+0x20/0x38 (C)
[   35.469888]  dump_stack_lvl+0x8c/0xd0
[   35.470640]  print_report+0x118/0x5e0
[   35.471313]  kasan_report+0xc8/0x118
[   35.471976]  __asan_report_load4_noabort+0x20/0x30
[   35.472789]  kasan_atomics_helper+0x40a8/0x4858
[   35.473589]  kasan_atomics+0x198/0x2e8
[   35.474192]  kunit_try_run_case+0x14c/0x3d0
[   35.474674]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.475508]  kthread+0x24c/0x2d0
[   35.476099]  ret_from_fork+0x10/0x20
[   35.476663] 
[   35.477042] Allocated by task 254:
[   35.477541]  kasan_save_stack+0x3c/0x68
[   35.478150]  kasan_save_track+0x20/0x40
[   35.478783]  kasan_save_alloc_info+0x40/0x58
[   35.479449]  __kasan_kmalloc+0xd4/0xd8
[   35.479960]  __kmalloc_cache_noprof+0x15c/0x3c8
[   35.480646]  kasan_atomics+0xb8/0x2e8
[   35.481170]  kunit_try_run_case+0x14c/0x3d0
[   35.481832]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.482549]  kthread+0x24c/0x2d0
[   35.483141]  ret_from_fork+0x10/0x20
[   35.483722] 
[   35.484112] The buggy address belongs to the object at fff00000c591a100
[   35.484112]  which belongs to the cache kmalloc-64 of size 64
[   35.485286] The buggy address is located 0 bytes to the right of
[   35.485286]  allocated 48-byte region [fff00000c591a100, fff00000c591a130)
[   35.486715] 
[   35.487070] The buggy address belongs to the physical page:
[   35.487780] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10591a
[   35.488742] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   35.489623] page_type: f5(slab)
[   35.490151] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   35.491160] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   35.491949] page dumped because: kasan: bad access detected
[   35.492757] 
[   35.493123] Memory state around the buggy address:
[   35.493692]  fff00000c591a000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.494615]  fff00000c591a080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.495439] >fff00000c591a100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   35.496325]                                      ^
[   35.496921]  fff00000c591a180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.497742]  fff00000c591a200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.498517] ==================================================================
[   36.160985] ==================================================================
[   36.161865] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x7cc/0x4858
[   36.162636] Write of size 4 at addr fff00000c591a130 by task kunit_try_catch/254
[   36.163857] 
[   36.164273] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241126 #1
[   36.165530] Tainted: [B]=BAD_PAGE, [N]=TEST
[   36.166147] Hardware name: linux,dummy-virt (DT)
[   36.166811] Call trace:
[   36.167250]  show_stack+0x20/0x38 (C)
[   36.167849]  dump_stack_lvl+0x8c/0xd0
[   36.168453]  print_report+0x118/0x5e0
[   36.169072]  kasan_report+0xc8/0x118
[   36.169657]  kasan_check_range+0x100/0x1a8
[   36.170300]  __kasan_check_write+0x20/0x30
[   36.170938]  kasan_atomics_helper+0x7cc/0x4858
[   36.171499]  kasan_atomics+0x198/0x2e8
[   36.172153]  kunit_try_run_case+0x14c/0x3d0
[   36.172838]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.173651]  kthread+0x24c/0x2d0
[   36.174265]  ret_from_fork+0x10/0x20
[   36.174942] 
[   36.175285] Allocated by task 254:
[   36.175778]  kasan_save_stack+0x3c/0x68
[   36.176401]  kasan_save_track+0x20/0x40
[   36.176978]  kasan_save_alloc_info+0x40/0x58
[   36.177493]  __kasan_kmalloc+0xd4/0xd8
[   36.178123]  __kmalloc_cache_noprof+0x15c/0x3c8
[   36.178812]  kasan_atomics+0xb8/0x2e8
[   36.179395]  kunit_try_run_case+0x14c/0x3d0
[   36.179967]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.180707]  kthread+0x24c/0x2d0
[   36.181290]  ret_from_fork+0x10/0x20
[   36.181879] 
[   36.182215] The buggy address belongs to the object at fff00000c591a100
[   36.182215]  which belongs to the cache kmalloc-64 of size 64
[   36.183428] The buggy address is located 0 bytes to the right of
[   36.183428]  allocated 48-byte region [fff00000c591a100, fff00000c591a130)
[   36.184716] 
[   36.185107] The buggy address belongs to the physical page:
[   36.185885] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10591a
[   36.186706] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   36.187532] page_type: f5(slab)
[   36.188022] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   36.189005] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   36.189663] page dumped because: kasan: bad access detected
[   36.190423] 
[   36.190796] Memory state around the buggy address:
[   36.191484]  fff00000c591a000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   36.192301]  fff00000c591a080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   36.193067] >fff00000c591a100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   36.193967]                                      ^
[   36.194604]  fff00000c591a180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.195573]  fff00000c591a200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.197069] ==================================================================
[   37.177592] ==================================================================
[   37.178308] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x10c0/0x4858
[   37.179269] Write of size 8 at addr fff00000c591a130 by task kunit_try_catch/254
[   37.180083] 
[   37.181168] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241126 #1
[   37.181922] Tainted: [B]=BAD_PAGE, [N]=TEST
[   37.182360] Hardware name: linux,dummy-virt (DT)
[   37.182845] Call trace:
[   37.183346]  show_stack+0x20/0x38 (C)
[   37.184036]  dump_stack_lvl+0x8c/0xd0
[   37.184717]  print_report+0x118/0x5e0
[   37.185464]  kasan_report+0xc8/0x118
[   37.186164]  kasan_check_range+0x100/0x1a8
[   37.186883]  __kasan_check_write+0x20/0x30
[   37.187581]  kasan_atomics_helper+0x10c0/0x4858
[   37.188335]  kasan_atomics+0x198/0x2e8
[   37.188630]  kunit_try_run_case+0x14c/0x3d0
[   37.188958]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.189737]  kthread+0x24c/0x2d0
[   37.190257]  ret_from_fork+0x10/0x20
[   37.190874] 
[   37.191250] Allocated by task 254:
[   37.191719]  kasan_save_stack+0x3c/0x68
[   37.192214]  kasan_save_track+0x20/0x40
[   37.192717]  kasan_save_alloc_info+0x40/0x58
[   37.193372]  __kasan_kmalloc+0xd4/0xd8
[   37.193861]  __kmalloc_cache_noprof+0x15c/0x3c8
[   37.194571]  kasan_atomics+0xb8/0x2e8
[   37.195070]  kunit_try_run_case+0x14c/0x3d0
[   37.195776]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.196559]  kthread+0x24c/0x2d0
[   37.197072]  ret_from_fork+0x10/0x20
[   37.197664] 
[   37.198057] The buggy address belongs to the object at fff00000c591a100
[   37.198057]  which belongs to the cache kmalloc-64 of size 64
[   37.199336] The buggy address is located 0 bytes to the right of
[   37.199336]  allocated 48-byte region [fff00000c591a100, fff00000c591a130)
[   37.200563] 
[   37.200951] The buggy address belongs to the physical page:
[   37.201593] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10591a
[   37.202535] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   37.203295] page_type: f5(slab)
[   37.203861] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   37.204683] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   37.205488] page dumped because: kasan: bad access detected
[   37.206242] 
[   37.206617] Memory state around the buggy address:
[   37.207290]  fff00000c591a000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   37.208116]  fff00000c591a080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   37.208878] >fff00000c591a100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   37.209676]                                      ^
[   37.210301]  fff00000c591a180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.211142]  fff00000c591a200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.211820] ==================================================================
[   36.521616] ==================================================================
[   36.522940] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xb70/0x4858
[   36.523802] Write of size 4 at addr fff00000c591a130 by task kunit_try_catch/254
[   36.525017] 
[   36.525319] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241126 #1
[   36.526385] Tainted: [B]=BAD_PAGE, [N]=TEST
[   36.526879] Hardware name: linux,dummy-virt (DT)
[   36.527695] Call trace:
[   36.528231]  show_stack+0x20/0x38 (C)
[   36.529036]  dump_stack_lvl+0x8c/0xd0
[   36.529605]  print_report+0x118/0x5e0
[   36.530376]  kasan_report+0xc8/0x118
[   36.531160]  kasan_check_range+0x100/0x1a8
[   36.531694]  __kasan_check_write+0x20/0x30
[   36.532230]  kasan_atomics_helper+0xb70/0x4858
[   36.532780]  kasan_atomics+0x198/0x2e8
[   36.533797]  kunit_try_run_case+0x14c/0x3d0
[   36.534660]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.535350]  kthread+0x24c/0x2d0
[   36.535806]  ret_from_fork+0x10/0x20
[   36.536588] 
[   36.536972] Allocated by task 254:
[   36.537350]  kasan_save_stack+0x3c/0x68
[   36.538002]  kasan_save_track+0x20/0x40
[   36.538643]  kasan_save_alloc_info+0x40/0x58
[   36.539316]  __kasan_kmalloc+0xd4/0xd8
[   36.539798]  __kmalloc_cache_noprof+0x15c/0x3c8
[   36.540504]  kasan_atomics+0xb8/0x2e8
[   36.541070]  kunit_try_run_case+0x14c/0x3d0
[   36.541637]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.542424]  kthread+0x24c/0x2d0
[   36.543072]  ret_from_fork+0x10/0x20
[   36.543611] 
[   36.543951] The buggy address belongs to the object at fff00000c591a100
[   36.543951]  which belongs to the cache kmalloc-64 of size 64
[   36.545181] The buggy address is located 0 bytes to the right of
[   36.545181]  allocated 48-byte region [fff00000c591a100, fff00000c591a130)
[   36.546429] 
[   36.546813] The buggy address belongs to the physical page:
[   36.547501] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10591a
[   36.548419] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   36.549285] page_type: f5(slab)
[   36.549836] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   36.550591] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   36.551539] page dumped because: kasan: bad access detected
[   36.552269] 
[   36.552636] Memory state around the buggy address:
[   36.553325]  fff00000c591a000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   36.554170]  fff00000c591a080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   36.555114] >fff00000c591a100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   36.555869]                                      ^
[   36.556571]  fff00000c591a180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.557411]  fff00000c591a200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.558139] ==================================================================
[   36.478139] ==================================================================
[   36.478711] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3dcc/0x4858
[   36.479811] Read of size 4 at addr fff00000c591a130 by task kunit_try_catch/254
[   36.482283] 
[   36.482621] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241126 #1
[   36.483461] Tainted: [B]=BAD_PAGE, [N]=TEST
[   36.484035] Hardware name: linux,dummy-virt (DT)
[   36.484719] Call trace:
[   36.486003]  show_stack+0x20/0x38 (C)
[   36.486550]  dump_stack_lvl+0x8c/0xd0
[   36.487398]  print_report+0x118/0x5e0
[   36.488167]  kasan_report+0xc8/0x118
[   36.489003]  __asan_report_load4_noabort+0x20/0x30
[   36.489872]  kasan_atomics_helper+0x3dcc/0x4858
[   36.490718]  kasan_atomics+0x198/0x2e8
[   36.491502]  kunit_try_run_case+0x14c/0x3d0
[   36.492273]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.493298]  kthread+0x24c/0x2d0
[   36.493847]  ret_from_fork+0x10/0x20
[   36.494396] 
[   36.494730] Allocated by task 254:
[   36.495254]  kasan_save_stack+0x3c/0x68
[   36.495840]  kasan_save_track+0x20/0x40
[   36.497046]  kasan_save_alloc_info+0x40/0x58
[   36.497843]  __kasan_kmalloc+0xd4/0xd8
[   36.498624]  __kmalloc_cache_noprof+0x15c/0x3c8
[   36.499452]  kasan_atomics+0xb8/0x2e8
[   36.500222]  kunit_try_run_case+0x14c/0x3d0
[   36.500969]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.501593]  kthread+0x24c/0x2d0
[   36.502157]  ret_from_fork+0x10/0x20
[   36.502751] 
[   36.503725] The buggy address belongs to the object at fff00000c591a100
[   36.503725]  which belongs to the cache kmalloc-64 of size 64
[   36.505335] The buggy address is located 0 bytes to the right of
[   36.505335]  allocated 48-byte region [fff00000c591a100, fff00000c591a130)
[   36.506706] 
[   36.507180] The buggy address belongs to the physical page:
[   36.508000] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10591a
[   36.509048] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   36.509916] page_type: f5(slab)
[   36.510571] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   36.511600] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   36.512544] page dumped because: kasan: bad access detected
[   36.513261] 
[   36.513703] Memory state around the buggy address:
[   36.514372]  fff00000c591a000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   36.515359]  fff00000c591a080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   36.516259] >fff00000c591a100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   36.517187]                                      ^
[   36.517849]  fff00000c591a180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.518789]  fff00000c591a200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.519699] ==================================================================
[   36.833761] ==================================================================
[   36.834837] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xdd4/0x4858
[   36.837066] Read of size 8 at addr fff00000c591a130 by task kunit_try_catch/254
[   36.837833] 
[   36.838243] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241126 #1
[   36.839310] Tainted: [B]=BAD_PAGE, [N]=TEST
[   36.839997] Hardware name: linux,dummy-virt (DT)
[   36.840721] Call trace:
[   36.841193]  show_stack+0x20/0x38 (C)
[   36.841869]  dump_stack_lvl+0x8c/0xd0
[   36.842481]  print_report+0x118/0x5e0
[   36.843036]  kasan_report+0xc8/0x118
[   36.843695]  kasan_check_range+0x100/0x1a8
[   36.844415]  __kasan_check_read+0x20/0x30
[   36.845034]  kasan_atomics_helper+0xdd4/0x4858
[   36.845762]  kasan_atomics+0x198/0x2e8
[   36.846388]  kunit_try_run_case+0x14c/0x3d0
[   36.847060]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.847723]  kthread+0x24c/0x2d0
[   36.848251]  ret_from_fork+0x10/0x20
[   36.848754] 
[   36.849143] Allocated by task 254:
[   36.849684]  kasan_save_stack+0x3c/0x68
[   36.850325]  kasan_save_track+0x20/0x40
[   36.850836]  kasan_save_alloc_info+0x40/0x58
[   36.851522]  __kasan_kmalloc+0xd4/0xd8
[   36.852116]  __kmalloc_cache_noprof+0x15c/0x3c8
[   36.852793]  kasan_atomics+0xb8/0x2e8
[   36.853411]  kunit_try_run_case+0x14c/0x3d0
[   36.853967]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.854674]  kthread+0x24c/0x2d0
[   36.855262]  ret_from_fork+0x10/0x20
[   36.855810] 
[   36.856172] The buggy address belongs to the object at fff00000c591a100
[   36.856172]  which belongs to the cache kmalloc-64 of size 64
[   36.857341] The buggy address is located 0 bytes to the right of
[   36.857341]  allocated 48-byte region [fff00000c591a100, fff00000c591a130)
[   36.858617] 
[   36.859013] The buggy address belongs to the physical page:
[   36.859676] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10591a
[   36.860677] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   36.861339] page_type: f5(slab)
[   36.861784] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   36.862787] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   36.863745] page dumped because: kasan: bad access detected
[   36.864399] 
[   36.864771] Memory state around the buggy address:
[   36.865329]  fff00000c591a000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   36.866124]  fff00000c591a080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   36.866986] >fff00000c591a100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   36.867775]                                      ^
[   36.868477]  fff00000c591a180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.869183]  fff00000c591a200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.869839] ==================================================================
[   37.855558] ==================================================================
[   37.856964] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x175c/0x4858
[   37.857487] Write of size 8 at addr fff00000c591a130 by task kunit_try_catch/254
[   37.857874] 
[   37.858082] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241126 #1
[   37.858584] Tainted: [B]=BAD_PAGE, [N]=TEST
[   37.858830] Hardware name: linux,dummy-virt (DT)
[   37.859921] Call trace:
[   37.860397]  show_stack+0x20/0x38 (C)
[   37.861132]  dump_stack_lvl+0x8c/0xd0
[   37.861856]  print_report+0x118/0x5e0
[   37.862672]  kasan_report+0xc8/0x118
[   37.863448]  kasan_check_range+0x100/0x1a8
[   37.864153]  __kasan_check_write+0x20/0x30
[   37.864842]  kasan_atomics_helper+0x175c/0x4858
[   37.865621]  kasan_atomics+0x198/0x2e8
[   37.866204]  kunit_try_run_case+0x14c/0x3d0
[   37.866953]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.867661]  kthread+0x24c/0x2d0
[   37.868301]  ret_from_fork+0x10/0x20
[   37.868928] 
[   37.869337] Allocated by task 254:
[   37.869819]  kasan_save_stack+0x3c/0x68
[   37.870508]  kasan_save_track+0x20/0x40
[   37.871126]  kasan_save_alloc_info+0x40/0x58
[   37.871801]  __kasan_kmalloc+0xd4/0xd8
[   37.872407]  __kmalloc_cache_noprof+0x15c/0x3c8
[   37.873060]  kasan_atomics+0xb8/0x2e8
[   37.873654]  kunit_try_run_case+0x14c/0x3d0
[   37.874361]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.875128]  kthread+0x24c/0x2d0
[   37.875677]  ret_from_fork+0x10/0x20
[   37.876333] 
[   37.876727] The buggy address belongs to the object at fff00000c591a100
[   37.876727]  which belongs to the cache kmalloc-64 of size 64
[   37.877968] The buggy address is located 0 bytes to the right of
[   37.877968]  allocated 48-byte region [fff00000c591a100, fff00000c591a130)
[   37.879322] 
[   37.879777] The buggy address belongs to the physical page:
[   37.880422] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10591a
[   37.881367] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   37.882267] page_type: f5(slab)
[   37.882877] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   37.883780] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   37.884663] page dumped because: kasan: bad access detected
[   37.885399] 
[   37.885773] Memory state around the buggy address:
[   37.886356]  fff00000c591a000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   37.887294]  fff00000c591a080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   37.888185] >fff00000c591a100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   37.889018]                                      ^
[   37.889647]  fff00000c591a180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.890509]  fff00000c591a200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.891358] ==================================================================
[   36.282305] ==================================================================
[   36.283113] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x934/0x4858
[   36.284828] Write of size 4 at addr fff00000c591a130 by task kunit_try_catch/254
[   36.285775] 
[   36.286082] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241126 #1
[   36.287240] Tainted: [B]=BAD_PAGE, [N]=TEST
[   36.287846] Hardware name: linux,dummy-virt (DT)
[   36.288455] Call trace:
[   36.288817]  show_stack+0x20/0x38 (C)
[   36.289473]  dump_stack_lvl+0x8c/0xd0
[   36.290021]  print_report+0x118/0x5e0
[   36.290675]  kasan_report+0xc8/0x118
[   36.291273]  kasan_check_range+0x100/0x1a8
[   36.291871]  __kasan_check_write+0x20/0x30
[   36.292574]  kasan_atomics_helper+0x934/0x4858
[   36.293232]  kasan_atomics+0x198/0x2e8
[   36.293841]  kunit_try_run_case+0x14c/0x3d0
[   36.294405]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.295231]  kthread+0x24c/0x2d0
[   36.295823]  ret_from_fork+0x10/0x20
[   36.296392] 
[   36.296750] Allocated by task 254:
[   36.297274]  kasan_save_stack+0x3c/0x68
[   36.297895]  kasan_save_track+0x20/0x40
[   36.298421]  kasan_save_alloc_info+0x40/0x58
[   36.299125]  __kasan_kmalloc+0xd4/0xd8
[   36.299648]  __kmalloc_cache_noprof+0x15c/0x3c8
[   36.300346]  kasan_atomics+0xb8/0x2e8
[   36.300848]  kunit_try_run_case+0x14c/0x3d0
[   36.301511]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.302292]  kthread+0x24c/0x2d0
[   36.302856]  ret_from_fork+0x10/0x20
[   36.303423] 
[   36.303788] The buggy address belongs to the object at fff00000c591a100
[   36.303788]  which belongs to the cache kmalloc-64 of size 64
[   36.305002] The buggy address is located 0 bytes to the right of
[   36.305002]  allocated 48-byte region [fff00000c591a100, fff00000c591a130)
[   36.306288] 
[   36.306664] The buggy address belongs to the physical page:
[   36.307404] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10591a
[   36.308150] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   36.309029] page_type: f5(slab)
[   36.309602] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   36.310387] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   36.311354] page dumped because: kasan: bad access detected
[   36.312006] 
[   36.312366] Memory state around the buggy address:
[   36.313056]  fff00000c591a000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   36.313772]  fff00000c591a080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   36.314587] >fff00000c591a100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   36.315439]                                      ^
[   36.316084]  fff00000c591a180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.316892]  fff00000c591a200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.317686] ==================================================================
[   35.974850] ==================================================================
[   35.975541] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x5b4/0x4858
[   35.977669] Write of size 4 at addr fff00000c591a130 by task kunit_try_catch/254
[   35.978608] 
[   35.979001] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241126 #1
[   35.980130] Tainted: [B]=BAD_PAGE, [N]=TEST
[   35.980693] Hardware name: linux,dummy-virt (DT)
[   35.981696] Call trace:
[   35.982168]  show_stack+0x20/0x38 (C)
[   35.982744]  dump_stack_lvl+0x8c/0xd0
[   35.983361]  print_report+0x118/0x5e0
[   35.984025]  kasan_report+0xc8/0x118
[   35.984580]  kasan_check_range+0x100/0x1a8
[   35.985264]  __kasan_check_write+0x20/0x30
[   35.986004]  kasan_atomics_helper+0x5b4/0x4858
[   35.986680]  kasan_atomics+0x198/0x2e8
[   35.987264]  kunit_try_run_case+0x14c/0x3d0
[   35.988013]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.988810]  kthread+0x24c/0x2d0
[   35.989489]  ret_from_fork+0x10/0x20
[   35.990143] 
[   35.990526] Allocated by task 254:
[   35.991042]  kasan_save_stack+0x3c/0x68
[   35.991583]  kasan_save_track+0x20/0x40
[   35.992243]  kasan_save_alloc_info+0x40/0x58
[   35.992782]  __kasan_kmalloc+0xd4/0xd8
[   35.993414]  __kmalloc_cache_noprof+0x15c/0x3c8
[   35.994040]  kasan_atomics+0xb8/0x2e8
[   35.994558]  kunit_try_run_case+0x14c/0x3d0
[   35.995227]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.996010]  kthread+0x24c/0x2d0
[   35.996563]  ret_from_fork+0x10/0x20
[   35.997053] 
[   35.997414] The buggy address belongs to the object at fff00000c591a100
[   35.997414]  which belongs to the cache kmalloc-64 of size 64
[   35.998623] The buggy address is located 0 bytes to the right of
[   35.998623]  allocated 48-byte region [fff00000c591a100, fff00000c591a130)
[   35.999872] 
[   36.000266] The buggy address belongs to the physical page:
[   36.000933] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10591a
[   36.001851] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   36.002594] page_type: f5(slab)
[   36.003180] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   36.004019] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   36.004932] page dumped because: kasan: bad access detected
[   36.005627] 
[   36.005974] Memory state around the buggy address:
[   36.006666]  fff00000c591a000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   36.007438]  fff00000c591a080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   36.008287] >fff00000c591a100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   36.009055]                                      ^
[   36.009695]  fff00000c591a180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.010488]  fff00000c591a200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.011260] ==================================================================
[   36.355768] ==================================================================
[   36.356827] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa04/0x4858
[   36.357831] Write of size 4 at addr fff00000c591a130 by task kunit_try_catch/254
[   36.359009] 
[   36.359861] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241126 #1
[   36.360817] Tainted: [B]=BAD_PAGE, [N]=TEST
[   36.361442] Hardware name: linux,dummy-virt (DT)
[   36.361978] Call trace:
[   36.362438]  show_stack+0x20/0x38 (C)
[   36.363086]  dump_stack_lvl+0x8c/0xd0
[   36.363732]  print_report+0x118/0x5e0
[   36.364308]  kasan_report+0xc8/0x118
[   36.364972]  kasan_check_range+0x100/0x1a8
[   36.365630]  __kasan_check_write+0x20/0x30
[   36.366281]  kasan_atomics_helper+0xa04/0x4858
[   36.367020]  kasan_atomics+0x198/0x2e8
[   36.367658]  kunit_try_run_case+0x14c/0x3d0
[   36.368346]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.369074]  kthread+0x24c/0x2d0
[   36.369561]  ret_from_fork+0x10/0x20
[   36.370217] 
[   36.370594] Allocated by task 254:
[   36.371132]  kasan_save_stack+0x3c/0x68
[   36.371751]  kasan_save_track+0x20/0x40
[   36.372382]  kasan_save_alloc_info+0x40/0x58
[   36.373008]  __kasan_kmalloc+0xd4/0xd8
[   36.373604]  __kmalloc_cache_noprof+0x15c/0x3c8
[   36.374264]  kasan_atomics+0xb8/0x2e8
[   36.374809]  kunit_try_run_case+0x14c/0x3d0
[   36.375502]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.376244]  kthread+0x24c/0x2d0
[   36.376810]  ret_from_fork+0x10/0x20
[   36.377350] 
[   36.377711] The buggy address belongs to the object at fff00000c591a100
[   36.377711]  which belongs to the cache kmalloc-64 of size 64
[   36.378856] The buggy address is located 0 bytes to the right of
[   36.378856]  allocated 48-byte region [fff00000c591a100, fff00000c591a130)
[   36.380072] 
[   36.380447] The buggy address belongs to the physical page:
[   36.381191] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10591a
[   36.381956] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   36.382842] page_type: f5(slab)
[   36.383421] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   36.384405] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   36.385219] page dumped because: kasan: bad access detected
[   36.385777] 
[   36.386158] Memory state around the buggy address:
[   36.386846]  fff00000c591a000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   36.387676]  fff00000c591a080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   36.388479] >fff00000c591a100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   36.389254]                                      ^
[   36.389764]  fff00000c591a180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.390705]  fff00000c591a200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.391445] ==================================================================
[   37.437382] ==================================================================
[   37.438056] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f04/0x4858
[   37.439396] Read of size 8 at addr fff00000c591a130 by task kunit_try_catch/254
[   37.440690] 
[   37.441101] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241126 #1
[   37.442379] Tainted: [B]=BAD_PAGE, [N]=TEST
[   37.442925] Hardware name: linux,dummy-virt (DT)
[   37.443579] Call trace:
[   37.444024]  show_stack+0x20/0x38 (C)
[   37.444702]  dump_stack_lvl+0x8c/0xd0
[   37.445377]  print_report+0x118/0x5e0
[   37.446034]  kasan_report+0xc8/0x118
[   37.446515]  __asan_report_load8_noabort+0x20/0x30
[   37.447104]  kasan_atomics_helper+0x3f04/0x4858
[   37.447792]  kasan_atomics+0x198/0x2e8
[   37.448300]  kunit_try_run_case+0x14c/0x3d0
[   37.449015]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.449652]  kthread+0x24c/0x2d0
[   37.450257]  ret_from_fork+0x10/0x20
[   37.450853] 
[   37.451243] Allocated by task 254:
[   37.451791]  kasan_save_stack+0x3c/0x68
[   37.452364]  kasan_save_track+0x20/0x40
[   37.453001]  kasan_save_alloc_info+0x40/0x58
[   37.453594]  __kasan_kmalloc+0xd4/0xd8
[   37.454155]  __kmalloc_cache_noprof+0x15c/0x3c8
[   37.454847]  kasan_atomics+0xb8/0x2e8
[   37.455382]  kunit_try_run_case+0x14c/0x3d0
[   37.456044]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.456689]  kthread+0x24c/0x2d0
[   37.457272]  ret_from_fork+0x10/0x20
[   37.457807] 
[   37.458202] The buggy address belongs to the object at fff00000c591a100
[   37.458202]  which belongs to the cache kmalloc-64 of size 64
[   37.459343] The buggy address is located 0 bytes to the right of
[   37.459343]  allocated 48-byte region [fff00000c591a100, fff00000c591a130)
[   37.460662] 
[   37.461049] The buggy address belongs to the physical page:
[   37.461740] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10591a
[   37.462746] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   37.463567] page_type: f5(slab)
[   37.464148] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   37.464952] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   37.465864] page dumped because: kasan: bad access detected
[   37.466505] 
[   37.466882] Memory state around the buggy address:
[   37.467569]  fff00000c591a000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   37.468449]  fff00000c591a080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   37.469260] >fff00000c591a100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   37.470065]                                      ^
[   37.470660]  fff00000c591a180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.471432]  fff00000c591a200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.472419] ==================================================================
[   37.400694] ==================================================================
[   37.401409] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1384/0x4858
[   37.402392] Write of size 8 at addr fff00000c591a130 by task kunit_try_catch/254
[   37.403760] 
[   37.404132] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241126 #1
[   37.405178] Tainted: [B]=BAD_PAGE, [N]=TEST
[   37.405822] Hardware name: linux,dummy-virt (DT)
[   37.406468] Call trace:
[   37.406868]  show_stack+0x20/0x38 (C)
[   37.407532]  dump_stack_lvl+0x8c/0xd0
[   37.408097]  print_report+0x118/0x5e0
[   37.408728]  kasan_report+0xc8/0x118
[   37.409307]  kasan_check_range+0x100/0x1a8
[   37.409943]  __kasan_check_write+0x20/0x30
[   37.410630]  kasan_atomics_helper+0x1384/0x4858
[   37.411365]  kasan_atomics+0x198/0x2e8
[   37.412016]  kunit_try_run_case+0x14c/0x3d0
[   37.412594]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.413371]  kthread+0x24c/0x2d0
[   37.413995]  ret_from_fork+0x10/0x20
[   37.414640] 
[   37.415033] Allocated by task 254:
[   37.415538]  kasan_save_stack+0x3c/0x68
[   37.416121]  kasan_save_track+0x20/0x40
[   37.416658]  kasan_save_alloc_info+0x40/0x58
[   37.417330]  __kasan_kmalloc+0xd4/0xd8
[   37.417875]  __kmalloc_cache_noprof+0x15c/0x3c8
[   37.418497]  kasan_atomics+0xb8/0x2e8
[   37.419105]  kunit_try_run_case+0x14c/0x3d0
[   37.419767]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.420513]  kthread+0x24c/0x2d0
[   37.420999]  ret_from_fork+0x10/0x20
[   37.421583] 
[   37.421981] The buggy address belongs to the object at fff00000c591a100
[   37.421981]  which belongs to the cache kmalloc-64 of size 64
[   37.423154] The buggy address is located 0 bytes to the right of
[   37.423154]  allocated 48-byte region [fff00000c591a100, fff00000c591a130)
[   37.424385] 
[   37.424757] The buggy address belongs to the physical page:
[   37.425399] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10591a
[   37.426377] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   37.427096] page_type: f5(slab)
[   37.427653] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   37.428609] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   37.429417] page dumped because: kasan: bad access detected
[   37.430101] 
[   37.430473] Memory state around the buggy address:
[   37.431027]  fff00000c591a000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   37.431877]  fff00000c591a080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   37.432708] >fff00000c591a100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   37.433488]                                      ^
[   37.434124]  fff00000c591a180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.434942]  fff00000c591a200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.435748] ==================================================================
[   36.870671] ==================================================================
[   36.871625] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f58/0x4858
[   36.872635] Read of size 8 at addr fff00000c591a130 by task kunit_try_catch/254
[   36.873620] 
[   36.874084] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241126 #1
[   36.875409] Tainted: [B]=BAD_PAGE, [N]=TEST
[   36.876042] Hardware name: linux,dummy-virt (DT)
[   36.876734] Call trace:
[   36.877243]  show_stack+0x20/0x38 (C)
[   36.877943]  dump_stack_lvl+0x8c/0xd0
[   36.878634]  print_report+0x118/0x5e0
[   36.879188]  kasan_report+0xc8/0x118
[   36.879878]  __asan_report_load8_noabort+0x20/0x30
[   36.880632]  kasan_atomics_helper+0x3f58/0x4858
[   36.881395]  kasan_atomics+0x198/0x2e8
[   36.882122]  kunit_try_run_case+0x14c/0x3d0
[   36.882794]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.883551]  kthread+0x24c/0x2d0
[   36.884125]  ret_from_fork+0x10/0x20
[   36.884789] 
[   36.885191] Allocated by task 254:
[   36.885744]  kasan_save_stack+0x3c/0x68
[   36.886317]  kasan_save_track+0x20/0x40
[   36.887053]  kasan_save_alloc_info+0x40/0x58
[   36.887584]  __kasan_kmalloc+0xd4/0xd8
[   36.888220]  __kmalloc_cache_noprof+0x15c/0x3c8
[   36.888925]  kasan_atomics+0xb8/0x2e8
[   36.889417]  kunit_try_run_case+0x14c/0x3d0
[   36.890096]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.890744]  kthread+0x24c/0x2d0
[   36.891337]  ret_from_fork+0x10/0x20
[   36.891872] 
[   36.892252] The buggy address belongs to the object at fff00000c591a100
[   36.892252]  which belongs to the cache kmalloc-64 of size 64
[   36.893465] The buggy address is located 0 bytes to the right of
[   36.893465]  allocated 48-byte region [fff00000c591a100, fff00000c591a130)
[   36.894710] 
[   36.895101] The buggy address belongs to the physical page:
[   36.895700] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10591a
[   36.896701] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   36.897580] page_type: f5(slab)
[   36.898137] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   36.899076] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   36.900257] page dumped because: kasan: bad access detected
[   36.900997] 
[   36.901528] Memory state around the buggy address:
[   36.902137]  fff00000c591a000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   36.902938]  fff00000c591a080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   36.903819] >fff00000c591a100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   36.904638]                                      ^
[   36.905325]  fff00000c591a180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.906091]  fff00000c591a200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.906885] ==================================================================
[   35.898403] ==================================================================
[   35.900113] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4e4/0x4858
[   35.901150] Write of size 4 at addr fff00000c591a130 by task kunit_try_catch/254
[   35.901971] 
[   35.902519] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241126 #1
[   35.903954] Tainted: [B]=BAD_PAGE, [N]=TEST
[   35.904653] Hardware name: linux,dummy-virt (DT)
[   35.905455] Call trace:
[   35.905932]  show_stack+0x20/0x38 (C)
[   35.906488]  dump_stack_lvl+0x8c/0xd0
[   35.907097]  print_report+0x118/0x5e0
[   35.907670]  kasan_report+0xc8/0x118
[   35.908239]  kasan_check_range+0x100/0x1a8
[   35.908929]  __kasan_check_write+0x20/0x30
[   35.909531]  kasan_atomics_helper+0x4e4/0x4858
[   35.910143]  kasan_atomics+0x198/0x2e8
[   35.910785]  kunit_try_run_case+0x14c/0x3d0
[   35.911824]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.912568]  kthread+0x24c/0x2d0
[   35.913126]  ret_from_fork+0x10/0x20
[   35.913768] 
[   35.914163] Allocated by task 254:
[   35.914588]  kasan_save_stack+0x3c/0x68
[   35.915230]  kasan_save_track+0x20/0x40
[   35.915806]  kasan_save_alloc_info+0x40/0x58
[   35.916489]  __kasan_kmalloc+0xd4/0xd8
[   35.917006]  __kmalloc_cache_noprof+0x15c/0x3c8
[   35.917685]  kasan_atomics+0xb8/0x2e8
[   35.918183]  kunit_try_run_case+0x14c/0x3d0
[   35.918858]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.919648]  kthread+0x24c/0x2d0
[   35.920252]  ret_from_fork+0x10/0x20
[   35.920863] 
[   35.921293] The buggy address belongs to the object at fff00000c591a100
[   35.921293]  which belongs to the cache kmalloc-64 of size 64
[   35.922528] The buggy address is located 0 bytes to the right of
[   35.922528]  allocated 48-byte region [fff00000c591a100, fff00000c591a130)
[   35.923641] 
[   35.924031] The buggy address belongs to the physical page:
[   35.924754] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10591a
[   35.925667] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   35.926493] page_type: f5(slab)
[   35.927065] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   35.927953] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   35.928792] page dumped because: kasan: bad access detected
[   35.929346] 
[   35.929713] Memory state around the buggy address:
[   35.930341]  fff00000c591a000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.931206]  fff00000c591a080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.932048] >fff00000c591a100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   35.932883]                                      ^
[   35.933504]  fff00000c591a180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.934326]  fff00000c591a200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.935157] ==================================================================
[   36.717776] ==================================================================
[   36.719557] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3dd8/0x4858
[   36.720616] Read of size 4 at addr fff00000c591a130 by task kunit_try_catch/254
[   36.721970] 
[   36.722378] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241126 #1
[   36.723662] Tainted: [B]=BAD_PAGE, [N]=TEST
[   36.724204] Hardware name: linux,dummy-virt (DT)
[   36.724769] Call trace:
[   36.725203]  show_stack+0x20/0x38 (C)
[   36.725770]  dump_stack_lvl+0x8c/0xd0
[   36.726480]  print_report+0x118/0x5e0
[   36.727101]  kasan_report+0xc8/0x118
[   36.727787]  __asan_report_load4_noabort+0x20/0x30
[   36.728529]  kasan_atomics_helper+0x3dd8/0x4858
[   36.729158]  kasan_atomics+0x198/0x2e8
[   36.729832]  kunit_try_run_case+0x14c/0x3d0
[   36.730535]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.731377]  kthread+0x24c/0x2d0
[   36.731943]  ret_from_fork+0x10/0x20
[   36.732607] 
[   36.733038] Allocated by task 254:
[   36.733627]  kasan_save_stack+0x3c/0x68
[   36.734249]  kasan_save_track+0x20/0x40
[   36.734839]  kasan_save_alloc_info+0x40/0x58
[   36.735545]  __kasan_kmalloc+0xd4/0xd8
[   36.736136]  __kmalloc_cache_noprof+0x15c/0x3c8
[   36.736838]  kasan_atomics+0xb8/0x2e8
[   36.737506]  kunit_try_run_case+0x14c/0x3d0
[   36.738164]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.738987]  kthread+0x24c/0x2d0
[   36.739550]  ret_from_fork+0x10/0x20
[   36.740213] 
[   36.740580] The buggy address belongs to the object at fff00000c591a100
[   36.740580]  which belongs to the cache kmalloc-64 of size 64
[   36.741967] The buggy address is located 0 bytes to the right of
[   36.741967]  allocated 48-byte region [fff00000c591a100, fff00000c591a130)
[   36.743319] 
[   36.743689] The buggy address belongs to the physical page:
[   36.744463] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10591a
[   36.745420] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   36.746261] page_type: f5(slab)
[   36.746882] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   36.747782] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   36.748776] page dumped because: kasan: bad access detected
[   36.749430] 
[   36.749847] Memory state around the buggy address:
[   36.750581]  fff00000c591a000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   36.751400]  fff00000c591a080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   36.752256] >fff00000c591a100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   36.753129]                                      ^
[   36.753850]  fff00000c591a180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.754730]  fff00000c591a200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.755552] ==================================================================
[   36.201989] ==================================================================
[   36.202724] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x894/0x4858
[   36.203369] Write of size 4 at addr fff00000c591a130 by task kunit_try_catch/254
[   36.204816] 
[   36.205266] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241126 #1
[   36.206654] Tainted: [B]=BAD_PAGE, [N]=TEST
[   36.207319] Hardware name: linux,dummy-virt (DT)
[   36.208008] Call trace:
[   36.208506]  show_stack+0x20/0x38 (C)
[   36.209218]  dump_stack_lvl+0x8c/0xd0
[   36.209921]  print_report+0x118/0x5e0
[   36.210611]  kasan_report+0xc8/0x118
[   36.211298]  kasan_check_range+0x100/0x1a8
[   36.212061]  __kasan_check_write+0x20/0x30
[   36.213063]  kasan_atomics_helper+0x894/0x4858
[   36.213704]  kasan_atomics+0x198/0x2e8
[   36.214267]  kunit_try_run_case+0x14c/0x3d0
[   36.214893]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.215708]  kthread+0x24c/0x2d0
[   36.216355]  ret_from_fork+0x10/0x20
[   36.217055] 
[   36.217426] Allocated by task 254:
[   36.217985]  kasan_save_stack+0x3c/0x68
[   36.218653]  kasan_save_track+0x20/0x40
[   36.219234]  kasan_save_alloc_info+0x40/0x58
[   36.219934]  __kasan_kmalloc+0xd4/0xd8
[   36.220551]  __kmalloc_cache_noprof+0x15c/0x3c8
[   36.221205]  kasan_atomics+0xb8/0x2e8
[   36.221852]  kunit_try_run_case+0x14c/0x3d0
[   36.222576]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.223286]  kthread+0x24c/0x2d0
[   36.223834]  ret_from_fork+0x10/0x20
[   36.224454] 
[   36.224809] The buggy address belongs to the object at fff00000c591a100
[   36.224809]  which belongs to the cache kmalloc-64 of size 64
[   36.226150] The buggy address is located 0 bytes to the right of
[   36.226150]  allocated 48-byte region [fff00000c591a100, fff00000c591a130)
[   36.227537] 
[   36.227933] The buggy address belongs to the physical page:
[   36.228584] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10591a
[   36.229650] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   36.230402] page_type: f5(slab)
[   36.231043] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   36.231928] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   36.232858] page dumped because: kasan: bad access detected
[   36.233567] 
[   36.233983] Memory state around the buggy address:
[   36.234626]  fff00000c591a000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   36.235631]  fff00000c591a080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   36.236441] >fff00000c591a100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   36.237333]                                      ^
[   36.238292]  fff00000c591a180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.239212]  fff00000c591a200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.239790] ==================================================================
[   37.325365] ==================================================================
[   37.326497] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x126c/0x4858
[   37.327856] Write of size 8 at addr fff00000c591a130 by task kunit_try_catch/254
[   37.328810] 
[   37.329270] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241126 #1
[   37.330409] Tainted: [B]=BAD_PAGE, [N]=TEST
[   37.331024] Hardware name: linux,dummy-virt (DT)
[   37.331629] Call trace:
[   37.332144]  show_stack+0x20/0x38 (C)
[   37.332796]  dump_stack_lvl+0x8c/0xd0
[   37.333506]  print_report+0x118/0x5e0
[   37.334129]  kasan_report+0xc8/0x118
[   37.334818]  kasan_check_range+0x100/0x1a8
[   37.335591]  __kasan_check_write+0x20/0x30
[   37.336259]  kasan_atomics_helper+0x126c/0x4858
[   37.336927]  kasan_atomics+0x198/0x2e8
[   37.337602]  kunit_try_run_case+0x14c/0x3d0
[   37.338235]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.339060]  kthread+0x24c/0x2d0
[   37.339581]  ret_from_fork+0x10/0x20
[   37.340213] 
[   37.340523] Allocated by task 254:
[   37.341088]  kasan_save_stack+0x3c/0x68
[   37.341606]  kasan_save_track+0x20/0x40
[   37.342204]  kasan_save_alloc_info+0x40/0x58
[   37.342873]  __kasan_kmalloc+0xd4/0xd8
[   37.343509]  __kmalloc_cache_noprof+0x15c/0x3c8
[   37.344191]  kasan_atomics+0xb8/0x2e8
[   37.344657]  kunit_try_run_case+0x14c/0x3d0
[   37.345218]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.346044]  kthread+0x24c/0x2d0
[   37.346614]  ret_from_fork+0x10/0x20
[   37.347225] 
[   37.347591] The buggy address belongs to the object at fff00000c591a100
[   37.347591]  which belongs to the cache kmalloc-64 of size 64
[   37.348764] The buggy address is located 0 bytes to the right of
[   37.348764]  allocated 48-byte region [fff00000c591a100, fff00000c591a130)
[   37.350001] 
[   37.350365] The buggy address belongs to the physical page:
[   37.351022] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10591a
[   37.351862] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   37.352757] page_type: f5(slab)
[   37.353341] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   37.354288] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   37.355108] page dumped because: kasan: bad access detected
[   37.355682] 
[   37.356076] Memory state around the buggy address:
[   37.356745]  fff00000c591a000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   37.357575]  fff00000c591a080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   37.358373] >fff00000c591a100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   37.359183]                                      ^
[   37.359759]  fff00000c591a180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.360539]  fff00000c591a200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.361356] ==================================================================
[   37.363140] ==================================================================
[   37.364323] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x12d8/0x4858
[   37.365272] Write of size 8 at addr fff00000c591a130 by task kunit_try_catch/254
[   37.366173] 
[   37.366578] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241126 #1
[   37.367779] Tainted: [B]=BAD_PAGE, [N]=TEST
[   37.368417] Hardware name: linux,dummy-virt (DT)
[   37.369084] Call trace:
[   37.369510]  show_stack+0x20/0x38 (C)
[   37.370173]  dump_stack_lvl+0x8c/0xd0
[   37.370817]  print_report+0x118/0x5e0
[   37.371404]  kasan_report+0xc8/0x118
[   37.371980]  kasan_check_range+0x100/0x1a8
[   37.372661]  __kasan_check_write+0x20/0x30
[   37.373250]  kasan_atomics_helper+0x12d8/0x4858
[   37.373964]  kasan_atomics+0x198/0x2e8
[   37.374615]  kunit_try_run_case+0x14c/0x3d0
[   37.375420]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.376078]  kthread+0x24c/0x2d0
[   37.376645]  ret_from_fork+0x10/0x20
[   37.377246] 
[   37.377574] Allocated by task 254:
[   37.378044]  kasan_save_stack+0x3c/0x68
[   37.378666]  kasan_save_track+0x20/0x40
[   37.379272]  kasan_save_alloc_info+0x40/0x58
[   37.379815]  __kasan_kmalloc+0xd4/0xd8
[   37.380452]  __kmalloc_cache_noprof+0x15c/0x3c8
[   37.381028]  kasan_atomics+0xb8/0x2e8
[   37.381636]  kunit_try_run_case+0x14c/0x3d0
[   37.382209]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.382891]  kthread+0x24c/0x2d0
[   37.383479]  ret_from_fork+0x10/0x20
[   37.383981] 
[   37.384357] The buggy address belongs to the object at fff00000c591a100
[   37.384357]  which belongs to the cache kmalloc-64 of size 64
[   37.385610] The buggy address is located 0 bytes to the right of
[   37.385610]  allocated 48-byte region [fff00000c591a100, fff00000c591a130)
[   37.386830] 
[   37.387222] The buggy address belongs to the physical page:
[   37.387946] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10591a
[   37.388705] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   37.389580] page_type: f5(slab)
[   37.390104] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   37.390986] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   37.391821] page dumped because: kasan: bad access detected
[   37.392401] 
[   37.392770] Memory state around the buggy address:
[   37.393389]  fff00000c591a000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   37.394257]  fff00000c591a080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   37.395074] >fff00000c591a100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   37.395876]                                      ^
[   37.396565]  fff00000c591a180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.397294]  fff00000c591a200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.398121] ==================================================================
[   37.550484] ==================================================================
[   37.551285] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x14e4/0x4858
[   37.552293] Write of size 8 at addr fff00000c591a130 by task kunit_try_catch/254
[   37.553268] 
[   37.553732] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241126 #1
[   37.554625] Tainted: [B]=BAD_PAGE, [N]=TEST
[   37.555093] Hardware name: linux,dummy-virt (DT)
[   37.555720] Call trace:
[   37.556233]  show_stack+0x20/0x38 (C)
[   37.557017]  dump_stack_lvl+0x8c/0xd0
[   37.557764]  print_report+0x118/0x5e0
[   37.558488]  kasan_report+0xc8/0x118
[   37.559048]  kasan_check_range+0x100/0x1a8
[   37.559782]  __kasan_check_write+0x20/0x30
[   37.560513]  kasan_atomics_helper+0x14e4/0x4858
[   37.561139]  kasan_atomics+0x198/0x2e8
[   37.561826]  kunit_try_run_case+0x14c/0x3d0
[   37.562464]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.563326]  kthread+0x24c/0x2d0
[   37.563976]  ret_from_fork+0x10/0x20
[   37.564538] 
[   37.564982] Allocated by task 254:
[   37.565507]  kasan_save_stack+0x3c/0x68
[   37.566160]  kasan_save_track+0x20/0x40
[   37.566655]  kasan_save_alloc_info+0x40/0x58
[   37.567368]  __kasan_kmalloc+0xd4/0xd8
[   37.567932]  __kmalloc_cache_noprof+0x15c/0x3c8
[   37.568627]  kasan_atomics+0xb8/0x2e8
[   37.569289]  kunit_try_run_case+0x14c/0x3d0
[   37.569966]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.570758]  kthread+0x24c/0x2d0
[   37.571310]  ret_from_fork+0x10/0x20
[   37.571958] 
[   37.572390] The buggy address belongs to the object at fff00000c591a100
[   37.572390]  which belongs to the cache kmalloc-64 of size 64
[   37.573669] The buggy address is located 0 bytes to the right of
[   37.573669]  allocated 48-byte region [fff00000c591a100, fff00000c591a130)
[   37.575074] 
[   37.575435] The buggy address belongs to the physical page:
[   37.576227] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10591a
[   37.577042] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   37.577952] page_type: f5(slab)
[   37.578520] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   37.579480] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   37.580357] page dumped because: kasan: bad access detected
[   37.581153] 
[   37.581557] Memory state around the buggy address:
[   37.582192]  fff00000c591a000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   37.583035]  fff00000c591a080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   37.583918] >fff00000c591a100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   37.584730]                                      ^
[   37.585354]  fff00000c591a180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.586198]  fff00000c591a200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.587062] ==================================================================
[   37.140727] ==================================================================
[   37.141515] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1058/0x4858
[   37.142303] Write of size 8 at addr fff00000c591a130 by task kunit_try_catch/254
[   37.143114] 
[   37.143508] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241126 #1
[   37.144653] Tainted: [B]=BAD_PAGE, [N]=TEST
[   37.145272] Hardware name: linux,dummy-virt (DT)
[   37.145839] Call trace:
[   37.146314]  show_stack+0x20/0x38 (C)
[   37.146935]  dump_stack_lvl+0x8c/0xd0
[   37.147492]  print_report+0x118/0x5e0
[   37.148060]  kasan_report+0xc8/0x118
[   37.148684]  kasan_check_range+0x100/0x1a8
[   37.149334]  __kasan_check_write+0x20/0x30
[   37.149871]  kasan_atomics_helper+0x1058/0x4858
[   37.150601]  kasan_atomics+0x198/0x2e8
[   37.151180]  kunit_try_run_case+0x14c/0x3d0
[   37.151755]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.152565]  kthread+0x24c/0x2d0
[   37.153115]  ret_from_fork+0x10/0x20
[   37.153707] 
[   37.154097] Allocated by task 254:
[   37.154650]  kasan_save_stack+0x3c/0x68
[   37.155262]  kasan_save_track+0x20/0x40
[   37.155956]  kasan_save_alloc_info+0x40/0x58
[   37.156546]  __kasan_kmalloc+0xd4/0xd8
[   37.157087]  __kmalloc_cache_noprof+0x15c/0x3c8
[   37.157761]  kasan_atomics+0xb8/0x2e8
[   37.158317]  kunit_try_run_case+0x14c/0x3d0
[   37.158992]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.159588]  kthread+0x24c/0x2d0
[   37.160168]  ret_from_fork+0x10/0x20
[   37.160770] 
[   37.161145] The buggy address belongs to the object at fff00000c591a100
[   37.161145]  which belongs to the cache kmalloc-64 of size 64
[   37.162293] The buggy address is located 0 bytes to the right of
[   37.162293]  allocated 48-byte region [fff00000c591a100, fff00000c591a130)
[   37.163338] 
[   37.163712] The buggy address belongs to the physical page:
[   37.164456] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10591a
[   37.165491] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   37.166201] page_type: f5(slab)
[   37.166774] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   37.167734] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   37.168547] page dumped because: kasan: bad access detected
[   37.169245] 
[   37.169588] Memory state around the buggy address:
[   37.170278]  fff00000c591a000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   37.171089]  fff00000c591a080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   37.171896] >fff00000c591a100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   37.172693]                                      ^
[   37.173315]  fff00000c591a180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.174088]  fff00000c591a200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.174950] ==================================================================
[   35.746704] ==================================================================
[   35.747830] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f94/0x4858
[   35.748454] Write of size 4 at addr fff00000c591a130 by task kunit_try_catch/254
[   35.749811] 
[   35.750237] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241126 #1
[   35.751481] Tainted: [B]=BAD_PAGE, [N]=TEST
[   35.751995] Hardware name: linux,dummy-virt (DT)
[   35.753209] Call trace:
[   35.753585]  show_stack+0x20/0x38 (C)
[   35.754087]  dump_stack_lvl+0x8c/0xd0
[   35.754724]  print_report+0x118/0x5e0
[   35.755365]  kasan_report+0xc8/0x118
[   35.756038]  __asan_report_store4_noabort+0x20/0x30
[   35.756787]  kasan_atomics_helper+0x3f94/0x4858
[   35.757525]  kasan_atomics+0x198/0x2e8
[   35.758177]  kunit_try_run_case+0x14c/0x3d0
[   35.758807]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.759595]  kthread+0x24c/0x2d0
[   35.760197]  ret_from_fork+0x10/0x20
[   35.760741] 
[   35.761133] Allocated by task 254:
[   35.761649]  kasan_save_stack+0x3c/0x68
[   35.762301]  kasan_save_track+0x20/0x40
[   35.762874]  kasan_save_alloc_info+0x40/0x58
[   35.763481]  __kasan_kmalloc+0xd4/0xd8
[   35.763975]  __kmalloc_cache_noprof+0x15c/0x3c8
[   35.764664]  kasan_atomics+0xb8/0x2e8
[   35.765230]  kunit_try_run_case+0x14c/0x3d0
[   35.765892]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.766603]  kthread+0x24c/0x2d0
[   35.767058]  ret_from_fork+0x10/0x20
[   35.767664] 
[   35.768053] The buggy address belongs to the object at fff00000c591a100
[   35.768053]  which belongs to the cache kmalloc-64 of size 64
[   35.769336] The buggy address is located 0 bytes to the right of
[   35.769336]  allocated 48-byte region [fff00000c591a100, fff00000c591a130)
[   35.770928] 
[   35.771314] The buggy address belongs to the physical page:
[   35.771950] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10591a
[   35.772797] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   35.773586] page_type: f5(slab)
[   35.774076] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   35.774928] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   35.775805] page dumped because: kasan: bad access detected
[   35.776547] 
[   35.776859] Memory state around the buggy address:
[   35.777532]  fff00000c591a000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.778330]  fff00000c591a080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.779159] >fff00000c591a100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   35.779993]                                      ^
[   35.780604]  fff00000c591a180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.781331]  fff00000c591a200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.782181] ==================================================================
[   37.588828] ==================================================================
[   37.589627] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x154c/0x4858
[   37.590573] Write of size 8 at addr fff00000c591a130 by task kunit_try_catch/254
[   37.591426] 
[   37.591866] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241126 #1
[   37.592857] Tainted: [B]=BAD_PAGE, [N]=TEST
[   37.593521] Hardware name: linux,dummy-virt (DT)
[   37.594219] Call trace:
[   37.594740]  show_stack+0x20/0x38 (C)
[   37.595356]  dump_stack_lvl+0x8c/0xd0
[   37.596043]  print_report+0x118/0x5e0
[   37.596725]  kasan_report+0xc8/0x118
[   37.597354]  kasan_check_range+0x100/0x1a8
[   37.598100]  __kasan_check_write+0x20/0x30
[   37.598762]  kasan_atomics_helper+0x154c/0x4858
[   37.599494]  kasan_atomics+0x198/0x2e8
[   37.600075]  kunit_try_run_case+0x14c/0x3d0
[   37.600808]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.601585]  kthread+0x24c/0x2d0
[   37.602192]  ret_from_fork+0x10/0x20
[   37.602798] 
[   37.603190] Allocated by task 254:
[   37.603776]  kasan_save_stack+0x3c/0x68
[   37.604375]  kasan_save_track+0x20/0x40
[   37.605052]  kasan_save_alloc_info+0x40/0x58
[   37.605605]  __kasan_kmalloc+0xd4/0xd8
[   37.606265]  __kmalloc_cache_noprof+0x15c/0x3c8
[   37.606888]  kasan_atomics+0xb8/0x2e8
[   37.607547]  kunit_try_run_case+0x14c/0x3d0
[   37.608153]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.608923]  kthread+0x24c/0x2d0
[   37.609476]  ret_from_fork+0x10/0x20
[   37.610126] 
[   37.610466] The buggy address belongs to the object at fff00000c591a100
[   37.610466]  which belongs to the cache kmalloc-64 of size 64
[   37.611766] The buggy address is located 0 bytes to the right of
[   37.611766]  allocated 48-byte region [fff00000c591a100, fff00000c591a130)
[   37.613082] 
[   37.613475] The buggy address belongs to the physical page:
[   37.614225] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10591a
[   37.615236] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   37.616021] page_type: f5(slab)
[   37.616624] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   37.617471] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   37.618423] page dumped because: kasan: bad access detected
[   37.619123] 
[   37.619432] Memory state around the buggy address:
[   37.620124]  fff00000c591a000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   37.620815]  fff00000c591a080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   37.621732] >fff00000c591a100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   37.622598]                                      ^
[   37.623289]  fff00000c591a180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.624161]  fff00000c591a200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.624966] ==================================================================
[   37.626813] ==================================================================
[   37.627656] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x15b4/0x4858
[   37.628800] Write of size 8 at addr fff00000c591a130 by task kunit_try_catch/254
[   37.629826] 
[   37.630261] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241126 #1
[   37.631413] Tainted: [B]=BAD_PAGE, [N]=TEST
[   37.632097] Hardware name: linux,dummy-virt (DT)
[   37.632703] Call trace:
[   37.633271]  show_stack+0x20/0x38 (C)
[   37.634014]  dump_stack_lvl+0x8c/0xd0
[   37.634666]  print_report+0x118/0x5e0
[   37.635338]  kasan_report+0xc8/0x118
[   37.635995]  kasan_check_range+0x100/0x1a8
[   37.636765]  __kasan_check_write+0x20/0x30
[   37.637387]  kasan_atomics_helper+0x15b4/0x4858
[   37.638081]  kasan_atomics+0x198/0x2e8
[   37.638728]  kunit_try_run_case+0x14c/0x3d0
[   37.639301]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.640153]  kthread+0x24c/0x2d0
[   37.640808]  ret_from_fork+0x10/0x20
[   37.641508] 
[   37.641885] Allocated by task 254:
[   37.642512]  kasan_save_stack+0x3c/0x68
[   37.643181]  kasan_save_track+0x20/0x40
[   37.643780]  kasan_save_alloc_info+0x40/0x58
[   37.644431]  __kasan_kmalloc+0xd4/0xd8
[   37.645101]  __kmalloc_cache_noprof+0x15c/0x3c8
[   37.645677]  kasan_atomics+0xb8/0x2e8
[   37.646328]  kunit_try_run_case+0x14c/0x3d0
[   37.646945]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.647710]  kthread+0x24c/0x2d0
[   37.648240]  ret_from_fork+0x10/0x20
[   37.648870] 
[   37.649227] The buggy address belongs to the object at fff00000c591a100
[   37.649227]  which belongs to the cache kmalloc-64 of size 64
[   37.650485] The buggy address is located 0 bytes to the right of
[   37.650485]  allocated 48-byte region [fff00000c591a100, fff00000c591a130)
[   37.651815] 
[   37.652179] The buggy address belongs to the physical page:
[   37.652969] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10591a
[   37.653750] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   37.654686] page_type: f5(slab)
[   37.655230] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   37.656154] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   37.657063] page dumped because: kasan: bad access detected
[   37.657730] 
[   37.658137] Memory state around the buggy address:
[   37.658796]  fff00000c591a000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   37.659565]  fff00000c591a080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   37.660461] >fff00000c591a100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   37.661374]                                      ^
[   37.662069]  fff00000c591a180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.662920]  fff00000c591a200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.663729] ==================================================================
[   36.559547] ==================================================================
[   36.560792] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3dbc/0x4858
[   36.562032] Read of size 4 at addr fff00000c591a130 by task kunit_try_catch/254
[   36.563138] 
[   36.563677] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241126 #1
[   36.564798] Tainted: [B]=BAD_PAGE, [N]=TEST
[   36.565201] Hardware name: linux,dummy-virt (DT)
[   36.565838] Call trace:
[   36.566317]  show_stack+0x20/0x38 (C)
[   36.566977]  dump_stack_lvl+0x8c/0xd0
[   36.567611]  print_report+0x118/0x5e0
[   36.568221]  kasan_report+0xc8/0x118
[   36.568874]  __asan_report_load4_noabort+0x20/0x30
[   36.569535]  kasan_atomics_helper+0x3dbc/0x4858
[   36.570300]  kasan_atomics+0x198/0x2e8
[   36.570937]  kunit_try_run_case+0x14c/0x3d0
[   36.571619]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.572435]  kthread+0x24c/0x2d0
[   36.572958]  ret_from_fork+0x10/0x20
[   36.573627] 
[   36.574000] Allocated by task 254:
[   36.574584]  kasan_save_stack+0x3c/0x68
[   36.575241]  kasan_save_track+0x20/0x40
[   36.575924]  kasan_save_alloc_info+0x40/0x58
[   36.576597]  __kasan_kmalloc+0xd4/0xd8
[   36.577201]  __kmalloc_cache_noprof+0x15c/0x3c8
[   36.577945]  kasan_atomics+0xb8/0x2e8
[   36.578560]  kunit_try_run_case+0x14c/0x3d0
[   36.579284]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.580003]  kthread+0x24c/0x2d0
[   36.580621]  ret_from_fork+0x10/0x20
[   36.581099] 
[   36.581483] The buggy address belongs to the object at fff00000c591a100
[   36.581483]  which belongs to the cache kmalloc-64 of size 64
[   36.582699] The buggy address is located 0 bytes to the right of
[   36.582699]  allocated 48-byte region [fff00000c591a100, fff00000c591a130)
[   36.584134] 
[   36.584494] The buggy address belongs to the physical page:
[   36.585265] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10591a
[   36.586207] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   36.587033] page_type: f5(slab)
[   36.587624] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   36.588501] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   36.589433] page dumped because: kasan: bad access detected
[   36.590115] 
[   36.590497] Memory state around the buggy address:
[   36.591231]  fff00000c591a000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   36.592023]  fff00000c591a080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   36.592929] >fff00000c591a100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   36.593744]                                      ^
[   36.594349]  fff00000c591a180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.595263]  fff00000c591a200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.596067] ==================================================================
[   37.743056] ==================================================================
[   37.743721] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3df4/0x4858
[   37.744939] Read of size 8 at addr fff00000c591a130 by task kunit_try_catch/254
[   37.746426] 
[   37.747029] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241126 #1
[   37.748571] Tainted: [B]=BAD_PAGE, [N]=TEST
[   37.749039] Hardware name: linux,dummy-virt (DT)
[   37.749687] Call trace:
[   37.750160]  show_stack+0x20/0x38 (C)
[   37.750690]  dump_stack_lvl+0x8c/0xd0
[   37.751349]  print_report+0x118/0x5e0
[   37.751858]  kasan_report+0xc8/0x118
[   37.752506]  __asan_report_load8_noabort+0x20/0x30
[   37.753272]  kasan_atomics_helper+0x3df4/0x4858
[   37.753981]  kasan_atomics+0x198/0x2e8
[   37.754669]  kunit_try_run_case+0x14c/0x3d0
[   37.755258]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.755958]  kthread+0x24c/0x2d0
[   37.756753]  ret_from_fork+0x10/0x20
[   37.757412] 
[   37.757828] Allocated by task 254:
[   37.758325]  kasan_save_stack+0x3c/0x68
[   37.758965]  kasan_save_track+0x20/0x40
[   37.759664]  kasan_save_alloc_info+0x40/0x58
[   37.760386]  __kasan_kmalloc+0xd4/0xd8
[   37.760876]  __kmalloc_cache_noprof+0x15c/0x3c8
[   37.761850]  kasan_atomics+0xb8/0x2e8
[   37.762573]  kunit_try_run_case+0x14c/0x3d0
[   37.763141]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.763795]  kthread+0x24c/0x2d0
[   37.764408]  ret_from_fork+0x10/0x20
[   37.764922] 
[   37.765289] The buggy address belongs to the object at fff00000c591a100
[   37.765289]  which belongs to the cache kmalloc-64 of size 64
[   37.766419] The buggy address is located 0 bytes to the right of
[   37.766419]  allocated 48-byte region [fff00000c591a100, fff00000c591a130)
[   37.767707] 
[   37.768091] The buggy address belongs to the physical page:
[   37.768755] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10591a
[   37.769659] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   37.770431] page_type: f5(slab)
[   37.771031] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   37.771836] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   37.772791] page dumped because: kasan: bad access detected
[   37.773395] 
[   37.773770] Memory state around the buggy address:
[   37.774461]  fff00000c591a000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   37.775200]  fff00000c591a080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   37.776123] >fff00000c591a100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   37.776938]                                      ^
[   37.777622]  fff00000c591a180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.778407]  fff00000c591a200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.779248] ==================================================================
[   36.086655] ==================================================================
[   36.087521] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x6ec/0x4858
[   36.088952] Write of size 4 at addr fff00000c591a130 by task kunit_try_catch/254
[   36.089753] 
[   36.090175] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241126 #1
[   36.091340] Tainted: [B]=BAD_PAGE, [N]=TEST
[   36.091959] Hardware name: linux,dummy-virt (DT)
[   36.092480] Call trace:
[   36.092962]  show_stack+0x20/0x38 (C)
[   36.093519]  dump_stack_lvl+0x8c/0xd0
[   36.094180]  print_report+0x118/0x5e0
[   36.094827]  kasan_report+0xc8/0x118
[   36.095452]  kasan_check_range+0x100/0x1a8
[   36.096150]  __kasan_check_write+0x20/0x30
[   36.096763]  kasan_atomics_helper+0x6ec/0x4858
[   36.097479]  kasan_atomics+0x198/0x2e8
[   36.098139]  kunit_try_run_case+0x14c/0x3d0
[   36.098700]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.099488]  kthread+0x24c/0x2d0
[   36.100022]  ret_from_fork+0x10/0x20
[   36.100649] 
[   36.101011] Allocated by task 254:
[   36.101557]  kasan_save_stack+0x3c/0x68
[   36.102182]  kasan_save_track+0x20/0x40
[   36.102716]  kasan_save_alloc_info+0x40/0x58
[   36.103395]  __kasan_kmalloc+0xd4/0xd8
[   36.103931]  __kmalloc_cache_noprof+0x15c/0x3c8
[   36.104612]  kasan_atomics+0xb8/0x2e8
[   36.105165]  kunit_try_run_case+0x14c/0x3d0
[   36.105856]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.106488]  kthread+0x24c/0x2d0
[   36.107077]  ret_from_fork+0x10/0x20
[   36.107662] 
[   36.108050] The buggy address belongs to the object at fff00000c591a100
[   36.108050]  which belongs to the cache kmalloc-64 of size 64
[   36.109204] The buggy address is located 0 bytes to the right of
[   36.109204]  allocated 48-byte region [fff00000c591a100, fff00000c591a130)
[   36.110398] 
[   36.110781] The buggy address belongs to the physical page:
[   36.111523] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10591a
[   36.112443] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   36.113204] page_type: f5(slab)
[   36.113697] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   36.114598] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   36.115451] page dumped because: kasan: bad access detected
[   36.116097] 
[   36.116469] Memory state around the buggy address:
[   36.117099]  fff00000c591a000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   36.117877]  fff00000c591a080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   36.118706] >fff00000c591a100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   36.119356]                                      ^
[   36.120048]  fff00000c591a180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.120879]  fff00000c591a200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.121660] ==================================================================
[   35.937926] ==================================================================
[   35.938638] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x54c/0x4858
[   35.939436] Write of size 4 at addr fff00000c591a130 by task kunit_try_catch/254
[   35.940249] 
[   35.941058] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241126 #1
[   35.941963] Tainted: [B]=BAD_PAGE, [N]=TEST
[   35.942592] Hardware name: linux,dummy-virt (DT)
[   35.943118] Call trace:
[   35.943573]  show_stack+0x20/0x38 (C)
[   35.944232]  dump_stack_lvl+0x8c/0xd0
[   35.944888]  print_report+0x118/0x5e0
[   35.945553]  kasan_report+0xc8/0x118
[   35.946106]  kasan_check_range+0x100/0x1a8
[   35.946791]  __kasan_check_write+0x20/0x30
[   35.947460]  kasan_atomics_helper+0x54c/0x4858
[   35.948154]  kasan_atomics+0x198/0x2e8
[   35.948727]  kunit_try_run_case+0x14c/0x3d0
[   35.949361]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.950094]  kthread+0x24c/0x2d0
[   35.950650]  ret_from_fork+0x10/0x20
[   35.951242] 
[   35.951563] Allocated by task 254:
[   35.952135]  kasan_save_stack+0x3c/0x68
[   35.952743]  kasan_save_track+0x20/0x40
[   35.953338]  kasan_save_alloc_info+0x40/0x58
[   35.954022]  __kasan_kmalloc+0xd4/0xd8
[   35.954560]  __kmalloc_cache_noprof+0x15c/0x3c8
[   35.955258]  kasan_atomics+0xb8/0x2e8
[   35.955819]  kunit_try_run_case+0x14c/0x3d0
[   35.956400]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.957192]  kthread+0x24c/0x2d0
[   35.957642]  ret_from_fork+0x10/0x20
[   35.958262] 
[   35.958640] The buggy address belongs to the object at fff00000c591a100
[   35.958640]  which belongs to the cache kmalloc-64 of size 64
[   35.959984] The buggy address is located 0 bytes to the right of
[   35.959984]  allocated 48-byte region [fff00000c591a100, fff00000c591a130)
[   35.961183] 
[   35.961553] The buggy address belongs to the physical page:
[   35.962259] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10591a
[   35.963248] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   35.964091] page_type: f5(slab)
[   35.964641] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   35.965428] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   35.966379] page dumped because: kasan: bad access detected
[   35.966967] 
[   35.967340] Memory state around the buggy address:
[   35.968029]  fff00000c591a000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.968791]  fff00000c591a080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.969606] >fff00000c591a100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   35.970410]                                      ^
[   35.971049]  fff00000c591a180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.971958]  fff00000c591a200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.972848] ==================================================================
[   35.708723] ==================================================================
[   35.709444] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x32c/0x4858
[   35.710238] Write of size 4 at addr fff00000c591a130 by task kunit_try_catch/254
[   35.711152] 
[   35.711596] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241126 #1
[   35.712528] Tainted: [B]=BAD_PAGE, [N]=TEST
[   35.713262] Hardware name: linux,dummy-virt (DT)
[   35.713976] Call trace:
[   35.714460]  show_stack+0x20/0x38 (C)
[   35.715193]  dump_stack_lvl+0x8c/0xd0
[   35.715815]  print_report+0x118/0x5e0
[   35.716531]  kasan_report+0xc8/0x118
[   35.717224]  kasan_check_range+0x100/0x1a8
[   35.717951]  __kasan_check_write+0x20/0x30
[   35.718579]  kasan_atomics_helper+0x32c/0x4858
[   35.719434]  kasan_atomics+0x198/0x2e8
[   35.720126]  kunit_try_run_case+0x14c/0x3d0
[   35.720919]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.721752]  kthread+0x24c/0x2d0
[   35.722324]  ret_from_fork+0x10/0x20
[   35.722970] 
[   35.723308] Allocated by task 254:
[   35.723869]  kasan_save_stack+0x3c/0x68
[   35.724598]  kasan_save_track+0x20/0x40
[   35.725075]  kasan_save_alloc_info+0x40/0x58
[   35.725810]  __kasan_kmalloc+0xd4/0xd8
[   35.726437]  __kmalloc_cache_noprof+0x15c/0x3c8
[   35.727066]  kasan_atomics+0xb8/0x2e8
[   35.727600]  kunit_try_run_case+0x14c/0x3d0
[   35.728218]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.728892]  kthread+0x24c/0x2d0
[   35.729412]  ret_from_fork+0x10/0x20
[   35.729959] 
[   35.730319] The buggy address belongs to the object at fff00000c591a100
[   35.730319]  which belongs to the cache kmalloc-64 of size 64
[   35.731565] The buggy address is located 0 bytes to the right of
[   35.731565]  allocated 48-byte region [fff00000c591a100, fff00000c591a130)
[   35.732772] 
[   35.733159] The buggy address belongs to the physical page:
[   35.733726] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10591a
[   35.734740] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   35.735604] page_type: f5(slab)
[   35.736084] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   35.736993] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   35.737838] page dumped because: kasan: bad access detected
[   35.738475] 
[   35.738848] Memory state around the buggy address:
[   35.739817]  fff00000c591a000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.740598]  fff00000c591a080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.741495] >fff00000c591a100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   35.742346]                                      ^
[   35.742918]  fff00000c591a180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.743776]  fff00000c591a200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.744521] ==================================================================
[   36.319151] ==================================================================
[   36.320537] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x99c/0x4858
[   36.321336] Write of size 4 at addr fff00000c591a130 by task kunit_try_catch/254
[   36.322111] 
[   36.322533] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241126 #1
[   36.323580] Tainted: [B]=BAD_PAGE, [N]=TEST
[   36.324201] Hardware name: linux,dummy-virt (DT)
[   36.324734] Call trace:
[   36.325216]  show_stack+0x20/0x38 (C)
[   36.325771]  dump_stack_lvl+0x8c/0xd0
[   36.326414]  print_report+0x118/0x5e0
[   36.327023]  kasan_report+0xc8/0x118
[   36.327534]  kasan_check_range+0x100/0x1a8
[   36.328201]  __kasan_check_write+0x20/0x30
[   36.328871]  kasan_atomics_helper+0x99c/0x4858
[   36.329484]  kasan_atomics+0x198/0x2e8
[   36.330141]  kunit_try_run_case+0x14c/0x3d0
[   36.330802]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.331489]  kthread+0x24c/0x2d0
[   36.332095]  ret_from_fork+0x10/0x20
[   36.332634] 
[   36.333021] Allocated by task 254:
[   36.333542]  kasan_save_stack+0x3c/0x68
[   36.334174]  kasan_save_track+0x20/0x40
[   36.334732]  kasan_save_alloc_info+0x40/0x58
[   36.335285]  __kasan_kmalloc+0xd4/0xd8
[   36.335893]  __kmalloc_cache_noprof+0x15c/0x3c8
[   36.336503]  kasan_atomics+0xb8/0x2e8
[   36.337068]  kunit_try_run_case+0x14c/0x3d0
[   36.337724]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.338719]  kthread+0x24c/0x2d0
[   36.339292]  ret_from_fork+0x10/0x20
[   36.339849] 
[   36.340198] The buggy address belongs to the object at fff00000c591a100
[   36.340198]  which belongs to the cache kmalloc-64 of size 64
[   36.341326] The buggy address is located 0 bytes to the right of
[   36.341326]  allocated 48-byte region [fff00000c591a100, fff00000c591a130)
[   36.342620] 
[   36.343007] The buggy address belongs to the physical page:
[   36.343631] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10591a
[   36.344455] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   36.345242] page_type: f5(slab)
[   36.345769] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   36.346679] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   36.347532] page dumped because: kasan: bad access detected
[   36.348083] 
[   36.348447] Memory state around the buggy address:
[   36.349149]  fff00000c591a000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   36.349870]  fff00000c591a080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   36.350718] >fff00000c591a100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   36.351507]                                      ^
[   36.352133]  fff00000c591a180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.352956]  fff00000c591a200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.353849] ==================================================================
[   35.627557] ==================================================================
[   35.628278] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x2b0/0x4858
[   35.629097] Read of size 4 at addr fff00000c591a130 by task kunit_try_catch/254
[   35.629799] 
[   35.630231] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241126 #1
[   35.631479] Tainted: [B]=BAD_PAGE, [N]=TEST
[   35.632028] Hardware name: linux,dummy-virt (DT)
[   35.632673] Call trace:
[   35.633141]  show_stack+0x20/0x38 (C)
[   35.633743]  dump_stack_lvl+0x8c/0xd0
[   35.634324]  print_report+0x118/0x5e0
[   35.635015]  kasan_report+0xc8/0x118
[   35.635698]  kasan_check_range+0x100/0x1a8
[   35.636410]  __kasan_check_read+0x20/0x30
[   35.637003]  kasan_atomics_helper+0x2b0/0x4858
[   35.637710]  kasan_atomics+0x198/0x2e8
[   35.638375]  kunit_try_run_case+0x14c/0x3d0
[   35.639034]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.639831]  kthread+0x24c/0x2d0
[   35.640446]  ret_from_fork+0x10/0x20
[   35.641081] 
[   35.641405] Allocated by task 254:
[   35.641979]  kasan_save_stack+0x3c/0x68
[   35.642517]  kasan_save_track+0x20/0x40
[   35.643155]  kasan_save_alloc_info+0x40/0x58
[   35.643742]  __kasan_kmalloc+0xd4/0xd8
[   35.644374]  __kmalloc_cache_noprof+0x15c/0x3c8
[   35.645065]  kasan_atomics+0xb8/0x2e8
[   35.645697]  kunit_try_run_case+0x14c/0x3d0
[   35.646288]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.646966]  kthread+0x24c/0x2d0
[   35.647547]  ret_from_fork+0x10/0x20
[   35.648081] 
[   35.648450] The buggy address belongs to the object at fff00000c591a100
[   35.648450]  which belongs to the cache kmalloc-64 of size 64
[   35.649466] The buggy address is located 0 bytes to the right of
[   35.649466]  allocated 48-byte region [fff00000c591a100, fff00000c591a130)
[   35.650563] 
[   35.650942] The buggy address belongs to the physical page:
[   35.651655] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10591a
[   35.652468] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   35.653348] page_type: f5(slab)
[   35.653833] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   35.654673] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   35.655657] page dumped because: kasan: bad access detected
[   35.656251] 
[   35.656605] Memory state around the buggy address:
[   35.657303]  fff00000c591a000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.657999]  fff00000c591a080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.658930] >fff00000c591a100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   35.659657]                                      ^
[   35.660365]  fff00000c591a180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.661188]  fff00000c591a200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.662083] ==================================================================
[   36.013186] ==================================================================
[   36.013858] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x61c/0x4858
[   36.015517] Write of size 4 at addr fff00000c591a130 by task kunit_try_catch/254
[   36.016407] 
[   36.016844] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241126 #1
[   36.017877] Tainted: [B]=BAD_PAGE, [N]=TEST
[   36.018417] Hardware name: linux,dummy-virt (DT)
[   36.019077] Call trace:
[   36.019531]  show_stack+0x20/0x38 (C)
[   36.020138]  dump_stack_lvl+0x8c/0xd0
[   36.020670]  print_report+0x118/0x5e0
[   36.021200]  kasan_report+0xc8/0x118
[   36.021823]  kasan_check_range+0x100/0x1a8
[   36.022538]  __kasan_check_write+0x20/0x30
[   36.023243]  kasan_atomics_helper+0x61c/0x4858
[   36.023935]  kasan_atomics+0x198/0x2e8
[   36.024495]  kunit_try_run_case+0x14c/0x3d0
[   36.025196]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.026058]  kthread+0x24c/0x2d0
[   36.026649]  ret_from_fork+0x10/0x20
[   36.027240] 
[   36.027577] Allocated by task 254:
[   36.028062]  kasan_save_stack+0x3c/0x68
[   36.028692]  kasan_save_track+0x20/0x40
[   36.029319]  kasan_save_alloc_info+0x40/0x58
[   36.029971]  __kasan_kmalloc+0xd4/0xd8
[   36.030586]  __kmalloc_cache_noprof+0x15c/0x3c8
[   36.031155]  kasan_atomics+0xb8/0x2e8
[   36.031760]  kunit_try_run_case+0x14c/0x3d0
[   36.032374]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.033018]  kthread+0x24c/0x2d0
[   36.033579]  ret_from_fork+0x10/0x20
[   36.034161] 
[   36.034534] The buggy address belongs to the object at fff00000c591a100
[   36.034534]  which belongs to the cache kmalloc-64 of size 64
[   36.035798] The buggy address is located 0 bytes to the right of
[   36.035798]  allocated 48-byte region [fff00000c591a100, fff00000c591a130)
[   36.037211] 
[   36.037530] The buggy address belongs to the physical page:
[   36.038272] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10591a
[   36.039077] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   36.039965] page_type: f5(slab)
[   36.040499] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   36.041295] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   36.042169] page dumped because: kasan: bad access detected
[   36.042758] 
[   36.043142] Memory state around the buggy address:
[   36.043728]  fff00000c591a000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   36.044500]  fff00000c591a080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   36.045291] >fff00000c591a100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   36.046167]                                      ^
[   36.046723]  fff00000c591a180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.047581]  fff00000c591a200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.048327] ==================================================================
[   36.795741] ==================================================================
[   36.797057] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e04/0x4858
[   36.798970] Read of size 4 at addr fff00000c591a130 by task kunit_try_catch/254
[   36.799990] 
[   36.800356] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241126 #1
[   36.801432] Tainted: [B]=BAD_PAGE, [N]=TEST
[   36.802011] Hardware name: linux,dummy-virt (DT)
[   36.802673] Call trace:
[   36.803066]  show_stack+0x20/0x38 (C)
[   36.803701]  dump_stack_lvl+0x8c/0xd0
[   36.804256]  print_report+0x118/0x5e0
[   36.804886]  kasan_report+0xc8/0x118
[   36.805467]  __asan_report_load4_noabort+0x20/0x30
[   36.806174]  kasan_atomics_helper+0x3e04/0x4858
[   36.806885]  kasan_atomics+0x198/0x2e8
[   36.807469]  kunit_try_run_case+0x14c/0x3d0
[   36.808185]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.808985]  kthread+0x24c/0x2d0
[   36.809449]  ret_from_fork+0x10/0x20
[   36.810103] 
[   36.810443] Allocated by task 254:
[   36.810973]  kasan_save_stack+0x3c/0x68
[   36.811601]  kasan_save_track+0x20/0x40
[   36.812256]  kasan_save_alloc_info+0x40/0x58
[   36.812845]  __kasan_kmalloc+0xd4/0xd8
[   36.813492]  __kmalloc_cache_noprof+0x15c/0x3c8
[   36.814033]  kasan_atomics+0xb8/0x2e8
[   36.814643]  kunit_try_run_case+0x14c/0x3d0
[   36.815236]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.815925]  kthread+0x24c/0x2d0
[   36.816448]  ret_from_fork+0x10/0x20
[   36.817063] 
[   36.817415] The buggy address belongs to the object at fff00000c591a100
[   36.817415]  which belongs to the cache kmalloc-64 of size 64
[   36.818671] The buggy address is located 0 bytes to the right of
[   36.818671]  allocated 48-byte region [fff00000c591a100, fff00000c591a130)
[   36.819972] 
[   36.820338] The buggy address belongs to the physical page:
[   36.821032] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10591a
[   36.821988] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   36.822655] page_type: f5(slab)
[   36.823180] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   36.824085] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   36.824965] page dumped because: kasan: bad access detected
[   36.825591] 
[   36.825978] Memory state around the buggy address:
[   36.826528]  fff00000c591a000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   36.827402]  fff00000c591a080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   36.828134] >fff00000c591a100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   36.828934]                                      ^
[   36.829619]  fff00000c591a180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.830411]  fff00000c591a200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.831334] ==================================================================
[   37.250566] ==================================================================
[   37.251430] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1190/0x4858
[   37.252259] Write of size 8 at addr fff00000c591a130 by task kunit_try_catch/254
[   37.253074] 
[   37.253556] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241126 #1
[   37.254791] Tainted: [B]=BAD_PAGE, [N]=TEST
[   37.255353] Hardware name: linux,dummy-virt (DT)
[   37.255977] Call trace:
[   37.256435]  show_stack+0x20/0x38 (C)
[   37.257108]  dump_stack_lvl+0x8c/0xd0
[   37.257690]  print_report+0x118/0x5e0
[   37.258355]  kasan_report+0xc8/0x118
[   37.259021]  kasan_check_range+0x100/0x1a8
[   37.259603]  __kasan_check_write+0x20/0x30
[   37.260301]  kasan_atomics_helper+0x1190/0x4858
[   37.260973]  kasan_atomics+0x198/0x2e8
[   37.261467]  kunit_try_run_case+0x14c/0x3d0
[   37.262169]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.262811]  kthread+0x24c/0x2d0
[   37.263438]  ret_from_fork+0x10/0x20
[   37.264091] 
[   37.264441] Allocated by task 254:
[   37.264937]  kasan_save_stack+0x3c/0x68
[   37.265596]  kasan_save_track+0x20/0x40
[   37.266121]  kasan_save_alloc_info+0x40/0x58
[   37.266766]  __kasan_kmalloc+0xd4/0xd8
[   37.267400]  __kmalloc_cache_noprof+0x15c/0x3c8
[   37.268070]  kasan_atomics+0xb8/0x2e8
[   37.268604]  kunit_try_run_case+0x14c/0x3d0
[   37.269243]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.270024]  kthread+0x24c/0x2d0
[   37.270558]  ret_from_fork+0x10/0x20
[   37.271175] 
[   37.271520] The buggy address belongs to the object at fff00000c591a100
[   37.271520]  which belongs to the cache kmalloc-64 of size 64
[   37.272661] The buggy address is located 0 bytes to the right of
[   37.272661]  allocated 48-byte region [fff00000c591a100, fff00000c591a130)
[   37.273885] 
[   37.274271] The buggy address belongs to the physical page:
[   37.275013] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10591a
[   37.275963] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   37.276679] page_type: f5(slab)
[   37.277263] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   37.278077] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   37.279018] page dumped because: kasan: bad access detected
[   37.279653] 
[   37.280005] Memory state around the buggy address:
[   37.280692]  fff00000c591a000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   37.281475]  fff00000c591a080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   37.282340] >fff00000c591a100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   37.283153]                                      ^
[   37.283833]  fff00000c591a180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.284623]  fff00000c591a200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.285540] ==================================================================
[   35.501167] ==================================================================
[   35.501977] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f7c/0x4858
[   35.502850] Write of size 4 at addr fff00000c591a130 by task kunit_try_catch/254
[   35.504350] 
[   35.504920] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241126 #1
[   35.506260] Tainted: [B]=BAD_PAGE, [N]=TEST
[   35.507054] Hardware name: linux,dummy-virt (DT)
[   35.507868] Call trace:
[   35.508514]  show_stack+0x20/0x38 (C)
[   35.509277]  dump_stack_lvl+0x8c/0xd0
[   35.510135]  print_report+0x118/0x5e0
[   35.510944]  kasan_report+0xc8/0x118
[   35.511712]  __asan_report_store4_noabort+0x20/0x30
[   35.512601]  kasan_atomics_helper+0x3f7c/0x4858
[   35.513431]  kasan_atomics+0x198/0x2e8
[   35.514224]  kunit_try_run_case+0x14c/0x3d0
[   35.515085]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.515741]  kthread+0x24c/0x2d0
[   35.516235]  ret_from_fork+0x10/0x20
[   35.516746] 
[   35.517112] Allocated by task 254:
[   35.518131]  kasan_save_stack+0x3c/0x68
[   35.518741]  kasan_save_track+0x20/0x40
[   35.519645]  kasan_save_alloc_info+0x40/0x58
[   35.520276]  __kasan_kmalloc+0xd4/0xd8
[   35.521097]  __kmalloc_cache_noprof+0x15c/0x3c8
[   35.521929]  kasan_atomics+0xb8/0x2e8
[   35.522680]  kunit_try_run_case+0x14c/0x3d0
[   35.523343]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.524358]  kthread+0x24c/0x2d0
[   35.525056]  ret_from_fork+0x10/0x20
[   35.525811] 
[   35.526181] The buggy address belongs to the object at fff00000c591a100
[   35.526181]  which belongs to the cache kmalloc-64 of size 64
[   35.527657] The buggy address is located 0 bytes to the right of
[   35.527657]  allocated 48-byte region [fff00000c591a100, fff00000c591a130)
[   35.529172] 
[   35.529771] The buggy address belongs to the physical page:
[   35.530467] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10591a
[   35.531644] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   35.532457] page_type: f5(slab)
[   35.533285] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   35.534369] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   35.535402] page dumped because: kasan: bad access detected
[   35.536264] 
[   35.536786] Memory state around the buggy address:
[   35.537401]  fff00000c591a000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.538522]  fff00000c591a080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.539368] >fff00000c591a100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   35.540433]                                      ^
[   35.541240]  fff00000c591a180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.542257]  fff00000c591a200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.543293] ==================================================================
[   37.780804] ==================================================================
[   37.781603] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x16d0/0x4858
[   37.782381] Write of size 8 at addr fff00000c591a130 by task kunit_try_catch/254
[   37.783627] 
[   37.783998] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241126 #1
[   37.784995] Tainted: [B]=BAD_PAGE, [N]=TEST
[   37.785643] Hardware name: linux,dummy-virt (DT)
[   37.786257] Call trace:
[   37.786711]  show_stack+0x20/0x38 (C)
[   37.787266]  dump_stack_lvl+0x8c/0xd0
[   37.787934]  print_report+0x118/0x5e0
[   37.788531]  kasan_report+0xc8/0x118
[   37.789104]  kasan_check_range+0x100/0x1a8
[   37.789713]  __kasan_check_write+0x20/0x30
[   37.790270]  kasan_atomics_helper+0x16d0/0x4858
[   37.791012]  kasan_atomics+0x198/0x2e8
[   37.791572]  kunit_try_run_case+0x14c/0x3d0
[   37.792282]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.792968]  kthread+0x24c/0x2d0
[   37.793545]  ret_from_fork+0x10/0x20
[   37.794196] 
[   37.794558] Allocated by task 254:
[   37.795008]  kasan_save_stack+0x3c/0x68
[   37.795676]  kasan_save_track+0x20/0x40
[   37.796197]  kasan_save_alloc_info+0x40/0x58
[   37.796856]  __kasan_kmalloc+0xd4/0xd8
[   37.797486]  __kmalloc_cache_noprof+0x15c/0x3c8
[   37.798078]  kasan_atomics+0xb8/0x2e8
[   37.798692]  kunit_try_run_case+0x14c/0x3d0
[   37.799317]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.799882]  kthread+0x24c/0x2d0
[   37.800468]  ret_from_fork+0x10/0x20
[   37.801036] 
[   37.801409] The buggy address belongs to the object at fff00000c591a100
[   37.801409]  which belongs to the cache kmalloc-64 of size 64
[   37.802585] The buggy address is located 0 bytes to the right of
[   37.802585]  allocated 48-byte region [fff00000c591a100, fff00000c591a130)
[   37.803861] 
[   37.804257] The buggy address belongs to the physical page:
[   37.805002] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10591a
[   37.805934] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   37.806736] page_type: f5(slab)
[   37.807316] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   37.808039] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   37.808990] page dumped because: kasan: bad access detected
[   37.809719] 
[   37.810057] Memory state around the buggy address:
[   37.810740]  fff00000c591a000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   37.811509]  fff00000c591a080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   37.812299] >fff00000c591a100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   37.813150]                                      ^
[   37.813719]  fff00000c591a180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.814566]  fff00000c591a200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.815375] ==================================================================
[   36.676038] ==================================================================
[   36.676700] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xca0/0x4858
[   36.677738] Write of size 4 at addr fff00000c591a130 by task kunit_try_catch/254
[   36.678657] 
[   36.679068] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241126 #1
[   36.680388] Tainted: [B]=BAD_PAGE, [N]=TEST
[   36.681060] Hardware name: linux,dummy-virt (DT)
[   36.681765] Call trace:
[   36.682219]  show_stack+0x20/0x38 (C)
[   36.682864]  dump_stack_lvl+0x8c/0xd0
[   36.683562]  print_report+0x118/0x5e0
[   36.684209]  kasan_report+0xc8/0x118
[   36.684794]  kasan_check_range+0x100/0x1a8
[   36.685514]  __kasan_check_write+0x20/0x30
[   36.686140]  kasan_atomics_helper+0xca0/0x4858
[   36.686896]  kasan_atomics+0x198/0x2e8
[   36.687553]  kunit_try_run_case+0x14c/0x3d0
[   36.688234]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.689092]  kthread+0x24c/0x2d0
[   36.689647]  ret_from_fork+0x10/0x20
[   36.690325] 
[   36.690732] Allocated by task 254:
[   36.691336]  kasan_save_stack+0x3c/0x68
[   36.691889]  kasan_save_track+0x20/0x40
[   36.692561]  kasan_save_alloc_info+0x40/0x58
[   36.693218]  __kasan_kmalloc+0xd4/0xd8
[   36.693866]  __kmalloc_cache_noprof+0x15c/0x3c8
[   36.694766]  kasan_atomics+0xb8/0x2e8
[   36.695316]  kunit_try_run_case+0x14c/0x3d0
[   36.695882]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.696930]  kthread+0x24c/0x2d0
[   36.697633]  ret_from_fork+0x10/0x20
[   36.698393] 
[   36.698997] The buggy address belongs to the object at fff00000c591a100
[   36.698997]  which belongs to the cache kmalloc-64 of size 64
[   36.700284] The buggy address is located 0 bytes to the right of
[   36.700284]  allocated 48-byte region [fff00000c591a100, fff00000c591a130)
[   36.701707] 
[   36.702323] The buggy address belongs to the physical page:
[   36.702984] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10591a
[   36.703858] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   36.704993] page_type: f5(slab)
[   36.705718] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   36.706799] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   36.707821] page dumped because: kasan: bad access detected
[   36.708672] 
[   36.709022] Memory state around the buggy address:
[   36.709682]  fff00000c591a000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   36.710482]  fff00000c591a080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   36.711668] >fff00000c591a100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   36.712664]                                      ^
[   36.713479]  fff00000c591a180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.714470]  fff00000c591a200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.715428] ==================================================================
[   36.639006] ==================================================================
[   36.639721] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3de4/0x4858
[   36.640731] Read of size 4 at addr fff00000c591a130 by task kunit_try_catch/254
[   36.641545] 
[   36.641830] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241126 #1
[   36.642878] Tainted: [B]=BAD_PAGE, [N]=TEST
[   36.643443] Hardware name: linux,dummy-virt (DT)
[   36.644158] Call trace:
[   36.644650]  show_stack+0x20/0x38 (C)
[   36.645248]  dump_stack_lvl+0x8c/0xd0
[   36.645944]  print_report+0x118/0x5e0
[   36.646553]  kasan_report+0xc8/0x118
[   36.647224]  __asan_report_load4_noabort+0x20/0x30
[   36.648014]  kasan_atomics_helper+0x3de4/0x4858
[   36.648684]  kasan_atomics+0x198/0x2e8
[   36.649396]  kunit_try_run_case+0x14c/0x3d0
[   36.649986]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.650830]  kthread+0x24c/0x2d0
[   36.651430]  ret_from_fork+0x10/0x20
[   36.652122] 
[   36.652498] Allocated by task 254:
[   36.652987]  kasan_save_stack+0x3c/0x68
[   36.653661]  kasan_save_track+0x20/0x40
[   36.654313]  kasan_save_alloc_info+0x40/0x58
[   36.655021]  __kasan_kmalloc+0xd4/0xd8
[   36.655653]  __kmalloc_cache_noprof+0x15c/0x3c8
[   36.656289]  kasan_atomics+0xb8/0x2e8
[   36.656959]  kunit_try_run_case+0x14c/0x3d0
[   36.657610]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.658338]  kthread+0x24c/0x2d0
[   36.658963]  ret_from_fork+0x10/0x20
[   36.659493] 
[   36.659863] The buggy address belongs to the object at fff00000c591a100
[   36.659863]  which belongs to the cache kmalloc-64 of size 64
[   36.661170] The buggy address is located 0 bytes to the right of
[   36.661170]  allocated 48-byte region [fff00000c591a100, fff00000c591a130)
[   36.662493] 
[   36.662880] The buggy address belongs to the physical page:
[   36.663504] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10591a
[   36.664480] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   36.665365] page_type: f5(slab)
[   36.665840] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   36.666830] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   36.667709] page dumped because: kasan: bad access detected
[   36.668418] 
[   36.668764] Memory state around the buggy address:
[   36.669417]  fff00000c591a000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   36.670290]  fff00000c591a080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   36.671180] >fff00000c591a100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   36.672003]                                      ^
[   36.672655]  fff00000c591a180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.673492]  fff00000c591a200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.674310] ==================================================================
[   36.946594] ==================================================================
[   36.948226] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e5c/0x4858
[   36.949467] Write of size 8 at addr fff00000c591a130 by task kunit_try_catch/254
[   36.950350] 
[   36.950771] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241126 #1
[   36.951694] Tainted: [B]=BAD_PAGE, [N]=TEST
[   36.952314] Hardware name: linux,dummy-virt (DT)
[   36.952988] Call trace:
[   36.953380]  show_stack+0x20/0x38 (C)
[   36.953942]  dump_stack_lvl+0x8c/0xd0
[   36.954577]  print_report+0x118/0x5e0
[   36.955154]  kasan_report+0xc8/0x118
[   36.955709]  __asan_report_store8_noabort+0x20/0x30
[   36.956338]  kasan_atomics_helper+0x3e5c/0x4858
[   36.957054]  kasan_atomics+0x198/0x2e8
[   36.957585]  kunit_try_run_case+0x14c/0x3d0
[   36.958244]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.959070]  kthread+0x24c/0x2d0
[   36.959668]  ret_from_fork+0x10/0x20
[   36.960318] 
[   36.960656] Allocated by task 254:
[   36.961486]  kasan_save_stack+0x3c/0x68
[   36.962335]  kasan_save_track+0x20/0x40
[   36.962846]  kasan_save_alloc_info+0x40/0x58
[   36.963583]  __kasan_kmalloc+0xd4/0xd8
[   36.964138]  __kmalloc_cache_noprof+0x15c/0x3c8
[   36.964751]  kasan_atomics+0xb8/0x2e8
[   36.965791]  kunit_try_run_case+0x14c/0x3d0
[   36.966623]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.967514]  kthread+0x24c/0x2d0
[   36.968210]  ret_from_fork+0x10/0x20
[   36.968965] 
[   36.969486] The buggy address belongs to the object at fff00000c591a100
[   36.969486]  which belongs to the cache kmalloc-64 of size 64
[   36.970848] The buggy address is located 0 bytes to the right of
[   36.970848]  allocated 48-byte region [fff00000c591a100, fff00000c591a130)
[   36.972291] 
[   36.972650] The buggy address belongs to the physical page:
[   36.973392] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10591a
[   36.974696] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   36.975638] page_type: f5(slab)
[   36.976386] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   36.977449] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   36.978485] page dumped because: kasan: bad access detected
[   36.979347] 
[   36.979857] Memory state around the buggy address:
[   36.980625]  fff00000c591a000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   36.981468]  fff00000c591a080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   36.982274] >fff00000c591a100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   36.983370]                                      ^
[   36.983816]  fff00000c591a180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.984860]  fff00000c591a200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.985653] ==================================================================
[   35.664183] ==================================================================
[   35.665174] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x40fc/0x4858
[   35.665975] Read of size 4 at addr fff00000c591a130 by task kunit_try_catch/254
[   35.666848] 
[   35.668602] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241126 #1
[   35.669665] Tainted: [B]=BAD_PAGE, [N]=TEST
[   35.670233] Hardware name: linux,dummy-virt (DT)
[   35.670868] Call trace:
[   35.671253]  show_stack+0x20/0x38 (C)
[   35.671875]  dump_stack_lvl+0x8c/0xd0
[   35.672418]  print_report+0x118/0x5e0
[   35.673045]  kasan_report+0xc8/0x118
[   35.673576]  __asan_report_load4_noabort+0x20/0x30
[   35.674263]  kasan_atomics_helper+0x40fc/0x4858
[   35.675600]  kasan_atomics+0x198/0x2e8
[   35.676523]  kunit_try_run_case+0x14c/0x3d0
[   35.677235]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.677838]  kthread+0x24c/0x2d0
[   35.678984]  ret_from_fork+0x10/0x20
[   35.679771] 
[   35.680299] Allocated by task 254:
[   35.680839]  kasan_save_stack+0x3c/0x68
[   35.681692]  kasan_save_track+0x20/0x40
[   35.682301]  kasan_save_alloc_info+0x40/0x58
[   35.683189]  __kasan_kmalloc+0xd4/0xd8
[   35.683962]  __kmalloc_cache_noprof+0x15c/0x3c8
[   35.684613]  kasan_atomics+0xb8/0x2e8
[   35.685433]  kunit_try_run_case+0x14c/0x3d0
[   35.686095]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.687063]  kthread+0x24c/0x2d0
[   35.687778]  ret_from_fork+0x10/0x20
[   35.688554] 
[   35.688925] The buggy address belongs to the object at fff00000c591a100
[   35.688925]  which belongs to the cache kmalloc-64 of size 64
[   35.690523] The buggy address is located 0 bytes to the right of
[   35.690523]  allocated 48-byte region [fff00000c591a100, fff00000c591a130)
[   35.691822] 
[   35.692362] The buggy address belongs to the physical page:
[   35.693121] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10591a
[   35.694079] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   35.694818] page_type: f5(slab)
[   35.695467] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   35.696570] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   35.697461] page dumped because: kasan: bad access detected
[   35.698141] 
[   35.698551] Memory state around the buggy address:
[   35.699147]  fff00000c591a000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.699976]  fff00000c591a080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.700878] >fff00000c591a100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   35.701717]                                      ^
[   35.702324]  fff00000c591a180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.703107]  fff00000c591a200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.703873] ==================================================================
[   37.287506] ==================================================================
[   37.288850] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x11f8/0x4858
[   37.289710] Write of size 8 at addr fff00000c591a130 by task kunit_try_catch/254
[   37.291393] 
[   37.291842] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241126 #1
[   37.293031] Tainted: [B]=BAD_PAGE, [N]=TEST
[   37.293590] Hardware name: linux,dummy-virt (DT)
[   37.294297] Call trace:
[   37.294806]  show_stack+0x20/0x38 (C)
[   37.295482]  dump_stack_lvl+0x8c/0xd0
[   37.296186]  print_report+0x118/0x5e0
[   37.296868]  kasan_report+0xc8/0x118
[   37.297550]  kasan_check_range+0x100/0x1a8
[   37.298262]  __kasan_check_write+0x20/0x30
[   37.298968]  kasan_atomics_helper+0x11f8/0x4858
[   37.299620]  kasan_atomics+0x198/0x2e8
[   37.300285]  kunit_try_run_case+0x14c/0x3d0
[   37.300994]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.301680]  kthread+0x24c/0x2d0
[   37.302197]  ret_from_fork+0x10/0x20
[   37.302842] 
[   37.303220] Allocated by task 254:
[   37.303714]  kasan_save_stack+0x3c/0x68
[   37.304241]  kasan_save_track+0x20/0x40
[   37.304856]  kasan_save_alloc_info+0x40/0x58
[   37.305469]  __kasan_kmalloc+0xd4/0xd8
[   37.306097]  __kmalloc_cache_noprof+0x15c/0x3c8
[   37.306654]  kasan_atomics+0xb8/0x2e8
[   37.307270]  kunit_try_run_case+0x14c/0x3d0
[   37.307869]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.308513]  kthread+0x24c/0x2d0
[   37.309097]  ret_from_fork+0x10/0x20
[   37.309576] 
[   37.309966] The buggy address belongs to the object at fff00000c591a100
[   37.309966]  which belongs to the cache kmalloc-64 of size 64
[   37.311108] The buggy address is located 0 bytes to the right of
[   37.311108]  allocated 48-byte region [fff00000c591a100, fff00000c591a130)
[   37.312391] 
[   37.312760] The buggy address belongs to the physical page:
[   37.313937] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10591a
[   37.314840] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   37.315866] page_type: f5(slab)
[   37.316430] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   37.316831] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   37.317535] page dumped because: kasan: bad access detected
[   37.318227] 
[   37.318547] Memory state around the buggy address:
[   37.319235]  fff00000c591a000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   37.320162]  fff00000c591a080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   37.320925] >fff00000c591a100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   37.321701]                                      ^
[   37.322265]  fff00000c591a180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.323080]  fff00000c591a200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.323924] ==================================================================
[   36.909302] ==================================================================
[   36.910076] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xe44/0x4858
[   36.910797] Write of size 8 at addr fff00000c591a130 by task kunit_try_catch/254
[   36.911638] 
[   36.912029] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241126 #1
[   36.913120] Tainted: [B]=BAD_PAGE, [N]=TEST
[   36.913726] Hardware name: linux,dummy-virt (DT)
[   36.914403] Call trace:
[   36.914826]  show_stack+0x20/0x38 (C)
[   36.915490]  dump_stack_lvl+0x8c/0xd0
[   36.916084]  print_report+0x118/0x5e0
[   36.916694]  kasan_report+0xc8/0x118
[   36.917342]  kasan_check_range+0x100/0x1a8
[   36.918023]  __kasan_check_write+0x20/0x30
[   36.918710]  kasan_atomics_helper+0xe44/0x4858
[   36.919362]  kasan_atomics+0x198/0x2e8
[   36.920028]  kunit_try_run_case+0x14c/0x3d0
[   36.920633]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.921464]  kthread+0x24c/0x2d0
[   36.922082]  ret_from_fork+0x10/0x20
[   36.922647] 
[   36.923035] Allocated by task 254:
[   36.923569]  kasan_save_stack+0x3c/0x68
[   36.924191]  kasan_save_track+0x20/0x40
[   36.924711]  kasan_save_alloc_info+0x40/0x58
[   36.925392]  __kasan_kmalloc+0xd4/0xd8
[   36.925962]  __kmalloc_cache_noprof+0x15c/0x3c8
[   36.926551]  kasan_atomics+0xb8/0x2e8
[   36.927189]  kunit_try_run_case+0x14c/0x3d0
[   36.927785]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.928471]  kthread+0x24c/0x2d0
[   36.929055]  ret_from_fork+0x10/0x20
[   36.929541] 
[   36.930265] The buggy address belongs to the object at fff00000c591a100
[   36.930265]  which belongs to the cache kmalloc-64 of size 64
[   36.931685] The buggy address is located 0 bytes to the right of
[   36.931685]  allocated 48-byte region [fff00000c591a100, fff00000c591a130)
[   36.933588] 
[   36.933978] The buggy address belongs to the physical page:
[   36.934572] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10591a
[   36.935488] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   36.936227] page_type: f5(slab)
[   36.936785] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   36.937627] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   36.938531] page dumped because: kasan: bad access detected
[   36.939263] 
[   36.939633] Memory state around the buggy address:
[   36.940275]  fff00000c591a000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   36.941068]  fff00000c591a080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   36.941806] >fff00000c591a100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   36.942650]                                      ^
[   36.943269]  fff00000c591a180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.944020]  fff00000c591a200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.944823] ==================================================================

[   36.417095] ==================================================================
[   36.418032] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa04/0x4858
[   36.418925] Write of size 4 at addr fff00000c5f10130 by task kunit_try_catch/254
[   36.419830] 
[   36.420221] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241126 #1
[   36.421501] Tainted: [B]=BAD_PAGE, [N]=TEST
[   36.421985] Hardware name: linux,dummy-virt (DT)
[   36.422677] Call trace:
[   36.423088]  show_stack+0x20/0x38 (C)
[   36.423667]  dump_stack_lvl+0x8c/0xd0
[   36.424340]  print_report+0x118/0x5e0
[   36.424893]  kasan_report+0xc8/0x118
[   36.425544]  kasan_check_range+0x100/0x1a8
[   36.426138]  __kasan_check_write+0x20/0x30
[   36.426744]  kasan_atomics_helper+0xa04/0x4858
[   36.427468]  kasan_atomics+0x198/0x2e8
[   36.428082]  kunit_try_run_case+0x14c/0x3d0
[   36.428787]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.429600]  kthread+0x24c/0x2d0
[   36.430208]  ret_from_fork+0x10/0x20
[   36.430803] 
[   36.431178] Allocated by task 254:
[   36.431742]  kasan_save_stack+0x3c/0x68
[   36.432317]  kasan_save_track+0x20/0x40
[   36.432862]  kasan_save_alloc_info+0x40/0x58
[   36.433561]  __kasan_kmalloc+0xd4/0xd8
[   36.434182]  __kmalloc_cache_noprof+0x15c/0x3c8
[   36.434749]  kasan_atomics+0xb8/0x2e8
[   36.435370]  kunit_try_run_case+0x14c/0x3d0
[   36.436305]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.437011]  kthread+0x24c/0x2d0
[   36.437518]  ret_from_fork+0x10/0x20
[   36.438072] 
[   36.438442] The buggy address belongs to the object at fff00000c5f10100
[   36.438442]  which belongs to the cache kmalloc-64 of size 64
[   36.439621] The buggy address is located 0 bytes to the right of
[   36.439621]  allocated 48-byte region [fff00000c5f10100, fff00000c5f10130)
[   36.440970] 
[   36.441356] The buggy address belongs to the physical page:
[   36.442010] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105f10
[   36.442944] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   36.443744] page_type: f5(slab)
[   36.444333] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   36.445207] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   36.446029] page dumped because: kasan: bad access detected
[   36.446770] 
[   36.447140] Memory state around the buggy address:
[   36.447853]  fff00000c5f10000: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   36.448667]  fff00000c5f10080: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   36.449568] >fff00000c5f10100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   36.450253]                                      ^
[   36.450967]  fff00000c5f10180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.451767]  fff00000c5f10200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.452660] ==================================================================
[   37.575032] ==================================================================
[   37.575720] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1414/0x4858
[   37.576592] Write of size 8 at addr fff00000c5f10130 by task kunit_try_catch/254
[   37.577512] 
[   37.577984] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241126 #1
[   37.579030] Tainted: [B]=BAD_PAGE, [N]=TEST
[   37.579677] Hardware name: linux,dummy-virt (DT)
[   37.580207] Call trace:
[   37.580777]  show_stack+0x20/0x38 (C)
[   37.581885]  dump_stack_lvl+0x8c/0xd0
[   37.582591]  print_report+0x118/0x5e0
[   37.583103]  kasan_report+0xc8/0x118
[   37.583769]  kasan_check_range+0x100/0x1a8
[   37.584376]  __kasan_check_write+0x20/0x30
[   37.585078]  kasan_atomics_helper+0x1414/0x4858
[   37.585738]  kasan_atomics+0x198/0x2e8
[   37.586374]  kunit_try_run_case+0x14c/0x3d0
[   37.586979]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.587802]  kthread+0x24c/0x2d0
[   37.588408]  ret_from_fork+0x10/0x20
[   37.588995] 
[   37.589351] Allocated by task 254:
[   37.589938]  kasan_save_stack+0x3c/0x68
[   37.590469]  kasan_save_track+0x20/0x40
[   37.591135]  kasan_save_alloc_info+0x40/0x58
[   37.591749]  __kasan_kmalloc+0xd4/0xd8
[   37.592251]  __kmalloc_cache_noprof+0x15c/0x3c8
[   37.592975]  kasan_atomics+0xb8/0x2e8
[   37.593486]  kunit_try_run_case+0x14c/0x3d0
[   37.594170]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.594843]  kthread+0x24c/0x2d0
[   37.595419]  ret_from_fork+0x10/0x20
[   37.595979] 
[   37.596360] The buggy address belongs to the object at fff00000c5f10100
[   37.596360]  which belongs to the cache kmalloc-64 of size 64
[   37.597556] The buggy address is located 0 bytes to the right of
[   37.597556]  allocated 48-byte region [fff00000c5f10100, fff00000c5f10130)
[   37.598895] 
[   37.599314] The buggy address belongs to the physical page:
[   37.600306] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105f10
[   37.601146] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   37.601979] page_type: f5(slab)
[   37.602571] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   37.603399] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   37.604286] page dumped because: kasan: bad access detected
[   37.605002] 
[   37.605375] Memory state around the buggy address:
[   37.606037]  fff00000c5f10000: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   37.606994]  fff00000c5f10080: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   37.607741] >fff00000c5f10100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   37.608676]                                      ^
[   37.609295]  fff00000c5f10180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.610131]  fff00000c5f10200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.610955] ==================================================================
[   36.301031] ==================================================================
[   36.303034] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x42d8/0x4858
[   36.303860] Read of size 4 at addr fff00000c5f10130 by task kunit_try_catch/254
[   36.304687] 
[   36.305087] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241126 #1
[   36.306181] Tainted: [B]=BAD_PAGE, [N]=TEST
[   36.306819] Hardware name: linux,dummy-virt (DT)
[   36.307418] Call trace:
[   36.307853]  show_stack+0x20/0x38 (C)
[   36.308425]  dump_stack_lvl+0x8c/0xd0
[   36.309123]  print_report+0x118/0x5e0
[   36.309718]  kasan_report+0xc8/0x118
[   36.310238]  __asan_report_load4_noabort+0x20/0x30
[   36.311014]  kasan_atomics_helper+0x42d8/0x4858
[   36.311758]  kasan_atomics+0x198/0x2e8
[   36.312338]  kunit_try_run_case+0x14c/0x3d0
[   36.313053]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.313847]  kthread+0x24c/0x2d0
[   36.314365]  ret_from_fork+0x10/0x20
[   36.315022] 
[   36.315339] Allocated by task 254:
[   36.315918]  kasan_save_stack+0x3c/0x68
[   36.316591]  kasan_save_track+0x20/0x40
[   36.317095]  kasan_save_alloc_info+0x40/0x58
[   36.317794]  __kasan_kmalloc+0xd4/0xd8
[   36.318416]  __kmalloc_cache_noprof+0x15c/0x3c8
[   36.318960]  kasan_atomics+0xb8/0x2e8
[   36.319640]  kunit_try_run_case+0x14c/0x3d0
[   36.320331]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.320988]  kthread+0x24c/0x2d0
[   36.321597]  ret_from_fork+0x10/0x20
[   36.322212] 
[   36.322608] The buggy address belongs to the object at fff00000c5f10100
[   36.322608]  which belongs to the cache kmalloc-64 of size 64
[   36.323893] The buggy address is located 0 bytes to the right of
[   36.323893]  allocated 48-byte region [fff00000c5f10100, fff00000c5f10130)
[   36.325171] 
[   36.325573] The buggy address belongs to the physical page:
[   36.326259] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105f10
[   36.327246] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   36.328112] page_type: f5(slab)
[   36.328707] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   36.329619] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   36.330461] page dumped because: kasan: bad access detected
[   36.331052] 
[   36.331475] Memory state around the buggy address:
[   36.332147]  fff00000c5f10000: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   36.332967]  fff00000c5f10080: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   36.333832] >fff00000c5f10100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   36.334659]                                      ^
[   36.335256]  fff00000c5f10180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.336067]  fff00000c5f10200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.336932] ==================================================================
[   37.918835] ==================================================================
[   37.920195] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e10/0x4858
[   37.921224] Read of size 8 at addr fff00000c5f10130 by task kunit_try_catch/254
[   37.923002] 
[   37.923504] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241126 #1
[   37.924805] Tainted: [B]=BAD_PAGE, [N]=TEST
[   37.925339] Hardware name: linux,dummy-virt (DT)
[   37.925920] Call trace:
[   37.926329]  show_stack+0x20/0x38 (C)
[   37.926892]  dump_stack_lvl+0x8c/0xd0
[   37.927399]  print_report+0x118/0x5e0
[   37.928138]  kasan_report+0xc8/0x118
[   37.928841]  __asan_report_load8_noabort+0x20/0x30
[   37.929769]  kasan_atomics_helper+0x3e10/0x4858
[   37.930586]  kasan_atomics+0x198/0x2e8
[   37.931272]  kunit_try_run_case+0x14c/0x3d0
[   37.931971]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.932841]  kthread+0x24c/0x2d0
[   37.933423]  ret_from_fork+0x10/0x20
[   37.934117] 
[   37.934549] Allocated by task 254:
[   37.934985]  kasan_save_stack+0x3c/0x68
[   37.935686]  kasan_save_track+0x20/0x40
[   37.936300]  kasan_save_alloc_info+0x40/0x58
[   37.937059]  __kasan_kmalloc+0xd4/0xd8
[   37.937763]  __kmalloc_cache_noprof+0x15c/0x3c8
[   37.938429]  kasan_atomics+0xb8/0x2e8
[   37.939136]  kunit_try_run_case+0x14c/0x3d0
[   37.939874]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.940628]  kthread+0x24c/0x2d0
[   37.941184]  ret_from_fork+0x10/0x20
[   37.941861] 
[   37.942278] The buggy address belongs to the object at fff00000c5f10100
[   37.942278]  which belongs to the cache kmalloc-64 of size 64
[   37.943590] The buggy address is located 0 bytes to the right of
[   37.943590]  allocated 48-byte region [fff00000c5f10100, fff00000c5f10130)
[   37.945001] 
[   37.945424] The buggy address belongs to the physical page:
[   37.946100] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105f10
[   37.947115] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   37.947998] page_type: f5(slab)
[   37.948514] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   37.949607] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   37.950455] page dumped because: kasan: bad access detected
[   37.951215] 
[   37.951649] Memory state around the buggy address:
[   37.952362]  fff00000c5f10000: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   37.953223]  fff00000c5f10080: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   37.954199] >fff00000c5f10100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   37.955018]                                      ^
[   37.955754]  fff00000c5f10180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.956591]  fff00000c5f10200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.957559] ==================================================================
[   35.822962] ==================================================================
[   35.823788] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3ac/0x4858
[   35.824566] Write of size 4 at addr fff00000c5f10130 by task kunit_try_catch/254
[   35.825497] 
[   35.825956] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241126 #1
[   35.826918] Tainted: [B]=BAD_PAGE, [N]=TEST
[   35.827556] Hardware name: linux,dummy-virt (DT)
[   35.828236] Call trace:
[   35.828698]  show_stack+0x20/0x38 (C)
[   35.829276]  dump_stack_lvl+0x8c/0xd0
[   35.829943]  print_report+0x118/0x5e0
[   35.830555]  kasan_report+0xc8/0x118
[   35.831193]  kasan_check_range+0x100/0x1a8
[   35.832181]  __kasan_check_write+0x20/0x30
[   35.832507]  kasan_atomics_helper+0x3ac/0x4858
[   35.832834]  kasan_atomics+0x198/0x2e8
[   35.833103]  kunit_try_run_case+0x14c/0x3d0
[   35.833385]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.834612]  kthread+0x24c/0x2d0
[   35.835725]  ret_from_fork+0x10/0x20
[   35.836475] 
[   35.836882] Allocated by task 254:
[   35.837841]  kasan_save_stack+0x3c/0x68
[   35.838866]  kasan_save_track+0x20/0x40
[   35.839668]  kasan_save_alloc_info+0x40/0x58
[   35.840290]  __kasan_kmalloc+0xd4/0xd8
[   35.840965]  __kmalloc_cache_noprof+0x15c/0x3c8
[   35.841658]  kasan_atomics+0xb8/0x2e8
[   35.842173]  kunit_try_run_case+0x14c/0x3d0
[   35.842775]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.843403]  kthread+0x24c/0x2d0
[   35.844013]  ret_from_fork+0x10/0x20
[   35.844669] 
[   35.845043] The buggy address belongs to the object at fff00000c5f10100
[   35.845043]  which belongs to the cache kmalloc-64 of size 64
[   35.846464] The buggy address is located 0 bytes to the right of
[   35.846464]  allocated 48-byte region [fff00000c5f10100, fff00000c5f10130)
[   35.847850] 
[   35.848152] The buggy address belongs to the physical page:
[   35.848938] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105f10
[   35.849786] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   35.850637] page_type: f5(slab)
[   35.851108] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   35.852177] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   35.853183] page dumped because: kasan: bad access detected
[   35.853895] 
[   35.854277] Memory state around the buggy address:
[   35.854889]  fff00000c5f10000: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   35.855866]  fff00000c5f10080: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   35.856771] >fff00000c5f10100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   35.857726]                                      ^
[   35.858247]  fff00000c5f10180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.859209]  fff00000c5f10200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.860187] ==================================================================
[   36.966061] ==================================================================
[   36.966704] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f58/0x4858
[   36.967669] Read of size 8 at addr fff00000c5f10130 by task kunit_try_catch/254
[   36.968679] 
[   36.969079] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241126 #1
[   36.970108] Tainted: [B]=BAD_PAGE, [N]=TEST
[   36.970784] Hardware name: linux,dummy-virt (DT)
[   36.971468] Call trace:
[   36.971964]  show_stack+0x20/0x38 (C)
[   36.972637]  dump_stack_lvl+0x8c/0xd0
[   36.973271]  print_report+0x118/0x5e0
[   36.973809]  kasan_report+0xc8/0x118
[   36.974432]  __asan_report_load8_noabort+0x20/0x30
[   36.975128]  kasan_atomics_helper+0x3f58/0x4858
[   36.975738]  kasan_atomics+0x198/0x2e8
[   36.976397]  kunit_try_run_case+0x14c/0x3d0
[   36.976981]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.977717]  kthread+0x24c/0x2d0
[   36.978311]  ret_from_fork+0x10/0x20
[   36.978966] 
[   36.979331] Allocated by task 254:
[   36.979917]  kasan_save_stack+0x3c/0x68
[   36.980583]  kasan_save_track+0x20/0x40
[   36.981219]  kasan_save_alloc_info+0x40/0x58
[   36.981880]  __kasan_kmalloc+0xd4/0xd8
[   36.982499]  __kmalloc_cache_noprof+0x15c/0x3c8
[   36.983181]  kasan_atomics+0xb8/0x2e8
[   36.983817]  kunit_try_run_case+0x14c/0x3d0
[   36.984388]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.985200]  kthread+0x24c/0x2d0
[   36.985809]  ret_from_fork+0x10/0x20
[   36.986316] 
[   36.986708] The buggy address belongs to the object at fff00000c5f10100
[   36.986708]  which belongs to the cache kmalloc-64 of size 64
[   36.987957] The buggy address is located 0 bytes to the right of
[   36.987957]  allocated 48-byte region [fff00000c5f10100, fff00000c5f10130)
[   36.989269] 
[   36.989663] The buggy address belongs to the physical page:
[   36.990424] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105f10
[   36.991235] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   36.992130] page_type: f5(slab)
[   36.992738] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   36.993611] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   36.994456] page dumped because: kasan: bad access detected
[   36.995247] 
[   36.995652] Memory state around the buggy address:
[   36.996212]  fff00000c5f10000: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   36.997150]  fff00000c5f10080: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   36.997986] >fff00000c5f10100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   36.998834]                                      ^
[   36.999568]  fff00000c5f10180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.000413]  fff00000c5f10200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.001244] ==================================================================
[   38.036895] ==================================================================
[   38.038396] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x17ec/0x4858
[   38.039194] Write of size 8 at addr fff00000c5f10130 by task kunit_try_catch/254
[   38.041174] 
[   38.041566] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241126 #1
[   38.042701] Tainted: [B]=BAD_PAGE, [N]=TEST
[   38.043319] Hardware name: linux,dummy-virt (DT)
[   38.043946] Call trace:
[   38.044370]  show_stack+0x20/0x38 (C)
[   38.044990]  dump_stack_lvl+0x8c/0xd0
[   38.045616]  print_report+0x118/0x5e0
[   38.046264]  kasan_report+0xc8/0x118
[   38.046798]  kasan_check_range+0x100/0x1a8
[   38.047486]  __kasan_check_write+0x20/0x30
[   38.048113]  kasan_atomics_helper+0x17ec/0x4858
[   38.048886]  kasan_atomics+0x198/0x2e8
[   38.049559]  kunit_try_run_case+0x14c/0x3d0
[   38.050268]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   38.051003]  kthread+0x24c/0x2d0
[   38.051575]  ret_from_fork+0x10/0x20
[   38.052100] 
[   38.052485] Allocated by task 254:
[   38.053066]  kasan_save_stack+0x3c/0x68
[   38.053720]  kasan_save_track+0x20/0x40
[   38.054283]  kasan_save_alloc_info+0x40/0x58
[   38.054842]  __kasan_kmalloc+0xd4/0xd8
[   38.055474]  __kmalloc_cache_noprof+0x15c/0x3c8
[   38.056103]  kasan_atomics+0xb8/0x2e8
[   38.056701]  kunit_try_run_case+0x14c/0x3d0
[   38.057366]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   38.058168]  kthread+0x24c/0x2d0
[   38.058713]  ret_from_fork+0x10/0x20
[   38.059309] 
[   38.059705] The buggy address belongs to the object at fff00000c5f10100
[   38.059705]  which belongs to the cache kmalloc-64 of size 64
[   38.060994] The buggy address is located 0 bytes to the right of
[   38.060994]  allocated 48-byte region [fff00000c5f10100, fff00000c5f10130)
[   38.062251] 
[   38.062653] The buggy address belongs to the physical page:
[   38.063336] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105f10
[   38.064375] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   38.065061] page_type: f5(slab)
[   38.065573] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   38.066581] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   38.067558] page dumped because: kasan: bad access detected
[   38.068292] 
[   38.068682] Memory state around the buggy address:
[   38.069337]  fff00000c5f10000: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   38.070167]  fff00000c5f10080: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   38.071078] >fff00000c5f10100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   38.072020]                                      ^
[   38.072734]  fff00000c5f10180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   38.073551]  fff00000c5f10200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   38.074355] ==================================================================
[   37.880515] ==================================================================
[   37.881174] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x16d0/0x4858
[   37.882778] Write of size 8 at addr fff00000c5f10130 by task kunit_try_catch/254
[   37.883752] 
[   37.884113] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241126 #1
[   37.885095] Tainted: [B]=BAD_PAGE, [N]=TEST
[   37.885746] Hardware name: linux,dummy-virt (DT)
[   37.886411] Call trace:
[   37.886903]  show_stack+0x20/0x38 (C)
[   37.887572]  dump_stack_lvl+0x8c/0xd0
[   37.888145]  print_report+0x118/0x5e0
[   37.888789]  kasan_report+0xc8/0x118
[   37.889317]  kasan_check_range+0x100/0x1a8
[   37.890008]  __kasan_check_write+0x20/0x30
[   37.890734]  kasan_atomics_helper+0x16d0/0x4858
[   37.891452]  kasan_atomics+0x198/0x2e8
[   37.892049]  kunit_try_run_case+0x14c/0x3d0
[   37.892793]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.893586]  kthread+0x24c/0x2d0
[   37.894189]  ret_from_fork+0x10/0x20
[   37.894864] 
[   37.895191] Allocated by task 254:
[   37.895640]  kasan_save_stack+0x3c/0x68
[   37.896278]  kasan_save_track+0x20/0x40
[   37.896928]  kasan_save_alloc_info+0x40/0x58
[   37.897909]  __kasan_kmalloc+0xd4/0xd8
[   37.898543]  __kmalloc_cache_noprof+0x15c/0x3c8
[   37.899183]  kasan_atomics+0xb8/0x2e8
[   37.899730]  kunit_try_run_case+0x14c/0x3d0
[   37.900394]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.901128]  kthread+0x24c/0x2d0
[   37.901715]  ret_from_fork+0x10/0x20
[   37.902213] 
[   37.902544] The buggy address belongs to the object at fff00000c5f10100
[   37.902544]  which belongs to the cache kmalloc-64 of size 64
[   37.903979] The buggy address is located 0 bytes to the right of
[   37.903979]  allocated 48-byte region [fff00000c5f10100, fff00000c5f10130)
[   37.905110] 
[   37.905486] The buggy address belongs to the physical page:
[   37.906254] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105f10
[   37.907285] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   37.907960] page_type: f5(slab)
[   37.908570] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   37.909496] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   37.910398] page dumped because: kasan: bad access detected
[   37.911126] 
[   37.911501] Memory state around the buggy address:
[   37.912206]  fff00000c5f10000: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   37.913054]  fff00000c5f10080: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   37.913865] >fff00000c5f10100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   37.914663]                                      ^
[   37.915362]  fff00000c5f10180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.916172]  fff00000c5f10200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.917116] ==================================================================
[   36.454096] ==================================================================
[   36.454910] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa6c/0x4858
[   36.455767] Write of size 4 at addr fff00000c5f10130 by task kunit_try_catch/254
[   36.456603] 
[   36.456999] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241126 #1
[   36.458138] Tainted: [B]=BAD_PAGE, [N]=TEST
[   36.458774] Hardware name: linux,dummy-virt (DT)
[   36.459332] Call trace:
[   36.459828]  show_stack+0x20/0x38 (C)
[   36.460495]  dump_stack_lvl+0x8c/0xd0
[   36.461043]  print_report+0x118/0x5e0
[   36.461708]  kasan_report+0xc8/0x118
[   36.462348]  kasan_check_range+0x100/0x1a8
[   36.463076]  __kasan_check_write+0x20/0x30
[   36.463709]  kasan_atomics_helper+0xa6c/0x4858
[   36.464365]  kasan_atomics+0x198/0x2e8
[   36.465041]  kunit_try_run_case+0x14c/0x3d0
[   36.465678]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.466494]  kthread+0x24c/0x2d0
[   36.468249]  ret_from_fork+0x10/0x20
[   36.469156] 
[   36.469870] Allocated by task 254:
[   36.470895]  kasan_save_stack+0x3c/0x68
[   36.472273]  kasan_save_track+0x20/0x40
[   36.473185]  kasan_save_alloc_info+0x40/0x58
[   36.474279]  __kasan_kmalloc+0xd4/0xd8
[   36.475293]  __kmalloc_cache_noprof+0x15c/0x3c8
[   36.476014]  kasan_atomics+0xb8/0x2e8
[   36.476665]  kunit_try_run_case+0x14c/0x3d0
[   36.477238]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.477970]  kthread+0x24c/0x2d0
[   36.478505]  ret_from_fork+0x10/0x20
[   36.479144] 
[   36.479513] The buggy address belongs to the object at fff00000c5f10100
[   36.479513]  which belongs to the cache kmalloc-64 of size 64
[   36.480609] The buggy address is located 0 bytes to the right of
[   36.480609]  allocated 48-byte region [fff00000c5f10100, fff00000c5f10130)
[   36.482064] 
[   36.482384] The buggy address belongs to the physical page:
[   36.483069] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105f10
[   36.484102] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   36.484967] page_type: f5(slab)
[   36.485413] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   36.486383] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   36.487187] page dumped because: kasan: bad access detected
[   36.487916] 
[   36.488220] Memory state around the buggy address:
[   36.488938]  fff00000c5f10000: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   36.489883]  fff00000c5f10080: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   36.490828] >fff00000c5f10100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   36.491715]                                      ^
[   36.492433]  fff00000c5f10180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.493305]  fff00000c5f10200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.494237] ==================================================================
[   35.699515] ==================================================================
[   35.700410] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x40fc/0x4858
[   35.701337] Read of size 4 at addr fff00000c5f10130 by task kunit_try_catch/254
[   35.702833] 
[   35.703149] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241126 #1
[   35.703959] Tainted: [B]=BAD_PAGE, [N]=TEST
[   35.704627] Hardware name: linux,dummy-virt (DT)
[   35.705230] Call trace:
[   35.706192]  show_stack+0x20/0x38 (C)
[   35.706825]  dump_stack_lvl+0x8c/0xd0
[   35.707670]  print_report+0x118/0x5e0
[   35.708232]  kasan_report+0xc8/0x118
[   35.708850]  __asan_report_load4_noabort+0x20/0x30
[   35.709567]  kasan_atomics_helper+0x40fc/0x4858
[   35.710201]  kasan_atomics+0x198/0x2e8
[   35.711155]  kunit_try_run_case+0x14c/0x3d0
[   35.711870]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.712582]  kthread+0x24c/0x2d0
[   35.713185]  ret_from_fork+0x10/0x20
[   35.714138] 
[   35.714511] Allocated by task 254:
[   35.715026]  kasan_save_stack+0x3c/0x68
[   35.715518]  kasan_save_track+0x20/0x40
[   35.716178]  kasan_save_alloc_info+0x40/0x58
[   35.716841]  __kasan_kmalloc+0xd4/0xd8
[   35.717381]  __kmalloc_cache_noprof+0x15c/0x3c8
[   35.718361]  kasan_atomics+0xb8/0x2e8
[   35.719028]  kunit_try_run_case+0x14c/0x3d0
[   35.719667]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.720380]  kthread+0x24c/0x2d0
[   35.720921]  ret_from_fork+0x10/0x20
[   35.721562] 
[   35.722761] The buggy address belongs to the object at fff00000c5f10100
[   35.722761]  which belongs to the cache kmalloc-64 of size 64
[   35.724313] The buggy address is located 0 bytes to the right of
[   35.724313]  allocated 48-byte region [fff00000c5f10100, fff00000c5f10130)
[   35.725625] 
[   35.726008] The buggy address belongs to the physical page:
[   35.726732] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105f10
[   35.727448] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   35.728761] page_type: f5(slab)
[   35.729299] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   35.730591] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   35.731408] page dumped because: kasan: bad access detected
[   35.732111] 
[   35.732490] Memory state around the buggy address:
[   35.733070]  fff00000c5f10000: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   35.734313]  fff00000c5f10080: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   35.735179] >fff00000c5f10100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   35.735947]                                      ^
[   35.736672]  fff00000c5f10180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.737493]  fff00000c5f10200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.738719] ==================================================================
[   37.233424] ==================================================================
[   37.234389] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1058/0x4858
[   37.235401] Write of size 8 at addr fff00000c5f10130 by task kunit_try_catch/254
[   37.236335] 
[   37.236757] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241126 #1
[   37.237867] Tainted: [B]=BAD_PAGE, [N]=TEST
[   37.238334] Hardware name: linux,dummy-virt (DT)
[   37.239057] Call trace:
[   37.239432]  show_stack+0x20/0x38 (C)
[   37.240108]  dump_stack_lvl+0x8c/0xd0
[   37.240714]  print_report+0x118/0x5e0
[   37.241359]  kasan_report+0xc8/0x118
[   37.241914]  kasan_check_range+0x100/0x1a8
[   37.242635]  __kasan_check_write+0x20/0x30
[   37.243206]  kasan_atomics_helper+0x1058/0x4858
[   37.243943]  kasan_atomics+0x198/0x2e8
[   37.244598]  kunit_try_run_case+0x14c/0x3d0
[   37.245288]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.246055]  kthread+0x24c/0x2d0
[   37.246599]  ret_from_fork+0x10/0x20
[   37.247246] 
[   37.247607] Allocated by task 254:
[   37.248174]  kasan_save_stack+0x3c/0x68
[   37.248781]  kasan_save_track+0x20/0x40
[   37.249359]  kasan_save_alloc_info+0x40/0x58
[   37.250052]  __kasan_kmalloc+0xd4/0xd8
[   37.250632]  __kmalloc_cache_noprof+0x15c/0x3c8
[   37.251198]  kasan_atomics+0xb8/0x2e8
[   37.251836]  kunit_try_run_case+0x14c/0x3d0
[   37.252516]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.253331]  kthread+0x24c/0x2d0
[   37.253813]  ret_from_fork+0x10/0x20
[   37.254424] 
[   37.254815] The buggy address belongs to the object at fff00000c5f10100
[   37.254815]  which belongs to the cache kmalloc-64 of size 64
[   37.256020] The buggy address is located 0 bytes to the right of
[   37.256020]  allocated 48-byte region [fff00000c5f10100, fff00000c5f10130)
[   37.257210] 
[   37.257618] The buggy address belongs to the physical page:
[   37.258370] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105f10
[   37.259284] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   37.260047] page_type: f5(slab)
[   37.260623] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   37.261547] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   37.262393] page dumped because: kasan: bad access detected
[   37.263064] 
[   37.263432] Memory state around the buggy address:
[   37.264038]  fff00000c5f10000: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   37.264980]  fff00000c5f10080: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   37.266021] >fff00000c5f10100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   37.266848]                                      ^
[   37.267372]  fff00000c5f10180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.268137]  fff00000c5f10200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.268987] ==================================================================
[   37.308069] ==================================================================
[   37.308978] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1128/0x4858
[   37.309830] Write of size 8 at addr fff00000c5f10130 by task kunit_try_catch/254
[   37.310732] 
[   37.311142] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241126 #1
[   37.312232] Tainted: [B]=BAD_PAGE, [N]=TEST
[   37.312800] Hardware name: linux,dummy-virt (DT)
[   37.313424] Call trace:
[   37.313911]  show_stack+0x20/0x38 (C)
[   37.314481]  dump_stack_lvl+0x8c/0xd0
[   37.315170]  print_report+0x118/0x5e0
[   37.315849]  kasan_report+0xc8/0x118
[   37.316425]  kasan_check_range+0x100/0x1a8
[   37.317135]  __kasan_check_write+0x20/0x30
[   37.317814]  kasan_atomics_helper+0x1128/0x4858
[   37.318464]  kasan_atomics+0x198/0x2e8
[   37.319088]  kunit_try_run_case+0x14c/0x3d0
[   37.319814]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.320476]  kthread+0x24c/0x2d0
[   37.321099]  ret_from_fork+0x10/0x20
[   37.321679] 
[   37.322055] Allocated by task 254:
[   37.322626]  kasan_save_stack+0x3c/0x68
[   37.323255]  kasan_save_track+0x20/0x40
[   37.323827]  kasan_save_alloc_info+0x40/0x58
[   37.324468]  __kasan_kmalloc+0xd4/0xd8
[   37.325119]  __kmalloc_cache_noprof+0x15c/0x3c8
[   37.325835]  kasan_atomics+0xb8/0x2e8
[   37.326382]  kunit_try_run_case+0x14c/0x3d0
[   37.327382]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.328383]  kthread+0x24c/0x2d0
[   37.328914]  ret_from_fork+0x10/0x20
[   37.329469] 
[   37.329864] The buggy address belongs to the object at fff00000c5f10100
[   37.329864]  which belongs to the cache kmalloc-64 of size 64
[   37.331129] The buggy address is located 0 bytes to the right of
[   37.331129]  allocated 48-byte region [fff00000c5f10100, fff00000c5f10130)
[   37.332473] 
[   37.332880] The buggy address belongs to the physical page:
[   37.333653] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105f10
[   37.334476] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   37.335339] page_type: f5(slab)
[   37.335933] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   37.336752] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   37.337679] page dumped because: kasan: bad access detected
[   37.338327] 
[   37.338726] Memory state around the buggy address:
[   37.339398]  fff00000c5f10000: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   37.340280]  fff00000c5f10080: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   37.341138] >fff00000c5f10100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   37.341844]                                      ^
[   37.342565]  fff00000c5f10180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.343447]  fff00000c5f10200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.344302] ==================================================================
[   36.062479] ==================================================================
[   36.064194] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x61c/0x4858
[   36.064977] Write of size 4 at addr fff00000c5f10130 by task kunit_try_catch/254
[   36.066209] 
[   36.066645] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241126 #1
[   36.068040] Tainted: [B]=BAD_PAGE, [N]=TEST
[   36.068804] Hardware name: linux,dummy-virt (DT)
[   36.069426] Call trace:
[   36.069855]  show_stack+0x20/0x38 (C)
[   36.070451]  dump_stack_lvl+0x8c/0xd0
[   36.070997]  print_report+0x118/0x5e0
[   36.071711]  kasan_report+0xc8/0x118
[   36.072384]  kasan_check_range+0x100/0x1a8
[   36.073131]  __kasan_check_write+0x20/0x30
[   36.073900]  kasan_atomics_helper+0x61c/0x4858
[   36.074632]  kasan_atomics+0x198/0x2e8
[   36.075324]  kunit_try_run_case+0x14c/0x3d0
[   36.076010]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.076829]  kthread+0x24c/0x2d0
[   36.077480]  ret_from_fork+0x10/0x20
[   36.078111] 
[   36.078551] Allocated by task 254:
[   36.079088]  kasan_save_stack+0x3c/0x68
[   36.079809]  kasan_save_track+0x20/0x40
[   36.080349]  kasan_save_alloc_info+0x40/0x58
[   36.081077]  __kasan_kmalloc+0xd4/0xd8
[   36.081719]  __kmalloc_cache_noprof+0x15c/0x3c8
[   36.082416]  kasan_atomics+0xb8/0x2e8
[   36.082982]  kunit_try_run_case+0x14c/0x3d0
[   36.083719]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.084422]  kthread+0x24c/0x2d0
[   36.085061]  ret_from_fork+0x10/0x20
[   36.085703] 
[   36.086041] The buggy address belongs to the object at fff00000c5f10100
[   36.086041]  which belongs to the cache kmalloc-64 of size 64
[   36.087336] The buggy address is located 0 bytes to the right of
[   36.087336]  allocated 48-byte region [fff00000c5f10100, fff00000c5f10130)
[   36.088755] 
[   36.089198] The buggy address belongs to the physical page:
[   36.089978] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105f10
[   36.090988] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   36.091809] page_type: f5(slab)
[   36.092429] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   36.093343] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   36.094328] page dumped because: kasan: bad access detected
[   36.095011] 
[   36.095427] Memory state around the buggy address:
[   36.096102]  fff00000c5f10000: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   36.096897]  fff00000c5f10080: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   36.097813] >fff00000c5f10100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   36.098679]                                      ^
[   36.099344]  fff00000c5f10180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.100206]  fff00000c5f10200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.101119] ==================================================================
[   36.850087] ==================================================================
[   36.851674] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xd3c/0x4858
[   36.852505] Write of size 4 at addr fff00000c5f10130 by task kunit_try_catch/254
[   36.853499] 
[   36.854042] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241126 #1
[   36.855219] Tainted: [B]=BAD_PAGE, [N]=TEST
[   36.855832] Hardware name: linux,dummy-virt (DT)
[   36.856583] Call trace:
[   36.857042]  show_stack+0x20/0x38 (C)
[   36.857684]  dump_stack_lvl+0x8c/0xd0
[   36.858386]  print_report+0x118/0x5e0
[   36.858976]  kasan_report+0xc8/0x118
[   36.859697]  kasan_check_range+0x100/0x1a8
[   36.860405]  __kasan_check_write+0x20/0x30
[   36.861150]  kasan_atomics_helper+0xd3c/0x4858
[   36.861855]  kasan_atomics+0x198/0x2e8
[   36.862568]  kunit_try_run_case+0x14c/0x3d0
[   36.863239]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.864089]  kthread+0x24c/0x2d0
[   36.864685]  ret_from_fork+0x10/0x20
[   36.865371] 
[   36.865792] Allocated by task 254:
[   36.866216]  kasan_save_stack+0x3c/0x68
[   36.866910]  kasan_save_track+0x20/0x40
[   36.867493]  kasan_save_alloc_info+0x40/0x58
[   36.868210]  __kasan_kmalloc+0xd4/0xd8
[   36.868906]  __kmalloc_cache_noprof+0x15c/0x3c8
[   36.869599]  kasan_atomics+0xb8/0x2e8
[   36.870257]  kunit_try_run_case+0x14c/0x3d0
[   36.871040]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.871898]  kthread+0x24c/0x2d0
[   36.872620]  ret_from_fork+0x10/0x20
[   36.873175] 
[   36.873616] The buggy address belongs to the object at fff00000c5f10100
[   36.873616]  which belongs to the cache kmalloc-64 of size 64
[   36.875214] The buggy address is located 0 bytes to the right of
[   36.875214]  allocated 48-byte region [fff00000c5f10100, fff00000c5f10130)
[   36.876098] 
[   36.876291] The buggy address belongs to the physical page:
[   36.876672] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105f10
[   36.877738] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   36.878661] page_type: f5(slab)
[   36.879261] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   36.880144] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   36.880975] page dumped because: kasan: bad access detected
[   36.881699] 
[   36.882069] Memory state around the buggy address:
[   36.882781]  fff00000c5f10000: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   36.883664]  fff00000c5f10080: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   36.884561] >fff00000c5f10100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   36.885466]                                      ^
[   36.886082]  fff00000c5f10180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.886911]  fff00000c5f10200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.887769] ==================================================================
[   36.928565] ==================================================================
[   36.929412] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xdd4/0x4858
[   36.930359] Read of size 8 at addr fff00000c5f10130 by task kunit_try_catch/254
[   36.931095] 
[   36.931507] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241126 #1
[   36.932809] Tainted: [B]=BAD_PAGE, [N]=TEST
[   36.933434] Hardware name: linux,dummy-virt (DT)
[   36.934401] Call trace:
[   36.934822]  show_stack+0x20/0x38 (C)
[   36.935425]  dump_stack_lvl+0x8c/0xd0
[   36.936043]  print_report+0x118/0x5e0
[   36.936719]  kasan_report+0xc8/0x118
[   36.937282]  kasan_check_range+0x100/0x1a8
[   36.937982]  __kasan_check_read+0x20/0x30
[   36.938693]  kasan_atomics_helper+0xdd4/0x4858
[   36.939309]  kasan_atomics+0x198/0x2e8
[   36.939985]  kunit_try_run_case+0x14c/0x3d0
[   36.940633]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.941289]  kthread+0x24c/0x2d0
[   36.941925]  ret_from_fork+0x10/0x20
[   36.942552] 
[   36.942929] Allocated by task 254:
[   36.943492]  kasan_save_stack+0x3c/0x68
[   36.944068]  kasan_save_track+0x20/0x40
[   36.944726]  kasan_save_alloc_info+0x40/0x58
[   36.945302]  __kasan_kmalloc+0xd4/0xd8
[   36.945954]  __kmalloc_cache_noprof+0x15c/0x3c8
[   36.946484]  kasan_atomics+0xb8/0x2e8
[   36.947120]  kunit_try_run_case+0x14c/0x3d0
[   36.947814]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.948508]  kthread+0x24c/0x2d0
[   36.949043]  ret_from_fork+0x10/0x20
[   36.949515] 
[   36.949909] The buggy address belongs to the object at fff00000c5f10100
[   36.949909]  which belongs to the cache kmalloc-64 of size 64
[   36.951342] The buggy address is located 0 bytes to the right of
[   36.951342]  allocated 48-byte region [fff00000c5f10100, fff00000c5f10130)
[   36.952742] 
[   36.953124] The buggy address belongs to the physical page:
[   36.953682] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105f10
[   36.954710] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   36.955392] page_type: f5(slab)
[   36.955982] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   36.956892] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   36.957791] page dumped because: kasan: bad access detected
[   36.958490] 
[   36.958859] Memory state around the buggy address:
[   36.959377]  fff00000c5f10000: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   36.960332]  fff00000c5f10080: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   36.961033] >fff00000c5f10100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   36.961964]                                      ^
[   36.962682]  fff00000c5f10180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.963476]  fff00000c5f10200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.964241] ==================================================================
[   37.612323] ==================================================================
[   37.613168] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x147c/0x4858
[   37.614011] Write of size 8 at addr fff00000c5f10130 by task kunit_try_catch/254
[   37.614868] 
[   37.615270] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241126 #1
[   37.616400] Tainted: [B]=BAD_PAGE, [N]=TEST
[   37.617040] Hardware name: linux,dummy-virt (DT)
[   37.617644] Call trace:
[   37.618038]  show_stack+0x20/0x38 (C)
[   37.618717]  dump_stack_lvl+0x8c/0xd0
[   37.619413]  print_report+0x118/0x5e0
[   37.620079]  kasan_report+0xc8/0x118
[   37.620766]  kasan_check_range+0x100/0x1a8
[   37.621382]  __kasan_check_write+0x20/0x30
[   37.622050]  kasan_atomics_helper+0x147c/0x4858
[   37.622722]  kasan_atomics+0x198/0x2e8
[   37.623310]  kunit_try_run_case+0x14c/0x3d0
[   37.623905]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.624756]  kthread+0x24c/0x2d0
[   37.625361]  ret_from_fork+0x10/0x20
[   37.625956] 
[   37.626262] Allocated by task 254:
[   37.626850]  kasan_save_stack+0x3c/0x68
[   37.627493]  kasan_save_track+0x20/0x40
[   37.628150]  kasan_save_alloc_info+0x40/0x58
[   37.628797]  __kasan_kmalloc+0xd4/0xd8
[   37.629340]  __kmalloc_cache_noprof+0x15c/0x3c8
[   37.630751]  kasan_atomics+0xb8/0x2e8
[   37.631363]  kunit_try_run_case+0x14c/0x3d0
[   37.631946]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.632715]  kthread+0x24c/0x2d0
[   37.633234]  ret_from_fork+0x10/0x20
[   37.633794] 
[   37.634130] The buggy address belongs to the object at fff00000c5f10100
[   37.634130]  which belongs to the cache kmalloc-64 of size 64
[   37.635352] The buggy address is located 0 bytes to the right of
[   37.635352]  allocated 48-byte region [fff00000c5f10100, fff00000c5f10130)
[   37.636645] 
[   37.637031] The buggy address belongs to the physical page:
[   37.637710] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105f10
[   37.638712] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   37.639589] page_type: f5(slab)
[   37.640169] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   37.641126] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   37.641854] page dumped because: kasan: bad access detected
[   37.642623] 
[   37.642998] Memory state around the buggy address:
[   37.643567]  fff00000c5f10000: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   37.644453]  fff00000c5f10080: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   37.645159] >fff00000c5f10100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   37.646099]                                      ^
[   37.646770]  fff00000c5f10180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.647726]  fff00000c5f10200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.648445] ==================================================================
[   36.698151] ==================================================================
[   36.699229] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xc08/0x4858
[   36.700002] Write of size 4 at addr fff00000c5f10130 by task kunit_try_catch/254
[   36.701693] 
[   36.702066] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241126 #1
[   36.703296] Tainted: [B]=BAD_PAGE, [N]=TEST
[   36.703899] Hardware name: linux,dummy-virt (DT)
[   36.704670] Call trace:
[   36.705572]  show_stack+0x20/0x38 (C)
[   36.706292]  dump_stack_lvl+0x8c/0xd0
[   36.706819]  print_report+0x118/0x5e0
[   36.707417]  kasan_report+0xc8/0x118
[   36.708026]  kasan_check_range+0x100/0x1a8
[   36.708676]  __kasan_check_write+0x20/0x30
[   36.709291]  kasan_atomics_helper+0xc08/0x4858
[   36.710032]  kasan_atomics+0x198/0x2e8
[   36.710650]  kunit_try_run_case+0x14c/0x3d0
[   36.711284]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.711954]  kthread+0x24c/0x2d0
[   36.712583]  ret_from_fork+0x10/0x20
[   36.713233] 
[   36.713573] Allocated by task 254:
[   36.714134]  kasan_save_stack+0x3c/0x68
[   36.714728]  kasan_save_track+0x20/0x40
[   36.715358]  kasan_save_alloc_info+0x40/0x58
[   36.716062]  __kasan_kmalloc+0xd4/0xd8
[   36.716647]  __kmalloc_cache_noprof+0x15c/0x3c8
[   36.717424]  kasan_atomics+0xb8/0x2e8
[   36.718002]  kunit_try_run_case+0x14c/0x3d0
[   36.718735]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.719556]  kthread+0x24c/0x2d0
[   36.720139]  ret_from_fork+0x10/0x20
[   36.720748] 
[   36.721060] The buggy address belongs to the object at fff00000c5f10100
[   36.721060]  which belongs to the cache kmalloc-64 of size 64
[   36.722471] The buggy address is located 0 bytes to the right of
[   36.722471]  allocated 48-byte region [fff00000c5f10100, fff00000c5f10130)
[   36.723788] 
[   36.724136] The buggy address belongs to the physical page:
[   36.724911] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105f10
[   36.725897] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   36.726719] page_type: f5(slab)
[   36.727286] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   36.728222] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   36.729073] page dumped because: kasan: bad access detected
[   36.729844] 
[   36.730187] Memory state around the buggy address:
[   36.730893]  fff00000c5f10000: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   36.731700]  fff00000c5f10080: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   36.732521] >fff00000c5f10100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   36.733343]                                      ^
[   36.734046]  fff00000c5f10180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.734852]  fff00000c5f10200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.735702] ==================================================================
[   36.495831] ==================================================================
[   36.496758] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xad4/0x4858
[   36.497493] Write of size 4 at addr fff00000c5f10130 by task kunit_try_catch/254
[   36.498830] 
[   36.499785] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241126 #1
[   36.501077] Tainted: [B]=BAD_PAGE, [N]=TEST
[   36.501765] Hardware name: linux,dummy-virt (DT)
[   36.502309] Call trace:
[   36.502738]  show_stack+0x20/0x38 (C)
[   36.503437]  dump_stack_lvl+0x8c/0xd0
[   36.504169]  print_report+0x118/0x5e0
[   36.504930]  kasan_report+0xc8/0x118
[   36.505624]  kasan_check_range+0x100/0x1a8
[   36.506287]  __kasan_check_write+0x20/0x30
[   36.507033]  kasan_atomics_helper+0xad4/0x4858
[   36.507752]  kasan_atomics+0x198/0x2e8
[   36.508341]  kunit_try_run_case+0x14c/0x3d0
[   36.509132]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.510159]  kthread+0x24c/0x2d0
[   36.510646]  ret_from_fork+0x10/0x20
[   36.511131] 
[   36.511423] Allocated by task 254:
[   36.512558]  kasan_save_stack+0x3c/0x68
[   36.513196]  kasan_save_track+0x20/0x40
[   36.513867]  kasan_save_alloc_info+0x40/0x58
[   36.514561]  __kasan_kmalloc+0xd4/0xd8
[   36.515199]  __kmalloc_cache_noprof+0x15c/0x3c8
[   36.515914]  kasan_atomics+0xb8/0x2e8
[   36.516558]  kunit_try_run_case+0x14c/0x3d0
[   36.517229]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.518027]  kthread+0x24c/0x2d0
[   36.518637]  ret_from_fork+0x10/0x20
[   36.519966] 
[   36.520366] The buggy address belongs to the object at fff00000c5f10100
[   36.520366]  which belongs to the cache kmalloc-64 of size 64
[   36.521354] The buggy address is located 0 bytes to the right of
[   36.521354]  allocated 48-byte region [fff00000c5f10100, fff00000c5f10130)
[   36.522869] 
[   36.523248] The buggy address belongs to the physical page:
[   36.524038] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105f10
[   36.524978] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   36.525752] page_type: f5(slab)
[   36.526320] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   36.527205] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   36.527933] page dumped because: kasan: bad access detected
[   36.528886] 
[   36.529341] Memory state around the buggy address:
[   36.529867]  fff00000c5f10000: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   36.530809]  fff00000c5f10080: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   36.531625] >fff00000c5f10100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   36.532486]                                      ^
[   36.533109]  fff00000c5f10180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.533937]  fff00000c5f10200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.534706] ==================================================================
[   36.102465] ==================================================================
[   36.103278] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x684/0x4858
[   36.104078] Write of size 4 at addr fff00000c5f10130 by task kunit_try_catch/254
[   36.105092] 
[   36.105497] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241126 #1
[   36.106748] Tainted: [B]=BAD_PAGE, [N]=TEST
[   36.107416] Hardware name: linux,dummy-virt (DT)
[   36.107956] Call trace:
[   36.108488]  show_stack+0x20/0x38 (C)
[   36.109233]  dump_stack_lvl+0x8c/0xd0
[   36.109957]  print_report+0x118/0x5e0
[   36.110661]  kasan_report+0xc8/0x118
[   36.111316]  kasan_check_range+0x100/0x1a8
[   36.112073]  __kasan_check_write+0x20/0x30
[   36.112718]  kasan_atomics_helper+0x684/0x4858
[   36.113542]  kasan_atomics+0x198/0x2e8
[   36.114135]  kunit_try_run_case+0x14c/0x3d0
[   36.114869]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.115746]  kthread+0x24c/0x2d0
[   36.116320]  ret_from_fork+0x10/0x20
[   36.117026] 
[   36.117405] Allocated by task 254:
[   36.117919]  kasan_save_stack+0x3c/0x68
[   36.118612]  kasan_save_track+0x20/0x40
[   36.119317]  kasan_save_alloc_info+0x40/0x58
[   36.119905]  __kasan_kmalloc+0xd4/0xd8
[   36.120592]  __kmalloc_cache_noprof+0x15c/0x3c8
[   36.121262]  kasan_atomics+0xb8/0x2e8
[   36.121941]  kunit_try_run_case+0x14c/0x3d0
[   36.122519]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.123352]  kthread+0x24c/0x2d0
[   36.123875]  ret_from_fork+0x10/0x20
[   36.124579] 
[   36.124952] The buggy address belongs to the object at fff00000c5f10100
[   36.124952]  which belongs to the cache kmalloc-64 of size 64
[   36.126061] The buggy address is located 0 bytes to the right of
[   36.126061]  allocated 48-byte region [fff00000c5f10100, fff00000c5f10130)
[   36.127378] 
[   36.127805] The buggy address belongs to the physical page:
[   36.128514] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105f10
[   36.129553] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   36.130364] page_type: f5(slab)
[   36.130993] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   36.131920] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   36.132851] page dumped because: kasan: bad access detected
[   36.133572] 
[   36.133921] Memory state around the buggy address:
[   36.134660]  fff00000c5f10000: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   36.135556]  fff00000c5f10080: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   36.136464] >fff00000c5f10100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   36.137310]                                      ^
[   36.137952]  fff00000c5f10180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.138866]  fff00000c5f10200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.139745] ==================================================================
[   36.737040] ==================================================================
[   36.738754] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3de4/0x4858
[   36.739463] Read of size 4 at addr fff00000c5f10130 by task kunit_try_catch/254
[   36.740413] 
[   36.740799] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241126 #1
[   36.741914] Tainted: [B]=BAD_PAGE, [N]=TEST
[   36.742436] Hardware name: linux,dummy-virt (DT)
[   36.743001] Call trace:
[   36.743474]  show_stack+0x20/0x38 (C)
[   36.744047]  dump_stack_lvl+0x8c/0xd0
[   36.744723]  print_report+0x118/0x5e0
[   36.745260]  kasan_report+0xc8/0x118
[   36.745905]  __asan_report_load4_noabort+0x20/0x30
[   36.746653]  kasan_atomics_helper+0x3de4/0x4858
[   36.747370]  kasan_atomics+0x198/0x2e8
[   36.748046]  kunit_try_run_case+0x14c/0x3d0
[   36.748651]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.749487]  kthread+0x24c/0x2d0
[   36.749997]  ret_from_fork+0x10/0x20
[   36.750659] 
[   36.751033] Allocated by task 254:
[   36.751548]  kasan_save_stack+0x3c/0x68
[   36.752149]  kasan_save_track+0x20/0x40
[   36.752677]  kasan_save_alloc_info+0x40/0x58
[   36.753372]  __kasan_kmalloc+0xd4/0xd8
[   36.753939]  __kmalloc_cache_noprof+0x15c/0x3c8
[   36.754663]  kasan_atomics+0xb8/0x2e8
[   36.755262]  kunit_try_run_case+0x14c/0x3d0
[   36.755836]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.756663]  kthread+0x24c/0x2d0
[   36.757121]  ret_from_fork+0x10/0x20
[   36.757760] 
[   36.758139] The buggy address belongs to the object at fff00000c5f10100
[   36.758139]  which belongs to the cache kmalloc-64 of size 64
[   36.759386] The buggy address is located 0 bytes to the right of
[   36.759386]  allocated 48-byte region [fff00000c5f10100, fff00000c5f10130)
[   36.760709] 
[   36.761077] The buggy address belongs to the physical page:
[   36.761853] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105f10
[   36.762706] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   36.763617] page_type: f5(slab)
[   36.764079] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   36.765109] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   36.765973] page dumped because: kasan: bad access detected
[   36.766692] 
[   36.767056] Memory state around the buggy address:
[   36.767583]  fff00000c5f10000: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   36.768518]  fff00000c5f10080: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   36.769344] >fff00000c5f10100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   36.770184]                                      ^
[   36.770909]  fff00000c5f10180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.771719]  fff00000c5f10200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.772650] ==================================================================
[   37.194286] ==================================================================
[   37.195563] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xff0/0x4858
[   37.196373] Write of size 8 at addr fff00000c5f10130 by task kunit_try_catch/254
[   37.197061] 
[   37.197477] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241126 #1
[   37.198739] Tainted: [B]=BAD_PAGE, [N]=TEST
[   37.199245] Hardware name: linux,dummy-virt (DT)
[   37.199938] Call trace:
[   37.200423]  show_stack+0x20/0x38 (C)
[   37.201031]  dump_stack_lvl+0x8c/0xd0
[   37.201714]  print_report+0x118/0x5e0
[   37.202248]  kasan_report+0xc8/0x118
[   37.202916]  kasan_check_range+0x100/0x1a8
[   37.203505]  __kasan_check_write+0x20/0x30
[   37.204218]  kasan_atomics_helper+0xff0/0x4858
[   37.204899]  kasan_atomics+0x198/0x2e8
[   37.205416]  kunit_try_run_case+0x14c/0x3d0
[   37.206131]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.206964]  kthread+0x24c/0x2d0
[   37.207587]  ret_from_fork+0x10/0x20
[   37.208188] 
[   37.208566] Allocated by task 254:
[   37.209072]  kasan_save_stack+0x3c/0x68
[   37.209724]  kasan_save_track+0x20/0x40
[   37.210242]  kasan_save_alloc_info+0x40/0x58
[   37.210938]  __kasan_kmalloc+0xd4/0xd8
[   37.211505]  __kmalloc_cache_noprof+0x15c/0x3c8
[   37.212096]  kasan_atomics+0xb8/0x2e8
[   37.212734]  kunit_try_run_case+0x14c/0x3d0
[   37.213351]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.214144]  kthread+0x24c/0x2d0
[   37.214739]  ret_from_fork+0x10/0x20
[   37.215322] 
[   37.215659] The buggy address belongs to the object at fff00000c5f10100
[   37.215659]  which belongs to the cache kmalloc-64 of size 64
[   37.216935] The buggy address is located 0 bytes to the right of
[   37.216935]  allocated 48-byte region [fff00000c5f10100, fff00000c5f10130)
[   37.218198] 
[   37.218603] The buggy address belongs to the physical page:
[   37.219374] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105f10
[   37.220277] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   37.221043] page_type: f5(slab)
[   37.221629] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   37.222360] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   37.223342] page dumped because: kasan: bad access detected
[   37.224062] 
[   37.224457] Memory state around the buggy address:
[   37.225101]  fff00000c5f10000: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   37.225953]  fff00000c5f10080: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   37.226819] >fff00000c5f10100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   37.227621]                                      ^
[   37.228328]  fff00000c5f10180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.229190]  fff00000c5f10200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.230112] ==================================================================
[   37.422147] ==================================================================
[   37.422918] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x126c/0x4858
[   37.423668] Write of size 8 at addr fff00000c5f10130 by task kunit_try_catch/254
[   37.424639] 
[   37.425025] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241126 #1
[   37.426237] Tainted: [B]=BAD_PAGE, [N]=TEST
[   37.426746] Hardware name: linux,dummy-virt (DT)
[   37.427423] Call trace:
[   37.427909]  show_stack+0x20/0x38 (C)
[   37.428590]  dump_stack_lvl+0x8c/0xd0
[   37.429289]  print_report+0x118/0x5e0
[   37.429886]  kasan_report+0xc8/0x118
[   37.430458]  kasan_check_range+0x100/0x1a8
[   37.431170]  __kasan_check_write+0x20/0x30
[   37.431836]  kasan_atomics_helper+0x126c/0x4858
[   37.432400]  kasan_atomics+0x198/0x2e8
[   37.433087]  kunit_try_run_case+0x14c/0x3d0
[   37.433732]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.434485]  kthread+0x24c/0x2d0
[   37.435120]  ret_from_fork+0x10/0x20
[   37.435653] 
[   37.436026] Allocated by task 254:
[   37.436627]  kasan_save_stack+0x3c/0x68
[   37.437256]  kasan_save_track+0x20/0x40
[   37.437825]  kasan_save_alloc_info+0x40/0x58
[   37.438505]  __kasan_kmalloc+0xd4/0xd8
[   37.439161]  __kmalloc_cache_noprof+0x15c/0x3c8
[   37.439821]  kasan_atomics+0xb8/0x2e8
[   37.440361]  kunit_try_run_case+0x14c/0x3d0
[   37.441058]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.441847]  kthread+0x24c/0x2d0
[   37.442419]  ret_from_fork+0x10/0x20
[   37.443037] 
[   37.443382] The buggy address belongs to the object at fff00000c5f10100
[   37.443382]  which belongs to the cache kmalloc-64 of size 64
[   37.444667] The buggy address is located 0 bytes to the right of
[   37.444667]  allocated 48-byte region [fff00000c5f10100, fff00000c5f10130)
[   37.446001] 
[   37.446383] The buggy address belongs to the physical page:
[   37.447149] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105f10
[   37.447986] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   37.448883] page_type: f5(slab)
[   37.449463] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   37.450385] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   37.451394] page dumped because: kasan: bad access detected
[   37.452062] 
[   37.452517] Memory state around the buggy address:
[   37.453235]  fff00000c5f10000: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   37.454124]  fff00000c5f10080: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   37.455054] >fff00000c5f10100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   37.455943]                                      ^
[   37.456664]  fff00000c5f10180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.457396]  fff00000c5f10200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.458293] ==================================================================
[   36.023629] ==================================================================
[   36.024276] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x5b4/0x4858
[   36.025496] Write of size 4 at addr fff00000c5f10130 by task kunit_try_catch/254
[   36.027147] 
[   36.027568] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241126 #1
[   36.028708] Tainted: [B]=BAD_PAGE, [N]=TEST
[   36.029343] Hardware name: linux,dummy-virt (DT)
[   36.029983] Call trace:
[   36.030357]  show_stack+0x20/0x38 (C)
[   36.031031]  dump_stack_lvl+0x8c/0xd0
[   36.031713]  print_report+0x118/0x5e0
[   36.032413]  kasan_report+0xc8/0x118
[   36.033011]  kasan_check_range+0x100/0x1a8
[   36.033717]  __kasan_check_write+0x20/0x30
[   36.034359]  kasan_atomics_helper+0x5b4/0x4858
[   36.035046]  kasan_atomics+0x198/0x2e8
[   36.035605]  kunit_try_run_case+0x14c/0x3d0
[   36.036321]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.037099]  kthread+0x24c/0x2d0
[   36.037719]  ret_from_fork+0x10/0x20
[   36.038338] 
[   36.038700] Allocated by task 254:
[   36.039234]  kasan_save_stack+0x3c/0x68
[   36.039890]  kasan_save_track+0x20/0x40
[   36.040455]  kasan_save_alloc_info+0x40/0x58
[   36.041151]  __kasan_kmalloc+0xd4/0xd8
[   36.041695]  __kmalloc_cache_noprof+0x15c/0x3c8
[   36.042387]  kasan_atomics+0xb8/0x2e8
[   36.043021]  kunit_try_run_case+0x14c/0x3d0
[   36.043708]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.044376]  kthread+0x24c/0x2d0
[   36.044974]  ret_from_fork+0x10/0x20
[   36.045548] 
[   36.045920] The buggy address belongs to the object at fff00000c5f10100
[   36.045920]  which belongs to the cache kmalloc-64 of size 64
[   36.047238] The buggy address is located 0 bytes to the right of
[   36.047238]  allocated 48-byte region [fff00000c5f10100, fff00000c5f10130)
[   36.048502] 
[   36.048908] The buggy address belongs to the physical page:
[   36.049723] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105f10
[   36.050615] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   36.051382] page_type: f5(slab)
[   36.051891] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   36.052840] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   36.053680] page dumped because: kasan: bad access detected
[   36.054431] 
[   36.054793] Memory state around the buggy address:
[   36.055422]  fff00000c5f10000: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   36.056274]  fff00000c5f10080: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   36.057113] >fff00000c5f10100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   36.057905]                                      ^
[   36.058588]  fff00000c5f10180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.059406]  fff00000c5f10200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.060213] ==================================================================
[   37.536827] ==================================================================
[   37.537641] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f04/0x4858
[   37.538488] Read of size 8 at addr fff00000c5f10130 by task kunit_try_catch/254
[   37.540204] 
[   37.540624] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241126 #1
[   37.541505] Tainted: [B]=BAD_PAGE, [N]=TEST
[   37.542147] Hardware name: linux,dummy-virt (DT)
[   37.542834] Call trace:
[   37.543310]  show_stack+0x20/0x38 (C)
[   37.543900]  dump_stack_lvl+0x8c/0xd0
[   37.544584]  print_report+0x118/0x5e0
[   37.545144]  kasan_report+0xc8/0x118
[   37.545712]  __asan_report_load8_noabort+0x20/0x30
[   37.546454]  kasan_atomics_helper+0x3f04/0x4858
[   37.547041]  kasan_atomics+0x198/0x2e8
[   37.547710]  kunit_try_run_case+0x14c/0x3d0
[   37.548349]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.549029]  kthread+0x24c/0x2d0
[   37.549655]  ret_from_fork+0x10/0x20
[   37.550250] 
[   37.550634] Allocated by task 254:
[   37.551208]  kasan_save_stack+0x3c/0x68
[   37.551724]  kasan_save_track+0x20/0x40
[   37.552380]  kasan_save_alloc_info+0x40/0x58
[   37.552987]  __kasan_kmalloc+0xd4/0xd8
[   37.553638]  __kmalloc_cache_noprof+0x15c/0x3c8
[   37.554284]  kasan_atomics+0xb8/0x2e8
[   37.554875]  kunit_try_run_case+0x14c/0x3d0
[   37.555565]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.556201]  kthread+0x24c/0x2d0
[   37.556823]  ret_from_fork+0x10/0x20
[   37.557395] 
[   37.557795] The buggy address belongs to the object at fff00000c5f10100
[   37.557795]  which belongs to the cache kmalloc-64 of size 64
[   37.558988] The buggy address is located 0 bytes to the right of
[   37.558988]  allocated 48-byte region [fff00000c5f10100, fff00000c5f10130)
[   37.560456] 
[   37.560856] The buggy address belongs to the physical page:
[   37.561520] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105f10
[   37.562488] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   37.563397] page_type: f5(slab)
[   37.563976] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   37.564756] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   37.565751] page dumped because: kasan: bad access detected
[   37.566514] 
[   37.566914] Memory state around the buggy address:
[   37.567521]  fff00000c5f10000: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   37.568369]  fff00000c5f10080: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   37.569263] >fff00000c5f10100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   37.570091]                                      ^
[   37.570720]  fff00000c5f10180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.571668]  fff00000c5f10200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.572331] ==================================================================
[   37.498718] ==================================================================
[   37.500316] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1384/0x4858
[   37.501133] Write of size 8 at addr fff00000c5f10130 by task kunit_try_catch/254
[   37.502079] 
[   37.502496] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241126 #1
[   37.503669] Tainted: [B]=BAD_PAGE, [N]=TEST
[   37.504299] Hardware name: linux,dummy-virt (DT)
[   37.504921] Call trace:
[   37.505381]  show_stack+0x20/0x38 (C)
[   37.505959]  dump_stack_lvl+0x8c/0xd0
[   37.506517]  print_report+0x118/0x5e0
[   37.507188]  kasan_report+0xc8/0x118
[   37.507841]  kasan_check_range+0x100/0x1a8
[   37.508576]  __kasan_check_write+0x20/0x30
[   37.509296]  kasan_atomics_helper+0x1384/0x4858
[   37.509913]  kasan_atomics+0x198/0x2e8
[   37.510582]  kunit_try_run_case+0x14c/0x3d0
[   37.511189]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.511974]  kthread+0x24c/0x2d0
[   37.512610]  ret_from_fork+0x10/0x20
[   37.513231] 
[   37.513573] Allocated by task 254:
[   37.514138]  kasan_save_stack+0x3c/0x68
[   37.514786]  kasan_save_track+0x20/0x40
[   37.515401]  kasan_save_alloc_info+0x40/0x58
[   37.515966]  __kasan_kmalloc+0xd4/0xd8
[   37.516620]  __kmalloc_cache_noprof+0x15c/0x3c8
[   37.517316]  kasan_atomics+0xb8/0x2e8
[   37.517827]  kunit_try_run_case+0x14c/0x3d0
[   37.518472]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.519313]  kthread+0x24c/0x2d0
[   37.519847]  ret_from_fork+0x10/0x20
[   37.520470] 
[   37.520864] The buggy address belongs to the object at fff00000c5f10100
[   37.520864]  which belongs to the cache kmalloc-64 of size 64
[   37.522042] The buggy address is located 0 bytes to the right of
[   37.522042]  allocated 48-byte region [fff00000c5f10100, fff00000c5f10130)
[   37.523370] 
[   37.523766] The buggy address belongs to the physical page:
[   37.524549] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105f10
[   37.525399] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   37.526210] page_type: f5(slab)
[   37.526700] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   37.527676] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   37.528615] page dumped because: kasan: bad access detected
[   37.529339] 
[   37.529729] Memory state around the buggy address:
[   37.530297]  fff00000c5f10000: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   37.531184]  fff00000c5f10080: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   37.532036] >fff00000c5f10100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   37.532851]                                      ^
[   37.533441]  fff00000c5f10180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.534291]  fff00000c5f10200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.535134] ==================================================================
[   36.536926] ==================================================================
[   36.537797] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3dcc/0x4858
[   36.538955] Read of size 4 at addr fff00000c5f10130 by task kunit_try_catch/254
[   36.539871] 
[   36.540289] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241126 #1
[   36.541564] Tainted: [B]=BAD_PAGE, [N]=TEST
[   36.542067] Hardware name: linux,dummy-virt (DT)
[   36.543425] Call trace:
[   36.543814]  show_stack+0x20/0x38 (C)
[   36.544385]  dump_stack_lvl+0x8c/0xd0
[   36.544964]  print_report+0x118/0x5e0
[   36.545620]  kasan_report+0xc8/0x118
[   36.546134]  __asan_report_load4_noabort+0x20/0x30
[   36.546895]  kasan_atomics_helper+0x3dcc/0x4858
[   36.547508]  kasan_atomics+0x198/0x2e8
[   36.548138]  kunit_try_run_case+0x14c/0x3d0
[   36.548782]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.549559]  kthread+0x24c/0x2d0
[   36.550066]  ret_from_fork+0x10/0x20
[   36.550682] 
[   36.551059] Allocated by task 254:
[   36.551570]  kasan_save_stack+0x3c/0x68
[   36.552218]  kasan_save_track+0x20/0x40
[   36.552798]  kasan_save_alloc_info+0x40/0x58
[   36.553488]  __kasan_kmalloc+0xd4/0xd8
[   36.554082]  __kmalloc_cache_noprof+0x15c/0x3c8
[   36.554801]  kasan_atomics+0xb8/0x2e8
[   36.555351]  kunit_try_run_case+0x14c/0x3d0
[   36.555915]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.556731]  kthread+0x24c/0x2d0
[   36.557317]  ret_from_fork+0x10/0x20
[   36.557954] 
[   36.558333] The buggy address belongs to the object at fff00000c5f10100
[   36.558333]  which belongs to the cache kmalloc-64 of size 64
[   36.559580] The buggy address is located 0 bytes to the right of
[   36.559580]  allocated 48-byte region [fff00000c5f10100, fff00000c5f10130)
[   36.560983] 
[   36.561361] The buggy address belongs to the physical page:
[   36.562042] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105f10
[   36.562919] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   36.563720] page_type: f5(slab)
[   36.564301] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   36.565127] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   36.565971] page dumped because: kasan: bad access detected
[   36.566736] 
[   36.567113] Memory state around the buggy address:
[   36.567788]  fff00000c5f10000: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   36.568614]  fff00000c5f10080: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   36.569458] >fff00000c5f10100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   36.570287]                                      ^
[   36.570896]  fff00000c5f10180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.571755]  fff00000c5f10200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.572544] ==================================================================
[   37.999006] ==================================================================
[   38.000360] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e20/0x4858
[   38.001021] Read of size 8 at addr fff00000c5f10130 by task kunit_try_catch/254
[   38.002129] 
[   38.002511] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241126 #1
[   38.003577] Tainted: [B]=BAD_PAGE, [N]=TEST
[   38.004036] Hardware name: linux,dummy-virt (DT)
[   38.004733] Call trace:
[   38.005199]  show_stack+0x20/0x38 (C)
[   38.005859]  dump_stack_lvl+0x8c/0xd0
[   38.006542]  print_report+0x118/0x5e0
[   38.007186]  kasan_report+0xc8/0x118
[   38.007838]  __asan_report_load8_noabort+0x20/0x30
[   38.008507]  kasan_atomics_helper+0x3e20/0x4858
[   38.009148]  kasan_atomics+0x198/0x2e8
[   38.009671]  kunit_try_run_case+0x14c/0x3d0
[   38.010371]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   38.011195]  kthread+0x24c/0x2d0
[   38.011821]  ret_from_fork+0x10/0x20
[   38.012471] 
[   38.012872] Allocated by task 254:
[   38.013413]  kasan_save_stack+0x3c/0x68
[   38.014082]  kasan_save_track+0x20/0x40
[   38.014731]  kasan_save_alloc_info+0x40/0x58
[   38.015278]  __kasan_kmalloc+0xd4/0xd8
[   38.015929]  __kmalloc_cache_noprof+0x15c/0x3c8
[   38.016671]  kasan_atomics+0xb8/0x2e8
[   38.017233]  kunit_try_run_case+0x14c/0x3d0
[   38.017833]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   38.018641]  kthread+0x24c/0x2d0
[   38.019143]  ret_from_fork+0x10/0x20
[   38.019645] 
[   38.020013] The buggy address belongs to the object at fff00000c5f10100
[   38.020013]  which belongs to the cache kmalloc-64 of size 64
[   38.021448] The buggy address is located 0 bytes to the right of
[   38.021448]  allocated 48-byte region [fff00000c5f10100, fff00000c5f10130)
[   38.022808] 
[   38.023188] The buggy address belongs to the physical page:
[   38.023884] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105f10
[   38.024937] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   38.025758] page_type: f5(slab)
[   38.026264] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   38.027265] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   38.028063] page dumped because: kasan: bad access detected
[   38.028797] 
[   38.029150] Memory state around the buggy address:
[   38.030158]  fff00000c5f10000: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   38.031218]  fff00000c5f10080: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   38.031960] >fff00000c5f10100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   38.032846]                                      ^
[   38.033554]  fff00000c5f10180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   38.034314]  fff00000c5f10200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   38.035163] ==================================================================
[   36.262120] ==================================================================
[   36.263367] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x894/0x4858
[   36.264359] Write of size 4 at addr fff00000c5f10130 by task kunit_try_catch/254
[   36.265000] 
[   36.265903] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241126 #1
[   36.267067] Tainted: [B]=BAD_PAGE, [N]=TEST
[   36.267751] Hardware name: linux,dummy-virt (DT)
[   36.268418] Call trace:
[   36.268942]  show_stack+0x20/0x38 (C)
[   36.269622]  dump_stack_lvl+0x8c/0xd0
[   36.270323]  print_report+0x118/0x5e0
[   36.270954]  kasan_report+0xc8/0x118
[   36.271617]  kasan_check_range+0x100/0x1a8
[   36.272215]  __kasan_check_write+0x20/0x30
[   36.272976]  kasan_atomics_helper+0x894/0x4858
[   36.273626]  kasan_atomics+0x198/0x2e8
[   36.274314]  kunit_try_run_case+0x14c/0x3d0
[   36.275016]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.275753]  kthread+0x24c/0x2d0
[   36.276364]  ret_from_fork+0x10/0x20
[   36.276988] 
[   36.277412] Allocated by task 254:
[   36.277955]  kasan_save_stack+0x3c/0x68
[   36.278611]  kasan_save_track+0x20/0x40
[   36.279179]  kasan_save_alloc_info+0x40/0x58
[   36.279911]  __kasan_kmalloc+0xd4/0xd8
[   36.280506]  __kmalloc_cache_noprof+0x15c/0x3c8
[   36.281260]  kasan_atomics+0xb8/0x2e8
[   36.281861]  kunit_try_run_case+0x14c/0x3d0
[   36.282546]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.283227]  kthread+0x24c/0x2d0
[   36.283851]  ret_from_fork+0x10/0x20
[   36.284544] 
[   36.285008] The buggy address belongs to the object at fff00000c5f10100
[   36.285008]  which belongs to the cache kmalloc-64 of size 64
[   36.286342] The buggy address is located 0 bytes to the right of
[   36.286342]  allocated 48-byte region [fff00000c5f10100, fff00000c5f10130)
[   36.287862] 
[   36.288357] The buggy address belongs to the physical page:
[   36.289149] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105f10
[   36.290385] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   36.290979] page_type: f5(slab)
[   36.291237] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   36.291739] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   36.292721] page dumped because: kasan: bad access detected
[   36.293413] 
[   36.293813] Memory state around the buggy address:
[   36.294396]  fff00000c5f10000: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   36.295252]  fff00000c5f10080: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   36.296206] >fff00000c5f10100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   36.296960]                                      ^
[   36.297684]  fff00000c5f10180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.298516]  fff00000c5f10200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.299467] ==================================================================
[   37.804729] ==================================================================
[   37.805561] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1644/0x4858
[   37.806753] Write of size 8 at addr fff00000c5f10130 by task kunit_try_catch/254
[   37.808244] 
[   37.808690] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241126 #1
[   37.810303] Tainted: [B]=BAD_PAGE, [N]=TEST
[   37.810844] Hardware name: linux,dummy-virt (DT)
[   37.811450] Call trace:
[   37.811967]  show_stack+0x20/0x38 (C)
[   37.812621]  dump_stack_lvl+0x8c/0xd0
[   37.813323]  print_report+0x118/0x5e0
[   37.813958]  kasan_report+0xc8/0x118
[   37.814600]  kasan_check_range+0x100/0x1a8
[   37.815323]  __kasan_check_write+0x20/0x30
[   37.815978]  kasan_atomics_helper+0x1644/0x4858
[   37.816767]  kasan_atomics+0x198/0x2e8
[   37.817369]  kunit_try_run_case+0x14c/0x3d0
[   37.818135]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.818936]  kthread+0x24c/0x2d0
[   37.819478]  ret_from_fork+0x10/0x20
[   37.820158] 
[   37.820561] Allocated by task 254:
[   37.821117]  kasan_save_stack+0x3c/0x68
[   37.821716]  kasan_save_track+0x20/0x40
[   37.822199]  kasan_save_alloc_info+0x40/0x58
[   37.822880]  __kasan_kmalloc+0xd4/0xd8
[   37.823505]  __kmalloc_cache_noprof+0x15c/0x3c8
[   37.824169]  kasan_atomics+0xb8/0x2e8
[   37.824716]  kunit_try_run_case+0x14c/0x3d0
[   37.825390]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.826196]  kthread+0x24c/0x2d0
[   37.826779]  ret_from_fork+0x10/0x20
[   37.827256] 
[   37.827654] The buggy address belongs to the object at fff00000c5f10100
[   37.827654]  which belongs to the cache kmalloc-64 of size 64
[   37.828930] The buggy address is located 0 bytes to the right of
[   37.828930]  allocated 48-byte region [fff00000c5f10100, fff00000c5f10130)
[   37.830441] 
[   37.830795] The buggy address belongs to the physical page:
[   37.831466] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105f10
[   37.832506] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   37.833268] page_type: f5(slab)
[   37.833856] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   37.834636] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   37.835508] page dumped because: kasan: bad access detected
[   37.836295] 
[   37.836682] Memory state around the buggy address:
[   37.837383]  fff00000c5f10000: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   37.838260]  fff00000c5f10080: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   37.839090] >fff00000c5f10100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   37.839969]                                      ^
[   37.840704]  fff00000c5f10180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.841439]  fff00000c5f10200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.842264] ==================================================================
[   36.377250] ==================================================================
[   36.378078] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x99c/0x4858
[   36.378894] Write of size 4 at addr fff00000c5f10130 by task kunit_try_catch/254
[   36.379915] 
[   36.380324] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241126 #1
[   36.381260] Tainted: [B]=BAD_PAGE, [N]=TEST
[   36.381913] Hardware name: linux,dummy-virt (DT)
[   36.382619] Call trace:
[   36.383085]  show_stack+0x20/0x38 (C)
[   36.383626]  dump_stack_lvl+0x8c/0xd0
[   36.384326]  print_report+0x118/0x5e0
[   36.384960]  kasan_report+0xc8/0x118
[   36.385657]  kasan_check_range+0x100/0x1a8
[   36.386258]  __kasan_check_write+0x20/0x30
[   36.386988]  kasan_atomics_helper+0x99c/0x4858
[   36.388111]  kasan_atomics+0x198/0x2e8
[   36.388798]  kunit_try_run_case+0x14c/0x3d0
[   36.389559]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.390270]  kthread+0x24c/0x2d0
[   36.390872]  ret_from_fork+0x10/0x20
[   36.391542] 
[   36.391911] Allocated by task 254:
[   36.392440]  kasan_save_stack+0x3c/0x68
[   36.392989]  kasan_save_track+0x20/0x40
[   36.393621]  kasan_save_alloc_info+0x40/0x58
[   36.394298]  __kasan_kmalloc+0xd4/0xd8
[   36.394955]  __kmalloc_cache_noprof+0x15c/0x3c8
[   36.395625]  kasan_atomics+0xb8/0x2e8
[   36.396170]  kunit_try_run_case+0x14c/0x3d0
[   36.396735]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.397546]  kthread+0x24c/0x2d0
[   36.398132]  ret_from_fork+0x10/0x20
[   36.398744] 
[   36.399153] The buggy address belongs to the object at fff00000c5f10100
[   36.399153]  which belongs to the cache kmalloc-64 of size 64
[   36.400376] The buggy address is located 0 bytes to the right of
[   36.400376]  allocated 48-byte region [fff00000c5f10100, fff00000c5f10130)
[   36.401628] 
[   36.402004] The buggy address belongs to the physical page:
[   36.402773] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105f10
[   36.403663] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   36.404470] page_type: f5(slab)
[   36.405438] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   36.406472] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   36.407246] page dumped because: kasan: bad access detected
[   36.408010] 
[   36.408340] Memory state around the buggy address:
[   36.409037]  fff00000c5f10000: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   36.409838]  fff00000c5f10080: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   36.410704] >fff00000c5f10100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   36.411508]                                      ^
[   36.412242]  fff00000c5f10180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.413114]  fff00000c5f10200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.414049] ==================================================================
[   37.155991] ==================================================================
[   37.156900] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf88/0x4858
[   37.157706] Write of size 8 at addr fff00000c5f10130 by task kunit_try_catch/254
[   37.159230] 
[   37.159603] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241126 #1
[   37.160812] Tainted: [B]=BAD_PAGE, [N]=TEST
[   37.161306] Hardware name: linux,dummy-virt (DT)
[   37.161997] Call trace:
[   37.162374]  show_stack+0x20/0x38 (C)
[   37.163045]  dump_stack_lvl+0x8c/0xd0
[   37.163637]  print_report+0x118/0x5e0
[   37.164278]  kasan_report+0xc8/0x118
[   37.164933]  kasan_check_range+0x100/0x1a8
[   37.165576]  __kasan_check_write+0x20/0x30
[   37.166268]  kasan_atomics_helper+0xf88/0x4858
[   37.166963]  kasan_atomics+0x198/0x2e8
[   37.167463]  kunit_try_run_case+0x14c/0x3d0
[   37.168208]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.168910]  kthread+0x24c/0x2d0
[   37.169516]  ret_from_fork+0x10/0x20
[   37.170113] 
[   37.170421] Allocated by task 254:
[   37.170994]  kasan_save_stack+0x3c/0x68
[   37.171645]  kasan_save_track+0x20/0x40
[   37.172283]  kasan_save_alloc_info+0x40/0x58
[   37.172874]  __kasan_kmalloc+0xd4/0xd8
[   37.173502]  __kmalloc_cache_noprof+0x15c/0x3c8
[   37.174159]  kasan_atomics+0xb8/0x2e8
[   37.174793]  kunit_try_run_case+0x14c/0x3d0
[   37.175438]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.176099]  kthread+0x24c/0x2d0
[   37.176718]  ret_from_fork+0x10/0x20
[   37.177224] 
[   37.177623] The buggy address belongs to the object at fff00000c5f10100
[   37.177623]  which belongs to the cache kmalloc-64 of size 64
[   37.178835] The buggy address is located 0 bytes to the right of
[   37.178835]  allocated 48-byte region [fff00000c5f10100, fff00000c5f10130)
[   37.180142] 
[   37.180558] The buggy address belongs to the physical page:
[   37.181114] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105f10
[   37.182148] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   37.183216] page_type: f5(slab)
[   37.183832] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   37.184775] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   37.185702] page dumped because: kasan: bad access detected
[   37.186437] 
[   37.186735] Memory state around the buggy address:
[   37.187421]  fff00000c5f10000: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   37.188202]  fff00000c5f10080: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   37.189096] >fff00000c5f10100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   37.189929]                                      ^
[   37.190511]  fff00000c5f10180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.191470]  fff00000c5f10200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.192315] ==================================================================
[   36.889376] ==================================================================
[   36.890056] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e04/0x4858
[   36.891942] Read of size 4 at addr fff00000c5f10130 by task kunit_try_catch/254
[   36.893667] 
[   36.894085] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241126 #1
[   36.895201] Tainted: [B]=BAD_PAGE, [N]=TEST
[   36.895848] Hardware name: linux,dummy-virt (DT)
[   36.896589] Call trace:
[   36.896997]  show_stack+0x20/0x38 (C)
[   36.897702]  dump_stack_lvl+0x8c/0xd0
[   36.898332]  print_report+0x118/0x5e0
[   36.898940]  kasan_report+0xc8/0x118
[   36.899632]  __asan_report_load4_noabort+0x20/0x30
[   36.900382]  kasan_atomics_helper+0x3e04/0x4858
[   36.901106]  kasan_atomics+0x198/0x2e8
[   36.901752]  kunit_try_run_case+0x14c/0x3d0
[   36.902489]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.903572]  kthread+0x24c/0x2d0
[   36.904141]  ret_from_fork+0x10/0x20
[   36.905021] 
[   36.905356] Allocated by task 254:
[   36.906209]  kasan_save_stack+0x3c/0x68
[   36.906821]  kasan_save_track+0x20/0x40
[   36.907276]  kasan_save_alloc_info+0x40/0x58
[   36.907981]  __kasan_kmalloc+0xd4/0xd8
[   36.908576]  __kmalloc_cache_noprof+0x15c/0x3c8
[   36.909238]  kasan_atomics+0xb8/0x2e8
[   36.909890]  kunit_try_run_case+0x14c/0x3d0
[   36.910569]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.911258]  kthread+0x24c/0x2d0
[   36.911858]  ret_from_fork+0x10/0x20
[   36.912394] 
[   36.912793] The buggy address belongs to the object at fff00000c5f10100
[   36.912793]  which belongs to the cache kmalloc-64 of size 64
[   36.913967] The buggy address is located 0 bytes to the right of
[   36.913967]  allocated 48-byte region [fff00000c5f10100, fff00000c5f10130)
[   36.915432] 
[   36.915803] The buggy address belongs to the physical page:
[   36.916572] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105f10
[   36.917606] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   36.918474] page_type: f5(slab)
[   36.919076] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   36.919946] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   36.920925] page dumped because: kasan: bad access detected
[   36.921515] 
[   36.921915] Memory state around the buggy address:
[   36.922572]  fff00000c5f10000: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   36.923357]  fff00000c5f10080: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   36.924237] >fff00000c5f10100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   36.925048]                                      ^
[   36.925765]  fff00000c5f10180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.926544]  fff00000c5f10200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.927360] ==================================================================
[   37.118030] ==================================================================
[   37.119353] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf20/0x4858
[   37.120570] Write of size 8 at addr fff00000c5f10130 by task kunit_try_catch/254
[   37.121602] 
[   37.121932] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241126 #1
[   37.123211] Tainted: [B]=BAD_PAGE, [N]=TEST
[   37.123697] Hardware name: linux,dummy-virt (DT)
[   37.124374] Call trace:
[   37.124797]  show_stack+0x20/0x38 (C)
[   37.125439]  dump_stack_lvl+0x8c/0xd0
[   37.126109]  print_report+0x118/0x5e0
[   37.126727]  kasan_report+0xc8/0x118
[   37.127367]  kasan_check_range+0x100/0x1a8
[   37.128014]  __kasan_check_write+0x20/0x30
[   37.128738]  kasan_atomics_helper+0xf20/0x4858
[   37.129377]  kasan_atomics+0x198/0x2e8
[   37.130049]  kunit_try_run_case+0x14c/0x3d0
[   37.130673]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.131471]  kthread+0x24c/0x2d0
[   37.132099]  ret_from_fork+0x10/0x20
[   37.132737] 
[   37.133051] Allocated by task 254:
[   37.133584]  kasan_save_stack+0x3c/0x68
[   37.134151]  kasan_save_track+0x20/0x40
[   37.134724]  kasan_save_alloc_info+0x40/0x58
[   37.135233]  __kasan_kmalloc+0xd4/0xd8
[   37.135882]  __kmalloc_cache_noprof+0x15c/0x3c8
[   37.136600]  kasan_atomics+0xb8/0x2e8
[   37.137208]  kunit_try_run_case+0x14c/0x3d0
[   37.137802]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.138610]  kthread+0x24c/0x2d0
[   37.139178]  ret_from_fork+0x10/0x20
[   37.139768] 
[   37.140135] The buggy address belongs to the object at fff00000c5f10100
[   37.140135]  which belongs to the cache kmalloc-64 of size 64
[   37.141339] The buggy address is located 0 bytes to the right of
[   37.141339]  allocated 48-byte region [fff00000c5f10100, fff00000c5f10130)
[   37.142653] 
[   37.143042] The buggy address belongs to the physical page:
[   37.143707] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105f10
[   37.144668] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   37.145450] page_type: f5(slab)
[   37.145940] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   37.146953] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   37.147817] page dumped because: kasan: bad access detected
[   37.148603] 
[   37.148924] Memory state around the buggy address:
[   37.149614]  fff00000c5f10000: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   37.150629]  fff00000c5f10080: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   37.151563] >fff00000c5f10100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   37.152347]                                      ^
[   37.153065]  fff00000c5f10180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.153896]  fff00000c5f10200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.154699] ==================================================================
[   37.270405] ==================================================================
[   37.271278] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x10c0/0x4858
[   37.272556] Write of size 8 at addr fff00000c5f10130 by task kunit_try_catch/254
[   37.273262] 
[   37.273710] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241126 #1
[   37.274962] Tainted: [B]=BAD_PAGE, [N]=TEST
[   37.275513] Hardware name: linux,dummy-virt (DT)
[   37.276203] Call trace:
[   37.276671]  show_stack+0x20/0x38 (C)
[   37.277200]  dump_stack_lvl+0x8c/0xd0
[   37.277878]  print_report+0x118/0x5e0
[   37.278543]  kasan_report+0xc8/0x118
[   37.279228]  kasan_check_range+0x100/0x1a8
[   37.279814]  __kasan_check_write+0x20/0x30
[   37.280478]  kasan_atomics_helper+0x10c0/0x4858
[   37.281229]  kasan_atomics+0x198/0x2e8
[   37.281914]  kunit_try_run_case+0x14c/0x3d0
[   37.282621]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.283294]  kthread+0x24c/0x2d0
[   37.283912]  ret_from_fork+0x10/0x20
[   37.284466] 
[   37.284866] Allocated by task 254:
[   37.285439]  kasan_save_stack+0x3c/0x68
[   37.286084]  kasan_save_track+0x20/0x40
[   37.286608]  kasan_save_alloc_info+0x40/0x58
[   37.287269]  __kasan_kmalloc+0xd4/0xd8
[   37.287909]  __kmalloc_cache_noprof+0x15c/0x3c8
[   37.288512]  kasan_atomics+0xb8/0x2e8
[   37.289180]  kunit_try_run_case+0x14c/0x3d0
[   37.289859]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.290490]  kthread+0x24c/0x2d0
[   37.291090]  ret_from_fork+0x10/0x20
[   37.291711] 
[   37.292086] The buggy address belongs to the object at fff00000c5f10100
[   37.292086]  which belongs to the cache kmalloc-64 of size 64
[   37.293320] The buggy address is located 0 bytes to the right of
[   37.293320]  allocated 48-byte region [fff00000c5f10100, fff00000c5f10130)
[   37.294590] 
[   37.294974] The buggy address belongs to the physical page:
[   37.295747] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105f10
[   37.296637] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   37.297394] page_type: f5(slab)
[   37.297989] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   37.298824] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   37.299730] page dumped because: kasan: bad access detected
[   37.300400] 
[   37.300792] Memory state around the buggy address:
[   37.301375]  fff00000c5f10000: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   37.302264]  fff00000c5f10080: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   37.303207] >fff00000c5f10100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   37.304081]                                      ^
[   37.304768]  fff00000c5f10180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.305635]  fff00000c5f10200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.306494] ==================================================================
[   37.346383] ==================================================================
[   37.347100] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1190/0x4858
[   37.347958] Write of size 8 at addr fff00000c5f10130 by task kunit_try_catch/254
[   37.348910] 
[   37.349333] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241126 #1
[   37.350315] Tainted: [B]=BAD_PAGE, [N]=TEST
[   37.351615] Hardware name: linux,dummy-virt (DT)
[   37.352306] Call trace:
[   37.352723]  show_stack+0x20/0x38 (C)
[   37.353381]  dump_stack_lvl+0x8c/0xd0
[   37.353951]  print_report+0x118/0x5e0
[   37.354621]  kasan_report+0xc8/0x118
[   37.355273]  kasan_check_range+0x100/0x1a8
[   37.355904]  __kasan_check_write+0x20/0x30
[   37.356548]  kasan_atomics_helper+0x1190/0x4858
[   37.357278]  kasan_atomics+0x198/0x2e8
[   37.358218]  kunit_try_run_case+0x14c/0x3d0
[   37.358876]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.359820]  kthread+0x24c/0x2d0
[   37.360318]  ret_from_fork+0x10/0x20
[   37.360901] 
[   37.361274] Allocated by task 254:
[   37.361793]  kasan_save_stack+0x3c/0x68
[   37.362351]  kasan_save_track+0x20/0x40
[   37.363003]  kasan_save_alloc_info+0x40/0x58
[   37.363627]  __kasan_kmalloc+0xd4/0xd8
[   37.364134]  __kmalloc_cache_noprof+0x15c/0x3c8
[   37.364858]  kasan_atomics+0xb8/0x2e8
[   37.365441]  kunit_try_run_case+0x14c/0x3d0
[   37.365989]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.366796]  kthread+0x24c/0x2d0
[   37.367337]  ret_from_fork+0x10/0x20
[   37.367952] 
[   37.368336] The buggy address belongs to the object at fff00000c5f10100
[   37.368336]  which belongs to the cache kmalloc-64 of size 64
[   37.369595] The buggy address is located 0 bytes to the right of
[   37.369595]  allocated 48-byte region [fff00000c5f10100, fff00000c5f10130)
[   37.370876] 
[   37.371199] The buggy address belongs to the physical page:
[   37.371969] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105f10
[   37.372906] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   37.373803] page_type: f5(slab)
[   37.374369] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   37.375272] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   37.376190] page dumped because: kasan: bad access detected
[   37.376951] 
[   37.377327] Memory state around the buggy address:
[   37.377988]  fff00000c5f10000: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   37.378780]  fff00000c5f10080: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   37.379688] >fff00000c5f10100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   37.380581]                                      ^
[   37.381277]  fff00000c5f10180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.382052]  fff00000c5f10200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.383000] ==================================================================
[   35.943178] ==================================================================
[   35.943960] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4e4/0x4858
[   35.944946] Write of size 4 at addr fff00000c5f10130 by task kunit_try_catch/254
[   35.947571] 
[   35.947909] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241126 #1
[   35.949239] Tainted: [B]=BAD_PAGE, [N]=TEST
[   35.949949] Hardware name: linux,dummy-virt (DT)
[   35.950639] Call trace:
[   35.951126]  show_stack+0x20/0x38 (C)
[   35.951879]  dump_stack_lvl+0x8c/0xd0
[   35.952905]  print_report+0x118/0x5e0
[   35.953596]  kasan_report+0xc8/0x118
[   35.954448]  kasan_check_range+0x100/0x1a8
[   35.955107]  __kasan_check_write+0x20/0x30
[   35.955961]  kasan_atomics_helper+0x4e4/0x4858
[   35.956622]  kasan_atomics+0x198/0x2e8
[   35.957160]  kunit_try_run_case+0x14c/0x3d0
[   35.957828]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.958793]  kthread+0x24c/0x2d0
[   35.959429]  ret_from_fork+0x10/0x20
[   35.960108] 
[   35.960439] Allocated by task 254:
[   35.961023]  kasan_save_stack+0x3c/0x68
[   35.961885]  kasan_save_track+0x20/0x40
[   35.962549]  kasan_save_alloc_info+0x40/0x58
[   35.963200]  __kasan_kmalloc+0xd4/0xd8
[   35.963764]  __kmalloc_cache_noprof+0x15c/0x3c8
[   35.964410]  kasan_atomics+0xb8/0x2e8
[   35.965038]  kunit_try_run_case+0x14c/0x3d0
[   35.965883]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.966647]  kthread+0x24c/0x2d0
[   35.967230]  ret_from_fork+0x10/0x20
[   35.968464] 
[   35.968993] The buggy address belongs to the object at fff00000c5f10100
[   35.968993]  which belongs to the cache kmalloc-64 of size 64
[   35.970711] The buggy address is located 0 bytes to the right of
[   35.970711]  allocated 48-byte region [fff00000c5f10100, fff00000c5f10130)
[   35.972153] 
[   35.972574] The buggy address belongs to the physical page:
[   35.973359] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105f10
[   35.974440] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   35.975444] page_type: f5(slab)
[   35.975969] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   35.976788] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   35.977680] page dumped because: kasan: bad access detected
[   35.978598] 
[   35.978945] Memory state around the buggy address:
[   35.979610]  fff00000c5f10000: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   35.980425]  fff00000c5f10080: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   35.981152] >fff00000c5f10100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   35.982097]                                      ^
[   35.982735]  fff00000c5f10180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.983571]  fff00000c5f10200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.984370] ==================================================================
[   35.484035] ==================================================================
[   35.485410] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x40a8/0x4858
[   35.486564] Read of size 4 at addr fff00000c5f10130 by task kunit_try_catch/254
[   35.487343] 
[   35.487766] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241126 #1
[   35.488781] Tainted: [B]=BAD_PAGE, [N]=TEST
[   35.489408] Hardware name: linux,dummy-virt (DT)
[   35.490337] Call trace:
[   35.490783]  show_stack+0x20/0x38 (C)
[   35.491437]  dump_stack_lvl+0x8c/0xd0
[   35.492116]  print_report+0x118/0x5e0
[   35.492730]  kasan_report+0xc8/0x118
[   35.493345]  __asan_report_load4_noabort+0x20/0x30
[   35.494663]  kasan_atomics_helper+0x40a8/0x4858
[   35.495312]  kasan_atomics+0x198/0x2e8
[   35.495910]  kunit_try_run_case+0x14c/0x3d0
[   35.496567]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.497271]  kthread+0x24c/0x2d0
[   35.498224]  ret_from_fork+0x10/0x20
[   35.498909] 
[   35.499286] Allocated by task 254:
[   35.499753]  kasan_save_stack+0x3c/0x68
[   35.500399]  kasan_save_track+0x20/0x40
[   35.500978]  kasan_save_alloc_info+0x40/0x58
[   35.502016]  __kasan_kmalloc+0xd4/0xd8
[   35.502542]  __kmalloc_cache_noprof+0x15c/0x3c8
[   35.503236]  kasan_atomics+0xb8/0x2e8
[   35.503880]  kunit_try_run_case+0x14c/0x3d0
[   35.504476]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.505127]  kthread+0x24c/0x2d0
[   35.505940]  ret_from_fork+0x10/0x20
[   35.506576] 
[   35.506944] The buggy address belongs to the object at fff00000c5f10100
[   35.506944]  which belongs to the cache kmalloc-64 of size 64
[   35.508652] The buggy address is located 0 bytes to the right of
[   35.508652]  allocated 48-byte region [fff00000c5f10100, fff00000c5f10130)
[   35.510586] 
[   35.511139] The buggy address belongs to the physical page:
[   35.511970] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105f10
[   35.513042] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   35.513984] page_type: f5(slab)
[   35.514765] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   35.515713] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   35.516494] page dumped because: kasan: bad access detected
[   35.517268] 
[   35.517641] Memory state around the buggy address:
[   35.518162]  fff00000c5f10000: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   35.519100]  fff00000c5f10080: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   35.519866] >fff00000c5f10100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   35.520832]                                      ^
[   35.521545]  fff00000c5f10180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.522796]  fff00000c5f10200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.523584] ==================================================================
[   36.811448] ==================================================================
[   36.812293] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3dd8/0x4858
[   36.813169] Read of size 4 at addr fff00000c5f10130 by task kunit_try_catch/254
[   36.814150] 
[   36.814612] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241126 #1
[   36.815591] Tainted: [B]=BAD_PAGE, [N]=TEST
[   36.816279] Hardware name: linux,dummy-virt (DT)
[   36.817005] Call trace:
[   36.817480]  show_stack+0x20/0x38 (C)
[   36.818152]  dump_stack_lvl+0x8c/0xd0
[   36.818744]  print_report+0x118/0x5e0
[   36.819457]  kasan_report+0xc8/0x118
[   36.820011]  __asan_report_load4_noabort+0x20/0x30
[   36.820829]  kasan_atomics_helper+0x3dd8/0x4858
[   36.821508]  kasan_atomics+0x198/0x2e8
[   36.822176]  kunit_try_run_case+0x14c/0x3d0
[   36.822918]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.823622]  kthread+0x24c/0x2d0
[   36.824277]  ret_from_fork+0x10/0x20
[   36.824912] 
[   36.825330] Allocated by task 254:
[   36.825917]  kasan_save_stack+0x3c/0x68
[   36.826555]  kasan_save_track+0x20/0x40
[   36.827235]  kasan_save_alloc_info+0x40/0x58
[   36.827934]  __kasan_kmalloc+0xd4/0xd8
[   36.828488]  __kmalloc_cache_noprof+0x15c/0x3c8
[   36.829302]  kasan_atomics+0xb8/0x2e8
[   36.829976]  kunit_try_run_case+0x14c/0x3d0
[   36.830751]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.831414]  kthread+0x24c/0x2d0
[   36.832051]  ret_from_fork+0x10/0x20
[   36.832706] 
[   36.833025] The buggy address belongs to the object at fff00000c5f10100
[   36.833025]  which belongs to the cache kmalloc-64 of size 64
[   36.834374] The buggy address is located 0 bytes to the right of
[   36.834374]  allocated 48-byte region [fff00000c5f10100, fff00000c5f10130)
[   36.835765] 
[   36.836158] The buggy address belongs to the physical page:
[   36.836880] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105f10
[   36.837882] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   36.838860] page_type: f5(slab)
[   36.839407] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   36.840422] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   36.841370] page dumped because: kasan: bad access detected
[   36.842202] 
[   36.842615] Memory state around the buggy address:
[   36.843371]  fff00000c5f10000: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   36.844327]  fff00000c5f10080: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   36.845249] >fff00000c5f10100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   36.846177]                                      ^
[   36.846908]  fff00000c5f10180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.847833]  fff00000c5f10200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.848690] ==================================================================
[   35.525495] ==================================================================
[   35.527080] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f7c/0x4858
[   35.528326] Write of size 4 at addr fff00000c5f10130 by task kunit_try_catch/254
[   35.529458] 
[   35.529897] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241126 #1
[   35.530970] Tainted: [B]=BAD_PAGE, [N]=TEST
[   35.531701] Hardware name: linux,dummy-virt (DT)
[   35.532365] Call trace:
[   35.532923]  show_stack+0x20/0x38 (C)
[   35.533991]  dump_stack_lvl+0x8c/0xd0
[   35.534641]  print_report+0x118/0x5e0
[   35.535306]  kasan_report+0xc8/0x118
[   35.535973]  __asan_report_store4_noabort+0x20/0x30
[   35.536772]  kasan_atomics_helper+0x3f7c/0x4858
[   35.537501]  kasan_atomics+0x198/0x2e8
[   35.538440]  kunit_try_run_case+0x14c/0x3d0
[   35.539140]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.539895]  kthread+0x24c/0x2d0
[   35.540572]  ret_from_fork+0x10/0x20
[   35.541178] 
[   35.541511] Allocated by task 254:
[   35.542044]  kasan_save_stack+0x3c/0x68
[   35.542942]  kasan_save_track+0x20/0x40
[   35.543550]  kasan_save_alloc_info+0x40/0x58
[   35.544187]  __kasan_kmalloc+0xd4/0xd8
[   35.544891]  __kmalloc_cache_noprof+0x15c/0x3c8
[   35.546608]  kasan_atomics+0xb8/0x2e8
[   35.547114]  kunit_try_run_case+0x14c/0x3d0
[   35.547871]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.548716]  kthread+0x24c/0x2d0
[   35.549309]  ret_from_fork+0x10/0x20
[   35.550199] 
[   35.550503] The buggy address belongs to the object at fff00000c5f10100
[   35.550503]  which belongs to the cache kmalloc-64 of size 64
[   35.551668] The buggy address is located 0 bytes to the right of
[   35.551668]  allocated 48-byte region [fff00000c5f10100, fff00000c5f10130)
[   35.553100] 
[   35.553544] The buggy address belongs to the physical page:
[   35.554580] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105f10
[   35.555417] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   35.556342] page_type: f5(slab)
[   35.556818] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   35.557975] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   35.559016] page dumped because: kasan: bad access detected
[   35.559720] 
[   35.560084] Memory state around the buggy address:
[   35.560859]  fff00000c5f10000: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   35.561906]  fff00000c5f10080: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   35.562904] >fff00000c5f10100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   35.563766]                                      ^
[   35.564438]  fff00000c5f10180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.565338]  fff00000c5f10200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.566588] ==================================================================
[   36.221519] ==================================================================
[   36.222440] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x7cc/0x4858
[   36.223663] Write of size 4 at addr fff00000c5f10130 by task kunit_try_catch/254
[   36.224461] 
[   36.224956] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241126 #1
[   36.226301] Tainted: [B]=BAD_PAGE, [N]=TEST
[   36.226982] Hardware name: linux,dummy-virt (DT)
[   36.227519] Call trace:
[   36.228008]  show_stack+0x20/0x38 (C)
[   36.228771]  dump_stack_lvl+0x8c/0xd0
[   36.229371]  print_report+0x118/0x5e0
[   36.230081]  kasan_report+0xc8/0x118
[   36.230774]  kasan_check_range+0x100/0x1a8
[   36.231501]  __kasan_check_write+0x20/0x30
[   36.232195]  kasan_atomics_helper+0x7cc/0x4858
[   36.233000]  kasan_atomics+0x198/0x2e8
[   36.233711]  kunit_try_run_case+0x14c/0x3d0
[   36.234454]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.235232]  kthread+0x24c/0x2d0
[   36.235910]  ret_from_fork+0x10/0x20
[   36.236625] 
[   36.237037] Allocated by task 254:
[   36.237544]  kasan_save_stack+0x3c/0x68
[   36.238179]  kasan_save_track+0x20/0x40
[   36.238834]  kasan_save_alloc_info+0x40/0x58
[   36.239609]  __kasan_kmalloc+0xd4/0xd8
[   36.240217]  __kmalloc_cache_noprof+0x15c/0x3c8
[   36.240938]  kasan_atomics+0xb8/0x2e8
[   36.241551]  kunit_try_run_case+0x14c/0x3d0
[   36.242172]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.242997]  kthread+0x24c/0x2d0
[   36.243578]  ret_from_fork+0x10/0x20
[   36.244067] 
[   36.244457] The buggy address belongs to the object at fff00000c5f10100
[   36.244457]  which belongs to the cache kmalloc-64 of size 64
[   36.245765] The buggy address is located 0 bytes to the right of
[   36.245765]  allocated 48-byte region [fff00000c5f10100, fff00000c5f10130)
[   36.247138] 
[   36.247509] The buggy address belongs to the physical page:
[   36.248299] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105f10
[   36.249807] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   36.250484] page_type: f5(slab)
[   36.251152] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   36.252251] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   36.253344] page dumped because: kasan: bad access detected
[   36.254251] 
[   36.254806] Memory state around the buggy address:
[   36.255482]  fff00000c5f10000: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   36.256394]  fff00000c5f10080: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   36.257297] >fff00000c5f10100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   36.258067]                                      ^
[   36.258696]  fff00000c5f10180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.259641]  fff00000c5f10200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.260395] ==================================================================
[   36.141219] ==================================================================
[   36.142034] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x6ec/0x4858
[   36.142965] Write of size 4 at addr fff00000c5f10130 by task kunit_try_catch/254
[   36.143969] 
[   36.144420] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241126 #1
[   36.145627] Tainted: [B]=BAD_PAGE, [N]=TEST
[   36.146173] Hardware name: linux,dummy-virt (DT)
[   36.146907] Call trace:
[   36.147324]  show_stack+0x20/0x38 (C)
[   36.148013]  dump_stack_lvl+0x8c/0xd0
[   36.148739]  print_report+0x118/0x5e0
[   36.149380]  kasan_report+0xc8/0x118
[   36.150021]  kasan_check_range+0x100/0x1a8
[   36.150703]  __kasan_check_write+0x20/0x30
[   36.151442]  kasan_atomics_helper+0x6ec/0x4858
[   36.152215]  kasan_atomics+0x198/0x2e8
[   36.152920]  kunit_try_run_case+0x14c/0x3d0
[   36.153682]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.154348]  kthread+0x24c/0x2d0
[   36.155019]  ret_from_fork+0x10/0x20
[   36.155744] 
[   36.156059] Allocated by task 254:
[   36.156673]  kasan_save_stack+0x3c/0x68
[   36.157389]  kasan_save_track+0x20/0x40
[   36.158072]  kasan_save_alloc_info+0x40/0x58
[   36.158749]  __kasan_kmalloc+0xd4/0xd8
[   36.159397]  __kmalloc_cache_noprof+0x15c/0x3c8
[   36.160124]  kasan_atomics+0xb8/0x2e8
[   36.160788]  kunit_try_run_case+0x14c/0x3d0
[   36.161497]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.162205]  kthread+0x24c/0x2d0
[   36.162841]  ret_from_fork+0x10/0x20
[   36.163430] 
[   36.163833] The buggy address belongs to the object at fff00000c5f10100
[   36.163833]  which belongs to the cache kmalloc-64 of size 64
[   36.165196] The buggy address is located 0 bytes to the right of
[   36.165196]  allocated 48-byte region [fff00000c5f10100, fff00000c5f10130)
[   36.166561] 
[   36.166952] The buggy address belongs to the physical page:
[   36.167739] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105f10
[   36.168747] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   36.169614] page_type: f5(slab)
[   36.170212] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   36.171146] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   36.172079] page dumped because: kasan: bad access detected
[   36.172806] 
[   36.173162] Memory state around the buggy address:
[   36.173873]  fff00000c5f10000: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   36.174796]  fff00000c5f10080: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   36.175680] >fff00000c5f10100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   36.176545]                                      ^
[   36.177194]  fff00000c5f10180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.178096]  fff00000c5f10200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.178956] ==================================================================
[   37.080502] ==================================================================
[   37.081313] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xeb8/0x4858
[   37.082345] Write of size 8 at addr fff00000c5f10130 by task kunit_try_catch/254
[   37.083226] 
[   37.083687] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241126 #1
[   37.084897] Tainted: [B]=BAD_PAGE, [N]=TEST
[   37.085446] Hardware name: linux,dummy-virt (DT)
[   37.086128] Call trace:
[   37.086698]  show_stack+0x20/0x38 (C)
[   37.087401]  dump_stack_lvl+0x8c/0xd0
[   37.088007]  print_report+0x118/0x5e0
[   37.088699]  kasan_report+0xc8/0x118
[   37.089284]  kasan_check_range+0x100/0x1a8
[   37.089915]  __kasan_check_write+0x20/0x30
[   37.090456]  kasan_atomics_helper+0xeb8/0x4858
[   37.091190]  kasan_atomics+0x198/0x2e8
[   37.091856]  kunit_try_run_case+0x14c/0x3d0
[   37.092598]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.093412]  kthread+0x24c/0x2d0
[   37.094050]  ret_from_fork+0x10/0x20
[   37.094663] 
[   37.095009] Allocated by task 254:
[   37.095435]  kasan_save_stack+0x3c/0x68
[   37.096093]  kasan_save_track+0x20/0x40
[   37.096756]  kasan_save_alloc_info+0x40/0x58
[   37.097427]  __kasan_kmalloc+0xd4/0xd8
[   37.098017]  __kmalloc_cache_noprof+0x15c/0x3c8
[   37.098724]  kasan_atomics+0xb8/0x2e8
[   37.099205]  kunit_try_run_case+0x14c/0x3d0
[   37.099894]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.100545]  kthread+0x24c/0x2d0
[   37.101067]  ret_from_fork+0x10/0x20
[   37.101692] 
[   37.102060] The buggy address belongs to the object at fff00000c5f10100
[   37.102060]  which belongs to the cache kmalloc-64 of size 64
[   37.103371] The buggy address is located 0 bytes to the right of
[   37.103371]  allocated 48-byte region [fff00000c5f10100, fff00000c5f10130)
[   37.104672] 
[   37.105063] The buggy address belongs to the physical page:
[   37.105684] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105f10
[   37.106707] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   37.107608] page_type: f5(slab)
[   37.108193] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   37.109091] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   37.109945] page dumped because: kasan: bad access detected
[   37.110577] 
[   37.110956] Memory state around the buggy address:
[   37.111669]  fff00000c5f10000: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   37.112352]  fff00000c5f10080: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   37.113289] >fff00000c5f10100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   37.114073]                                      ^
[   37.114671]  fff00000c5f10180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.115608]  fff00000c5f10200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.116450] ==================================================================
[   37.689468] ==================================================================
[   37.690702] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x154c/0x4858
[   37.692393] Write of size 8 at addr fff00000c5f10130 by task kunit_try_catch/254
[   37.693682] 
[   37.694403] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241126 #1
[   37.695635] Tainted: [B]=BAD_PAGE, [N]=TEST
[   37.696304] Hardware name: linux,dummy-virt (DT)
[   37.696914] Call trace:
[   37.697424]  show_stack+0x20/0x38 (C)
[   37.698127]  dump_stack_lvl+0x8c/0xd0
[   37.698719]  print_report+0x118/0x5e0
[   37.699400]  kasan_report+0xc8/0x118
[   37.700003]  kasan_check_range+0x100/0x1a8
[   37.700754]  __kasan_check_write+0x20/0x30
[   37.701352]  kasan_atomics_helper+0x154c/0x4858
[   37.702157]  kasan_atomics+0x198/0x2e8
[   37.702780]  kunit_try_run_case+0x14c/0x3d0
[   37.703542]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.704242]  kthread+0x24c/0x2d0
[   37.704920]  ret_from_fork+0x10/0x20
[   37.705513] 
[   37.705944] Allocated by task 254:
[   37.706445]  kasan_save_stack+0x3c/0x68
[   37.707127]  kasan_save_track+0x20/0x40
[   37.707761]  kasan_save_alloc_info+0x40/0x58
[   37.708374]  __kasan_kmalloc+0xd4/0xd8
[   37.709042]  __kmalloc_cache_noprof+0x15c/0x3c8
[   37.709699]  kasan_atomics+0xb8/0x2e8
[   37.710311]  kunit_try_run_case+0x14c/0x3d0
[   37.711033]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.711713]  kthread+0x24c/0x2d0
[   37.712337]  ret_from_fork+0x10/0x20
[   37.712937] 
[   37.713333] The buggy address belongs to the object at fff00000c5f10100
[   37.713333]  which belongs to the cache kmalloc-64 of size 64
[   37.714626] The buggy address is located 0 bytes to the right of
[   37.714626]  allocated 48-byte region [fff00000c5f10100, fff00000c5f10130)
[   37.716077] 
[   37.716513] The buggy address belongs to the physical page:
[   37.717244] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105f10
[   37.718158] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   37.718893] page_type: f5(slab)
[   37.719474] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   37.720414] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   37.721364] page dumped because: kasan: bad access detected
[   37.722019] 
[   37.722434] Memory state around the buggy address:
[   37.723091]  fff00000c5f10000: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   37.724058]  fff00000c5f10080: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   37.724940] >fff00000c5f10100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   37.725805]                                      ^
[   37.726454]  fff00000c5f10180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.727346]  fff00000c5f10200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.728230] ==================================================================
[   35.740046] ==================================================================
[   35.740878] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x32c/0x4858
[   35.742723] Write of size 4 at addr fff00000c5f10130 by task kunit_try_catch/254
[   35.743407] 
[   35.743840] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241126 #1
[   35.745103] Tainted: [B]=BAD_PAGE, [N]=TEST
[   35.745839] Hardware name: linux,dummy-virt (DT)
[   35.746547] Call trace:
[   35.747003]  show_stack+0x20/0x38 (C)
[   35.747751]  dump_stack_lvl+0x8c/0xd0
[   35.748302]  print_report+0x118/0x5e0
[   35.749012]  kasan_report+0xc8/0x118
[   35.749939]  kasan_check_range+0x100/0x1a8
[   35.750652]  __kasan_check_write+0x20/0x30
[   35.751234]  kasan_atomics_helper+0x32c/0x4858
[   35.751965]  kasan_atomics+0x198/0x2e8
[   35.752612]  kunit_try_run_case+0x14c/0x3d0
[   35.753245]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.754278]  kthread+0x24c/0x2d0
[   35.754802]  ret_from_fork+0x10/0x20
[   35.755444] 
[   35.755830] Allocated by task 254:
[   35.756323]  kasan_save_stack+0x3c/0x68
[   35.756956]  kasan_save_track+0x20/0x40
[   35.757436]  kasan_save_alloc_info+0x40/0x58
[   35.758396]  __kasan_kmalloc+0xd4/0xd8
[   35.759033]  __kmalloc_cache_noprof+0x15c/0x3c8
[   35.759734]  kasan_atomics+0xb8/0x2e8
[   35.760306]  kunit_try_run_case+0x14c/0x3d0
[   35.761042]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.762192]  kthread+0x24c/0x2d0
[   35.762671]  ret_from_fork+0x10/0x20
[   35.763136] 
[   35.763728] The buggy address belongs to the object at fff00000c5f10100
[   35.763728]  which belongs to the cache kmalloc-64 of size 64
[   35.765278] The buggy address is located 0 bytes to the right of
[   35.765278]  allocated 48-byte region [fff00000c5f10100, fff00000c5f10130)
[   35.767065] 
[   35.767452] The buggy address belongs to the physical page:
[   35.768297] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105f10
[   35.769191] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   35.769903] page_type: f5(slab)
[   35.770544] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   35.771471] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   35.772379] page dumped because: kasan: bad access detected
[   35.773041] 
[   35.773454] Memory state around the buggy address:
[   35.774255]  fff00000c5f10000: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   35.775345]  fff00000c5f10080: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   35.776199] >fff00000c5f10100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   35.777088]                                      ^
[   35.777807]  fff00000c5f10180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.778831]  fff00000c5f10200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.779898] ==================================================================
[   37.729926] ==================================================================
[   37.730874] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x15b4/0x4858
[   37.731757] Write of size 8 at addr fff00000c5f10130 by task kunit_try_catch/254
[   37.732600] 
[   37.733046] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241126 #1
[   37.734311] Tainted: [B]=BAD_PAGE, [N]=TEST
[   37.734849] Hardware name: linux,dummy-virt (DT)
[   37.735578] Call trace:
[   37.736032]  show_stack+0x20/0x38 (C)
[   37.736761]  dump_stack_lvl+0x8c/0xd0
[   37.737392]  print_report+0x118/0x5e0
[   37.738071]  kasan_report+0xc8/0x118
[   37.738775]  kasan_check_range+0x100/0x1a8
[   37.739514]  __kasan_check_write+0x20/0x30
[   37.740436]  kasan_atomics_helper+0x15b4/0x4858
[   37.741327]  kasan_atomics+0x198/0x2e8
[   37.741934]  kunit_try_run_case+0x14c/0x3d0
[   37.742968]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.743690]  kthread+0x24c/0x2d0
[   37.744209]  ret_from_fork+0x10/0x20
[   37.744808] 
[   37.745188] Allocated by task 254:
[   37.745654]  kasan_save_stack+0x3c/0x68
[   37.746290]  kasan_save_track+0x20/0x40
[   37.746934]  kasan_save_alloc_info+0x40/0x58
[   37.747633]  __kasan_kmalloc+0xd4/0xd8
[   37.748186]  __kmalloc_cache_noprof+0x15c/0x3c8
[   37.748917]  kasan_atomics+0xb8/0x2e8
[   37.749439]  kunit_try_run_case+0x14c/0x3d0
[   37.750167]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.750999]  kthread+0x24c/0x2d0
[   37.751612]  ret_from_fork+0x10/0x20
[   37.752249] 
[   37.752674] The buggy address belongs to the object at fff00000c5f10100
[   37.752674]  which belongs to the cache kmalloc-64 of size 64
[   37.753979] The buggy address is located 0 bytes to the right of
[   37.753979]  allocated 48-byte region [fff00000c5f10100, fff00000c5f10130)
[   37.755231] 
[   37.755597] The buggy address belongs to the physical page:
[   37.756210] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105f10
[   37.757176] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   37.757947] page_type: f5(slab)
[   37.758467] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   37.759390] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   37.760263] page dumped because: kasan: bad access detected
[   37.760879] 
[   37.761260] Memory state around the buggy address:
[   37.761970]  fff00000c5f10000: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   37.762799]  fff00000c5f10080: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   37.763514] >fff00000c5f10100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   37.764465]                                      ^
[   37.765038]  fff00000c5f10180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.765845]  fff00000c5f10200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.766636] ==================================================================
[   36.574003] ==================================================================
[   36.574729] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xb70/0x4858
[   36.575520] Write of size 4 at addr fff00000c5f10130 by task kunit_try_catch/254
[   36.576314] 
[   36.576735] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241126 #1
[   36.579769] Tainted: [B]=BAD_PAGE, [N]=TEST
[   36.580572] Hardware name: linux,dummy-virt (DT)
[   36.581126] Call trace:
[   36.581964]  show_stack+0x20/0x38 (C)
[   36.582608]  dump_stack_lvl+0x8c/0xd0
[   36.583223]  print_report+0x118/0x5e0
[   36.583780]  kasan_report+0xc8/0x118
[   36.584335]  kasan_check_range+0x100/0x1a8
[   36.586274]  __kasan_check_write+0x20/0x30
[   36.588139]  kasan_atomics_helper+0xb70/0x4858
[   36.589785]  kasan_atomics+0x198/0x2e8
[   36.590678]  kunit_try_run_case+0x14c/0x3d0
[   36.592429]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.594094]  kthread+0x24c/0x2d0
[   36.595499]  ret_from_fork+0x10/0x20
[   36.597064] 
[   36.598090] Allocated by task 254:
[   36.599518]  kasan_save_stack+0x3c/0x68
[   36.600926]  kasan_save_track+0x20/0x40
[   36.601426]  kasan_save_alloc_info+0x40/0x58
[   36.603470]  __kasan_kmalloc+0xd4/0xd8
[   36.605027]  __kmalloc_cache_noprof+0x15c/0x3c8
[   36.606558]  kasan_atomics+0xb8/0x2e8
[   36.608109]  kunit_try_run_case+0x14c/0x3d0
[   36.609721]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.611489]  kthread+0x24c/0x2d0
[   36.612928]  ret_from_fork+0x10/0x20
[   36.613428] 
[   36.613770] The buggy address belongs to the object at fff00000c5f10100
[   36.613770]  which belongs to the cache kmalloc-64 of size 64
[   36.616588] The buggy address is located 0 bytes to the right of
[   36.616588]  allocated 48-byte region [fff00000c5f10100, fff00000c5f10130)
[   36.620036] 
[   36.620888] The buggy address belongs to the physical page:
[   36.622834] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105f10
[   36.624925] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   36.626949] page_type: f5(slab)
[   36.628415] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   36.630550] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   36.632698] page dumped because: kasan: bad access detected
[   36.634519] 
[   36.635450] Memory state around the buggy address:
[   36.635999]  fff00000c5f10000: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   36.638472]  fff00000c5f10080: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   36.640174] >fff00000c5f10100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   36.642213]                                      ^
[   36.643792]  fff00000c5f10180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.645772]  fff00000c5f10200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.647746] ==================================================================
[   36.651640] ==================================================================
[   36.654800] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3dbc/0x4858
[   36.655472] Read of size 4 at addr fff00000c5f10130 by task kunit_try_catch/254
[   36.656191] 
[   36.658635] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241126 #1
[   36.660465] Tainted: [B]=BAD_PAGE, [N]=TEST
[   36.661660] Hardware name: linux,dummy-virt (DT)
[   36.662176] Call trace:
[   36.663686]  show_stack+0x20/0x38 (C)
[   36.665096]  dump_stack_lvl+0x8c/0xd0
[   36.666567]  print_report+0x118/0x5e0
[   36.667364]  kasan_report+0xc8/0x118
[   36.668222]  __asan_report_load4_noabort+0x20/0x30
[   36.669066]  kasan_atomics_helper+0x3dbc/0x4858
[   36.669758]  kasan_atomics+0x198/0x2e8
[   36.670410]  kunit_try_run_case+0x14c/0x3d0
[   36.671080]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.671880]  kthread+0x24c/0x2d0
[   36.672389]  ret_from_fork+0x10/0x20
[   36.672923] 
[   36.673228] Allocated by task 254:
[   36.673676]  kasan_save_stack+0x3c/0x68
[   36.674156]  kasan_save_track+0x20/0x40
[   36.674828]  kasan_save_alloc_info+0x40/0x58
[   36.675553]  __kasan_kmalloc+0xd4/0xd8
[   36.676178]  __kmalloc_cache_noprof+0x15c/0x3c8
[   36.676915]  kasan_atomics+0xb8/0x2e8
[   36.677575]  kunit_try_run_case+0x14c/0x3d0
[   36.678253]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.678839]  kthread+0x24c/0x2d0
[   36.679438]  ret_from_fork+0x10/0x20
[   36.680066] 
[   36.680470] The buggy address belongs to the object at fff00000c5f10100
[   36.680470]  which belongs to the cache kmalloc-64 of size 64
[   36.681494] The buggy address is located 0 bytes to the right of
[   36.681494]  allocated 48-byte region [fff00000c5f10100, fff00000c5f10130)
[   36.683044] 
[   36.683430] The buggy address belongs to the physical page:
[   36.684181] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105f10
[   36.684943] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   36.685834] page_type: f5(slab)
[   36.686414] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   36.687419] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   36.688810] page dumped because: kasan: bad access detected
[   36.690145] 
[   36.690734] Memory state around the buggy address:
[   36.691564]  fff00000c5f10000: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   36.692610]  fff00000c5f10080: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   36.693406] >fff00000c5f10100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   36.694310]                                      ^
[   36.694950]  fff00000c5f10180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.695722]  fff00000c5f10200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.696573] ==================================================================
[   35.862695] ==================================================================
[   35.863967] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x414/0x4858
[   35.865377] Write of size 4 at addr fff00000c5f10130 by task kunit_try_catch/254
[   35.866621] 
[   35.867030] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241126 #1
[   35.868294] Tainted: [B]=BAD_PAGE, [N]=TEST
[   35.868865] Hardware name: linux,dummy-virt (DT)
[   35.869504] Call trace:
[   35.869997]  show_stack+0x20/0x38 (C)
[   35.870620]  dump_stack_lvl+0x8c/0xd0
[   35.871152]  print_report+0x118/0x5e0
[   35.871823]  kasan_report+0xc8/0x118
[   35.872375]  kasan_check_range+0x100/0x1a8
[   35.873066]  __kasan_check_write+0x20/0x30
[   35.873780]  kasan_atomics_helper+0x414/0x4858
[   35.874496]  kasan_atomics+0x198/0x2e8
[   35.875056]  kunit_try_run_case+0x14c/0x3d0
[   35.875774]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.876620]  kthread+0x24c/0x2d0
[   35.877209]  ret_from_fork+0x10/0x20
[   35.877882] 
[   35.878255] Allocated by task 254:
[   35.878811]  kasan_save_stack+0x3c/0x68
[   35.879479]  kasan_save_track+0x20/0x40
[   35.880115]  kasan_save_alloc_info+0x40/0x58
[   35.880769]  __kasan_kmalloc+0xd4/0xd8
[   35.881388]  __kmalloc_cache_noprof+0x15c/0x3c8
[   35.882004]  kasan_atomics+0xb8/0x2e8
[   35.882655]  kunit_try_run_case+0x14c/0x3d0
[   35.883183]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.884408]  kthread+0x24c/0x2d0
[   35.885141]  ret_from_fork+0x10/0x20
[   35.885849] 
[   35.886262] The buggy address belongs to the object at fff00000c5f10100
[   35.886262]  which belongs to the cache kmalloc-64 of size 64
[   35.887654] The buggy address is located 0 bytes to the right of
[   35.887654]  allocated 48-byte region [fff00000c5f10100, fff00000c5f10130)
[   35.889217] 
[   35.889681] The buggy address belongs to the physical page:
[   35.890316] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105f10
[   35.891409] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   35.892297] page_type: f5(slab)
[   35.892882] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   35.893900] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   35.894862] page dumped because: kasan: bad access detected
[   35.895679] 
[   35.896072] Memory state around the buggy address:
[   35.896870]  fff00000c5f10000: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   35.897831]  fff00000c5f10080: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   35.898764] >fff00000c5f10100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   35.899761]                                      ^
[   35.900474]  fff00000c5f10180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.901414]  fff00000c5f10200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.902358] ==================================================================
[   37.959057] ==================================================================
[   37.959974] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x175c/0x4858
[   37.961208] Write of size 8 at addr fff00000c5f10130 by task kunit_try_catch/254
[   37.962271] 
[   37.962704] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241126 #1
[   37.964081] Tainted: [B]=BAD_PAGE, [N]=TEST
[   37.964726] Hardware name: linux,dummy-virt (DT)
[   37.965557] Call trace:
[   37.966194]  show_stack+0x20/0x38 (C)
[   37.966959]  dump_stack_lvl+0x8c/0xd0
[   37.967752]  print_report+0x118/0x5e0
[   37.968385]  kasan_report+0xc8/0x118
[   37.969228]  kasan_check_range+0x100/0x1a8
[   37.969680]  __kasan_check_write+0x20/0x30
[   37.970367]  kasan_atomics_helper+0x175c/0x4858
[   37.971226]  kasan_atomics+0x198/0x2e8
[   37.971853]  kunit_try_run_case+0x14c/0x3d0
[   37.972613]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.973406]  kthread+0x24c/0x2d0
[   37.974064]  ret_from_fork+0x10/0x20
[   37.974716] 
[   37.975093] Allocated by task 254:
[   37.975729]  kasan_save_stack+0x3c/0x68
[   37.976304]  kasan_save_track+0x20/0x40
[   37.976997]  kasan_save_alloc_info+0x40/0x58
[   37.977737]  __kasan_kmalloc+0xd4/0xd8
[   37.978385]  __kmalloc_cache_noprof+0x15c/0x3c8
[   37.979174]  kasan_atomics+0xb8/0x2e8
[   37.979797]  kunit_try_run_case+0x14c/0x3d0
[   37.980409]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.981248]  kthread+0x24c/0x2d0
[   37.981834]  ret_from_fork+0x10/0x20
[   37.982481] 
[   37.982880] The buggy address belongs to the object at fff00000c5f10100
[   37.982880]  which belongs to the cache kmalloc-64 of size 64
[   37.984212] The buggy address is located 0 bytes to the right of
[   37.984212]  allocated 48-byte region [fff00000c5f10100, fff00000c5f10130)
[   37.985605] 
[   37.986026] The buggy address belongs to the physical page:
[   37.986652] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105f10
[   37.987765] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   37.988486] page_type: f5(slab)
[   37.989111] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   37.989940] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   37.990996] page dumped because: kasan: bad access detected
[   37.991804] 
[   37.992188] Memory state around the buggy address:
[   37.992721]  fff00000c5f10000: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   37.993663]  fff00000c5f10080: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   37.994448] >fff00000c5f10100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   37.995207]                                      ^
[   37.995933]  fff00000c5f10180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.996812]  fff00000c5f10200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.997698] ==================================================================
[   36.774802] ==================================================================
[   36.775747] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xca0/0x4858
[   36.776463] Write of size 4 at addr fff00000c5f10130 by task kunit_try_catch/254
[   36.777406] 
[   36.777843] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241126 #1
[   36.779014] Tainted: [B]=BAD_PAGE, [N]=TEST
[   36.779658] Hardware name: linux,dummy-virt (DT)
[   36.780267] Call trace:
[   36.780664]  show_stack+0x20/0x38 (C)
[   36.781313]  dump_stack_lvl+0x8c/0xd0
[   36.781985]  print_report+0x118/0x5e0
[   36.782483]  kasan_report+0xc8/0x118
[   36.783162]  kasan_check_range+0x100/0x1a8
[   36.783817]  __kasan_check_write+0x20/0x30
[   36.784499]  kasan_atomics_helper+0xca0/0x4858
[   36.785233]  kasan_atomics+0x198/0x2e8
[   36.785945]  kunit_try_run_case+0x14c/0x3d0
[   36.786518]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.787311]  kthread+0x24c/0x2d0
[   36.787903]  ret_from_fork+0x10/0x20
[   36.788493] 
[   36.788888] Allocated by task 254:
[   36.789406]  kasan_save_stack+0x3c/0x68
[   36.789981]  kasan_save_track+0x20/0x40
[   36.790642]  kasan_save_alloc_info+0x40/0x58
[   36.791293]  __kasan_kmalloc+0xd4/0xd8
[   36.791942]  __kmalloc_cache_noprof+0x15c/0x3c8
[   36.792614]  kasan_atomics+0xb8/0x2e8
[   36.793172]  kunit_try_run_case+0x14c/0x3d0
[   36.793902]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.794631]  kthread+0x24c/0x2d0
[   36.795210]  ret_from_fork+0x10/0x20
[   36.795715] 
[   36.796096] The buggy address belongs to the object at fff00000c5f10100
[   36.796096]  which belongs to the cache kmalloc-64 of size 64
[   36.797287] The buggy address is located 0 bytes to the right of
[   36.797287]  allocated 48-byte region [fff00000c5f10100, fff00000c5f10130)
[   36.798645] 
[   36.799024] The buggy address belongs to the physical page:
[   36.799778] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105f10
[   36.800645] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   36.801437] page_type: f5(slab)
[   36.802031] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   36.803005] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   36.803841] page dumped because: kasan: bad access detected
[   36.804614] 
[   36.804993] Memory state around the buggy address:
[   36.805696]  fff00000c5f10000: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   36.806494]  fff00000c5f10080: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   36.807264] >fff00000c5f10100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   36.808190]                                      ^
[   36.808825]  fff00000c5f10180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.809358]  fff00000c5f10200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.810040] ==================================================================
[   35.655480] ==================================================================
[   35.656402] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x2b0/0x4858
[   35.657176] Read of size 4 at addr fff00000c5f10130 by task kunit_try_catch/254
[   35.658996] 
[   35.659404] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241126 #1
[   35.660499] Tainted: [B]=BAD_PAGE, [N]=TEST
[   35.661139] Hardware name: linux,dummy-virt (DT)
[   35.662204] Call trace:
[   35.662667]  show_stack+0x20/0x38 (C)
[   35.663209]  dump_stack_lvl+0x8c/0xd0
[   35.663887]  print_report+0x118/0x5e0
[   35.664549]  kasan_report+0xc8/0x118
[   35.665082]  kasan_check_range+0x100/0x1a8
[   35.665785]  __kasan_check_read+0x20/0x30
[   35.666373]  kasan_atomics_helper+0x2b0/0x4858
[   35.667358]  kasan_atomics+0x198/0x2e8
[   35.667972]  kunit_try_run_case+0x14c/0x3d0
[   35.668626]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.669275]  kthread+0x24c/0x2d0
[   35.670184]  ret_from_fork+0x10/0x20
[   35.670858] 
[   35.671214] Allocated by task 254:
[   35.671808]  kasan_save_stack+0x3c/0x68
[   35.672412]  kasan_save_track+0x20/0x40
[   35.672969]  kasan_save_alloc_info+0x40/0x58
[   35.674732]  __kasan_kmalloc+0xd4/0xd8
[   35.675323]  __kmalloc_cache_noprof+0x15c/0x3c8
[   35.675913]  kasan_atomics+0xb8/0x2e8
[   35.676867]  kunit_try_run_case+0x14c/0x3d0
[   35.677447]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.678389]  kthread+0x24c/0x2d0
[   35.679170]  ret_from_fork+0x10/0x20
[   35.679917] 
[   35.680341] The buggy address belongs to the object at fff00000c5f10100
[   35.680341]  which belongs to the cache kmalloc-64 of size 64
[   35.681729] The buggy address is located 0 bytes to the right of
[   35.681729]  allocated 48-byte region [fff00000c5f10100, fff00000c5f10130)
[   35.683361] 
[   35.683777] The buggy address belongs to the physical page:
[   35.684684] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105f10
[   35.685962] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   35.686727] page_type: f5(slab)
[   35.687299] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   35.688127] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   35.689156] page dumped because: kasan: bad access detected
[   35.690146] 
[   35.690510] Memory state around the buggy address:
[   35.691116]  fff00000c5f10000: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   35.692036]  fff00000c5f10080: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   35.692840] >fff00000c5f10100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   35.693987]                                      ^
[   35.694713]  fff00000c5f10180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.695514]  fff00000c5f10200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.696840] ==================================================================
[   37.843561] ==================================================================
[   37.844353] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3df4/0x4858
[   37.844990] Read of size 8 at addr fff00000c5f10130 by task kunit_try_catch/254
[   37.845925] 
[   37.846752] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241126 #1
[   37.848031] Tainted: [B]=BAD_PAGE, [N]=TEST
[   37.848603] Hardware name: linux,dummy-virt (DT)
[   37.849271] Call trace:
[   37.849763]  show_stack+0x20/0x38 (C)
[   37.850377]  dump_stack_lvl+0x8c/0xd0
[   37.851048]  print_report+0x118/0x5e0
[   37.851705]  kasan_report+0xc8/0x118
[   37.852265]  __asan_report_load8_noabort+0x20/0x30
[   37.853023]  kasan_atomics_helper+0x3df4/0x4858
[   37.853689]  kasan_atomics+0x198/0x2e8
[   37.854335]  kunit_try_run_case+0x14c/0x3d0
[   37.855037]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.855679]  kthread+0x24c/0x2d0
[   37.856277]  ret_from_fork+0x10/0x20
[   37.856931] 
[   37.857273] Allocated by task 254:
[   37.857855]  kasan_save_stack+0x3c/0x68
[   37.858492]  kasan_save_track+0x20/0x40
[   37.859093]  kasan_save_alloc_info+0x40/0x58
[   37.859796]  __kasan_kmalloc+0xd4/0xd8
[   37.860368]  __kmalloc_cache_noprof+0x15c/0x3c8
[   37.861091]  kasan_atomics+0xb8/0x2e8
[   37.861742]  kunit_try_run_case+0x14c/0x3d0
[   37.862298]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.863105]  kthread+0x24c/0x2d0
[   37.863715]  ret_from_fork+0x10/0x20
[   37.864243] 
[   37.864603] The buggy address belongs to the object at fff00000c5f10100
[   37.864603]  which belongs to the cache kmalloc-64 of size 64
[   37.865892] The buggy address is located 0 bytes to the right of
[   37.865892]  allocated 48-byte region [fff00000c5f10100, fff00000c5f10130)
[   37.867238] 
[   37.867579] The buggy address belongs to the physical page:
[   37.868346] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105f10
[   37.869319] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   37.870059] page_type: f5(slab)
[   37.870650] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   37.871497] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   37.872389] page dumped because: kasan: bad access detected
[   37.872974] 
[   37.873345] Memory state around the buggy address:
[   37.874037]  fff00000c5f10000: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   37.874935]  fff00000c5f10080: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   37.875771] >fff00000c5f10100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   37.876619]                                      ^
[   37.877315]  fff00000c5f10180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.878129]  fff00000c5f10200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.878958] ==================================================================
[   37.043863] ==================================================================
[   37.045328] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e5c/0x4858
[   37.046411] Write of size 8 at addr fff00000c5f10130 by task kunit_try_catch/254
[   37.047102] 
[   37.047515] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241126 #1
[   37.048683] Tainted: [B]=BAD_PAGE, [N]=TEST
[   37.049232] Hardware name: linux,dummy-virt (DT)
[   37.049745] Call trace:
[   37.050211]  show_stack+0x20/0x38 (C)
[   37.050842]  dump_stack_lvl+0x8c/0xd0
[   37.051492]  print_report+0x118/0x5e0
[   37.052008]  kasan_report+0xc8/0x118
[   37.052663]  __asan_report_store8_noabort+0x20/0x30
[   37.053378]  kasan_atomics_helper+0x3e5c/0x4858
[   37.054119]  kasan_atomics+0x198/0x2e8
[   37.054779]  kunit_try_run_case+0x14c/0x3d0
[   37.055336]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.056162]  kthread+0x24c/0x2d0
[   37.056758]  ret_from_fork+0x10/0x20
[   37.057336] 
[   37.057728] Allocated by task 254:
[   37.058285]  kasan_save_stack+0x3c/0x68
[   37.058802]  kasan_save_track+0x20/0x40
[   37.059431]  kasan_save_alloc_info+0x40/0x58
[   37.060140]  __kasan_kmalloc+0xd4/0xd8
[   37.060661]  __kmalloc_cache_noprof+0x15c/0x3c8
[   37.061369]  kasan_atomics+0xb8/0x2e8
[   37.062000]  kunit_try_run_case+0x14c/0x3d0
[   37.062628]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.063362]  kthread+0x24c/0x2d0
[   37.063874]  ret_from_fork+0x10/0x20
[   37.064495] 
[   37.064836] The buggy address belongs to the object at fff00000c5f10100
[   37.064836]  which belongs to the cache kmalloc-64 of size 64
[   37.066175] The buggy address is located 0 bytes to the right of
[   37.066175]  allocated 48-byte region [fff00000c5f10100, fff00000c5f10130)
[   37.067425] 
[   37.067833] The buggy address belongs to the physical page:
[   37.068582] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105f10
[   37.069482] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   37.070395] page_type: f5(slab)
[   37.070927] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   37.071763] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   37.072606] page dumped because: kasan: bad access detected
[   37.073338] 
[   37.073732] Memory state around the buggy address:
[   37.074325]  fff00000c5f10000: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   37.075200]  fff00000c5f10080: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   37.076047] >fff00000c5f10100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   37.076919]                                      ^
[   37.077630]  fff00000c5f10180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.078414]  fff00000c5f10200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.079152] ==================================================================
[   37.002833] ==================================================================
[   37.003643] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xe44/0x4858
[   37.004337] Write of size 8 at addr fff00000c5f10130 by task kunit_try_catch/254
[   37.005387] 
[   37.005821] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241126 #1
[   37.008012] Tainted: [B]=BAD_PAGE, [N]=TEST
[   37.008869] Hardware name: linux,dummy-virt (DT)
[   37.009590] Call trace:
[   37.010040]  show_stack+0x20/0x38 (C)
[   37.010940]  dump_stack_lvl+0x8c/0xd0
[   37.011562]  print_report+0x118/0x5e0
[   37.012210]  kasan_report+0xc8/0x118
[   37.012815]  kasan_check_range+0x100/0x1a8
[   37.013519]  __kasan_check_write+0x20/0x30
[   37.014602]  kasan_atomics_helper+0xe44/0x4858
[   37.015267]  kasan_atomics+0x198/0x2e8
[   37.015935]  kunit_try_run_case+0x14c/0x3d0
[   37.016645]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.017382]  kthread+0x24c/0x2d0
[   37.017904]  ret_from_fork+0x10/0x20
[   37.018875] 
[   37.019163] Allocated by task 254:
[   37.019782]  kasan_save_stack+0x3c/0x68
[   37.020434]  kasan_save_track+0x20/0x40
[   37.021060]  kasan_save_alloc_info+0x40/0x58
[   37.021595]  __kasan_kmalloc+0xd4/0xd8
[   37.022217]  __kmalloc_cache_noprof+0x15c/0x3c8
[   37.022803]  kasan_atomics+0xb8/0x2e8
[   37.023408]  kunit_try_run_case+0x14c/0x3d0
[   37.024085]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.024760]  kthread+0x24c/0x2d0
[   37.025333]  ret_from_fork+0x10/0x20
[   37.026141] 
[   37.027072] The buggy address belongs to the object at fff00000c5f10100
[   37.027072]  which belongs to the cache kmalloc-64 of size 64
[   37.029186] The buggy address is located 0 bytes to the right of
[   37.029186]  allocated 48-byte region [fff00000c5f10100, fff00000c5f10130)
[   37.030743] 
[   37.030991] The buggy address belongs to the physical page:
[   37.031708] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105f10
[   37.032753] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   37.033478] page_type: f5(slab)
[   37.034067] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   37.034978] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   37.035968] page dumped because: kasan: bad access detected
[   37.036625] 
[   37.037006] Memory state around the buggy address:
[   37.037714]  fff00000c5f10000: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   37.038491]  fff00000c5f10080: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   37.039439] >fff00000c5f10100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   37.040211]                                      ^
[   37.040942]  fff00000c5f10180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.041889]  fff00000c5f10200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.042703] ==================================================================
[   35.904505] ==================================================================
[   35.905169] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x47c/0x4858
[   35.906121] Write of size 4 at addr fff00000c5f10130 by task kunit_try_catch/254
[   35.907036] 
[   35.907488] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241126 #1
[   35.908621] Tainted: [B]=BAD_PAGE, [N]=TEST
[   35.909311] Hardware name: linux,dummy-virt (DT)
[   35.910063] Call trace:
[   35.910491]  show_stack+0x20/0x38 (C)
[   35.911165]  dump_stack_lvl+0x8c/0xd0
[   35.911865]  print_report+0x118/0x5e0
[   35.912490]  kasan_report+0xc8/0x118
[   35.913192]  kasan_check_range+0x100/0x1a8
[   35.913835]  __kasan_check_write+0x20/0x30
[   35.914588]  kasan_atomics_helper+0x47c/0x4858
[   35.915211]  kasan_atomics+0x198/0x2e8
[   35.915929]  kunit_try_run_case+0x14c/0x3d0
[   35.916579]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.917388]  kthread+0x24c/0x2d0
[   35.918009]  ret_from_fork+0x10/0x20
[   35.918677] 
[   35.919093] Allocated by task 254:
[   35.919607]  kasan_save_stack+0x3c/0x68
[   35.920288]  kasan_save_track+0x20/0x40
[   35.920884]  kasan_save_alloc_info+0x40/0x58
[   35.921558]  __kasan_kmalloc+0xd4/0xd8
[   35.922216]  __kmalloc_cache_noprof+0x15c/0x3c8
[   35.922831]  kasan_atomics+0xb8/0x2e8
[   35.923478]  kunit_try_run_case+0x14c/0x3d0
[   35.924140]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.924938]  kthread+0x24c/0x2d0
[   35.925568]  ret_from_fork+0x10/0x20
[   35.926136] 
[   35.926514] The buggy address belongs to the object at fff00000c5f10100
[   35.926514]  which belongs to the cache kmalloc-64 of size 64
[   35.927802] The buggy address is located 0 bytes to the right of
[   35.927802]  allocated 48-byte region [fff00000c5f10100, fff00000c5f10130)
[   35.929237] 
[   35.929674] The buggy address belongs to the physical page:
[   35.930393] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105f10
[   35.931480] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   35.932373] page_type: f5(slab)
[   35.933001] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   35.933978] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   35.934954] page dumped because: kasan: bad access detected
[   35.935641] 
[   35.936061] Memory state around the buggy address:
[   35.936727]  fff00000c5f10000: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   35.937557]  fff00000c5f10080: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   35.938501] >fff00000c5f10100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   35.939331]                                      ^
[   35.940028]  fff00000c5f10180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.940907]  fff00000c5f10200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.941802] ==================================================================
[   37.768216] ==================================================================
[   37.769083] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3db0/0x4858
[   37.770791] Read of size 8 at addr fff00000c5f10130 by task kunit_try_catch/254
[   37.771666] 
[   37.772142] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241126 #1
[   37.773321] Tainted: [B]=BAD_PAGE, [N]=TEST
[   37.773617] Hardware name: linux,dummy-virt (DT)
[   37.773886] Call trace:
[   37.774078]  show_stack+0x20/0x38 (C)
[   37.774346]  dump_stack_lvl+0x8c/0xd0
[   37.774720]  print_report+0x118/0x5e0
[   37.775653]  kasan_report+0xc8/0x118
[   37.776313]  __asan_report_load8_noabort+0x20/0x30
[   37.776983]  kasan_atomics_helper+0x3db0/0x4858
[   37.777556]  kasan_atomics+0x198/0x2e8
[   37.778207]  kunit_try_run_case+0x14c/0x3d0
[   37.778922]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.779753]  kthread+0x24c/0x2d0
[   37.780380]  ret_from_fork+0x10/0x20
[   37.781036] 
[   37.781405] Allocated by task 254:
[   37.782000]  kasan_save_stack+0x3c/0x68
[   37.782648]  kasan_save_track+0x20/0x40
[   37.783179]  kasan_save_alloc_info+0x40/0x58
[   37.783797]  __kasan_kmalloc+0xd4/0xd8
[   37.784432]  __kmalloc_cache_noprof+0x15c/0x3c8
[   37.785155]  kasan_atomics+0xb8/0x2e8
[   37.785792]  kunit_try_run_case+0x14c/0x3d0
[   37.786358]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.787162]  kthread+0x24c/0x2d0
[   37.787645]  ret_from_fork+0x10/0x20
[   37.788266] 
[   37.788650] The buggy address belongs to the object at fff00000c5f10100
[   37.788650]  which belongs to the cache kmalloc-64 of size 64
[   37.789889] The buggy address is located 0 bytes to the right of
[   37.789889]  allocated 48-byte region [fff00000c5f10100, fff00000c5f10130)
[   37.791077] 
[   37.791463] The buggy address belongs to the physical page:
[   37.792244] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105f10
[   37.793196] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   37.794098] page_type: f5(slab)
[   37.794687] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   37.795451] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   37.796435] page dumped because: kasan: bad access detected
[   37.797104] 
[   37.797479] Memory state around the buggy address:
[   37.798014]  fff00000c5f10000: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   37.798889]  fff00000c5f10080: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   37.799760] >fff00000c5f10100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   37.800616]                                      ^
[   37.801273]  fff00000c5f10180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.802162]  fff00000c5f10200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.803008] ==================================================================
[   35.611308] ==================================================================
[   35.612244] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x24c/0x4858
[   35.613170] Write of size 4 at addr fff00000c5f10130 by task kunit_try_catch/254
[   35.614828] 
[   35.615171] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241126 #1
[   35.616889] Tainted: [B]=BAD_PAGE, [N]=TEST
[   35.617548] Hardware name: linux,dummy-virt (DT)
[   35.618446] Call trace:
[   35.619040]  show_stack+0x20/0x38 (C)
[   35.619735]  dump_stack_lvl+0x8c/0xd0
[   35.620437]  print_report+0x118/0x5e0
[   35.621114]  kasan_report+0xc8/0x118
[   35.621850]  kasan_check_range+0x100/0x1a8
[   35.622724]  __kasan_check_write+0x20/0x30
[   35.623380]  kasan_atomics_helper+0x24c/0x4858
[   35.624158]  kasan_atomics+0x198/0x2e8
[   35.624828]  kunit_try_run_case+0x14c/0x3d0
[   35.625883]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.626713]  kthread+0x24c/0x2d0
[   35.627190]  ret_from_fork+0x10/0x20
[   35.627850] 
[   35.628191] Allocated by task 254:
[   35.628781]  kasan_save_stack+0x3c/0x68
[   35.629385]  kasan_save_track+0x20/0x40
[   35.630021]  kasan_save_alloc_info+0x40/0x58
[   35.631098]  __kasan_kmalloc+0xd4/0xd8
[   35.631731]  __kmalloc_cache_noprof+0x15c/0x3c8
[   35.632449]  kasan_atomics+0xb8/0x2e8
[   35.633131]  kunit_try_run_case+0x14c/0x3d0
[   35.633471]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.634375]  kthread+0x24c/0x2d0
[   35.635839]  ret_from_fork+0x10/0x20
[   35.636428] 
[   35.636830] The buggy address belongs to the object at fff00000c5f10100
[   35.636830]  which belongs to the cache kmalloc-64 of size 64
[   35.638447] The buggy address is located 0 bytes to the right of
[   35.638447]  allocated 48-byte region [fff00000c5f10100, fff00000c5f10130)
[   35.639685] 
[   35.640116] The buggy address belongs to the physical page:
[   35.640975] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105f10
[   35.642294] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   35.643214] page_type: f5(slab)
[   35.643604] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   35.644802] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   35.645654] page dumped because: kasan: bad access detected
[   35.646224] 
[   35.646861] Memory state around the buggy address:
[   35.647576]  fff00000c5f10000: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   35.648391]  fff00000c5f10080: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   35.649280] >fff00000c5f10100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   35.650458]                                      ^
[   35.651047]  fff00000c5f10180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.651918]  fff00000c5f10200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.652817] ==================================================================
[   35.985927] ==================================================================
[   35.986840] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x54c/0x4858
[   35.987666] Write of size 4 at addr fff00000c5f10130 by task kunit_try_catch/254
[   35.988485] 
[   35.988898] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241126 #1
[   35.990045] Tainted: [B]=BAD_PAGE, [N]=TEST
[   35.990680] Hardware name: linux,dummy-virt (DT)
[   35.991190] Call trace:
[   35.991681]  show_stack+0x20/0x38 (C)
[   35.992356]  dump_stack_lvl+0x8c/0xd0
[   35.992938]  print_report+0x118/0x5e0
[   35.993610]  kasan_report+0xc8/0x118
[   35.994246]  kasan_check_range+0x100/0x1a8
[   35.994807]  __kasan_check_write+0x20/0x30
[   35.995496]  kasan_atomics_helper+0x54c/0x4858
[   35.996243]  kasan_atomics+0x198/0x2e8
[   35.996803]  kunit_try_run_case+0x14c/0x3d0
[   35.997433]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.998274]  kthread+0x24c/0x2d0
[   35.998904]  ret_from_fork+0x10/0x20
[   35.999619] 
[   35.999996] Allocated by task 254:
[   36.000463]  kasan_save_stack+0x3c/0x68
[   36.001708]  kasan_save_track+0x20/0x40
[   36.002350]  kasan_save_alloc_info+0x40/0x58
[   36.002941]  __kasan_kmalloc+0xd4/0xd8
[   36.003588]  __kmalloc_cache_noprof+0x15c/0x3c8
[   36.004152]  kasan_atomics+0xb8/0x2e8
[   36.004784]  kunit_try_run_case+0x14c/0x3d0
[   36.005446]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.006206]  kthread+0x24c/0x2d0
[   36.006803]  ret_from_fork+0x10/0x20
[   36.007368] 
[   36.007763] The buggy address belongs to the object at fff00000c5f10100
[   36.007763]  which belongs to the cache kmalloc-64 of size 64
[   36.009061] The buggy address is located 0 bytes to the right of
[   36.009061]  allocated 48-byte region [fff00000c5f10100, fff00000c5f10130)
[   36.010360] 
[   36.010730] The buggy address belongs to the physical page:
[   36.011449] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105f10
[   36.012481] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   36.013385] page_type: f5(slab)
[   36.013918] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   36.014806] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   36.015632] page dumped because: kasan: bad access detected
[   36.016396] 
[   36.016786] Memory state around the buggy address:
[   36.017341]  fff00000c5f10000: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   36.018233]  fff00000c5f10080: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   36.018898] >fff00000c5f10100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   36.019863]                                      ^
[   36.020593]  fff00000c5f10180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.021344]  fff00000c5f10200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.022222] ==================================================================
[   36.181374] ==================================================================
[   36.182156] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x760/0x4858
[   36.183155] Write of size 4 at addr fff00000c5f10130 by task kunit_try_catch/254
[   36.184140] 
[   36.184514] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241126 #1
[   36.185634] Tainted: [B]=BAD_PAGE, [N]=TEST
[   36.186265] Hardware name: linux,dummy-virt (DT)
[   36.187052] Call trace:
[   36.187546]  show_stack+0x20/0x38 (C)
[   36.188212]  dump_stack_lvl+0x8c/0xd0
[   36.189099]  print_report+0x118/0x5e0
[   36.189785]  kasan_report+0xc8/0x118
[   36.190459]  kasan_check_range+0x100/0x1a8
[   36.191157]  __kasan_check_write+0x20/0x30
[   36.192017]  kasan_atomics_helper+0x760/0x4858
[   36.192848]  kasan_atomics+0x198/0x2e8
[   36.193870]  kunit_try_run_case+0x14c/0x3d0
[   36.194729]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.195608]  kthread+0x24c/0x2d0
[   36.196132]  ret_from_fork+0x10/0x20
[   36.196974] 
[   36.197291] Allocated by task 254:
[   36.197889]  kasan_save_stack+0x3c/0x68
[   36.198517]  kasan_save_track+0x20/0x40
[   36.199242]  kasan_save_alloc_info+0x40/0x58
[   36.199974]  __kasan_kmalloc+0xd4/0xd8
[   36.200618]  __kmalloc_cache_noprof+0x15c/0x3c8
[   36.201239]  kasan_atomics+0xb8/0x2e8
[   36.201899]  kunit_try_run_case+0x14c/0x3d0
[   36.202629]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.203323]  kthread+0x24c/0x2d0
[   36.203948]  ret_from_fork+0x10/0x20
[   36.204596] 
[   36.204976] The buggy address belongs to the object at fff00000c5f10100
[   36.204976]  which belongs to the cache kmalloc-64 of size 64
[   36.206196] The buggy address is located 0 bytes to the right of
[   36.206196]  allocated 48-byte region [fff00000c5f10100, fff00000c5f10130)
[   36.207689] 
[   36.208118] The buggy address belongs to the physical page:
[   36.208858] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105f10
[   36.209995] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   36.210859] page_type: f5(slab)
[   36.211416] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   36.212376] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   36.213275] page dumped because: kasan: bad access detected
[   36.213905] 
[   36.214319] Memory state around the buggy address:
[   36.215058]  fff00000c5f10000: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   36.215876]  fff00000c5f10080: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   36.216793] >fff00000c5f10100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   36.217722]                                      ^
[   36.218304]  fff00000c5f10180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.219261]  fff00000c5f10200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.220104] ==================================================================
[   37.384627] ==================================================================
[   37.385394] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x11f8/0x4858
[   37.386272] Write of size 8 at addr fff00000c5f10130 by task kunit_try_catch/254
[   37.387139] 
[   37.387564] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241126 #1
[   37.388678] Tainted: [B]=BAD_PAGE, [N]=TEST
[   37.389310] Hardware name: linux,dummy-virt (DT)
[   37.389955] Call trace:
[   37.390427]  show_stack+0x20/0x38 (C)
[   37.391099]  dump_stack_lvl+0x8c/0xd0
[   37.391776]  print_report+0x118/0x5e0
[   37.392308]  kasan_report+0xc8/0x118
[   37.392972]  kasan_check_range+0x100/0x1a8
[   37.393576]  __kasan_check_write+0x20/0x30
[   37.394278]  kasan_atomics_helper+0x11f8/0x4858
[   37.395023]  kasan_atomics+0x198/0x2e8
[   37.395705]  kunit_try_run_case+0x14c/0x3d0
[   37.396246]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.397094]  kthread+0x24c/0x2d0
[   37.397736]  ret_from_fork+0x10/0x20
[   37.398296] 
[   37.398695] Allocated by task 254:
[   37.399288]  kasan_save_stack+0x3c/0x68
[   37.399796]  kasan_save_track+0x20/0x40
[   37.400438]  kasan_save_alloc_info+0x40/0x58
[   37.401019]  __kasan_kmalloc+0xd4/0xd8
[   37.401669]  __kmalloc_cache_noprof+0x15c/0x3c8
[   37.402212]  kasan_atomics+0xb8/0x2e8
[   37.402850]  kunit_try_run_case+0x14c/0x3d0
[   37.403516]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.404226]  kthread+0x24c/0x2d0
[   37.404833]  ret_from_fork+0x10/0x20
[   37.405398] 
[   37.405788] The buggy address belongs to the object at fff00000c5f10100
[   37.405788]  which belongs to the cache kmalloc-64 of size 64
[   37.407059] The buggy address is located 0 bytes to the right of
[   37.407059]  allocated 48-byte region [fff00000c5f10100, fff00000c5f10130)
[   37.408362] 
[   37.408768] The buggy address belongs to the physical page:
[   37.409380] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105f10
[   37.410318] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   37.411177] page_type: f5(slab)
[   37.411771] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   37.412643] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   37.413496] page dumped because: kasan: bad access detected
[   37.414273] 
[   37.414637] Memory state around the buggy address:
[   37.415163]  fff00000c5f10000: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   37.416050]  fff00000c5f10080: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   37.416958] >fff00000c5f10100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   37.417819]                                      ^
[   37.418507]  fff00000c5f10180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.419357]  fff00000c5f10200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.420322] ==================================================================
[   37.650170] ==================================================================
[   37.650850] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x14e4/0x4858
[   37.651770] Write of size 8 at addr fff00000c5f10130 by task kunit_try_catch/254
[   37.652577] 
[   37.652973] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241126 #1
[   37.654154] Tainted: [B]=BAD_PAGE, [N]=TEST
[   37.654793] Hardware name: linux,dummy-virt (DT)
[   37.655463] Call trace:
[   37.655953]  show_stack+0x20/0x38 (C)
[   37.656496]  dump_stack_lvl+0x8c/0xd0
[   37.657177]  print_report+0x118/0x5e0
[   37.657750]  kasan_report+0xc8/0x118
[   37.658390]  kasan_check_range+0x100/0x1a8
[   37.659144]  __kasan_check_write+0x20/0x30
[   37.659716]  kasan_atomics_helper+0x14e4/0x4858
[   37.660471]  kasan_atomics+0x198/0x2e8
[   37.661942]  kunit_try_run_case+0x14c/0x3d0
[   37.662725]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.663615]  kthread+0x24c/0x2d0
[   37.664199]  ret_from_fork+0x10/0x20
[   37.664860] 
[   37.665266] Allocated by task 254:
[   37.665768]  kasan_save_stack+0x3c/0x68
[   37.666440]  kasan_save_track+0x20/0x40
[   37.667143]  kasan_save_alloc_info+0x40/0x58
[   37.667888]  __kasan_kmalloc+0xd4/0xd8
[   37.668478]  __kmalloc_cache_noprof+0x15c/0x3c8
[   37.669118]  kasan_atomics+0xb8/0x2e8
[   37.669673]  kunit_try_run_case+0x14c/0x3d0
[   37.670390]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.671187]  kthread+0x24c/0x2d0
[   37.671830]  ret_from_fork+0x10/0x20
[   37.672398] 
[   37.672795] The buggy address belongs to the object at fff00000c5f10100
[   37.672795]  which belongs to the cache kmalloc-64 of size 64
[   37.674112] The buggy address is located 0 bytes to the right of
[   37.674112]  allocated 48-byte region [fff00000c5f10100, fff00000c5f10130)
[   37.675479] 
[   37.675924] The buggy address belongs to the physical page:
[   37.676621] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105f10
[   37.677585] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   37.678347] page_type: f5(slab)
[   37.678953] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   37.679823] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   37.680805] page dumped because: kasan: bad access detected
[   37.681486] 
[   37.681920] Memory state around the buggy address:
[   37.682591]  fff00000c5f10000: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   37.683575]  fff00000c5f10080: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   37.684371] >fff00000c5f10100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   37.685288]                                      ^
[   37.685942]  fff00000c5f10180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.686846]  fff00000c5f10200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.687712] ==================================================================
[   36.338609] ==================================================================
[   36.339746] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x934/0x4858
[   36.340461] Write of size 4 at addr fff00000c5f10130 by task kunit_try_catch/254
[   36.341960] 
[   36.342332] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241126 #1
[   36.343664] Tainted: [B]=BAD_PAGE, [N]=TEST
[   36.344222] Hardware name: linux,dummy-virt (DT)
[   36.344890] Call trace:
[   36.345392]  show_stack+0x20/0x38 (C)
[   36.346072]  dump_stack_lvl+0x8c/0xd0
[   36.346701]  print_report+0x118/0x5e0
[   36.347404]  kasan_report+0xc8/0x118
[   36.348048]  kasan_check_range+0x100/0x1a8
[   36.348797]  __kasan_check_write+0x20/0x30
[   36.349484]  kasan_atomics_helper+0x934/0x4858
[   36.350253]  kasan_atomics+0x198/0x2e8
[   36.350916]  kunit_try_run_case+0x14c/0x3d0
[   36.351444]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.352330]  kthread+0x24c/0x2d0
[   36.352940]  ret_from_fork+0x10/0x20
[   36.353573] 
[   36.353903] Allocated by task 254:
[   36.354405]  kasan_save_stack+0x3c/0x68
[   36.355011]  kasan_save_track+0x20/0x40
[   36.355584]  kasan_save_alloc_info+0x40/0x58
[   36.356174]  __kasan_kmalloc+0xd4/0xd8
[   36.356825]  __kmalloc_cache_noprof+0x15c/0x3c8
[   36.357353]  kasan_atomics+0xb8/0x2e8
[   36.357988]  kunit_try_run_case+0x14c/0x3d0
[   36.358683]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.359489]  kthread+0x24c/0x2d0
[   36.360081]  ret_from_fork+0x10/0x20
[   36.360649] 
[   36.361030] The buggy address belongs to the object at fff00000c5f10100
[   36.361030]  which belongs to the cache kmalloc-64 of size 64
[   36.362329] The buggy address is located 0 bytes to the right of
[   36.362329]  allocated 48-byte region [fff00000c5f10100, fff00000c5f10130)
[   36.363688] 
[   36.364075] The buggy address belongs to the physical page:
[   36.364867] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105f10
[   36.365759] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   36.366650] page_type: f5(slab)
[   36.367195] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   36.368168] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   36.368948] page dumped because: kasan: bad access detected
[   36.369770] 
[   36.370147] Memory state around the buggy address:
[   36.370858]  fff00000c5f10000: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   36.371707]  fff00000c5f10080: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   36.372552] >fff00000c5f10100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   36.373357]                                      ^
[   36.374093]  fff00000c5f10180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.374910]  fff00000c5f10200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.375739] ==================================================================
[   35.568148] ==================================================================
[   35.569101] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1ec/0x4858
[   35.569926] Read of size 4 at addr fff00000c5f10130 by task kunit_try_catch/254
[   35.570948] 
[   35.571398] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241126 #1
[   35.572732] Tainted: [B]=BAD_PAGE, [N]=TEST
[   35.573362] Hardware name: linux,dummy-virt (DT)
[   35.574331] Call trace:
[   35.574878]  show_stack+0x20/0x38 (C)
[   35.575618]  dump_stack_lvl+0x8c/0xd0
[   35.576388]  print_report+0x118/0x5e0
[   35.577046]  kasan_report+0xc8/0x118
[   35.578160]  kasan_check_range+0x100/0x1a8
[   35.579009]  __kasan_check_read+0x20/0x30
[   35.579612]  kasan_atomics_helper+0x1ec/0x4858
[   35.580215]  kasan_atomics+0x198/0x2e8
[   35.580907]  kunit_try_run_case+0x14c/0x3d0
[   35.582003]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.582864]  kthread+0x24c/0x2d0
[   35.583378]  ret_from_fork+0x10/0x20
[   35.584030] 
[   35.584404] Allocated by task 254:
[   35.584986]  kasan_save_stack+0x3c/0x68
[   35.585554]  kasan_save_track+0x20/0x40
[   35.586618]  kasan_save_alloc_info+0x40/0x58
[   35.588008]  __kasan_kmalloc+0xd4/0xd8
[   35.588625]  __kmalloc_cache_noprof+0x15c/0x3c8
[   35.589457]  kasan_atomics+0xb8/0x2e8
[   35.590335]  kunit_try_run_case+0x14c/0x3d0
[   35.590989]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.591846]  kthread+0x24c/0x2d0
[   35.592432]  ret_from_fork+0x10/0x20
[   35.593095] 
[   35.593521] The buggy address belongs to the object at fff00000c5f10100
[   35.593521]  which belongs to the cache kmalloc-64 of size 64
[   35.595185] The buggy address is located 0 bytes to the right of
[   35.595185]  allocated 48-byte region [fff00000c5f10100, fff00000c5f10130)
[   35.596464] 
[   35.597037] The buggy address belongs to the physical page:
[   35.598152] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105f10
[   35.599120] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   35.600030] page_type: f5(slab)
[   35.600581] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   35.601401] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   35.602490] page dumped because: kasan: bad access detected
[   35.603129] 
[   35.603502] Memory state around the buggy address:
[   35.604191]  fff00000c5f10000: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   35.605026]  fff00000c5f10080: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   35.606548] >fff00000c5f10100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   35.607331]                                      ^
[   35.608115]  fff00000c5f10180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.609071]  fff00000c5f10200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.609948] ==================================================================
[   37.460519] ==================================================================
[   37.461263] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x12d8/0x4858
[   37.462209] Write of size 8 at addr fff00000c5f10130 by task kunit_try_catch/254
[   37.463056] 
[   37.463465] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241126 #1
[   37.464546] Tainted: [B]=BAD_PAGE, [N]=TEST
[   37.465218] Hardware name: linux,dummy-virt (DT)
[   37.466577] Call trace:
[   37.467016]  show_stack+0x20/0x38 (C)
[   37.467592]  dump_stack_lvl+0x8c/0xd0
[   37.468262]  print_report+0x118/0x5e0
[   37.469221]  kasan_report+0xc8/0x118
[   37.469964]  kasan_check_range+0x100/0x1a8
[   37.470554]  __kasan_check_write+0x20/0x30
[   37.471202]  kasan_atomics_helper+0x12d8/0x4858
[   37.471919]  kasan_atomics+0x198/0x2e8
[   37.472643]  kunit_try_run_case+0x14c/0x3d0
[   37.473340]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.474128]  kthread+0x24c/0x2d0
[   37.474758]  ret_from_fork+0x10/0x20
[   37.475329] 
[   37.475717] Allocated by task 254:
[   37.476293]  kasan_save_stack+0x3c/0x68
[   37.476874]  kasan_save_track+0x20/0x40
[   37.477419]  kasan_save_alloc_info+0x40/0x58
[   37.478118]  __kasan_kmalloc+0xd4/0xd8
[   37.478669]  __kmalloc_cache_noprof+0x15c/0x3c8
[   37.479397]  kasan_atomics+0xb8/0x2e8
[   37.479923]  kunit_try_run_case+0x14c/0x3d0
[   37.480613]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.481306]  kthread+0x24c/0x2d0
[   37.481889]  ret_from_fork+0x10/0x20
[   37.482429] 
[   37.482823] The buggy address belongs to the object at fff00000c5f10100
[   37.482823]  which belongs to the cache kmalloc-64 of size 64
[   37.483952] The buggy address is located 0 bytes to the right of
[   37.483952]  allocated 48-byte region [fff00000c5f10100, fff00000c5f10130)
[   37.485342] 
[   37.485746] The buggy address belongs to the physical page:
[   37.486358] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105f10
[   37.487392] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   37.488118] page_type: f5(slab)
[   37.488706] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   37.489565] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   37.490547] page dumped because: kasan: bad access detected
[   37.491200] 
[   37.491587] Memory state around the buggy address:
[   37.492206]  fff00000c5f10000: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   37.492986]  fff00000c5f10080: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   37.493950] >fff00000c5f10100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   37.494851]                                      ^
[   37.495583]  fff00000c5f10180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.496434]  fff00000c5f10200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.497258] ==================================================================
[   35.781222] ==================================================================
[   35.782457] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f94/0x4858
[   35.784324] Write of size 4 at addr fff00000c5f10130 by task kunit_try_catch/254
[   35.785392] 
[   35.785894] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241126 #1
[   35.787155] Tainted: [B]=BAD_PAGE, [N]=TEST
[   35.787861] Hardware name: linux,dummy-virt (DT)
[   35.788477] Call trace:
[   35.789090]  show_stack+0x20/0x38 (C)
[   35.789895]  dump_stack_lvl+0x8c/0xd0
[   35.790820]  print_report+0x118/0x5e0
[   35.791575]  kasan_report+0xc8/0x118
[   35.792307]  __asan_report_store4_noabort+0x20/0x30
[   35.793002]  kasan_atomics_helper+0x3f94/0x4858
[   35.793693]  kasan_atomics+0x198/0x2e8
[   35.794253]  kunit_try_run_case+0x14c/0x3d0
[   35.795159]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.795838]  kthread+0x24c/0x2d0
[   35.796425]  ret_from_fork+0x10/0x20
[   35.797017] 
[   35.797348] Allocated by task 254:
[   35.797941]  kasan_save_stack+0x3c/0x68
[   35.798455]  kasan_save_track+0x20/0x40
[   35.799150]  kasan_save_alloc_info+0x40/0x58
[   35.799773]  __kasan_kmalloc+0xd4/0xd8
[   35.800445]  __kmalloc_cache_noprof+0x15c/0x3c8
[   35.801485]  kasan_atomics+0xb8/0x2e8
[   35.802103]  kunit_try_run_case+0x14c/0x3d0
[   35.803134]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.804319]  kthread+0x24c/0x2d0
[   35.804956]  ret_from_fork+0x10/0x20
[   35.805355] 
[   35.805788] The buggy address belongs to the object at fff00000c5f10100
[   35.805788]  which belongs to the cache kmalloc-64 of size 64
[   35.807223] The buggy address is located 0 bytes to the right of
[   35.807223]  allocated 48-byte region [fff00000c5f10100, fff00000c5f10130)
[   35.808576] 
[   35.808954] The buggy address belongs to the physical page:
[   35.809763] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105f10
[   35.810972] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   35.811782] page_type: f5(slab)
[   35.812395] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   35.813439] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   35.814371] page dumped because: kasan: bad access detected
[   35.815193] 
[   35.815618] Memory state around the buggy address:
[   35.816198]  fff00000c5f10000: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   35.817169]  fff00000c5f10080: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   35.817975] >fff00000c5f10100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   35.818914]                                      ^
[   35.819682]  fff00000c5f10180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.820500]  fff00000c5f10200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.821405] ==================================================================

[   31.908355] ==================================================================
[   31.908706] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1ce2/0x5450
[   31.910734] Write of size 8 at addr ffff88810294b7b0 by task kunit_try_catch/274
[   31.910734] 
[   31.910734] CPU: 1 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241126 #1
[   31.910734] Tainted: [B]=BAD_PAGE, [N]=TEST
[   31.910734] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   31.910734] Call Trace:
[   31.910734]  <TASK>
[   31.910734]  dump_stack_lvl+0x73/0xb0
[   31.910734]  print_report+0xd1/0x640
[   31.910734]  ? __virt_addr_valid+0x1db/0x2d0
[   31.910734]  ? kasan_complete_mode_report_info+0x2a/0x200
[   31.910734]  kasan_report+0x102/0x140
[   31.910734]  ? kasan_atomics_helper+0x1ce2/0x5450
[   31.910734]  ? kasan_atomics_helper+0x1ce2/0x5450
[   31.910734]  kasan_check_range+0x10c/0x1c0
[   31.910734]  __kasan_check_write+0x18/0x20
[   31.910734]  kasan_atomics_helper+0x1ce2/0x5450
[   31.910734]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   31.910734]  ? __kmalloc_cache_noprof+0x184/0x410
[   31.910734]  ? trace_hardirqs_on+0x37/0xe0
[   31.910734]  ? kasan_atomics+0x153/0x310
[   31.910734]  kasan_atomics+0x1dd/0x310
[   31.910734]  ? __pfx_kasan_atomics+0x10/0x10
[   31.910734]  ? __pfx_kasan_atomics+0x10/0x10
[   31.910734]  kunit_try_run_case+0x1b3/0x490
[   31.910734]  ? __pfx_kunit_try_run_case+0x10/0x10
[   31.910734]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   31.910734]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   31.910734]  ? __kthread_parkme+0x82/0x160
[   31.910734]  ? preempt_count_sub+0x50/0x80
[   31.910734]  ? __pfx_kunit_try_run_case+0x10/0x10
[   31.910734]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   31.910734]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   31.910734]  kthread+0x257/0x310
[   31.910734]  ? __pfx_kthread+0x10/0x10
[   31.910734]  ret_from_fork+0x41/0x80
[   31.910734]  ? __pfx_kthread+0x10/0x10
[   31.910734]  ret_from_fork_asm+0x1a/0x30
[   31.910734]  </TASK>
[   31.910734] 
[   31.910734] Allocated by task 274:
[   31.910734]  kasan_save_stack+0x3d/0x60
[   31.910734]  kasan_save_track+0x18/0x40
[   31.910734]  kasan_save_alloc_info+0x3b/0x50
[   31.910734]  __kasan_kmalloc+0xb7/0xc0
[   31.910734]  __kmalloc_cache_noprof+0x184/0x410
[   31.910734]  kasan_atomics+0x96/0x310
[   31.910734]  kunit_try_run_case+0x1b3/0x490
[   31.910734]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   31.910734]  kthread+0x257/0x310
[   31.910734]  ret_from_fork+0x41/0x80
[   31.910734]  ret_from_fork_asm+0x1a/0x30
[   31.910734] 
[   31.910734] The buggy address belongs to the object at ffff88810294b780
[   31.910734]  which belongs to the cache kmalloc-64 of size 64
[   31.910734] The buggy address is located 0 bytes to the right of
[   31.910734]  allocated 48-byte region [ffff88810294b780, ffff88810294b7b0)
[   31.910734] 
[   31.910734] The buggy address belongs to the physical page:
[   31.910734] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10294b
[   31.910734] flags: 0x200000000000000(node=0|zone=2)
[   31.910734] page_type: f5(slab)
[   31.910734] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   31.910734] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   31.910734] page dumped because: kasan: bad access detected
[   31.910734] 
[   31.910734] Memory state around the buggy address:
[   31.910734]  ffff88810294b680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   31.910734]  ffff88810294b700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   31.910734] >ffff88810294b780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   31.910734]                                      ^
[   31.910734]  ffff88810294b800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.910734]  ffff88810294b880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.910734] ==================================================================
[   30.395289] ==================================================================
[   30.395351] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xac8/0x5450
[   30.395351] Write of size 4 at addr ffff88810294b7b0 by task kunit_try_catch/274
[   30.395351] 
[   30.395351] CPU: 1 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241126 #1
[   30.395351] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.395351] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   30.395351] Call Trace:
[   30.395351]  <TASK>
[   30.395351]  dump_stack_lvl+0x73/0xb0
[   30.395351]  print_report+0xd1/0x640
[   30.395351]  ? __virt_addr_valid+0x1db/0x2d0
[   30.395351]  ? kasan_complete_mode_report_info+0x2a/0x200
[   30.395351]  kasan_report+0x102/0x140
[   30.395351]  ? kasan_atomics_helper+0xac8/0x5450
[   30.395351]  ? kasan_atomics_helper+0xac8/0x5450
[   30.395351]  kasan_check_range+0x10c/0x1c0
[   30.395351]  __kasan_check_write+0x18/0x20
[   30.395351]  kasan_atomics_helper+0xac8/0x5450
[   30.395351]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   30.395351]  ? __kmalloc_cache_noprof+0x184/0x410
[   30.395351]  ? trace_hardirqs_on+0x37/0xe0
[   30.395351]  ? kasan_atomics+0x153/0x310
[   30.395351]  kasan_atomics+0x1dd/0x310
[   30.395351]  ? __pfx_kasan_atomics+0x10/0x10
[   30.395351]  ? __pfx_kasan_atomics+0x10/0x10
[   30.395351]  kunit_try_run_case+0x1b3/0x490
[   30.395351]  ? __pfx_kunit_try_run_case+0x10/0x10
[   30.395351]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   30.395351]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   30.395351]  ? __kthread_parkme+0x82/0x160
[   30.395351]  ? preempt_count_sub+0x50/0x80
[   30.395351]  ? __pfx_kunit_try_run_case+0x10/0x10
[   30.395351]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   30.395351]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   30.395351]  kthread+0x257/0x310
[   30.395351]  ? __pfx_kthread+0x10/0x10
[   30.395351]  ret_from_fork+0x41/0x80
[   30.395351]  ? __pfx_kthread+0x10/0x10
[   30.395351]  ret_from_fork_asm+0x1a/0x30
[   30.395351]  </TASK>
[   30.395351] 
[   30.395351] Allocated by task 274:
[   30.395351]  kasan_save_stack+0x3d/0x60
[   30.395351]  kasan_save_track+0x18/0x40
[   30.395351]  kasan_save_alloc_info+0x3b/0x50
[   30.395351]  __kasan_kmalloc+0xb7/0xc0
[   30.395351]  __kmalloc_cache_noprof+0x184/0x410
[   30.395351]  kasan_atomics+0x96/0x310
[   30.395351]  kunit_try_run_case+0x1b3/0x490
[   30.395351]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   30.395351]  kthread+0x257/0x310
[   30.395351]  ret_from_fork+0x41/0x80
[   30.395351]  ret_from_fork_asm+0x1a/0x30
[   30.395351] 
[   30.395351] The buggy address belongs to the object at ffff88810294b780
[   30.395351]  which belongs to the cache kmalloc-64 of size 64
[   30.395351] The buggy address is located 0 bytes to the right of
[   30.395351]  allocated 48-byte region [ffff88810294b780, ffff88810294b7b0)
[   30.395351] 
[   30.395351] The buggy address belongs to the physical page:
[   30.395351] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10294b
[   30.395351] flags: 0x200000000000000(node=0|zone=2)
[   30.395351] page_type: f5(slab)
[   30.395351] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   30.395351] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   30.395351] page dumped because: kasan: bad access detected
[   30.395351] 
[   30.395351] Memory state around the buggy address:
[   30.395351]  ffff88810294b680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   30.395351]  ffff88810294b700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   30.395351] >ffff88810294b780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   30.395351]                                      ^
[   30.395351]  ffff88810294b800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.395351]  ffff88810294b880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.395351] ==================================================================
[   31.831481] ==================================================================
[   31.832082] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1c19/0x5450
[   31.832337] Write of size 8 at addr ffff88810294b7b0 by task kunit_try_catch/274
[   31.832337] 
[   31.832337] CPU: 1 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241126 #1
[   31.832337] Tainted: [B]=BAD_PAGE, [N]=TEST
[   31.832337] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   31.832337] Call Trace:
[   31.832337]  <TASK>
[   31.832337]  dump_stack_lvl+0x73/0xb0
[   31.832337]  print_report+0xd1/0x640
[   31.837287]  ? __virt_addr_valid+0x1db/0x2d0
[   31.837287]  ? kasan_complete_mode_report_info+0x2a/0x200
[   31.837287]  kasan_report+0x102/0x140
[   31.837287]  ? kasan_atomics_helper+0x1c19/0x5450
[   31.837287]  ? kasan_atomics_helper+0x1c19/0x5450
[   31.837287]  kasan_check_range+0x10c/0x1c0
[   31.837287]  __kasan_check_write+0x18/0x20
[   31.837287]  kasan_atomics_helper+0x1c19/0x5450
[   31.837287]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   31.837287]  ? __kmalloc_cache_noprof+0x184/0x410
[   31.837287]  ? trace_hardirqs_on+0x37/0xe0
[   31.837287]  ? kasan_atomics+0x153/0x310
[   31.837287]  kasan_atomics+0x1dd/0x310
[   31.837287]  ? __pfx_kasan_atomics+0x10/0x10
[   31.837287]  ? __pfx_kasan_atomics+0x10/0x10
[   31.837287]  kunit_try_run_case+0x1b3/0x490
[   31.837287]  ? __pfx_kunit_try_run_case+0x10/0x10
[   31.837287]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   31.837287]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   31.837287]  ? __kthread_parkme+0x82/0x160
[   31.837287]  ? preempt_count_sub+0x50/0x80
[   31.837287]  ? __pfx_kunit_try_run_case+0x10/0x10
[   31.837287]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   31.837287]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   31.837287]  kthread+0x257/0x310
[   31.837287]  ? __pfx_kthread+0x10/0x10
[   31.837287]  ret_from_fork+0x41/0x80
[   31.837287]  ? __pfx_kthread+0x10/0x10
[   31.837287]  ret_from_fork_asm+0x1a/0x30
[   31.837287]  </TASK>
[   31.837287] 
[   31.837287] Allocated by task 274:
[   31.837287]  kasan_save_stack+0x3d/0x60
[   31.837287]  kasan_save_track+0x18/0x40
[   31.837287]  kasan_save_alloc_info+0x3b/0x50
[   31.837287]  __kasan_kmalloc+0xb7/0xc0
[   31.837287]  __kmalloc_cache_noprof+0x184/0x410
[   31.837287]  kasan_atomics+0x96/0x310
[   31.837287]  kunit_try_run_case+0x1b3/0x490
[   31.837287]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   31.837287]  kthread+0x257/0x310
[   31.837287]  ret_from_fork+0x41/0x80
[   31.837287]  ret_from_fork_asm+0x1a/0x30
[   31.837287] 
[   31.837287] The buggy address belongs to the object at ffff88810294b780
[   31.837287]  which belongs to the cache kmalloc-64 of size 64
[   31.837287] The buggy address is located 0 bytes to the right of
[   31.837287]  allocated 48-byte region [ffff88810294b780, ffff88810294b7b0)
[   31.837287] 
[   31.837287] The buggy address belongs to the physical page:
[   31.837287] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10294b
[   31.837287] flags: 0x200000000000000(node=0|zone=2)
[   31.837287] page_type: f5(slab)
[   31.837287] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   31.837287] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   31.837287] page dumped because: kasan: bad access detected
[   31.837287] 
[   31.837287] Memory state around the buggy address:
[   31.837287]  ffff88810294b680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   31.837287]  ffff88810294b700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   31.837287] >ffff88810294b780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   31.837287]                                      ^
[   31.837287]  ffff88810294b800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.837287]  ffff88810294b880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.837287] ==================================================================
[   31.870865] ==================================================================
[   31.871579] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4f32/0x5450
[   31.871579] Read of size 8 at addr ffff88810294b7b0 by task kunit_try_catch/274
[   31.871579] 
[   31.871579] CPU: 1 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241126 #1
[   31.871579] Tainted: [B]=BAD_PAGE, [N]=TEST
[   31.871579] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   31.871579] Call Trace:
[   31.871579]  <TASK>
[   31.871579]  dump_stack_lvl+0x73/0xb0
[   31.871579]  print_report+0xd1/0x640
[   31.871579]  ? __virt_addr_valid+0x1db/0x2d0
[   31.871579]  ? kasan_complete_mode_report_info+0x2a/0x200
[   31.871579]  kasan_report+0x102/0x140
[   31.871579]  ? kasan_atomics_helper+0x4f32/0x5450
[   31.871579]  ? kasan_atomics_helper+0x4f32/0x5450
[   31.871579]  __asan_report_load8_noabort+0x18/0x20
[   31.871579]  kasan_atomics_helper+0x4f32/0x5450
[   31.871579]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   31.871579]  ? __kmalloc_cache_noprof+0x184/0x410
[   31.871579]  ? trace_hardirqs_on+0x37/0xe0
[   31.871579]  ? kasan_atomics+0x153/0x310
[   31.871579]  kasan_atomics+0x1dd/0x310
[   31.871579]  ? __pfx_kasan_atomics+0x10/0x10
[   31.871579]  ? __pfx_kasan_atomics+0x10/0x10
[   31.871579]  kunit_try_run_case+0x1b3/0x490
[   31.871579]  ? __pfx_kunit_try_run_case+0x10/0x10
[   31.871579]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   31.871579]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   31.871579]  ? __kthread_parkme+0x82/0x160
[   31.871579]  ? preempt_count_sub+0x50/0x80
[   31.871579]  ? __pfx_kunit_try_run_case+0x10/0x10
[   31.871579]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   31.871579]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   31.871579]  kthread+0x257/0x310
[   31.871579]  ? __pfx_kthread+0x10/0x10
[   31.871579]  ret_from_fork+0x41/0x80
[   31.871579]  ? __pfx_kthread+0x10/0x10
[   31.871579]  ret_from_fork_asm+0x1a/0x30
[   31.871579]  </TASK>
[   31.871579] 
[   31.871579] Allocated by task 274:
[   31.871579]  kasan_save_stack+0x3d/0x60
[   31.871579]  kasan_save_track+0x18/0x40
[   31.871579]  kasan_save_alloc_info+0x3b/0x50
[   31.871579]  __kasan_kmalloc+0xb7/0xc0
[   31.871579]  __kmalloc_cache_noprof+0x184/0x410
[   31.871579]  kasan_atomics+0x96/0x310
[   31.871579]  kunit_try_run_case+0x1b3/0x490
[   31.871579]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   31.871579]  kthread+0x257/0x310
[   31.871579]  ret_from_fork+0x41/0x80
[   31.871579]  ret_from_fork_asm+0x1a/0x30
[   31.871579] 
[   31.871579] The buggy address belongs to the object at ffff88810294b780
[   31.871579]  which belongs to the cache kmalloc-64 of size 64
[   31.871579] The buggy address is located 0 bytes to the right of
[   31.871579]  allocated 48-byte region [ffff88810294b780, ffff88810294b7b0)
[   31.871579] 
[   31.871579] The buggy address belongs to the physical page:
[   31.871579] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10294b
[   31.871579] flags: 0x200000000000000(node=0|zone=2)
[   31.871579] page_type: f5(slab)
[   31.871579] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   31.871579] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   31.871579] page dumped because: kasan: bad access detected
[   31.871579] 
[   31.871579] Memory state around the buggy address:
[   31.871579]  ffff88810294b680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   31.871579]  ffff88810294b700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   31.871579] >ffff88810294b780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   31.871579]                                      ^
[   31.871579]  ffff88810294b800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.871579]  ffff88810294b880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.871579] ==================================================================
[   31.542010] ==================================================================
[   31.543477] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1780/0x5450
[   31.543477] Write of size 8 at addr ffff88810294b7b0 by task kunit_try_catch/274
[   31.543477] 
[   31.543477] CPU: 1 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241126 #1
[   31.543477] Tainted: [B]=BAD_PAGE, [N]=TEST
[   31.543477] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   31.543477] Call Trace:
[   31.543477]  <TASK>
[   31.543477]  dump_stack_lvl+0x73/0xb0
[   31.543477]  print_report+0xd1/0x640
[   31.543477]  ? __virt_addr_valid+0x1db/0x2d0
[   31.543477]  ? kasan_complete_mode_report_info+0x2a/0x200
[   31.543477]  kasan_report+0x102/0x140
[   31.543477]  ? kasan_atomics_helper+0x1780/0x5450
[   31.543477]  ? kasan_atomics_helper+0x1780/0x5450
[   31.543477]  kasan_check_range+0x10c/0x1c0
[   31.543477]  __kasan_check_write+0x18/0x20
[   31.543477]  kasan_atomics_helper+0x1780/0x5450
[   31.543477]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   31.543477]  ? __kmalloc_cache_noprof+0x184/0x410
[   31.543477]  ? trace_hardirqs_on+0x37/0xe0
[   31.543477]  ? kasan_atomics+0x153/0x310
[   31.543477]  kasan_atomics+0x1dd/0x310
[   31.543477]  ? __pfx_kasan_atomics+0x10/0x10
[   31.543477]  ? __pfx_kasan_atomics+0x10/0x10
[   31.543477]  kunit_try_run_case+0x1b3/0x490
[   31.543477]  ? __pfx_kunit_try_run_case+0x10/0x10
[   31.543477]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   31.543477]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   31.543477]  ? __kthread_parkme+0x82/0x160
[   31.543477]  ? preempt_count_sub+0x50/0x80
[   31.543477]  ? __pfx_kunit_try_run_case+0x10/0x10
[   31.543477]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   31.543477]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   31.543477]  kthread+0x257/0x310
[   31.543477]  ? __pfx_kthread+0x10/0x10
[   31.543477]  ret_from_fork+0x41/0x80
[   31.543477]  ? __pfx_kthread+0x10/0x10
[   31.543477]  ret_from_fork_asm+0x1a/0x30
[   31.543477]  </TASK>
[   31.543477] 
[   31.543477] Allocated by task 274:
[   31.543477]  kasan_save_stack+0x3d/0x60
[   31.543477]  kasan_save_track+0x18/0x40
[   31.543477]  kasan_save_alloc_info+0x3b/0x50
[   31.543477]  __kasan_kmalloc+0xb7/0xc0
[   31.543477]  __kmalloc_cache_noprof+0x184/0x410
[   31.543477]  kasan_atomics+0x96/0x310
[   31.543477]  kunit_try_run_case+0x1b3/0x490
[   31.543477]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   31.543477]  kthread+0x257/0x310
[   31.543477]  ret_from_fork+0x41/0x80
[   31.543477]  ret_from_fork_asm+0x1a/0x30
[   31.543477] 
[   31.543477] The buggy address belongs to the object at ffff88810294b780
[   31.543477]  which belongs to the cache kmalloc-64 of size 64
[   31.543477] The buggy address is located 0 bytes to the right of
[   31.543477]  allocated 48-byte region [ffff88810294b780, ffff88810294b7b0)
[   31.543477] 
[   31.543477] The buggy address belongs to the physical page:
[   31.543477] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10294b
[   31.543477] flags: 0x200000000000000(node=0|zone=2)
[   31.543477] page_type: f5(slab)
[   31.543477] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   31.543477] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   31.543477] page dumped because: kasan: bad access detected
[   31.543477] 
[   31.543477] Memory state around the buggy address:
[   31.543477]  ffff88810294b680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   31.543477]  ffff88810294b700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   31.543477] >ffff88810294b780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   31.543477]                                      ^
[   31.543477]  ffff88810294b800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.543477]  ffff88810294b880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.543477] ==================================================================
[   32.285995] ==================================================================
[   32.288408] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4fb4/0x5450
[   32.288408] Read of size 8 at addr ffff88810294b7b0 by task kunit_try_catch/274
[   32.288408] 
[   32.288408] CPU: 1 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241126 #1
[   32.288408] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.288408] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   32.288408] Call Trace:
[   32.288408]  <TASK>
[   32.288408]  dump_stack_lvl+0x73/0xb0
[   32.288408]  print_report+0xd1/0x640
[   32.288408]  ? __virt_addr_valid+0x1db/0x2d0
[   32.288408]  ? kasan_complete_mode_report_info+0x2a/0x200
[   32.288408]  kasan_report+0x102/0x140
[   32.288408]  ? kasan_atomics_helper+0x4fb4/0x5450
[   32.288408]  ? kasan_atomics_helper+0x4fb4/0x5450
[   32.288408]  __asan_report_load8_noabort+0x18/0x20
[   32.288408]  kasan_atomics_helper+0x4fb4/0x5450
[   32.288408]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   32.288408]  ? __kmalloc_cache_noprof+0x184/0x410
[   32.288408]  ? trace_hardirqs_on+0x37/0xe0
[   32.288408]  ? kasan_atomics+0x153/0x310
[   32.288408]  kasan_atomics+0x1dd/0x310
[   32.288408]  ? __pfx_kasan_atomics+0x10/0x10
[   32.288408]  ? __pfx_kasan_atomics+0x10/0x10
[   32.288408]  kunit_try_run_case+0x1b3/0x490
[   32.288408]  ? __pfx_kunit_try_run_case+0x10/0x10
[   32.288408]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   32.288408]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   32.288408]  ? __kthread_parkme+0x82/0x160
[   32.288408]  ? preempt_count_sub+0x50/0x80
[   32.288408]  ? __pfx_kunit_try_run_case+0x10/0x10
[   32.288408]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   32.288408]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   32.288408]  kthread+0x257/0x310
[   32.288408]  ? __pfx_kthread+0x10/0x10
[   32.288408]  ret_from_fork+0x41/0x80
[   32.288408]  ? __pfx_kthread+0x10/0x10
[   32.288408]  ret_from_fork_asm+0x1a/0x30
[   32.288408]  </TASK>
[   32.288408] 
[   32.288408] Allocated by task 274:
[   32.288408]  kasan_save_stack+0x3d/0x60
[   32.288408]  kasan_save_track+0x18/0x40
[   32.288408]  kasan_save_alloc_info+0x3b/0x50
[   32.288408]  __kasan_kmalloc+0xb7/0xc0
[   32.288408]  __kmalloc_cache_noprof+0x184/0x410
[   32.288408]  kasan_atomics+0x96/0x310
[   32.288408]  kunit_try_run_case+0x1b3/0x490
[   32.288408]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   32.288408]  kthread+0x257/0x310
[   32.288408]  ret_from_fork+0x41/0x80
[   32.288408]  ret_from_fork_asm+0x1a/0x30
[   32.288408] 
[   32.288408] The buggy address belongs to the object at ffff88810294b780
[   32.288408]  which belongs to the cache kmalloc-64 of size 64
[   32.288408] The buggy address is located 0 bytes to the right of
[   32.288408]  allocated 48-byte region [ffff88810294b780, ffff88810294b7b0)
[   32.288408] 
[   32.288408] The buggy address belongs to the physical page:
[   32.288408] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10294b
[   32.288408] flags: 0x200000000000000(node=0|zone=2)
[   32.288408] page_type: f5(slab)
[   32.288408] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   32.288408] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   32.288408] page dumped because: kasan: bad access detected
[   32.288408] 
[   32.288408] Memory state around the buggy address:
[   32.288408]  ffff88810294b680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.288408]  ffff88810294b700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.288408] >ffff88810294b780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   32.288408]                                      ^
[   32.288408]  ffff88810294b800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.288408]  ffff88810294b880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.288408] ==================================================================
[   31.093479] ==================================================================
[   31.093905] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x12e7/0x5450
[   31.094312] Write of size 4 at addr ffff88810294b7b0 by task kunit_try_catch/274
[   31.094312] 
[   31.094312] CPU: 1 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241126 #1
[   31.094312] Tainted: [B]=BAD_PAGE, [N]=TEST
[   31.094312] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   31.094312] Call Trace:
[   31.094312]  <TASK>
[   31.094312]  dump_stack_lvl+0x73/0xb0
[   31.094312]  print_report+0xd1/0x640
[   31.094312]  ? __virt_addr_valid+0x1db/0x2d0
[   31.094312]  ? kasan_complete_mode_report_info+0x2a/0x200
[   31.094312]  kasan_report+0x102/0x140
[   31.094312]  ? kasan_atomics_helper+0x12e7/0x5450
[   31.094312]  ? kasan_atomics_helper+0x12e7/0x5450
[   31.094312]  kasan_check_range+0x10c/0x1c0
[   31.094312]  __kasan_check_write+0x18/0x20
[   31.094312]  kasan_atomics_helper+0x12e7/0x5450
[   31.094312]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   31.094312]  ? __kmalloc_cache_noprof+0x184/0x410
[   31.094312]  ? trace_hardirqs_on+0x37/0xe0
[   31.094312]  ? kasan_atomics+0x153/0x310
[   31.094312]  kasan_atomics+0x1dd/0x310
[   31.094312]  ? __pfx_kasan_atomics+0x10/0x10
[   31.094312]  ? __pfx_kasan_atomics+0x10/0x10
[   31.094312]  kunit_try_run_case+0x1b3/0x490
[   31.094312]  ? __pfx_kunit_try_run_case+0x10/0x10
[   31.094312]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   31.094312]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   31.094312]  ? __kthread_parkme+0x82/0x160
[   31.094312]  ? preempt_count_sub+0x50/0x80
[   31.094312]  ? __pfx_kunit_try_run_case+0x10/0x10
[   31.094312]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   31.094312]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   31.094312]  kthread+0x257/0x310
[   31.094312]  ? __pfx_kthread+0x10/0x10
[   31.094312]  ret_from_fork+0x41/0x80
[   31.094312]  ? __pfx_kthread+0x10/0x10
[   31.094312]  ret_from_fork_asm+0x1a/0x30
[   31.094312]  </TASK>
[   31.094312] 
[   31.094312] Allocated by task 274:
[   31.094312]  kasan_save_stack+0x3d/0x60
[   31.094312]  kasan_save_track+0x18/0x40
[   31.094312]  kasan_save_alloc_info+0x3b/0x50
[   31.094312]  __kasan_kmalloc+0xb7/0xc0
[   31.094312]  __kmalloc_cache_noprof+0x184/0x410
[   31.094312]  kasan_atomics+0x96/0x310
[   31.094312]  kunit_try_run_case+0x1b3/0x490
[   31.094312]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   31.094312]  kthread+0x257/0x310
[   31.094312]  ret_from_fork+0x41/0x80
[   31.094312]  ret_from_fork_asm+0x1a/0x30
[   31.094312] 
[   31.094312] The buggy address belongs to the object at ffff88810294b780
[   31.094312]  which belongs to the cache kmalloc-64 of size 64
[   31.094312] The buggy address is located 0 bytes to the right of
[   31.094312]  allocated 48-byte region [ffff88810294b780, ffff88810294b7b0)
[   31.094312] 
[   31.094312] The buggy address belongs to the physical page:
[   31.094312] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10294b
[   31.094312] flags: 0x200000000000000(node=0|zone=2)
[   31.094312] page_type: f5(slab)
[   31.094312] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   31.094312] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   31.094312] page dumped because: kasan: bad access detected
[   31.094312] 
[   31.094312] Memory state around the buggy address:
[   31.094312]  ffff88810294b680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   31.094312]  ffff88810294b700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   31.094312] >ffff88810294b780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   31.094312]                                      ^
[   31.094312]  ffff88810294b800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.094312]  ffff88810294b880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.094312] ==================================================================
[   29.842180] ==================================================================
[   29.842332] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e0/0x5450
[   29.842332] Read of size 4 at addr ffff88810294b7b0 by task kunit_try_catch/274
[   29.842332] 
[   29.842332] CPU: 1 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241126 #1
[   29.842332] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.842332] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   29.842332] Call Trace:
[   29.842332]  <TASK>
[   29.842332]  dump_stack_lvl+0x73/0xb0
[   29.842332]  print_report+0xd1/0x640
[   29.842332]  ? __virt_addr_valid+0x1db/0x2d0
[   29.842332]  ? kasan_complete_mode_report_info+0x2a/0x200
[   29.842332]  kasan_report+0x102/0x140
[   29.842332]  ? kasan_atomics_helper+0x3e0/0x5450
[   29.842332]  ? kasan_atomics_helper+0x3e0/0x5450
[   29.842332]  kasan_check_range+0x10c/0x1c0
[   29.842332]  __kasan_check_read+0x15/0x20
[   29.842332]  kasan_atomics_helper+0x3e0/0x5450
[   29.842332]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   29.842332]  ? __kmalloc_cache_noprof+0x184/0x410
[   29.842332]  ? trace_hardirqs_on+0x37/0xe0
[   29.842332]  ? kasan_atomics+0x153/0x310
[   29.842332]  kasan_atomics+0x1dd/0x310
[   29.842332]  ? __pfx_kasan_atomics+0x10/0x10
[   29.842332]  ? __pfx_kasan_atomics+0x10/0x10
[   29.842332]  kunit_try_run_case+0x1b3/0x490
[   29.842332]  ? __pfx_kunit_try_run_case+0x10/0x10
[   29.842332]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   29.842332]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   29.842332]  ? __kthread_parkme+0x82/0x160
[   29.842332]  ? preempt_count_sub+0x50/0x80
[   29.842332]  ? __pfx_kunit_try_run_case+0x10/0x10
[   29.842332]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   29.842332]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   29.842332]  kthread+0x257/0x310
[   29.842332]  ? __pfx_kthread+0x10/0x10
[   29.842332]  ret_from_fork+0x41/0x80
[   29.842332]  ? __pfx_kthread+0x10/0x10
[   29.842332]  ret_from_fork_asm+0x1a/0x30
[   29.842332]  </TASK>
[   29.842332] 
[   29.842332] Allocated by task 274:
[   29.842332]  kasan_save_stack+0x3d/0x60
[   29.842332]  kasan_save_track+0x18/0x40
[   29.842332]  kasan_save_alloc_info+0x3b/0x50
[   29.842332]  __kasan_kmalloc+0xb7/0xc0
[   29.842332]  __kmalloc_cache_noprof+0x184/0x410
[   29.842332]  kasan_atomics+0x96/0x310
[   29.842332]  kunit_try_run_case+0x1b3/0x490
[   29.842332]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   29.842332]  kthread+0x257/0x310
[   29.842332]  ret_from_fork+0x41/0x80
[   29.842332]  ret_from_fork_asm+0x1a/0x30
[   29.842332] 
[   29.842332] The buggy address belongs to the object at ffff88810294b780
[   29.842332]  which belongs to the cache kmalloc-64 of size 64
[   29.842332] The buggy address is located 0 bytes to the right of
[   29.842332]  allocated 48-byte region [ffff88810294b780, ffff88810294b7b0)
[   29.842332] 
[   29.842332] The buggy address belongs to the physical page:
[   29.842332] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10294b
[   29.842332] flags: 0x200000000000000(node=0|zone=2)
[   29.842332] page_type: f5(slab)
[   29.842332] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   29.842332] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   29.842332] page dumped because: kasan: bad access detected
[   29.842332] 
[   29.842332] Memory state around the buggy address:
[   29.842332]  ffff88810294b680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.842332]  ffff88810294b700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.842332] >ffff88810294b780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   29.842332]                                      ^
[   29.842332]  ffff88810294b800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.842332]  ffff88810294b880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.842332] ==================================================================
[   31.133602] ==================================================================
[   31.134761] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x49d0/0x5450
[   31.134761] Read of size 4 at addr ffff88810294b7b0 by task kunit_try_catch/274
[   31.134761] 
[   31.134761] CPU: 1 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241126 #1
[   31.134761] Tainted: [B]=BAD_PAGE, [N]=TEST
[   31.134761] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   31.134761] Call Trace:
[   31.134761]  <TASK>
[   31.134761]  dump_stack_lvl+0x73/0xb0
[   31.134761]  print_report+0xd1/0x640
[   31.134761]  ? __virt_addr_valid+0x1db/0x2d0
[   31.134761]  ? kasan_complete_mode_report_info+0x2a/0x200
[   31.134761]  kasan_report+0x102/0x140
[   31.134761]  ? kasan_atomics_helper+0x49d0/0x5450
[   31.134761]  ? kasan_atomics_helper+0x49d0/0x5450
[   31.134761]  __asan_report_load4_noabort+0x18/0x20
[   31.134761]  kasan_atomics_helper+0x49d0/0x5450
[   31.134761]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   31.134761]  ? __kmalloc_cache_noprof+0x184/0x410
[   31.134761]  ? trace_hardirqs_on+0x37/0xe0
[   31.134761]  ? kasan_atomics+0x153/0x310
[   31.134761]  kasan_atomics+0x1dd/0x310
[   31.134761]  ? __pfx_kasan_atomics+0x10/0x10
[   31.134761]  ? __pfx_kasan_atomics+0x10/0x10
[   31.134761]  kunit_try_run_case+0x1b3/0x490
[   31.134761]  ? __pfx_kunit_try_run_case+0x10/0x10
[   31.134761]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   31.134761]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   31.134761]  ? __kthread_parkme+0x82/0x160
[   31.134761]  ? preempt_count_sub+0x50/0x80
[   31.134761]  ? __pfx_kunit_try_run_case+0x10/0x10
[   31.134761]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   31.134761]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   31.134761]  kthread+0x257/0x310
[   31.134761]  ? __pfx_kthread+0x10/0x10
[   31.134761]  ret_from_fork+0x41/0x80
[   31.134761]  ? __pfx_kthread+0x10/0x10
[   31.134761]  ret_from_fork_asm+0x1a/0x30
[   31.134761]  </TASK>
[   31.134761] 
[   31.134761] Allocated by task 274:
[   31.134761]  kasan_save_stack+0x3d/0x60
[   31.134761]  kasan_save_track+0x18/0x40
[   31.134761]  kasan_save_alloc_info+0x3b/0x50
[   31.134761]  __kasan_kmalloc+0xb7/0xc0
[   31.134761]  __kmalloc_cache_noprof+0x184/0x410
[   31.134761]  kasan_atomics+0x96/0x310
[   31.134761]  kunit_try_run_case+0x1b3/0x490
[   31.134761]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   31.134761]  kthread+0x257/0x310
[   31.134761]  ret_from_fork+0x41/0x80
[   31.134761]  ret_from_fork_asm+0x1a/0x30
[   31.134761] 
[   31.134761] The buggy address belongs to the object at ffff88810294b780
[   31.134761]  which belongs to the cache kmalloc-64 of size 64
[   31.134761] The buggy address is located 0 bytes to the right of
[   31.134761]  allocated 48-byte region [ffff88810294b780, ffff88810294b7b0)
[   31.134761] 
[   31.134761] The buggy address belongs to the physical page:
[   31.134761] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10294b
[   31.134761] flags: 0x200000000000000(node=0|zone=2)
[   31.134761] page_type: f5(slab)
[   31.134761] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   31.134761] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   31.134761] page dumped because: kasan: bad access detected
[   31.134761] 
[   31.134761] Memory state around the buggy address:
[   31.134761]  ffff88810294b680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   31.134761]  ffff88810294b700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   31.134761] >ffff88810294b780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   31.134761]                                      ^
[   31.134761]  ffff88810294b800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.134761]  ffff88810294b880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.134761] ==================================================================
[   31.707881] ==================================================================
[   31.708148] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x19e4/0x5450
[   31.708148] Write of size 8 at addr ffff88810294b7b0 by task kunit_try_catch/274
[   31.708148] 
[   31.708148] CPU: 1 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241126 #1
[   31.708148] Tainted: [B]=BAD_PAGE, [N]=TEST
[   31.708148] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   31.708148] Call Trace:
[   31.708148]  <TASK>
[   31.708148]  dump_stack_lvl+0x73/0xb0
[   31.708148]  print_report+0xd1/0x640
[   31.708148]  ? __virt_addr_valid+0x1db/0x2d0
[   31.708148]  ? kasan_complete_mode_report_info+0x2a/0x200
[   31.708148]  kasan_report+0x102/0x140
[   31.708148]  ? kasan_atomics_helper+0x19e4/0x5450
[   31.708148]  ? kasan_atomics_helper+0x19e4/0x5450
[   31.708148]  kasan_check_range+0x10c/0x1c0
[   31.708148]  __kasan_check_write+0x18/0x20
[   31.708148]  kasan_atomics_helper+0x19e4/0x5450
[   31.708148]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   31.708148]  ? __kmalloc_cache_noprof+0x184/0x410
[   31.708148]  ? trace_hardirqs_on+0x37/0xe0
[   31.708148]  ? kasan_atomics+0x153/0x310
[   31.708148]  kasan_atomics+0x1dd/0x310
[   31.708148]  ? __pfx_kasan_atomics+0x10/0x10
[   31.708148]  ? __pfx_kasan_atomics+0x10/0x10
[   31.708148]  kunit_try_run_case+0x1b3/0x490
[   31.708148]  ? __pfx_kunit_try_run_case+0x10/0x10
[   31.708148]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   31.708148]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   31.708148]  ? __kthread_parkme+0x82/0x160
[   31.708148]  ? preempt_count_sub+0x50/0x80
[   31.708148]  ? __pfx_kunit_try_run_case+0x10/0x10
[   31.708148]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   31.708148]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   31.708148]  kthread+0x257/0x310
[   31.708148]  ? __pfx_kthread+0x10/0x10
[   31.708148]  ret_from_fork+0x41/0x80
[   31.708148]  ? __pfx_kthread+0x10/0x10
[   31.708148]  ret_from_fork_asm+0x1a/0x30
[   31.708148]  </TASK>
[   31.708148] 
[   31.708148] Allocated by task 274:
[   31.708148]  kasan_save_stack+0x3d/0x60
[   31.708148]  kasan_save_track+0x18/0x40
[   31.708148]  kasan_save_alloc_info+0x3b/0x50
[   31.708148]  __kasan_kmalloc+0xb7/0xc0
[   31.708148]  __kmalloc_cache_noprof+0x184/0x410
[   31.708148]  kasan_atomics+0x96/0x310
[   31.708148]  kunit_try_run_case+0x1b3/0x490
[   31.708148]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   31.708148]  kthread+0x257/0x310
[   31.708148]  ret_from_fork+0x41/0x80
[   31.708148]  ret_from_fork_asm+0x1a/0x30
[   31.708148] 
[   31.708148] The buggy address belongs to the object at ffff88810294b780
[   31.708148]  which belongs to the cache kmalloc-64 of size 64
[   31.708148] The buggy address is located 0 bytes to the right of
[   31.708148]  allocated 48-byte region [ffff88810294b780, ffff88810294b7b0)
[   31.708148] 
[   31.708148] The buggy address belongs to the physical page:
[   31.708148] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10294b
[   31.708148] flags: 0x200000000000000(node=0|zone=2)
[   31.708148] page_type: f5(slab)
[   31.708148] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   31.708148] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   31.708148] page dumped because: kasan: bad access detected
[   31.708148] 
[   31.708148] Memory state around the buggy address:
[   31.708148]  ffff88810294b680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   31.708148]  ffff88810294b700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   31.708148] >ffff88810294b780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   31.708148]                                      ^
[   31.708148]  ffff88810294b800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.708148]  ffff88810294b880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.708148] ==================================================================
[   29.925675] ==================================================================
[   29.926214] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a1/0x5450
[   29.926214] Write of size 4 at addr ffff88810294b7b0 by task kunit_try_catch/274
[   29.926214] 
[   29.926214] CPU: 1 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241126 #1
[   29.926214] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.926214] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   29.926214] Call Trace:
[   29.926214]  <TASK>
[   29.926214]  dump_stack_lvl+0x73/0xb0
[   29.926214]  print_report+0xd1/0x640
[   29.926214]  ? __virt_addr_valid+0x1db/0x2d0
[   29.926214]  ? kasan_complete_mode_report_info+0x2a/0x200
[   29.926214]  kasan_report+0x102/0x140
[   29.926214]  ? kasan_atomics_helper+0x4a1/0x5450
[   29.926214]  ? kasan_atomics_helper+0x4a1/0x5450
[   29.926214]  kasan_check_range+0x10c/0x1c0
[   29.926214]  __kasan_check_write+0x18/0x20
[   29.926214]  kasan_atomics_helper+0x4a1/0x5450
[   29.926214]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   29.926214]  ? __kmalloc_cache_noprof+0x184/0x410
[   29.926214]  ? trace_hardirqs_on+0x37/0xe0
[   29.926214]  ? kasan_atomics+0x153/0x310
[   29.926214]  kasan_atomics+0x1dd/0x310
[   29.926214]  ? __pfx_kasan_atomics+0x10/0x10
[   29.926214]  ? __pfx_kasan_atomics+0x10/0x10
[   29.926214]  kunit_try_run_case+0x1b3/0x490
[   29.926214]  ? __pfx_kunit_try_run_case+0x10/0x10
[   29.926214]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   29.926214]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   29.926214]  ? __kthread_parkme+0x82/0x160
[   29.926214]  ? preempt_count_sub+0x50/0x80
[   29.926214]  ? __pfx_kunit_try_run_case+0x10/0x10
[   29.926214]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   29.926214]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   29.926214]  kthread+0x257/0x310
[   29.926214]  ? __pfx_kthread+0x10/0x10
[   29.926214]  ret_from_fork+0x41/0x80
[   29.926214]  ? __pfx_kthread+0x10/0x10
[   29.926214]  ret_from_fork_asm+0x1a/0x30
[   29.926214]  </TASK>
[   29.926214] 
[   29.926214] Allocated by task 274:
[   29.926214]  kasan_save_stack+0x3d/0x60
[   29.926214]  kasan_save_track+0x18/0x40
[   29.926214]  kasan_save_alloc_info+0x3b/0x50
[   29.926214]  __kasan_kmalloc+0xb7/0xc0
[   29.926214]  __kmalloc_cache_noprof+0x184/0x410
[   29.926214]  kasan_atomics+0x96/0x310
[   29.926214]  kunit_try_run_case+0x1b3/0x490
[   29.926214]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   29.926214]  kthread+0x257/0x310
[   29.926214]  ret_from_fork+0x41/0x80
[   29.926214]  ret_from_fork_asm+0x1a/0x30
[   29.926214] 
[   29.926214] The buggy address belongs to the object at ffff88810294b780
[   29.926214]  which belongs to the cache kmalloc-64 of size 64
[   29.926214] The buggy address is located 0 bytes to the right of
[   29.926214]  allocated 48-byte region [ffff88810294b780, ffff88810294b7b0)
[   29.926214] 
[   29.926214] The buggy address belongs to the physical page:
[   29.926214] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10294b
[   29.926214] flags: 0x200000000000000(node=0|zone=2)
[   29.926214] page_type: f5(slab)
[   29.926214] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   29.926214] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   29.926214] page dumped because: kasan: bad access detected
[   29.926214] 
[   29.926214] Memory state around the buggy address:
[   29.926214]  ffff88810294b680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.926214]  ffff88810294b700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.926214] >ffff88810294b780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   29.926214]                                      ^
[   29.926214]  ffff88810294b800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.926214]  ffff88810294b880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.926214] ==================================================================
[   30.748121] ==================================================================
[   30.748601] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xfaa/0x5450
[   30.751229] Write of size 4 at addr ffff88810294b7b0 by task kunit_try_catch/274
[   30.751229] 
[   30.751229] CPU: 1 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241126 #1
[   30.751229] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.751229] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   30.751229] Call Trace:
[   30.751229]  <TASK>
[   30.751229]  dump_stack_lvl+0x73/0xb0
[   30.751229]  print_report+0xd1/0x640
[   30.751229]  ? __virt_addr_valid+0x1db/0x2d0
[   30.751229]  ? kasan_complete_mode_report_info+0x2a/0x200
[   30.751229]  kasan_report+0x102/0x140
[   30.751229]  ? kasan_atomics_helper+0xfaa/0x5450
[   30.751229]  ? kasan_atomics_helper+0xfaa/0x5450
[   30.751229]  kasan_check_range+0x10c/0x1c0
[   30.751229]  __kasan_check_write+0x18/0x20
[   30.751229]  kasan_atomics_helper+0xfaa/0x5450
[   30.751229]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   30.751229]  ? __kmalloc_cache_noprof+0x184/0x410
[   30.751229]  ? trace_hardirqs_on+0x37/0xe0
[   30.751229]  ? kasan_atomics+0x153/0x310
[   30.751229]  kasan_atomics+0x1dd/0x310
[   30.751229]  ? __pfx_kasan_atomics+0x10/0x10
[   30.751229]  ? __pfx_kasan_atomics+0x10/0x10
[   30.751229]  kunit_try_run_case+0x1b3/0x490
[   30.751229]  ? __pfx_kunit_try_run_case+0x10/0x10
[   30.751229]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   30.751229]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   30.751229]  ? __kthread_parkme+0x82/0x160
[   30.751229]  ? preempt_count_sub+0x50/0x80
[   30.751229]  ? __pfx_kunit_try_run_case+0x10/0x10
[   30.751229]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   30.751229]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   30.751229]  kthread+0x257/0x310
[   30.751229]  ? __pfx_kthread+0x10/0x10
[   30.751229]  ret_from_fork+0x41/0x80
[   30.751229]  ? __pfx_kthread+0x10/0x10
[   30.751229]  ret_from_fork_asm+0x1a/0x30
[   30.751229]  </TASK>
[   30.751229] 
[   30.751229] Allocated by task 274:
[   30.751229]  kasan_save_stack+0x3d/0x60
[   30.751229]  kasan_save_track+0x18/0x40
[   30.751229]  kasan_save_alloc_info+0x3b/0x50
[   30.751229]  __kasan_kmalloc+0xb7/0xc0
[   30.751229]  __kmalloc_cache_noprof+0x184/0x410
[   30.751229]  kasan_atomics+0x96/0x310
[   30.751229]  kunit_try_run_case+0x1b3/0x490
[   30.751229]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   30.751229]  kthread+0x257/0x310
[   30.751229]  ret_from_fork+0x41/0x80
[   30.751229]  ret_from_fork_asm+0x1a/0x30
[   30.751229] 
[   30.751229] The buggy address belongs to the object at ffff88810294b780
[   30.751229]  which belongs to the cache kmalloc-64 of size 64
[   30.751229] The buggy address is located 0 bytes to the right of
[   30.751229]  allocated 48-byte region [ffff88810294b780, ffff88810294b7b0)
[   30.751229] 
[   30.751229] The buggy address belongs to the physical page:
[   30.751229] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10294b
[   30.751229] flags: 0x200000000000000(node=0|zone=2)
[   30.751229] page_type: f5(slab)
[   30.751229] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   30.751229] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   30.751229] page dumped because: kasan: bad access detected
[   30.751229] 
[   30.751229] Memory state around the buggy address:
[   30.751229]  ffff88810294b680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   30.751229]  ffff88810294b700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   30.751229] >ffff88810294b780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   30.751229]                                      ^
[   30.751229]  ffff88810294b800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.751229]  ffff88810294b880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.751229] ==================================================================
[   29.879969] ==================================================================
[   29.880528] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b56/0x5450
[   29.880528] Read of size 4 at addr ffff88810294b7b0 by task kunit_try_catch/274
[   29.880528] 
[   29.880528] CPU: 1 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241126 #1
[   29.880528] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.880528] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   29.880528] Call Trace:
[   29.880528]  <TASK>
[   29.880528]  dump_stack_lvl+0x73/0xb0
[   29.880528]  print_report+0xd1/0x640
[   29.880528]  ? __virt_addr_valid+0x1db/0x2d0
[   29.880528]  ? kasan_complete_mode_report_info+0x2a/0x200
[   29.880528]  kasan_report+0x102/0x140
[   29.880528]  ? kasan_atomics_helper+0x4b56/0x5450
[   29.880528]  ? kasan_atomics_helper+0x4b56/0x5450
[   29.880528]  __asan_report_load4_noabort+0x18/0x20
[   29.880528]  kasan_atomics_helper+0x4b56/0x5450
[   29.880528]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   29.880528]  ? __kmalloc_cache_noprof+0x184/0x410
[   29.880528]  ? trace_hardirqs_on+0x37/0xe0
[   29.880528]  ? kasan_atomics+0x153/0x310
[   29.880528]  kasan_atomics+0x1dd/0x310
[   29.880528]  ? __pfx_kasan_atomics+0x10/0x10
[   29.880528]  ? __pfx_kasan_atomics+0x10/0x10
[   29.880528]  kunit_try_run_case+0x1b3/0x490
[   29.880528]  ? __pfx_kunit_try_run_case+0x10/0x10
[   29.880528]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   29.880528]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   29.880528]  ? __kthread_parkme+0x82/0x160
[   29.880528]  ? preempt_count_sub+0x50/0x80
[   29.880528]  ? __pfx_kunit_try_run_case+0x10/0x10
[   29.880528]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   29.880528]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   29.880528]  kthread+0x257/0x310
[   29.880528]  ? __pfx_kthread+0x10/0x10
[   29.880528]  ret_from_fork+0x41/0x80
[   29.880528]  ? __pfx_kthread+0x10/0x10
[   29.880528]  ret_from_fork_asm+0x1a/0x30
[   29.880528]  </TASK>
[   29.880528] 
[   29.880528] Allocated by task 274:
[   29.880528]  kasan_save_stack+0x3d/0x60
[   29.880528]  kasan_save_track+0x18/0x40
[   29.880528]  kasan_save_alloc_info+0x3b/0x50
[   29.880528]  __kasan_kmalloc+0xb7/0xc0
[   29.880528]  __kmalloc_cache_noprof+0x184/0x410
[   29.880528]  kasan_atomics+0x96/0x310
[   29.880528]  kunit_try_run_case+0x1b3/0x490
[   29.880528]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   29.880528]  kthread+0x257/0x310
[   29.880528]  ret_from_fork+0x41/0x80
[   29.880528]  ret_from_fork_asm+0x1a/0x30
[   29.880528] 
[   29.880528] The buggy address belongs to the object at ffff88810294b780
[   29.880528]  which belongs to the cache kmalloc-64 of size 64
[   29.880528] The buggy address is located 0 bytes to the right of
[   29.880528]  allocated 48-byte region [ffff88810294b780, ffff88810294b7b0)
[   29.880528] 
[   29.880528] The buggy address belongs to the physical page:
[   29.880528] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10294b
[   29.880528] flags: 0x200000000000000(node=0|zone=2)
[   29.880528] page_type: f5(slab)
[   29.880528] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   29.880528] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   29.880528] page dumped because: kasan: bad access detected
[   29.880528] 
[   29.880528] Memory state around the buggy address:
[   29.880528]  ffff88810294b680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.880528]  ffff88810294b700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.880528] >ffff88810294b780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   29.880528]                                      ^
[   29.880528]  ffff88810294b800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.880528]  ffff88810294b880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.880528] ==================================================================
[   32.370541] ==================================================================
[   32.371146] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4fa7/0x5450
[   32.372364] Read of size 8 at addr ffff88810294b7b0 by task kunit_try_catch/274
[   32.372364] 
[   32.372364] CPU: 1 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241126 #1
[   32.372364] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.372364] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   32.372364] Call Trace:
[   32.372364]  <TASK>
[   32.372364]  dump_stack_lvl+0x73/0xb0
[   32.372364]  print_report+0xd1/0x640
[   32.372364]  ? __virt_addr_valid+0x1db/0x2d0
[   32.372364]  ? kasan_complete_mode_report_info+0x2a/0x200
[   32.372364]  kasan_report+0x102/0x140
[   32.372364]  ? kasan_atomics_helper+0x4fa7/0x5450
[   32.372364]  ? kasan_atomics_helper+0x4fa7/0x5450
[   32.372364]  __asan_report_load8_noabort+0x18/0x20
[   32.372364]  kasan_atomics_helper+0x4fa7/0x5450
[   32.372364]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   32.372364]  ? __kmalloc_cache_noprof+0x184/0x410
[   32.372364]  ? trace_hardirqs_on+0x37/0xe0
[   32.372364]  ? kasan_atomics+0x153/0x310
[   32.372364]  kasan_atomics+0x1dd/0x310
[   32.372364]  ? __pfx_kasan_atomics+0x10/0x10
[   32.372364]  ? __pfx_kasan_atomics+0x10/0x10
[   32.372364]  kunit_try_run_case+0x1b3/0x490
[   32.372364]  ? __pfx_kunit_try_run_case+0x10/0x10
[   32.372364]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   32.372364]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   32.372364]  ? __kthread_parkme+0x82/0x160
[   32.372364]  ? preempt_count_sub+0x50/0x80
[   32.372364]  ? __pfx_kunit_try_run_case+0x10/0x10
[   32.372364]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   32.372364]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   32.372364]  kthread+0x257/0x310
[   32.372364]  ? __pfx_kthread+0x10/0x10
[   32.372364]  ret_from_fork+0x41/0x80
[   32.372364]  ? __pfx_kthread+0x10/0x10
[   32.372364]  ret_from_fork_asm+0x1a/0x30
[   32.372364]  </TASK>
[   32.372364] 
[   32.372364] Allocated by task 274:
[   32.372364]  kasan_save_stack+0x3d/0x60
[   32.372364]  kasan_save_track+0x18/0x40
[   32.372364]  kasan_save_alloc_info+0x3b/0x50
[   32.372364]  __kasan_kmalloc+0xb7/0xc0
[   32.372364]  __kmalloc_cache_noprof+0x184/0x410
[   32.372364]  kasan_atomics+0x96/0x310
[   32.372364]  kunit_try_run_case+0x1b3/0x490
[   32.372364]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   32.372364]  kthread+0x257/0x310
[   32.372364]  ret_from_fork+0x41/0x80
[   32.372364]  ret_from_fork_asm+0x1a/0x30
[   32.372364] 
[   32.372364] The buggy address belongs to the object at ffff88810294b780
[   32.372364]  which belongs to the cache kmalloc-64 of size 64
[   32.372364] The buggy address is located 0 bytes to the right of
[   32.372364]  allocated 48-byte region [ffff88810294b780, ffff88810294b7b0)
[   32.372364] 
[   32.372364] The buggy address belongs to the physical page:
[   32.372364] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10294b
[   32.372364] flags: 0x200000000000000(node=0|zone=2)
[   32.372364] page_type: f5(slab)
[   32.372364] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   32.372364] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   32.372364] page dumped because: kasan: bad access detected
[   32.372364] 
[   32.372364] Memory state around the buggy address:
[   32.372364]  ffff88810294b680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.372364]  ffff88810294b700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.372364] >ffff88810294b780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   32.372364]                                      ^
[   32.372364]  ffff88810294b800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.372364]  ffff88810294b880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.372364] ==================================================================
[   30.263091] ==================================================================
[   30.263556] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x8fa/0x5450
[   30.263556] Write of size 4 at addr ffff88810294b7b0 by task kunit_try_catch/274
[   30.263556] 
[   30.263556] CPU: 1 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241126 #1
[   30.263556] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.263556] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   30.263556] Call Trace:
[   30.263556]  <TASK>
[   30.263556]  dump_stack_lvl+0x73/0xb0
[   30.263556]  print_report+0xd1/0x640
[   30.263556]  ? __virt_addr_valid+0x1db/0x2d0
[   30.263556]  ? kasan_complete_mode_report_info+0x2a/0x200
[   30.263556]  kasan_report+0x102/0x140
[   30.263556]  ? kasan_atomics_helper+0x8fa/0x5450
[   30.263556]  ? kasan_atomics_helper+0x8fa/0x5450
[   30.263556]  kasan_check_range+0x10c/0x1c0
[   30.263556]  __kasan_check_write+0x18/0x20
[   30.263556]  kasan_atomics_helper+0x8fa/0x5450
[   30.263556]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   30.263556]  ? __kmalloc_cache_noprof+0x184/0x410
[   30.263556]  ? trace_hardirqs_on+0x37/0xe0
[   30.263556]  ? kasan_atomics+0x153/0x310
[   30.263556]  kasan_atomics+0x1dd/0x310
[   30.263556]  ? __pfx_kasan_atomics+0x10/0x10
[   30.263556]  ? __pfx_kasan_atomics+0x10/0x10
[   30.263556]  kunit_try_run_case+0x1b3/0x490
[   30.263556]  ? __pfx_kunit_try_run_case+0x10/0x10
[   30.263556]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   30.263556]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   30.263556]  ? __kthread_parkme+0x82/0x160
[   30.263556]  ? preempt_count_sub+0x50/0x80
[   30.263556]  ? __pfx_kunit_try_run_case+0x10/0x10
[   30.263556]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   30.263556]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   30.263556]  kthread+0x257/0x310
[   30.263556]  ? __pfx_kthread+0x10/0x10
[   30.263556]  ret_from_fork+0x41/0x80
[   30.263556]  ? __pfx_kthread+0x10/0x10
[   30.263556]  ret_from_fork_asm+0x1a/0x30
[   30.263556]  </TASK>
[   30.263556] 
[   30.263556] Allocated by task 274:
[   30.263556]  kasan_save_stack+0x3d/0x60
[   30.263556]  kasan_save_track+0x18/0x40
[   30.263556]  kasan_save_alloc_info+0x3b/0x50
[   30.263556]  __kasan_kmalloc+0xb7/0xc0
[   30.263556]  __kmalloc_cache_noprof+0x184/0x410
[   30.263556]  kasan_atomics+0x96/0x310
[   30.263556]  kunit_try_run_case+0x1b3/0x490
[   30.263556]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   30.263556]  kthread+0x257/0x310
[   30.263556]  ret_from_fork+0x41/0x80
[   30.263556]  ret_from_fork_asm+0x1a/0x30
[   30.263556] 
[   30.263556] The buggy address belongs to the object at ffff88810294b780
[   30.263556]  which belongs to the cache kmalloc-64 of size 64
[   30.263556] The buggy address is located 0 bytes to the right of
[   30.263556]  allocated 48-byte region [ffff88810294b780, ffff88810294b7b0)
[   30.263556] 
[   30.263556] The buggy address belongs to the physical page:
[   30.263556] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10294b
[   30.263556] flags: 0x200000000000000(node=0|zone=2)
[   30.263556] page_type: f5(slab)
[   30.263556] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   30.263556] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   30.263556] page dumped because: kasan: bad access detected
[   30.263556] 
[   30.263556] Memory state around the buggy address:
[   30.263556]  ffff88810294b680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   30.263556]  ffff88810294b700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   30.263556] >ffff88810294b780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   30.263556]                                      ^
[   30.263556]  ffff88810294b800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.263556]  ffff88810294b880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.263556] ==================================================================
[   30.526565] ==================================================================
[   30.527294] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a86/0x5450
[   30.527294] Read of size 4 at addr ffff88810294b7b0 by task kunit_try_catch/274
[   30.527294] 
[   30.527294] CPU: 1 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241126 #1
[   30.527294] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.527294] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   30.527294] Call Trace:
[   30.527294]  <TASK>
[   30.527294]  dump_stack_lvl+0x73/0xb0
[   30.527294]  print_report+0xd1/0x640
[   30.527294]  ? __virt_addr_valid+0x1db/0x2d0
[   30.527294]  ? kasan_complete_mode_report_info+0x2a/0x200
[   30.527294]  kasan_report+0x102/0x140
[   30.527294]  ? kasan_atomics_helper+0x4a86/0x5450
[   30.527294]  ? kasan_atomics_helper+0x4a86/0x5450
[   30.527294]  __asan_report_load4_noabort+0x18/0x20
[   30.527294]  kasan_atomics_helper+0x4a86/0x5450
[   30.527294]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   30.527294]  ? __kmalloc_cache_noprof+0x184/0x410
[   30.527294]  ? trace_hardirqs_on+0x37/0xe0
[   30.527294]  ? kasan_atomics+0x153/0x310
[   30.527294]  kasan_atomics+0x1dd/0x310
[   30.527294]  ? __pfx_kasan_atomics+0x10/0x10
[   30.527294]  ? __pfx_kasan_atomics+0x10/0x10
[   30.527294]  kunit_try_run_case+0x1b3/0x490
[   30.527294]  ? __pfx_kunit_try_run_case+0x10/0x10
[   30.527294]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   30.527294]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   30.527294]  ? __kthread_parkme+0x82/0x160
[   30.527294]  ? preempt_count_sub+0x50/0x80
[   30.527294]  ? __pfx_kunit_try_run_case+0x10/0x10
[   30.527294]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   30.527294]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   30.527294]  kthread+0x257/0x310
[   30.527294]  ? __pfx_kthread+0x10/0x10
[   30.527294]  ret_from_fork+0x41/0x80
[   30.527294]  ? __pfx_kthread+0x10/0x10
[   30.527294]  ret_from_fork_asm+0x1a/0x30
[   30.527294]  </TASK>
[   30.527294] 
[   30.527294] Allocated by task 274:
[   30.527294]  kasan_save_stack+0x3d/0x60
[   30.527294]  kasan_save_track+0x18/0x40
[   30.527294]  kasan_save_alloc_info+0x3b/0x50
[   30.527294]  __kasan_kmalloc+0xb7/0xc0
[   30.527294]  __kmalloc_cache_noprof+0x184/0x410
[   30.527294]  kasan_atomics+0x96/0x310
[   30.527294]  kunit_try_run_case+0x1b3/0x490
[   30.527294]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   30.527294]  kthread+0x257/0x310
[   30.527294]  ret_from_fork+0x41/0x80
[   30.527294]  ret_from_fork_asm+0x1a/0x30
[   30.527294] 
[   30.527294] The buggy address belongs to the object at ffff88810294b780
[   30.527294]  which belongs to the cache kmalloc-64 of size 64
[   30.527294] The buggy address is located 0 bytes to the right of
[   30.527294]  allocated 48-byte region [ffff88810294b780, ffff88810294b7b0)
[   30.527294] 
[   30.527294] The buggy address belongs to the physical page:
[   30.527294] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10294b
[   30.527294] flags: 0x200000000000000(node=0|zone=2)
[   30.527294] page_type: f5(slab)
[   30.527294] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   30.527294] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   30.527294] page dumped because: kasan: bad access detected
[   30.527294] 
[   30.527294] Memory state around the buggy address:
[   30.527294]  ffff88810294b680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   30.527294]  ffff88810294b700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   30.527294] >ffff88810294b780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   30.527294]                                      ^
[   30.527294]  ffff88810294b800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.527294]  ffff88810294b880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.527294] ==================================================================
[   29.717064] ==================================================================
[   29.717643] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4ba4/0x5450
[   29.717643] Write of size 4 at addr ffff88810294b7b0 by task kunit_try_catch/274
[   29.717643] 
[   29.717643] CPU: 1 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241126 #1
[   29.717643] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.717643] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   29.717643] Call Trace:
[   29.717643]  <TASK>
[   29.717643]  dump_stack_lvl+0x73/0xb0
[   29.717643]  print_report+0xd1/0x640
[   29.717643]  ? __virt_addr_valid+0x1db/0x2d0
[   29.717643]  ? kasan_complete_mode_report_info+0x2a/0x200
[   29.717643]  kasan_report+0x102/0x140
[   29.717643]  ? kasan_atomics_helper+0x4ba4/0x5450
[   29.717643]  ? kasan_atomics_helper+0x4ba4/0x5450
[   29.717643]  __asan_report_store4_noabort+0x1b/0x30
[   29.717643]  kasan_atomics_helper+0x4ba4/0x5450
[   29.717643]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   29.717643]  ? __kmalloc_cache_noprof+0x184/0x410
[   29.717643]  ? trace_hardirqs_on+0x37/0xe0
[   29.717643]  ? kasan_atomics+0x153/0x310
[   29.717643]  kasan_atomics+0x1dd/0x310
[   29.717643]  ? __pfx_kasan_atomics+0x10/0x10
[   29.717643]  ? __pfx_kasan_atomics+0x10/0x10
[   29.717643]  kunit_try_run_case+0x1b3/0x490
[   29.717643]  ? __pfx_kunit_try_run_case+0x10/0x10
[   29.717643]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   29.717643]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   29.717643]  ? __kthread_parkme+0x82/0x160
[   29.717643]  ? preempt_count_sub+0x50/0x80
[   29.717643]  ? __pfx_kunit_try_run_case+0x10/0x10
[   29.717643]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   29.717643]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   29.717643]  kthread+0x257/0x310
[   29.717643]  ? __pfx_kthread+0x10/0x10
[   29.717643]  ret_from_fork+0x41/0x80
[   29.717643]  ? __pfx_kthread+0x10/0x10
[   29.717643]  ret_from_fork_asm+0x1a/0x30
[   29.717643]  </TASK>
[   29.717643] 
[   29.717643] Allocated by task 274:
[   29.717643]  kasan_save_stack+0x3d/0x60
[   29.717643]  kasan_save_track+0x18/0x40
[   29.717643]  kasan_save_alloc_info+0x3b/0x50
[   29.717643]  __kasan_kmalloc+0xb7/0xc0
[   29.717643]  __kmalloc_cache_noprof+0x184/0x410
[   29.717643]  kasan_atomics+0x96/0x310
[   29.717643]  kunit_try_run_case+0x1b3/0x490
[   29.717643]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   29.717643]  kthread+0x257/0x310
[   29.717643]  ret_from_fork+0x41/0x80
[   29.717643]  ret_from_fork_asm+0x1a/0x30
[   29.717643] 
[   29.717643] The buggy address belongs to the object at ffff88810294b780
[   29.717643]  which belongs to the cache kmalloc-64 of size 64
[   29.717643] The buggy address is located 0 bytes to the right of
[   29.717643]  allocated 48-byte region [ffff88810294b780, ffff88810294b7b0)
[   29.717643] 
[   29.717643] The buggy address belongs to the physical page:
[   29.717643] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10294b
[   29.717643] flags: 0x200000000000000(node=0|zone=2)
[   29.717643] page_type: f5(slab)
[   29.717643] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   29.717643] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   29.717643] page dumped because: kasan: bad access detected
[   29.717643] 
[   29.717643] Memory state around the buggy address:
[   29.717643]  ffff88810294b680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.717643]  ffff88810294b700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.717643] >ffff88810294b780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   29.717643]                                      ^
[   29.717643]  ffff88810294b800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.717643]  ffff88810294b880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.717643] ==================================================================
[   30.656508] ==================================================================
[   30.657087] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xe79/0x5450
[   30.657249] Write of size 4 at addr ffff88810294b7b0 by task kunit_try_catch/274
[   30.658143] 
[   30.658143] CPU: 1 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241126 #1
[   30.658143] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.658143] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   30.658143] Call Trace:
[   30.658143]  <TASK>
[   30.658143]  dump_stack_lvl+0x73/0xb0
[   30.658143]  print_report+0xd1/0x640
[   30.658143]  ? __virt_addr_valid+0x1db/0x2d0
[   30.658143]  ? kasan_complete_mode_report_info+0x2a/0x200
[   30.658143]  kasan_report+0x102/0x140
[   30.658143]  ? kasan_atomics_helper+0xe79/0x5450
[   30.658143]  ? kasan_atomics_helper+0xe79/0x5450
[   30.658143]  kasan_check_range+0x10c/0x1c0
[   30.658143]  __kasan_check_write+0x18/0x20
[   30.658143]  kasan_atomics_helper+0xe79/0x5450
[   30.658143]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   30.658143]  ? __kmalloc_cache_noprof+0x184/0x410
[   30.658143]  ? trace_hardirqs_on+0x37/0xe0
[   30.658143]  ? kasan_atomics+0x153/0x310
[   30.658143]  kasan_atomics+0x1dd/0x310
[   30.658143]  ? __pfx_kasan_atomics+0x10/0x10
[   30.658143]  ? __pfx_kasan_atomics+0x10/0x10
[   30.658143]  kunit_try_run_case+0x1b3/0x490
[   30.658143]  ? __pfx_kunit_try_run_case+0x10/0x10
[   30.658143]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   30.658143]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   30.658143]  ? __kthread_parkme+0x82/0x160
[   30.658143]  ? preempt_count_sub+0x50/0x80
[   30.658143]  ? __pfx_kunit_try_run_case+0x10/0x10
[   30.658143]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   30.658143]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   30.658143]  kthread+0x257/0x310
[   30.658143]  ? __pfx_kthread+0x10/0x10
[   30.658143]  ret_from_fork+0x41/0x80
[   30.658143]  ? __pfx_kthread+0x10/0x10
[   30.658143]  ret_from_fork_asm+0x1a/0x30
[   30.658143]  </TASK>
[   30.658143] 
[   30.658143] Allocated by task 274:
[   30.658143]  kasan_save_stack+0x3d/0x60
[   30.658143]  kasan_save_track+0x18/0x40
[   30.658143]  kasan_save_alloc_info+0x3b/0x50
[   30.658143]  __kasan_kmalloc+0xb7/0xc0
[   30.658143]  __kmalloc_cache_noprof+0x184/0x410
[   30.658143]  kasan_atomics+0x96/0x310
[   30.658143]  kunit_try_run_case+0x1b3/0x490
[   30.658143]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   30.658143]  kthread+0x257/0x310
[   30.658143]  ret_from_fork+0x41/0x80
[   30.658143]  ret_from_fork_asm+0x1a/0x30
[   30.658143] 
[   30.658143] The buggy address belongs to the object at ffff88810294b780
[   30.658143]  which belongs to the cache kmalloc-64 of size 64
[   30.658143] The buggy address is located 0 bytes to the right of
[   30.658143]  allocated 48-byte region [ffff88810294b780, ffff88810294b7b0)
[   30.658143] 
[   30.658143] The buggy address belongs to the physical page:
[   30.658143] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10294b
[   30.658143] flags: 0x200000000000000(node=0|zone=2)
[   30.658143] page_type: f5(slab)
[   30.658143] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   30.658143] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   30.658143] page dumped because: kasan: bad access detected
[   30.658143] 
[   30.658143] Memory state around the buggy address:
[   30.658143]  ffff88810294b680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   30.658143]  ffff88810294b700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   30.658143] >ffff88810294b780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   30.658143]                                      ^
[   30.658143]  ffff88810294b800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.658143]  ffff88810294b880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.658143] ==================================================================
[   31.789832] ==================================================================
[   31.790224] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1b23/0x5450
[   31.790224] Write of size 8 at addr ffff88810294b7b0 by task kunit_try_catch/274
[   31.791205] 
[   31.794379] CPU: 1 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241126 #1
[   31.794379] Tainted: [B]=BAD_PAGE, [N]=TEST
[   31.794379] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   31.794379] Call Trace:
[   31.794379]  <TASK>
[   31.794379]  dump_stack_lvl+0x73/0xb0
[   31.794379]  print_report+0xd1/0x640
[   31.794379]  ? __virt_addr_valid+0x1db/0x2d0
[   31.794379]  ? kasan_complete_mode_report_info+0x2a/0x200
[   31.794379]  kasan_report+0x102/0x140
[   31.794379]  ? kasan_atomics_helper+0x1b23/0x5450
[   31.794379]  ? kasan_atomics_helper+0x1b23/0x5450
[   31.794379]  kasan_check_range+0x10c/0x1c0
[   31.794379]  __kasan_check_write+0x18/0x20
[   31.794379]  kasan_atomics_helper+0x1b23/0x5450
[   31.794379]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   31.794379]  ? __kmalloc_cache_noprof+0x184/0x410
[   31.794379]  ? trace_hardirqs_on+0x37/0xe0
[   31.794379]  ? kasan_atomics+0x153/0x310
[   31.794379]  kasan_atomics+0x1dd/0x310
[   31.794379]  ? __pfx_kasan_atomics+0x10/0x10
[   31.794379]  ? __pfx_kasan_atomics+0x10/0x10
[   31.794379]  kunit_try_run_case+0x1b3/0x490
[   31.794379]  ? __pfx_kunit_try_run_case+0x10/0x10
[   31.794379]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   31.794379]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   31.794379]  ? __kthread_parkme+0x82/0x160
[   31.794379]  ? preempt_count_sub+0x50/0x80
[   31.794379]  ? __pfx_kunit_try_run_case+0x10/0x10
[   31.794379]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   31.794379]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   31.794379]  kthread+0x257/0x310
[   31.794379]  ? __pfx_kthread+0x10/0x10
[   31.794379]  ret_from_fork+0x41/0x80
[   31.794379]  ? __pfx_kthread+0x10/0x10
[   31.794379]  ret_from_fork_asm+0x1a/0x30
[   31.794379]  </TASK>
[   31.794379] 
[   31.794379] Allocated by task 274:
[   31.794379]  kasan_save_stack+0x3d/0x60
[   31.794379]  kasan_save_track+0x18/0x40
[   31.794379]  kasan_save_alloc_info+0x3b/0x50
[   31.794379]  __kasan_kmalloc+0xb7/0xc0
[   31.794379]  __kmalloc_cache_noprof+0x184/0x410
[   31.794379]  kasan_atomics+0x96/0x310
[   31.794379]  kunit_try_run_case+0x1b3/0x490
[   31.794379]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   31.794379]  kthread+0x257/0x310
[   31.794379]  ret_from_fork+0x41/0x80
[   31.794379]  ret_from_fork_asm+0x1a/0x30
[   31.794379] 
[   31.794379] The buggy address belongs to the object at ffff88810294b780
[   31.794379]  which belongs to the cache kmalloc-64 of size 64
[   31.794379] The buggy address is located 0 bytes to the right of
[   31.794379]  allocated 48-byte region [ffff88810294b780, ffff88810294b7b0)
[   31.794379] 
[   31.794379] The buggy address belongs to the physical page:
[   31.794379] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10294b
[   31.794379] flags: 0x200000000000000(node=0|zone=2)
[   31.794379] page_type: f5(slab)
[   31.794379] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   31.794379] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   31.794379] page dumped because: kasan: bad access detected
[   31.794379] 
[   31.794379] Memory state around the buggy address:
[   31.794379]  ffff88810294b680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   31.794379]  ffff88810294b700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   31.794379] >ffff88810294b780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   31.794379]                                      ^
[   31.794379]  ffff88810294b800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.794379]  ffff88810294b880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.794379] ==================================================================
[   30.176382] ==================================================================
[   30.176995] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x7c8/0x5450
[   30.177186] Write of size 4 at addr ffff88810294b7b0 by task kunit_try_catch/274
[   30.177186] 
[   30.177186] CPU: 1 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241126 #1
[   30.177186] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.177186] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   30.177186] Call Trace:
[   30.177186]  <TASK>
[   30.177186]  dump_stack_lvl+0x73/0xb0
[   30.177186]  print_report+0xd1/0x640
[   30.177186]  ? __virt_addr_valid+0x1db/0x2d0
[   30.177186]  ? kasan_complete_mode_report_info+0x2a/0x200
[   30.177186]  kasan_report+0x102/0x140
[   30.177186]  ? kasan_atomics_helper+0x7c8/0x5450
[   30.177186]  ? kasan_atomics_helper+0x7c8/0x5450
[   30.177186]  kasan_check_range+0x10c/0x1c0
[   30.177186]  __kasan_check_write+0x18/0x20
[   30.177186]  kasan_atomics_helper+0x7c8/0x5450
[   30.177186]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   30.177186]  ? __kmalloc_cache_noprof+0x184/0x410
[   30.177186]  ? trace_hardirqs_on+0x37/0xe0
[   30.177186]  ? kasan_atomics+0x153/0x310
[   30.177186]  kasan_atomics+0x1dd/0x310
[   30.177186]  ? __pfx_kasan_atomics+0x10/0x10
[   30.177186]  ? __pfx_kasan_atomics+0x10/0x10
[   30.177186]  kunit_try_run_case+0x1b3/0x490
[   30.177186]  ? __pfx_kunit_try_run_case+0x10/0x10
[   30.177186]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   30.177186]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   30.177186]  ? __kthread_parkme+0x82/0x160
[   30.177186]  ? preempt_count_sub+0x50/0x80
[   30.177186]  ? __pfx_kunit_try_run_case+0x10/0x10
[   30.177186]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   30.177186]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   30.177186]  kthread+0x257/0x310
[   30.177186]  ? __pfx_kthread+0x10/0x10
[   30.177186]  ret_from_fork+0x41/0x80
[   30.177186]  ? __pfx_kthread+0x10/0x10
[   30.177186]  ret_from_fork_asm+0x1a/0x30
[   30.177186]  </TASK>
[   30.177186] 
[   30.177186] Allocated by task 274:
[   30.177186]  kasan_save_stack+0x3d/0x60
[   30.177186]  kasan_save_track+0x18/0x40
[   30.177186]  kasan_save_alloc_info+0x3b/0x50
[   30.177186]  __kasan_kmalloc+0xb7/0xc0
[   30.177186]  __kmalloc_cache_noprof+0x184/0x410
[   30.177186]  kasan_atomics+0x96/0x310
[   30.177186]  kunit_try_run_case+0x1b3/0x490
[   30.177186]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   30.177186]  kthread+0x257/0x310
[   30.177186]  ret_from_fork+0x41/0x80
[   30.177186]  ret_from_fork_asm+0x1a/0x30
[   30.177186] 
[   30.177186] The buggy address belongs to the object at ffff88810294b780
[   30.177186]  which belongs to the cache kmalloc-64 of size 64
[   30.177186] The buggy address is located 0 bytes to the right of
[   30.177186]  allocated 48-byte region [ffff88810294b780, ffff88810294b7b0)
[   30.177186] 
[   30.177186] The buggy address belongs to the physical page:
[   30.177186] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10294b
[   30.177186] flags: 0x200000000000000(node=0|zone=2)
[   30.177186] page_type: f5(slab)
[   30.177186] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   30.177186] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   30.177186] page dumped because: kasan: bad access detected
[   30.177186] 
[   30.177186] Memory state around the buggy address:
[   30.177186]  ffff88810294b680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   30.177186]  ffff88810294b700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   30.177186] >ffff88810294b780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   30.177186]                                      ^
[   30.177186]  ffff88810294b800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.177186]  ffff88810294b880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.177186] ==================================================================
[   30.568015] ==================================================================
[   30.568302] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xd48/0x5450
[   30.568302] Write of size 4 at addr ffff88810294b7b0 by task kunit_try_catch/274
[   30.568302] 
[   30.568302] CPU: 1 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241126 #1
[   30.568302] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.568302] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   30.568302] Call Trace:
[   30.568302]  <TASK>
[   30.568302]  dump_stack_lvl+0x73/0xb0
[   30.568302]  print_report+0xd1/0x640
[   30.568302]  ? __virt_addr_valid+0x1db/0x2d0
[   30.568302]  ? kasan_complete_mode_report_info+0x2a/0x200
[   30.568302]  kasan_report+0x102/0x140
[   30.568302]  ? kasan_atomics_helper+0xd48/0x5450
[   30.568302]  ? kasan_atomics_helper+0xd48/0x5450
[   30.568302]  kasan_check_range+0x10c/0x1c0
[   30.568302]  __kasan_check_write+0x18/0x20
[   30.568302]  kasan_atomics_helper+0xd48/0x5450
[   30.568302]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   30.568302]  ? __kmalloc_cache_noprof+0x184/0x410
[   30.568302]  ? trace_hardirqs_on+0x37/0xe0
[   30.568302]  ? kasan_atomics+0x153/0x310
[   30.568302]  kasan_atomics+0x1dd/0x310
[   30.568302]  ? __pfx_kasan_atomics+0x10/0x10
[   30.568302]  ? __pfx_kasan_atomics+0x10/0x10
[   30.568302]  kunit_try_run_case+0x1b3/0x490
[   30.568302]  ? __pfx_kunit_try_run_case+0x10/0x10
[   30.568302]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   30.568302]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   30.568302]  ? __kthread_parkme+0x82/0x160
[   30.568302]  ? preempt_count_sub+0x50/0x80
[   30.568302]  ? __pfx_kunit_try_run_case+0x10/0x10
[   30.568302]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   30.568302]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   30.568302]  kthread+0x257/0x310
[   30.568302]  ? __pfx_kthread+0x10/0x10
[   30.568302]  ret_from_fork+0x41/0x80
[   30.568302]  ? __pfx_kthread+0x10/0x10
[   30.568302]  ret_from_fork_asm+0x1a/0x30
[   30.568302]  </TASK>
[   30.568302] 
[   30.568302] Allocated by task 274:
[   30.568302]  kasan_save_stack+0x3d/0x60
[   30.568302]  kasan_save_track+0x18/0x40
[   30.568302]  kasan_save_alloc_info+0x3b/0x50
[   30.568302]  __kasan_kmalloc+0xb7/0xc0
[   30.568302]  __kmalloc_cache_noprof+0x184/0x410
[   30.568302]  kasan_atomics+0x96/0x310
[   30.568302]  kunit_try_run_case+0x1b3/0x490
[   30.568302]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   30.568302]  kthread+0x257/0x310
[   30.568302]  ret_from_fork+0x41/0x80
[   30.568302]  ret_from_fork_asm+0x1a/0x30
[   30.568302] 
[   30.568302] The buggy address belongs to the object at ffff88810294b780
[   30.568302]  which belongs to the cache kmalloc-64 of size 64
[   30.568302] The buggy address is located 0 bytes to the right of
[   30.568302]  allocated 48-byte region [ffff88810294b780, ffff88810294b7b0)
[   30.568302] 
[   30.568302] The buggy address belongs to the physical page:
[   30.568302] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10294b
[   30.568302] flags: 0x200000000000000(node=0|zone=2)
[   30.568302] page_type: f5(slab)
[   30.568302] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   30.568302] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   30.568302] page dumped because: kasan: bad access detected
[   30.568302] 
[   30.568302] Memory state around the buggy address:
[   30.568302]  ffff88810294b680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   30.568302]  ffff88810294b700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   30.568302] >ffff88810294b780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   30.568302]                                      ^
[   30.568302]  ffff88810294b800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.568302]  ffff88810294b880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.568302] ==================================================================
[   31.956778] ==================================================================
[   31.957496] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1d7b/0x5450
[   31.957496] Write of size 8 at addr ffff88810294b7b0 by task kunit_try_catch/274
[   31.957496] 
[   31.957496] CPU: 1 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241126 #1
[   31.957496] Tainted: [B]=BAD_PAGE, [N]=TEST
[   31.957496] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   31.957496] Call Trace:
[   31.957496]  <TASK>
[   31.957496]  dump_stack_lvl+0x73/0xb0
[   31.957496]  print_report+0xd1/0x640
[   31.957496]  ? __virt_addr_valid+0x1db/0x2d0
[   31.957496]  ? kasan_complete_mode_report_info+0x2a/0x200
[   31.957496]  kasan_report+0x102/0x140
[   31.957496]  ? kasan_atomics_helper+0x1d7b/0x5450
[   31.957496]  ? kasan_atomics_helper+0x1d7b/0x5450
[   31.957496]  kasan_check_range+0x10c/0x1c0
[   31.957496]  __kasan_check_write+0x18/0x20
[   31.957496]  kasan_atomics_helper+0x1d7b/0x5450
[   31.957496]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   31.957496]  ? __kmalloc_cache_noprof+0x184/0x410
[   31.957496]  ? trace_hardirqs_on+0x37/0xe0
[   31.957496]  ? kasan_atomics+0x153/0x310
[   31.957496]  kasan_atomics+0x1dd/0x310
[   31.957496]  ? __pfx_kasan_atomics+0x10/0x10
[   31.957496]  ? __pfx_kasan_atomics+0x10/0x10
[   31.957496]  kunit_try_run_case+0x1b3/0x490
[   31.957496]  ? __pfx_kunit_try_run_case+0x10/0x10
[   31.957496]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   31.957496]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   31.957496]  ? __kthread_parkme+0x82/0x160
[   31.957496]  ? preempt_count_sub+0x50/0x80
[   31.957496]  ? __pfx_kunit_try_run_case+0x10/0x10
[   31.957496]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   31.957496]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   31.957496]  kthread+0x257/0x310
[   31.957496]  ? __pfx_kthread+0x10/0x10
[   31.957496]  ret_from_fork+0x41/0x80
[   31.957496]  ? __pfx_kthread+0x10/0x10
[   31.957496]  ret_from_fork_asm+0x1a/0x30
[   31.957496]  </TASK>
[   31.957496] 
[   31.957496] Allocated by task 274:
[   31.957496]  kasan_save_stack+0x3d/0x60
[   31.957496]  kasan_save_track+0x18/0x40
[   31.957496]  kasan_save_alloc_info+0x3b/0x50
[   31.957496]  __kasan_kmalloc+0xb7/0xc0
[   31.957496]  __kmalloc_cache_noprof+0x184/0x410
[   31.957496]  kasan_atomics+0x96/0x310
[   31.957496]  kunit_try_run_case+0x1b3/0x490
[   31.957496]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   31.957496]  kthread+0x257/0x310
[   31.957496]  ret_from_fork+0x41/0x80
[   31.957496]  ret_from_fork_asm+0x1a/0x30
[   31.957496] 
[   31.957496] The buggy address belongs to the object at ffff88810294b780
[   31.957496]  which belongs to the cache kmalloc-64 of size 64
[   31.957496] The buggy address is located 0 bytes to the right of
[   31.957496]  allocated 48-byte region [ffff88810294b780, ffff88810294b7b0)
[   31.957496] 
[   31.957496] The buggy address belongs to the physical page:
[   31.957496] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10294b
[   31.957496] flags: 0x200000000000000(node=0|zone=2)
[   31.957496] page_type: f5(slab)
[   31.957496] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   31.957496] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   31.957496] page dumped because: kasan: bad access detected
[   31.957496] 
[   31.957496] Memory state around the buggy address:
[   31.957496]  ffff88810294b680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   31.957496]  ffff88810294b700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   31.957496] >ffff88810294b780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   31.957496]                                      ^
[   31.957496]  ffff88810294b800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.957496]  ffff88810294b880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.957496] ==================================================================
[   30.839600] ==================================================================
[   30.840243] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x107a/0x5450
[   30.840243] Write of size 4 at addr ffff88810294b7b0 by task kunit_try_catch/274
[   30.840243] 
[   30.840243] CPU: 1 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241126 #1
[   30.840243] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.840243] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   30.840243] Call Trace:
[   30.840243]  <TASK>
[   30.840243]  dump_stack_lvl+0x73/0xb0
[   30.840243]  print_report+0xd1/0x640
[   30.840243]  ? __virt_addr_valid+0x1db/0x2d0
[   30.840243]  ? kasan_complete_mode_report_info+0x2a/0x200
[   30.840243]  kasan_report+0x102/0x140
[   30.840243]  ? kasan_atomics_helper+0x107a/0x5450
[   30.840243]  ? kasan_atomics_helper+0x107a/0x5450
[   30.840243]  kasan_check_range+0x10c/0x1c0
[   30.840243]  __kasan_check_write+0x18/0x20
[   30.840243]  kasan_atomics_helper+0x107a/0x5450
[   30.840243]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   30.840243]  ? __kmalloc_cache_noprof+0x184/0x410
[   30.840243]  ? trace_hardirqs_on+0x37/0xe0
[   30.840243]  ? kasan_atomics+0x153/0x310
[   30.840243]  kasan_atomics+0x1dd/0x310
[   30.840243]  ? __pfx_kasan_atomics+0x10/0x10
[   30.840243]  ? __pfx_kasan_atomics+0x10/0x10
[   30.840243]  kunit_try_run_case+0x1b3/0x490
[   30.840243]  ? __pfx_kunit_try_run_case+0x10/0x10
[   30.840243]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   30.840243]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   30.840243]  ? __kthread_parkme+0x82/0x160
[   30.840243]  ? preempt_count_sub+0x50/0x80
[   30.840243]  ? __pfx_kunit_try_run_case+0x10/0x10
[   30.840243]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   30.840243]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   30.840243]  kthread+0x257/0x310
[   30.840243]  ? __pfx_kthread+0x10/0x10
[   30.840243]  ret_from_fork+0x41/0x80
[   30.840243]  ? __pfx_kthread+0x10/0x10
[   30.840243]  ret_from_fork_asm+0x1a/0x30
[   30.840243]  </TASK>
[   30.840243] 
[   30.840243] Allocated by task 274:
[   30.840243]  kasan_save_stack+0x3d/0x60
[   30.840243]  kasan_save_track+0x18/0x40
[   30.840243]  kasan_save_alloc_info+0x3b/0x50
[   30.840243]  __kasan_kmalloc+0xb7/0xc0
[   30.840243]  __kmalloc_cache_noprof+0x184/0x410
[   30.840243]  kasan_atomics+0x96/0x310
[   30.840243]  kunit_try_run_case+0x1b3/0x490
[   30.840243]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   30.840243]  kthread+0x257/0x310
[   30.840243]  ret_from_fork+0x41/0x80
[   30.840243]  ret_from_fork_asm+0x1a/0x30
[   30.840243] 
[   30.840243] The buggy address belongs to the object at ffff88810294b780
[   30.840243]  which belongs to the cache kmalloc-64 of size 64
[   30.840243] The buggy address is located 0 bytes to the right of
[   30.840243]  allocated 48-byte region [ffff88810294b780, ffff88810294b7b0)
[   30.840243] 
[   30.840243] The buggy address belongs to the physical page:
[   30.840243] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10294b
[   30.840243] flags: 0x200000000000000(node=0|zone=2)
[   30.840243] page_type: f5(slab)
[   30.840243] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   30.840243] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   30.840243] page dumped because: kasan: bad access detected
[   30.840243] 
[   30.840243] Memory state around the buggy address:
[   30.840243]  ffff88810294b680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   30.840243]  ffff88810294b700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   30.840243] >ffff88810294b780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   30.840243]                                      ^
[   30.840243]  ffff88810294b800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.840243]  ffff88810294b880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.840243] ==================================================================
[   32.042176] ==================================================================
[   32.042603] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1eab/0x5450
[   32.042603] Write of size 8 at addr ffff88810294b7b0 by task kunit_try_catch/274
[   32.042603] 
[   32.042603] CPU: 1 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241126 #1
[   32.042603] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.045312] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   32.045312] Call Trace:
[   32.045312]  <TASK>
[   32.045312]  dump_stack_lvl+0x73/0xb0
[   32.045312]  print_report+0xd1/0x640
[   32.045312]  ? __virt_addr_valid+0x1db/0x2d0
[   32.045312]  ? kasan_complete_mode_report_info+0x2a/0x200
[   32.045312]  kasan_report+0x102/0x140
[   32.045312]  ? kasan_atomics_helper+0x1eab/0x5450
[   32.045312]  ? kasan_atomics_helper+0x1eab/0x5450
[   32.045312]  kasan_check_range+0x10c/0x1c0
[   32.045312]  __kasan_check_write+0x18/0x20
[   32.045312]  kasan_atomics_helper+0x1eab/0x5450
[   32.045312]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   32.045312]  ? __kmalloc_cache_noprof+0x184/0x410
[   32.045312]  ? trace_hardirqs_on+0x37/0xe0
[   32.045312]  ? kasan_atomics+0x153/0x310
[   32.045312]  kasan_atomics+0x1dd/0x310
[   32.045312]  ? __pfx_kasan_atomics+0x10/0x10
[   32.045312]  ? __pfx_kasan_atomics+0x10/0x10
[   32.045312]  kunit_try_run_case+0x1b3/0x490
[   32.045312]  ? __pfx_kunit_try_run_case+0x10/0x10
[   32.045312]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   32.045312]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   32.045312]  ? __kthread_parkme+0x82/0x160
[   32.045312]  ? preempt_count_sub+0x50/0x80
[   32.045312]  ? __pfx_kunit_try_run_case+0x10/0x10
[   32.045312]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   32.045312]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   32.045312]  kthread+0x257/0x310
[   32.045312]  ? __pfx_kthread+0x10/0x10
[   32.045312]  ret_from_fork+0x41/0x80
[   32.045312]  ? __pfx_kthread+0x10/0x10
[   32.045312]  ret_from_fork_asm+0x1a/0x30
[   32.045312]  </TASK>
[   32.045312] 
[   32.045312] Allocated by task 274:
[   32.045312]  kasan_save_stack+0x3d/0x60
[   32.045312]  kasan_save_track+0x18/0x40
[   32.045312]  kasan_save_alloc_info+0x3b/0x50
[   32.045312]  __kasan_kmalloc+0xb7/0xc0
[   32.045312]  __kmalloc_cache_noprof+0x184/0x410
[   32.045312]  kasan_atomics+0x96/0x310
[   32.045312]  kunit_try_run_case+0x1b3/0x490
[   32.045312]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   32.045312]  kthread+0x257/0x310
[   32.045312]  ret_from_fork+0x41/0x80
[   32.045312]  ret_from_fork_asm+0x1a/0x30
[   32.045312] 
[   32.045312] The buggy address belongs to the object at ffff88810294b780
[   32.045312]  which belongs to the cache kmalloc-64 of size 64
[   32.045312] The buggy address is located 0 bytes to the right of
[   32.045312]  allocated 48-byte region [ffff88810294b780, ffff88810294b7b0)
[   32.045312] 
[   32.045312] The buggy address belongs to the physical page:
[   32.045312] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10294b
[   32.045312] flags: 0x200000000000000(node=0|zone=2)
[   32.045312] page_type: f5(slab)
[   32.045312] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   32.045312] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   32.045312] page dumped because: kasan: bad access detected
[   32.045312] 
[   32.045312] Memory state around the buggy address:
[   32.045312]  ffff88810294b680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.045312]  ffff88810294b700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.045312] >ffff88810294b780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   32.045312]                                      ^
[   32.045312]  ffff88810294b800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.045312]  ffff88810294b880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.045312] ==================================================================
[   32.079931] ==================================================================
[   32.080402] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1f44/0x5450
[   32.080402] Write of size 8 at addr ffff88810294b7b0 by task kunit_try_catch/274
[   32.080402] 
[   32.080402] CPU: 1 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241126 #1
[   32.080402] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.080402] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   32.080402] Call Trace:
[   32.080402]  <TASK>
[   32.080402]  dump_stack_lvl+0x73/0xb0
[   32.080402]  print_report+0xd1/0x640
[   32.080402]  ? __virt_addr_valid+0x1db/0x2d0
[   32.080402]  ? kasan_complete_mode_report_info+0x2a/0x200
[   32.080402]  kasan_report+0x102/0x140
[   32.080402]  ? kasan_atomics_helper+0x1f44/0x5450
[   32.080402]  ? kasan_atomics_helper+0x1f44/0x5450
[   32.080402]  kasan_check_range+0x10c/0x1c0
[   32.080402]  __kasan_check_write+0x18/0x20
[   32.080402]  kasan_atomics_helper+0x1f44/0x5450
[   32.080402]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   32.080402]  ? __kmalloc_cache_noprof+0x184/0x410
[   32.080402]  ? trace_hardirqs_on+0x37/0xe0
[   32.080402]  ? kasan_atomics+0x153/0x310
[   32.080402]  kasan_atomics+0x1dd/0x310
[   32.080402]  ? __pfx_kasan_atomics+0x10/0x10
[   32.080402]  ? __pfx_kasan_atomics+0x10/0x10
[   32.080402]  kunit_try_run_case+0x1b3/0x490
[   32.080402]  ? __pfx_kunit_try_run_case+0x10/0x10
[   32.080402]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   32.080402]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   32.080402]  ? __kthread_parkme+0x82/0x160
[   32.080402]  ? preempt_count_sub+0x50/0x80
[   32.080402]  ? __pfx_kunit_try_run_case+0x10/0x10
[   32.080402]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   32.080402]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   32.080402]  kthread+0x257/0x310
[   32.080402]  ? __pfx_kthread+0x10/0x10
[   32.080402]  ret_from_fork+0x41/0x80
[   32.080402]  ? __pfx_kthread+0x10/0x10
[   32.080402]  ret_from_fork_asm+0x1a/0x30
[   32.080402]  </TASK>
[   32.080402] 
[   32.080402] Allocated by task 274:
[   32.080402]  kasan_save_stack+0x3d/0x60
[   32.080402]  kasan_save_track+0x18/0x40
[   32.080402]  kasan_save_alloc_info+0x3b/0x50
[   32.080402]  __kasan_kmalloc+0xb7/0xc0
[   32.080402]  __kmalloc_cache_noprof+0x184/0x410
[   32.080402]  kasan_atomics+0x96/0x310
[   32.080402]  kunit_try_run_case+0x1b3/0x490
[   32.080402]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   32.080402]  kthread+0x257/0x310
[   32.080402]  ret_from_fork+0x41/0x80
[   32.080402]  ret_from_fork_asm+0x1a/0x30
[   32.080402] 
[   32.080402] The buggy address belongs to the object at ffff88810294b780
[   32.080402]  which belongs to the cache kmalloc-64 of size 64
[   32.080402] The buggy address is located 0 bytes to the right of
[   32.080402]  allocated 48-byte region [ffff88810294b780, ffff88810294b7b0)
[   32.080402] 
[   32.080402] The buggy address belongs to the physical page:
[   32.080402] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10294b
[   32.080402] flags: 0x200000000000000(node=0|zone=2)
[   32.080402] page_type: f5(slab)
[   32.080402] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   32.080402] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   32.080402] page dumped because: kasan: bad access detected
[   32.080402] 
[   32.080402] Memory state around the buggy address:
[   32.080402]  ffff88810294b680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.080402]  ffff88810294b700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.080402] >ffff88810294b780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   32.080402]                                      ^
[   32.080402]  ffff88810294b800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.080402]  ffff88810294b880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.080402] ==================================================================
[   31.454848] ==================================================================
[   31.455450] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1650/0x5450
[   31.455450] Write of size 8 at addr ffff88810294b7b0 by task kunit_try_catch/274
[   31.455450] 
[   31.455450] CPU: 1 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241126 #1
[   31.455450] Tainted: [B]=BAD_PAGE, [N]=TEST
[   31.455450] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   31.455450] Call Trace:
[   31.455450]  <TASK>
[   31.455450]  dump_stack_lvl+0x73/0xb0
[   31.455450]  print_report+0xd1/0x640
[   31.455450]  ? __virt_addr_valid+0x1db/0x2d0
[   31.455450]  ? kasan_complete_mode_report_info+0x2a/0x200
[   31.455450]  kasan_report+0x102/0x140
[   31.455450]  ? kasan_atomics_helper+0x1650/0x5450
[   31.455450]  ? kasan_atomics_helper+0x1650/0x5450
[   31.455450]  kasan_check_range+0x10c/0x1c0
[   31.455450]  __kasan_check_write+0x18/0x20
[   31.455450]  kasan_atomics_helper+0x1650/0x5450
[   31.455450]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   31.455450]  ? __kmalloc_cache_noprof+0x184/0x410
[   31.455450]  ? trace_hardirqs_on+0x37/0xe0
[   31.455450]  ? kasan_atomics+0x153/0x310
[   31.455450]  kasan_atomics+0x1dd/0x310
[   31.455450]  ? __pfx_kasan_atomics+0x10/0x10
[   31.455450]  ? __pfx_kasan_atomics+0x10/0x10
[   31.455450]  kunit_try_run_case+0x1b3/0x490
[   31.455450]  ? __pfx_kunit_try_run_case+0x10/0x10
[   31.455450]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   31.455450]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   31.455450]  ? __kthread_parkme+0x82/0x160
[   31.455450]  ? preempt_count_sub+0x50/0x80
[   31.455450]  ? __pfx_kunit_try_run_case+0x10/0x10
[   31.455450]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   31.455450]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   31.455450]  kthread+0x257/0x310
[   31.455450]  ? __pfx_kthread+0x10/0x10
[   31.455450]  ret_from_fork+0x41/0x80
[   31.455450]  ? __pfx_kthread+0x10/0x10
[   31.455450]  ret_from_fork_asm+0x1a/0x30
[   31.455450]  </TASK>
[   31.455450] 
[   31.455450] Allocated by task 274:
[   31.455450]  kasan_save_stack+0x3d/0x60
[   31.455450]  kasan_save_track+0x18/0x40
[   31.455450]  kasan_save_alloc_info+0x3b/0x50
[   31.455450]  __kasan_kmalloc+0xb7/0xc0
[   31.455450]  __kmalloc_cache_noprof+0x184/0x410
[   31.455450]  kasan_atomics+0x96/0x310
[   31.455450]  kunit_try_run_case+0x1b3/0x490
[   31.455450]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   31.455450]  kthread+0x257/0x310
[   31.455450]  ret_from_fork+0x41/0x80
[   31.455450]  ret_from_fork_asm+0x1a/0x30
[   31.455450] 
[   31.455450] The buggy address belongs to the object at ffff88810294b780
[   31.455450]  which belongs to the cache kmalloc-64 of size 64
[   31.455450] The buggy address is located 0 bytes to the right of
[   31.455450]  allocated 48-byte region [ffff88810294b780, ffff88810294b7b0)
[   31.455450] 
[   31.455450] The buggy address belongs to the physical page:
[   31.455450] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10294b
[   31.455450] flags: 0x200000000000000(node=0|zone=2)
[   31.455450] page_type: f5(slab)
[   31.455450] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   31.455450] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   31.455450] page dumped because: kasan: bad access detected
[   31.455450] 
[   31.455450] Memory state around the buggy address:
[   31.455450]  ffff88810294b680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   31.455450]  ffff88810294b700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   31.455450] >ffff88810294b780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   31.455450]                                      ^
[   31.455450]  ffff88810294b800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.455450]  ffff88810294b880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.455450] ==================================================================
[   31.006460] ==================================================================
[   31.008005] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1218/0x5450
[   31.008005] Write of size 4 at addr ffff88810294b7b0 by task kunit_try_catch/274
[   31.008005] 
[   31.008005] CPU: 1 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241126 #1
[   31.008005] Tainted: [B]=BAD_PAGE, [N]=TEST
[   31.008005] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   31.008005] Call Trace:
[   31.008005]  <TASK>
[   31.008005]  dump_stack_lvl+0x73/0xb0
[   31.008005]  print_report+0xd1/0x640
[   31.008005]  ? __virt_addr_valid+0x1db/0x2d0
[   31.008005]  ? kasan_complete_mode_report_info+0x2a/0x200
[   31.008005]  kasan_report+0x102/0x140
[   31.008005]  ? kasan_atomics_helper+0x1218/0x5450
[   31.008005]  ? kasan_atomics_helper+0x1218/0x5450
[   31.008005]  kasan_check_range+0x10c/0x1c0
[   31.008005]  __kasan_check_write+0x18/0x20
[   31.008005]  kasan_atomics_helper+0x1218/0x5450
[   31.008005]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   31.008005]  ? __kmalloc_cache_noprof+0x184/0x410
[   31.008005]  ? trace_hardirqs_on+0x37/0xe0
[   31.008005]  ? kasan_atomics+0x153/0x310
[   31.008005]  kasan_atomics+0x1dd/0x310
[   31.008005]  ? __pfx_kasan_atomics+0x10/0x10
[   31.008005]  ? __pfx_kasan_atomics+0x10/0x10
[   31.008005]  kunit_try_run_case+0x1b3/0x490
[   31.008005]  ? __pfx_kunit_try_run_case+0x10/0x10
[   31.008005]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   31.008005]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   31.008005]  ? __kthread_parkme+0x82/0x160
[   31.008005]  ? preempt_count_sub+0x50/0x80
[   31.008005]  ? __pfx_kunit_try_run_case+0x10/0x10
[   31.008005]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   31.008005]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   31.008005]  kthread+0x257/0x310
[   31.008005]  ? __pfx_kthread+0x10/0x10
[   31.008005]  ret_from_fork+0x41/0x80
[   31.008005]  ? __pfx_kthread+0x10/0x10
[   31.008005]  ret_from_fork_asm+0x1a/0x30
[   31.008005]  </TASK>
[   31.008005] 
[   31.008005] Allocated by task 274:
[   31.008005]  kasan_save_stack+0x3d/0x60
[   31.008005]  kasan_save_track+0x18/0x40
[   31.008005]  kasan_save_alloc_info+0x3b/0x50
[   31.008005]  __kasan_kmalloc+0xb7/0xc0
[   31.008005]  __kmalloc_cache_noprof+0x184/0x410
[   31.008005]  kasan_atomics+0x96/0x310
[   31.008005]  kunit_try_run_case+0x1b3/0x490
[   31.008005]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   31.008005]  kthread+0x257/0x310
[   31.008005]  ret_from_fork+0x41/0x80
[   31.008005]  ret_from_fork_asm+0x1a/0x30
[   31.008005] 
[   31.008005] The buggy address belongs to the object at ffff88810294b780
[   31.008005]  which belongs to the cache kmalloc-64 of size 64
[   31.008005] The buggy address is located 0 bytes to the right of
[   31.008005]  allocated 48-byte region [ffff88810294b780, ffff88810294b7b0)
[   31.008005] 
[   31.008005] The buggy address belongs to the physical page:
[   31.008005] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10294b
[   31.008005] flags: 0x200000000000000(node=0|zone=2)
[   31.008005] page_type: f5(slab)
[   31.008005] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   31.008005] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   31.008005] page dumped because: kasan: bad access detected
[   31.008005] 
[   31.008005] Memory state around the buggy address:
[   31.008005]  ffff88810294b680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   31.008005]  ffff88810294b700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   31.008005] >ffff88810294b780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   31.008005]                                      ^
[   31.008005]  ffff88810294b800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.008005]  ffff88810294b880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.008005] ==================================================================
[   29.757237] ==================================================================
[   29.757510] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b8a/0x5450
[   29.757510] Read of size 4 at addr ffff88810294b7b0 by task kunit_try_catch/274
[   29.757510] 
[   29.757510] CPU: 1 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241126 #1
[   29.757510] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.757510] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   29.757510] Call Trace:
[   29.757510]  <TASK>
[   29.757510]  dump_stack_lvl+0x73/0xb0
[   29.757510]  print_report+0xd1/0x640
[   29.757510]  ? __virt_addr_valid+0x1db/0x2d0
[   29.757510]  ? kasan_complete_mode_report_info+0x2a/0x200
[   29.757510]  kasan_report+0x102/0x140
[   29.757510]  ? kasan_atomics_helper+0x4b8a/0x5450
[   29.757510]  ? kasan_atomics_helper+0x4b8a/0x5450
[   29.757510]  __asan_report_load4_noabort+0x18/0x20
[   29.757510]  kasan_atomics_helper+0x4b8a/0x5450
[   29.757510]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   29.757510]  ? __kmalloc_cache_noprof+0x184/0x410
[   29.757510]  ? trace_hardirqs_on+0x37/0xe0
[   29.757510]  ? kasan_atomics+0x153/0x310
[   29.757510]  kasan_atomics+0x1dd/0x310
[   29.757510]  ? __pfx_kasan_atomics+0x10/0x10
[   29.757510]  ? __pfx_kasan_atomics+0x10/0x10
[   29.757510]  kunit_try_run_case+0x1b3/0x490
[   29.757510]  ? __pfx_kunit_try_run_case+0x10/0x10
[   29.757510]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   29.757510]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   29.757510]  ? __kthread_parkme+0x82/0x160
[   29.757510]  ? preempt_count_sub+0x50/0x80
[   29.757510]  ? __pfx_kunit_try_run_case+0x10/0x10
[   29.757510]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   29.757510]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   29.757510]  kthread+0x257/0x310
[   29.757510]  ? __pfx_kthread+0x10/0x10
[   29.757510]  ret_from_fork+0x41/0x80
[   29.757510]  ? __pfx_kthread+0x10/0x10
[   29.757510]  ret_from_fork_asm+0x1a/0x30
[   29.757510]  </TASK>
[   29.757510] 
[   29.757510] Allocated by task 274:
[   29.757510]  kasan_save_stack+0x3d/0x60
[   29.757510]  kasan_save_track+0x18/0x40
[   29.757510]  kasan_save_alloc_info+0x3b/0x50
[   29.757510]  __kasan_kmalloc+0xb7/0xc0
[   29.757510]  __kmalloc_cache_noprof+0x184/0x410
[   29.757510]  kasan_atomics+0x96/0x310
[   29.757510]  kunit_try_run_case+0x1b3/0x490
[   29.757510]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   29.757510]  kthread+0x257/0x310
[   29.757510]  ret_from_fork+0x41/0x80
[   29.757510]  ret_from_fork_asm+0x1a/0x30
[   29.757510] 
[   29.757510] The buggy address belongs to the object at ffff88810294b780
[   29.757510]  which belongs to the cache kmalloc-64 of size 64
[   29.757510] The buggy address is located 0 bytes to the right of
[   29.757510]  allocated 48-byte region [ffff88810294b780, ffff88810294b7b0)
[   29.757510] 
[   29.757510] The buggy address belongs to the physical page:
[   29.757510] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10294b
[   29.757510] flags: 0x200000000000000(node=0|zone=2)
[   29.757510] page_type: f5(slab)
[   29.757510] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   29.757510] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   29.757510] page dumped because: kasan: bad access detected
[   29.757510] 
[   29.757510] Memory state around the buggy address:
[   29.757510]  ffff88810294b680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.757510]  ffff88810294b700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.757510] >ffff88810294b780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   29.757510]                                      ^
[   29.757510]  ffff88810294b800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.757510]  ffff88810294b880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.757510] ==================================================================
[   30.881816] ==================================================================
[   30.882348] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a1e/0x5450
[   30.882352] Read of size 4 at addr ffff88810294b7b0 by task kunit_try_catch/274
[   30.882352] 
[   30.882352] CPU: 1 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241126 #1
[   30.882352] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.882352] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   30.886021] Call Trace:
[   30.886021]  <TASK>
[   30.886021]  dump_stack_lvl+0x73/0xb0
[   30.886021]  print_report+0xd1/0x640
[   30.886021]  ? __virt_addr_valid+0x1db/0x2d0
[   30.886021]  ? kasan_complete_mode_report_info+0x2a/0x200
[   30.886021]  kasan_report+0x102/0x140
[   30.886021]  ? kasan_atomics_helper+0x4a1e/0x5450
[   30.886021]  ? kasan_atomics_helper+0x4a1e/0x5450
[   30.886021]  __asan_report_load4_noabort+0x18/0x20
[   30.886021]  kasan_atomics_helper+0x4a1e/0x5450
[   30.886021]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   30.886021]  ? __kmalloc_cache_noprof+0x184/0x410
[   30.886021]  ? trace_hardirqs_on+0x37/0xe0
[   30.886021]  ? kasan_atomics+0x153/0x310
[   30.886021]  kasan_atomics+0x1dd/0x310
[   30.886021]  ? __pfx_kasan_atomics+0x10/0x10
[   30.886021]  ? __pfx_kasan_atomics+0x10/0x10
[   30.886021]  kunit_try_run_case+0x1b3/0x490
[   30.886021]  ? __pfx_kunit_try_run_case+0x10/0x10
[   30.886021]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   30.886021]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   30.886021]  ? __kthread_parkme+0x82/0x160
[   30.886021]  ? preempt_count_sub+0x50/0x80
[   30.886021]  ? __pfx_kunit_try_run_case+0x10/0x10
[   30.886021]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   30.886021]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   30.886021]  kthread+0x257/0x310
[   30.886021]  ? __pfx_kthread+0x10/0x10
[   30.886021]  ret_from_fork+0x41/0x80
[   30.886021]  ? __pfx_kthread+0x10/0x10
[   30.886021]  ret_from_fork_asm+0x1a/0x30
[   30.886021]  </TASK>
[   30.886021] 
[   30.886021] Allocated by task 274:
[   30.886021]  kasan_save_stack+0x3d/0x60
[   30.886021]  kasan_save_track+0x18/0x40
[   30.886021]  kasan_save_alloc_info+0x3b/0x50
[   30.886021]  __kasan_kmalloc+0xb7/0xc0
[   30.886021]  __kmalloc_cache_noprof+0x184/0x410
[   30.886021]  kasan_atomics+0x96/0x310
[   30.886021]  kunit_try_run_case+0x1b3/0x490
[   30.886021]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   30.886021]  kthread+0x257/0x310
[   30.886021]  ret_from_fork+0x41/0x80
[   30.886021]  ret_from_fork_asm+0x1a/0x30
[   30.886021] 
[   30.886021] The buggy address belongs to the object at ffff88810294b780
[   30.886021]  which belongs to the cache kmalloc-64 of size 64
[   30.886021] The buggy address is located 0 bytes to the right of
[   30.886021]  allocated 48-byte region [ffff88810294b780, ffff88810294b7b0)
[   30.886021] 
[   30.886021] The buggy address belongs to the physical page:
[   30.886021] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10294b
[   30.886021] flags: 0x200000000000000(node=0|zone=2)
[   30.886021] page_type: f5(slab)
[   30.886021] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   30.886021] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   30.886021] page dumped because: kasan: bad access detected
[   30.886021] 
[   30.886021] Memory state around the buggy address:
[   30.886021]  ffff88810294b680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   30.886021]  ffff88810294b700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   30.886021] >ffff88810294b780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   30.886021]                                      ^
[   30.886021]  ffff88810294b800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.886021]  ffff88810294b880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.886021] ==================================================================
[   31.406968] ==================================================================
[   31.407501] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x15b7/0x5450
[   31.407711] Write of size 8 at addr ffff88810294b7b0 by task kunit_try_catch/274
[   31.407711] 
[   31.407711] CPU: 1 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241126 #1
[   31.407711] Tainted: [B]=BAD_PAGE, [N]=TEST
[   31.407711] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   31.407711] Call Trace:
[   31.407711]  <TASK>
[   31.407711]  dump_stack_lvl+0x73/0xb0
[   31.407711]  print_report+0xd1/0x640
[   31.407711]  ? __virt_addr_valid+0x1db/0x2d0
[   31.407711]  ? kasan_complete_mode_report_info+0x2a/0x200
[   31.407711]  kasan_report+0x102/0x140
[   31.407711]  ? kasan_atomics_helper+0x15b7/0x5450
[   31.407711]  ? kasan_atomics_helper+0x15b7/0x5450
[   31.407711]  kasan_check_range+0x10c/0x1c0
[   31.407711]  __kasan_check_write+0x18/0x20
[   31.407711]  kasan_atomics_helper+0x15b7/0x5450
[   31.407711]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   31.407711]  ? __kmalloc_cache_noprof+0x184/0x410
[   31.407711]  ? trace_hardirqs_on+0x37/0xe0
[   31.407711]  ? kasan_atomics+0x153/0x310
[   31.407711]  kasan_atomics+0x1dd/0x310
[   31.407711]  ? __pfx_kasan_atomics+0x10/0x10
[   31.407711]  ? __pfx_kasan_atomics+0x10/0x10
[   31.407711]  kunit_try_run_case+0x1b3/0x490
[   31.407711]  ? __pfx_kunit_try_run_case+0x10/0x10
[   31.407711]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   31.407711]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   31.407711]  ? __kthread_parkme+0x82/0x160
[   31.407711]  ? preempt_count_sub+0x50/0x80
[   31.407711]  ? __pfx_kunit_try_run_case+0x10/0x10
[   31.407711]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   31.407711]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   31.407711]  kthread+0x257/0x310
[   31.407711]  ? __pfx_kthread+0x10/0x10
[   31.407711]  ret_from_fork+0x41/0x80
[   31.407711]  ? __pfx_kthread+0x10/0x10
[   31.407711]  ret_from_fork_asm+0x1a/0x30
[   31.407711]  </TASK>
[   31.407711] 
[   31.407711] Allocated by task 274:
[   31.407711]  kasan_save_stack+0x3d/0x60
[   31.407711]  kasan_save_track+0x18/0x40
[   31.407711]  kasan_save_alloc_info+0x3b/0x50
[   31.407711]  __kasan_kmalloc+0xb7/0xc0
[   31.407711]  __kmalloc_cache_noprof+0x184/0x410
[   31.407711]  kasan_atomics+0x96/0x310
[   31.407711]  kunit_try_run_case+0x1b3/0x490
[   31.407711]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   31.407711]  kthread+0x257/0x310
[   31.407711]  ret_from_fork+0x41/0x80
[   31.407711]  ret_from_fork_asm+0x1a/0x30
[   31.407711] 
[   31.407711] The buggy address belongs to the object at ffff88810294b780
[   31.407711]  which belongs to the cache kmalloc-64 of size 64
[   31.407711] The buggy address is located 0 bytes to the right of
[   31.407711]  allocated 48-byte region [ffff88810294b780, ffff88810294b7b0)
[   31.407711] 
[   31.407711] The buggy address belongs to the physical page:
[   31.407711] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10294b
[   31.407711] flags: 0x200000000000000(node=0|zone=2)
[   31.407711] page_type: f5(slab)
[   31.407711] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   31.407711] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   31.407711] page dumped because: kasan: bad access detected
[   31.407711] 
[   31.407711] Memory state around the buggy address:
[   31.407711]  ffff88810294b680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   31.407711]  ffff88810294b700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   31.407711] >ffff88810294b780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   31.407711]                                      ^
[   31.407711]  ffff88810294b800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.407711]  ffff88810294b880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.407711] ==================================================================
[   31.312949] ==================================================================
[   31.313372] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x50d6/0x5450
[   31.313372] Write of size 8 at addr ffff88810294b7b0 by task kunit_try_catch/274
[   31.314565] 
[   31.314565] CPU: 1 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241126 #1
[   31.314565] Tainted: [B]=BAD_PAGE, [N]=TEST
[   31.314565] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   31.314565] Call Trace:
[   31.314565]  <TASK>
[   31.314565]  dump_stack_lvl+0x73/0xb0
[   31.314565]  print_report+0xd1/0x640
[   31.314565]  ? __virt_addr_valid+0x1db/0x2d0
[   31.314565]  ? kasan_complete_mode_report_info+0x2a/0x200
[   31.314565]  kasan_report+0x102/0x140
[   31.314565]  ? kasan_atomics_helper+0x50d6/0x5450
[   31.314565]  ? kasan_atomics_helper+0x50d6/0x5450
[   31.314565]  __asan_report_store8_noabort+0x1b/0x30
[   31.314565]  kasan_atomics_helper+0x50d6/0x5450
[   31.314565]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   31.314565]  ? __kmalloc_cache_noprof+0x184/0x410
[   31.314565]  ? trace_hardirqs_on+0x37/0xe0
[   31.314565]  ? kasan_atomics+0x153/0x310
[   31.314565]  kasan_atomics+0x1dd/0x310
[   31.314565]  ? __pfx_kasan_atomics+0x10/0x10
[   31.314565]  ? __pfx_kasan_atomics+0x10/0x10
[   31.314565]  kunit_try_run_case+0x1b3/0x490
[   31.314565]  ? __pfx_kunit_try_run_case+0x10/0x10
[   31.314565]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   31.314565]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   31.314565]  ? __kthread_parkme+0x82/0x160
[   31.314565]  ? preempt_count_sub+0x50/0x80
[   31.314565]  ? __pfx_kunit_try_run_case+0x10/0x10
[   31.314565]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   31.314565]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   31.314565]  kthread+0x257/0x310
[   31.314565]  ? __pfx_kthread+0x10/0x10
[   31.314565]  ret_from_fork+0x41/0x80
[   31.314565]  ? __pfx_kthread+0x10/0x10
[   31.314565]  ret_from_fork_asm+0x1a/0x30
[   31.314565]  </TASK>
[   31.314565] 
[   31.314565] Allocated by task 274:
[   31.314565]  kasan_save_stack+0x3d/0x60
[   31.314565]  kasan_save_track+0x18/0x40
[   31.314565]  kasan_save_alloc_info+0x3b/0x50
[   31.314565]  __kasan_kmalloc+0xb7/0xc0
[   31.314565]  __kmalloc_cache_noprof+0x184/0x410
[   31.314565]  kasan_atomics+0x96/0x310
[   31.314565]  kunit_try_run_case+0x1b3/0x490
[   31.314565]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   31.314565]  kthread+0x257/0x310
[   31.314565]  ret_from_fork+0x41/0x80
[   31.314565]  ret_from_fork_asm+0x1a/0x30
[   31.314565] 
[   31.314565] The buggy address belongs to the object at ffff88810294b780
[   31.314565]  which belongs to the cache kmalloc-64 of size 64
[   31.314565] The buggy address is located 0 bytes to the right of
[   31.314565]  allocated 48-byte region [ffff88810294b780, ffff88810294b7b0)
[   31.314565] 
[   31.314565] The buggy address belongs to the physical page:
[   31.314565] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10294b
[   31.314565] flags: 0x200000000000000(node=0|zone=2)
[   31.314565] page_type: f5(slab)
[   31.314565] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   31.314565] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   31.314565] page dumped because: kasan: bad access detected
[   31.314565] 
[   31.314565] Memory state around the buggy address:
[   31.314565]  ffff88810294b680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   31.314565]  ffff88810294b700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   31.314565] >ffff88810294b780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   31.314565]                                      ^
[   31.314565]  ffff88810294b800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.314565]  ffff88810294b880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.314565] ==================================================================
[   30.007567] ==================================================================
[   30.008257] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x566/0x5450
[   30.008257] Write of size 4 at addr ffff88810294b7b0 by task kunit_try_catch/274
[   30.008257] 
[   30.008257] CPU: 1 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241126 #1
[   30.008257] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.008257] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   30.008257] Call Trace:
[   30.008257]  <TASK>
[   30.008257]  dump_stack_lvl+0x73/0xb0
[   30.008257]  print_report+0xd1/0x640
[   30.008257]  ? __virt_addr_valid+0x1db/0x2d0
[   30.008257]  ? kasan_complete_mode_report_info+0x2a/0x200
[   30.008257]  kasan_report+0x102/0x140
[   30.008257]  ? kasan_atomics_helper+0x566/0x5450
[   30.008257]  ? kasan_atomics_helper+0x566/0x5450
[   30.008257]  kasan_check_range+0x10c/0x1c0
[   30.008257]  __kasan_check_write+0x18/0x20
[   30.008257]  kasan_atomics_helper+0x566/0x5450
[   30.008257]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   30.008257]  ? __kmalloc_cache_noprof+0x184/0x410
[   30.008257]  ? trace_hardirqs_on+0x37/0xe0
[   30.008257]  ? kasan_atomics+0x153/0x310
[   30.008257]  kasan_atomics+0x1dd/0x310
[   30.008257]  ? __pfx_kasan_atomics+0x10/0x10
[   30.008257]  ? __pfx_kasan_atomics+0x10/0x10
[   30.008257]  kunit_try_run_case+0x1b3/0x490
[   30.008257]  ? __pfx_kunit_try_run_case+0x10/0x10
[   30.008257]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   30.008257]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   30.008257]  ? __kthread_parkme+0x82/0x160
[   30.008257]  ? preempt_count_sub+0x50/0x80
[   30.008257]  ? __pfx_kunit_try_run_case+0x10/0x10
[   30.008257]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   30.008257]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   30.008257]  kthread+0x257/0x310
[   30.008257]  ? __pfx_kthread+0x10/0x10
[   30.008257]  ret_from_fork+0x41/0x80
[   30.008257]  ? __pfx_kthread+0x10/0x10
[   30.008257]  ret_from_fork_asm+0x1a/0x30
[   30.008257]  </TASK>
[   30.008257] 
[   30.008257] Allocated by task 274:
[   30.008257]  kasan_save_stack+0x3d/0x60
[   30.008257]  kasan_save_track+0x18/0x40
[   30.008257]  kasan_save_alloc_info+0x3b/0x50
[   30.008257]  __kasan_kmalloc+0xb7/0xc0
[   30.008257]  __kmalloc_cache_noprof+0x184/0x410
[   30.008257]  kasan_atomics+0x96/0x310
[   30.008257]  kunit_try_run_case+0x1b3/0x490
[   30.008257]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   30.008257]  kthread+0x257/0x310
[   30.008257]  ret_from_fork+0x41/0x80
[   30.008257]  ret_from_fork_asm+0x1a/0x30
[   30.008257] 
[   30.008257] The buggy address belongs to the object at ffff88810294b780
[   30.008257]  which belongs to the cache kmalloc-64 of size 64
[   30.008257] The buggy address is located 0 bytes to the right of
[   30.008257]  allocated 48-byte region [ffff88810294b780, ffff88810294b7b0)
[   30.008257] 
[   30.008257] The buggy address belongs to the physical page:
[   30.008257] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10294b
[   30.008257] flags: 0x200000000000000(node=0|zone=2)
[   30.008257] page_type: f5(slab)
[   30.008257] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   30.008257] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   30.008257] page dumped because: kasan: bad access detected
[   30.008257] 
[   30.008257] Memory state around the buggy address:
[   30.008257]  ffff88810294b680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   30.008257]  ffff88810294b700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   30.008257] >ffff88810294b780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   30.008257]                                      ^
[   30.008257]  ffff88810294b800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.008257]  ffff88810294b880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.008257] ==================================================================
[   31.047960] ==================================================================
[   31.048660] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x49ea/0x5450
[   31.048711] Read of size 4 at addr ffff88810294b7b0 by task kunit_try_catch/274
[   31.048711] 
[   31.048711] CPU: 1 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241126 #1
[   31.048711] Tainted: [B]=BAD_PAGE, [N]=TEST
[   31.048711] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   31.048711] Call Trace:
[   31.048711]  <TASK>
[   31.048711]  dump_stack_lvl+0x73/0xb0
[   31.048711]  print_report+0xd1/0x640
[   31.048711]  ? __virt_addr_valid+0x1db/0x2d0
[   31.048711]  ? kasan_complete_mode_report_info+0x2a/0x200
[   31.048711]  kasan_report+0x102/0x140
[   31.048711]  ? kasan_atomics_helper+0x49ea/0x5450
[   31.048711]  ? kasan_atomics_helper+0x49ea/0x5450
[   31.048711]  __asan_report_load4_noabort+0x18/0x20
[   31.048711]  kasan_atomics_helper+0x49ea/0x5450
[   31.048711]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   31.048711]  ? __kmalloc_cache_noprof+0x184/0x410
[   31.048711]  ? trace_hardirqs_on+0x37/0xe0
[   31.048711]  ? kasan_atomics+0x153/0x310
[   31.048711]  kasan_atomics+0x1dd/0x310
[   31.048711]  ? __pfx_kasan_atomics+0x10/0x10
[   31.048711]  ? __pfx_kasan_atomics+0x10/0x10
[   31.048711]  kunit_try_run_case+0x1b3/0x490
[   31.048711]  ? __pfx_kunit_try_run_case+0x10/0x10
[   31.048711]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   31.048711]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   31.048711]  ? __kthread_parkme+0x82/0x160
[   31.048711]  ? preempt_count_sub+0x50/0x80
[   31.048711]  ? __pfx_kunit_try_run_case+0x10/0x10
[   31.048711]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   31.048711]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   31.048711]  kthread+0x257/0x310
[   31.048711]  ? __pfx_kthread+0x10/0x10
[   31.048711]  ret_from_fork+0x41/0x80
[   31.048711]  ? __pfx_kthread+0x10/0x10
[   31.048711]  ret_from_fork_asm+0x1a/0x30
[   31.048711]  </TASK>
[   31.048711] 
[   31.048711] Allocated by task 274:
[   31.048711]  kasan_save_stack+0x3d/0x60
[   31.048711]  kasan_save_track+0x18/0x40
[   31.048711]  kasan_save_alloc_info+0x3b/0x50
[   31.048711]  __kasan_kmalloc+0xb7/0xc0
[   31.048711]  __kmalloc_cache_noprof+0x184/0x410
[   31.048711]  kasan_atomics+0x96/0x310
[   31.048711]  kunit_try_run_case+0x1b3/0x490
[   31.048711]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   31.048711]  kthread+0x257/0x310
[   31.048711]  ret_from_fork+0x41/0x80
[   31.048711]  ret_from_fork_asm+0x1a/0x30
[   31.048711] 
[   31.048711] The buggy address belongs to the object at ffff88810294b780
[   31.048711]  which belongs to the cache kmalloc-64 of size 64
[   31.048711] The buggy address is located 0 bytes to the right of
[   31.048711]  allocated 48-byte region [ffff88810294b780, ffff88810294b7b0)
[   31.048711] 
[   31.048711] The buggy address belongs to the physical page:
[   31.048711] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10294b
[   31.048711] flags: 0x200000000000000(node=0|zone=2)
[   31.048711] page_type: f5(slab)
[   31.048711] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   31.048711] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   31.048711] page dumped because: kasan: bad access detected
[   31.048711] 
[   31.048711] Memory state around the buggy address:
[   31.048711]  ffff88810294b680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   31.048711]  ffff88810294b700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   31.048711] >ffff88810294b780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   31.048711]                                      ^
[   31.048711]  ffff88810294b800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.048711]  ffff88810294b880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.048711] ==================================================================
[   32.461913] ==================================================================
[   32.462528] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x5117/0x5450
[   32.462637] Read of size 8 at addr ffff88810294b7b0 by task kunit_try_catch/274
[   32.463066] 
[   32.463066] CPU: 1 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241126 #1
[   32.463066] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.463066] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   32.463066] Call Trace:
[   32.463066]  <TASK>
[   32.463066]  dump_stack_lvl+0x73/0xb0
[   32.463066]  print_report+0xd1/0x640
[   32.463066]  ? __virt_addr_valid+0x1db/0x2d0
[   32.463066]  ? kasan_complete_mode_report_info+0x2a/0x200
[   32.463066]  kasan_report+0x102/0x140
[   32.463066]  ? kasan_atomics_helper+0x5117/0x5450
[   32.463066]  ? kasan_atomics_helper+0x5117/0x5450
[   32.463066]  __asan_report_load8_noabort+0x18/0x20
[   32.463066]  kasan_atomics_helper+0x5117/0x5450
[   32.463066]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   32.463066]  ? __kmalloc_cache_noprof+0x184/0x410
[   32.463066]  ? trace_hardirqs_on+0x37/0xe0
[   32.463066]  ? kasan_atomics+0x153/0x310
[   32.463066]  kasan_atomics+0x1dd/0x310
[   32.463066]  ? __pfx_kasan_atomics+0x10/0x10
[   32.463066]  ? __pfx_kasan_atomics+0x10/0x10
[   32.463066]  kunit_try_run_case+0x1b3/0x490
[   32.463066]  ? __pfx_kunit_try_run_case+0x10/0x10
[   32.463066]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   32.463066]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   32.463066]  ? __kthread_parkme+0x82/0x160
[   32.463066]  ? preempt_count_sub+0x50/0x80
[   32.463066]  ? __pfx_kunit_try_run_case+0x10/0x10
[   32.463066]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   32.463066]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   32.463066]  kthread+0x257/0x310
[   32.463066]  ? __pfx_kthread+0x10/0x10
[   32.463066]  ret_from_fork+0x41/0x80
[   32.463066]  ? __pfx_kthread+0x10/0x10
[   32.463066]  ret_from_fork_asm+0x1a/0x30
[   32.463066]  </TASK>
[   32.463066] 
[   32.463066] Allocated by task 274:
[   32.463066]  kasan_save_stack+0x3d/0x60
[   32.463066]  kasan_save_track+0x18/0x40
[   32.463066]  kasan_save_alloc_info+0x3b/0x50
[   32.463066]  __kasan_kmalloc+0xb7/0xc0
[   32.463066]  __kmalloc_cache_noprof+0x184/0x410
[   32.463066]  kasan_atomics+0x96/0x310
[   32.463066]  kunit_try_run_case+0x1b3/0x490
[   32.463066]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   32.463066]  kthread+0x257/0x310
[   32.463066]  ret_from_fork+0x41/0x80
[   32.463066]  ret_from_fork_asm+0x1a/0x30
[   32.463066] 
[   32.463066] The buggy address belongs to the object at ffff88810294b780
[   32.463066]  which belongs to the cache kmalloc-64 of size 64
[   32.463066] The buggy address is located 0 bytes to the right of
[   32.463066]  allocated 48-byte region [ffff88810294b780, ffff88810294b7b0)
[   32.463066] 
[   32.463066] The buggy address belongs to the physical page:
[   32.463066] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10294b
[   32.463066] flags: 0x200000000000000(node=0|zone=2)
[   32.463066] page_type: f5(slab)
[   32.463066] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   32.463066] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   32.463066] page dumped because: kasan: bad access detected
[   32.463066] 
[   32.463066] Memory state around the buggy address:
[   32.463066]  ffff88810294b680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.463066]  ffff88810294b700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.463066] >ffff88810294b780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   32.463066]                                      ^
[   32.463066]  ffff88810294b800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.463066]  ffff88810294b880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.463066] ==================================================================
[   31.750500] ==================================================================
[   31.751133] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1a80/0x5450
[   31.751133] Write of size 8 at addr ffff88810294b7b0 by task kunit_try_catch/274
[   31.751133] 
[   31.751133] CPU: 1 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241126 #1
[   31.751133] Tainted: [B]=BAD_PAGE, [N]=TEST
[   31.751133] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   31.751133] Call Trace:
[   31.751133]  <TASK>
[   31.751133]  dump_stack_lvl+0x73/0xb0
[   31.751133]  print_report+0xd1/0x640
[   31.751133]  ? __virt_addr_valid+0x1db/0x2d0
[   31.751133]  ? kasan_complete_mode_report_info+0x2a/0x200
[   31.751133]  kasan_report+0x102/0x140
[   31.751133]  ? kasan_atomics_helper+0x1a80/0x5450
[   31.751133]  ? kasan_atomics_helper+0x1a80/0x5450
[   31.751133]  kasan_check_range+0x10c/0x1c0
[   31.751133]  __kasan_check_write+0x18/0x20
[   31.751133]  kasan_atomics_helper+0x1a80/0x5450
[   31.751133]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   31.751133]  ? __kmalloc_cache_noprof+0x184/0x410
[   31.751133]  ? trace_hardirqs_on+0x37/0xe0
[   31.751133]  ? kasan_atomics+0x153/0x310
[   31.751133]  kasan_atomics+0x1dd/0x310
[   31.751133]  ? __pfx_kasan_atomics+0x10/0x10
[   31.751133]  ? __pfx_kasan_atomics+0x10/0x10
[   31.751133]  kunit_try_run_case+0x1b3/0x490
[   31.751133]  ? __pfx_kunit_try_run_case+0x10/0x10
[   31.751133]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   31.751133]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   31.751133]  ? __kthread_parkme+0x82/0x160
[   31.751133]  ? preempt_count_sub+0x50/0x80
[   31.751133]  ? __pfx_kunit_try_run_case+0x10/0x10
[   31.751133]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   31.751133]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   31.751133]  kthread+0x257/0x310
[   31.751133]  ? __pfx_kthread+0x10/0x10
[   31.751133]  ret_from_fork+0x41/0x80
[   31.751133]  ? __pfx_kthread+0x10/0x10
[   31.751133]  ret_from_fork_asm+0x1a/0x30
[   31.751133]  </TASK>
[   31.751133] 
[   31.751133] Allocated by task 274:
[   31.751133]  kasan_save_stack+0x3d/0x60
[   31.751133]  kasan_save_track+0x18/0x40
[   31.751133]  kasan_save_alloc_info+0x3b/0x50
[   31.751133]  __kasan_kmalloc+0xb7/0xc0
[   31.751133]  __kmalloc_cache_noprof+0x184/0x410
[   31.751133]  kasan_atomics+0x96/0x310
[   31.751133]  kunit_try_run_case+0x1b3/0x490
[   31.751133]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   31.751133]  kthread+0x257/0x310
[   31.751133]  ret_from_fork+0x41/0x80
[   31.751133]  ret_from_fork_asm+0x1a/0x30
[   31.751133] 
[   31.751133] The buggy address belongs to the object at ffff88810294b780
[   31.751133]  which belongs to the cache kmalloc-64 of size 64
[   31.751133] The buggy address is located 0 bytes to the right of
[   31.751133]  allocated 48-byte region [ffff88810294b780, ffff88810294b7b0)
[   31.751133] 
[   31.751133] The buggy address belongs to the physical page:
[   31.751133] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10294b
[   31.751133] flags: 0x200000000000000(node=0|zone=2)
[   31.751133] page_type: f5(slab)
[   31.751133] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   31.751133] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   31.751133] page dumped because: kasan: bad access detected
[   31.751133] 
[   31.751133] Memory state around the buggy address:
[   31.751133]  ffff88810294b680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   31.751133]  ffff88810294b700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   31.751133] >ffff88810294b780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   31.751133]                                      ^
[   31.751133]  ffff88810294b800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.751133]  ffff88810294b880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.751133] ==================================================================
[   32.333631] ==================================================================
[   32.334288] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x218b/0x5450
[   32.334288] Write of size 8 at addr ffff88810294b7b0 by task kunit_try_catch/274
[   32.334288] 
[   32.334288] CPU: 1 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241126 #1
[   32.334288] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.334288] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   32.334288] Call Trace:
[   32.334288]  <TASK>
[   32.334288]  dump_stack_lvl+0x73/0xb0
[   32.334288]  print_report+0xd1/0x640
[   32.334288]  ? __virt_addr_valid+0x1db/0x2d0
[   32.334288]  ? kasan_complete_mode_report_info+0x2a/0x200
[   32.334288]  kasan_report+0x102/0x140
[   32.334288]  ? kasan_atomics_helper+0x218b/0x5450
[   32.334288]  ? kasan_atomics_helper+0x218b/0x5450
[   32.334288]  kasan_check_range+0x10c/0x1c0
[   32.334288]  __kasan_check_write+0x18/0x20
[   32.334288]  kasan_atomics_helper+0x218b/0x5450
[   32.334288]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   32.334288]  ? __kmalloc_cache_noprof+0x184/0x410
[   32.334288]  ? trace_hardirqs_on+0x37/0xe0
[   32.334288]  ? kasan_atomics+0x153/0x310
[   32.334288]  kasan_atomics+0x1dd/0x310
[   32.334288]  ? __pfx_kasan_atomics+0x10/0x10
[   32.334288]  ? __pfx_kasan_atomics+0x10/0x10
[   32.334288]  kunit_try_run_case+0x1b3/0x490
[   32.334288]  ? __pfx_kunit_try_run_case+0x10/0x10
[   32.334288]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   32.334288]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   32.334288]  ? __kthread_parkme+0x82/0x160
[   32.334288]  ? preempt_count_sub+0x50/0x80
[   32.334288]  ? __pfx_kunit_try_run_case+0x10/0x10
[   32.334288]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   32.334288]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   32.334288]  kthread+0x257/0x310
[   32.334288]  ? __pfx_kthread+0x10/0x10
[   32.334288]  ret_from_fork+0x41/0x80
[   32.334288]  ? __pfx_kthread+0x10/0x10
[   32.334288]  ret_from_fork_asm+0x1a/0x30
[   32.334288]  </TASK>
[   32.334288] 
[   32.334288] Allocated by task 274:
[   32.334288]  kasan_save_stack+0x3d/0x60
[   32.334288]  kasan_save_track+0x18/0x40
[   32.334288]  kasan_save_alloc_info+0x3b/0x50
[   32.334288]  __kasan_kmalloc+0xb7/0xc0
[   32.334288]  __kmalloc_cache_noprof+0x184/0x410
[   32.334288]  kasan_atomics+0x96/0x310
[   32.334288]  kunit_try_run_case+0x1b3/0x490
[   32.334288]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   32.334288]  kthread+0x257/0x310
[   32.334288]  ret_from_fork+0x41/0x80
[   32.334288]  ret_from_fork_asm+0x1a/0x30
[   32.334288] 
[   32.334288] The buggy address belongs to the object at ffff88810294b780
[   32.334288]  which belongs to the cache kmalloc-64 of size 64
[   32.334288] The buggy address is located 0 bytes to the right of
[   32.334288]  allocated 48-byte region [ffff88810294b780, ffff88810294b7b0)
[   32.334288] 
[   32.334288] The buggy address belongs to the physical page:
[   32.334288] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10294b
[   32.334288] flags: 0x200000000000000(node=0|zone=2)
[   32.334288] page_type: f5(slab)
[   32.334288] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   32.334288] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   32.334288] page dumped because: kasan: bad access detected
[   32.334288] 
[   32.334288] Memory state around the buggy address:
[   32.334288]  ffff88810294b680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.334288]  ffff88810294b700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.334288] >ffff88810294b780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   32.334288]                                      ^
[   32.334288]  ffff88810294b800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.334288]  ffff88810294b880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.334288] ==================================================================
[   29.663618] ==================================================================
[   29.664179] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4bbe/0x5450
[   29.664179] Read of size 4 at addr ffff88810294b7b0 by task kunit_try_catch/274
[   29.664179] 
[   29.664179] CPU: 1 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241126 #1
[   29.664179] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.664179] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   29.664179] Call Trace:
[   29.664179]  <TASK>
[   29.664179]  dump_stack_lvl+0x73/0xb0
[   29.664179]  print_report+0xd1/0x640
[   29.664179]  ? __virt_addr_valid+0x1db/0x2d0
[   29.664179]  ? kasan_complete_mode_report_info+0x2a/0x200
[   29.664179]  kasan_report+0x102/0x140
[   29.672485]  ? kasan_atomics_helper+0x4bbe/0x5450
[   29.672485]  ? kasan_atomics_helper+0x4bbe/0x5450
[   29.672485]  __asan_report_load4_noabort+0x18/0x20
[   29.672485]  kasan_atomics_helper+0x4bbe/0x5450
[   29.672485]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   29.672485]  ? __kmalloc_cache_noprof+0x184/0x410
[   29.672485]  ? trace_hardirqs_on+0x37/0xe0
[   29.672485]  ? kasan_atomics+0x153/0x310
[   29.672485]  kasan_atomics+0x1dd/0x310
[   29.672485]  ? __pfx_kasan_atomics+0x10/0x10
[   29.672485]  ? __pfx_kasan_atomics+0x10/0x10
[   29.672485]  kunit_try_run_case+0x1b3/0x490
[   29.672485]  ? __pfx_kunit_try_run_case+0x10/0x10
[   29.672485]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   29.672485]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   29.672485]  ? __kthread_parkme+0x82/0x160
[   29.672485]  ? preempt_count_sub+0x50/0x80
[   29.672485]  ? __pfx_kunit_try_run_case+0x10/0x10
[   29.672485]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   29.672485]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   29.672485]  kthread+0x257/0x310
[   29.672485]  ? __pfx_kthread+0x10/0x10
[   29.672485]  ret_from_fork+0x41/0x80
[   29.672485]  ? __pfx_kthread+0x10/0x10
[   29.672485]  ret_from_fork_asm+0x1a/0x30
[   29.672485]  </TASK>
[   29.672485] 
[   29.672485] Allocated by task 274:
[   29.672485]  kasan_save_stack+0x3d/0x60
[   29.672485]  kasan_save_track+0x18/0x40
[   29.672485]  kasan_save_alloc_info+0x3b/0x50
[   29.672485]  __kasan_kmalloc+0xb7/0xc0
[   29.672485]  __kmalloc_cache_noprof+0x184/0x410
[   29.672485]  kasan_atomics+0x96/0x310
[   29.672485]  kunit_try_run_case+0x1b3/0x490
[   29.672485]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   29.672485]  kthread+0x257/0x310
[   29.672485]  ret_from_fork+0x41/0x80
[   29.672485]  ret_from_fork_asm+0x1a/0x30
[   29.672485] 
[   29.672485] The buggy address belongs to the object at ffff88810294b780
[   29.672485]  which belongs to the cache kmalloc-64 of size 64
[   29.672485] The buggy address is located 0 bytes to the right of
[   29.672485]  allocated 48-byte region [ffff88810294b780, ffff88810294b7b0)
[   29.672485] 
[   29.672485] The buggy address belongs to the physical page:
[   29.672485] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10294b
[   29.672485] flags: 0x200000000000000(node=0|zone=2)
[   29.672485] page_type: f5(slab)
[   29.672485] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   29.672485] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   29.672485] page dumped because: kasan: bad access detected
[   29.672485] 
[   29.672485] Memory state around the buggy address:
[   29.672485]  ffff88810294b680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.672485]  ffff88810294b700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.672485] >ffff88810294b780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   29.672485]                                      ^
[   29.672485]  ffff88810294b800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.672485]  ffff88810294b880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.672485] ==================================================================
[   30.356319] ==================================================================
[   30.356958] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa2c/0x5450
[   30.358471] Write of size 4 at addr ffff88810294b7b0 by task kunit_try_catch/274
[   30.358471] 
[   30.358471] CPU: 1 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241126 #1
[   30.358471] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.358471] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   30.358471] Call Trace:
[   30.358471]  <TASK>
[   30.358471]  dump_stack_lvl+0x73/0xb0
[   30.358471]  print_report+0xd1/0x640
[   30.358471]  ? __virt_addr_valid+0x1db/0x2d0
[   30.358471]  ? kasan_complete_mode_report_info+0x2a/0x200
[   30.358471]  kasan_report+0x102/0x140
[   30.358471]  ? kasan_atomics_helper+0xa2c/0x5450
[   30.358471]  ? kasan_atomics_helper+0xa2c/0x5450
[   30.358471]  kasan_check_range+0x10c/0x1c0
[   30.358471]  __kasan_check_write+0x18/0x20
[   30.358471]  kasan_atomics_helper+0xa2c/0x5450
[   30.358471]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   30.358471]  ? __kmalloc_cache_noprof+0x184/0x410
[   30.358471]  ? trace_hardirqs_on+0x37/0xe0
[   30.358471]  ? kasan_atomics+0x153/0x310
[   30.358471]  kasan_atomics+0x1dd/0x310
[   30.358471]  ? __pfx_kasan_atomics+0x10/0x10
[   30.358471]  ? __pfx_kasan_atomics+0x10/0x10
[   30.358471]  kunit_try_run_case+0x1b3/0x490
[   30.358471]  ? __pfx_kunit_try_run_case+0x10/0x10
[   30.358471]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   30.358471]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   30.358471]  ? __kthread_parkme+0x82/0x160
[   30.358471]  ? preempt_count_sub+0x50/0x80
[   30.358471]  ? __pfx_kunit_try_run_case+0x10/0x10
[   30.358471]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   30.358471]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   30.358471]  kthread+0x257/0x310
[   30.358471]  ? __pfx_kthread+0x10/0x10
[   30.358471]  ret_from_fork+0x41/0x80
[   30.358471]  ? __pfx_kthread+0x10/0x10
[   30.358471]  ret_from_fork_asm+0x1a/0x30
[   30.358471]  </TASK>
[   30.358471] 
[   30.358471] Allocated by task 274:
[   30.358471]  kasan_save_stack+0x3d/0x60
[   30.358471]  kasan_save_track+0x18/0x40
[   30.358471]  kasan_save_alloc_info+0x3b/0x50
[   30.358471]  __kasan_kmalloc+0xb7/0xc0
[   30.358471]  __kmalloc_cache_noprof+0x184/0x410
[   30.358471]  kasan_atomics+0x96/0x310
[   30.358471]  kunit_try_run_case+0x1b3/0x490
[   30.358471]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   30.358471]  kthread+0x257/0x310
[   30.358471]  ret_from_fork+0x41/0x80
[   30.358471]  ret_from_fork_asm+0x1a/0x30
[   30.358471] 
[   30.358471] The buggy address belongs to the object at ffff88810294b780
[   30.358471]  which belongs to the cache kmalloc-64 of size 64
[   30.358471] The buggy address is located 0 bytes to the right of
[   30.358471]  allocated 48-byte region [ffff88810294b780, ffff88810294b7b0)
[   30.358471] 
[   30.358471] The buggy address belongs to the physical page:
[   30.358471] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10294b
[   30.358471] flags: 0x200000000000000(node=0|zone=2)
[   30.358471] page_type: f5(slab)
[   30.358471] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   30.358471] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   30.358471] page dumped because: kasan: bad access detected
[   30.358471] 
[   30.358471] Memory state around the buggy address:
[   30.358471]  ffff88810294b680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   30.358471]  ffff88810294b700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   30.358471] >ffff88810294b780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   30.358471]                                      ^
[   30.358471]  ffff88810294b800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.358471]  ffff88810294b880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.358471] ==================================================================
[   32.245948] ==================================================================
[   32.246329] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x20c9/0x5450
[   32.246728] Write of size 8 at addr ffff88810294b7b0 by task kunit_try_catch/274
[   32.246728] 
[   32.246728] CPU: 1 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241126 #1
[   32.246728] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.246728] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   32.246728] Call Trace:
[   32.246728]  <TASK>
[   32.246728]  dump_stack_lvl+0x73/0xb0
[   32.246728]  print_report+0xd1/0x640
[   32.246728]  ? __virt_addr_valid+0x1db/0x2d0
[   32.246728]  ? kasan_complete_mode_report_info+0x2a/0x200
[   32.246728]  kasan_report+0x102/0x140
[   32.246728]  ? kasan_atomics_helper+0x20c9/0x5450
[   32.246728]  ? kasan_atomics_helper+0x20c9/0x5450
[   32.246728]  kasan_check_range+0x10c/0x1c0
[   32.246728]  __kasan_check_write+0x18/0x20
[   32.246728]  kasan_atomics_helper+0x20c9/0x5450
[   32.246728]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   32.246728]  ? __kmalloc_cache_noprof+0x184/0x410
[   32.246728]  ? trace_hardirqs_on+0x37/0xe0
[   32.246728]  ? kasan_atomics+0x153/0x310
[   32.246728]  kasan_atomics+0x1dd/0x310
[   32.246728]  ? __pfx_kasan_atomics+0x10/0x10
[   32.246728]  ? __pfx_kasan_atomics+0x10/0x10
[   32.246728]  kunit_try_run_case+0x1b3/0x490
[   32.246728]  ? __pfx_kunit_try_run_case+0x10/0x10
[   32.246728]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   32.246728]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   32.246728]  ? __kthread_parkme+0x82/0x160
[   32.246728]  ? preempt_count_sub+0x50/0x80
[   32.246728]  ? __pfx_kunit_try_run_case+0x10/0x10
[   32.246728]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   32.246728]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   32.246728]  kthread+0x257/0x310
[   32.246728]  ? __pfx_kthread+0x10/0x10
[   32.246728]  ret_from_fork+0x41/0x80
[   32.246728]  ? __pfx_kthread+0x10/0x10
[   32.246728]  ret_from_fork_asm+0x1a/0x30
[   32.246728]  </TASK>
[   32.246728] 
[   32.246728] Allocated by task 274:
[   32.246728]  kasan_save_stack+0x3d/0x60
[   32.246728]  kasan_save_track+0x18/0x40
[   32.246728]  kasan_save_alloc_info+0x3b/0x50
[   32.246728]  __kasan_kmalloc+0xb7/0xc0
[   32.246728]  __kmalloc_cache_noprof+0x184/0x410
[   32.246728]  kasan_atomics+0x96/0x310
[   32.246728]  kunit_try_run_case+0x1b3/0x490
[   32.246728]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   32.246728]  kthread+0x257/0x310
[   32.246728]  ret_from_fork+0x41/0x80
[   32.246728]  ret_from_fork_asm+0x1a/0x30
[   32.246728] 
[   32.246728] The buggy address belongs to the object at ffff88810294b780
[   32.246728]  which belongs to the cache kmalloc-64 of size 64
[   32.246728] The buggy address is located 0 bytes to the right of
[   32.246728]  allocated 48-byte region [ffff88810294b780, ffff88810294b7b0)
[   32.246728] 
[   32.246728] The buggy address belongs to the physical page:
[   32.246728] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10294b
[   32.246728] flags: 0x200000000000000(node=0|zone=2)
[   32.246728] page_type: f5(slab)
[   32.246728] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   32.246728] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   32.246728] page dumped because: kasan: bad access detected
[   32.246728] 
[   32.246728] Memory state around the buggy address:
[   32.246728]  ffff88810294b680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.246728]  ffff88810294b700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.246728] >ffff88810294b780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   32.246728]                                      ^
[   32.246728]  ffff88810294b800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.246728]  ffff88810294b880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.246728] ==================================================================
[   31.670844] ==================================================================
[   31.671410] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x194b/0x5450
[   31.671599] Write of size 8 at addr ffff88810294b7b0 by task kunit_try_catch/274
[   31.671599] 
[   31.671599] CPU: 1 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241126 #1
[   31.672965] Tainted: [B]=BAD_PAGE, [N]=TEST
[   31.672965] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   31.672965] Call Trace:
[   31.672965]  <TASK>
[   31.672965]  dump_stack_lvl+0x73/0xb0
[   31.672965]  print_report+0xd1/0x640
[   31.672965]  ? __virt_addr_valid+0x1db/0x2d0
[   31.672965]  ? kasan_complete_mode_report_info+0x2a/0x200
[   31.672965]  kasan_report+0x102/0x140
[   31.672965]  ? kasan_atomics_helper+0x194b/0x5450
[   31.672965]  ? kasan_atomics_helper+0x194b/0x5450
[   31.672965]  kasan_check_range+0x10c/0x1c0
[   31.672965]  __kasan_check_write+0x18/0x20
[   31.672965]  kasan_atomics_helper+0x194b/0x5450
[   31.672965]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   31.672965]  ? __kmalloc_cache_noprof+0x184/0x410
[   31.672965]  ? trace_hardirqs_on+0x37/0xe0
[   31.672965]  ? kasan_atomics+0x153/0x310
[   31.672965]  kasan_atomics+0x1dd/0x310
[   31.672965]  ? __pfx_kasan_atomics+0x10/0x10
[   31.672965]  ? __pfx_kasan_atomics+0x10/0x10
[   31.672965]  kunit_try_run_case+0x1b3/0x490
[   31.672965]  ? __pfx_kunit_try_run_case+0x10/0x10
[   31.672965]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   31.672965]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   31.672965]  ? __kthread_parkme+0x82/0x160
[   31.672965]  ? preempt_count_sub+0x50/0x80
[   31.672965]  ? __pfx_kunit_try_run_case+0x10/0x10
[   31.672965]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   31.672965]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   31.672965]  kthread+0x257/0x310
[   31.672965]  ? __pfx_kthread+0x10/0x10
[   31.672965]  ret_from_fork+0x41/0x80
[   31.672965]  ? __pfx_kthread+0x10/0x10
[   31.672965]  ret_from_fork_asm+0x1a/0x30
[   31.672965]  </TASK>
[   31.672965] 
[   31.672965] Allocated by task 274:
[   31.672965]  kasan_save_stack+0x3d/0x60
[   31.672965]  kasan_save_track+0x18/0x40
[   31.672965]  kasan_save_alloc_info+0x3b/0x50
[   31.672965]  __kasan_kmalloc+0xb7/0xc0
[   31.672965]  __kmalloc_cache_noprof+0x184/0x410
[   31.672965]  kasan_atomics+0x96/0x310
[   31.672965]  kunit_try_run_case+0x1b3/0x490
[   31.672965]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   31.672965]  kthread+0x257/0x310
[   31.672965]  ret_from_fork+0x41/0x80
[   31.672965]  ret_from_fork_asm+0x1a/0x30
[   31.672965] 
[   31.672965] The buggy address belongs to the object at ffff88810294b780
[   31.672965]  which belongs to the cache kmalloc-64 of size 64
[   31.672965] The buggy address is located 0 bytes to the right of
[   31.672965]  allocated 48-byte region [ffff88810294b780, ffff88810294b7b0)
[   31.672965] 
[   31.672965] The buggy address belongs to the physical page:
[   31.672965] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10294b
[   31.672965] flags: 0x200000000000000(node=0|zone=2)
[   31.672965] page_type: f5(slab)
[   31.672965] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   31.672965] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   31.672965] page dumped because: kasan: bad access detected
[   31.672965] 
[   31.672965] Memory state around the buggy address:
[   31.672965]  ffff88810294b680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   31.672965]  ffff88810294b700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   31.672965] >ffff88810294b780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   31.672965]                                      ^
[   31.672965]  ffff88810294b800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.672965]  ffff88810294b880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.672965] ==================================================================
[   30.137527] ==================================================================
[   30.138320] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x730/0x5450
[   30.138394] Write of size 4 at addr ffff88810294b7b0 by task kunit_try_catch/274
[   30.138394] 
[   30.138394] CPU: 1 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241126 #1
[   30.138394] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.138394] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   30.138394] Call Trace:
[   30.138394]  <TASK>
[   30.138394]  dump_stack_lvl+0x73/0xb0
[   30.138394]  print_report+0xd1/0x640
[   30.138394]  ? __virt_addr_valid+0x1db/0x2d0
[   30.138394]  ? kasan_complete_mode_report_info+0x2a/0x200
[   30.138394]  kasan_report+0x102/0x140
[   30.138394]  ? kasan_atomics_helper+0x730/0x5450
[   30.138394]  ? kasan_atomics_helper+0x730/0x5450
[   30.138394]  kasan_check_range+0x10c/0x1c0
[   30.138394]  __kasan_check_write+0x18/0x20
[   30.138394]  kasan_atomics_helper+0x730/0x5450
[   30.138394]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   30.138394]  ? __kmalloc_cache_noprof+0x184/0x410
[   30.138394]  ? trace_hardirqs_on+0x37/0xe0
[   30.138394]  ? kasan_atomics+0x153/0x310
[   30.138394]  kasan_atomics+0x1dd/0x310
[   30.138394]  ? __pfx_kasan_atomics+0x10/0x10
[   30.138394]  ? __pfx_kasan_atomics+0x10/0x10
[   30.138394]  kunit_try_run_case+0x1b3/0x490
[   30.138394]  ? __pfx_kunit_try_run_case+0x10/0x10
[   30.138394]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   30.138394]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   30.138394]  ? __kthread_parkme+0x82/0x160
[   30.138394]  ? preempt_count_sub+0x50/0x80
[   30.138394]  ? __pfx_kunit_try_run_case+0x10/0x10
[   30.138394]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   30.138394]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   30.138394]  kthread+0x257/0x310
[   30.138394]  ? __pfx_kthread+0x10/0x10
[   30.138394]  ret_from_fork+0x41/0x80
[   30.138394]  ? __pfx_kthread+0x10/0x10
[   30.138394]  ret_from_fork_asm+0x1a/0x30
[   30.138394]  </TASK>
[   30.138394] 
[   30.138394] Allocated by task 274:
[   30.138394]  kasan_save_stack+0x3d/0x60
[   30.138394]  kasan_save_track+0x18/0x40
[   30.138394]  kasan_save_alloc_info+0x3b/0x50
[   30.138394]  __kasan_kmalloc+0xb7/0xc0
[   30.138394]  __kmalloc_cache_noprof+0x184/0x410
[   30.138394]  kasan_atomics+0x96/0x310
[   30.138394]  kunit_try_run_case+0x1b3/0x490
[   30.138394]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   30.138394]  kthread+0x257/0x310
[   30.138394]  ret_from_fork+0x41/0x80
[   30.138394]  ret_from_fork_asm+0x1a/0x30
[   30.138394] 
[   30.138394] The buggy address belongs to the object at ffff88810294b780
[   30.138394]  which belongs to the cache kmalloc-64 of size 64
[   30.138394] The buggy address is located 0 bytes to the right of
[   30.138394]  allocated 48-byte region [ffff88810294b780, ffff88810294b7b0)
[   30.138394] 
[   30.138394] The buggy address belongs to the physical page:
[   30.138394] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10294b
[   30.138394] flags: 0x200000000000000(node=0|zone=2)
[   30.138394] page_type: f5(slab)
[   30.138394] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   30.138394] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   30.138394] page dumped because: kasan: bad access detected
[   30.138394] 
[   30.138394] Memory state around the buggy address:
[   30.138394]  ffff88810294b680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   30.138394]  ffff88810294b700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   30.138394] >ffff88810294b780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   30.138394]                                      ^
[   30.138394]  ffff88810294b800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.138394]  ffff88810294b880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.138394] ==================================================================
[   30.049634] ==================================================================
[   30.050307] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x5ff/0x5450
[   30.050376] Write of size 4 at addr ffff88810294b7b0 by task kunit_try_catch/274
[   30.050376] 
[   30.050376] CPU: 1 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241126 #1
[   30.050376] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.050376] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   30.050376] Call Trace:
[   30.050376]  <TASK>
[   30.050376]  dump_stack_lvl+0x73/0xb0
[   30.050376]  print_report+0xd1/0x640
[   30.050376]  ? __virt_addr_valid+0x1db/0x2d0
[   30.050376]  ? kasan_complete_mode_report_info+0x2a/0x200
[   30.050376]  kasan_report+0x102/0x140
[   30.050376]  ? kasan_atomics_helper+0x5ff/0x5450
[   30.050376]  ? kasan_atomics_helper+0x5ff/0x5450
[   30.050376]  kasan_check_range+0x10c/0x1c0
[   30.050376]  __kasan_check_write+0x18/0x20
[   30.050376]  kasan_atomics_helper+0x5ff/0x5450
[   30.050376]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   30.050376]  ? __kmalloc_cache_noprof+0x184/0x410
[   30.050376]  ? trace_hardirqs_on+0x37/0xe0
[   30.050376]  ? kasan_atomics+0x153/0x310
[   30.050376]  kasan_atomics+0x1dd/0x310
[   30.050376]  ? __pfx_kasan_atomics+0x10/0x10
[   30.050376]  ? __pfx_kasan_atomics+0x10/0x10
[   30.050376]  kunit_try_run_case+0x1b3/0x490
[   30.050376]  ? __pfx_kunit_try_run_case+0x10/0x10
[   30.050376]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   30.050376]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   30.050376]  ? __kthread_parkme+0x82/0x160
[   30.050376]  ? preempt_count_sub+0x50/0x80
[   30.050376]  ? __pfx_kunit_try_run_case+0x10/0x10
[   30.050376]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   30.050376]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   30.050376]  kthread+0x257/0x310
[   30.050376]  ? __pfx_kthread+0x10/0x10
[   30.050376]  ret_from_fork+0x41/0x80
[   30.050376]  ? __pfx_kthread+0x10/0x10
[   30.050376]  ret_from_fork_asm+0x1a/0x30
[   30.050376]  </TASK>
[   30.050376] 
[   30.050376] Allocated by task 274:
[   30.050376]  kasan_save_stack+0x3d/0x60
[   30.050376]  kasan_save_track+0x18/0x40
[   30.050376]  kasan_save_alloc_info+0x3b/0x50
[   30.050376]  __kasan_kmalloc+0xb7/0xc0
[   30.050376]  __kmalloc_cache_noprof+0x184/0x410
[   30.050376]  kasan_atomics+0x96/0x310
[   30.050376]  kunit_try_run_case+0x1b3/0x490
[   30.050376]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   30.050376]  kthread+0x257/0x310
[   30.050376]  ret_from_fork+0x41/0x80
[   30.050376]  ret_from_fork_asm+0x1a/0x30
[   30.050376] 
[   30.050376] The buggy address belongs to the object at ffff88810294b780
[   30.050376]  which belongs to the cache kmalloc-64 of size 64
[   30.050376] The buggy address is located 0 bytes to the right of
[   30.050376]  allocated 48-byte region [ffff88810294b780, ffff88810294b7b0)
[   30.050376] 
[   30.050376] The buggy address belongs to the physical page:
[   30.050376] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10294b
[   30.050376] flags: 0x200000000000000(node=0|zone=2)
[   30.050376] page_type: f5(slab)
[   30.050376] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   30.050376] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   30.050376] page dumped because: kasan: bad access detected
[   30.050376] 
[   30.050376] Memory state around the buggy address:
[   30.050376]  ffff88810294b680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   30.050376]  ffff88810294b700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   30.050376] >ffff88810294b780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   30.050376]                                      ^
[   30.050376]  ffff88810294b800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.050376]  ffff88810294b880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.050376] ==================================================================
[   32.163994] ==================================================================
[   32.164152] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x2007/0x5450
[   32.164152] Write of size 8 at addr ffff88810294b7b0 by task kunit_try_catch/274
[   32.164152] 
[   32.164152] CPU: 1 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241126 #1
[   32.164152] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.164152] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   32.164152] Call Trace:
[   32.164152]  <TASK>
[   32.164152]  dump_stack_lvl+0x73/0xb0
[   32.164152]  print_report+0xd1/0x640
[   32.170011]  ? __virt_addr_valid+0x1db/0x2d0
[   32.170011]  ? kasan_complete_mode_report_info+0x2a/0x200
[   32.170011]  kasan_report+0x102/0x140
[   32.170011]  ? kasan_atomics_helper+0x2007/0x5450
[   32.170011]  ? kasan_atomics_helper+0x2007/0x5450
[   32.170011]  kasan_check_range+0x10c/0x1c0
[   32.170011]  __kasan_check_write+0x18/0x20
[   32.170011]  kasan_atomics_helper+0x2007/0x5450
[   32.170011]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   32.170011]  ? __kmalloc_cache_noprof+0x184/0x410
[   32.170011]  ? trace_hardirqs_on+0x37/0xe0
[   32.170011]  ? kasan_atomics+0x153/0x310
[   32.170011]  kasan_atomics+0x1dd/0x310
[   32.170011]  ? __pfx_kasan_atomics+0x10/0x10
[   32.170011]  ? __pfx_kasan_atomics+0x10/0x10
[   32.170011]  kunit_try_run_case+0x1b3/0x490
[   32.170011]  ? __pfx_kunit_try_run_case+0x10/0x10
[   32.170011]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   32.170011]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   32.170011]  ? __kthread_parkme+0x82/0x160
[   32.170011]  ? preempt_count_sub+0x50/0x80
[   32.170011]  ? __pfx_kunit_try_run_case+0x10/0x10
[   32.170011]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   32.170011]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   32.170011]  kthread+0x257/0x310
[   32.170011]  ? __pfx_kthread+0x10/0x10
[   32.170011]  ret_from_fork+0x41/0x80
[   32.170011]  ? __pfx_kthread+0x10/0x10
[   32.170011]  ret_from_fork_asm+0x1a/0x30
[   32.170011]  </TASK>
[   32.170011] 
[   32.170011] Allocated by task 274:
[   32.170011]  kasan_save_stack+0x3d/0x60
[   32.170011]  kasan_save_track+0x18/0x40
[   32.170011]  kasan_save_alloc_info+0x3b/0x50
[   32.170011]  __kasan_kmalloc+0xb7/0xc0
[   32.170011]  __kmalloc_cache_noprof+0x184/0x410
[   32.170011]  kasan_atomics+0x96/0x310
[   32.170011]  kunit_try_run_case+0x1b3/0x490
[   32.170011]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   32.170011]  kthread+0x257/0x310
[   32.170011]  ret_from_fork+0x41/0x80
[   32.170011]  ret_from_fork_asm+0x1a/0x30
[   32.170011] 
[   32.170011] The buggy address belongs to the object at ffff88810294b780
[   32.170011]  which belongs to the cache kmalloc-64 of size 64
[   32.170011] The buggy address is located 0 bytes to the right of
[   32.170011]  allocated 48-byte region [ffff88810294b780, ffff88810294b7b0)
[   32.170011] 
[   32.170011] The buggy address belongs to the physical page:
[   32.170011] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10294b
[   32.170011] flags: 0x200000000000000(node=0|zone=2)
[   32.170011] page_type: f5(slab)
[   32.170011] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   32.170011] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   32.170011] page dumped because: kasan: bad access detected
[   32.170011] 
[   32.170011] Memory state around the buggy address:
[   32.170011]  ffff88810294b680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.170011]  ffff88810294b700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.170011] >ffff88810294b780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   32.170011]                                      ^
[   32.170011]  ffff88810294b800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.170011]  ffff88810294b880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.170011] ==================================================================
[   32.001355] ==================================================================
[   32.002056] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1e13/0x5450
[   32.002240] Write of size 8 at addr ffff88810294b7b0 by task kunit_try_catch/274
[   32.002240] 
[   32.002240] CPU: 1 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241126 #1
[   32.002240] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.002240] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   32.002240] Call Trace:
[   32.002240]  <TASK>
[   32.002240]  dump_stack_lvl+0x73/0xb0
[   32.002240]  print_report+0xd1/0x640
[   32.002240]  ? __virt_addr_valid+0x1db/0x2d0
[   32.002240]  ? kasan_complete_mode_report_info+0x2a/0x200
[   32.002240]  kasan_report+0x102/0x140
[   32.002240]  ? kasan_atomics_helper+0x1e13/0x5450
[   32.002240]  ? kasan_atomics_helper+0x1e13/0x5450
[   32.002240]  kasan_check_range+0x10c/0x1c0
[   32.002240]  __kasan_check_write+0x18/0x20
[   32.002240]  kasan_atomics_helper+0x1e13/0x5450
[   32.002240]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   32.002240]  ? __kmalloc_cache_noprof+0x184/0x410
[   32.002240]  ? trace_hardirqs_on+0x37/0xe0
[   32.002240]  ? kasan_atomics+0x153/0x310
[   32.002240]  kasan_atomics+0x1dd/0x310
[   32.002240]  ? __pfx_kasan_atomics+0x10/0x10
[   32.002240]  ? __pfx_kasan_atomics+0x10/0x10
[   32.002240]  kunit_try_run_case+0x1b3/0x490
[   32.002240]  ? __pfx_kunit_try_run_case+0x10/0x10
[   32.002240]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   32.002240]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   32.002240]  ? __kthread_parkme+0x82/0x160
[   32.002240]  ? preempt_count_sub+0x50/0x80
[   32.002240]  ? __pfx_kunit_try_run_case+0x10/0x10
[   32.002240]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   32.002240]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   32.002240]  kthread+0x257/0x310
[   32.002240]  ? __pfx_kthread+0x10/0x10
[   32.002240]  ret_from_fork+0x41/0x80
[   32.002240]  ? __pfx_kthread+0x10/0x10
[   32.002240]  ret_from_fork_asm+0x1a/0x30
[   32.002240]  </TASK>
[   32.002240] 
[   32.002240] Allocated by task 274:
[   32.002240]  kasan_save_stack+0x3d/0x60
[   32.002240]  kasan_save_track+0x18/0x40
[   32.002240]  kasan_save_alloc_info+0x3b/0x50
[   32.002240]  __kasan_kmalloc+0xb7/0xc0
[   32.002240]  __kmalloc_cache_noprof+0x184/0x410
[   32.002240]  kasan_atomics+0x96/0x310
[   32.002240]  kunit_try_run_case+0x1b3/0x490
[   32.002240]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   32.002240]  kthread+0x257/0x310
[   32.002240]  ret_from_fork+0x41/0x80
[   32.002240]  ret_from_fork_asm+0x1a/0x30
[   32.002240] 
[   32.002240] The buggy address belongs to the object at ffff88810294b780
[   32.002240]  which belongs to the cache kmalloc-64 of size 64
[   32.002240] The buggy address is located 0 bytes to the right of
[   32.002240]  allocated 48-byte region [ffff88810294b780, ffff88810294b7b0)
[   32.002240] 
[   32.002240] The buggy address belongs to the physical page:
[   32.002240] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10294b
[   32.002240] flags: 0x200000000000000(node=0|zone=2)
[   32.002240] page_type: f5(slab)
[   32.002240] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   32.002240] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   32.002240] page dumped because: kasan: bad access detected
[   32.002240] 
[   32.002240] Memory state around the buggy address:
[   32.002240]  ffff88810294b680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.002240]  ffff88810294b700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.002240] >ffff88810294b780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   32.002240]                                      ^
[   32.002240]  ffff88810294b800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.002240]  ffff88810294b880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.002240] ==================================================================
[   30.220468] ==================================================================
[   30.221171] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x861/0x5450
[   30.222430] Write of size 4 at addr ffff88810294b7b0 by task kunit_try_catch/274
[   30.222430] 
[   30.222430] CPU: 1 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241126 #1
[   30.222430] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.222430] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   30.222430] Call Trace:
[   30.222430]  <TASK>
[   30.222430]  dump_stack_lvl+0x73/0xb0
[   30.222430]  print_report+0xd1/0x640
[   30.222430]  ? __virt_addr_valid+0x1db/0x2d0
[   30.222430]  ? kasan_complete_mode_report_info+0x2a/0x200
[   30.222430]  kasan_report+0x102/0x140
[   30.222430]  ? kasan_atomics_helper+0x861/0x5450
[   30.222430]  ? kasan_atomics_helper+0x861/0x5450
[   30.222430]  kasan_check_range+0x10c/0x1c0
[   30.222430]  __kasan_check_write+0x18/0x20
[   30.222430]  kasan_atomics_helper+0x861/0x5450
[   30.222430]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   30.222430]  ? __kmalloc_cache_noprof+0x184/0x410
[   30.222430]  ? trace_hardirqs_on+0x37/0xe0
[   30.222430]  ? kasan_atomics+0x153/0x310
[   30.222430]  kasan_atomics+0x1dd/0x310
[   30.222430]  ? __pfx_kasan_atomics+0x10/0x10
[   30.222430]  ? __pfx_kasan_atomics+0x10/0x10
[   30.222430]  kunit_try_run_case+0x1b3/0x490
[   30.222430]  ? __pfx_kunit_try_run_case+0x10/0x10
[   30.222430]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   30.222430]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   30.222430]  ? __kthread_parkme+0x82/0x160
[   30.222430]  ? preempt_count_sub+0x50/0x80
[   30.222430]  ? __pfx_kunit_try_run_case+0x10/0x10
[   30.222430]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   30.222430]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   30.222430]  kthread+0x257/0x310
[   30.222430]  ? __pfx_kthread+0x10/0x10
[   30.222430]  ret_from_fork+0x41/0x80
[   30.222430]  ? __pfx_kthread+0x10/0x10
[   30.222430]  ret_from_fork_asm+0x1a/0x30
[   30.222430]  </TASK>
[   30.222430] 
[   30.222430] Allocated by task 274:
[   30.222430]  kasan_save_stack+0x3d/0x60
[   30.222430]  kasan_save_track+0x18/0x40
[   30.222430]  kasan_save_alloc_info+0x3b/0x50
[   30.222430]  __kasan_kmalloc+0xb7/0xc0
[   30.222430]  __kmalloc_cache_noprof+0x184/0x410
[   30.222430]  kasan_atomics+0x96/0x310
[   30.222430]  kunit_try_run_case+0x1b3/0x490
[   30.222430]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   30.222430]  kthread+0x257/0x310
[   30.222430]  ret_from_fork+0x41/0x80
[   30.222430]  ret_from_fork_asm+0x1a/0x30
[   30.222430] 
[   30.222430] The buggy address belongs to the object at ffff88810294b780
[   30.222430]  which belongs to the cache kmalloc-64 of size 64
[   30.222430] The buggy address is located 0 bytes to the right of
[   30.222430]  allocated 48-byte region [ffff88810294b780, ffff88810294b7b0)
[   30.222430] 
[   30.222430] The buggy address belongs to the physical page:
[   30.222430] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10294b
[   30.222430] flags: 0x200000000000000(node=0|zone=2)
[   30.222430] page_type: f5(slab)
[   30.222430] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   30.222430] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   30.222430] page dumped because: kasan: bad access detected
[   30.222430] 
[   30.222430] Memory state around the buggy address:
[   30.222430]  ffff88810294b680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   30.222430]  ffff88810294b700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   30.222430] >ffff88810294b780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   30.222430]                                      ^
[   30.222430]  ffff88810294b800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.222430]  ffff88810294b880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.222430] ==================================================================
[   31.264019] ==================================================================
[   31.264416] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1468/0x5450
[   31.264655] Write of size 8 at addr ffff88810294b7b0 by task kunit_try_catch/274
[   31.264655] 
[   31.264655] CPU: 1 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241126 #1
[   31.264655] Tainted: [B]=BAD_PAGE, [N]=TEST
[   31.264655] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   31.264655] Call Trace:
[   31.264655]  <TASK>
[   31.264655]  dump_stack_lvl+0x73/0xb0
[   31.264655]  print_report+0xd1/0x640
[   31.264655]  ? __virt_addr_valid+0x1db/0x2d0
[   31.264655]  ? kasan_complete_mode_report_info+0x2a/0x200
[   31.264655]  kasan_report+0x102/0x140
[   31.264655]  ? kasan_atomics_helper+0x1468/0x5450
[   31.264655]  ? kasan_atomics_helper+0x1468/0x5450
[   31.264655]  kasan_check_range+0x10c/0x1c0
[   31.264655]  __kasan_check_write+0x18/0x20
[   31.264655]  kasan_atomics_helper+0x1468/0x5450
[   31.264655]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   31.264655]  ? __kmalloc_cache_noprof+0x184/0x410
[   31.264655]  ? trace_hardirqs_on+0x37/0xe0
[   31.264655]  ? kasan_atomics+0x153/0x310
[   31.264655]  kasan_atomics+0x1dd/0x310
[   31.264655]  ? __pfx_kasan_atomics+0x10/0x10
[   31.264655]  ? __pfx_kasan_atomics+0x10/0x10
[   31.264655]  kunit_try_run_case+0x1b3/0x490
[   31.264655]  ? __pfx_kunit_try_run_case+0x10/0x10
[   31.264655]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   31.264655]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   31.264655]  ? __kthread_parkme+0x82/0x160
[   31.264655]  ? preempt_count_sub+0x50/0x80
[   31.264655]  ? __pfx_kunit_try_run_case+0x10/0x10
[   31.264655]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   31.264655]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   31.264655]  kthread+0x257/0x310
[   31.264655]  ? __pfx_kthread+0x10/0x10
[   31.264655]  ret_from_fork+0x41/0x80
[   31.264655]  ? __pfx_kthread+0x10/0x10
[   31.264655]  ret_from_fork_asm+0x1a/0x30
[   31.264655]  </TASK>
[   31.264655] 
[   31.264655] Allocated by task 274:
[   31.264655]  kasan_save_stack+0x3d/0x60
[   31.264655]  kasan_save_track+0x18/0x40
[   31.264655]  kasan_save_alloc_info+0x3b/0x50
[   31.264655]  __kasan_kmalloc+0xb7/0xc0
[   31.264655]  __kmalloc_cache_noprof+0x184/0x410
[   31.264655]  kasan_atomics+0x96/0x310
[   31.264655]  kunit_try_run_case+0x1b3/0x490
[   31.264655]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   31.264655]  kthread+0x257/0x310
[   31.264655]  ret_from_fork+0x41/0x80
[   31.264655]  ret_from_fork_asm+0x1a/0x30
[   31.264655] 
[   31.264655] The buggy address belongs to the object at ffff88810294b780
[   31.264655]  which belongs to the cache kmalloc-64 of size 64
[   31.264655] The buggy address is located 0 bytes to the right of
[   31.264655]  allocated 48-byte region [ffff88810294b780, ffff88810294b7b0)
[   31.264655] 
[   31.264655] The buggy address belongs to the physical page:
[   31.264655] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10294b
[   31.264655] flags: 0x200000000000000(node=0|zone=2)
[   31.264655] page_type: f5(slab)
[   31.264655] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   31.264655] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   31.264655] page dumped because: kasan: bad access detected
[   31.264655] 
[   31.264655] Memory state around the buggy address:
[   31.264655]  ffff88810294b680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   31.264655]  ffff88810294b700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   31.264655] >ffff88810294b780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   31.264655]                                      ^
[   31.264655]  ffff88810294b800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.264655]  ffff88810294b880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.264655] ==================================================================
[   30.437166] ==================================================================
[   30.437589] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xb6b/0x5450
[   30.438255] Write of size 4 at addr ffff88810294b7b0 by task kunit_try_catch/274
[   30.438255] 
[   30.438255] CPU: 1 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241126 #1
[   30.438255] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.438255] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   30.438255] Call Trace:
[   30.438255]  <TASK>
[   30.438255]  dump_stack_lvl+0x73/0xb0
[   30.438255]  print_report+0xd1/0x640
[   30.438255]  ? __virt_addr_valid+0x1db/0x2d0
[   30.438255]  ? kasan_complete_mode_report_info+0x2a/0x200
[   30.438255]  kasan_report+0x102/0x140
[   30.438255]  ? kasan_atomics_helper+0xb6b/0x5450
[   30.438255]  ? kasan_atomics_helper+0xb6b/0x5450
[   30.438255]  kasan_check_range+0x10c/0x1c0
[   30.438255]  __kasan_check_write+0x18/0x20
[   30.438255]  kasan_atomics_helper+0xb6b/0x5450
[   30.438255]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   30.438255]  ? __kmalloc_cache_noprof+0x184/0x410
[   30.438255]  ? trace_hardirqs_on+0x37/0xe0
[   30.438255]  ? kasan_atomics+0x153/0x310
[   30.438255]  kasan_atomics+0x1dd/0x310
[   30.438255]  ? __pfx_kasan_atomics+0x10/0x10
[   30.438255]  ? __pfx_kasan_atomics+0x10/0x10
[   30.438255]  kunit_try_run_case+0x1b3/0x490
[   30.438255]  ? __pfx_kunit_try_run_case+0x10/0x10
[   30.438255]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   30.438255]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   30.438255]  ? __kthread_parkme+0x82/0x160
[   30.438255]  ? preempt_count_sub+0x50/0x80
[   30.438255]  ? __pfx_kunit_try_run_case+0x10/0x10
[   30.438255]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   30.438255]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   30.438255]  kthread+0x257/0x310
[   30.438255]  ? __pfx_kthread+0x10/0x10
[   30.438255]  ret_from_fork+0x41/0x80
[   30.438255]  ? __pfx_kthread+0x10/0x10
[   30.438255]  ret_from_fork_asm+0x1a/0x30
[   30.438255]  </TASK>
[   30.438255] 
[   30.438255] Allocated by task 274:
[   30.438255]  kasan_save_stack+0x3d/0x60
[   30.438255]  kasan_save_track+0x18/0x40
[   30.438255]  kasan_save_alloc_info+0x3b/0x50
[   30.438255]  __kasan_kmalloc+0xb7/0xc0
[   30.438255]  __kmalloc_cache_noprof+0x184/0x410
[   30.438255]  kasan_atomics+0x96/0x310
[   30.438255]  kunit_try_run_case+0x1b3/0x490
[   30.438255]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   30.438255]  kthread+0x257/0x310
[   30.438255]  ret_from_fork+0x41/0x80
[   30.438255]  ret_from_fork_asm+0x1a/0x30
[   30.438255] 
[   30.438255] The buggy address belongs to the object at ffff88810294b780
[   30.438255]  which belongs to the cache kmalloc-64 of size 64
[   30.438255] The buggy address is located 0 bytes to the right of
[   30.438255]  allocated 48-byte region [ffff88810294b780, ffff88810294b7b0)
[   30.438255] 
[   30.438255] The buggy address belongs to the physical page:
[   30.438255] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10294b
[   30.438255] flags: 0x200000000000000(node=0|zone=2)
[   30.438255] page_type: f5(slab)
[   30.438255] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   30.438255] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   30.438255] page dumped because: kasan: bad access detected
[   30.438255] 
[   30.438255] Memory state around the buggy address:
[   30.438255]  ffff88810294b680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   30.438255]  ffff88810294b700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   30.438255] >ffff88810294b780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   30.438255]                                      ^
[   30.438255]  ffff88810294b800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.438255]  ffff88810294b880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.438255] ==================================================================
[   31.223754] ==================================================================
[   31.224335] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4eb0/0x5450
[   31.224335] Read of size 8 at addr ffff88810294b7b0 by task kunit_try_catch/274
[   31.224335] 
[   31.224335] CPU: 1 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241126 #1
[   31.224335] Tainted: [B]=BAD_PAGE, [N]=TEST
[   31.224335] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   31.224335] Call Trace:
[   31.224335]  <TASK>
[   31.224335]  dump_stack_lvl+0x73/0xb0
[   31.224335]  print_report+0xd1/0x640
[   31.224335]  ? __virt_addr_valid+0x1db/0x2d0
[   31.224335]  ? kasan_complete_mode_report_info+0x2a/0x200
[   31.224335]  kasan_report+0x102/0x140
[   31.224335]  ? kasan_atomics_helper+0x4eb0/0x5450
[   31.224335]  ? kasan_atomics_helper+0x4eb0/0x5450
[   31.224335]  __asan_report_load8_noabort+0x18/0x20
[   31.224335]  kasan_atomics_helper+0x4eb0/0x5450
[   31.224335]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   31.224335]  ? __kmalloc_cache_noprof+0x184/0x410
[   31.224335]  ? trace_hardirqs_on+0x37/0xe0
[   31.224335]  ? kasan_atomics+0x153/0x310
[   31.224335]  kasan_atomics+0x1dd/0x310
[   31.224335]  ? __pfx_kasan_atomics+0x10/0x10
[   31.224335]  ? __pfx_kasan_atomics+0x10/0x10
[   31.224335]  kunit_try_run_case+0x1b3/0x490
[   31.224335]  ? __pfx_kunit_try_run_case+0x10/0x10
[   31.224335]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   31.224335]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   31.224335]  ? __kthread_parkme+0x82/0x160
[   31.224335]  ? preempt_count_sub+0x50/0x80
[   31.224335]  ? __pfx_kunit_try_run_case+0x10/0x10
[   31.224335]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   31.224335]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   31.224335]  kthread+0x257/0x310
[   31.224335]  ? __pfx_kthread+0x10/0x10
[   31.224335]  ret_from_fork+0x41/0x80
[   31.224335]  ? __pfx_kthread+0x10/0x10
[   31.224335]  ret_from_fork_asm+0x1a/0x30
[   31.224335]  </TASK>
[   31.224335] 
[   31.224335] Allocated by task 274:
[   31.224335]  kasan_save_stack+0x3d/0x60
[   31.224335]  kasan_save_track+0x18/0x40
[   31.224335]  kasan_save_alloc_info+0x3b/0x50
[   31.224335]  __kasan_kmalloc+0xb7/0xc0
[   31.224335]  __kmalloc_cache_noprof+0x184/0x410
[   31.224335]  kasan_atomics+0x96/0x310
[   31.224335]  kunit_try_run_case+0x1b3/0x490
[   31.224335]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   31.224335]  kthread+0x257/0x310
[   31.224335]  ret_from_fork+0x41/0x80
[   31.224335]  ret_from_fork_asm+0x1a/0x30
[   31.224335] 
[   31.224335] The buggy address belongs to the object at ffff88810294b780
[   31.224335]  which belongs to the cache kmalloc-64 of size 64
[   31.224335] The buggy address is located 0 bytes to the right of
[   31.224335]  allocated 48-byte region [ffff88810294b780, ffff88810294b7b0)
[   31.224335] 
[   31.224335] The buggy address belongs to the physical page:
[   31.224335] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10294b
[   31.224335] flags: 0x200000000000000(node=0|zone=2)
[   31.224335] page_type: f5(slab)
[   31.224335] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   31.224335] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   31.224335] page dumped because: kasan: bad access detected
[   31.224335] 
[   31.224335] Memory state around the buggy address:
[   31.224335]  ffff88810294b680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   31.224335]  ffff88810294b700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   31.224335] >ffff88810294b780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   31.224335]                                      ^
[   31.224335]  ffff88810294b800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.224335]  ffff88810294b880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.224335] ==================================================================
[   32.208036] ==================================================================
[   32.208766] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4f9a/0x5450
[   32.208766] Read of size 8 at addr ffff88810294b7b0 by task kunit_try_catch/274
[   32.209150] 
[   32.209150] CPU: 1 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241126 #1
[   32.209150] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.209150] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   32.209150] Call Trace:
[   32.209150]  <TASK>
[   32.209150]  dump_stack_lvl+0x73/0xb0
[   32.209150]  print_report+0xd1/0x640
[   32.209150]  ? __virt_addr_valid+0x1db/0x2d0
[   32.209150]  ? kasan_complete_mode_report_info+0x2a/0x200
[   32.209150]  kasan_report+0x102/0x140
[   32.209150]  ? kasan_atomics_helper+0x4f9a/0x5450
[   32.209150]  ? kasan_atomics_helper+0x4f9a/0x5450
[   32.209150]  __asan_report_load8_noabort+0x18/0x20
[   32.209150]  kasan_atomics_helper+0x4f9a/0x5450
[   32.209150]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   32.209150]  ? __kmalloc_cache_noprof+0x184/0x410
[   32.209150]  ? trace_hardirqs_on+0x37/0xe0
[   32.209150]  ? kasan_atomics+0x153/0x310
[   32.209150]  kasan_atomics+0x1dd/0x310
[   32.209150]  ? __pfx_kasan_atomics+0x10/0x10
[   32.209150]  ? __pfx_kasan_atomics+0x10/0x10
[   32.209150]  kunit_try_run_case+0x1b3/0x490
[   32.209150]  ? __pfx_kunit_try_run_case+0x10/0x10
[   32.209150]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   32.209150]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   32.209150]  ? __kthread_parkme+0x82/0x160
[   32.209150]  ? preempt_count_sub+0x50/0x80
[   32.209150]  ? __pfx_kunit_try_run_case+0x10/0x10
[   32.209150]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   32.209150]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   32.209150]  kthread+0x257/0x310
[   32.209150]  ? __pfx_kthread+0x10/0x10
[   32.209150]  ret_from_fork+0x41/0x80
[   32.209150]  ? __pfx_kthread+0x10/0x10
[   32.209150]  ret_from_fork_asm+0x1a/0x30
[   32.209150]  </TASK>
[   32.209150] 
[   32.209150] Allocated by task 274:
[   32.209150]  kasan_save_stack+0x3d/0x60
[   32.209150]  kasan_save_track+0x18/0x40
[   32.209150]  kasan_save_alloc_info+0x3b/0x50
[   32.209150]  __kasan_kmalloc+0xb7/0xc0
[   32.209150]  __kmalloc_cache_noprof+0x184/0x410
[   32.209150]  kasan_atomics+0x96/0x310
[   32.209150]  kunit_try_run_case+0x1b3/0x490
[   32.209150]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   32.209150]  kthread+0x257/0x310
[   32.209150]  ret_from_fork+0x41/0x80
[   32.209150]  ret_from_fork_asm+0x1a/0x30
[   32.209150] 
[   32.209150] The buggy address belongs to the object at ffff88810294b780
[   32.209150]  which belongs to the cache kmalloc-64 of size 64
[   32.209150] The buggy address is located 0 bytes to the right of
[   32.209150]  allocated 48-byte region [ffff88810294b780, ffff88810294b7b0)
[   32.209150] 
[   32.209150] The buggy address belongs to the physical page:
[   32.209150] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10294b
[   32.209150] flags: 0x200000000000000(node=0|zone=2)
[   32.209150] page_type: f5(slab)
[   32.209150] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   32.209150] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   32.209150] page dumped because: kasan: bad access detected
[   32.209150] 
[   32.209150] Memory state around the buggy address:
[   32.209150]  ffff88810294b680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.209150]  ffff88810294b700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.209150] >ffff88810294b780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   32.209150]                                      ^
[   32.209150]  ffff88810294b800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.209150]  ffff88810294b880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.209150] ==================================================================
[   30.309875] ==================================================================
[   30.310922] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x993/0x5450
[   30.310922] Write of size 4 at addr ffff88810294b7b0 by task kunit_try_catch/274
[   30.310922] 
[   30.310922] CPU: 1 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241126 #1
[   30.310922] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.310922] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   30.310922] Call Trace:
[   30.310922]  <TASK>
[   30.310922]  dump_stack_lvl+0x73/0xb0
[   30.310922]  print_report+0xd1/0x640
[   30.310922]  ? __virt_addr_valid+0x1db/0x2d0
[   30.310922]  ? kasan_complete_mode_report_info+0x2a/0x200
[   30.310922]  kasan_report+0x102/0x140
[   30.310922]  ? kasan_atomics_helper+0x993/0x5450
[   30.310922]  ? kasan_atomics_helper+0x993/0x5450
[   30.310922]  kasan_check_range+0x10c/0x1c0
[   30.310922]  __kasan_check_write+0x18/0x20
[   30.310922]  kasan_atomics_helper+0x993/0x5450
[   30.310922]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   30.310922]  ? __kmalloc_cache_noprof+0x184/0x410
[   30.310922]  ? trace_hardirqs_on+0x37/0xe0
[   30.310922]  ? kasan_atomics+0x153/0x310
[   30.310922]  kasan_atomics+0x1dd/0x310
[   30.310922]  ? __pfx_kasan_atomics+0x10/0x10
[   30.310922]  ? __pfx_kasan_atomics+0x10/0x10
[   30.310922]  kunit_try_run_case+0x1b3/0x490
[   30.310922]  ? __pfx_kunit_try_run_case+0x10/0x10
[   30.310922]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   30.310922]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   30.310922]  ? __kthread_parkme+0x82/0x160
[   30.310922]  ? preempt_count_sub+0x50/0x80
[   30.310922]  ? __pfx_kunit_try_run_case+0x10/0x10
[   30.310922]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   30.310922]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   30.310922]  kthread+0x257/0x310
[   30.310922]  ? __pfx_kthread+0x10/0x10
[   30.310922]  ret_from_fork+0x41/0x80
[   30.310922]  ? __pfx_kthread+0x10/0x10
[   30.310922]  ret_from_fork_asm+0x1a/0x30
[   30.310922]  </TASK>
[   30.310922] 
[   30.310922] Allocated by task 274:
[   30.310922]  kasan_save_stack+0x3d/0x60
[   30.310922]  kasan_save_track+0x18/0x40
[   30.310922]  kasan_save_alloc_info+0x3b/0x50
[   30.310922]  __kasan_kmalloc+0xb7/0xc0
[   30.310922]  __kmalloc_cache_noprof+0x184/0x410
[   30.310922]  kasan_atomics+0x96/0x310
[   30.310922]  kunit_try_run_case+0x1b3/0x490
[   30.310922]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   30.310922]  kthread+0x257/0x310
[   30.310922]  ret_from_fork+0x41/0x80
[   30.310922]  ret_from_fork_asm+0x1a/0x30
[   30.310922] 
[   30.310922] The buggy address belongs to the object at ffff88810294b780
[   30.310922]  which belongs to the cache kmalloc-64 of size 64
[   30.310922] The buggy address is located 0 bytes to the right of
[   30.310922]  allocated 48-byte region [ffff88810294b780, ffff88810294b7b0)
[   30.310922] 
[   30.310922] The buggy address belongs to the physical page:
[   30.310922] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10294b
[   30.310922] flags: 0x200000000000000(node=0|zone=2)
[   30.310922] page_type: f5(slab)
[   30.310922] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   30.310922] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   30.310922] page dumped because: kasan: bad access detected
[   30.310922] 
[   30.310922] Memory state around the buggy address:
[   30.310922]  ffff88810294b680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   30.310922]  ffff88810294b700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   30.310922] >ffff88810294b780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   30.310922]                                      ^
[   30.310922]  ffff88810294b800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.310922]  ffff88810294b880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.310922] ==================================================================
[   30.485080] ==================================================================
[   30.485353] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xc71/0x5450
[   30.485353] Write of size 4 at addr ffff88810294b7b0 by task kunit_try_catch/274
[   30.485353] 
[   30.485353] CPU: 1 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241126 #1
[   30.485353] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.485353] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   30.485353] Call Trace:
[   30.485353]  <TASK>
[   30.485353]  dump_stack_lvl+0x73/0xb0
[   30.485353]  print_report+0xd1/0x640
[   30.485353]  ? __virt_addr_valid+0x1db/0x2d0
[   30.485353]  ? kasan_complete_mode_report_info+0x2a/0x200
[   30.485353]  kasan_report+0x102/0x140
[   30.485353]  ? kasan_atomics_helper+0xc71/0x5450
[   30.485353]  ? kasan_atomics_helper+0xc71/0x5450
[   30.485353]  kasan_check_range+0x10c/0x1c0
[   30.485353]  __kasan_check_write+0x18/0x20
[   30.485353]  kasan_atomics_helper+0xc71/0x5450
[   30.485353]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   30.485353]  ? __kmalloc_cache_noprof+0x184/0x410
[   30.485353]  ? trace_hardirqs_on+0x37/0xe0
[   30.485353]  ? kasan_atomics+0x153/0x310
[   30.485353]  kasan_atomics+0x1dd/0x310
[   30.485353]  ? __pfx_kasan_atomics+0x10/0x10
[   30.485353]  ? __pfx_kasan_atomics+0x10/0x10
[   30.485353]  kunit_try_run_case+0x1b3/0x490
[   30.485353]  ? __pfx_kunit_try_run_case+0x10/0x10
[   30.485353]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   30.485353]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   30.485353]  ? __kthread_parkme+0x82/0x160
[   30.485353]  ? preempt_count_sub+0x50/0x80
[   30.485353]  ? __pfx_kunit_try_run_case+0x10/0x10
[   30.485353]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   30.485353]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   30.485353]  kthread+0x257/0x310
[   30.485353]  ? __pfx_kthread+0x10/0x10
[   30.485353]  ret_from_fork+0x41/0x80
[   30.485353]  ? __pfx_kthread+0x10/0x10
[   30.485353]  ret_from_fork_asm+0x1a/0x30
[   30.485353]  </TASK>
[   30.485353] 
[   30.485353] Allocated by task 274:
[   30.485353]  kasan_save_stack+0x3d/0x60
[   30.485353]  kasan_save_track+0x18/0x40
[   30.485353]  kasan_save_alloc_info+0x3b/0x50
[   30.485353]  __kasan_kmalloc+0xb7/0xc0
[   30.485353]  __kmalloc_cache_noprof+0x184/0x410
[   30.485353]  kasan_atomics+0x96/0x310
[   30.485353]  kunit_try_run_case+0x1b3/0x490
[   30.485353]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   30.485353]  kthread+0x257/0x310
[   30.485353]  ret_from_fork+0x41/0x80
[   30.485353]  ret_from_fork_asm+0x1a/0x30
[   30.485353] 
[   30.485353] The buggy address belongs to the object at ffff88810294b780
[   30.485353]  which belongs to the cache kmalloc-64 of size 64
[   30.485353] The buggy address is located 0 bytes to the right of
[   30.485353]  allocated 48-byte region [ffff88810294b780, ffff88810294b7b0)
[   30.485353] 
[   30.485353] The buggy address belongs to the physical page:
[   30.485353] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10294b
[   30.485353] flags: 0x200000000000000(node=0|zone=2)
[   30.485353] page_type: f5(slab)
[   30.485353] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   30.485353] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   30.485353] page dumped because: kasan: bad access detected
[   30.485353] 
[   30.485353] Memory state around the buggy address:
[   30.485353]  ffff88810294b680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   30.485353]  ffff88810294b700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   30.485353] >ffff88810294b780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   30.485353]                                      ^
[   30.485353]  ffff88810294b800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.485353]  ffff88810294b880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.485353] ==================================================================
[   30.797411] ==================================================================
[   30.797762] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a38/0x5450
[   30.797762] Read of size 4 at addr ffff88810294b7b0 by task kunit_try_catch/274
[   30.797762] 
[   30.797762] CPU: 1 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241126 #1
[   30.797762] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.800366] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   30.800366] Call Trace:
[   30.800366]  <TASK>
[   30.800366]  dump_stack_lvl+0x73/0xb0
[   30.800366]  print_report+0xd1/0x640
[   30.800366]  ? __virt_addr_valid+0x1db/0x2d0
[   30.800366]  ? kasan_complete_mode_report_info+0x2a/0x200
[   30.800366]  kasan_report+0x102/0x140
[   30.800366]  ? kasan_atomics_helper+0x4a38/0x5450
[   30.800366]  ? kasan_atomics_helper+0x4a38/0x5450
[   30.800366]  __asan_report_load4_noabort+0x18/0x20
[   30.800366]  kasan_atomics_helper+0x4a38/0x5450
[   30.800366]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   30.800366]  ? __kmalloc_cache_noprof+0x184/0x410
[   30.800366]  ? trace_hardirqs_on+0x37/0xe0
[   30.800366]  ? kasan_atomics+0x153/0x310
[   30.800366]  kasan_atomics+0x1dd/0x310
[   30.800366]  ? __pfx_kasan_atomics+0x10/0x10
[   30.800366]  ? __pfx_kasan_atomics+0x10/0x10
[   30.800366]  kunit_try_run_case+0x1b3/0x490
[   30.800366]  ? __pfx_kunit_try_run_case+0x10/0x10
[   30.800366]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   30.800366]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   30.800366]  ? __kthread_parkme+0x82/0x160
[   30.800366]  ? preempt_count_sub+0x50/0x80
[   30.800366]  ? __pfx_kunit_try_run_case+0x10/0x10
[   30.800366]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   30.800366]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   30.800366]  kthread+0x257/0x310
[   30.800366]  ? __pfx_kthread+0x10/0x10
[   30.800366]  ret_from_fork+0x41/0x80
[   30.800366]  ? __pfx_kthread+0x10/0x10
[   30.800366]  ret_from_fork_asm+0x1a/0x30
[   30.800366]  </TASK>
[   30.800366] 
[   30.800366] Allocated by task 274:
[   30.800366]  kasan_save_stack+0x3d/0x60
[   30.800366]  kasan_save_track+0x18/0x40
[   30.800366]  kasan_save_alloc_info+0x3b/0x50
[   30.800366]  __kasan_kmalloc+0xb7/0xc0
[   30.800366]  __kmalloc_cache_noprof+0x184/0x410
[   30.800366]  kasan_atomics+0x96/0x310
[   30.800366]  kunit_try_run_case+0x1b3/0x490
[   30.800366]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   30.800366]  kthread+0x257/0x310
[   30.800366]  ret_from_fork+0x41/0x80
[   30.800366]  ret_from_fork_asm+0x1a/0x30
[   30.800366] 
[   30.800366] The buggy address belongs to the object at ffff88810294b780
[   30.800366]  which belongs to the cache kmalloc-64 of size 64
[   30.800366] The buggy address is located 0 bytes to the right of
[   30.800366]  allocated 48-byte region [ffff88810294b780, ffff88810294b7b0)
[   30.800366] 
[   30.800366] The buggy address belongs to the physical page:
[   30.800366] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10294b
[   30.800366] flags: 0x200000000000000(node=0|zone=2)
[   30.800366] page_type: f5(slab)
[   30.800366] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   30.800366] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   30.800366] page dumped because: kasan: bad access detected
[   30.800366] 
[   30.800366] Memory state around the buggy address:
[   30.800366]  ffff88810294b680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   30.800366]  ffff88810294b700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   30.800366] >ffff88810294b780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   30.800366]                                      ^
[   30.800366]  ffff88810294b800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.800366]  ffff88810294b880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.800366] ==================================================================
[   30.090349] ==================================================================
[   30.091390] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x698/0x5450
[   30.091390] Write of size 4 at addr ffff88810294b7b0 by task kunit_try_catch/274
[   30.091390] 
[   30.091390] CPU: 1 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241126 #1
[   30.091390] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.091390] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   30.091390] Call Trace:
[   30.091390]  <TASK>
[   30.091390]  dump_stack_lvl+0x73/0xb0
[   30.091390]  print_report+0xd1/0x640
[   30.091390]  ? __virt_addr_valid+0x1db/0x2d0
[   30.091390]  ? kasan_complete_mode_report_info+0x2a/0x200
[   30.091390]  kasan_report+0x102/0x140
[   30.091390]  ? kasan_atomics_helper+0x698/0x5450
[   30.091390]  ? kasan_atomics_helper+0x698/0x5450
[   30.091390]  kasan_check_range+0x10c/0x1c0
[   30.091390]  __kasan_check_write+0x18/0x20
[   30.091390]  kasan_atomics_helper+0x698/0x5450
[   30.091390]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   30.091390]  ? __kmalloc_cache_noprof+0x184/0x410
[   30.091390]  ? trace_hardirqs_on+0x37/0xe0
[   30.091390]  ? kasan_atomics+0x153/0x310
[   30.091390]  kasan_atomics+0x1dd/0x310
[   30.091390]  ? __pfx_kasan_atomics+0x10/0x10
[   30.091390]  ? __pfx_kasan_atomics+0x10/0x10
[   30.091390]  kunit_try_run_case+0x1b3/0x490
[   30.091390]  ? __pfx_kunit_try_run_case+0x10/0x10
[   30.091390]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   30.091390]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   30.091390]  ? __kthread_parkme+0x82/0x160
[   30.091390]  ? preempt_count_sub+0x50/0x80
[   30.091390]  ? __pfx_kunit_try_run_case+0x10/0x10
[   30.091390]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   30.091390]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   30.091390]  kthread+0x257/0x310
[   30.091390]  ? __pfx_kthread+0x10/0x10
[   30.091390]  ret_from_fork+0x41/0x80
[   30.091390]  ? __pfx_kthread+0x10/0x10
[   30.091390]  ret_from_fork_asm+0x1a/0x30
[   30.091390]  </TASK>
[   30.091390] 
[   30.091390] Allocated by task 274:
[   30.091390]  kasan_save_stack+0x3d/0x60
[   30.091390]  kasan_save_track+0x18/0x40
[   30.091390]  kasan_save_alloc_info+0x3b/0x50
[   30.091390]  __kasan_kmalloc+0xb7/0xc0
[   30.091390]  __kmalloc_cache_noprof+0x184/0x410
[   30.091390]  kasan_atomics+0x96/0x310
[   30.091390]  kunit_try_run_case+0x1b3/0x490
[   30.091390]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   30.091390]  kthread+0x257/0x310
[   30.091390]  ret_from_fork+0x41/0x80
[   30.091390]  ret_from_fork_asm+0x1a/0x30
[   30.091390] 
[   30.091390] The buggy address belongs to the object at ffff88810294b780
[   30.091390]  which belongs to the cache kmalloc-64 of size 64
[   30.091390] The buggy address is located 0 bytes to the right of
[   30.091390]  allocated 48-byte region [ffff88810294b780, ffff88810294b7b0)
[   30.091390] 
[   30.091390] The buggy address belongs to the physical page:
[   30.091390] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10294b
[   30.091390] flags: 0x200000000000000(node=0|zone=2)
[   30.091390] page_type: f5(slab)
[   30.091390] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   30.091390] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   30.091390] page dumped because: kasan: bad access detected
[   30.091390] 
[   30.091390] Memory state around the buggy address:
[   30.091390]  ffff88810294b680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   30.091390]  ffff88810294b700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   30.091390] >ffff88810294b780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   30.091390]                                      ^
[   30.091390]  ffff88810294b800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.091390]  ffff88810294b880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.091390] ==================================================================
[   31.625963] ==================================================================
[   31.626897] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x18b2/0x5450
[   31.626897] Write of size 8 at addr ffff88810294b7b0 by task kunit_try_catch/274
[   31.626897] 
[   31.626897] CPU: 1 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241126 #1
[   31.626897] Tainted: [B]=BAD_PAGE, [N]=TEST
[   31.626897] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   31.626897] Call Trace:
[   31.626897]  <TASK>
[   31.626897]  dump_stack_lvl+0x73/0xb0
[   31.626897]  print_report+0xd1/0x640
[   31.626897]  ? __virt_addr_valid+0x1db/0x2d0
[   31.626897]  ? kasan_complete_mode_report_info+0x2a/0x200
[   31.626897]  kasan_report+0x102/0x140
[   31.626897]  ? kasan_atomics_helper+0x18b2/0x5450
[   31.626897]  ? kasan_atomics_helper+0x18b2/0x5450
[   31.626897]  kasan_check_range+0x10c/0x1c0
[   31.626897]  __kasan_check_write+0x18/0x20
[   31.626897]  kasan_atomics_helper+0x18b2/0x5450
[   31.626897]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   31.626897]  ? __kmalloc_cache_noprof+0x184/0x410
[   31.626897]  ? trace_hardirqs_on+0x37/0xe0
[   31.626897]  ? kasan_atomics+0x153/0x310
[   31.626897]  kasan_atomics+0x1dd/0x310
[   31.626897]  ? __pfx_kasan_atomics+0x10/0x10
[   31.626897]  ? __pfx_kasan_atomics+0x10/0x10
[   31.626897]  kunit_try_run_case+0x1b3/0x490
[   31.626897]  ? __pfx_kunit_try_run_case+0x10/0x10
[   31.626897]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   31.626897]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   31.626897]  ? __kthread_parkme+0x82/0x160
[   31.626897]  ? preempt_count_sub+0x50/0x80
[   31.626897]  ? __pfx_kunit_try_run_case+0x10/0x10
[   31.626897]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   31.626897]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   31.626897]  kthread+0x257/0x310
[   31.626897]  ? __pfx_kthread+0x10/0x10
[   31.626897]  ret_from_fork+0x41/0x80
[   31.626897]  ? __pfx_kthread+0x10/0x10
[   31.626897]  ret_from_fork_asm+0x1a/0x30
[   31.626897]  </TASK>
[   31.626897] 
[   31.626897] Allocated by task 274:
[   31.626897]  kasan_save_stack+0x3d/0x60
[   31.626897]  kasan_save_track+0x18/0x40
[   31.626897]  kasan_save_alloc_info+0x3b/0x50
[   31.626897]  __kasan_kmalloc+0xb7/0xc0
[   31.626897]  __kmalloc_cache_noprof+0x184/0x410
[   31.626897]  kasan_atomics+0x96/0x310
[   31.626897]  kunit_try_run_case+0x1b3/0x490
[   31.626897]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   31.626897]  kthread+0x257/0x310
[   31.626897]  ret_from_fork+0x41/0x80
[   31.626897]  ret_from_fork_asm+0x1a/0x30
[   31.626897] 
[   31.626897] The buggy address belongs to the object at ffff88810294b780
[   31.626897]  which belongs to the cache kmalloc-64 of size 64
[   31.626897] The buggy address is located 0 bytes to the right of
[   31.626897]  allocated 48-byte region [ffff88810294b780, ffff88810294b7b0)
[   31.626897] 
[   31.626897] The buggy address belongs to the physical page:
[   31.626897] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10294b
[   31.626897] flags: 0x200000000000000(node=0|zone=2)
[   31.626897] page_type: f5(slab)
[   31.626897] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   31.626897] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   31.626897] page dumped because: kasan: bad access detected
[   31.626897] 
[   31.626897] Memory state around the buggy address:
[   31.626897]  ffff88810294b680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   31.626897]  ffff88810294b700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   31.626897] >ffff88810294b780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   31.626897]                                      ^
[   31.626897]  ffff88810294b800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.626897]  ffff88810294b880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.626897] ==================================================================
[   30.614897] ==================================================================
[   30.615267] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xde1/0x5450
[   30.616592] Write of size 4 at addr ffff88810294b7b0 by task kunit_try_catch/274
[   30.616592] 
[   30.616592] CPU: 1 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241126 #1
[   30.616592] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.616592] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   30.616592] Call Trace:
[   30.616592]  <TASK>
[   30.616592]  dump_stack_lvl+0x73/0xb0
[   30.616592]  print_report+0xd1/0x640
[   30.616592]  ? __virt_addr_valid+0x1db/0x2d0
[   30.616592]  ? kasan_complete_mode_report_info+0x2a/0x200
[   30.616592]  kasan_report+0x102/0x140
[   30.616592]  ? kasan_atomics_helper+0xde1/0x5450
[   30.616592]  ? kasan_atomics_helper+0xde1/0x5450
[   30.616592]  kasan_check_range+0x10c/0x1c0
[   30.616592]  __kasan_check_write+0x18/0x20
[   30.616592]  kasan_atomics_helper+0xde1/0x5450
[   30.616592]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   30.616592]  ? __kmalloc_cache_noprof+0x184/0x410
[   30.616592]  ? trace_hardirqs_on+0x37/0xe0
[   30.616592]  ? kasan_atomics+0x153/0x310
[   30.616592]  kasan_atomics+0x1dd/0x310
[   30.616592]  ? __pfx_kasan_atomics+0x10/0x10
[   30.616592]  ? __pfx_kasan_atomics+0x10/0x10
[   30.616592]  kunit_try_run_case+0x1b3/0x490
[   30.616592]  ? __pfx_kunit_try_run_case+0x10/0x10
[   30.616592]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   30.616592]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   30.616592]  ? __kthread_parkme+0x82/0x160
[   30.616592]  ? preempt_count_sub+0x50/0x80
[   30.616592]  ? __pfx_kunit_try_run_case+0x10/0x10
[   30.616592]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   30.616592]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   30.616592]  kthread+0x257/0x310
[   30.616592]  ? __pfx_kthread+0x10/0x10
[   30.616592]  ret_from_fork+0x41/0x80
[   30.616592]  ? __pfx_kthread+0x10/0x10
[   30.616592]  ret_from_fork_asm+0x1a/0x30
[   30.616592]  </TASK>
[   30.616592] 
[   30.616592] Allocated by task 274:
[   30.616592]  kasan_save_stack+0x3d/0x60
[   30.616592]  kasan_save_track+0x18/0x40
[   30.616592]  kasan_save_alloc_info+0x3b/0x50
[   30.616592]  __kasan_kmalloc+0xb7/0xc0
[   30.616592]  __kmalloc_cache_noprof+0x184/0x410
[   30.616592]  kasan_atomics+0x96/0x310
[   30.616592]  kunit_try_run_case+0x1b3/0x490
[   30.616592]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   30.616592]  kthread+0x257/0x310
[   30.616592]  ret_from_fork+0x41/0x80
[   30.616592]  ret_from_fork_asm+0x1a/0x30
[   30.616592] 
[   30.616592] The buggy address belongs to the object at ffff88810294b780
[   30.616592]  which belongs to the cache kmalloc-64 of size 64
[   30.616592] The buggy address is located 0 bytes to the right of
[   30.616592]  allocated 48-byte region [ffff88810294b780, ffff88810294b7b0)
[   30.616592] 
[   30.616592] The buggy address belongs to the physical page:
[   30.616592] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10294b
[   30.616592] flags: 0x200000000000000(node=0|zone=2)
[   30.616592] page_type: f5(slab)
[   30.616592] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   30.616592] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   30.616592] page dumped because: kasan: bad access detected
[   30.616592] 
[   30.616592] Memory state around the buggy address:
[   30.616592]  ffff88810294b680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   30.616592]  ffff88810294b700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   30.616592] >ffff88810294b780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   30.616592]                                      ^
[   30.616592]  ffff88810294b800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.616592]  ffff88810294b880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.616592] ==================================================================
[   30.922651] ==================================================================
[   30.923173] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1149/0x5450
[   30.923366] Write of size 4 at addr ffff88810294b7b0 by task kunit_try_catch/274
[   30.923366] 
[   30.923366] CPU: 1 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241126 #1
[   30.923366] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.923366] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   30.923366] Call Trace:
[   30.923366]  <TASK>
[   30.923366]  dump_stack_lvl+0x73/0xb0
[   30.923366]  print_report+0xd1/0x640
[   30.923366]  ? __virt_addr_valid+0x1db/0x2d0
[   30.923366]  ? kasan_complete_mode_report_info+0x2a/0x200
[   30.923366]  kasan_report+0x102/0x140
[   30.923366]  ? kasan_atomics_helper+0x1149/0x5450
[   30.923366]  ? kasan_atomics_helper+0x1149/0x5450
[   30.923366]  kasan_check_range+0x10c/0x1c0
[   30.923366]  __kasan_check_write+0x18/0x20
[   30.923366]  kasan_atomics_helper+0x1149/0x5450
[   30.923366]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   30.923366]  ? __kmalloc_cache_noprof+0x184/0x410
[   30.923366]  ? trace_hardirqs_on+0x37/0xe0
[   30.923366]  ? kasan_atomics+0x153/0x310
[   30.923366]  kasan_atomics+0x1dd/0x310
[   30.923366]  ? __pfx_kasan_atomics+0x10/0x10
[   30.923366]  ? __pfx_kasan_atomics+0x10/0x10
[   30.923366]  kunit_try_run_case+0x1b3/0x490
[   30.923366]  ? __pfx_kunit_try_run_case+0x10/0x10
[   30.923366]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   30.923366]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   30.923366]  ? __kthread_parkme+0x82/0x160
[   30.923366]  ? preempt_count_sub+0x50/0x80
[   30.923366]  ? __pfx_kunit_try_run_case+0x10/0x10
[   30.923366]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   30.923366]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   30.923366]  kthread+0x257/0x310
[   30.923366]  ? __pfx_kthread+0x10/0x10
[   30.923366]  ret_from_fork+0x41/0x80
[   30.923366]  ? __pfx_kthread+0x10/0x10
[   30.923366]  ret_from_fork_asm+0x1a/0x30
[   30.923366]  </TASK>
[   30.923366] 
[   30.923366] Allocated by task 274:
[   30.923366]  kasan_save_stack+0x3d/0x60
[   30.923366]  kasan_save_track+0x18/0x40
[   30.923366]  kasan_save_alloc_info+0x3b/0x50
[   30.923366]  __kasan_kmalloc+0xb7/0xc0
[   30.923366]  __kmalloc_cache_noprof+0x184/0x410
[   30.923366]  kasan_atomics+0x96/0x310
[   30.923366]  kunit_try_run_case+0x1b3/0x490
[   30.923366]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   30.923366]  kthread+0x257/0x310
[   30.923366]  ret_from_fork+0x41/0x80
[   30.923366]  ret_from_fork_asm+0x1a/0x30
[   30.923366] 
[   30.923366] The buggy address belongs to the object at ffff88810294b780
[   30.923366]  which belongs to the cache kmalloc-64 of size 64
[   30.923366] The buggy address is located 0 bytes to the right of
[   30.923366]  allocated 48-byte region [ffff88810294b780, ffff88810294b7b0)
[   30.923366] 
[   30.923366] The buggy address belongs to the physical page:
[   30.923366] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10294b
[   30.923366] flags: 0x200000000000000(node=0|zone=2)
[   30.923366] page_type: f5(slab)
[   30.923366] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   30.923366] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   30.923366] page dumped because: kasan: bad access detected
[   30.923366] 
[   30.923366] Memory state around the buggy address:
[   30.923366]  ffff88810294b680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   30.923366]  ffff88810294b700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   30.923366] >ffff88810294b780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   30.923366]                                      ^
[   30.923366]  ffff88810294b800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.923366]  ffff88810294b880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.923366] ==================================================================
[   30.964771] ==================================================================
[   30.965405] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a04/0x5450
[   30.965507] Read of size 4 at addr ffff88810294b7b0 by task kunit_try_catch/274
[   30.965507] 
[   30.965507] CPU: 1 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241126 #1
[   30.965507] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.965507] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   30.965507] Call Trace:
[   30.965507]  <TASK>
[   30.965507]  dump_stack_lvl+0x73/0xb0
[   30.965507]  print_report+0xd1/0x640
[   30.965507]  ? __virt_addr_valid+0x1db/0x2d0
[   30.965507]  ? kasan_complete_mode_report_info+0x2a/0x200
[   30.965507]  kasan_report+0x102/0x140
[   30.965507]  ? kasan_atomics_helper+0x4a04/0x5450
[   30.965507]  ? kasan_atomics_helper+0x4a04/0x5450
[   30.965507]  __asan_report_load4_noabort+0x18/0x20
[   30.965507]  kasan_atomics_helper+0x4a04/0x5450
[   30.965507]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   30.965507]  ? __kmalloc_cache_noprof+0x184/0x410
[   30.965507]  ? trace_hardirqs_on+0x37/0xe0
[   30.965507]  ? kasan_atomics+0x153/0x310
[   30.965507]  kasan_atomics+0x1dd/0x310
[   30.965507]  ? __pfx_kasan_atomics+0x10/0x10
[   30.965507]  ? __pfx_kasan_atomics+0x10/0x10
[   30.965507]  kunit_try_run_case+0x1b3/0x490
[   30.965507]  ? __pfx_kunit_try_run_case+0x10/0x10
[   30.965507]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   30.965507]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   30.965507]  ? __kthread_parkme+0x82/0x160
[   30.965507]  ? preempt_count_sub+0x50/0x80
[   30.965507]  ? __pfx_kunit_try_run_case+0x10/0x10
[   30.965507]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   30.965507]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   30.965507]  kthread+0x257/0x310
[   30.965507]  ? __pfx_kthread+0x10/0x10
[   30.965507]  ret_from_fork+0x41/0x80
[   30.965507]  ? __pfx_kthread+0x10/0x10
[   30.965507]  ret_from_fork_asm+0x1a/0x30
[   30.965507]  </TASK>
[   30.965507] 
[   30.965507] Allocated by task 274:
[   30.965507]  kasan_save_stack+0x3d/0x60
[   30.965507]  kasan_save_track+0x18/0x40
[   30.965507]  kasan_save_alloc_info+0x3b/0x50
[   30.965507]  __kasan_kmalloc+0xb7/0xc0
[   30.965507]  __kmalloc_cache_noprof+0x184/0x410
[   30.965507]  kasan_atomics+0x96/0x310
[   30.965507]  kunit_try_run_case+0x1b3/0x490
[   30.965507]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   30.965507]  kthread+0x257/0x310
[   30.965507]  ret_from_fork+0x41/0x80
[   30.965507]  ret_from_fork_asm+0x1a/0x30
[   30.965507] 
[   30.965507] The buggy address belongs to the object at ffff88810294b780
[   30.965507]  which belongs to the cache kmalloc-64 of size 64
[   30.965507] The buggy address is located 0 bytes to the right of
[   30.965507]  allocated 48-byte region [ffff88810294b780, ffff88810294b7b0)
[   30.965507] 
[   30.965507] The buggy address belongs to the physical page:
[   30.965507] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10294b
[   30.965507] flags: 0x200000000000000(node=0|zone=2)
[   30.965507] page_type: f5(slab)
[   30.965507] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   30.965507] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   30.965507] page dumped because: kasan: bad access detected
[   30.965507] 
[   30.965507] Memory state around the buggy address:
[   30.965507]  ffff88810294b680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   30.965507]  ffff88810294b700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   30.965507] >ffff88810294b780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   30.965507]                                      ^
[   30.965507]  ffff88810294b800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.965507]  ffff88810294b880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.965507] ==================================================================
[   31.179501] ==================================================================
[   31.180604] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x13b6/0x5450
[   31.180604] Read of size 8 at addr ffff88810294b7b0 by task kunit_try_catch/274
[   31.180604] 
[   31.180604] CPU: 1 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241126 #1
[   31.180604] Tainted: [B]=BAD_PAGE, [N]=TEST
[   31.180604] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   31.180604] Call Trace:
[   31.180604]  <TASK>
[   31.180604]  dump_stack_lvl+0x73/0xb0
[   31.180604]  print_report+0xd1/0x640
[   31.180604]  ? __virt_addr_valid+0x1db/0x2d0
[   31.180604]  ? kasan_complete_mode_report_info+0x2a/0x200
[   31.180604]  kasan_report+0x102/0x140
[   31.180604]  ? kasan_atomics_helper+0x13b6/0x5450
[   31.180604]  ? kasan_atomics_helper+0x13b6/0x5450
[   31.180604]  kasan_check_range+0x10c/0x1c0
[   31.180604]  __kasan_check_read+0x15/0x20
[   31.180604]  kasan_atomics_helper+0x13b6/0x5450
[   31.180604]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   31.180604]  ? __kmalloc_cache_noprof+0x184/0x410
[   31.180604]  ? trace_hardirqs_on+0x37/0xe0
[   31.180604]  ? kasan_atomics+0x153/0x310
[   31.180604]  kasan_atomics+0x1dd/0x310
[   31.180604]  ? __pfx_kasan_atomics+0x10/0x10
[   31.180604]  ? __pfx_kasan_atomics+0x10/0x10
[   31.180604]  kunit_try_run_case+0x1b3/0x490
[   31.180604]  ? __pfx_kunit_try_run_case+0x10/0x10
[   31.180604]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   31.180604]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   31.180604]  ? __kthread_parkme+0x82/0x160
[   31.180604]  ? preempt_count_sub+0x50/0x80
[   31.180604]  ? __pfx_kunit_try_run_case+0x10/0x10
[   31.180604]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   31.180604]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   31.180604]  kthread+0x257/0x310
[   31.180604]  ? __pfx_kthread+0x10/0x10
[   31.180604]  ret_from_fork+0x41/0x80
[   31.180604]  ? __pfx_kthread+0x10/0x10
[   31.180604]  ret_from_fork_asm+0x1a/0x30
[   31.180604]  </TASK>
[   31.180604] 
[   31.180604] Allocated by task 274:
[   31.180604]  kasan_save_stack+0x3d/0x60
[   31.180604]  kasan_save_track+0x18/0x40
[   31.180604]  kasan_save_alloc_info+0x3b/0x50
[   31.180604]  __kasan_kmalloc+0xb7/0xc0
[   31.180604]  __kmalloc_cache_noprof+0x184/0x410
[   31.180604]  kasan_atomics+0x96/0x310
[   31.180604]  kunit_try_run_case+0x1b3/0x490
[   31.180604]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   31.180604]  kthread+0x257/0x310
[   31.180604]  ret_from_fork+0x41/0x80
[   31.180604]  ret_from_fork_asm+0x1a/0x30
[   31.180604] 
[   31.180604] The buggy address belongs to the object at ffff88810294b780
[   31.180604]  which belongs to the cache kmalloc-64 of size 64
[   31.180604] The buggy address is located 0 bytes to the right of
[   31.180604]  allocated 48-byte region [ffff88810294b780, ffff88810294b7b0)
[   31.180604] 
[   31.180604] The buggy address belongs to the physical page:
[   31.180604] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10294b
[   31.180604] flags: 0x200000000000000(node=0|zone=2)
[   31.180604] page_type: f5(slab)
[   31.180604] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   31.180604] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   31.180604] page dumped because: kasan: bad access detected
[   31.180604] 
[   31.180604] Memory state around the buggy address:
[   31.180604]  ffff88810294b680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   31.180604]  ffff88810294b700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   31.180604] >ffff88810294b780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   31.180604]                                      ^
[   31.180604]  ffff88810294b800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.180604]  ffff88810294b880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.180604] ==================================================================
[   29.800827] ==================================================================
[   29.801511] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b70/0x5450
[   29.801511] Write of size 4 at addr ffff88810294b7b0 by task kunit_try_catch/274
[   29.801511] 
[   29.801511] CPU: 1 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241126 #1
[   29.801511] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.801511] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   29.801511] Call Trace:
[   29.801511]  <TASK>
[   29.801511]  dump_stack_lvl+0x73/0xb0
[   29.801511]  print_report+0xd1/0x640
[   29.801511]  ? __virt_addr_valid+0x1db/0x2d0
[   29.801511]  ? kasan_complete_mode_report_info+0x2a/0x200
[   29.801511]  kasan_report+0x102/0x140
[   29.801511]  ? kasan_atomics_helper+0x4b70/0x5450
[   29.801511]  ? kasan_atomics_helper+0x4b70/0x5450
[   29.801511]  __asan_report_store4_noabort+0x1b/0x30
[   29.801511]  kasan_atomics_helper+0x4b70/0x5450
[   29.801511]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   29.801511]  ? __kmalloc_cache_noprof+0x184/0x410
[   29.801511]  ? trace_hardirqs_on+0x37/0xe0
[   29.801511]  ? kasan_atomics+0x153/0x310
[   29.801511]  kasan_atomics+0x1dd/0x310
[   29.801511]  ? __pfx_kasan_atomics+0x10/0x10
[   29.801511]  ? __pfx_kasan_atomics+0x10/0x10
[   29.801511]  kunit_try_run_case+0x1b3/0x490
[   29.801511]  ? __pfx_kunit_try_run_case+0x10/0x10
[   29.801511]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   29.801511]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   29.801511]  ? __kthread_parkme+0x82/0x160
[   29.801511]  ? preempt_count_sub+0x50/0x80
[   29.801511]  ? __pfx_kunit_try_run_case+0x10/0x10
[   29.801511]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   29.801511]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   29.801511]  kthread+0x257/0x310
[   29.801511]  ? __pfx_kthread+0x10/0x10
[   29.801511]  ret_from_fork+0x41/0x80
[   29.801511]  ? __pfx_kthread+0x10/0x10
[   29.801511]  ret_from_fork_asm+0x1a/0x30
[   29.801511]  </TASK>
[   29.801511] 
[   29.801511] Allocated by task 274:
[   29.801511]  kasan_save_stack+0x3d/0x60
[   29.801511]  kasan_save_track+0x18/0x40
[   29.801511]  kasan_save_alloc_info+0x3b/0x50
[   29.801511]  __kasan_kmalloc+0xb7/0xc0
[   29.801511]  __kmalloc_cache_noprof+0x184/0x410
[   29.801511]  kasan_atomics+0x96/0x310
[   29.801511]  kunit_try_run_case+0x1b3/0x490
[   29.801511]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   29.801511]  kthread+0x257/0x310
[   29.801511]  ret_from_fork+0x41/0x80
[   29.801511]  ret_from_fork_asm+0x1a/0x30
[   29.801511] 
[   29.801511] The buggy address belongs to the object at ffff88810294b780
[   29.801511]  which belongs to the cache kmalloc-64 of size 64
[   29.801511] The buggy address is located 0 bytes to the right of
[   29.801511]  allocated 48-byte region [ffff88810294b780, ffff88810294b7b0)
[   29.801511] 
[   29.801511] The buggy address belongs to the physical page:
[   29.801511] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10294b
[   29.801511] flags: 0x200000000000000(node=0|zone=2)
[   29.801511] page_type: f5(slab)
[   29.801511] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   29.801511] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   29.801511] page dumped because: kasan: bad access detected
[   29.801511] 
[   29.801511] Memory state around the buggy address:
[   29.801511]  ffff88810294b680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.801511]  ffff88810294b700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.801511] >ffff88810294b780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   29.801511]                                      ^
[   29.801511]  ffff88810294b800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.801511]  ffff88810294b880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.801511] ==================================================================
[   31.581715] ==================================================================
[   31.582234] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1819/0x5450
[   31.583592] Write of size 8 at addr ffff88810294b7b0 by task kunit_try_catch/274
[   31.583592] 
[   31.583592] CPU: 1 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241126 #1
[   31.583592] Tainted: [B]=BAD_PAGE, [N]=TEST
[   31.583592] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   31.583592] Call Trace:
[   31.583592]  <TASK>
[   31.583592]  dump_stack_lvl+0x73/0xb0
[   31.583592]  print_report+0xd1/0x640
[   31.583592]  ? __virt_addr_valid+0x1db/0x2d0
[   31.583592]  ? kasan_complete_mode_report_info+0x2a/0x200
[   31.583592]  kasan_report+0x102/0x140
[   31.583592]  ? kasan_atomics_helper+0x1819/0x5450
[   31.583592]  ? kasan_atomics_helper+0x1819/0x5450
[   31.583592]  kasan_check_range+0x10c/0x1c0
[   31.583592]  __kasan_check_write+0x18/0x20
[   31.583592]  kasan_atomics_helper+0x1819/0x5450
[   31.583592]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   31.583592]  ? __kmalloc_cache_noprof+0x184/0x410
[   31.583592]  ? trace_hardirqs_on+0x37/0xe0
[   31.583592]  ? kasan_atomics+0x153/0x310
[   31.583592]  kasan_atomics+0x1dd/0x310
[   31.583592]  ? __pfx_kasan_atomics+0x10/0x10
[   31.583592]  ? __pfx_kasan_atomics+0x10/0x10
[   31.583592]  kunit_try_run_case+0x1b3/0x490
[   31.583592]  ? __pfx_kunit_try_run_case+0x10/0x10
[   31.583592]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   31.583592]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   31.583592]  ? __kthread_parkme+0x82/0x160
[   31.583592]  ? preempt_count_sub+0x50/0x80
[   31.583592]  ? __pfx_kunit_try_run_case+0x10/0x10
[   31.583592]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   31.583592]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   31.583592]  kthread+0x257/0x310
[   31.583592]  ? __pfx_kthread+0x10/0x10
[   31.583592]  ret_from_fork+0x41/0x80
[   31.583592]  ? __pfx_kthread+0x10/0x10
[   31.583592]  ret_from_fork_asm+0x1a/0x30
[   31.583592]  </TASK>
[   31.583592] 
[   31.583592] Allocated by task 274:
[   31.583592]  kasan_save_stack+0x3d/0x60
[   31.583592]  kasan_save_track+0x18/0x40
[   31.583592]  kasan_save_alloc_info+0x3b/0x50
[   31.583592]  __kasan_kmalloc+0xb7/0xc0
[   31.583592]  __kmalloc_cache_noprof+0x184/0x410
[   31.583592]  kasan_atomics+0x96/0x310
[   31.583592]  kunit_try_run_case+0x1b3/0x490
[   31.583592]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   31.583592]  kthread+0x257/0x310
[   31.583592]  ret_from_fork+0x41/0x80
[   31.583592]  ret_from_fork_asm+0x1a/0x30
[   31.583592] 
[   31.583592] The buggy address belongs to the object at ffff88810294b780
[   31.583592]  which belongs to the cache kmalloc-64 of size 64
[   31.583592] The buggy address is located 0 bytes to the right of
[   31.583592]  allocated 48-byte region [ffff88810294b780, ffff88810294b7b0)
[   31.583592] 
[   31.583592] The buggy address belongs to the physical page:
[   31.583592] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10294b
[   31.583592] flags: 0x200000000000000(node=0|zone=2)
[   31.583592] page_type: f5(slab)
[   31.583592] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   31.583592] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   31.583592] page dumped because: kasan: bad access detected
[   31.583592] 
[   31.583592] Memory state around the buggy address:
[   31.583592]  ffff88810294b680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   31.583592]  ffff88810294b700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   31.583592] >ffff88810294b780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   31.583592]                                      ^
[   31.583592]  ffff88810294b800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.583592]  ffff88810294b880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.583592] ==================================================================
[   30.705525] ==================================================================
[   30.706098] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf11/0x5450
[   30.706248] Write of size 4 at addr ffff88810294b7b0 by task kunit_try_catch/274
[   30.706248] 
[   30.706248] CPU: 1 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241126 #1
[   30.706248] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.706248] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   30.706248] Call Trace:
[   30.706248]  <TASK>
[   30.706248]  dump_stack_lvl+0x73/0xb0
[   30.706248]  print_report+0xd1/0x640
[   30.706248]  ? __virt_addr_valid+0x1db/0x2d0
[   30.706248]  ? kasan_complete_mode_report_info+0x2a/0x200
[   30.706248]  kasan_report+0x102/0x140
[   30.706248]  ? kasan_atomics_helper+0xf11/0x5450
[   30.706248]  ? kasan_atomics_helper+0xf11/0x5450
[   30.706248]  kasan_check_range+0x10c/0x1c0
[   30.706248]  __kasan_check_write+0x18/0x20
[   30.706248]  kasan_atomics_helper+0xf11/0x5450
[   30.706248]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   30.706248]  ? __kmalloc_cache_noprof+0x184/0x410
[   30.706248]  ? trace_hardirqs_on+0x37/0xe0
[   30.706248]  ? kasan_atomics+0x153/0x310
[   30.706248]  kasan_atomics+0x1dd/0x310
[   30.706248]  ? __pfx_kasan_atomics+0x10/0x10
[   30.706248]  ? __pfx_kasan_atomics+0x10/0x10
[   30.706248]  kunit_try_run_case+0x1b3/0x490
[   30.706248]  ? __pfx_kunit_try_run_case+0x10/0x10
[   30.706248]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   30.706248]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   30.706248]  ? __kthread_parkme+0x82/0x160
[   30.706248]  ? preempt_count_sub+0x50/0x80
[   30.706248]  ? __pfx_kunit_try_run_case+0x10/0x10
[   30.706248]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   30.706248]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   30.706248]  kthread+0x257/0x310
[   30.706248]  ? __pfx_kthread+0x10/0x10
[   30.706248]  ret_from_fork+0x41/0x80
[   30.706248]  ? __pfx_kthread+0x10/0x10
[   30.706248]  ret_from_fork_asm+0x1a/0x30
[   30.706248]  </TASK>
[   30.706248] 
[   30.706248] Allocated by task 274:
[   30.706248]  kasan_save_stack+0x3d/0x60
[   30.706248]  kasan_save_track+0x18/0x40
[   30.706248]  kasan_save_alloc_info+0x3b/0x50
[   30.706248]  __kasan_kmalloc+0xb7/0xc0
[   30.706248]  __kmalloc_cache_noprof+0x184/0x410
[   30.706248]  kasan_atomics+0x96/0x310
[   30.706248]  kunit_try_run_case+0x1b3/0x490
[   30.706248]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   30.706248]  kthread+0x257/0x310
[   30.706248]  ret_from_fork+0x41/0x80
[   30.706248]  ret_from_fork_asm+0x1a/0x30
[   30.706248] 
[   30.706248] The buggy address belongs to the object at ffff88810294b780
[   30.706248]  which belongs to the cache kmalloc-64 of size 64
[   30.706248] The buggy address is located 0 bytes to the right of
[   30.706248]  allocated 48-byte region [ffff88810294b780, ffff88810294b7b0)
[   30.706248] 
[   30.706248] The buggy address belongs to the physical page:
[   30.706248] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10294b
[   30.706248] flags: 0x200000000000000(node=0|zone=2)
[   30.706248] page_type: f5(slab)
[   30.706248] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   30.706248] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   30.706248] page dumped because: kasan: bad access detected
[   30.706248] 
[   30.706248] Memory state around the buggy address:
[   30.706248]  ffff88810294b680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   30.706248]  ffff88810294b700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   30.706248] >ffff88810294b780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   30.706248]                                      ^
[   30.706248]  ffff88810294b800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.706248]  ffff88810294b880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.706248] ==================================================================
[   29.966924] ==================================================================
[   29.967422] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b3c/0x5450
[   29.967422] Write of size 4 at addr ffff88810294b7b0 by task kunit_try_catch/274
[   29.967422] 
[   29.967422] CPU: 1 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241126 #1
[   29.967422] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.971297] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   29.971297] Call Trace:
[   29.971297]  <TASK>
[   29.971297]  dump_stack_lvl+0x73/0xb0
[   29.971297]  print_report+0xd1/0x640
[   29.971297]  ? __virt_addr_valid+0x1db/0x2d0
[   29.971297]  ? kasan_complete_mode_report_info+0x2a/0x200
[   29.971297]  kasan_report+0x102/0x140
[   29.971297]  ? kasan_atomics_helper+0x4b3c/0x5450
[   29.971297]  ? kasan_atomics_helper+0x4b3c/0x5450
[   29.971297]  __asan_report_store4_noabort+0x1b/0x30
[   29.971297]  kasan_atomics_helper+0x4b3c/0x5450
[   29.971297]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   29.971297]  ? __kmalloc_cache_noprof+0x184/0x410
[   29.971297]  ? trace_hardirqs_on+0x37/0xe0
[   29.971297]  ? kasan_atomics+0x153/0x310
[   29.971297]  kasan_atomics+0x1dd/0x310
[   29.971297]  ? __pfx_kasan_atomics+0x10/0x10
[   29.971297]  ? __pfx_kasan_atomics+0x10/0x10
[   29.971297]  kunit_try_run_case+0x1b3/0x490
[   29.971297]  ? __pfx_kunit_try_run_case+0x10/0x10
[   29.971297]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   29.971297]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   29.971297]  ? __kthread_parkme+0x82/0x160
[   29.971297]  ? preempt_count_sub+0x50/0x80
[   29.971297]  ? __pfx_kunit_try_run_case+0x10/0x10
[   29.971297]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   29.971297]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   29.971297]  kthread+0x257/0x310
[   29.971297]  ? __pfx_kthread+0x10/0x10
[   29.971297]  ret_from_fork+0x41/0x80
[   29.971297]  ? __pfx_kthread+0x10/0x10
[   29.971297]  ret_from_fork_asm+0x1a/0x30
[   29.971297]  </TASK>
[   29.971297] 
[   29.971297] Allocated by task 274:
[   29.971297]  kasan_save_stack+0x3d/0x60
[   29.971297]  kasan_save_track+0x18/0x40
[   29.971297]  kasan_save_alloc_info+0x3b/0x50
[   29.971297]  __kasan_kmalloc+0xb7/0xc0
[   29.971297]  __kmalloc_cache_noprof+0x184/0x410
[   29.971297]  kasan_atomics+0x96/0x310
[   29.971297]  kunit_try_run_case+0x1b3/0x490
[   29.971297]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   29.971297]  kthread+0x257/0x310
[   29.971297]  ret_from_fork+0x41/0x80
[   29.971297]  ret_from_fork_asm+0x1a/0x30
[   29.971297] 
[   29.971297] The buggy address belongs to the object at ffff88810294b780
[   29.971297]  which belongs to the cache kmalloc-64 of size 64
[   29.971297] The buggy address is located 0 bytes to the right of
[   29.971297]  allocated 48-byte region [ffff88810294b780, ffff88810294b7b0)
[   29.971297] 
[   29.971297] The buggy address belongs to the physical page:
[   29.971297] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10294b
[   29.971297] flags: 0x200000000000000(node=0|zone=2)
[   29.971297] page_type: f5(slab)
[   29.971297] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   29.971297] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   29.971297] page dumped because: kasan: bad access detected
[   29.971297] 
[   29.971297] Memory state around the buggy address:
[   29.971297]  ffff88810294b680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.971297]  ffff88810294b700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.971297] >ffff88810294b780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   29.971297]                                      ^
[   29.971297]  ffff88810294b800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.971297]  ffff88810294b880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.971297] ==================================================================
[   32.417187] ==================================================================
[   32.417531] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x224d/0x5450
[   32.417531] Write of size 8 at addr ffff88810294b7b0 by task kunit_try_catch/274
[   32.417531] 
[   32.417531] CPU: 1 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241126 #1
[   32.417531] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.417905] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   32.422203] Call Trace:
[   32.422203]  <TASK>
[   32.422203]  dump_stack_lvl+0x73/0xb0
[   32.422203]  print_report+0xd1/0x640
[   32.422203]  ? __virt_addr_valid+0x1db/0x2d0
[   32.422203]  ? kasan_complete_mode_report_info+0x2a/0x200
[   32.422203]  kasan_report+0x102/0x140
[   32.422203]  ? kasan_atomics_helper+0x224d/0x5450
[   32.422203]  ? kasan_atomics_helper+0x224d/0x5450
[   32.422203]  kasan_check_range+0x10c/0x1c0
[   32.422203]  __kasan_check_write+0x18/0x20
[   32.422203]  kasan_atomics_helper+0x224d/0x5450
[   32.422203]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   32.422203]  ? __kmalloc_cache_noprof+0x184/0x410
[   32.422203]  ? trace_hardirqs_on+0x37/0xe0
[   32.422203]  ? kasan_atomics+0x153/0x310
[   32.422203]  kasan_atomics+0x1dd/0x310
[   32.422203]  ? __pfx_kasan_atomics+0x10/0x10
[   32.422203]  ? __pfx_kasan_atomics+0x10/0x10
[   32.422203]  kunit_try_run_case+0x1b3/0x490
[   32.422203]  ? __pfx_kunit_try_run_case+0x10/0x10
[   32.422203]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   32.422203]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   32.422203]  ? __kthread_parkme+0x82/0x160
[   32.422203]  ? preempt_count_sub+0x50/0x80
[   32.422203]  ? __pfx_kunit_try_run_case+0x10/0x10
[   32.422203]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   32.422203]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   32.422203]  kthread+0x257/0x310
[   32.422203]  ? __pfx_kthread+0x10/0x10
[   32.422203]  ret_from_fork+0x41/0x80
[   32.422203]  ? __pfx_kthread+0x10/0x10
[   32.422203]  ret_from_fork_asm+0x1a/0x30
[   32.422203]  </TASK>
[   32.422203] 
[   32.422203] Allocated by task 274:
[   32.422203]  kasan_save_stack+0x3d/0x60
[   32.422203]  kasan_save_track+0x18/0x40
[   32.422203]  kasan_save_alloc_info+0x3b/0x50
[   32.422203]  __kasan_kmalloc+0xb7/0xc0
[   32.422203]  __kmalloc_cache_noprof+0x184/0x410
[   32.422203]  kasan_atomics+0x96/0x310
[   32.422203]  kunit_try_run_case+0x1b3/0x490
[   32.422203]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   32.422203]  kthread+0x257/0x310
[   32.422203]  ret_from_fork+0x41/0x80
[   32.422203]  ret_from_fork_asm+0x1a/0x30
[   32.422203] 
[   32.422203] The buggy address belongs to the object at ffff88810294b780
[   32.422203]  which belongs to the cache kmalloc-64 of size 64
[   32.422203] The buggy address is located 0 bytes to the right of
[   32.422203]  allocated 48-byte region [ffff88810294b780, ffff88810294b7b0)
[   32.422203] 
[   32.422203] The buggy address belongs to the physical page:
[   32.422203] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10294b
[   32.422203] flags: 0x200000000000000(node=0|zone=2)
[   32.422203] page_type: f5(slab)
[   32.422203] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   32.422203] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   32.422203] page dumped because: kasan: bad access detected
[   32.422203] 
[   32.422203] Memory state around the buggy address:
[   32.422203]  ffff88810294b680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.422203]  ffff88810294b700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.422203] >ffff88810294b780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   32.422203]                                      ^
[   32.422203]  ffff88810294b800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.422203]  ffff88810294b880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.422203] ==================================================================
[   32.125358] ==================================================================
[   32.125808] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4f73/0x5450
[   32.126193] Read of size 8 at addr ffff88810294b7b0 by task kunit_try_catch/274
[   32.126193] 
[   32.126193] CPU: 1 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241126 #1
[   32.126193] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.126193] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   32.126193] Call Trace:
[   32.126193]  <TASK>
[   32.126193]  dump_stack_lvl+0x73/0xb0
[   32.126193]  print_report+0xd1/0x640
[   32.126193]  ? __virt_addr_valid+0x1db/0x2d0
[   32.126193]  ? kasan_complete_mode_report_info+0x2a/0x200
[   32.126193]  kasan_report+0x102/0x140
[   32.126193]  ? kasan_atomics_helper+0x4f73/0x5450
[   32.126193]  ? kasan_atomics_helper+0x4f73/0x5450
[   32.126193]  __asan_report_load8_noabort+0x18/0x20
[   32.126193]  kasan_atomics_helper+0x4f73/0x5450
[   32.126193]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   32.126193]  ? __kmalloc_cache_noprof+0x184/0x410
[   32.126193]  ? trace_hardirqs_on+0x37/0xe0
[   32.126193]  ? kasan_atomics+0x153/0x310
[   32.126193]  kasan_atomics+0x1dd/0x310
[   32.126193]  ? __pfx_kasan_atomics+0x10/0x10
[   32.126193]  ? __pfx_kasan_atomics+0x10/0x10
[   32.126193]  kunit_try_run_case+0x1b3/0x490
[   32.126193]  ? __pfx_kunit_try_run_case+0x10/0x10
[   32.126193]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   32.126193]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   32.126193]  ? __kthread_parkme+0x82/0x160
[   32.126193]  ? preempt_count_sub+0x50/0x80
[   32.126193]  ? __pfx_kunit_try_run_case+0x10/0x10
[   32.126193]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   32.126193]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   32.126193]  kthread+0x257/0x310
[   32.126193]  ? __pfx_kthread+0x10/0x10
[   32.126193]  ret_from_fork+0x41/0x80
[   32.126193]  ? __pfx_kthread+0x10/0x10
[   32.126193]  ret_from_fork_asm+0x1a/0x30
[   32.126193]  </TASK>
[   32.126193] 
[   32.126193] Allocated by task 274:
[   32.126193]  kasan_save_stack+0x3d/0x60
[   32.126193]  kasan_save_track+0x18/0x40
[   32.126193]  kasan_save_alloc_info+0x3b/0x50
[   32.126193]  __kasan_kmalloc+0xb7/0xc0
[   32.126193]  __kmalloc_cache_noprof+0x184/0x410
[   32.126193]  kasan_atomics+0x96/0x310
[   32.126193]  kunit_try_run_case+0x1b3/0x490
[   32.126193]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   32.126193]  kthread+0x257/0x310
[   32.126193]  ret_from_fork+0x41/0x80
[   32.126193]  ret_from_fork_asm+0x1a/0x30
[   32.126193] 
[   32.126193] The buggy address belongs to the object at ffff88810294b780
[   32.126193]  which belongs to the cache kmalloc-64 of size 64
[   32.126193] The buggy address is located 0 bytes to the right of
[   32.126193]  allocated 48-byte region [ffff88810294b780, ffff88810294b7b0)
[   32.126193] 
[   32.126193] The buggy address belongs to the physical page:
[   32.126193] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10294b
[   32.126193] flags: 0x200000000000000(node=0|zone=2)
[   32.126193] page_type: f5(slab)
[   32.126193] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   32.126193] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   32.126193] page dumped because: kasan: bad access detected
[   32.126193] 
[   32.126193] Memory state around the buggy address:
[   32.126193]  ffff88810294b680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.126193]  ffff88810294b700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.126193] >ffff88810294b780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   32.126193]                                      ^
[   32.126193]  ffff88810294b800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.126193]  ffff88810294b880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.126193] ==================================================================
[   31.494787] ==================================================================
[   31.495230] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x16e8/0x5450
[   31.495230] Write of size 8 at addr ffff88810294b7b0 by task kunit_try_catch/274
[   31.495230] 
[   31.495230] CPU: 1 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241126 #1
[   31.495230] Tainted: [B]=BAD_PAGE, [N]=TEST
[   31.495230] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   31.495230] Call Trace:
[   31.495230]  <TASK>
[   31.495230]  dump_stack_lvl+0x73/0xb0
[   31.495230]  print_report+0xd1/0x640
[   31.495230]  ? __virt_addr_valid+0x1db/0x2d0
[   31.495230]  ? kasan_complete_mode_report_info+0x2a/0x200
[   31.495230]  kasan_report+0x102/0x140
[   31.495230]  ? kasan_atomics_helper+0x16e8/0x5450
[   31.495230]  ? kasan_atomics_helper+0x16e8/0x5450
[   31.495230]  kasan_check_range+0x10c/0x1c0
[   31.495230]  __kasan_check_write+0x18/0x20
[   31.495230]  kasan_atomics_helper+0x16e8/0x5450
[   31.495230]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   31.495230]  ? __kmalloc_cache_noprof+0x184/0x410
[   31.495230]  ? trace_hardirqs_on+0x37/0xe0
[   31.495230]  ? kasan_atomics+0x153/0x310
[   31.495230]  kasan_atomics+0x1dd/0x310
[   31.495230]  ? __pfx_kasan_atomics+0x10/0x10
[   31.495230]  ? __pfx_kasan_atomics+0x10/0x10
[   31.495230]  kunit_try_run_case+0x1b3/0x490
[   31.495230]  ? __pfx_kunit_try_run_case+0x10/0x10
[   31.495230]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   31.495230]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   31.495230]  ? __kthread_parkme+0x82/0x160
[   31.495230]  ? preempt_count_sub+0x50/0x80
[   31.495230]  ? __pfx_kunit_try_run_case+0x10/0x10
[   31.495230]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   31.495230]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   31.495230]  kthread+0x257/0x310
[   31.495230]  ? __pfx_kthread+0x10/0x10
[   31.495230]  ret_from_fork+0x41/0x80
[   31.495230]  ? __pfx_kthread+0x10/0x10
[   31.495230]  ret_from_fork_asm+0x1a/0x30
[   31.495230]  </TASK>
[   31.495230] 
[   31.495230] Allocated by task 274:
[   31.495230]  kasan_save_stack+0x3d/0x60
[   31.495230]  kasan_save_track+0x18/0x40
[   31.495230]  kasan_save_alloc_info+0x3b/0x50
[   31.495230]  __kasan_kmalloc+0xb7/0xc0
[   31.495230]  __kmalloc_cache_noprof+0x184/0x410
[   31.495230]  kasan_atomics+0x96/0x310
[   31.495230]  kunit_try_run_case+0x1b3/0x490
[   31.495230]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   31.495230]  kthread+0x257/0x310
[   31.495230]  ret_from_fork+0x41/0x80
[   31.495230]  ret_from_fork_asm+0x1a/0x30
[   31.495230] 
[   31.495230] The buggy address belongs to the object at ffff88810294b780
[   31.495230]  which belongs to the cache kmalloc-64 of size 64
[   31.495230] The buggy address is located 0 bytes to the right of
[   31.495230]  allocated 48-byte region [ffff88810294b780, ffff88810294b7b0)
[   31.495230] 
[   31.495230] The buggy address belongs to the physical page:
[   31.495230] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10294b
[   31.495230] flags: 0x200000000000000(node=0|zone=2)
[   31.495230] page_type: f5(slab)
[   31.495230] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   31.495230] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   31.495230] page dumped because: kasan: bad access detected
[   31.495230] 
[   31.495230] Memory state around the buggy address:
[   31.495230]  ffff88810294b680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   31.495230]  ffff88810294b700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   31.495230] >ffff88810294b780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   31.495230]                                      ^
[   31.495230]  ffff88810294b800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.495230]  ffff88810294b880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.495230] ==================================================================
[   31.357449] ==================================================================
[   31.358218] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x151e/0x5450
[   31.358218] Write of size 8 at addr ffff88810294b7b0 by task kunit_try_catch/274
[   31.358218] 
[   31.358218] CPU: 1 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241126 #1
[   31.358218] Tainted: [B]=BAD_PAGE, [N]=TEST
[   31.358218] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   31.358218] Call Trace:
[   31.358218]  <TASK>
[   31.358218]  dump_stack_lvl+0x73/0xb0
[   31.358218]  print_report+0xd1/0x640
[   31.358218]  ? __virt_addr_valid+0x1db/0x2d0
[   31.358218]  ? kasan_complete_mode_report_info+0x2a/0x200
[   31.358218]  kasan_report+0x102/0x140
[   31.358218]  ? kasan_atomics_helper+0x151e/0x5450
[   31.358218]  ? kasan_atomics_helper+0x151e/0x5450
[   31.358218]  kasan_check_range+0x10c/0x1c0
[   31.358218]  __kasan_check_write+0x18/0x20
[   31.358218]  kasan_atomics_helper+0x151e/0x5450
[   31.358218]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   31.358218]  ? __kmalloc_cache_noprof+0x184/0x410
[   31.358218]  ? trace_hardirqs_on+0x37/0xe0
[   31.358218]  ? kasan_atomics+0x153/0x310
[   31.358218]  kasan_atomics+0x1dd/0x310
[   31.358218]  ? __pfx_kasan_atomics+0x10/0x10
[   31.358218]  ? __pfx_kasan_atomics+0x10/0x10
[   31.358218]  kunit_try_run_case+0x1b3/0x490
[   31.358218]  ? __pfx_kunit_try_run_case+0x10/0x10
[   31.358218]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   31.358218]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   31.358218]  ? __kthread_parkme+0x82/0x160
[   31.358218]  ? preempt_count_sub+0x50/0x80
[   31.358218]  ? __pfx_kunit_try_run_case+0x10/0x10
[   31.358218]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   31.358218]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   31.358218]  kthread+0x257/0x310
[   31.358218]  ? __pfx_kthread+0x10/0x10
[   31.358218]  ret_from_fork+0x41/0x80
[   31.358218]  ? __pfx_kthread+0x10/0x10
[   31.358218]  ret_from_fork_asm+0x1a/0x30
[   31.358218]  </TASK>
[   31.358218] 
[   31.358218] Allocated by task 274:
[   31.358218]  kasan_save_stack+0x3d/0x60
[   31.358218]  kasan_save_track+0x18/0x40
[   31.358218]  kasan_save_alloc_info+0x3b/0x50
[   31.358218]  __kasan_kmalloc+0xb7/0xc0
[   31.358218]  __kmalloc_cache_noprof+0x184/0x410
[   31.358218]  kasan_atomics+0x96/0x310
[   31.358218]  kunit_try_run_case+0x1b3/0x490
[   31.358218]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   31.358218]  kthread+0x257/0x310
[   31.358218]  ret_from_fork+0x41/0x80
[   31.358218]  ret_from_fork_asm+0x1a/0x30
[   31.358218] 
[   31.358218] The buggy address belongs to the object at ffff88810294b780
[   31.358218]  which belongs to the cache kmalloc-64 of size 64
[   31.358218] The buggy address is located 0 bytes to the right of
[   31.358218]  allocated 48-byte region [ffff88810294b780, ffff88810294b7b0)
[   31.358218] 
[   31.358218] The buggy address belongs to the physical page:
[   31.358218] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10294b
[   31.358218] flags: 0x200000000000000(node=0|zone=2)
[   31.358218] page_type: f5(slab)
[   31.358218] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   31.358218] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   31.358218] page dumped because: kasan: bad access detected
[   31.358218] 
[   31.358218] Memory state around the buggy address:
[   31.358218]  ffff88810294b680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   31.358218]  ffff88810294b700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   31.358218] >ffff88810294b780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   31.358218]                                      ^
[   31.358218]  ffff88810294b800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.358218]  ffff88810294b880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.358218] ==================================================================

[   26.473282] ==================================================================
[   26.473951] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1a80/0x5450
[   26.474410] Write of size 8 at addr ffff8881028c7730 by task kunit_try_catch/272
[   26.475207] 
[   26.475631] CPU: 0 UID: 0 PID: 272 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241126 #1
[   26.476691] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.477154] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   26.478136] Call Trace:
[   26.478543]  <TASK>
[   26.478949]  dump_stack_lvl+0x73/0xb0
[   26.479461]  print_report+0xd1/0x640
[   26.480023]  ? __virt_addr_valid+0x1db/0x2d0
[   26.480642]  ? kasan_complete_mode_report_info+0x2a/0x200
[   26.481290]  kasan_report+0x102/0x140
[   26.481722]  ? kasan_atomics_helper+0x1a80/0x5450
[   26.482251]  ? kasan_atomics_helper+0x1a80/0x5450
[   26.482787]  kasan_check_range+0x10c/0x1c0
[   26.483310]  __kasan_check_write+0x18/0x20
[   26.483823]  kasan_atomics_helper+0x1a80/0x5450
[   26.484320]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   26.484920]  ? __kmalloc_cache_noprof+0x184/0x410
[   26.485508]  ? trace_hardirqs_on+0x37/0xe0
[   26.486124]  ? kasan_atomics+0x153/0x310
[   26.486715]  kasan_atomics+0x1dd/0x310
[   26.487185]  ? __pfx_kasan_atomics+0x10/0x10
[   26.487751]  ? __pfx_kasan_atomics+0x10/0x10
[   26.488138]  kunit_try_run_case+0x1b3/0x490
[   26.488510]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.488965]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   26.489454]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   26.490973]  ? __kthread_parkme+0x82/0x160
[   26.491352]  ? preempt_count_sub+0x50/0x80
[   26.491806]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.492272]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   26.492777]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.493211]  kthread+0x257/0x310
[   26.494187]  ? __pfx_kthread+0x10/0x10
[   26.494441]  ret_from_fork+0x41/0x80
[   26.494904]  ? __pfx_kthread+0x10/0x10
[   26.495845]  ret_from_fork_asm+0x1a/0x30
[   26.496232]  </TASK>
[   26.496541] 
[   26.497288] Allocated by task 272:
[   26.497560]  kasan_save_stack+0x3d/0x60
[   26.498093]  kasan_save_track+0x18/0x40
[   26.498443]  kasan_save_alloc_info+0x3b/0x50
[   26.499116]  __kasan_kmalloc+0xb7/0xc0
[   26.499592]  __kmalloc_cache_noprof+0x184/0x410
[   26.500039]  kasan_atomics+0x96/0x310
[   26.500610]  kunit_try_run_case+0x1b3/0x490
[   26.501275]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.502148]  kthread+0x257/0x310
[   26.502613]  ret_from_fork+0x41/0x80
[   26.502998]  ret_from_fork_asm+0x1a/0x30
[   26.503422] 
[   26.504245] The buggy address belongs to the object at ffff8881028c7700
[   26.504245]  which belongs to the cache kmalloc-64 of size 64
[   26.505295] The buggy address is located 0 bytes to the right of
[   26.505295]  allocated 48-byte region [ffff8881028c7700, ffff8881028c7730)
[   26.506277] 
[   26.506544] The buggy address belongs to the physical page:
[   26.507054] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1028c7
[   26.507899] flags: 0x200000000000000(node=0|zone=2)
[   26.508775] page_type: f5(slab)
[   26.509187] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   26.510254] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   26.510837] page dumped because: kasan: bad access detected
[   26.511503] 
[   26.511726] Memory state around the buggy address:
[   26.512194]  ffff8881028c7600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.513143]  ffff8881028c7680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.513999] >ffff8881028c7700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   26.514635]                                      ^
[   26.514986]  ffff8881028c7780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.515739]  ffff8881028c7800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.516223] ==================================================================
[   24.820014] ==================================================================
[   24.820690] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x5ff/0x5450
[   24.822160] Write of size 4 at addr ffff8881028c7730 by task kunit_try_catch/272
[   24.824243] 
[   24.825051] CPU: 0 UID: 0 PID: 272 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241126 #1
[   24.825723] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.826395] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   24.827427] Call Trace:
[   24.827854]  <TASK>
[   24.828120]  dump_stack_lvl+0x73/0xb0
[   24.828562]  print_report+0xd1/0x640
[   24.829081]  ? __virt_addr_valid+0x1db/0x2d0
[   24.830178]  ? kasan_complete_mode_report_info+0x2a/0x200
[   24.830666]  kasan_report+0x102/0x140
[   24.831340]  ? kasan_atomics_helper+0x5ff/0x5450
[   24.832016]  ? kasan_atomics_helper+0x5ff/0x5450
[   24.832554]  kasan_check_range+0x10c/0x1c0
[   24.833112]  __kasan_check_write+0x18/0x20
[   24.833545]  kasan_atomics_helper+0x5ff/0x5450
[   24.833859]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   24.834465]  ? __kmalloc_cache_noprof+0x184/0x410
[   24.834944]  ? trace_hardirqs_on+0x37/0xe0
[   24.835328]  ? kasan_atomics+0x153/0x310
[   24.835959]  kasan_atomics+0x1dd/0x310
[   24.836480]  ? __pfx_kasan_atomics+0x10/0x10
[   24.836896]  ? __pfx_kasan_atomics+0x10/0x10
[   24.837223]  kunit_try_run_case+0x1b3/0x490
[   24.837762]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.838559]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   24.839182]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   24.839551]  ? __kthread_parkme+0x82/0x160
[   24.840087]  ? preempt_count_sub+0x50/0x80
[   24.840576]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.840903]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   24.841261]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.842014]  kthread+0x257/0x310
[   24.842502]  ? __pfx_kthread+0x10/0x10
[   24.843045]  ret_from_fork+0x41/0x80
[   24.843470]  ? __pfx_kthread+0x10/0x10
[   24.844995]  ret_from_fork_asm+0x1a/0x30
[   24.845342]  </TASK>
[   24.845852] 
[   24.846034] Allocated by task 272:
[   24.846415]  kasan_save_stack+0x3d/0x60
[   24.847308]  kasan_save_track+0x18/0x40
[   24.847882]  kasan_save_alloc_info+0x3b/0x50
[   24.848692]  __kasan_kmalloc+0xb7/0xc0
[   24.849242]  __kmalloc_cache_noprof+0x184/0x410
[   24.849745]  kasan_atomics+0x96/0x310
[   24.850150]  kunit_try_run_case+0x1b3/0x490
[   24.850518]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.851755]  kthread+0x257/0x310
[   24.852083]  ret_from_fork+0x41/0x80
[   24.852735]  ret_from_fork_asm+0x1a/0x30
[   24.853146] 
[   24.853317] The buggy address belongs to the object at ffff8881028c7700
[   24.853317]  which belongs to the cache kmalloc-64 of size 64
[   24.854603] The buggy address is located 0 bytes to the right of
[   24.854603]  allocated 48-byte region [ffff8881028c7700, ffff8881028c7730)
[   24.855833] 
[   24.856414] The buggy address belongs to the physical page:
[   24.857090] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1028c7
[   24.857972] flags: 0x200000000000000(node=0|zone=2)
[   24.858640] page_type: f5(slab)
[   24.858967] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   24.859472] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   24.860073] page dumped because: kasan: bad access detected
[   24.860603] 
[   24.860780] Memory state around the buggy address:
[   24.861365]  ffff8881028c7600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.861887]  ffff8881028c7680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.862472] >ffff8881028c7700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   24.863076]                                      ^
[   24.863555]  ffff8881028c7780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.863988]  ffff8881028c7800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.864653] ==================================================================
[   25.284243] ==================================================================
[   25.284843] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a86/0x5450
[   25.285334] Read of size 4 at addr ffff8881028c7730 by task kunit_try_catch/272
[   25.286028] 
[   25.286303] CPU: 0 UID: 0 PID: 272 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241126 #1
[   25.287241] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.287783] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   25.288782] Call Trace:
[   25.289065]  <TASK>
[   25.289341]  dump_stack_lvl+0x73/0xb0
[   25.289700]  print_report+0xd1/0x640
[   25.289990]  ? __virt_addr_valid+0x1db/0x2d0
[   25.290450]  ? kasan_complete_mode_report_info+0x2a/0x200
[   25.291172]  kasan_report+0x102/0x140
[   25.291638]  ? kasan_atomics_helper+0x4a86/0x5450
[   25.291984]  ? kasan_atomics_helper+0x4a86/0x5450
[   25.292313]  __asan_report_load4_noabort+0x18/0x20
[   25.292865]  kasan_atomics_helper+0x4a86/0x5450
[   25.293378]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   25.294097]  ? __kmalloc_cache_noprof+0x184/0x410
[   25.294831]  ? trace_hardirqs_on+0x37/0xe0
[   25.295135]  ? kasan_atomics+0x153/0x310
[   25.295476]  kasan_atomics+0x1dd/0x310
[   25.296018]  ? __pfx_kasan_atomics+0x10/0x10
[   25.296543]  ? __pfx_kasan_atomics+0x10/0x10
[   25.297103]  kunit_try_run_case+0x1b3/0x490
[   25.297681]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.298240]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   25.298841]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   25.299389]  ? __kthread_parkme+0x82/0x160
[   25.299937]  ? preempt_count_sub+0x50/0x80
[   25.300432]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.301031]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   25.301730]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.302345]  kthread+0x257/0x310
[   25.302832]  ? __pfx_kthread+0x10/0x10
[   25.303307]  ret_from_fork+0x41/0x80
[   25.303827]  ? __pfx_kthread+0x10/0x10
[   25.304295]  ret_from_fork_asm+0x1a/0x30
[   25.304863]  </TASK>
[   25.305178] 
[   25.305470] Allocated by task 272:
[   25.305940]  kasan_save_stack+0x3d/0x60
[   25.306422]  kasan_save_track+0x18/0x40
[   25.306945]  kasan_save_alloc_info+0x3b/0x50
[   25.307447]  __kasan_kmalloc+0xb7/0xc0
[   25.307946]  __kmalloc_cache_noprof+0x184/0x410
[   25.308452]  kasan_atomics+0x96/0x310
[   25.308931]  kunit_try_run_case+0x1b3/0x490
[   25.309213]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.309812]  kthread+0x257/0x310
[   25.310203]  ret_from_fork+0x41/0x80
[   25.310544]  ret_from_fork_asm+0x1a/0x30
[   25.310956] 
[   25.311174] The buggy address belongs to the object at ffff8881028c7700
[   25.311174]  which belongs to the cache kmalloc-64 of size 64
[   25.311967] The buggy address is located 0 bytes to the right of
[   25.311967]  allocated 48-byte region [ffff8881028c7700, ffff8881028c7730)
[   25.312665] 
[   25.312902] The buggy address belongs to the physical page:
[   25.313369] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1028c7
[   25.313966] flags: 0x200000000000000(node=0|zone=2)
[   25.314373] page_type: f5(slab)
[   25.314773] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   25.315379] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   25.316017] page dumped because: kasan: bad access detected
[   25.316329] 
[   25.316517] Memory state around the buggy address:
[   25.317030]  ffff8881028c7600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.317738]  ffff8881028c7680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.318364] >ffff8881028c7700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   25.318884]                                      ^
[   25.319179]  ffff8881028c7780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.319860]  ffff8881028c7800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.320502] ==================================================================
[   26.349731] ==================================================================
[   26.350774] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x18b2/0x5450
[   26.351309] Write of size 8 at addr ffff8881028c7730 by task kunit_try_catch/272
[   26.351779] 
[   26.352040] CPU: 0 UID: 0 PID: 272 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241126 #1
[   26.352963] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.353381] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   26.354113] Call Trace:
[   26.354342]  <TASK>
[   26.354615]  dump_stack_lvl+0x73/0xb0
[   26.355053]  print_report+0xd1/0x640
[   26.355546]  ? __virt_addr_valid+0x1db/0x2d0
[   26.356005]  ? kasan_complete_mode_report_info+0x2a/0x200
[   26.356359]  kasan_report+0x102/0x140
[   26.356858]  ? kasan_atomics_helper+0x18b2/0x5450
[   26.357355]  ? kasan_atomics_helper+0x18b2/0x5450
[   26.357936]  kasan_check_range+0x10c/0x1c0
[   26.358350]  __kasan_check_write+0x18/0x20
[   26.358774]  kasan_atomics_helper+0x18b2/0x5450
[   26.359213]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   26.359556]  ? __kmalloc_cache_noprof+0x184/0x410
[   26.359919]  ? trace_hardirqs_on+0x37/0xe0
[   26.360215]  ? kasan_atomics+0x153/0x310
[   26.360541]  kasan_atomics+0x1dd/0x310
[   26.361037]  ? __pfx_kasan_atomics+0x10/0x10
[   26.361534]  ? __pfx_kasan_atomics+0x10/0x10
[   26.362076]  kunit_try_run_case+0x1b3/0x490
[   26.362610]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.363117]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   26.363654]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   26.364167]  ? __kthread_parkme+0x82/0x160
[   26.364688]  ? preempt_count_sub+0x50/0x80
[   26.365142]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.365730]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   26.366220]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.366670]  kthread+0x257/0x310
[   26.367063]  ? __pfx_kthread+0x10/0x10
[   26.367497]  ret_from_fork+0x41/0x80
[   26.367965]  ? __pfx_kthread+0x10/0x10
[   26.368312]  ret_from_fork_asm+0x1a/0x30
[   26.370564]  </TASK>
[   26.370802] 
[   26.370963] Allocated by task 272:
[   26.371199]  kasan_save_stack+0x3d/0x60
[   26.371530]  kasan_save_track+0x18/0x40
[   26.371982]  kasan_save_alloc_info+0x3b/0x50
[   26.372443]  __kasan_kmalloc+0xb7/0xc0
[   26.372884]  __kmalloc_cache_noprof+0x184/0x410
[   26.373346]  kasan_atomics+0x96/0x310
[   26.373857]  kunit_try_run_case+0x1b3/0x490
[   26.374322]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.374918]  kthread+0x257/0x310
[   26.375319]  ret_from_fork+0x41/0x80
[   26.375662]  ret_from_fork_asm+0x1a/0x30
[   26.375949] 
[   26.376114] The buggy address belongs to the object at ffff8881028c7700
[   26.376114]  which belongs to the cache kmalloc-64 of size 64
[   26.377177] The buggy address is located 0 bytes to the right of
[   26.377177]  allocated 48-byte region [ffff8881028c7700, ffff8881028c7730)
[   26.378296] 
[   26.378553] The buggy address belongs to the physical page:
[   26.379038] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1028c7
[   26.379704] flags: 0x200000000000000(node=0|zone=2)
[   26.380186] page_type: f5(slab)
[   26.380436] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   26.380909] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   26.381631] page dumped because: kasan: bad access detected
[   26.382158] 
[   26.382385] Memory state around the buggy address:
[   26.382910]  ffff8881028c7600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.383543]  ffff8881028c7680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.384077] >ffff8881028c7700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   26.384511]                                      ^
[   26.385015]  ffff8881028c7780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.385645]  ffff8881028c7800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.386308] ==================================================================
[   25.563709] ==================================================================
[   25.564658] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x107a/0x5450
[   25.565131] Write of size 4 at addr ffff8881028c7730 by task kunit_try_catch/272
[   25.566468] 
[   25.566689] CPU: 0 UID: 0 PID: 272 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241126 #1
[   25.567593] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.568003] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   25.568616] Call Trace:
[   25.568931]  <TASK>
[   25.569250]  dump_stack_lvl+0x73/0xb0
[   25.569739]  print_report+0xd1/0x640
[   25.570110]  ? __virt_addr_valid+0x1db/0x2d0
[   25.570669]  ? kasan_complete_mode_report_info+0x2a/0x200
[   25.571159]  kasan_report+0x102/0x140
[   25.571619]  ? kasan_atomics_helper+0x107a/0x5450
[   25.572025]  ? kasan_atomics_helper+0x107a/0x5450
[   25.572365]  kasan_check_range+0x10c/0x1c0
[   25.572707]  __kasan_check_write+0x18/0x20
[   25.573203]  kasan_atomics_helper+0x107a/0x5450
[   25.573728]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   25.574398]  ? __kmalloc_cache_noprof+0x184/0x410
[   25.575035]  ? trace_hardirqs_on+0x37/0xe0
[   25.575539]  ? kasan_atomics+0x153/0x310
[   25.576241]  kasan_atomics+0x1dd/0x310
[   25.576584]  ? __pfx_kasan_atomics+0x10/0x10
[   25.577775]  ? __pfx_kasan_atomics+0x10/0x10
[   25.578318]  kunit_try_run_case+0x1b3/0x490
[   25.578850]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.579359]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   25.579802]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   25.580331]  ? __kthread_parkme+0x82/0x160
[   25.580675]  ? preempt_count_sub+0x50/0x80
[   25.581127]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.581563]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   25.584061]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.584419]  kthread+0x257/0x310
[   25.586183]  ? __pfx_kthread+0x10/0x10
[   25.586657]  ret_from_fork+0x41/0x80
[   25.587094]  ? __pfx_kthread+0x10/0x10
[   25.587549]  ret_from_fork_asm+0x1a/0x30
[   25.587956]  </TASK>
[   25.588266] 
[   25.588551] Allocated by task 272:
[   25.588887]  kasan_save_stack+0x3d/0x60
[   25.589172]  kasan_save_track+0x18/0x40
[   25.589649]  kasan_save_alloc_info+0x3b/0x50
[   25.590128]  __kasan_kmalloc+0xb7/0xc0
[   25.590594]  __kmalloc_cache_noprof+0x184/0x410
[   25.591067]  kasan_atomics+0x96/0x310
[   25.591520]  kunit_try_run_case+0x1b3/0x490
[   25.591974]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.592322]  kthread+0x257/0x310
[   25.592673]  ret_from_fork+0x41/0x80
[   25.593179]  ret_from_fork_asm+0x1a/0x30
[   25.593651] 
[   25.594686] The buggy address belongs to the object at ffff8881028c7700
[   25.594686]  which belongs to the cache kmalloc-64 of size 64
[   25.595376] The buggy address is located 0 bytes to the right of
[   25.595376]  allocated 48-byte region [ffff8881028c7700, ffff8881028c7730)
[   25.596246] 
[   25.596539] The buggy address belongs to the physical page:
[   25.597175] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1028c7
[   25.598106] flags: 0x200000000000000(node=0|zone=2)
[   25.598652] page_type: f5(slab)
[   25.599063] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   25.599554] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   25.600249] page dumped because: kasan: bad access detected
[   25.600714] 
[   25.600960] Memory state around the buggy address:
[   25.601433]  ffff8881028c7600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.602171]  ffff8881028c7680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.602681] >ffff8881028c7700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   25.603436]                                      ^
[   25.603824]  ffff8881028c7780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.604576]  ffff8881028c7800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.605051] ==================================================================
[   27.100197] ==================================================================
[   27.101187] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4fa7/0x5450
[   27.101676] Read of size 8 at addr ffff8881028c7730 by task kunit_try_catch/272
[   27.102184] 
[   27.102434] CPU: 0 UID: 0 PID: 272 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241126 #1
[   27.103351] Tainted: [B]=BAD_PAGE, [N]=TEST
[   27.103829] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   27.104393] Call Trace:
[   27.104779]  <TASK>
[   27.105008]  dump_stack_lvl+0x73/0xb0
[   27.105377]  print_report+0xd1/0x640
[   27.105879]  ? __virt_addr_valid+0x1db/0x2d0
[   27.106295]  ? kasan_complete_mode_report_info+0x2a/0x200
[   27.106831]  kasan_report+0x102/0x140
[   27.107134]  ? kasan_atomics_helper+0x4fa7/0x5450
[   27.107661]  ? kasan_atomics_helper+0x4fa7/0x5450
[   27.108178]  __asan_report_load8_noabort+0x18/0x20
[   27.108531]  kasan_atomics_helper+0x4fa7/0x5450
[   27.109037]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   27.109562]  ? __kmalloc_cache_noprof+0x184/0x410
[   27.110098]  ? trace_hardirqs_on+0x37/0xe0
[   27.110417]  ? kasan_atomics+0x153/0x310
[   27.110801]  kasan_atomics+0x1dd/0x310
[   27.111230]  ? __pfx_kasan_atomics+0x10/0x10
[   27.111747]  ? __pfx_kasan_atomics+0x10/0x10
[   27.112221]  kunit_try_run_case+0x1b3/0x490
[   27.112741]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.113213]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   27.113765]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   27.114132]  ? __kthread_parkme+0x82/0x160
[   27.114637]  ? preempt_count_sub+0x50/0x80
[   27.114975]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.115650]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   27.116148]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.117104]  kthread+0x257/0x310
[   27.117386]  ? __pfx_kthread+0x10/0x10
[   27.117753]  ret_from_fork+0x41/0x80
[   27.118037]  ? __pfx_kthread+0x10/0x10
[   27.118342]  ret_from_fork_asm+0x1a/0x30
[   27.119867]  </TASK>
[   27.120161] 
[   27.120380] Allocated by task 272:
[   27.120779]  kasan_save_stack+0x3d/0x60
[   27.121200]  kasan_save_track+0x18/0x40
[   27.122215]  kasan_save_alloc_info+0x3b/0x50
[   27.122875]  __kasan_kmalloc+0xb7/0xc0
[   27.123338]  __kmalloc_cache_noprof+0x184/0x410
[   27.123904]  kasan_atomics+0x96/0x310
[   27.125002]  kunit_try_run_case+0x1b3/0x490
[   27.125514]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.126699]  kthread+0x257/0x310
[   27.127080]  ret_from_fork+0x41/0x80
[   27.127468]  ret_from_fork_asm+0x1a/0x30
[   27.128285] 
[   27.128545] The buggy address belongs to the object at ffff8881028c7700
[   27.128545]  which belongs to the cache kmalloc-64 of size 64
[   27.129856] The buggy address is located 0 bytes to the right of
[   27.129856]  allocated 48-byte region [ffff8881028c7700, ffff8881028c7730)
[   27.130661] 
[   27.130894] The buggy address belongs to the physical page:
[   27.131291] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1028c7
[   27.131978] flags: 0x200000000000000(node=0|zone=2)
[   27.132416] page_type: f5(slab)
[   27.132725] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   27.133395] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   27.134033] page dumped because: kasan: bad access detected
[   27.134535] 
[   27.134800] Memory state around the buggy address:
[   27.135218]  ffff8881028c7600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.135825]  ffff8881028c7680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.136232] >ffff8881028c7700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   27.136756]                                      ^
[   27.137221]  ffff8881028c7780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.137923]  ffff8881028c7800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.138450] ==================================================================
[   25.247636] ==================================================================
[   25.248455] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xc71/0x5450
[   25.249162] Write of size 4 at addr ffff8881028c7730 by task kunit_try_catch/272
[   25.249820] 
[   25.250067] CPU: 0 UID: 0 PID: 272 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241126 #1
[   25.251976] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.252236] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   25.252683] Call Trace:
[   25.252873]  <TASK>
[   25.253054]  dump_stack_lvl+0x73/0xb0
[   25.253554]  print_report+0xd1/0x640
[   25.253997]  ? __virt_addr_valid+0x1db/0x2d0
[   25.254402]  ? kasan_complete_mode_report_info+0x2a/0x200
[   25.254822]  kasan_report+0x102/0x140
[   25.255112]  ? kasan_atomics_helper+0xc71/0x5450
[   25.255506]  ? kasan_atomics_helper+0xc71/0x5450
[   25.256077]  kasan_check_range+0x10c/0x1c0
[   25.256539]  __kasan_check_write+0x18/0x20
[   25.257026]  kasan_atomics_helper+0xc71/0x5450
[   25.257539]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   25.258113]  ? __kmalloc_cache_noprof+0x184/0x410
[   25.258666]  ? trace_hardirqs_on+0x37/0xe0
[   25.259123]  ? kasan_atomics+0x153/0x310
[   25.259634]  kasan_atomics+0x1dd/0x310
[   25.259967]  ? __pfx_kasan_atomics+0x10/0x10
[   25.260281]  ? __pfx_kasan_atomics+0x10/0x10
[   25.260821]  kunit_try_run_case+0x1b3/0x490
[   25.261293]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.261852]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   25.262309]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   25.262759]  ? __kthread_parkme+0x82/0x160
[   25.263204]  ? preempt_count_sub+0x50/0x80
[   25.263724]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.264132]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   25.264652]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.265122]  kthread+0x257/0x310
[   25.265620]  ? __pfx_kthread+0x10/0x10
[   25.266073]  ret_from_fork+0x41/0x80
[   25.266505]  ? __pfx_kthread+0x10/0x10
[   25.266836]  ret_from_fork_asm+0x1a/0x30
[   25.267154]  </TASK>
[   25.267352] 
[   25.267535] Allocated by task 272:
[   25.267957]  kasan_save_stack+0x3d/0x60
[   25.268381]  kasan_save_track+0x18/0x40
[   25.268862]  kasan_save_alloc_info+0x3b/0x50
[   25.269328]  __kasan_kmalloc+0xb7/0xc0
[   25.269801]  __kmalloc_cache_noprof+0x184/0x410
[   25.270283]  kasan_atomics+0x96/0x310
[   25.270753]  kunit_try_run_case+0x1b3/0x490
[   25.271191]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.271702]  kthread+0x257/0x310
[   25.272085]  ret_from_fork+0x41/0x80
[   25.272383]  ret_from_fork_asm+0x1a/0x30
[   25.272875] 
[   25.273068] The buggy address belongs to the object at ffff8881028c7700
[   25.273068]  which belongs to the cache kmalloc-64 of size 64
[   25.273842] The buggy address is located 0 bytes to the right of
[   25.273842]  allocated 48-byte region [ffff8881028c7700, ffff8881028c7730)
[   25.274444] 
[   25.274757] The buggy address belongs to the physical page:
[   25.275316] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1028c7
[   25.276063] flags: 0x200000000000000(node=0|zone=2)
[   25.276611] page_type: f5(slab)
[   25.276984] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   25.277731] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   25.278299] page dumped because: kasan: bad access detected
[   25.278856] 
[   25.279032] Memory state around the buggy address:
[   25.279467]  ffff8881028c7600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.280016]  ffff8881028c7680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.280806] >ffff8881028c7700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   25.281221]                                      ^
[   25.281760]  ffff8881028c7780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.282272]  ffff8881028c7800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.282895] ==================================================================
[   26.006993] ==================================================================
[   26.007794] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1468/0x5450
[   26.008206] Write of size 8 at addr ffff8881028c7730 by task kunit_try_catch/272
[   26.008865] 
[   26.009061] CPU: 0 UID: 0 PID: 272 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241126 #1
[   26.010714] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.011232] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   26.012064] Call Trace:
[   26.012334]  <TASK>
[   26.012623]  dump_stack_lvl+0x73/0xb0
[   26.012996]  print_report+0xd1/0x640
[   26.013359]  ? __virt_addr_valid+0x1db/0x2d0
[   26.014409]  ? kasan_complete_mode_report_info+0x2a/0x200
[   26.015161]  kasan_report+0x102/0x140
[   26.015792]  ? kasan_atomics_helper+0x1468/0x5450
[   26.016409]  ? kasan_atomics_helper+0x1468/0x5450
[   26.017111]  kasan_check_range+0x10c/0x1c0
[   26.017727]  __kasan_check_write+0x18/0x20
[   26.018330]  kasan_atomics_helper+0x1468/0x5450
[   26.018872]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   26.019283]  ? __kmalloc_cache_noprof+0x184/0x410
[   26.019738]  ? trace_hardirqs_on+0x37/0xe0
[   26.020149]  ? kasan_atomics+0x153/0x310
[   26.021192]  kasan_atomics+0x1dd/0x310
[   26.021570]  ? __pfx_kasan_atomics+0x10/0x10
[   26.022201]  ? __pfx_kasan_atomics+0x10/0x10
[   26.022891]  kunit_try_run_case+0x1b3/0x490
[   26.023506]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.024202]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   26.024807]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   26.025512]  ? __kthread_parkme+0x82/0x160
[   26.025856]  ? preempt_count_sub+0x50/0x80
[   26.026281]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.027148]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   26.027844]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.028523]  kthread+0x257/0x310
[   26.029129]  ? __pfx_kthread+0x10/0x10
[   26.029517]  ret_from_fork+0x41/0x80
[   26.030194]  ? __pfx_kthread+0x10/0x10
[   26.030912]  ret_from_fork_asm+0x1a/0x30
[   26.031354]  </TASK>
[   26.031593] 
[   26.031810] Allocated by task 272:
[   26.032109]  kasan_save_stack+0x3d/0x60
[   26.033195]  kasan_save_track+0x18/0x40
[   26.033579]  kasan_save_alloc_info+0x3b/0x50
[   26.034318]  __kasan_kmalloc+0xb7/0xc0
[   26.034646]  __kmalloc_cache_noprof+0x184/0x410
[   26.035120]  kasan_atomics+0x96/0x310
[   26.036048]  kunit_try_run_case+0x1b3/0x490
[   26.036443]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.037111]  kthread+0x257/0x310
[   26.037663]  ret_from_fork+0x41/0x80
[   26.037941]  ret_from_fork_asm+0x1a/0x30
[   26.038475] 
[   26.038719] The buggy address belongs to the object at ffff8881028c7700
[   26.038719]  which belongs to the cache kmalloc-64 of size 64
[   26.039723] The buggy address is located 0 bytes to the right of
[   26.039723]  allocated 48-byte region [ffff8881028c7700, ffff8881028c7730)
[   26.041304] 
[   26.041452] The buggy address belongs to the physical page:
[   26.042146] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1028c7
[   26.043608] flags: 0x200000000000000(node=0|zone=2)
[   26.044176] page_type: f5(slab)
[   26.044544] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   26.045455] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   26.046006] page dumped because: kasan: bad access detected
[   26.046250] 
[   26.046341] Memory state around the buggy address:
[   26.046539]  ffff8881028c7600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.046913]  ffff8881028c7680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.047625] >ffff8881028c7700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   26.048426]                                      ^
[   26.049192]  ffff8881028c7780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.050010]  ffff8881028c7800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.050600] ==================================================================
[   25.441720] ==================================================================
[   25.442446] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf11/0x5450
[   25.444208] Write of size 4 at addr ffff8881028c7730 by task kunit_try_catch/272
[   25.445414] 
[   25.445740] CPU: 0 UID: 0 PID: 272 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241126 #1
[   25.446653] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.447075] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   25.447854] Call Trace:
[   25.448083]  <TASK>
[   25.448373]  dump_stack_lvl+0x73/0xb0
[   25.448740]  print_report+0xd1/0x640
[   25.449148]  ? __virt_addr_valid+0x1db/0x2d0
[   25.449646]  ? kasan_complete_mode_report_info+0x2a/0x200
[   25.450115]  kasan_report+0x102/0x140
[   25.450559]  ? kasan_atomics_helper+0xf11/0x5450
[   25.451069]  ? kasan_atomics_helper+0xf11/0x5450
[   25.451422]  kasan_check_range+0x10c/0x1c0
[   25.451948]  __kasan_check_write+0x18/0x20
[   25.452311]  kasan_atomics_helper+0xf11/0x5450
[   25.452820]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   25.453308]  ? __kmalloc_cache_noprof+0x184/0x410
[   25.453718]  ? trace_hardirqs_on+0x37/0xe0
[   25.454157]  ? kasan_atomics+0x153/0x310
[   25.454672]  kasan_atomics+0x1dd/0x310
[   25.455039]  ? __pfx_kasan_atomics+0x10/0x10
[   25.455391]  ? __pfx_kasan_atomics+0x10/0x10
[   25.455782]  kunit_try_run_case+0x1b3/0x490
[   25.456100]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.456421]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   25.456980]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   25.457522]  ? __kthread_parkme+0x82/0x160
[   25.458019]  ? preempt_count_sub+0x50/0x80
[   25.458512]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.459052]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   25.459711]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.460253]  kthread+0x257/0x310
[   25.460700]  ? __pfx_kthread+0x10/0x10
[   25.461136]  ret_from_fork+0x41/0x80
[   25.461569]  ? __pfx_kthread+0x10/0x10
[   25.462050]  ret_from_fork_asm+0x1a/0x30
[   25.462523]  </TASK>
[   25.462850] 
[   25.463077] Allocated by task 272:
[   25.463327]  kasan_save_stack+0x3d/0x60
[   25.463688]  kasan_save_track+0x18/0x40
[   25.464092]  kasan_save_alloc_info+0x3b/0x50
[   25.464609]  __kasan_kmalloc+0xb7/0xc0
[   25.465023]  __kmalloc_cache_noprof+0x184/0x410
[   25.465547]  kasan_atomics+0x96/0x310
[   25.466001]  kunit_try_run_case+0x1b3/0x490
[   25.466461]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.466939]  kthread+0x257/0x310
[   25.467308]  ret_from_fork+0x41/0x80
[   25.467646]  ret_from_fork_asm+0x1a/0x30
[   25.467940] 
[   25.468104] The buggy address belongs to the object at ffff8881028c7700
[   25.468104]  which belongs to the cache kmalloc-64 of size 64
[   25.468855] The buggy address is located 0 bytes to the right of
[   25.468855]  allocated 48-byte region [ffff8881028c7700, ffff8881028c7730)
[   25.469967] 
[   25.470215] The buggy address belongs to the physical page:
[   25.470797] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1028c7
[   25.471471] flags: 0x200000000000000(node=0|zone=2)
[   25.472013] page_type: f5(slab)
[   25.472325] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   25.472974] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   25.473417] page dumped because: kasan: bad access detected
[   25.473960] 
[   25.474138] Memory state around the buggy address:
[   25.474418]  ffff8881028c7600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.475117]  ffff8881028c7680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.475842] >ffff8881028c7700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   25.476387]                                      ^
[   25.476759]  ffff8881028c7780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.477136]  ffff8881028c7800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.477658] ==================================================================
[   24.948340] ==================================================================
[   24.949104] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x7c8/0x5450
[   24.949788] Write of size 4 at addr ffff8881028c7730 by task kunit_try_catch/272
[   24.950194] 
[   24.950444] CPU: 0 UID: 0 PID: 272 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241126 #1
[   24.951350] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.951887] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   24.952271] Call Trace:
[   24.952780]  <TASK>
[   24.953039]  dump_stack_lvl+0x73/0xb0
[   24.953414]  print_report+0xd1/0x640
[   24.953784]  ? __virt_addr_valid+0x1db/0x2d0
[   24.954169]  ? kasan_complete_mode_report_info+0x2a/0x200
[   24.954778]  kasan_report+0x102/0x140
[   24.955205]  ? kasan_atomics_helper+0x7c8/0x5450
[   24.955759]  ? kasan_atomics_helper+0x7c8/0x5450
[   24.956267]  kasan_check_range+0x10c/0x1c0
[   24.956772]  __kasan_check_write+0x18/0x20
[   24.957108]  kasan_atomics_helper+0x7c8/0x5450
[   24.957568]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   24.957952]  ? __kmalloc_cache_noprof+0x184/0x410
[   24.958296]  ? trace_hardirqs_on+0x37/0xe0
[   24.958730]  ? kasan_atomics+0x153/0x310
[   24.959179]  kasan_atomics+0x1dd/0x310
[   24.959691]  ? __pfx_kasan_atomics+0x10/0x10
[   24.960171]  ? __pfx_kasan_atomics+0x10/0x10
[   24.960721]  kunit_try_run_case+0x1b3/0x490
[   24.961193]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.961537]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   24.961992]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   24.962543]  ? __kthread_parkme+0x82/0x160
[   24.963035]  ? preempt_count_sub+0x50/0x80
[   24.963520]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.964053]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   24.964419]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.965037]  kthread+0x257/0x310
[   24.965473]  ? __pfx_kthread+0x10/0x10
[   24.965966]  ret_from_fork+0x41/0x80
[   24.966382]  ? __pfx_kthread+0x10/0x10
[   24.966819]  ret_from_fork_asm+0x1a/0x30
[   24.967149]  </TASK>
[   24.967342] 
[   24.967569] Allocated by task 272:
[   24.967970]  kasan_save_stack+0x3d/0x60
[   24.968398]  kasan_save_track+0x18/0x40
[   24.968888]  kasan_save_alloc_info+0x3b/0x50
[   24.969268]  __kasan_kmalloc+0xb7/0xc0
[   24.969567]  __kmalloc_cache_noprof+0x184/0x410
[   24.970100]  kasan_atomics+0x96/0x310
[   24.970526]  kunit_try_run_case+0x1b3/0x490
[   24.971026]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.971472]  kthread+0x257/0x310
[   24.971800]  ret_from_fork+0x41/0x80
[   24.972077]  ret_from_fork_asm+0x1a/0x30
[   24.972359] 
[   24.972932] The buggy address belongs to the object at ffff8881028c7700
[   24.972932]  which belongs to the cache kmalloc-64 of size 64
[   24.974643] The buggy address is located 0 bytes to the right of
[   24.974643]  allocated 48-byte region [ffff8881028c7700, ffff8881028c7730)
[   24.976899] 
[   24.977785] The buggy address belongs to the physical page:
[   24.978937] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1028c7
[   24.980384] flags: 0x200000000000000(node=0|zone=2)
[   24.981319] page_type: f5(slab)
[   24.982104] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   24.982533] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   24.983986] page dumped because: kasan: bad access detected
[   24.984476] 
[   24.984641] Memory state around the buggy address:
[   24.985040]  ffff8881028c7600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.985752]  ffff8881028c7680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.986348] >ffff8881028c7700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   24.986914]                                      ^
[   24.987421]  ffff8881028c7780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.987924]  ffff8881028c7800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.988597] ==================================================================
[   25.205905] ==================================================================
[   25.206677] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xb6b/0x5450
[   25.207175] Write of size 4 at addr ffff8881028c7730 by task kunit_try_catch/272
[   25.207930] 
[   25.208129] CPU: 0 UID: 0 PID: 272 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241126 #1
[   25.209214] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.209561] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   25.210251] Call Trace:
[   25.210531]  <TASK>
[   25.210872]  dump_stack_lvl+0x73/0xb0
[   25.211288]  print_report+0xd1/0x640
[   25.211667]  ? __virt_addr_valid+0x1db/0x2d0
[   25.211991]  ? kasan_complete_mode_report_info+0x2a/0x200
[   25.212557]  kasan_report+0x102/0x140
[   25.213132]  ? kasan_atomics_helper+0xb6b/0x5450
[   25.216027]  ? kasan_atomics_helper+0xb6b/0x5450
[   25.216529]  kasan_check_range+0x10c/0x1c0
[   25.216845]  __kasan_check_write+0x18/0x20
[   25.217135]  kasan_atomics_helper+0xb6b/0x5450
[   25.217439]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   25.218030]  ? __kmalloc_cache_noprof+0x184/0x410
[   25.218560]  ? trace_hardirqs_on+0x37/0xe0
[   25.220202]  ? kasan_atomics+0x153/0x310
[   25.221071]  kasan_atomics+0x1dd/0x310
[   25.221541]  ? __pfx_kasan_atomics+0x10/0x10
[   25.222798]  ? __pfx_kasan_atomics+0x10/0x10
[   25.223658]  kunit_try_run_case+0x1b3/0x490
[   25.224226]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.224793]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   25.225337]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   25.225871]  ? __kthread_parkme+0x82/0x160
[   25.226187]  ? preempt_count_sub+0x50/0x80
[   25.226707]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.227202]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   25.227819]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.228168]  kthread+0x257/0x310
[   25.228902]  ? __pfx_kthread+0x10/0x10
[   25.229343]  ret_from_fork+0x41/0x80
[   25.229828]  ? __pfx_kthread+0x10/0x10
[   25.230270]  ret_from_fork_asm+0x1a/0x30
[   25.230657]  </TASK>
[   25.230960] 
[   25.231184] Allocated by task 272:
[   25.231460]  kasan_save_stack+0x3d/0x60
[   25.231817]  kasan_save_track+0x18/0x40
[   25.232246]  kasan_save_alloc_info+0x3b/0x50
[   25.232758]  __kasan_kmalloc+0xb7/0xc0
[   25.233182]  __kmalloc_cache_noprof+0x184/0x410
[   25.233699]  kasan_atomics+0x96/0x310
[   25.234037]  kunit_try_run_case+0x1b3/0x490
[   25.234518]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.235042]  kthread+0x257/0x310
[   25.235466]  ret_from_fork+0x41/0x80
[   25.235845]  ret_from_fork_asm+0x1a/0x30
[   25.236281] 
[   25.236473] The buggy address belongs to the object at ffff8881028c7700
[   25.236473]  which belongs to the cache kmalloc-64 of size 64
[   25.237095] The buggy address is located 0 bytes to the right of
[   25.237095]  allocated 48-byte region [ffff8881028c7700, ffff8881028c7730)
[   25.238123] 
[   25.238360] The buggy address belongs to the physical page:
[   25.238938] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1028c7
[   25.239704] flags: 0x200000000000000(node=0|zone=2)
[   25.240115] page_type: f5(slab)
[   25.240433] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   25.241063] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   25.241447] page dumped because: kasan: bad access detected
[   25.242003] 
[   25.242243] Memory state around the buggy address:
[   25.242779]  ffff8881028c7600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.243362]  ffff8881028c7680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.243817] >ffff8881028c7700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   25.244191]                                      ^
[   25.244643]  ffff8881028c7780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.245324]  ffff8881028c7800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.246028] ==================================================================
[   24.991391] ==================================================================
[   24.992564] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x861/0x5450
[   24.993529] Write of size 4 at addr ffff8881028c7730 by task kunit_try_catch/272
[   24.994034] 
[   24.994302] CPU: 0 UID: 0 PID: 272 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241126 #1
[   24.995324] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.996335] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   24.996979] Call Trace:
[   24.997318]  <TASK>
[   24.997644]  dump_stack_lvl+0x73/0xb0
[   24.998050]  print_report+0xd1/0x640
[   24.998505]  ? __virt_addr_valid+0x1db/0x2d0
[   24.998986]  ? kasan_complete_mode_report_info+0x2a/0x200
[   24.999582]  kasan_report+0x102/0x140
[   24.999879]  ? kasan_atomics_helper+0x861/0x5450
[   25.000401]  ? kasan_atomics_helper+0x861/0x5450
[   25.001246]  kasan_check_range+0x10c/0x1c0
[   25.001779]  __kasan_check_write+0x18/0x20
[   25.002101]  kasan_atomics_helper+0x861/0x5450
[   25.003268]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   25.003621]  ? __kmalloc_cache_noprof+0x184/0x410
[   25.004502]  ? trace_hardirqs_on+0x37/0xe0
[   25.005098]  ? kasan_atomics+0x153/0x310
[   25.005780]  kasan_atomics+0x1dd/0x310
[   25.006163]  ? __pfx_kasan_atomics+0x10/0x10
[   25.006563]  ? __pfx_kasan_atomics+0x10/0x10
[   25.006968]  kunit_try_run_case+0x1b3/0x490
[   25.007342]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.007886]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   25.008274]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   25.008938]  ? __kthread_parkme+0x82/0x160
[   25.009316]  ? preempt_count_sub+0x50/0x80
[   25.009892]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.010411]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   25.010860]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.011628]  kthread+0x257/0x310
[   25.012116]  ? __pfx_kthread+0x10/0x10
[   25.012571]  ret_from_fork+0x41/0x80
[   25.013118]  ? __pfx_kthread+0x10/0x10
[   25.013633]  ret_from_fork_asm+0x1a/0x30
[   25.014209]  </TASK>
[   25.014523] 
[   25.014798] Allocated by task 272:
[   25.015068]  kasan_save_stack+0x3d/0x60
[   25.015637]  kasan_save_track+0x18/0x40
[   25.016144]  kasan_save_alloc_info+0x3b/0x50
[   25.016691]  __kasan_kmalloc+0xb7/0xc0
[   25.017142]  __kmalloc_cache_noprof+0x184/0x410
[   25.017606]  kasan_atomics+0x96/0x310
[   25.018123]  kunit_try_run_case+0x1b3/0x490
[   25.018669]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.019176]  kthread+0x257/0x310
[   25.019548]  ret_from_fork+0x41/0x80
[   25.020090]  ret_from_fork_asm+0x1a/0x30
[   25.020562] 
[   25.020889] The buggy address belongs to the object at ffff8881028c7700
[   25.020889]  which belongs to the cache kmalloc-64 of size 64
[   25.021699] The buggy address is located 0 bytes to the right of
[   25.021699]  allocated 48-byte region [ffff8881028c7700, ffff8881028c7730)
[   25.022734] 
[   25.022976] The buggy address belongs to the physical page:
[   25.023511] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1028c7
[   25.024235] flags: 0x200000000000000(node=0|zone=2)
[   25.024864] page_type: f5(slab)
[   25.025276] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   25.025977] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   25.026811] page dumped because: kasan: bad access detected
[   25.027318] 
[   25.027878] Memory state around the buggy address:
[   25.028983]  ffff8881028c7600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.029526]  ffff8881028c7680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.030114] >ffff8881028c7700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   25.030560]                                      ^
[   25.030901]  ffff8881028c7780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.031592]  ffff8881028c7800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.032403] ==================================================================
[   25.403356] ==================================================================
[   25.404160] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xe79/0x5450
[   25.405508] Write of size 4 at addr ffff8881028c7730 by task kunit_try_catch/272
[   25.406392] 
[   25.406718] CPU: 0 UID: 0 PID: 272 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241126 #1
[   25.407468] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.407954] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   25.408649] Call Trace:
[   25.408953]  <TASK>
[   25.409219]  dump_stack_lvl+0x73/0xb0
[   25.409665]  print_report+0xd1/0x640
[   25.410105]  ? __virt_addr_valid+0x1db/0x2d0
[   25.410638]  ? kasan_complete_mode_report_info+0x2a/0x200
[   25.411188]  kasan_report+0x102/0x140
[   25.411674]  ? kasan_atomics_helper+0xe79/0x5450
[   25.412174]  ? kasan_atomics_helper+0xe79/0x5450
[   25.412768]  kasan_check_range+0x10c/0x1c0
[   25.413281]  __kasan_check_write+0x18/0x20
[   25.413810]  kasan_atomics_helper+0xe79/0x5450
[   25.414361]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   25.414975]  ? __kmalloc_cache_noprof+0x184/0x410
[   25.415522]  ? trace_hardirqs_on+0x37/0xe0
[   25.415872]  ? kasan_atomics+0x153/0x310
[   25.416175]  kasan_atomics+0x1dd/0x310
[   25.416510]  ? __pfx_kasan_atomics+0x10/0x10
[   25.416842]  ? __pfx_kasan_atomics+0x10/0x10
[   25.417164]  kunit_try_run_case+0x1b3/0x490
[   25.417560]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.418101]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   25.418645]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   25.419171]  ? __kthread_parkme+0x82/0x160
[   25.419668]  ? preempt_count_sub+0x50/0x80
[   25.420031]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.420530]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   25.420973]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.421328]  kthread+0x257/0x310
[   25.421743]  ? __pfx_kthread+0x10/0x10
[   25.422164]  ret_from_fork+0x41/0x80
[   25.422643]  ? __pfx_kthread+0x10/0x10
[   25.423073]  ret_from_fork_asm+0x1a/0x30
[   25.423560]  </TASK>
[   25.423817] 
[   25.423979] Allocated by task 272:
[   25.424215]  kasan_save_stack+0x3d/0x60
[   25.424709]  kasan_save_track+0x18/0x40
[   25.425121]  kasan_save_alloc_info+0x3b/0x50
[   25.425658]  __kasan_kmalloc+0xb7/0xc0
[   25.426098]  __kmalloc_cache_noprof+0x184/0x410
[   25.426618]  kasan_atomics+0x96/0x310
[   25.427028]  kunit_try_run_case+0x1b3/0x490
[   25.427333]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.427892]  kthread+0x257/0x310
[   25.428262]  ret_from_fork+0x41/0x80
[   25.428739]  ret_from_fork_asm+0x1a/0x30
[   25.429044] 
[   25.429214] The buggy address belongs to the object at ffff8881028c7700
[   25.429214]  which belongs to the cache kmalloc-64 of size 64
[   25.429848] The buggy address is located 0 bytes to the right of
[   25.429848]  allocated 48-byte region [ffff8881028c7700, ffff8881028c7730)
[   25.430450] 
[   25.430756] The buggy address belongs to the physical page:
[   25.431274] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1028c7
[   25.432022] flags: 0x200000000000000(node=0|zone=2)
[   25.432515] page_type: f5(slab)
[   25.432928] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   25.433657] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   25.434241] page dumped because: kasan: bad access detected
[   25.434738] 
[   25.434969] Memory state around the buggy address:
[   25.435348]  ffff8881028c7600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.437864]  ffff8881028c7680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.438264] >ffff8881028c7700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   25.438661]                                      ^
[   25.438957]  ffff8881028c7780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.439332]  ffff8881028c7800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.439984] ==================================================================
[   24.905564] ==================================================================
[   24.907235] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x730/0x5450
[   24.908282] Write of size 4 at addr ffff8881028c7730 by task kunit_try_catch/272
[   24.909104] 
[   24.909304] CPU: 0 UID: 0 PID: 272 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241126 #1
[   24.913133] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.913639] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   24.914537] Call Trace:
[   24.914948]  <TASK>
[   24.915306]  dump_stack_lvl+0x73/0xb0
[   24.915850]  print_report+0xd1/0x640
[   24.916316]  ? __virt_addr_valid+0x1db/0x2d0
[   24.916897]  ? kasan_complete_mode_report_info+0x2a/0x200
[   24.917371]  kasan_report+0x102/0x140
[   24.917821]  ? kasan_atomics_helper+0x730/0x5450
[   24.918402]  ? kasan_atomics_helper+0x730/0x5450
[   24.919065]  kasan_check_range+0x10c/0x1c0
[   24.919659]  __kasan_check_write+0x18/0x20
[   24.920198]  kasan_atomics_helper+0x730/0x5450
[   24.920807]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   24.921375]  ? __kmalloc_cache_noprof+0x184/0x410
[   24.921983]  ? trace_hardirqs_on+0x37/0xe0
[   24.922343]  ? kasan_atomics+0x153/0x310
[   24.922694]  kasan_atomics+0x1dd/0x310
[   24.923041]  ? __pfx_kasan_atomics+0x10/0x10
[   24.923560]  ? __pfx_kasan_atomics+0x10/0x10
[   24.924020]  kunit_try_run_case+0x1b3/0x490
[   24.924337]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.924809]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   24.925395]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   24.926023]  ? __kthread_parkme+0x82/0x160
[   24.926546]  ? preempt_count_sub+0x50/0x80
[   24.927091]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.927695]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   24.928348]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.929013]  kthread+0x257/0x310
[   24.929455]  ? __pfx_kthread+0x10/0x10
[   24.929978]  ret_from_fork+0x41/0x80
[   24.930440]  ? __pfx_kthread+0x10/0x10
[   24.930965]  ret_from_fork_asm+0x1a/0x30
[   24.931474]  </TASK>
[   24.931856] 
[   24.932096] Allocated by task 272:
[   24.932515]  kasan_save_stack+0x3d/0x60
[   24.933019]  kasan_save_track+0x18/0x40
[   24.933478]  kasan_save_alloc_info+0x3b/0x50
[   24.934031]  __kasan_kmalloc+0xb7/0xc0
[   24.934520]  __kmalloc_cache_noprof+0x184/0x410
[   24.934913]  kasan_atomics+0x96/0x310
[   24.935188]  kunit_try_run_case+0x1b3/0x490
[   24.935587]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.936026]  kthread+0x257/0x310
[   24.936386]  ret_from_fork+0x41/0x80
[   24.936718]  ret_from_fork_asm+0x1a/0x30
[   24.937003] 
[   24.937226] The buggy address belongs to the object at ffff8881028c7700
[   24.937226]  which belongs to the cache kmalloc-64 of size 64
[   24.938183] The buggy address is located 0 bytes to the right of
[   24.938183]  allocated 48-byte region [ffff8881028c7700, ffff8881028c7730)
[   24.939116] 
[   24.939294] The buggy address belongs to the physical page:
[   24.939870] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1028c7
[   24.940322] flags: 0x200000000000000(node=0|zone=2)
[   24.940873] page_type: f5(slab)
[   24.941236] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   24.941715] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   24.942388] page dumped because: kasan: bad access detected
[   24.942960] 
[   24.943180] Memory state around the buggy address:
[   24.943612]  ffff8881028c7600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.944060]  ffff8881028c7680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.944677] >ffff8881028c7700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   24.945247]                                      ^
[   24.945622]  ffff8881028c7780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.946255]  ffff8881028c7800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.946956] ==================================================================
[   26.555922] ==================================================================
[   26.556663] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1c19/0x5450
[   26.557349] Write of size 8 at addr ffff8881028c7730 by task kunit_try_catch/272
[   26.557933] 
[   26.558212] CPU: 0 UID: 0 PID: 272 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241126 #1
[   26.559048] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.559312] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   26.560140] Call Trace:
[   26.560572]  <TASK>
[   26.561041]  dump_stack_lvl+0x73/0xb0
[   26.561441]  print_report+0xd1/0x640
[   26.561776]  ? __virt_addr_valid+0x1db/0x2d0
[   26.562263]  ? kasan_complete_mode_report_info+0x2a/0x200
[   26.562897]  kasan_report+0x102/0x140
[   26.563235]  ? kasan_atomics_helper+0x1c19/0x5450
[   26.563624]  ? kasan_atomics_helper+0x1c19/0x5450
[   26.564061]  kasan_check_range+0x10c/0x1c0
[   26.564560]  __kasan_check_write+0x18/0x20
[   26.565058]  kasan_atomics_helper+0x1c19/0x5450
[   26.565653]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   26.566216]  ? __kmalloc_cache_noprof+0x184/0x410
[   26.566784]  ? trace_hardirqs_on+0x37/0xe0
[   26.567193]  ? kasan_atomics+0x153/0x310
[   26.567746]  kasan_atomics+0x1dd/0x310
[   26.568184]  ? __pfx_kasan_atomics+0x10/0x10
[   26.568727]  ? __pfx_kasan_atomics+0x10/0x10
[   26.569138]  kunit_try_run_case+0x1b3/0x490
[   26.569701]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.570058]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   26.570654]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   26.571099]  ? __kthread_parkme+0x82/0x160
[   26.571558]  ? preempt_count_sub+0x50/0x80
[   26.572063]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.572476]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   26.572925]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.573282]  kthread+0x257/0x310
[   26.573622]  ? __pfx_kthread+0x10/0x10
[   26.574118]  ret_from_fork+0x41/0x80
[   26.574561]  ? __pfx_kthread+0x10/0x10
[   26.575039]  ret_from_fork_asm+0x1a/0x30
[   26.575565]  </TASK>
[   26.575912] 
[   26.576189] Allocated by task 272:
[   26.576648]  kasan_save_stack+0x3d/0x60
[   26.577102]  kasan_save_track+0x18/0x40
[   26.577652]  kasan_save_alloc_info+0x3b/0x50
[   26.578138]  __kasan_kmalloc+0xb7/0xc0
[   26.578416]  __kmalloc_cache_noprof+0x184/0x410
[   26.578976]  kasan_atomics+0x96/0x310
[   26.579439]  kunit_try_run_case+0x1b3/0x490
[   26.579955]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.580291]  kthread+0x257/0x310
[   26.580628]  ret_from_fork+0x41/0x80
[   26.581073]  ret_from_fork_asm+0x1a/0x30
[   26.581521] 
[   26.581831] The buggy address belongs to the object at ffff8881028c7700
[   26.581831]  which belongs to the cache kmalloc-64 of size 64
[   26.582876] The buggy address is located 0 bytes to the right of
[   26.582876]  allocated 48-byte region [ffff8881028c7700, ffff8881028c7730)
[   26.583474] 
[   26.583780] The buggy address belongs to the physical page:
[   26.584297] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1028c7
[   26.585088] flags: 0x200000000000000(node=0|zone=2)
[   26.585659] page_type: f5(slab)
[   26.586026] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   26.586749] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   26.587317] page dumped because: kasan: bad access detected
[   26.587828] 
[   26.587993] Memory state around the buggy address:
[   26.588271]  ffff8881028c7600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.588867]  ffff8881028c7680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.589638] >ffff8881028c7700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   26.590332]                                      ^
[   26.590906]  ffff8881028c7780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.591471]  ffff8881028c7800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.591982] ==================================================================
[   25.685926] ==================================================================
[   25.686294] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a04/0x5450
[   25.687216] Read of size 4 at addr ffff8881028c7730 by task kunit_try_catch/272
[   25.689957] 
[   25.690263] CPU: 0 UID: 0 PID: 272 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241126 #1
[   25.691459] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.692280] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   25.694152] Call Trace:
[   25.694499]  <TASK>
[   25.694814]  dump_stack_lvl+0x73/0xb0
[   25.695291]  print_report+0xd1/0x640
[   25.696866]  ? __virt_addr_valid+0x1db/0x2d0
[   25.698141]  ? kasan_complete_mode_report_info+0x2a/0x200
[   25.698866]  kasan_report+0x102/0x140
[   25.699319]  ? kasan_atomics_helper+0x4a04/0x5450
[   25.699867]  ? kasan_atomics_helper+0x4a04/0x5450
[   25.700559]  __asan_report_load4_noabort+0x18/0x20
[   25.701156]  kasan_atomics_helper+0x4a04/0x5450
[   25.701746]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   25.702581]  ? __kmalloc_cache_noprof+0x184/0x410
[   25.702946]  ? trace_hardirqs_on+0x37/0xe0
[   25.703126]  ? kasan_atomics+0x153/0x310
[   25.703291]  kasan_atomics+0x1dd/0x310
[   25.703445]  ? __pfx_kasan_atomics+0x10/0x10
[   25.703877]  ? __pfx_kasan_atomics+0x10/0x10
[   25.704912]  kunit_try_run_case+0x1b3/0x490
[   25.705567]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.706151]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   25.706799]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   25.707401]  ? __kthread_parkme+0x82/0x160
[   25.708003]  ? preempt_count_sub+0x50/0x80
[   25.708523]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.708826]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   25.709407]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.710392]  kthread+0x257/0x310
[   25.711048]  ? __pfx_kthread+0x10/0x10
[   25.711724]  ret_from_fork+0x41/0x80
[   25.712115]  ? __pfx_kthread+0x10/0x10
[   25.712751]  ret_from_fork_asm+0x1a/0x30
[   25.713042]  </TASK>
[   25.713638] 
[   25.713875] Allocated by task 272:
[   25.714428]  kasan_save_stack+0x3d/0x60
[   25.715263]  kasan_save_track+0x18/0x40
[   25.715560]  kasan_save_alloc_info+0x3b/0x50
[   25.716583]  __kasan_kmalloc+0xb7/0xc0
[   25.717118]  __kmalloc_cache_noprof+0x184/0x410
[   25.717562]  kasan_atomics+0x96/0x310
[   25.717941]  kunit_try_run_case+0x1b3/0x490
[   25.718336]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.719474]  kthread+0x257/0x310
[   25.720339]  ret_from_fork+0x41/0x80
[   25.720922]  ret_from_fork_asm+0x1a/0x30
[   25.721759] 
[   25.721956] The buggy address belongs to the object at ffff8881028c7700
[   25.721956]  which belongs to the cache kmalloc-64 of size 64
[   25.723067] The buggy address is located 0 bytes to the right of
[   25.723067]  allocated 48-byte region [ffff8881028c7700, ffff8881028c7730)
[   25.724299] 
[   25.724560] The buggy address belongs to the physical page:
[   25.725474] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1028c7
[   25.726441] flags: 0x200000000000000(node=0|zone=2)
[   25.726880] page_type: f5(slab)
[   25.727257] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   25.727859] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   25.728811] page dumped because: kasan: bad access detected
[   25.729243] 
[   25.729407] Memory state around the buggy address:
[   25.729773]  ffff8881028c7600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.730403]  ffff8881028c7680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.731072] >ffff8881028c7700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   25.732302]                                      ^
[   25.732643]  ffff8881028c7780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.733274]  ffff8881028c7800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.733929] ==================================================================
[   25.033777] ==================================================================
[   25.034826] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x8fa/0x5450
[   25.036110] Write of size 4 at addr ffff8881028c7730 by task kunit_try_catch/272
[   25.036870] 
[   25.037076] CPU: 0 UID: 0 PID: 272 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241126 #1
[   25.037623] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.038082] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   25.038978] Call Trace:
[   25.039253]  <TASK>
[   25.039547]  dump_stack_lvl+0x73/0xb0
[   25.040036]  print_report+0xd1/0x640
[   25.040474]  ? __virt_addr_valid+0x1db/0x2d0
[   25.040991]  ? kasan_complete_mode_report_info+0x2a/0x200
[   25.041436]  kasan_report+0x102/0x140
[   25.041923]  ? kasan_atomics_helper+0x8fa/0x5450
[   25.042422]  ? kasan_atomics_helper+0x8fa/0x5450
[   25.043069]  kasan_check_range+0x10c/0x1c0
[   25.043625]  __kasan_check_write+0x18/0x20
[   25.043943]  kasan_atomics_helper+0x8fa/0x5450
[   25.044260]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   25.044912]  ? __kmalloc_cache_noprof+0x184/0x410
[   25.045457]  ? trace_hardirqs_on+0x37/0xe0
[   25.045983]  ? kasan_atomics+0x153/0x310
[   25.047217]  kasan_atomics+0x1dd/0x310
[   25.047904]  ? __pfx_kasan_atomics+0x10/0x10
[   25.048221]  ? __pfx_kasan_atomics+0x10/0x10
[   25.048567]  kunit_try_run_case+0x1b3/0x490
[   25.049184]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.049873]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   25.050514]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   25.051125]  ? __kthread_parkme+0x82/0x160
[   25.051826]  ? preempt_count_sub+0x50/0x80
[   25.052429]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.053106]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   25.053808]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.054368]  kthread+0x257/0x310
[   25.054847]  ? __pfx_kthread+0x10/0x10
[   25.055297]  ret_from_fork+0x41/0x80
[   25.055789]  ? __pfx_kthread+0x10/0x10
[   25.056157]  ret_from_fork_asm+0x1a/0x30
[   25.056645]  </TASK>
[   25.056960] 
[   25.057224] Allocated by task 272:
[   25.057531]  kasan_save_stack+0x3d/0x60
[   25.057986]  kasan_save_track+0x18/0x40
[   25.058460]  kasan_save_alloc_info+0x3b/0x50
[   25.059318]  __kasan_kmalloc+0xb7/0xc0
[   25.060316]  __kmalloc_cache_noprof+0x184/0x410
[   25.060858]  kasan_atomics+0x96/0x310
[   25.061153]  kunit_try_run_case+0x1b3/0x490
[   25.061447]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.061804]  kthread+0x257/0x310
[   25.062187]  ret_from_fork+0x41/0x80
[   25.062727]  ret_from_fork_asm+0x1a/0x30
[   25.063327] 
[   25.063804] The buggy address belongs to the object at ffff8881028c7700
[   25.063804]  which belongs to the cache kmalloc-64 of size 64
[   25.065736] The buggy address is located 0 bytes to the right of
[   25.065736]  allocated 48-byte region [ffff8881028c7700, ffff8881028c7730)
[   25.066967] 
[   25.067211] The buggy address belongs to the physical page:
[   25.067692] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1028c7
[   25.068566] flags: 0x200000000000000(node=0|zone=2)
[   25.069198] page_type: f5(slab)
[   25.069712] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   25.070554] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   25.071028] page dumped because: kasan: bad access detected
[   25.071522] 
[   25.071845] Memory state around the buggy address:
[   25.072162]  ffff8881028c7600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.072942]  ffff8881028c7680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.073380] >ffff8881028c7700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   25.074258]                                      ^
[   25.074696]  ffff8881028c7780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.075149]  ffff8881028c7800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.076203] ==================================================================
[   25.736524] ==================================================================
[   25.736939] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1218/0x5450
[   25.738680] Write of size 4 at addr ffff8881028c7730 by task kunit_try_catch/272
[   25.739694] 
[   25.740172] CPU: 0 UID: 0 PID: 272 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241126 #1
[   25.741156] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.741445] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   25.742338] Call Trace:
[   25.743283]  <TASK>
[   25.743602]  dump_stack_lvl+0x73/0xb0
[   25.744043]  print_report+0xd1/0x640
[   25.744440]  ? __virt_addr_valid+0x1db/0x2d0
[   25.744808]  ? kasan_complete_mode_report_info+0x2a/0x200
[   25.745160]  kasan_report+0x102/0x140
[   25.746325]  ? kasan_atomics_helper+0x1218/0x5450
[   25.746826]  ? kasan_atomics_helper+0x1218/0x5450
[   25.747274]  kasan_check_range+0x10c/0x1c0
[   25.748696]  __kasan_check_write+0x18/0x20
[   25.749266]  kasan_atomics_helper+0x1218/0x5450
[   25.749704]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   25.750187]  ? __kmalloc_cache_noprof+0x184/0x410
[   25.750659]  ? trace_hardirqs_on+0x37/0xe0
[   25.751080]  ? kasan_atomics+0x153/0x310
[   25.751467]  kasan_atomics+0x1dd/0x310
[   25.752417]  ? __pfx_kasan_atomics+0x10/0x10
[   25.752920]  ? __pfx_kasan_atomics+0x10/0x10
[   25.753576]  kunit_try_run_case+0x1b3/0x490
[   25.754097]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.754551]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   25.755443]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   25.755890]  ? __kthread_parkme+0x82/0x160
[   25.756347]  ? preempt_count_sub+0x50/0x80
[   25.756844]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.757174]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   25.757803]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.758633]  kthread+0x257/0x310
[   25.759070]  ? __pfx_kthread+0x10/0x10
[   25.759513]  ret_from_fork+0x41/0x80
[   25.759929]  ? __pfx_kthread+0x10/0x10
[   25.760296]  ret_from_fork_asm+0x1a/0x30
[   25.761582]  </TASK>
[   25.761979] 
[   25.762576] Allocated by task 272:
[   25.762834]  kasan_save_stack+0x3d/0x60
[   25.763265]  kasan_save_track+0x18/0x40
[   25.763699]  kasan_save_alloc_info+0x3b/0x50
[   25.764194]  __kasan_kmalloc+0xb7/0xc0
[   25.764551]  __kmalloc_cache_noprof+0x184/0x410
[   25.765064]  kasan_atomics+0x96/0x310
[   25.765395]  kunit_try_run_case+0x1b3/0x490
[   25.766127]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.766616]  kthread+0x257/0x310
[   25.767002]  ret_from_fork+0x41/0x80
[   25.767357]  ret_from_fork_asm+0x1a/0x30
[   25.768756] 
[   25.768925] The buggy address belongs to the object at ffff8881028c7700
[   25.768925]  which belongs to the cache kmalloc-64 of size 64
[   25.770367] The buggy address is located 0 bytes to the right of
[   25.770367]  allocated 48-byte region [ffff8881028c7700, ffff8881028c7730)
[   25.771426] 
[   25.771861] The buggy address belongs to the physical page:
[   25.772359] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1028c7
[   25.773430] flags: 0x200000000000000(node=0|zone=2)
[   25.774231] page_type: f5(slab)
[   25.774572] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   25.775248] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   25.776606] page dumped because: kasan: bad access detected
[   25.777291] 
[   25.777478] Memory state around the buggy address:
[   25.778396]  ffff8881028c7600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.779411]  ffff8881028c7680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.780209] >ffff8881028c7700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   25.780855]                                      ^
[   25.781260]  ffff8881028c7780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.781902]  ffff8881028c7800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.782843] ==================================================================
[   25.784765] ==================================================================
[   25.785637] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x49ea/0x5450
[   25.786340] Read of size 4 at addr ffff8881028c7730 by task kunit_try_catch/272
[   25.786987] 
[   25.787194] CPU: 0 UID: 0 PID: 272 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241126 #1
[   25.789185] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.790566] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   25.791222] Call Trace:
[   25.791790]  <TASK>
[   25.791979]  dump_stack_lvl+0x73/0xb0
[   25.792745]  print_report+0xd1/0x640
[   25.793250]  ? __virt_addr_valid+0x1db/0x2d0
[   25.793868]  ? kasan_complete_mode_report_info+0x2a/0x200
[   25.794441]  kasan_report+0x102/0x140
[   25.794748]  ? kasan_atomics_helper+0x49ea/0x5450
[   25.795252]  ? kasan_atomics_helper+0x49ea/0x5450
[   25.795789]  __asan_report_load4_noabort+0x18/0x20
[   25.796820]  kasan_atomics_helper+0x49ea/0x5450
[   25.798008]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   25.798437]  ? __kmalloc_cache_noprof+0x184/0x410
[   25.798874]  ? trace_hardirqs_on+0x37/0xe0
[   25.799344]  ? kasan_atomics+0x153/0x310
[   25.800234]  kasan_atomics+0x1dd/0x310
[   25.800908]  ? __pfx_kasan_atomics+0x10/0x10
[   25.801224]  ? __pfx_kasan_atomics+0x10/0x10
[   25.801974]  kunit_try_run_case+0x1b3/0x490
[   25.802642]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.803263]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   25.803962]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   25.804664]  ? __kthread_parkme+0x82/0x160
[   25.805259]  ? preempt_count_sub+0x50/0x80
[   25.805757]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.806477]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   25.806824]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.807718]  kthread+0x257/0x310
[   25.808317]  ? __pfx_kthread+0x10/0x10
[   25.808854]  ret_from_fork+0x41/0x80
[   25.809229]  ? __pfx_kthread+0x10/0x10
[   25.810122]  ret_from_fork_asm+0x1a/0x30
[   25.810524]  </TASK>
[   25.810791] 
[   25.811291] Allocated by task 272:
[   25.811688]  kasan_save_stack+0x3d/0x60
[   25.812056]  kasan_save_track+0x18/0x40
[   25.812504]  kasan_save_alloc_info+0x3b/0x50
[   25.813469]  __kasan_kmalloc+0xb7/0xc0
[   25.813921]  __kmalloc_cache_noprof+0x184/0x410
[   25.814790]  kasan_atomics+0x96/0x310
[   25.815453]  kunit_try_run_case+0x1b3/0x490
[   25.815948]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.816540]  kthread+0x257/0x310
[   25.816988]  ret_from_fork+0x41/0x80
[   25.817690]  ret_from_fork_asm+0x1a/0x30
[   25.818017] 
[   25.818712] The buggy address belongs to the object at ffff8881028c7700
[   25.818712]  which belongs to the cache kmalloc-64 of size 64
[   25.819559] The buggy address is located 0 bytes to the right of
[   25.819559]  allocated 48-byte region [ffff8881028c7700, ffff8881028c7730)
[   25.820331] 
[   25.821179] The buggy address belongs to the physical page:
[   25.821893] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1028c7
[   25.822835] flags: 0x200000000000000(node=0|zone=2)
[   25.823028] page_type: f5(slab)
[   25.823165] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   25.823391] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   25.823716] page dumped because: kasan: bad access detected
[   25.824025] 
[   25.825050] Memory state around the buggy address:
[   25.825566]  ffff8881028c7600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.826216]  ffff8881028c7680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.827580] >ffff8881028c7700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   25.828097]                                      ^
[   25.828676]  ffff8881028c7780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.829263]  ffff8881028c7800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.830050] ==================================================================
[   26.722587] ==================================================================
[   26.722994] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1e13/0x5450
[   26.723394] Write of size 8 at addr ffff8881028c7730 by task kunit_try_catch/272
[   26.724074] 
[   26.724356] CPU: 0 UID: 0 PID: 272 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241126 #1
[   26.725614] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.725887] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   26.726570] Call Trace:
[   26.726863]  <TASK>
[   26.727179]  dump_stack_lvl+0x73/0xb0
[   26.727660]  print_report+0xd1/0x640
[   26.727991]  ? __virt_addr_valid+0x1db/0x2d0
[   26.728352]  ? kasan_complete_mode_report_info+0x2a/0x200
[   26.728909]  kasan_report+0x102/0x140
[   26.729445]  ? kasan_atomics_helper+0x1e13/0x5450
[   26.730061]  ? kasan_atomics_helper+0x1e13/0x5450
[   26.730601]  kasan_check_range+0x10c/0x1c0
[   26.730929]  __kasan_check_write+0x18/0x20
[   26.731504]  kasan_atomics_helper+0x1e13/0x5450
[   26.732022]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   26.732422]  ? __kmalloc_cache_noprof+0x184/0x410
[   26.733019]  ? trace_hardirqs_on+0x37/0xe0
[   26.733344]  ? kasan_atomics+0x153/0x310
[   26.733677]  kasan_atomics+0x1dd/0x310
[   26.734128]  ? __pfx_kasan_atomics+0x10/0x10
[   26.734716]  ? __pfx_kasan_atomics+0x10/0x10
[   26.735203]  kunit_try_run_case+0x1b3/0x490
[   26.735688]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.736049]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   26.736375]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   26.736907]  ? __kthread_parkme+0x82/0x160
[   26.737360]  ? preempt_count_sub+0x50/0x80
[   26.739518]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.740025]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   26.740648]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.741002]  kthread+0x257/0x310
[   26.741265]  ? __pfx_kthread+0x10/0x10
[   26.742770]  ret_from_fork+0x41/0x80
[   26.743208]  ? __pfx_kthread+0x10/0x10
[   26.743855]  ret_from_fork_asm+0x1a/0x30
[   26.744910]  </TASK>
[   26.745169] 
[   26.745336] Allocated by task 272:
[   26.745587]  kasan_save_stack+0x3d/0x60
[   26.746158]  kasan_save_track+0x18/0x40
[   26.747187]  kasan_save_alloc_info+0x3b/0x50
[   26.747522]  __kasan_kmalloc+0xb7/0xc0
[   26.748384]  __kmalloc_cache_noprof+0x184/0x410
[   26.748900]  kasan_atomics+0x96/0x310
[   26.749542]  kunit_try_run_case+0x1b3/0x490
[   26.750364]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.751108]  kthread+0x257/0x310
[   26.752131]  ret_from_fork+0x41/0x80
[   26.752498]  ret_from_fork_asm+0x1a/0x30
[   26.753105] 
[   26.753330] The buggy address belongs to the object at ffff8881028c7700
[   26.753330]  which belongs to the cache kmalloc-64 of size 64
[   26.754894] The buggy address is located 0 bytes to the right of
[   26.754894]  allocated 48-byte region [ffff8881028c7700, ffff8881028c7730)
[   26.755755] 
[   26.756425] The buggy address belongs to the physical page:
[   26.756860] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1028c7
[   26.757863] flags: 0x200000000000000(node=0|zone=2)
[   26.758591] page_type: f5(slab)
[   26.759055] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   26.759724] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   26.760273] page dumped because: kasan: bad access detected
[   26.761261] 
[   26.761454] Memory state around the buggy address:
[   26.761956]  ffff8881028c7600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.762964]  ffff8881028c7680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.763647] >ffff8881028c7700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   26.764453]                                      ^
[   26.765070]  ffff8881028c7780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.765905]  ffff8881028c7800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.766620] ==================================================================
[   25.479192] ==================================================================
[   25.480042] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xfaa/0x5450
[   25.480743] Write of size 4 at addr ffff8881028c7730 by task kunit_try_catch/272
[   25.481306] 
[   25.482184] CPU: 0 UID: 0 PID: 272 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241126 #1
[   25.482834] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.483102] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   25.483566] Call Trace:
[   25.483924]  <TASK>
[   25.484216]  dump_stack_lvl+0x73/0xb0
[   25.484719]  print_report+0xd1/0x640
[   25.485154]  ? __virt_addr_valid+0x1db/0x2d0
[   25.485736]  ? kasan_complete_mode_report_info+0x2a/0x200
[   25.486302]  kasan_report+0x102/0x140
[   25.486792]  ? kasan_atomics_helper+0xfaa/0x5450
[   25.487290]  ? kasan_atomics_helper+0xfaa/0x5450
[   25.487751]  kasan_check_range+0x10c/0x1c0
[   25.488061]  __kasan_check_write+0x18/0x20
[   25.488352]  kasan_atomics_helper+0xfaa/0x5450
[   25.488861]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   25.489381]  ? __kmalloc_cache_noprof+0x184/0x410
[   25.489928]  ? trace_hardirqs_on+0x37/0xe0
[   25.490387]  ? kasan_atomics+0x153/0x310
[   25.490917]  kasan_atomics+0x1dd/0x310
[   25.491358]  ? __pfx_kasan_atomics+0x10/0x10
[   25.491898]  ? __pfx_kasan_atomics+0x10/0x10
[   25.492345]  kunit_try_run_case+0x1b3/0x490
[   25.492735]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.493060]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   25.493377]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   25.493957]  ? __kthread_parkme+0x82/0x160
[   25.494421]  ? preempt_count_sub+0x50/0x80
[   25.494952]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.495506]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   25.496141]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.496788]  kthread+0x257/0x310
[   25.497176]  ? __pfx_kthread+0x10/0x10
[   25.497564]  ret_from_fork+0x41/0x80
[   25.498031]  ? __pfx_kthread+0x10/0x10
[   25.498381]  ret_from_fork_asm+0x1a/0x30
[   25.498922]  </TASK>
[   25.499135] 
[   25.499357] Allocated by task 272:
[   25.499767]  kasan_save_stack+0x3d/0x60
[   25.500049]  kasan_save_track+0x18/0x40
[   25.500317]  kasan_save_alloc_info+0x3b/0x50
[   25.500687]  __kasan_kmalloc+0xb7/0xc0
[   25.500958]  __kmalloc_cache_noprof+0x184/0x410
[   25.501451]  kasan_atomics+0x96/0x310
[   25.501936]  kunit_try_run_case+0x1b3/0x490
[   25.502387]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.502981]  kthread+0x257/0x310
[   25.503363]  ret_from_fork+0x41/0x80
[   25.503836]  ret_from_fork_asm+0x1a/0x30
[   25.504269] 
[   25.504510] The buggy address belongs to the object at ffff8881028c7700
[   25.504510]  which belongs to the cache kmalloc-64 of size 64
[   25.505630] The buggy address is located 0 bytes to the right of
[   25.505630]  allocated 48-byte region [ffff8881028c7700, ffff8881028c7730)
[   25.506431] 
[   25.506747] The buggy address belongs to the physical page:
[   25.507259] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1028c7
[   25.507855] flags: 0x200000000000000(node=0|zone=2)
[   25.508165] page_type: f5(slab)
[   25.508526] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   25.510070] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   25.510567] page dumped because: kasan: bad access detected
[   25.510893] 
[   25.511049] Memory state around the buggy address:
[   25.511327]  ffff8881028c7600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.512318]  ffff8881028c7680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.513012] >ffff8881028c7700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   25.513690]                                      ^
[   25.514155]  ffff8881028c7780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.514842]  ffff8881028c7800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.515314] ==================================================================
[   24.608646] ==================================================================
[   24.609141] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e0/0x5450
[   24.610519] Read of size 4 at addr ffff8881028c7730 by task kunit_try_catch/272
[   24.611250] 
[   24.611563] CPU: 0 UID: 0 PID: 272 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241126 #1
[   24.613558] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.614166] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   24.614983] Call Trace:
[   24.615358]  <TASK>
[   24.615754]  dump_stack_lvl+0x73/0xb0
[   24.616200]  print_report+0xd1/0x640
[   24.616741]  ? __virt_addr_valid+0x1db/0x2d0
[   24.617235]  ? kasan_complete_mode_report_info+0x2a/0x200
[   24.618621]  kasan_report+0x102/0x140
[   24.618911]  ? kasan_atomics_helper+0x3e0/0x5450
[   24.619222]  ? kasan_atomics_helper+0x3e0/0x5450
[   24.619569]  kasan_check_range+0x10c/0x1c0
[   24.619991]  __kasan_check_read+0x15/0x20
[   24.620439]  kasan_atomics_helper+0x3e0/0x5450
[   24.622231]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   24.622992]  ? __kmalloc_cache_noprof+0x184/0x410
[   24.623898]  ? trace_hardirqs_on+0x37/0xe0
[   24.624295]  ? kasan_atomics+0x153/0x310
[   24.625077]  kasan_atomics+0x1dd/0x310
[   24.625993]  ? __pfx_kasan_atomics+0x10/0x10
[   24.626200]  ? __pfx_kasan_atomics+0x10/0x10
[   24.626373]  kunit_try_run_case+0x1b3/0x490
[   24.626630]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.626938]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   24.627638]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   24.628202]  ? __kthread_parkme+0x82/0x160
[   24.629223]  ? preempt_count_sub+0x50/0x80
[   24.629687]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.630174]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   24.630961]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.631599]  kthread+0x257/0x310
[   24.632066]  ? __pfx_kthread+0x10/0x10
[   24.632548]  ret_from_fork+0x41/0x80
[   24.633036]  ? __pfx_kthread+0x10/0x10
[   24.633522]  ret_from_fork_asm+0x1a/0x30
[   24.634073]  </TASK>
[   24.634386] 
[   24.634690] Allocated by task 272:
[   24.635099]  kasan_save_stack+0x3d/0x60
[   24.635670]  kasan_save_track+0x18/0x40
[   24.636127]  kasan_save_alloc_info+0x3b/0x50
[   24.636667]  __kasan_kmalloc+0xb7/0xc0
[   24.637148]  __kmalloc_cache_noprof+0x184/0x410
[   24.637713]  kasan_atomics+0x96/0x310
[   24.638167]  kunit_try_run_case+0x1b3/0x490
[   24.638712]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.639290]  kthread+0x257/0x310
[   24.639756]  ret_from_fork+0x41/0x80
[   24.640202]  ret_from_fork_asm+0x1a/0x30
[   24.640719] 
[   24.640964] The buggy address belongs to the object at ffff8881028c7700
[   24.640964]  which belongs to the cache kmalloc-64 of size 64
[   24.642101] The buggy address is located 0 bytes to the right of
[   24.642101]  allocated 48-byte region [ffff8881028c7700, ffff8881028c7730)
[   24.642892] 
[   24.643122] The buggy address belongs to the physical page:
[   24.643567] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1028c7
[   24.644073] flags: 0x200000000000000(node=0|zone=2)
[   24.644553] page_type: f5(slab)
[   24.644927] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   24.645619] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   24.646185] page dumped because: kasan: bad access detected
[   24.646730] 
[   24.646948] Memory state around the buggy address:
[   24.647319]  ffff8881028c7600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.647930]  ffff8881028c7680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.648457] >ffff8881028c7700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   24.649058]                                      ^
[   24.649347]  ffff8881028c7780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.650001]  ffff8881028c7800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.650708] ==================================================================
[   24.483088] ==================================================================
[   24.484339] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4ba4/0x5450
[   24.485057] Write of size 4 at addr ffff8881028c7730 by task kunit_try_catch/272
[   24.486073] 
[   24.486332] CPU: 0 UID: 0 PID: 272 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241126 #1
[   24.487184] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.487703] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   24.488376] Call Trace:
[   24.488742]  <TASK>
[   24.489077]  dump_stack_lvl+0x73/0xb0
[   24.489436]  print_report+0xd1/0x640
[   24.489932]  ? __virt_addr_valid+0x1db/0x2d0
[   24.490310]  ? kasan_complete_mode_report_info+0x2a/0x200
[   24.490958]  kasan_report+0x102/0x140
[   24.491284]  ? kasan_atomics_helper+0x4ba4/0x5450
[   24.492008]  ? kasan_atomics_helper+0x4ba4/0x5450
[   24.492626]  __asan_report_store4_noabort+0x1b/0x30
[   24.493171]  kasan_atomics_helper+0x4ba4/0x5450
[   24.493685]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   24.494136]  ? __kmalloc_cache_noprof+0x184/0x410
[   24.494696]  ? trace_hardirqs_on+0x37/0xe0
[   24.495092]  ? kasan_atomics+0x153/0x310
[   24.495735]  kasan_atomics+0x1dd/0x310
[   24.496110]  ? __pfx_kasan_atomics+0x10/0x10
[   24.496676]  ? __pfx_kasan_atomics+0x10/0x10
[   24.497095]  kunit_try_run_case+0x1b3/0x490
[   24.497665]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.498007]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   24.498516]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   24.499099]  ? __kthread_parkme+0x82/0x160
[   24.499571]  ? preempt_count_sub+0x50/0x80
[   24.500043]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.500620]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   24.501113]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.501776]  kthread+0x257/0x310
[   24.502200]  ? __pfx_kthread+0x10/0x10
[   24.503436]  ret_from_fork+0x41/0x80
[   24.503820]  ? __pfx_kthread+0x10/0x10
[   24.504176]  ret_from_fork_asm+0x1a/0x30
[   24.504660]  </TASK>
[   24.504934] 
[   24.505153] Allocated by task 272:
[   24.505470]  kasan_save_stack+0x3d/0x60
[   24.506830]  kasan_save_track+0x18/0x40
[   24.507123]  kasan_save_alloc_info+0x3b/0x50
[   24.507415]  __kasan_kmalloc+0xb7/0xc0
[   24.507993]  __kmalloc_cache_noprof+0x184/0x410
[   24.508609]  kasan_atomics+0x96/0x310
[   24.509149]  kunit_try_run_case+0x1b3/0x490
[   24.510278]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.510915]  kthread+0x257/0x310
[   24.511361]  ret_from_fork+0x41/0x80
[   24.512233]  ret_from_fork_asm+0x1a/0x30
[   24.513164] 
[   24.513419] The buggy address belongs to the object at ffff8881028c7700
[   24.513419]  which belongs to the cache kmalloc-64 of size 64
[   24.514376] The buggy address is located 0 bytes to the right of
[   24.514376]  allocated 48-byte region [ffff8881028c7700, ffff8881028c7730)
[   24.515362] 
[   24.515562] The buggy address belongs to the physical page:
[   24.516059] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1028c7
[   24.517392] flags: 0x200000000000000(node=0|zone=2)
[   24.518189] page_type: f5(slab)
[   24.518541] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   24.519100] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   24.520267] page dumped because: kasan: bad access detected
[   24.520637] 
[   24.520826] Memory state around the buggy address:
[   24.521247]  ffff8881028c7600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.521881]  ffff8881028c7680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.522548] >ffff8881028c7700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   24.522914]                                      ^
[   24.523202]  ffff8881028c7780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.524520]  ffff8881028c7800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.525143] ==================================================================
[   26.677716] ==================================================================
[   26.678691] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1d7b/0x5450
[   26.679267] Write of size 8 at addr ffff8881028c7730 by task kunit_try_catch/272
[   26.680871] 
[   26.681107] CPU: 0 UID: 0 PID: 272 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241126 #1
[   26.681958] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.682241] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   26.682752] Call Trace:
[   26.683073]  <TASK>
[   26.683686]  dump_stack_lvl+0x73/0xb0
[   26.684143]  print_report+0xd1/0x640
[   26.684678]  ? __virt_addr_valid+0x1db/0x2d0
[   26.685170]  ? kasan_complete_mode_report_info+0x2a/0x200
[   26.685795]  kasan_report+0x102/0x140
[   26.686213]  ? kasan_atomics_helper+0x1d7b/0x5450
[   26.686807]  ? kasan_atomics_helper+0x1d7b/0x5450
[   26.687221]  kasan_check_range+0x10c/0x1c0
[   26.687560]  __kasan_check_write+0x18/0x20
[   26.687963]  kasan_atomics_helper+0x1d7b/0x5450
[   26.688513]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   26.689332]  ? __kmalloc_cache_noprof+0x184/0x410
[   26.690880]  ? trace_hardirqs_on+0x37/0xe0
[   26.691884]  ? kasan_atomics+0x153/0x310
[   26.693000]  kasan_atomics+0x1dd/0x310
[   26.693957]  ? __pfx_kasan_atomics+0x10/0x10
[   26.694428]  ? __pfx_kasan_atomics+0x10/0x10
[   26.694943]  kunit_try_run_case+0x1b3/0x490
[   26.695234]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.696013]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   26.696849]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   26.697516]  ? __kthread_parkme+0x82/0x160
[   26.698098]  ? preempt_count_sub+0x50/0x80
[   26.698478]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.699381]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   26.700521]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.701141]  kthread+0x257/0x310
[   26.701563]  ? __pfx_kthread+0x10/0x10
[   26.701856]  ret_from_fork+0x41/0x80
[   26.702282]  ? __pfx_kthread+0x10/0x10
[   26.702759]  ret_from_fork_asm+0x1a/0x30
[   26.703151]  </TASK>
[   26.703382] 
[   26.703662] Allocated by task 272:
[   26.703909]  kasan_save_stack+0x3d/0x60
[   26.704346]  kasan_save_track+0x18/0x40
[   26.704798]  kasan_save_alloc_info+0x3b/0x50
[   26.705902]  __kasan_kmalloc+0xb7/0xc0
[   26.706870]  __kmalloc_cache_noprof+0x184/0x410
[   26.707389]  kasan_atomics+0x96/0x310
[   26.707710]  kunit_try_run_case+0x1b3/0x490
[   26.708163]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.708872]  kthread+0x257/0x310
[   26.709285]  ret_from_fork+0x41/0x80
[   26.709831]  ret_from_fork_asm+0x1a/0x30
[   26.710225] 
[   26.710430] The buggy address belongs to the object at ffff8881028c7700
[   26.710430]  which belongs to the cache kmalloc-64 of size 64
[   26.711607] The buggy address is located 0 bytes to the right of
[   26.711607]  allocated 48-byte region [ffff8881028c7700, ffff8881028c7730)
[   26.712931] 
[   26.713184] The buggy address belongs to the physical page:
[   26.713822] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1028c7
[   26.714324] flags: 0x200000000000000(node=0|zone=2)
[   26.715060] page_type: f5(slab)
[   26.716646] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   26.717146] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   26.717624] page dumped because: kasan: bad access detected
[   26.718145] 
[   26.718438] Memory state around the buggy address:
[   26.718805]  ffff8881028c7600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.719253]  ffff8881028c7680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.719703] >ffff8881028c7700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   26.720072]                                      ^
[   26.720361]  ffff8881028c7780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.720792]  ffff8881028c7800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.721165] ==================================================================
[   25.165646] ==================================================================
[   25.167057] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xac8/0x5450
[   25.167757] Write of size 4 at addr ffff8881028c7730 by task kunit_try_catch/272
[   25.168703] 
[   25.169029] CPU: 0 UID: 0 PID: 272 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241126 #1
[   25.169571] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.170086] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   25.171043] Call Trace:
[   25.171438]  <TASK>
[   25.171902]  dump_stack_lvl+0x73/0xb0
[   25.172430]  print_report+0xd1/0x640
[   25.173015]  ? __virt_addr_valid+0x1db/0x2d0
[   25.173592]  ? kasan_complete_mode_report_info+0x2a/0x200
[   25.174275]  kasan_report+0x102/0x140
[   25.174878]  ? kasan_atomics_helper+0xac8/0x5450
[   25.175530]  ? kasan_atomics_helper+0xac8/0x5450
[   25.176225]  kasan_check_range+0x10c/0x1c0
[   25.176833]  __kasan_check_write+0x18/0x20
[   25.177386]  kasan_atomics_helper+0xac8/0x5450
[   25.178015]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   25.178698]  ? __kmalloc_cache_noprof+0x184/0x410
[   25.179226]  ? trace_hardirqs_on+0x37/0xe0
[   25.179556]  ? kasan_atomics+0x153/0x310
[   25.180104]  kasan_atomics+0x1dd/0x310
[   25.180515]  ? __pfx_kasan_atomics+0x10/0x10
[   25.181015]  ? __pfx_kasan_atomics+0x10/0x10
[   25.181466]  kunit_try_run_case+0x1b3/0x490
[   25.181925]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.182323]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   25.182726]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   25.183160]  ? __kthread_parkme+0x82/0x160
[   25.183693]  ? preempt_count_sub+0x50/0x80
[   25.184149]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.184728]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   25.185354]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.185793]  kthread+0x257/0x310
[   25.186192]  ? __pfx_kthread+0x10/0x10
[   25.186668]  ret_from_fork+0x41/0x80
[   25.187086]  ? __pfx_kthread+0x10/0x10
[   25.187548]  ret_from_fork_asm+0x1a/0x30
[   25.188688]  </TASK>
[   25.188940] 
[   25.189123] Allocated by task 272:
[   25.189418]  kasan_save_stack+0x3d/0x60
[   25.189881]  kasan_save_track+0x18/0x40
[   25.190264]  kasan_save_alloc_info+0x3b/0x50
[   25.191197]  __kasan_kmalloc+0xb7/0xc0
[   25.191605]  __kmalloc_cache_noprof+0x184/0x410
[   25.192066]  kasan_atomics+0x96/0x310
[   25.192478]  kunit_try_run_case+0x1b3/0x490
[   25.192908]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.193238]  kthread+0x257/0x310
[   25.193513]  ret_from_fork+0x41/0x80
[   25.193968]  ret_from_fork_asm+0x1a/0x30
[   25.194405] 
[   25.194696] The buggy address belongs to the object at ffff8881028c7700
[   25.194696]  which belongs to the cache kmalloc-64 of size 64
[   25.195822] The buggy address is located 0 bytes to the right of
[   25.195822]  allocated 48-byte region [ffff8881028c7700, ffff8881028c7730)
[   25.196465] 
[   25.196776] The buggy address belongs to the physical page:
[   25.197283] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1028c7
[   25.197998] flags: 0x200000000000000(node=0|zone=2)
[   25.198333] page_type: f5(slab)
[   25.198643] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   25.199291] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   25.200011] page dumped because: kasan: bad access detected
[   25.200527] 
[   25.200807] Memory state around the buggy address:
[   25.201271]  ffff8881028c7600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.201781]  ffff8881028c7680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.202321] >ffff8881028c7700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   25.202766]                                      ^
[   25.203224]  ffff8881028c7780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.203921]  ffff8881028c7800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.204460] ==================================================================
[   26.428439] ==================================================================
[   26.429267] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x19e4/0x5450
[   26.430111] Write of size 8 at addr ffff8881028c7730 by task kunit_try_catch/272
[   26.430438] 
[   26.430758] CPU: 0 UID: 0 PID: 272 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241126 #1
[   26.431835] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.432268] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   26.432975] Call Trace:
[   26.433334]  <TASK>
[   26.433687]  dump_stack_lvl+0x73/0xb0
[   26.434081]  print_report+0xd1/0x640
[   26.434373]  ? __virt_addr_valid+0x1db/0x2d0
[   26.435035]  ? kasan_complete_mode_report_info+0x2a/0x200
[   26.435697]  kasan_report+0x102/0x140
[   26.436199]  ? kasan_atomics_helper+0x19e4/0x5450
[   26.436780]  ? kasan_atomics_helper+0x19e4/0x5450
[   26.437350]  kasan_check_range+0x10c/0x1c0
[   26.437888]  __kasan_check_write+0x18/0x20
[   26.438207]  kasan_atomics_helper+0x19e4/0x5450
[   26.438731]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   26.439317]  ? __kmalloc_cache_noprof+0x184/0x410
[   26.439953]  ? trace_hardirqs_on+0x37/0xe0
[   26.440424]  ? kasan_atomics+0x153/0x310
[   26.441017]  kasan_atomics+0x1dd/0x310
[   26.441442]  ? __pfx_kasan_atomics+0x10/0x10
[   26.441998]  ? __pfx_kasan_atomics+0x10/0x10
[   26.442730]  kunit_try_run_case+0x1b3/0x490
[   26.443227]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.443618]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   26.444191]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   26.444833]  ? __kthread_parkme+0x82/0x160
[   26.445302]  ? preempt_count_sub+0x50/0x80
[   26.445948]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.446513]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   26.447172]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.447808]  kthread+0x257/0x310
[   26.448224]  ? __pfx_kthread+0x10/0x10
[   26.448659]  ret_from_fork+0x41/0x80
[   26.449084]  ? __pfx_kthread+0x10/0x10
[   26.449436]  ret_from_fork_asm+0x1a/0x30
[   26.450035]  </TASK>
[   26.450415] 
[   26.450712] Allocated by task 272:
[   26.451042]  kasan_save_stack+0x3d/0x60
[   26.451567]  kasan_save_track+0x18/0x40
[   26.452074]  kasan_save_alloc_info+0x3b/0x50
[   26.452674]  __kasan_kmalloc+0xb7/0xc0
[   26.452989]  __kmalloc_cache_noprof+0x184/0x410
[   26.453519]  kasan_atomics+0x96/0x310
[   26.454060]  kunit_try_run_case+0x1b3/0x490
[   26.454519]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.455137]  kthread+0x257/0x310
[   26.455566]  ret_from_fork+0x41/0x80
[   26.456021]  ret_from_fork_asm+0x1a/0x30
[   26.456420] 
[   26.456724] The buggy address belongs to the object at ffff8881028c7700
[   26.456724]  which belongs to the cache kmalloc-64 of size 64
[   26.457815] The buggy address is located 0 bytes to the right of
[   26.457815]  allocated 48-byte region [ffff8881028c7700, ffff8881028c7730)
[   26.458848] 
[   26.459041] The buggy address belongs to the physical page:
[   26.459532] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1028c7
[   26.460874] flags: 0x200000000000000(node=0|zone=2)
[   26.461186] page_type: f5(slab)
[   26.461433] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   26.463196] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   26.463987] page dumped because: kasan: bad access detected
[   26.465202] 
[   26.466224] Memory state around the buggy address:
[   26.467425]  ffff8881028c7600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.468631]  ffff8881028c7680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.469389] >ffff8881028c7700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   26.470243]                                      ^
[   26.470734]  ffff8881028c7780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.471656]  ffff8881028c7800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.472282] ==================================================================
[   27.022272] ==================================================================
[   27.023878] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4fb4/0x5450
[   27.024559] Read of size 8 at addr ffff8881028c7730 by task kunit_try_catch/272
[   27.025214] 
[   27.025437] CPU: 0 UID: 0 PID: 272 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241126 #1
[   27.026308] Tainted: [B]=BAD_PAGE, [N]=TEST
[   27.027099] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   27.027591] Call Trace:
[   27.027808]  <TASK>
[   27.028010]  dump_stack_lvl+0x73/0xb0
[   27.028446]  print_report+0xd1/0x640
[   27.028968]  ? __virt_addr_valid+0x1db/0x2d0
[   27.029447]  ? kasan_complete_mode_report_info+0x2a/0x200
[   27.030057]  kasan_report+0x102/0x140
[   27.030507]  ? kasan_atomics_helper+0x4fb4/0x5450
[   27.031044]  ? kasan_atomics_helper+0x4fb4/0x5450
[   27.031413]  __asan_report_load8_noabort+0x18/0x20
[   27.031990]  kasan_atomics_helper+0x4fb4/0x5450
[   27.032456]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   27.032859]  ? __kmalloc_cache_noprof+0x184/0x410
[   27.033182]  ? trace_hardirqs_on+0x37/0xe0
[   27.033691]  ? kasan_atomics+0x153/0x310
[   27.034172]  kasan_atomics+0x1dd/0x310
[   27.034665]  ? __pfx_kasan_atomics+0x10/0x10
[   27.035145]  ? __pfx_kasan_atomics+0x10/0x10
[   27.035660]  kunit_try_run_case+0x1b3/0x490
[   27.036137]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.036527]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   27.036898]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   27.037225]  ? __kthread_parkme+0x82/0x160
[   27.037533]  ? preempt_count_sub+0x50/0x80
[   27.038037]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.038569]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   27.039196]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.039799]  kthread+0x257/0x310
[   27.040199]  ? __pfx_kthread+0x10/0x10
[   27.040696]  ret_from_fork+0x41/0x80
[   27.041103]  ? __pfx_kthread+0x10/0x10
[   27.041529]  ret_from_fork_asm+0x1a/0x30
[   27.041907]  </TASK>
[   27.042202] 
[   27.042424] Allocated by task 272:
[   27.042766]  kasan_save_stack+0x3d/0x60
[   27.043181]  kasan_save_track+0x18/0x40
[   27.043517]  kasan_save_alloc_info+0x3b/0x50
[   27.044013]  __kasan_kmalloc+0xb7/0xc0
[   27.044320]  __kmalloc_cache_noprof+0x184/0x410
[   27.044691]  kasan_atomics+0x96/0x310
[   27.044963]  kunit_try_run_case+0x1b3/0x490
[   27.045274]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.045760]  kthread+0x257/0x310
[   27.046159]  ret_from_fork+0x41/0x80
[   27.046630]  ret_from_fork_asm+0x1a/0x30
[   27.047076] 
[   27.047297] The buggy address belongs to the object at ffff8881028c7700
[   27.047297]  which belongs to the cache kmalloc-64 of size 64
[   27.048350] The buggy address is located 0 bytes to the right of
[   27.048350]  allocated 48-byte region [ffff8881028c7700, ffff8881028c7730)
[   27.049447] 
[   27.049697] The buggy address belongs to the physical page:
[   27.050004] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1028c7
[   27.050426] flags: 0x200000000000000(node=0|zone=2)
[   27.050844] page_type: f5(slab)
[   27.051201] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   27.051939] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   27.052645] page dumped because: kasan: bad access detected
[   27.053164] 
[   27.053384] Memory state around the buggy address:
[   27.054412]  ffff8881028c7600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.055106]  ffff8881028c7680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.055663] >ffff8881028c7700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   27.056037]                                      ^
[   27.056328]  ffff8881028c7780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.059003]  ffff8881028c7800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.059724] ==================================================================
[   26.904361] ==================================================================
[   26.905421] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x2007/0x5450
[   26.906067] Write of size 8 at addr ffff8881028c7730 by task kunit_try_catch/272
[   26.906756] 
[   26.906969] CPU: 0 UID: 0 PID: 272 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241126 #1
[   26.907992] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.909197] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   26.909870] Call Trace:
[   26.910106]  <TASK>
[   26.910299]  dump_stack_lvl+0x73/0xb0
[   26.910720]  print_report+0xd1/0x640
[   26.911155]  ? __virt_addr_valid+0x1db/0x2d0
[   26.912034]  ? kasan_complete_mode_report_info+0x2a/0x200
[   26.912401]  kasan_report+0x102/0x140
[   26.912740]  ? kasan_atomics_helper+0x2007/0x5450
[   26.913184]  ? kasan_atomics_helper+0x2007/0x5450
[   26.913691]  kasan_check_range+0x10c/0x1c0
[   26.914174]  __kasan_check_write+0x18/0x20
[   26.914619]  kasan_atomics_helper+0x2007/0x5450
[   26.915085]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   26.915417]  ? __kmalloc_cache_noprof+0x184/0x410
[   26.915981]  ? trace_hardirqs_on+0x37/0xe0
[   26.916440]  ? kasan_atomics+0x153/0x310
[   26.916966]  kasan_atomics+0x1dd/0x310
[   26.917334]  ? __pfx_kasan_atomics+0x10/0x10
[   26.917862]  ? __pfx_kasan_atomics+0x10/0x10
[   26.918223]  kunit_try_run_case+0x1b3/0x490
[   26.918757]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.919171]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   26.919635]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   26.920006]  ? __kthread_parkme+0x82/0x160
[   26.920435]  ? preempt_count_sub+0x50/0x80
[   26.920892]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.921264]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   26.921900]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.922405]  kthread+0x257/0x310
[   26.922797]  ? __pfx_kthread+0x10/0x10
[   26.923088]  ret_from_fork+0x41/0x80
[   26.923521]  ? __pfx_kthread+0x10/0x10
[   26.923991]  ret_from_fork_asm+0x1a/0x30
[   26.924463]  </TASK>
[   26.924746] 
[   26.924974] Allocated by task 272:
[   26.925221]  kasan_save_stack+0x3d/0x60
[   26.925703]  kasan_save_track+0x18/0x40
[   26.926008]  kasan_save_alloc_info+0x3b/0x50
[   26.926412]  __kasan_kmalloc+0xb7/0xc0
[   26.926909]  __kmalloc_cache_noprof+0x184/0x410
[   26.928127]  kasan_atomics+0x96/0x310
[   26.928514]  kunit_try_run_case+0x1b3/0x490
[   26.928916]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.929450]  kthread+0x257/0x310
[   26.930617]  ret_from_fork+0x41/0x80
[   26.931532]  ret_from_fork_asm+0x1a/0x30
[   26.932048] 
[   26.932226] The buggy address belongs to the object at ffff8881028c7700
[   26.932226]  which belongs to the cache kmalloc-64 of size 64
[   26.933191] The buggy address is located 0 bytes to the right of
[   26.933191]  allocated 48-byte region [ffff8881028c7700, ffff8881028c7730)
[   26.934388] 
[   26.934716] The buggy address belongs to the physical page:
[   26.935298] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1028c7
[   26.936084] flags: 0x200000000000000(node=0|zone=2)
[   26.936817] page_type: f5(slab)
[   26.937063] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   26.937644] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   26.938256] page dumped because: kasan: bad access detected
[   26.938632] 
[   26.938864] Memory state around the buggy address:
[   26.939317]  ffff8881028c7600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.939786]  ffff8881028c7680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.940388] >ffff8881028c7700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   26.940914]                                      ^
[   26.941388]  ffff8881028c7780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.941953]  ffff8881028c7800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.942627] ==================================================================
[   25.321768] ==================================================================
[   25.322240] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xd48/0x5450
[   25.322837] Write of size 4 at addr ffff8881028c7730 by task kunit_try_catch/272
[   25.323425] 
[   25.323672] CPU: 0 UID: 0 PID: 272 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241126 #1
[   25.324434] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.324840] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   25.325327] Call Trace:
[   25.325565]  <TASK>
[   25.325991]  dump_stack_lvl+0x73/0xb0
[   25.326466]  print_report+0xd1/0x640
[   25.326958]  ? __virt_addr_valid+0x1db/0x2d0
[   25.327425]  ? kasan_complete_mode_report_info+0x2a/0x200
[   25.328028]  kasan_report+0x102/0x140
[   25.328463]  ? kasan_atomics_helper+0xd48/0x5450
[   25.328871]  ? kasan_atomics_helper+0xd48/0x5450
[   25.329205]  kasan_check_range+0x10c/0x1c0
[   25.329733]  __kasan_check_write+0x18/0x20
[   25.330188]  kasan_atomics_helper+0xd48/0x5450
[   25.330723]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   25.331241]  ? __kmalloc_cache_noprof+0x184/0x410
[   25.331628]  ? trace_hardirqs_on+0x37/0xe0
[   25.332001]  ? kasan_atomics+0x153/0x310
[   25.332438]  kasan_atomics+0x1dd/0x310
[   25.332932]  ? __pfx_kasan_atomics+0x10/0x10
[   25.333403]  ? __pfx_kasan_atomics+0x10/0x10
[   25.333831]  kunit_try_run_case+0x1b3/0x490
[   25.334295]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.334746]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   25.335266]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   25.335844]  ? __kthread_parkme+0x82/0x160
[   25.336159]  ? preempt_count_sub+0x50/0x80
[   25.336675]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.337092]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   25.337566]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.338125]  kthread+0x257/0x310
[   25.338542]  ? __pfx_kthread+0x10/0x10
[   25.338953]  ret_from_fork+0x41/0x80
[   25.339310]  ? __pfx_kthread+0x10/0x10
[   25.339661]  ret_from_fork_asm+0x1a/0x30
[   25.339988]  </TASK>
[   25.340184] 
[   25.340341] Allocated by task 272:
[   25.340704]  kasan_save_stack+0x3d/0x60
[   25.341129]  kasan_save_track+0x18/0x40
[   25.341610]  kasan_save_alloc_info+0x3b/0x50
[   25.342090]  __kasan_kmalloc+0xb7/0xc0
[   25.342538]  __kmalloc_cache_noprof+0x184/0x410
[   25.343055]  kasan_atomics+0x96/0x310
[   25.343468]  kunit_try_run_case+0x1b3/0x490
[   25.345873]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.346228]  kthread+0x257/0x310
[   25.346477]  ret_from_fork+0x41/0x80
[   25.347459]  ret_from_fork_asm+0x1a/0x30
[   25.348964] 
[   25.349200] The buggy address belongs to the object at ffff8881028c7700
[   25.349200]  which belongs to the cache kmalloc-64 of size 64
[   25.350259] The buggy address is located 0 bytes to the right of
[   25.350259]  allocated 48-byte region [ffff8881028c7700, ffff8881028c7730)
[   25.351350] 
[   25.351638] The buggy address belongs to the physical page:
[   25.352106] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1028c7
[   25.352675] flags: 0x200000000000000(node=0|zone=2)
[   25.352987] page_type: f5(slab)
[   25.353234] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   25.353800] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   25.354500] page dumped because: kasan: bad access detected
[   25.355046] 
[   25.355310] Memory state around the buggy address:
[   25.355825]  ffff8881028c7600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.356467]  ffff8881028c7680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.357139] >ffff8881028c7700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   25.357694]                                      ^
[   25.358073]  ffff8881028c7780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.358690]  ffff8881028c7800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.359060] ==================================================================
[   24.687730] ==================================================================
[   24.688392] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a1/0x5450
[   24.689408] Write of size 4 at addr ffff8881028c7730 by task kunit_try_catch/272
[   24.689989] 
[   24.690256] CPU: 0 UID: 0 PID: 272 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241126 #1
[   24.691933] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.692191] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   24.692987] Call Trace:
[   24.693289]  <TASK>
[   24.693632]  dump_stack_lvl+0x73/0xb0
[   24.694082]  print_report+0xd1/0x640
[   24.694454]  ? __virt_addr_valid+0x1db/0x2d0
[   24.694942]  ? kasan_complete_mode_report_info+0x2a/0x200
[   24.695340]  kasan_report+0x102/0x140
[   24.695694]  ? kasan_atomics_helper+0x4a1/0x5450
[   24.696006]  ? kasan_atomics_helper+0x4a1/0x5450
[   24.696520]  kasan_check_range+0x10c/0x1c0
[   24.697859]  __kasan_check_write+0x18/0x20
[   24.698319]  kasan_atomics_helper+0x4a1/0x5450
[   24.698870]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   24.699374]  ? __kmalloc_cache_noprof+0x184/0x410
[   24.699930]  ? trace_hardirqs_on+0x37/0xe0
[   24.700375]  ? kasan_atomics+0x153/0x310
[   24.700896]  kasan_atomics+0x1dd/0x310
[   24.701331]  ? __pfx_kasan_atomics+0x10/0x10
[   24.701719]  ? __pfx_kasan_atomics+0x10/0x10
[   24.702038]  kunit_try_run_case+0x1b3/0x490
[   24.702356]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.703207]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   24.703773]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   24.704366]  ? __kthread_parkme+0x82/0x160
[   24.704885]  ? preempt_count_sub+0x50/0x80
[   24.705397]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.705799]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   24.706189]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.706561]  kthread+0x257/0x310
[   24.706881]  ? __pfx_kthread+0x10/0x10
[   24.707277]  ret_from_fork+0x41/0x80
[   24.707760]  ? __pfx_kthread+0x10/0x10
[   24.708196]  ret_from_fork_asm+0x1a/0x30
[   24.708729]  </TASK>
[   24.709009] 
[   24.709224] Allocated by task 272:
[   24.709656]  kasan_save_stack+0x3d/0x60
[   24.710105]  kasan_save_track+0x18/0x40
[   24.710537]  kasan_save_alloc_info+0x3b/0x50
[   24.711039]  __kasan_kmalloc+0xb7/0xc0
[   24.711458]  __kmalloc_cache_noprof+0x184/0x410
[   24.711992]  kasan_atomics+0x96/0x310
[   24.712364]  kunit_try_run_case+0x1b3/0x490
[   24.712868]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.713312]  kthread+0x257/0x310
[   24.713630]  ret_from_fork+0x41/0x80
[   24.713906]  ret_from_fork_asm+0x1a/0x30
[   24.714351] 
[   24.714629] The buggy address belongs to the object at ffff8881028c7700
[   24.714629]  which belongs to the cache kmalloc-64 of size 64
[   24.715620] The buggy address is located 0 bytes to the right of
[   24.715620]  allocated 48-byte region [ffff8881028c7700, ffff8881028c7730)
[   24.716215] 
[   24.716383] The buggy address belongs to the physical page:
[   24.716757] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1028c7
[   24.717177] flags: 0x200000000000000(node=0|zone=2)
[   24.717507] page_type: f5(slab)
[   24.717930] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   24.718676] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   24.719350] page dumped because: kasan: bad access detected
[   24.719905] 
[   24.720137] Memory state around the buggy address:
[   24.720635]  ffff8881028c7600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.721275]  ffff8881028c7680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.721931] >ffff8881028c7700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   24.724617]                                      ^
[   24.725105]  ffff8881028c7780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.727093]  ffff8881028c7800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.727801] ==================================================================
[   25.958502] ==================================================================
[   25.960556] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4eb0/0x5450
[   25.961127] Read of size 8 at addr ffff8881028c7730 by task kunit_try_catch/272
[   25.961882] 
[   25.962751] CPU: 0 UID: 0 PID: 272 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241126 #1
[   25.963776] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.964092] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   25.964998] Call Trace:
[   25.965780]  <TASK>
[   25.966049]  dump_stack_lvl+0x73/0xb0
[   25.966417]  print_report+0xd1/0x640
[   25.966835]  ? __virt_addr_valid+0x1db/0x2d0
[   25.967891]  ? kasan_complete_mode_report_info+0x2a/0x200
[   25.968387]  kasan_report+0x102/0x140
[   25.969070]  ? kasan_atomics_helper+0x4eb0/0x5450
[   25.969718]  ? kasan_atomics_helper+0x4eb0/0x5450
[   25.970432]  __asan_report_load8_noabort+0x18/0x20
[   25.971071]  kasan_atomics_helper+0x4eb0/0x5450
[   25.971571]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   25.972409]  ? __kmalloc_cache_noprof+0x184/0x410
[   25.972913]  ? trace_hardirqs_on+0x37/0xe0
[   25.973297]  ? kasan_atomics+0x153/0x310
[   25.974227]  kasan_atomics+0x1dd/0x310
[   25.974761]  ? __pfx_kasan_atomics+0x10/0x10
[   25.975335]  ? __pfx_kasan_atomics+0x10/0x10
[   25.975810]  kunit_try_run_case+0x1b3/0x490
[   25.976193]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.976722]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   25.977155]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   25.978175]  ? __kthread_parkme+0x82/0x160
[   25.978464]  ? preempt_count_sub+0x50/0x80
[   25.979340]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.979715]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   25.980554]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.981292]  kthread+0x257/0x310
[   25.981949]  ? __pfx_kthread+0x10/0x10
[   25.982519]  ret_from_fork+0x41/0x80
[   25.983232]  ? __pfx_kthread+0x10/0x10
[   25.983644]  ret_from_fork_asm+0x1a/0x30
[   25.984545]  </TASK>
[   25.984965] 
[   25.985204] Allocated by task 272:
[   25.985581]  kasan_save_stack+0x3d/0x60
[   25.986017]  kasan_save_track+0x18/0x40
[   25.986400]  kasan_save_alloc_info+0x3b/0x50
[   25.987521]  __kasan_kmalloc+0xb7/0xc0
[   25.988131]  __kmalloc_cache_noprof+0x184/0x410
[   25.988556]  kasan_atomics+0x96/0x310
[   25.988974]  kunit_try_run_case+0x1b3/0x490
[   25.989357]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.989913]  kthread+0x257/0x310
[   25.990341]  ret_from_fork+0x41/0x80
[   25.990897]  ret_from_fork_asm+0x1a/0x30
[   25.991225] 
[   25.991472] The buggy address belongs to the object at ffff8881028c7700
[   25.991472]  which belongs to the cache kmalloc-64 of size 64
[   25.992145] The buggy address is located 0 bytes to the right of
[   25.992145]  allocated 48-byte region [ffff8881028c7700, ffff8881028c7730)
[   25.994294] 
[   25.994838] The buggy address belongs to the physical page:
[   25.995168] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1028c7
[   25.996062] flags: 0x200000000000000(node=0|zone=2)
[   25.996404] page_type: f5(slab)
[   25.996968] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   25.997852] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   25.998527] page dumped because: kasan: bad access detected
[   25.999163] 
[   25.999389] Memory state around the buggy address:
[   26.000477]  ffff8881028c7600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.001142]  ffff8881028c7680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.001778] >ffff8881028c7700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   26.002273]                                      ^
[   26.003246]  ffff8881028c7780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.003746]  ffff8881028c7800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.004579] ==================================================================
[   26.090868] ==================================================================
[   26.091311] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x151e/0x5450
[   26.091743] Write of size 8 at addr ffff8881028c7730 by task kunit_try_catch/272
[   26.092341] 
[   26.092642] CPU: 0 UID: 0 PID: 272 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241126 #1
[   26.093617] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.094178] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   26.094665] Call Trace:
[   26.094980]  <TASK>
[   26.095297]  dump_stack_lvl+0x73/0xb0
[   26.095755]  print_report+0xd1/0x640
[   26.097343]  ? __virt_addr_valid+0x1db/0x2d0
[   26.097826]  ? kasan_complete_mode_report_info+0x2a/0x200
[   26.100070]  kasan_report+0x102/0x140
[   26.100374]  ? kasan_atomics_helper+0x151e/0x5450
[   26.100886]  ? kasan_atomics_helper+0x151e/0x5450
[   26.101400]  kasan_check_range+0x10c/0x1c0
[   26.101857]  __kasan_check_write+0x18/0x20
[   26.102213]  kasan_atomics_helper+0x151e/0x5450
[   26.102584]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   26.103169]  ? __kmalloc_cache_noprof+0x184/0x410
[   26.103694]  ? trace_hardirqs_on+0x37/0xe0
[   26.104564]  ? kasan_atomics+0x153/0x310
[   26.104938]  kasan_atomics+0x1dd/0x310
[   26.105281]  ? __pfx_kasan_atomics+0x10/0x10
[   26.105805]  ? __pfx_kasan_atomics+0x10/0x10
[   26.106303]  kunit_try_run_case+0x1b3/0x490
[   26.107370]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.108417]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   26.109077]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   26.109761]  ? __kthread_parkme+0x82/0x160
[   26.110249]  ? preempt_count_sub+0x50/0x80
[   26.110860]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.111477]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   26.112238]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.112952]  kthread+0x257/0x310
[   26.113419]  ? __pfx_kthread+0x10/0x10
[   26.114001]  ret_from_fork+0x41/0x80
[   26.114540]  ? __pfx_kthread+0x10/0x10
[   26.115033]  ret_from_fork_asm+0x1a/0x30
[   26.115406]  </TASK>
[   26.115755] 
[   26.115929] Allocated by task 272:
[   26.116184]  kasan_save_stack+0x3d/0x60
[   26.116693]  kasan_save_track+0x18/0x40
[   26.117019]  kasan_save_alloc_info+0x3b/0x50
[   26.117548]  __kasan_kmalloc+0xb7/0xc0
[   26.117896]  __kmalloc_cache_noprof+0x184/0x410
[   26.118444]  kasan_atomics+0x96/0x310
[   26.118808]  kunit_try_run_case+0x1b3/0x490
[   26.119103]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.119727]  kthread+0x257/0x310
[   26.120117]  ret_from_fork+0x41/0x80
[   26.120617]  ret_from_fork_asm+0x1a/0x30
[   26.121081] 
[   26.121314] The buggy address belongs to the object at ffff8881028c7700
[   26.121314]  which belongs to the cache kmalloc-64 of size 64
[   26.122005] The buggy address is located 0 bytes to the right of
[   26.122005]  allocated 48-byte region [ffff8881028c7700, ffff8881028c7730)
[   26.123164] 
[   26.123402] The buggy address belongs to the physical page:
[   26.123964] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1028c7
[   26.124519] flags: 0x200000000000000(node=0|zone=2)
[   26.125085] page_type: f5(slab)
[   26.125361] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   26.126023] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   26.126424] page dumped because: kasan: bad access detected
[   26.126810] 
[   26.127043] Memory state around the buggy address:
[   26.127604]  ffff8881028c7600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.128251]  ffff8881028c7680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.128856] >ffff8881028c7700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   26.129439]                                      ^
[   26.129885]  ffff8881028c7780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.130428]  ffff8881028c7800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.130871] ==================================================================
[   26.051865] ==================================================================
[   26.052306] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x50d6/0x5450
[   26.053097] Write of size 8 at addr ffff8881028c7730 by task kunit_try_catch/272
[   26.053428] 
[   26.053618] CPU: 0 UID: 0 PID: 272 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241126 #1
[   26.054378] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.054825] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   26.055651] Call Trace:
[   26.056061]  <TASK>
[   26.056375]  dump_stack_lvl+0x73/0xb0
[   26.056754]  print_report+0xd1/0x640
[   26.057222]  ? __virt_addr_valid+0x1db/0x2d0
[   26.057735]  ? kasan_complete_mode_report_info+0x2a/0x200
[   26.058219]  kasan_report+0x102/0x140
[   26.058828]  ? kasan_atomics_helper+0x50d6/0x5450
[   26.059207]  ? kasan_atomics_helper+0x50d6/0x5450
[   26.059574]  __asan_report_store8_noabort+0x1b/0x30
[   26.059907]  kasan_atomics_helper+0x50d6/0x5450
[   26.060226]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   26.060731]  ? __kmalloc_cache_noprof+0x184/0x410
[   26.061196]  ? trace_hardirqs_on+0x37/0xe0
[   26.061771]  ? kasan_atomics+0x153/0x310
[   26.062272]  kasan_atomics+0x1dd/0x310
[   26.062634]  ? __pfx_kasan_atomics+0x10/0x10
[   26.063119]  ? __pfx_kasan_atomics+0x10/0x10
[   26.063525]  kunit_try_run_case+0x1b3/0x490
[   26.064041]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.064582]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   26.065121]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   26.065535]  ? __kthread_parkme+0x82/0x160
[   26.066073]  ? preempt_count_sub+0x50/0x80
[   26.066586]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.067074]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   26.067533]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.068132]  kthread+0x257/0x310
[   26.068456]  ? __pfx_kthread+0x10/0x10
[   26.069069]  ret_from_fork+0x41/0x80
[   26.069526]  ? __pfx_kthread+0x10/0x10
[   26.069957]  ret_from_fork_asm+0x1a/0x30
[   26.070326]  </TASK>
[   26.070556] 
[   26.070724] Allocated by task 272:
[   26.070963]  kasan_save_stack+0x3d/0x60
[   26.071446]  kasan_save_track+0x18/0x40
[   26.071909]  kasan_save_alloc_info+0x3b/0x50
[   26.072376]  __kasan_kmalloc+0xb7/0xc0
[   26.072810]  __kmalloc_cache_noprof+0x184/0x410
[   26.073423]  kasan_atomics+0x96/0x310
[   26.075123]  kunit_try_run_case+0x1b3/0x490
[   26.075530]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.076064]  kthread+0x257/0x310
[   26.076451]  ret_from_fork+0x41/0x80
[   26.078868]  ret_from_fork_asm+0x1a/0x30
[   26.079187] 
[   26.079347] The buggy address belongs to the object at ffff8881028c7700
[   26.079347]  which belongs to the cache kmalloc-64 of size 64
[   26.080585] The buggy address is located 0 bytes to the right of
[   26.080585]  allocated 48-byte region [ffff8881028c7700, ffff8881028c7730)
[   26.081375] 
[   26.081657] The buggy address belongs to the physical page:
[   26.082122] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1028c7
[   26.082630] flags: 0x200000000000000(node=0|zone=2)
[   26.083152] page_type: f5(slab)
[   26.083505] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   26.083992] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   26.084382] page dumped because: kasan: bad access detected
[   26.084916] 
[   26.085174] Memory state around the buggy address:
[   26.085814]  ffff8881028c7600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.086467]  ffff8881028c7680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.087364] >ffff8881028c7700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   26.088021]                                      ^
[   26.088557]  ffff8881028c7780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.088941]  ffff8881028c7800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.089589] ==================================================================
[   26.632542] ==================================================================
[   26.633232] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1ce2/0x5450
[   26.633963] Write of size 8 at addr ffff8881028c7730 by task kunit_try_catch/272
[   26.634761] 
[   26.635027] CPU: 0 UID: 0 PID: 272 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241126 #1
[   26.635985] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.636407] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   26.637182] Call Trace:
[   26.637524]  <TASK>
[   26.637868]  dump_stack_lvl+0x73/0xb0
[   26.638447]  print_report+0xd1/0x640
[   26.638969]  ? __virt_addr_valid+0x1db/0x2d0
[   26.639452]  ? kasan_complete_mode_report_info+0x2a/0x200
[   26.639962]  kasan_report+0x102/0x140
[   26.640539]  ? kasan_atomics_helper+0x1ce2/0x5450
[   26.641161]  ? kasan_atomics_helper+0x1ce2/0x5450
[   26.641823]  kasan_check_range+0x10c/0x1c0
[   26.642315]  __kasan_check_write+0x18/0x20
[   26.642688]  kasan_atomics_helper+0x1ce2/0x5450
[   26.643258]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   26.643957]  ? __kmalloc_cache_noprof+0x184/0x410
[   26.644441]  ? trace_hardirqs_on+0x37/0xe0
[   26.645020]  ? kasan_atomics+0x153/0x310
[   26.645620]  kasan_atomics+0x1dd/0x310
[   26.645976]  ? __pfx_kasan_atomics+0x10/0x10
[   26.646303]  ? __pfx_kasan_atomics+0x10/0x10
[   26.646877]  kunit_try_run_case+0x1b3/0x490
[   26.647391]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.648103]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   26.648769]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   26.649451]  ? __kthread_parkme+0x82/0x160
[   26.650082]  ? preempt_count_sub+0x50/0x80
[   26.650773]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.651374]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   26.652272]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.653048]  kthread+0x257/0x310
[   26.653615]  ? __pfx_kthread+0x10/0x10
[   26.654230]  ret_from_fork+0x41/0x80
[   26.654821]  ? __pfx_kthread+0x10/0x10
[   26.655449]  ret_from_fork_asm+0x1a/0x30
[   26.656064]  </TASK>
[   26.656273] 
[   26.656433] Allocated by task 272:
[   26.656950]  kasan_save_stack+0x3d/0x60
[   26.657426]  kasan_save_track+0x18/0x40
[   26.658126]  kasan_save_alloc_info+0x3b/0x50
[   26.658853]  __kasan_kmalloc+0xb7/0xc0
[   26.659314]  __kmalloc_cache_noprof+0x184/0x410
[   26.659945]  kasan_atomics+0x96/0x310
[   26.660460]  kunit_try_run_case+0x1b3/0x490
[   26.661144]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.661896]  kthread+0x257/0x310
[   26.662380]  ret_from_fork+0x41/0x80
[   26.662963]  ret_from_fork_asm+0x1a/0x30
[   26.663626] 
[   26.663956] The buggy address belongs to the object at ffff8881028c7700
[   26.663956]  which belongs to the cache kmalloc-64 of size 64
[   26.665052] The buggy address is located 0 bytes to the right of
[   26.665052]  allocated 48-byte region [ffff8881028c7700, ffff8881028c7730)
[   26.665922] 
[   26.666188] The buggy address belongs to the physical page:
[   26.666871] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1028c7
[   26.667805] flags: 0x200000000000000(node=0|zone=2)
[   26.668477] page_type: f5(slab)
[   26.669072] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   26.669996] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   26.670904] page dumped because: kasan: bad access detected
[   26.671637] 
[   26.671970] Memory state around the buggy address:
[   26.672568]  ffff8881028c7600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.673458]  ffff8881028c7680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.674280] >ffff8881028c7700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   26.674771]                                      ^
[   26.675059]  ffff8881028c7780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.675563]  ffff8881028c7800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.676236] ==================================================================
[   27.139446] ==================================================================
[   27.140415] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x224d/0x5450
[   27.141066] Write of size 8 at addr ffff8881028c7730 by task kunit_try_catch/272
[   27.141465] 
[   27.141791] CPU: 0 UID: 0 PID: 272 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241126 #1
[   27.142518] Tainted: [B]=BAD_PAGE, [N]=TEST
[   27.142954] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   27.143413] Call Trace:
[   27.143710]  <TASK>
[   27.144011]  dump_stack_lvl+0x73/0xb0
[   27.144450]  print_report+0xd1/0x640
[   27.144949]  ? __virt_addr_valid+0x1db/0x2d0
[   27.145462]  ? kasan_complete_mode_report_info+0x2a/0x200
[   27.146067]  kasan_report+0x102/0x140
[   27.146629]  ? kasan_atomics_helper+0x224d/0x5450
[   27.147084]  ? kasan_atomics_helper+0x224d/0x5450
[   27.147722]  kasan_check_range+0x10c/0x1c0
[   27.148177]  __kasan_check_write+0x18/0x20
[   27.148652]  kasan_atomics_helper+0x224d/0x5450
[   27.149154]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   27.149511]  ? __kmalloc_cache_noprof+0x184/0x410
[   27.150059]  ? trace_hardirqs_on+0x37/0xe0
[   27.150356]  ? kasan_atomics+0x153/0x310
[   27.150744]  kasan_atomics+0x1dd/0x310
[   27.151050]  ? __pfx_kasan_atomics+0x10/0x10
[   27.151361]  ? __pfx_kasan_atomics+0x10/0x10
[   27.151895]  kunit_try_run_case+0x1b3/0x490
[   27.152370]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.152920]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   27.153410]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   27.154001]  ? __kthread_parkme+0x82/0x160
[   27.154465]  ? preempt_count_sub+0x50/0x80
[   27.154990]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.155525]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   27.156161]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.156705]  kthread+0x257/0x310
[   27.156979]  ? __pfx_kthread+0x10/0x10
[   27.157252]  ret_from_fork+0x41/0x80
[   27.157544]  ? __pfx_kthread+0x10/0x10
[   27.158019]  ret_from_fork_asm+0x1a/0x30
[   27.158517]  </TASK>
[   27.158848] 
[   27.159076] Allocated by task 272:
[   27.159435]  kasan_save_stack+0x3d/0x60
[   27.159928]  kasan_save_track+0x18/0x40
[   27.160355]  kasan_save_alloc_info+0x3b/0x50
[   27.160878]  __kasan_kmalloc+0xb7/0xc0
[   27.161265]  __kmalloc_cache_noprof+0x184/0x410
[   27.161631]  kasan_atomics+0x96/0x310
[   27.161910]  kunit_try_run_case+0x1b3/0x490
[   27.162207]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.162716]  kthread+0x257/0x310
[   27.163072]  ret_from_fork+0x41/0x80
[   27.163498]  ret_from_fork_asm+0x1a/0x30
[   27.163972] 
[   27.164202] The buggy address belongs to the object at ffff8881028c7700
[   27.164202]  which belongs to the cache kmalloc-64 of size 64
[   27.165284] The buggy address is located 0 bytes to the right of
[   27.165284]  allocated 48-byte region [ffff8881028c7700, ffff8881028c7730)
[   27.166284] 
[   27.166453] The buggy address belongs to the physical page:
[   27.166833] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1028c7
[   27.167242] flags: 0x200000000000000(node=0|zone=2)
[   27.167776] page_type: f5(slab)
[   27.168149] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   27.168886] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   27.169561] page dumped because: kasan: bad access detected
[   27.170099] 
[   27.170330] Memory state around the buggy address:
[   27.170847]  ffff8881028c7600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.171479]  ffff8881028c7680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.171924] >ffff8881028c7700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   27.172567]                                      ^
[   27.173078]  ffff8881028c7780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.173568]  ffff8881028c7800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.174097] ==================================================================
[   24.731116] ==================================================================
[   24.731783] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b3c/0x5450
[   24.732139] Write of size 4 at addr ffff8881028c7730 by task kunit_try_catch/272
[   24.732595] 
[   24.733124] CPU: 0 UID: 0 PID: 272 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241126 #1
[   24.734579] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.735003] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   24.735915] Call Trace:
[   24.736140]  <TASK>
[   24.736339]  dump_stack_lvl+0x73/0xb0
[   24.736838]  print_report+0xd1/0x640
[   24.737267]  ? __virt_addr_valid+0x1db/0x2d0
[   24.737856]  ? kasan_complete_mode_report_info+0x2a/0x200
[   24.738452]  kasan_report+0x102/0x140
[   24.739015]  ? kasan_atomics_helper+0x4b3c/0x5450
[   24.739346]  ? kasan_atomics_helper+0x4b3c/0x5450
[   24.739701]  __asan_report_store4_noabort+0x1b/0x30
[   24.740022]  kasan_atomics_helper+0x4b3c/0x5450
[   24.740558]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   24.741127]  ? __kmalloc_cache_noprof+0x184/0x410
[   24.741846]  ? trace_hardirqs_on+0x37/0xe0
[   24.742341]  ? kasan_atomics+0x153/0x310
[   24.742963]  kasan_atomics+0x1dd/0x310
[   24.743407]  ? __pfx_kasan_atomics+0x10/0x10
[   24.744050]  ? __pfx_kasan_atomics+0x10/0x10
[   24.744470]  kunit_try_run_case+0x1b3/0x490
[   24.745072]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.746725]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   24.747377]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   24.747806]  ? __kthread_parkme+0x82/0x160
[   24.748436]  ? preempt_count_sub+0x50/0x80
[   24.749052]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.749670]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   24.750136]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.750731]  kthread+0x257/0x310
[   24.751132]  ? __pfx_kthread+0x10/0x10
[   24.751553]  ret_from_fork+0x41/0x80
[   24.752010]  ? __pfx_kthread+0x10/0x10
[   24.752625]  ret_from_fork_asm+0x1a/0x30
[   24.753224]  </TASK>
[   24.753665] 
[   24.754004] Allocated by task 272:
[   24.754511]  kasan_save_stack+0x3d/0x60
[   24.755085]  kasan_save_track+0x18/0x40
[   24.755687]  kasan_save_alloc_info+0x3b/0x50
[   24.755963]  __kasan_kmalloc+0xb7/0xc0
[   24.756626]  __kmalloc_cache_noprof+0x184/0x410
[   24.757222]  kasan_atomics+0x96/0x310
[   24.757719]  kunit_try_run_case+0x1b3/0x490
[   24.758223]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.758873]  kthread+0x257/0x310
[   24.759314]  ret_from_fork+0x41/0x80
[   24.759711]  ret_from_fork_asm+0x1a/0x30
[   24.760263] 
[   24.760549] The buggy address belongs to the object at ffff8881028c7700
[   24.760549]  which belongs to the cache kmalloc-64 of size 64
[   24.761769] The buggy address is located 0 bytes to the right of
[   24.761769]  allocated 48-byte region [ffff8881028c7700, ffff8881028c7730)
[   24.762792] 
[   24.763031] The buggy address belongs to the physical page:
[   24.763383] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1028c7
[   24.764036] flags: 0x200000000000000(node=0|zone=2)
[   24.764540] page_type: f5(slab)
[   24.764918] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   24.765415] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   24.766195] page dumped because: kasan: bad access detected
[   24.766719] 
[   24.767024] Memory state around the buggy address:
[   24.767457]  ffff8881028c7600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.768270]  ffff8881028c7680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.768903] >ffff8881028c7700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   24.769694]                                      ^
[   24.770148]  ffff8881028c7780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.770947]  ffff8881028c7800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.771537] ==================================================================
[   26.308653] ==================================================================
[   26.309667] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1819/0x5450
[   26.310515] Write of size 8 at addr ffff8881028c7730 by task kunit_try_catch/272
[   26.311173] 
[   26.311433] CPU: 0 UID: 0 PID: 272 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241126 #1
[   26.312084] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.312411] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   26.313264] Call Trace:
[   26.313663]  <TASK>
[   26.314049]  dump_stack_lvl+0x73/0xb0
[   26.314622]  print_report+0xd1/0x640
[   26.315222]  ? __virt_addr_valid+0x1db/0x2d0
[   26.315874]  ? kasan_complete_mode_report_info+0x2a/0x200
[   26.316706]  kasan_report+0x102/0x140
[   26.317236]  ? kasan_atomics_helper+0x1819/0x5450
[   26.317889]  ? kasan_atomics_helper+0x1819/0x5450
[   26.318462]  kasan_check_range+0x10c/0x1c0
[   26.318983]  __kasan_check_write+0x18/0x20
[   26.319433]  kasan_atomics_helper+0x1819/0x5450
[   26.320171]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   26.320787]  ? __kmalloc_cache_noprof+0x184/0x410
[   26.321356]  ? trace_hardirqs_on+0x37/0xe0
[   26.321900]  ? kasan_atomics+0x153/0x310
[   26.322443]  kasan_atomics+0x1dd/0x310
[   26.322854]  ? __pfx_kasan_atomics+0x10/0x10
[   26.323434]  ? __pfx_kasan_atomics+0x10/0x10
[   26.324162]  kunit_try_run_case+0x1b3/0x490
[   26.324653]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.325215]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   26.326009]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   26.326691]  ? __kthread_parkme+0x82/0x160
[   26.327213]  ? preempt_count_sub+0x50/0x80
[   26.327682]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.328120]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   26.328561]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.328959]  kthread+0x257/0x310
[   26.329357]  ? __pfx_kthread+0x10/0x10
[   26.329879]  ret_from_fork+0x41/0x80
[   26.330255]  ? __pfx_kthread+0x10/0x10
[   26.330648]  ret_from_fork_asm+0x1a/0x30
[   26.331116]  </TASK>
[   26.331407] 
[   26.331651] Allocated by task 272:
[   26.331920]  kasan_save_stack+0x3d/0x60
[   26.332205]  kasan_save_track+0x18/0x40
[   26.332691]  kasan_save_alloc_info+0x3b/0x50
[   26.333146]  __kasan_kmalloc+0xb7/0xc0
[   26.333618]  __kmalloc_cache_noprof+0x184/0x410
[   26.334105]  kasan_atomics+0x96/0x310
[   26.334523]  kunit_try_run_case+0x1b3/0x490
[   26.334866]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.335197]  kthread+0x257/0x310
[   26.335632]  ret_from_fork+0x41/0x80
[   26.336039]  ret_from_fork_asm+0x1a/0x30
[   26.336475] 
[   26.336778] The buggy address belongs to the object at ffff8881028c7700
[   26.336778]  which belongs to the cache kmalloc-64 of size 64
[   26.338630] The buggy address is located 0 bytes to the right of
[   26.338630]  allocated 48-byte region [ffff8881028c7700, ffff8881028c7730)
[   26.340083] 
[   26.340324] The buggy address belongs to the physical page:
[   26.341375] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1028c7
[   26.342150] flags: 0x200000000000000(node=0|zone=2)
[   26.342635] page_type: f5(slab)
[   26.342973] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   26.343404] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   26.344060] page dumped because: kasan: bad access detected
[   26.344705] 
[   26.344885] Memory state around the buggy address:
[   26.345378]  ffff8881028c7600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.345845]  ffff8881028c7680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.346474] >ffff8881028c7700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   26.347152]                                      ^
[   26.347507]  ffff8881028c7780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.348153]  ffff8881028c7800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.348564] ==================================================================
[   25.645513] ==================================================================
[   25.646000] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1149/0x5450
[   25.647500] Write of size 4 at addr ffff8881028c7730 by task kunit_try_catch/272
[   25.648128] 
[   25.648321] CPU: 0 UID: 0 PID: 272 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241126 #1
[   25.649604] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.649868] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   25.651248] Call Trace:
[   25.651474]  <TASK>
[   25.651711]  dump_stack_lvl+0x73/0xb0
[   25.652005]  print_report+0xd1/0x640
[   25.652295]  ? __virt_addr_valid+0x1db/0x2d0
[   25.653199]  ? kasan_complete_mode_report_info+0x2a/0x200
[   25.653775]  kasan_report+0x102/0x140
[   25.654333]  ? kasan_atomics_helper+0x1149/0x5450
[   25.654944]  ? kasan_atomics_helper+0x1149/0x5450
[   25.655516]  kasan_check_range+0x10c/0x1c0
[   25.656026]  __kasan_check_write+0x18/0x20
[   25.656393]  kasan_atomics_helper+0x1149/0x5450
[   25.657026]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   25.657421]  ? __kmalloc_cache_noprof+0x184/0x410
[   25.658020]  ? trace_hardirqs_on+0x37/0xe0
[   25.658510]  ? kasan_atomics+0x153/0x310
[   25.658962]  kasan_atomics+0x1dd/0x310
[   25.659259]  ? __pfx_kasan_atomics+0x10/0x10
[   25.659647]  ? __pfx_kasan_atomics+0x10/0x10
[   25.660191]  kunit_try_run_case+0x1b3/0x490
[   25.660836]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.661336]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   25.662015]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   25.662445]  ? __kthread_parkme+0x82/0x160
[   25.663075]  ? preempt_count_sub+0x50/0x80
[   25.663520]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.664030]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   25.664629]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.665385]  kthread+0x257/0x310
[   25.665778]  ? __pfx_kthread+0x10/0x10
[   25.666074]  ret_from_fork+0x41/0x80
[   25.666358]  ? __pfx_kthread+0x10/0x10
[   25.666766]  ret_from_fork_asm+0x1a/0x30
[   25.667381]  </TASK>
[   25.667756] 
[   25.667991] Allocated by task 272:
[   25.668389]  kasan_save_stack+0x3d/0x60
[   25.668931]  kasan_save_track+0x18/0x40
[   25.669357]  kasan_save_alloc_info+0x3b/0x50
[   25.669894]  __kasan_kmalloc+0xb7/0xc0
[   25.670291]  __kmalloc_cache_noprof+0x184/0x410
[   25.670620]  kasan_atomics+0x96/0x310
[   25.670893]  kunit_try_run_case+0x1b3/0x490
[   25.671397]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.671975]  kthread+0x257/0x310
[   25.672397]  ret_from_fork+0x41/0x80
[   25.672973]  ret_from_fork_asm+0x1a/0x30
[   25.673350] 
[   25.673596] The buggy address belongs to the object at ffff8881028c7700
[   25.673596]  which belongs to the cache kmalloc-64 of size 64
[   25.674696] The buggy address is located 0 bytes to the right of
[   25.674696]  allocated 48-byte region [ffff8881028c7700, ffff8881028c7730)
[   25.675331] 
[   25.675557] The buggy address belongs to the physical page:
[   25.676082] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1028c7
[   25.676922] flags: 0x200000000000000(node=0|zone=2)
[   25.677456] page_type: f5(slab)
[   25.677927] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   25.678466] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   25.679163] page dumped because: kasan: bad access detected
[   25.679605] 
[   25.679833] Memory state around the buggy address:
[   25.680200]  ffff8881028c7600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.680800]  ffff8881028c7680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.681519] >ffff8881028c7700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   25.682390]                                      ^
[   25.683170]  ffff8881028c7780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.683888]  ffff8881028c7800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.684852] ==================================================================
[   26.216790] ==================================================================
[   26.217639] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x16e8/0x5450
[   26.218304] Write of size 8 at addr ffff8881028c7730 by task kunit_try_catch/272
[   26.219456] 
[   26.219766] CPU: 0 UID: 0 PID: 272 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241126 #1
[   26.220636] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.221047] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   26.222930] Call Trace:
[   26.223200]  <TASK>
[   26.223392]  dump_stack_lvl+0x73/0xb0
[   26.223902]  print_report+0xd1/0x640
[   26.224319]  ? __virt_addr_valid+0x1db/0x2d0
[   26.225318]  ? kasan_complete_mode_report_info+0x2a/0x200
[   26.225876]  kasan_report+0x102/0x140
[   26.226276]  ? kasan_atomics_helper+0x16e8/0x5450
[   26.227214]  ? kasan_atomics_helper+0x16e8/0x5450
[   26.227634]  kasan_check_range+0x10c/0x1c0
[   26.228358]  __kasan_check_write+0x18/0x20
[   26.229265]  kasan_atomics_helper+0x16e8/0x5450
[   26.229698]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   26.230401]  ? __kmalloc_cache_noprof+0x184/0x410
[   26.230818]  ? trace_hardirqs_on+0x37/0xe0
[   26.231200]  ? kasan_atomics+0x153/0x310
[   26.231594]  kasan_atomics+0x1dd/0x310
[   26.232032]  ? __pfx_kasan_atomics+0x10/0x10
[   26.232392]  ? __pfx_kasan_atomics+0x10/0x10
[   26.233017]  kunit_try_run_case+0x1b3/0x490
[   26.234125]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.235362]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   26.235867]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   26.236338]  ? __kthread_parkme+0x82/0x160
[   26.237335]  ? preempt_count_sub+0x50/0x80
[   26.238031]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.238633]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   26.239347]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.240070]  kthread+0x257/0x310
[   26.240467]  ? __pfx_kthread+0x10/0x10
[   26.240985]  ret_from_fork+0x41/0x80
[   26.241308]  ? __pfx_kthread+0x10/0x10
[   26.242404]  ret_from_fork_asm+0x1a/0x30
[   26.242823]  </TASK>
[   26.243113] 
[   26.243616] Allocated by task 272:
[   26.244245]  kasan_save_stack+0x3d/0x60
[   26.244671]  kasan_save_track+0x18/0x40
[   26.245044]  kasan_save_alloc_info+0x3b/0x50
[   26.245396]  __kasan_kmalloc+0xb7/0xc0
[   26.246753]  __kmalloc_cache_noprof+0x184/0x410
[   26.247304]  kasan_atomics+0x96/0x310
[   26.247739]  kunit_try_run_case+0x1b3/0x490
[   26.248604]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.249107]  kthread+0x257/0x310
[   26.249426]  ret_from_fork+0x41/0x80
[   26.249794]  ret_from_fork_asm+0x1a/0x30
[   26.250181] 
[   26.250359] The buggy address belongs to the object at ffff8881028c7700
[   26.250359]  which belongs to the cache kmalloc-64 of size 64
[   26.252538] The buggy address is located 0 bytes to the right of
[   26.252538]  allocated 48-byte region [ffff8881028c7700, ffff8881028c7730)
[   26.253809] 
[   26.253981] The buggy address belongs to the physical page:
[   26.255024] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1028c7
[   26.255915] flags: 0x200000000000000(node=0|zone=2)
[   26.256335] page_type: f5(slab)
[   26.256720] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   26.257896] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   26.258637] page dumped because: kasan: bad access detected
[   26.259440] 
[   26.259705] Memory state around the buggy address:
[   26.260413]  ffff8881028c7600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.260924]  ffff8881028c7680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.261531] >ffff8881028c7700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   26.262038]                                      ^
[   26.262439]  ffff8881028c7780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.263615]  ffff8881028c7800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.264394] ==================================================================
[   26.943522] ==================================================================
[   26.944535] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4f9a/0x5450
[   26.945030] Read of size 8 at addr ffff8881028c7730 by task kunit_try_catch/272
[   26.946557] 
[   26.946795] CPU: 0 UID: 0 PID: 272 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241126 #1
[   26.947300] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.947781] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   26.948568] Call Trace:
[   26.948929]  <TASK>
[   26.949214]  dump_stack_lvl+0x73/0xb0
[   26.949621]  print_report+0xd1/0x640
[   26.950060]  ? __virt_addr_valid+0x1db/0x2d0
[   26.950515]  ? kasan_complete_mode_report_info+0x2a/0x200
[   26.951085]  kasan_report+0x102/0x140
[   26.951538]  ? kasan_atomics_helper+0x4f9a/0x5450
[   26.951930]  ? kasan_atomics_helper+0x4f9a/0x5450
[   26.952440]  __asan_report_load8_noabort+0x18/0x20
[   26.952847]  kasan_atomics_helper+0x4f9a/0x5450
[   26.953345]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   26.953884]  ? __kmalloc_cache_noprof+0x184/0x410
[   26.954382]  ? trace_hardirqs_on+0x37/0xe0
[   26.954840]  ? kasan_atomics+0x153/0x310
[   26.955317]  kasan_atomics+0x1dd/0x310
[   26.955744]  ? __pfx_kasan_atomics+0x10/0x10
[   26.956175]  ? __pfx_kasan_atomics+0x10/0x10
[   26.956698]  kunit_try_run_case+0x1b3/0x490
[   26.957169]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.957522]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   26.958025]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   26.958613]  ? __kthread_parkme+0x82/0x160
[   26.959017]  ? preempt_count_sub+0x50/0x80
[   26.959355]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.959849]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   26.960218]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.961946]  kthread+0x257/0x310
[   26.962387]  ? __pfx_kthread+0x10/0x10
[   26.962896]  ret_from_fork+0x41/0x80
[   26.963337]  ? __pfx_kthread+0x10/0x10
[   26.963829]  ret_from_fork_asm+0x1a/0x30
[   26.964302]  </TASK>
[   26.964650] 
[   26.964885] Allocated by task 272:
[   26.965280]  kasan_save_stack+0x3d/0x60
[   26.965670]  kasan_save_track+0x18/0x40
[   26.965955]  kasan_save_alloc_info+0x3b/0x50
[   26.966259]  __kasan_kmalloc+0xb7/0xc0
[   26.966544]  __kmalloc_cache_noprof+0x184/0x410
[   26.967066]  kasan_atomics+0x96/0x310
[   26.967506]  kunit_try_run_case+0x1b3/0x490
[   26.968021]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.968650]  kthread+0x257/0x310
[   26.969035]  ret_from_fork+0x41/0x80
[   26.969507]  ret_from_fork_asm+0x1a/0x30
[   26.969980] 
[   26.970269] The buggy address belongs to the object at ffff8881028c7700
[   26.970269]  which belongs to the cache kmalloc-64 of size 64
[   26.971182] The buggy address is located 0 bytes to the right of
[   26.971182]  allocated 48-byte region [ffff8881028c7700, ffff8881028c7730)
[   26.972085] 
[   26.972335] The buggy address belongs to the physical page:
[   26.972789] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1028c7
[   26.973390] flags: 0x200000000000000(node=0|zone=2)
[   26.973966] page_type: f5(slab)
[   26.974357] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   26.975001] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   26.975659] page dumped because: kasan: bad access detected
[   26.976186] 
[   26.976362] Memory state around the buggy address:
[   26.976923]  ffff8881028c7600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.977316]  ffff8881028c7680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.977763] >ffff8881028c7700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   26.978149]                                      ^
[   26.978438]  ffff8881028c7780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.979175]  ffff8881028c7800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.981424] ==================================================================
[   26.265634] ==================================================================
[   26.267100] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1780/0x5450
[   26.268221] Write of size 8 at addr ffff8881028c7730 by task kunit_try_catch/272
[   26.269024] 
[   26.269803] CPU: 0 UID: 0 PID: 272 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241126 #1
[   26.270633] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.271162] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   26.272018] Call Trace:
[   26.272153]  <TASK>
[   26.272265]  dump_stack_lvl+0x73/0xb0
[   26.272432]  print_report+0xd1/0x640
[   26.272687]  ? __virt_addr_valid+0x1db/0x2d0
[   26.273234]  ? kasan_complete_mode_report_info+0x2a/0x200
[   26.273810]  kasan_report+0x102/0x140
[   26.274241]  ? kasan_atomics_helper+0x1780/0x5450
[   26.274595]  ? kasan_atomics_helper+0x1780/0x5450
[   26.275113]  kasan_check_range+0x10c/0x1c0
[   26.275732]  __kasan_check_write+0x18/0x20
[   26.276276]  kasan_atomics_helper+0x1780/0x5450
[   26.276714]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   26.277043]  ? __kmalloc_cache_noprof+0x184/0x410
[   26.277354]  ? trace_hardirqs_on+0x37/0xe0
[   26.277860]  ? kasan_atomics+0x153/0x310
[   26.278633]  kasan_atomics+0x1dd/0x310
[   26.279206]  ? __pfx_kasan_atomics+0x10/0x10
[   26.279778]  ? __pfx_kasan_atomics+0x10/0x10
[   26.280295]  kunit_try_run_case+0x1b3/0x490
[   26.280974]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.281365]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   26.282011]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   26.282453]  ? __kthread_parkme+0x82/0x160
[   26.283065]  ? preempt_count_sub+0x50/0x80
[   26.283458]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.284098]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   26.284660]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.285190]  kthread+0x257/0x310
[   26.285761]  ? __pfx_kthread+0x10/0x10
[   26.286130]  ret_from_fork+0x41/0x80
[   26.286687]  ? __pfx_kthread+0x10/0x10
[   26.287104]  ret_from_fork_asm+0x1a/0x30
[   26.287614]  </TASK>
[   26.287941] 
[   26.288164] Allocated by task 272:
[   26.288422]  kasan_save_stack+0x3d/0x60
[   26.288897]  kasan_save_track+0x18/0x40
[   26.289425]  kasan_save_alloc_info+0x3b/0x50
[   26.289912]  __kasan_kmalloc+0xb7/0xc0
[   26.290204]  __kmalloc_cache_noprof+0x184/0x410
[   26.290518]  kasan_atomics+0x96/0x310
[   26.290976]  kunit_try_run_case+0x1b3/0x490
[   26.291658]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.292271]  kthread+0x257/0x310
[   26.292672]  ret_from_fork+0x41/0x80
[   26.293220]  ret_from_fork_asm+0x1a/0x30
[   26.293699] 
[   26.293932] The buggy address belongs to the object at ffff8881028c7700
[   26.293932]  which belongs to the cache kmalloc-64 of size 64
[   26.294552] The buggy address is located 0 bytes to the right of
[   26.294552]  allocated 48-byte region [ffff8881028c7700, ffff8881028c7730)
[   26.295873] 
[   26.296168] The buggy address belongs to the physical page:
[   26.296501] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1028c7
[   26.297305] flags: 0x200000000000000(node=0|zone=2)
[   26.297979] page_type: f5(slab)
[   26.298424] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   26.299164] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   26.299906] page dumped because: kasan: bad access detected
[   26.300330] 
[   26.300681] Memory state around the buggy address:
[   26.301340]  ffff8881028c7600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.302618]  ffff8881028c7680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.303716] >ffff8881028c7700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   26.304120]                                      ^
[   26.304410]  ffff8881028c7780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.305149]  ffff8881028c7800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.306709] ==================================================================
[   26.133279] ==================================================================
[   26.134516] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x15b7/0x5450
[   26.135267] Write of size 8 at addr ffff8881028c7730 by task kunit_try_catch/272
[   26.135992] 
[   26.136294] CPU: 0 UID: 0 PID: 272 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241126 #1
[   26.137064] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.137417] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   26.138114] Call Trace:
[   26.138475]  <TASK>
[   26.138840]  dump_stack_lvl+0x73/0xb0
[   26.139287]  print_report+0xd1/0x640
[   26.140293]  ? __virt_addr_valid+0x1db/0x2d0
[   26.140866]  ? kasan_complete_mode_report_info+0x2a/0x200
[   26.141435]  kasan_report+0x102/0x140
[   26.141994]  ? kasan_atomics_helper+0x15b7/0x5450
[   26.142471]  ? kasan_atomics_helper+0x15b7/0x5450
[   26.143106]  kasan_check_range+0x10c/0x1c0
[   26.143542]  __kasan_check_write+0x18/0x20
[   26.144118]  kasan_atomics_helper+0x15b7/0x5450
[   26.144742]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   26.145313]  ? __kmalloc_cache_noprof+0x184/0x410
[   26.145860]  ? trace_hardirqs_on+0x37/0xe0
[   26.146284]  ? kasan_atomics+0x153/0x310
[   26.146837]  kasan_atomics+0x1dd/0x310
[   26.147190]  ? __pfx_kasan_atomics+0x10/0x10
[   26.147525]  ? __pfx_kasan_atomics+0x10/0x10
[   26.147857]  kunit_try_run_case+0x1b3/0x490
[   26.148245]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.148864]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   26.149437]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   26.150050]  ? __kthread_parkme+0x82/0x160
[   26.150696]  ? preempt_count_sub+0x50/0x80
[   26.151172]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.151719]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   26.152082]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.152433]  kthread+0x257/0x310
[   26.153006]  ? __pfx_kthread+0x10/0x10
[   26.153619]  ret_from_fork+0x41/0x80
[   26.154121]  ? __pfx_kthread+0x10/0x10
[   26.154610]  ret_from_fork_asm+0x1a/0x30
[   26.155213]  </TASK>
[   26.155547] 
[   26.155819] Allocated by task 272:
[   26.156252]  kasan_save_stack+0x3d/0x60
[   26.156807]  kasan_save_track+0x18/0x40
[   26.157301]  kasan_save_alloc_info+0x3b/0x50
[   26.157841]  __kasan_kmalloc+0xb7/0xc0
[   26.158348]  __kmalloc_cache_noprof+0x184/0x410
[   26.158856]  kasan_atomics+0x96/0x310
[   26.159338]  kunit_try_run_case+0x1b3/0x490
[   26.159808]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.160146]  kthread+0x257/0x310
[   26.160388]  ret_from_fork+0x41/0x80
[   26.160718]  ret_from_fork_asm+0x1a/0x30
[   26.160998] 
[   26.161290] The buggy address belongs to the object at ffff8881028c7700
[   26.161290]  which belongs to the cache kmalloc-64 of size 64
[   26.162564] The buggy address is located 0 bytes to the right of
[   26.162564]  allocated 48-byte region [ffff8881028c7700, ffff8881028c7730)
[   26.163776] 
[   26.164064] The buggy address belongs to the physical page:
[   26.164632] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1028c7
[   26.165373] flags: 0x200000000000000(node=0|zone=2)
[   26.165967] page_type: f5(slab)
[   26.166419] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   26.166935] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   26.167660] page dumped because: kasan: bad access detected
[   26.168305] 
[   26.168561] Memory state around the buggy address:
[   26.169097]  ffff8881028c7600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.169556]  ffff8881028c7680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.170266] >ffff8881028c7700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   26.170998]                                      ^
[   26.171508]  ffff8881028c7780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.172100]  ffff8881028c7800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.172807] ==================================================================
[   24.440467] ==================================================================
[   24.441764] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4bbe/0x5450
[   24.442417] Read of size 4 at addr ffff8881028c7730 by task kunit_try_catch/272
[   24.442954] 
[   24.443208] CPU: 0 UID: 0 PID: 272 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241126 #1
[   24.443915] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.444324] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   24.445721] Call Trace:
[   24.446020]  <TASK>
[   24.446249]  dump_stack_lvl+0x73/0xb0
[   24.446685]  print_report+0xd1/0x640
[   24.447055]  ? __virt_addr_valid+0x1db/0x2d0
[   24.447905]  ? kasan_complete_mode_report_info+0x2a/0x200
[   24.448508]  kasan_report+0x102/0x140
[   24.449035]  ? kasan_atomics_helper+0x4bbe/0x5450
[   24.449359]  ? kasan_atomics_helper+0x4bbe/0x5450
[   24.449878]  __asan_report_load4_noabort+0x18/0x20
[   24.450305]  kasan_atomics_helper+0x4bbe/0x5450
[   24.450838]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   24.451180]  ? __kmalloc_cache_noprof+0x184/0x410
[   24.451680]  ? trace_hardirqs_on+0x37/0xe0
[   24.451995]  ? kasan_atomics+0x153/0x310
[   24.453010]  kasan_atomics+0x1dd/0x310
[   24.453455]  ? __pfx_kasan_atomics+0x10/0x10
[   24.453815]  ? __pfx_kasan_atomics+0x10/0x10
[   24.454323]  kunit_try_run_case+0x1b3/0x490
[   24.454877]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.455399]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   24.455744]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   24.456249]  ? __kthread_parkme+0x82/0x160
[   24.456727]  ? preempt_count_sub+0x50/0x80
[   24.457040]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.457540]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   24.458619]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.459178]  kthread+0x257/0x310
[   24.459573]  ? __pfx_kthread+0x10/0x10
[   24.460333]  ret_from_fork+0x41/0x80
[   24.460649]  ? __pfx_kthread+0x10/0x10
[   24.461276]  ret_from_fork_asm+0x1a/0x30
[   24.461896]  </TASK>
[   24.462189] 
[   24.462369] Allocated by task 272:
[   24.463150]  kasan_save_stack+0x3d/0x60
[   24.464091]  kasan_save_track+0x18/0x40
[   24.464641]  kasan_save_alloc_info+0x3b/0x50
[   24.465046]  __kasan_kmalloc+0xb7/0xc0
[   24.465429]  __kmalloc_cache_noprof+0x184/0x410
[   24.466070]  kasan_atomics+0x96/0x310
[   24.466615]  kunit_try_run_case+0x1b3/0x490
[   24.466939]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.467545]  kthread+0x257/0x310
[   24.468133]  ret_from_fork+0x41/0x80
[   24.468564]  ret_from_fork_asm+0x1a/0x30
[   24.469042] 
[   24.469232] The buggy address belongs to the object at ffff8881028c7700
[   24.469232]  which belongs to the cache kmalloc-64 of size 64
[   24.470345] The buggy address is located 0 bytes to the right of
[   24.470345]  allocated 48-byte region [ffff8881028c7700, ffff8881028c7730)
[   24.471615] 
[   24.471790] The buggy address belongs to the physical page:
[   24.472652] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1028c7
[   24.473651] flags: 0x200000000000000(node=0|zone=2)
[   24.474164] page_type: f5(slab)
[   24.474549] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   24.475341] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   24.476360] page dumped because: kasan: bad access detected
[   24.477011] 
[   24.477175] Memory state around the buggy address:
[   24.477663]  ffff8881028c7600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.478313]  ffff8881028c7680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.478933] >ffff8881028c7700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   24.479559]                                      ^
[   24.480118]  ffff8881028c7780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.480513]  ffff8881028c7800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.480922] ==================================================================
[   25.870562] ==================================================================
[   25.871897] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x49d0/0x5450
[   25.872671] Read of size 4 at addr ffff8881028c7730 by task kunit_try_catch/272
[   25.873728] 
[   25.874038] CPU: 0 UID: 0 PID: 272 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241126 #1
[   25.874687] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.874974] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   25.875810] Call Trace:
[   25.876164]  <TASK>
[   25.876517]  dump_stack_lvl+0x73/0xb0
[   25.877010]  print_report+0xd1/0x640
[   25.877469]  ? __virt_addr_valid+0x1db/0x2d0
[   25.877937]  ? kasan_complete_mode_report_info+0x2a/0x200
[   25.878551]  kasan_report+0x102/0x140
[   25.879029]  ? kasan_atomics_helper+0x49d0/0x5450
[   25.879376]  ? kasan_atomics_helper+0x49d0/0x5450
[   25.879793]  __asan_report_load4_noabort+0x18/0x20
[   25.880351]  kasan_atomics_helper+0x49d0/0x5450
[   25.880926]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   25.881503]  ? __kmalloc_cache_noprof+0x184/0x410
[   25.882081]  ? trace_hardirqs_on+0x37/0xe0
[   25.882517]  ? kasan_atomics+0x153/0x310
[   25.883032]  kasan_atomics+0x1dd/0x310
[   25.883534]  ? __pfx_kasan_atomics+0x10/0x10
[   25.883940]  ? __pfx_kasan_atomics+0x10/0x10
[   25.884470]  kunit_try_run_case+0x1b3/0x490
[   25.884961]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.885335]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   25.885925]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   25.886369]  ? __kthread_parkme+0x82/0x160
[   25.886750]  ? preempt_count_sub+0x50/0x80
[   25.887133]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.887702]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   25.888340]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.888988]  kthread+0x257/0x310
[   25.889390]  ? __pfx_kthread+0x10/0x10
[   25.889748]  ret_from_fork+0x41/0x80
[   25.890030]  ? __pfx_kthread+0x10/0x10
[   25.890318]  ret_from_fork_asm+0x1a/0x30
[   25.890702]  </TASK>
[   25.890908] 
[   25.891065] Allocated by task 272:
[   25.891301]  kasan_save_stack+0x3d/0x60
[   25.891810]  kasan_save_track+0x18/0x40
[   25.892276]  kasan_save_alloc_info+0x3b/0x50
[   25.892810]  __kasan_kmalloc+0xb7/0xc0
[   25.893234]  __kmalloc_cache_noprof+0x184/0x410
[   25.893762]  kasan_atomics+0x96/0x310
[   25.894192]  kunit_try_run_case+0x1b3/0x490
[   25.894740]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.895287]  kthread+0x257/0x310
[   25.895776]  ret_from_fork+0x41/0x80
[   25.896232]  ret_from_fork_asm+0x1a/0x30
[   25.896755] 
[   25.896987] The buggy address belongs to the object at ffff8881028c7700
[   25.896987]  which belongs to the cache kmalloc-64 of size 64
[   25.897937] The buggy address is located 0 bytes to the right of
[   25.897937]  allocated 48-byte region [ffff8881028c7700, ffff8881028c7730)
[   25.898630] 
[   25.898807] The buggy address belongs to the physical page:
[   25.899374] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1028c7
[   25.900151] flags: 0x200000000000000(node=0|zone=2)
[   25.900747] page_type: f5(slab)
[   25.901125] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   25.901936] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   25.902682] page dumped because: kasan: bad access detected
[   25.903126] 
[   25.903330] Memory state around the buggy address:
[   25.903903]  ffff8881028c7600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.904402]  ffff8881028c7680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.905047] >ffff8881028c7700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   25.905474]                                      ^
[   25.906033]  ffff8881028c7780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.906548]  ffff8881028c7800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.907164] ==================================================================
[   25.360722] ==================================================================
[   25.362818] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xde1/0x5450
[   25.364292] Write of size 4 at addr ffff8881028c7730 by task kunit_try_catch/272
[   25.365037] 
[   25.365337] CPU: 0 UID: 0 PID: 272 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241126 #1
[   25.366037] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.366463] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   25.368124] Call Trace:
[   25.368449]  <TASK>
[   25.368712]  dump_stack_lvl+0x73/0xb0
[   25.369121]  print_report+0xd1/0x640
[   25.370690]  ? __virt_addr_valid+0x1db/0x2d0
[   25.371148]  ? kasan_complete_mode_report_info+0x2a/0x200
[   25.371539]  kasan_report+0x102/0x140
[   25.372020]  ? kasan_atomics_helper+0xde1/0x5450
[   25.372455]  ? kasan_atomics_helper+0xde1/0x5450
[   25.373977]  kasan_check_range+0x10c/0x1c0
[   25.374306]  __kasan_check_write+0x18/0x20
[   25.374862]  kasan_atomics_helper+0xde1/0x5450
[   25.375373]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   25.376000]  ? __kmalloc_cache_noprof+0x184/0x410
[   25.376537]  ? trace_hardirqs_on+0x37/0xe0
[   25.377043]  ? kasan_atomics+0x153/0x310
[   25.377477]  kasan_atomics+0x1dd/0x310
[   25.377925]  ? __pfx_kasan_atomics+0x10/0x10
[   25.378318]  ? __pfx_kasan_atomics+0x10/0x10
[   25.378923]  kunit_try_run_case+0x1b3/0x490
[   25.379404]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.379961]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   25.380457]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   25.381071]  ? __kthread_parkme+0x82/0x160
[   25.381553]  ? preempt_count_sub+0x50/0x80
[   25.382103]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.382556]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   25.382976]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.383317]  kthread+0x257/0x310
[   25.383725]  ? __pfx_kthread+0x10/0x10
[   25.384215]  ret_from_fork+0x41/0x80
[   25.384776]  ? __pfx_kthread+0x10/0x10
[   25.385299]  ret_from_fork_asm+0x1a/0x30
[   25.385871]  </TASK>
[   25.386215] 
[   25.386437] Allocated by task 272:
[   25.386902]  kasan_save_stack+0x3d/0x60
[   25.387339]  kasan_save_track+0x18/0x40
[   25.387866]  kasan_save_alloc_info+0x3b/0x50
[   25.388331]  __kasan_kmalloc+0xb7/0xc0
[   25.388761]  __kmalloc_cache_noprof+0x184/0x410
[   25.389180]  kasan_atomics+0x96/0x310
[   25.389537]  kunit_try_run_case+0x1b3/0x490
[   25.390051]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.390624]  kthread+0x257/0x310
[   25.391009]  ret_from_fork+0x41/0x80
[   25.391413]  ret_from_fork_asm+0x1a/0x30
[   25.391946] 
[   25.392180] The buggy address belongs to the object at ffff8881028c7700
[   25.392180]  which belongs to the cache kmalloc-64 of size 64
[   25.393112] The buggy address is located 0 bytes to the right of
[   25.393112]  allocated 48-byte region [ffff8881028c7700, ffff8881028c7730)
[   25.393994] 
[   25.394279] The buggy address belongs to the physical page:
[   25.394925] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1028c7
[   25.395702] flags: 0x200000000000000(node=0|zone=2)
[   25.396013] page_type: f5(slab)
[   25.396411] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   25.397171] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   25.397824] page dumped because: kasan: bad access detected
[   25.398247] 
[   25.398498] Memory state around the buggy address:
[   25.398976]  ffff8881028c7600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.399355]  ffff8881028c7680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.399800] >ffff8881028c7700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   25.400168]                                      ^
[   25.400455]  ffff8881028c7780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.401213]  ffff8881028c7800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.401901] ==================================================================
[   24.528159] ==================================================================
[   24.528879] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b8a/0x5450
[   24.529382] Read of size 4 at addr ffff8881028c7730 by task kunit_try_catch/272
[   24.530142] 
[   24.530401] CPU: 0 UID: 0 PID: 272 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241126 #1
[   24.531147] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.531593] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   24.532200] Call Trace:
[   24.532536]  <TASK>
[   24.532867]  dump_stack_lvl+0x73/0xb0
[   24.533508]  print_report+0xd1/0x640
[   24.533865]  ? __virt_addr_valid+0x1db/0x2d0
[   24.534269]  ? kasan_complete_mode_report_info+0x2a/0x200
[   24.535109]  kasan_report+0x102/0x140
[   24.535587]  ? kasan_atomics_helper+0x4b8a/0x5450
[   24.536146]  ? kasan_atomics_helper+0x4b8a/0x5450
[   24.536653]  __asan_report_load4_noabort+0x18/0x20
[   24.537147]  kasan_atomics_helper+0x4b8a/0x5450
[   24.537808]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   24.538335]  ? __kmalloc_cache_noprof+0x184/0x410
[   24.538759]  ? trace_hardirqs_on+0x37/0xe0
[   24.539050]  ? kasan_atomics+0x153/0x310
[   24.539623]  kasan_atomics+0x1dd/0x310
[   24.540110]  ? __pfx_kasan_atomics+0x10/0x10
[   24.540623]  ? __pfx_kasan_atomics+0x10/0x10
[   24.541119]  kunit_try_run_case+0x1b3/0x490
[   24.541720]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.542133]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   24.542777]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   24.543173]  ? __kthread_parkme+0x82/0x160
[   24.543690]  ? preempt_count_sub+0x50/0x80
[   24.544131]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.544643]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   24.545464]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.546056]  kthread+0x257/0x310
[   24.546466]  ? __pfx_kthread+0x10/0x10
[   24.546934]  ret_from_fork+0x41/0x80
[   24.547213]  ? __pfx_kthread+0x10/0x10
[   24.547775]  ret_from_fork_asm+0x1a/0x30
[   24.548322]  </TASK>
[   24.548726] 
[   24.548950] Allocated by task 272:
[   24.549274]  kasan_save_stack+0x3d/0x60
[   24.549679]  kasan_save_track+0x18/0x40
[   24.550183]  kasan_save_alloc_info+0x3b/0x50
[   24.550664]  __kasan_kmalloc+0xb7/0xc0
[   24.551014]  __kmalloc_cache_noprof+0x184/0x410
[   24.551567]  kasan_atomics+0x96/0x310
[   24.552026]  kunit_try_run_case+0x1b3/0x490
[   24.552557]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.553082]  kthread+0x257/0x310
[   24.553408]  ret_from_fork+0x41/0x80
[   24.554031]  ret_from_fork_asm+0x1a/0x30
[   24.554367] 
[   24.554556] The buggy address belongs to the object at ffff8881028c7700
[   24.554556]  which belongs to the cache kmalloc-64 of size 64
[   24.555116] The buggy address is located 0 bytes to the right of
[   24.555116]  allocated 48-byte region [ffff8881028c7700, ffff8881028c7730)
[   24.556104] 
[   24.556342] The buggy address belongs to the physical page:
[   24.556928] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1028c7
[   24.557688] flags: 0x200000000000000(node=0|zone=2)
[   24.558187] page_type: f5(slab)
[   24.558692] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   24.559470] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   24.560176] page dumped because: kasan: bad access detected
[   24.560819] 
[   24.560985] Memory state around the buggy address:
[   24.561258]  ffff8881028c7600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.561890]  ffff8881028c7680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.562738] >ffff8881028c7700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   24.563342]                                      ^
[   24.563702]  ffff8881028c7780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.564461]  ffff8881028c7800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.565157] ==================================================================
[   25.078820] ==================================================================
[   25.079421] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x993/0x5450
[   25.080356] Write of size 4 at addr ffff8881028c7730 by task kunit_try_catch/272
[   25.081199] 
[   25.082034] CPU: 0 UID: 0 PID: 272 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241126 #1
[   25.082722] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.083161] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   25.083800] Call Trace:
[   25.084368]  <TASK>
[   25.084709]  dump_stack_lvl+0x73/0xb0
[   25.085177]  print_report+0xd1/0x640
[   25.085658]  ? __virt_addr_valid+0x1db/0x2d0
[   25.086144]  ? kasan_complete_mode_report_info+0x2a/0x200
[   25.086632]  kasan_report+0x102/0x140
[   25.087073]  ? kasan_atomics_helper+0x993/0x5450
[   25.087534]  ? kasan_atomics_helper+0x993/0x5450
[   25.087983]  kasan_check_range+0x10c/0x1c0
[   25.088508]  __kasan_check_write+0x18/0x20
[   25.088967]  kasan_atomics_helper+0x993/0x5450
[   25.089459]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   25.090021]  ? __kmalloc_cache_noprof+0x184/0x410
[   25.090549]  ? trace_hardirqs_on+0x37/0xe0
[   25.091037]  ? kasan_atomics+0x153/0x310
[   25.091515]  kasan_atomics+0x1dd/0x310
[   25.091966]  ? __pfx_kasan_atomics+0x10/0x10
[   25.092443]  ? __pfx_kasan_atomics+0x10/0x10
[   25.092890]  kunit_try_run_case+0x1b3/0x490
[   25.093350]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.093882]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   25.094431]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   25.095132]  ? __kthread_parkme+0x82/0x160
[   25.095671]  ? preempt_count_sub+0x50/0x80
[   25.096011]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.096400]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   25.097092]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.097647]  kthread+0x257/0x310
[   25.098097]  ? __pfx_kthread+0x10/0x10
[   25.098450]  ret_from_fork+0x41/0x80
[   25.098995]  ? __pfx_kthread+0x10/0x10
[   25.099331]  ret_from_fork_asm+0x1a/0x30
[   25.099898]  </TASK>
[   25.100161] 
[   25.100387] Allocated by task 272:
[   25.100902]  kasan_save_stack+0x3d/0x60
[   25.101331]  kasan_save_track+0x18/0x40
[   25.101775]  kasan_save_alloc_info+0x3b/0x50
[   25.102380]  __kasan_kmalloc+0xb7/0xc0
[   25.102845]  __kmalloc_cache_noprof+0x184/0x410
[   25.103213]  kasan_atomics+0x96/0x310
[   25.103518]  kunit_try_run_case+0x1b3/0x490
[   25.103967]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.104640]  kthread+0x257/0x310
[   25.105079]  ret_from_fork+0x41/0x80
[   25.105605]  ret_from_fork_asm+0x1a/0x30
[   25.106097] 
[   25.106343] The buggy address belongs to the object at ffff8881028c7700
[   25.106343]  which belongs to the cache kmalloc-64 of size 64
[   25.107279] The buggy address is located 0 bytes to the right of
[   25.107279]  allocated 48-byte region [ffff8881028c7700, ffff8881028c7730)
[   25.108291] 
[   25.108467] The buggy address belongs to the physical page:
[   25.108953] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1028c7
[   25.109787] flags: 0x200000000000000(node=0|zone=2)
[   25.110344] page_type: f5(slab)
[   25.110787] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   25.111270] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   25.111791] page dumped because: kasan: bad access detected
[   25.112183] 
[   25.112427] Memory state around the buggy address:
[   25.112929]  ffff8881028c7600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.113606]  ffff8881028c7680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.114372] >ffff8881028c7700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   25.115195]                                      ^
[   25.115792]  ffff8881028c7780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.116438]  ffff8881028c7800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.117094] ==================================================================
[   25.516320] ==================================================================
[   25.517534] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a38/0x5450
[   25.518242] Read of size 4 at addr ffff8881028c7730 by task kunit_try_catch/272
[   25.518711] 
[   25.518904] CPU: 0 UID: 0 PID: 272 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241126 #1
[   25.519819] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.520169] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   25.520807] Call Trace:
[   25.521126]  <TASK>
[   25.521372]  dump_stack_lvl+0x73/0xb0
[   25.521866]  print_report+0xd1/0x640
[   25.522197]  ? __virt_addr_valid+0x1db/0x2d0
[   25.522539]  ? kasan_complete_mode_report_info+0x2a/0x200
[   25.523131]  kasan_report+0x102/0x140
[   25.523625]  ? kasan_atomics_helper+0x4a38/0x5450
[   25.524132]  ? kasan_atomics_helper+0x4a38/0x5450
[   25.524710]  __asan_report_load4_noabort+0x18/0x20
[   25.525058]  kasan_atomics_helper+0x4a38/0x5450
[   25.525424]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   25.525837]  ? __kmalloc_cache_noprof+0x184/0x410
[   25.526174]  ? trace_hardirqs_on+0x37/0xe0
[   25.526470]  ? kasan_atomics+0x153/0x310
[   25.526999]  kasan_atomics+0x1dd/0x310
[   25.527439]  ? __pfx_kasan_atomics+0x10/0x10
[   25.527976]  ? __pfx_kasan_atomics+0x10/0x10
[   25.528459]  kunit_try_run_case+0x1b3/0x490
[   25.528996]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.529606]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   25.531051]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   25.532535]  ? __kthread_parkme+0x82/0x160
[   25.533030]  ? preempt_count_sub+0x50/0x80
[   25.534635]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.535157]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   25.536628]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.536948]  kthread+0x257/0x310
[   25.537194]  ? __pfx_kthread+0x10/0x10
[   25.537896]  ret_from_fork+0x41/0x80
[   25.538219]  ? __pfx_kthread+0x10/0x10
[   25.538525]  ret_from_fork_asm+0x1a/0x30
[   25.540036]  </TASK>
[   25.540329] 
[   25.541680] Allocated by task 272:
[   25.543842]  kasan_save_stack+0x3d/0x60
[   25.544275]  kasan_save_track+0x18/0x40
[   25.544770]  kasan_save_alloc_info+0x3b/0x50
[   25.545265]  __kasan_kmalloc+0xb7/0xc0
[   25.546808]  __kmalloc_cache_noprof+0x184/0x410
[   25.547193]  kasan_atomics+0x96/0x310
[   25.547681]  kunit_try_run_case+0x1b3/0x490
[   25.548168]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.548678]  kthread+0x257/0x310
[   25.549090]  ret_from_fork+0x41/0x80
[   25.549560]  ret_from_fork_asm+0x1a/0x30
[   25.550095] 
[   25.550354] The buggy address belongs to the object at ffff8881028c7700
[   25.550354]  which belongs to the cache kmalloc-64 of size 64
[   25.551234] The buggy address is located 0 bytes to the right of
[   25.551234]  allocated 48-byte region [ffff8881028c7700, ffff8881028c7730)
[   25.552278] 
[   25.552555] The buggy address belongs to the physical page:
[   25.553158] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1028c7
[   25.553979] flags: 0x200000000000000(node=0|zone=2)
[   25.554544] page_type: f5(slab)
[   25.554986] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   25.556154] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   25.557685] page dumped because: kasan: bad access detected
[   25.558013] 
[   25.558197] Memory state around the buggy address:
[   25.558561]  ffff8881028c7600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.559042]  ffff8881028c7680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.559898] >ffff8881028c7700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   25.560393]                                      ^
[   25.560928]  ffff8881028c7780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.561412]  ffff8881028c7800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.561975] ==================================================================
[   25.831508] ==================================================================
[   25.832041] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x12e7/0x5450
[   25.832610] Write of size 4 at addr ffff8881028c7730 by task kunit_try_catch/272
[   25.833471] 
[   25.834071] CPU: 0 UID: 0 PID: 272 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241126 #1
[   25.835641] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.835980] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   25.836746] Call Trace:
[   25.837021]  <TASK>
[   25.837251]  dump_stack_lvl+0x73/0xb0
[   25.837519]  print_report+0xd1/0x640
[   25.837993]  ? __virt_addr_valid+0x1db/0x2d0
[   25.838450]  ? kasan_complete_mode_report_info+0x2a/0x200
[   25.840097]  kasan_report+0x102/0x140
[   25.840428]  ? kasan_atomics_helper+0x12e7/0x5450
[   25.841326]  ? kasan_atomics_helper+0x12e7/0x5450
[   25.841953]  kasan_check_range+0x10c/0x1c0
[   25.842600]  __kasan_check_write+0x18/0x20
[   25.843186]  kasan_atomics_helper+0x12e7/0x5450
[   25.843819]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   25.844083]  ? __kmalloc_cache_noprof+0x184/0x410
[   25.844272]  ? trace_hardirqs_on+0x37/0xe0
[   25.844456]  ? kasan_atomics+0x153/0x310
[   25.844885]  kasan_atomics+0x1dd/0x310
[   25.845400]  ? __pfx_kasan_atomics+0x10/0x10
[   25.845986]  ? __pfx_kasan_atomics+0x10/0x10
[   25.846439]  kunit_try_run_case+0x1b3/0x490
[   25.847025]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.847654]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   25.848227]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   25.848867]  ? __kthread_parkme+0x82/0x160
[   25.849162]  ? preempt_count_sub+0x50/0x80
[   25.849652]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.850380]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   25.850904]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.851364]  kthread+0x257/0x310
[   25.851738]  ? __pfx_kthread+0x10/0x10
[   25.852140]  ret_from_fork+0x41/0x80
[   25.852637]  ? __pfx_kthread+0x10/0x10
[   25.853064]  ret_from_fork_asm+0x1a/0x30
[   25.853385]  </TASK>
[   25.853733] 
[   25.853993] Allocated by task 272:
[   25.854380]  kasan_save_stack+0x3d/0x60
[   25.854903]  kasan_save_track+0x18/0x40
[   25.855331]  kasan_save_alloc_info+0x3b/0x50
[   25.855774]  __kasan_kmalloc+0xb7/0xc0
[   25.856201]  __kmalloc_cache_noprof+0x184/0x410
[   25.856652]  kasan_atomics+0x96/0x310
[   25.857068]  kunit_try_run_case+0x1b3/0x490
[   25.857549]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.857933]  kthread+0x257/0x310
[   25.858200]  ret_from_fork+0x41/0x80
[   25.858715]  ret_from_fork_asm+0x1a/0x30
[   25.859164] 
[   25.859394] The buggy address belongs to the object at ffff8881028c7700
[   25.859394]  which belongs to the cache kmalloc-64 of size 64
[   25.860464] The buggy address is located 0 bytes to the right of
[   25.860464]  allocated 48-byte region [ffff8881028c7700, ffff8881028c7730)
[   25.861364] 
[   25.861660] The buggy address belongs to the physical page:
[   25.862182] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1028c7
[   25.862742] flags: 0x200000000000000(node=0|zone=2)
[   25.863276] page_type: f5(slab)
[   25.863746] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   25.864268] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   25.864871] page dumped because: kasan: bad access detected
[   25.865361] 
[   25.865647] Memory state around the buggy address:
[   25.866064]  ffff8881028c7600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.866708]  ffff8881028c7680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.867306] >ffff8881028c7700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   25.867767]                                      ^
[   25.868067]  ffff8881028c7780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.868521]  ffff8881028c7800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.869200] ==================================================================
[   25.118604] ==================================================================
[   25.120078] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa2c/0x5450
[   25.121518] Write of size 4 at addr ffff8881028c7730 by task kunit_try_catch/272
[   25.122073] 
[   25.122341] CPU: 0 UID: 0 PID: 272 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241126 #1
[   25.123745] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.124068] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   25.124629] Call Trace:
[   25.124989]  <TASK>
[   25.125342]  dump_stack_lvl+0x73/0xb0
[   25.125835]  print_report+0xd1/0x640
[   25.126284]  ? __virt_addr_valid+0x1db/0x2d0
[   25.126834]  ? kasan_complete_mode_report_info+0x2a/0x200
[   25.127662]  kasan_report+0x102/0x140
[   25.128389]  ? kasan_atomics_helper+0xa2c/0x5450
[   25.129150]  ? kasan_atomics_helper+0xa2c/0x5450
[   25.129724]  kasan_check_range+0x10c/0x1c0
[   25.130217]  __kasan_check_write+0x18/0x20
[   25.130840]  kasan_atomics_helper+0xa2c/0x5450
[   25.131170]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   25.131511]  ? __kmalloc_cache_noprof+0x184/0x410
[   25.131834]  ? trace_hardirqs_on+0x37/0xe0
[   25.132122]  ? kasan_atomics+0x153/0x310
[   25.132411]  kasan_atomics+0x1dd/0x310
[   25.133512]  ? __pfx_kasan_atomics+0x10/0x10
[   25.134060]  ? __pfx_kasan_atomics+0x10/0x10
[   25.134759]  kunit_try_run_case+0x1b3/0x490
[   25.135357]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.136029]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   25.136533]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   25.137152]  ? __kthread_parkme+0x82/0x160
[   25.137664]  ? preempt_count_sub+0x50/0x80
[   25.138105]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.138620]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   25.139135]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.139525]  kthread+0x257/0x310
[   25.139923]  ? __pfx_kthread+0x10/0x10
[   25.140425]  ret_from_fork+0x41/0x80
[   25.140963]  ? __pfx_kthread+0x10/0x10
[   25.141397]  ret_from_fork_asm+0x1a/0x30
[   25.141851]  </TASK>
[   25.142070] 
[   25.142229] Allocated by task 272:
[   25.142465]  kasan_save_stack+0x3d/0x60
[   25.143001]  kasan_save_track+0x18/0x40
[   25.143639]  kasan_save_alloc_info+0x3b/0x50
[   25.144186]  __kasan_kmalloc+0xb7/0xc0
[   25.144654]  __kmalloc_cache_noprof+0x184/0x410
[   25.145173]  kasan_atomics+0x96/0x310
[   25.145765]  kunit_try_run_case+0x1b3/0x490
[   25.146124]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.146467]  kthread+0x257/0x310
[   25.146985]  ret_from_fork+0x41/0x80
[   25.147439]  ret_from_fork_asm+0x1a/0x30
[   25.147949] 
[   25.148224] The buggy address belongs to the object at ffff8881028c7700
[   25.148224]  which belongs to the cache kmalloc-64 of size 64
[   25.149391] The buggy address is located 0 bytes to the right of
[   25.149391]  allocated 48-byte region [ffff8881028c7700, ffff8881028c7730)
[   25.150173] 
[   25.150404] The buggy address belongs to the physical page:
[   25.151086] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1028c7
[   25.151796] flags: 0x200000000000000(node=0|zone=2)
[   25.152444] page_type: f5(slab)
[   25.153015] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   25.156895] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   25.157500] page dumped because: kasan: bad access detected
[   25.158180] 
[   25.158534] Memory state around the buggy address:
[   25.159969]  ffff8881028c7600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.160942]  ffff8881028c7680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.161478] >ffff8881028c7700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   25.162435]                                      ^
[   25.163303]  ffff8881028c7780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.163820]  ffff8881028c7800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.164725] ==================================================================
[   24.772817] ==================================================================
[   24.773792] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x566/0x5450
[   24.774552] Write of size 4 at addr ffff8881028c7730 by task kunit_try_catch/272
[   24.775258] 
[   24.775655] CPU: 0 UID: 0 PID: 272 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241126 #1
[   24.776289] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.776618] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   24.777457] Call Trace:
[   24.777920]  <TASK>
[   24.778378]  dump_stack_lvl+0x73/0xb0
[   24.778895]  print_report+0xd1/0x640
[   24.779329]  ? __virt_addr_valid+0x1db/0x2d0
[   24.779721]  ? kasan_complete_mode_report_info+0x2a/0x200
[   24.780335]  kasan_report+0x102/0x140
[   24.780889]  ? kasan_atomics_helper+0x566/0x5450
[   24.781385]  ? kasan_atomics_helper+0x566/0x5450
[   24.781970]  kasan_check_range+0x10c/0x1c0
[   24.782450]  __kasan_check_write+0x18/0x20
[   24.782895]  kasan_atomics_helper+0x566/0x5450
[   24.783429]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   24.784077]  ? __kmalloc_cache_noprof+0x184/0x410
[   24.784621]  ? trace_hardirqs_on+0x37/0xe0
[   24.785095]  ? kasan_atomics+0x153/0x310
[   24.785611]  kasan_atomics+0x1dd/0x310
[   24.786134]  ? __pfx_kasan_atomics+0x10/0x10
[   24.786716]  ? __pfx_kasan_atomics+0x10/0x10
[   24.787202]  kunit_try_run_case+0x1b3/0x490
[   24.787731]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.788248]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   24.789196]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   24.791385]  ? __kthread_parkme+0x82/0x160
[   24.791860]  ? preempt_count_sub+0x50/0x80
[   24.792979]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.793358]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   24.794274]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.794705]  kthread+0x257/0x310
[   24.795338]  ? __pfx_kthread+0x10/0x10
[   24.795910]  ret_from_fork+0x41/0x80
[   24.796295]  ? __pfx_kthread+0x10/0x10
[   24.797281]  ret_from_fork_asm+0x1a/0x30
[   24.797978]  </TASK>
[   24.798528] 
[   24.798818] Allocated by task 272:
[   24.799093]  kasan_save_stack+0x3d/0x60
[   24.799882]  kasan_save_track+0x18/0x40
[   24.800500]  kasan_save_alloc_info+0x3b/0x50
[   24.801013]  __kasan_kmalloc+0xb7/0xc0
[   24.801385]  __kmalloc_cache_noprof+0x184/0x410
[   24.802258]  kasan_atomics+0x96/0x310
[   24.802922]  kunit_try_run_case+0x1b3/0x490
[   24.803314]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.804160]  kthread+0x257/0x310
[   24.804782]  ret_from_fork+0x41/0x80
[   24.805361]  ret_from_fork_asm+0x1a/0x30
[   24.806165] 
[   24.806338] The buggy address belongs to the object at ffff8881028c7700
[   24.806338]  which belongs to the cache kmalloc-64 of size 64
[   24.807450] The buggy address is located 0 bytes to the right of
[   24.807450]  allocated 48-byte region [ffff8881028c7700, ffff8881028c7730)
[   24.808456] 
[   24.809378] The buggy address belongs to the physical page:
[   24.809882] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1028c7
[   24.810858] flags: 0x200000000000000(node=0|zone=2)
[   24.811440] page_type: f5(slab)
[   24.811862] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   24.812506] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   24.813174] page dumped because: kasan: bad access detected
[   24.813883] 
[   24.814251] Memory state around the buggy address:
[   24.814805]  ffff8881028c7600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.815355]  ffff8881028c7680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.816261] >ffff8881028c7700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   24.816896]                                      ^
[   24.817278]  ffff8881028c7780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.818292]  ffff8881028c7800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.818907] ==================================================================
[   27.061755] ==================================================================
[   27.062416] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x218b/0x5450
[   27.063269] Write of size 8 at addr ffff8881028c7730 by task kunit_try_catch/272
[   27.063980] 
[   27.064236] CPU: 0 UID: 0 PID: 272 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241126 #1
[   27.064852] Tainted: [B]=BAD_PAGE, [N]=TEST
[   27.065118] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   27.065989] Call Trace:
[   27.066319]  <TASK>
[   27.066670]  dump_stack_lvl+0x73/0xb0
[   27.067096]  print_report+0xd1/0x640
[   27.067401]  ? __virt_addr_valid+0x1db/0x2d0
[   27.067794]  ? kasan_complete_mode_report_info+0x2a/0x200
[   27.068228]  kasan_report+0x102/0x140
[   27.068723]  ? kasan_atomics_helper+0x218b/0x5450
[   27.069214]  ? kasan_atomics_helper+0x218b/0x5450
[   27.069787]  kasan_check_range+0x10c/0x1c0
[   27.070264]  __kasan_check_write+0x18/0x20
[   27.070755]  kasan_atomics_helper+0x218b/0x5450
[   27.071144]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   27.071471]  ? __kmalloc_cache_noprof+0x184/0x410
[   27.071905]  ? trace_hardirqs_on+0x37/0xe0
[   27.072338]  ? kasan_atomics+0x153/0x310
[   27.072863]  kasan_atomics+0x1dd/0x310
[   27.073300]  ? __pfx_kasan_atomics+0x10/0x10
[   27.073840]  ? __pfx_kasan_atomics+0x10/0x10
[   27.074329]  kunit_try_run_case+0x1b3/0x490
[   27.074721]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.075041]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   27.075632]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   27.076138]  ? __kthread_parkme+0x82/0x160
[   27.076651]  ? preempt_count_sub+0x50/0x80
[   27.077093]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.077412]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   27.078054]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.078658]  kthread+0x257/0x310
[   27.079046]  ? __pfx_kthread+0x10/0x10
[   27.079478]  ret_from_fork+0x41/0x80
[   27.079932]  ? __pfx_kthread+0x10/0x10
[   27.080220]  ret_from_fork_asm+0x1a/0x30
[   27.080553]  </TASK>
[   27.080880] 
[   27.081104] Allocated by task 272:
[   27.081469]  kasan_save_stack+0x3d/0x60
[   27.081952]  kasan_save_track+0x18/0x40
[   27.082334]  kasan_save_alloc_info+0x3b/0x50
[   27.082748]  __kasan_kmalloc+0xb7/0xc0
[   27.083024]  __kmalloc_cache_noprof+0x184/0x410
[   27.083324]  kasan_atomics+0x96/0x310
[   27.083786]  kunit_try_run_case+0x1b3/0x490
[   27.084231]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.085196]  kthread+0x257/0x310
[   27.086051]  ret_from_fork+0x41/0x80
[   27.086464]  ret_from_fork_asm+0x1a/0x30
[   27.087612] 
[   27.087852] The buggy address belongs to the object at ffff8881028c7700
[   27.087852]  which belongs to the cache kmalloc-64 of size 64
[   27.088817] The buggy address is located 0 bytes to the right of
[   27.088817]  allocated 48-byte region [ffff8881028c7700, ffff8881028c7730)
[   27.090693] 
[   27.090930] The buggy address belongs to the physical page:
[   27.091374] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1028c7
[   27.092961] flags: 0x200000000000000(node=0|zone=2)
[   27.093328] page_type: f5(slab)
[   27.093694] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   27.094280] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   27.094888] page dumped because: kasan: bad access detected
[   27.095346] 
[   27.095532] Memory state around the buggy address:
[   27.096039]  ffff8881028c7600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.096631]  ffff8881028c7680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.097017] >ffff8881028c7700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   27.097710]                                      ^
[   27.098195]  ffff8881028c7780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.098881]  ffff8881028c7800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.099268] ==================================================================
[   26.814807] ==================================================================
[   26.815356] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1f44/0x5450
[   26.815728] Write of size 8 at addr ffff8881028c7730 by task kunit_try_catch/272
[   26.816946] 
[   26.817207] CPU: 0 UID: 0 PID: 272 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241126 #1
[   26.818006] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.818422] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   26.819972] Call Trace:
[   26.820637]  <TASK>
[   26.820851]  dump_stack_lvl+0x73/0xb0
[   26.821111]  print_report+0xd1/0x640
[   26.821913]  ? __virt_addr_valid+0x1db/0x2d0
[   26.822266]  ? kasan_complete_mode_report_info+0x2a/0x200
[   26.823088]  kasan_report+0x102/0x140
[   26.823628]  ? kasan_atomics_helper+0x1f44/0x5450
[   26.824140]  ? kasan_atomics_helper+0x1f44/0x5450
[   26.824573]  kasan_check_range+0x10c/0x1c0
[   26.825356]  __kasan_check_write+0x18/0x20
[   26.825802]  kasan_atomics_helper+0x1f44/0x5450
[   26.826518]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   26.826969]  ? __kmalloc_cache_noprof+0x184/0x410
[   26.827409]  ? trace_hardirqs_on+0x37/0xe0
[   26.827816]  ? kasan_atomics+0x153/0x310
[   26.828165]  kasan_atomics+0x1dd/0x310
[   26.829126]  ? __pfx_kasan_atomics+0x10/0x10
[   26.829431]  ? __pfx_kasan_atomics+0x10/0x10
[   26.830171]  kunit_try_run_case+0x1b3/0x490
[   26.830862]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.831371]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   26.832007]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   26.832619]  ? __kthread_parkme+0x82/0x160
[   26.832807]  ? preempt_count_sub+0x50/0x80
[   26.832971]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.833143]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   26.833343]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.833615]  kthread+0x257/0x310
[   26.834756]  ? __pfx_kthread+0x10/0x10
[   26.835574]  ret_from_fork+0x41/0x80
[   26.836319]  ? __pfx_kthread+0x10/0x10
[   26.836687]  ret_from_fork_asm+0x1a/0x30
[   26.837022]  </TASK>
[   26.837297] 
[   26.837532] Allocated by task 272:
[   26.838028]  kasan_save_stack+0x3d/0x60
[   26.838341]  kasan_save_track+0x18/0x40
[   26.838776]  kasan_save_alloc_info+0x3b/0x50
[   26.839143]  __kasan_kmalloc+0xb7/0xc0
[   26.839429]  __kmalloc_cache_noprof+0x184/0x410
[   26.839911]  kasan_atomics+0x96/0x310
[   26.840200]  kunit_try_run_case+0x1b3/0x490
[   26.840650]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.841060]  kthread+0x257/0x310
[   26.841439]  ret_from_fork+0x41/0x80
[   26.841824]  ret_from_fork_asm+0x1a/0x30
[   26.842121] 
[   26.842289] The buggy address belongs to the object at ffff8881028c7700
[   26.842289]  which belongs to the cache kmalloc-64 of size 64
[   26.843559] The buggy address is located 0 bytes to the right of
[   26.843559]  allocated 48-byte region [ffff8881028c7700, ffff8881028c7730)
[   26.844412] 
[   26.844610] The buggy address belongs to the physical page:
[   26.844917] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1028c7
[   26.845791] flags: 0x200000000000000(node=0|zone=2)
[   26.846297] page_type: f5(slab)
[   26.846801] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   26.847474] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   26.848364] page dumped because: kasan: bad access detected
[   26.848850] 
[   26.849045] Memory state around the buggy address:
[   26.849334]  ffff8881028c7600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.849835]  ffff8881028c7680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.850609] >ffff8881028c7700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   26.851247]                                      ^
[   26.852934]  ffff8881028c7780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.853476]  ffff8881028c7800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.854140] ==================================================================
[   26.855545] ==================================================================
[   26.857611] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4f73/0x5450
[   26.858265] Read of size 8 at addr ffff8881028c7730 by task kunit_try_catch/272
[   26.858915] 
[   26.859118] CPU: 0 UID: 0 PID: 272 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241126 #1
[   26.861432] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.862156] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   26.862999] Call Trace:
[   26.863263]  <TASK>
[   26.863526]  dump_stack_lvl+0x73/0xb0
[   26.864040]  print_report+0xd1/0x640
[   26.864638]  ? __virt_addr_valid+0x1db/0x2d0
[   26.865347]  ? kasan_complete_mode_report_info+0x2a/0x200
[   26.866065]  kasan_report+0x102/0x140
[   26.866686]  ? kasan_atomics_helper+0x4f73/0x5450
[   26.867313]  ? kasan_atomics_helper+0x4f73/0x5450
[   26.867726]  __asan_report_load8_noabort+0x18/0x20
[   26.868366]  kasan_atomics_helper+0x4f73/0x5450
[   26.868996]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   26.869461]  ? __kmalloc_cache_noprof+0x184/0x410
[   26.869883]  ? trace_hardirqs_on+0x37/0xe0
[   26.870657]  ? kasan_atomics+0x153/0x310
[   26.871396]  kasan_atomics+0x1dd/0x310
[   26.871912]  ? __pfx_kasan_atomics+0x10/0x10
[   26.872361]  ? __pfx_kasan_atomics+0x10/0x10
[   26.873057]  kunit_try_run_case+0x1b3/0x490
[   26.873378]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.873971]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   26.874569]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   26.875202]  ? __kthread_parkme+0x82/0x160
[   26.875842]  ? preempt_count_sub+0x50/0x80
[   26.876126]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.877030]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   26.877622]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.878289]  kthread+0x257/0x310
[   26.879312]  ? __pfx_kthread+0x10/0x10
[   26.880073]  ret_from_fork+0x41/0x80
[   26.880438]  ? __pfx_kthread+0x10/0x10
[   26.880695]  ret_from_fork_asm+0x1a/0x30
[   26.881428]  </TASK>
[   26.882217] 
[   26.882354] Allocated by task 272:
[   26.883108]  kasan_save_stack+0x3d/0x60
[   26.883515]  kasan_save_track+0x18/0x40
[   26.884224]  kasan_save_alloc_info+0x3b/0x50
[   26.885023]  __kasan_kmalloc+0xb7/0xc0
[   26.885948]  __kmalloc_cache_noprof+0x184/0x410
[   26.886438]  kasan_atomics+0x96/0x310
[   26.887289]  kunit_try_run_case+0x1b3/0x490
[   26.888052]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.888401]  kthread+0x257/0x310
[   26.888790]  ret_from_fork+0x41/0x80
[   26.889172]  ret_from_fork_asm+0x1a/0x30
[   26.889555] 
[   26.889834] The buggy address belongs to the object at ffff8881028c7700
[   26.889834]  which belongs to the cache kmalloc-64 of size 64
[   26.891537] The buggy address is located 0 bytes to the right of
[   26.891537]  allocated 48-byte region [ffff8881028c7700, ffff8881028c7730)
[   26.892888] 
[   26.893589] The buggy address belongs to the physical page:
[   26.893898] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1028c7
[   26.894771] flags: 0x200000000000000(node=0|zone=2)
[   26.895320] page_type: f5(slab)
[   26.896214] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   26.897075] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   26.898115] page dumped because: kasan: bad access detected
[   26.898918] 
[   26.899359] Memory state around the buggy address:
[   26.899847]  ffff8881028c7600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.900397]  ffff8881028c7680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.900986] >ffff8881028c7700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   26.901539]                                      ^
[   26.902071]  ffff8881028c7780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.902730]  ffff8881028c7800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.903133] ==================================================================
[   24.568431] ==================================================================
[   24.569001] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b70/0x5450
[   24.569394] Write of size 4 at addr ffff8881028c7730 by task kunit_try_catch/272
[   24.570551] 
[   24.570919] CPU: 0 UID: 0 PID: 272 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241126 #1
[   24.571915] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.572418] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   24.573202] Call Trace:
[   24.573653]  <TASK>
[   24.573943]  dump_stack_lvl+0x73/0xb0
[   24.574356]  print_report+0xd1/0x640
[   24.574713]  ? __virt_addr_valid+0x1db/0x2d0
[   24.575272]  ? kasan_complete_mode_report_info+0x2a/0x200
[   24.575985]  kasan_report+0x102/0x140
[   24.576502]  ? kasan_atomics_helper+0x4b70/0x5450
[   24.577112]  ? kasan_atomics_helper+0x4b70/0x5450
[   24.577734]  __asan_report_store4_noabort+0x1b/0x30
[   24.578288]  kasan_atomics_helper+0x4b70/0x5450
[   24.578888]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   24.579386]  ? __kmalloc_cache_noprof+0x184/0x410
[   24.580001]  ? trace_hardirqs_on+0x37/0xe0
[   24.580419]  ? kasan_atomics+0x153/0x310
[   24.581015]  kasan_atomics+0x1dd/0x310
[   24.581500]  ? __pfx_kasan_atomics+0x10/0x10
[   24.582099]  ? __pfx_kasan_atomics+0x10/0x10
[   24.582550]  kunit_try_run_case+0x1b3/0x490
[   24.583078]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.583637]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   24.584140]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   24.584662]  ? __kthread_parkme+0x82/0x160
[   24.585190]  ? preempt_count_sub+0x50/0x80
[   24.585833]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.586304]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   24.586933]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.587568]  kthread+0x257/0x310
[   24.588049]  ? __pfx_kthread+0x10/0x10
[   24.588399]  ret_from_fork+0x41/0x80
[   24.588934]  ? __pfx_kthread+0x10/0x10
[   24.589415]  ret_from_fork_asm+0x1a/0x30
[   24.589862]  </TASK>
[   24.590256] 
[   24.590527] Allocated by task 272:
[   24.590874]  kasan_save_stack+0x3d/0x60
[   24.591153]  kasan_save_track+0x18/0x40
[   24.591420]  kasan_save_alloc_info+0x3b/0x50
[   24.592024]  __kasan_kmalloc+0xb7/0xc0
[   24.592469]  __kmalloc_cache_noprof+0x184/0x410
[   24.593143]  kasan_atomics+0x96/0x310
[   24.593643]  kunit_try_run_case+0x1b3/0x490
[   24.594170]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.594797]  kthread+0x257/0x310
[   24.595149]  ret_from_fork+0x41/0x80
[   24.595747]  ret_from_fork_asm+0x1a/0x30
[   24.596138] 
[   24.596464] The buggy address belongs to the object at ffff8881028c7700
[   24.596464]  which belongs to the cache kmalloc-64 of size 64
[   24.597372] The buggy address is located 0 bytes to the right of
[   24.597372]  allocated 48-byte region [ffff8881028c7700, ffff8881028c7730)
[   24.598569] 
[   24.598860] The buggy address belongs to the physical page:
[   24.599188] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1028c7
[   24.600075] flags: 0x200000000000000(node=0|zone=2)
[   24.600567] page_type: f5(slab)
[   24.601009] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   24.601698] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   24.602225] page dumped because: kasan: bad access detected
[   24.602840] 
[   24.603140] Memory state around the buggy address:
[   24.603621]  ffff8881028c7600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.604082]  ffff8881028c7680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.604913] >ffff8881028c7700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   24.605675]                                      ^
[   24.606097]  ffff8881028c7780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.606806]  ffff8881028c7800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.607355] ==================================================================
[   26.176175] ==================================================================
[   26.176725] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1650/0x5450
[   26.177203] Write of size 8 at addr ffff8881028c7730 by task kunit_try_catch/272
[   26.177958] 
[   26.178279] CPU: 0 UID: 0 PID: 272 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241126 #1
[   26.179325] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.179630] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   26.180074] Call Trace:
[   26.180288]  <TASK>
[   26.180473]  dump_stack_lvl+0x73/0xb0
[   26.181881]  print_report+0xd1/0x640
[   26.182392]  ? __virt_addr_valid+0x1db/0x2d0
[   26.183281]  ? kasan_complete_mode_report_info+0x2a/0x200
[   26.184140]  kasan_report+0x102/0x140
[   26.184716]  ? kasan_atomics_helper+0x1650/0x5450
[   26.185355]  ? kasan_atomics_helper+0x1650/0x5450
[   26.186210]  kasan_check_range+0x10c/0x1c0
[   26.186746]  __kasan_check_write+0x18/0x20
[   26.187472]  kasan_atomics_helper+0x1650/0x5450
[   26.188013]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   26.188372]  ? __kmalloc_cache_noprof+0x184/0x410
[   26.188979]  ? trace_hardirqs_on+0x37/0xe0
[   26.189297]  ? kasan_atomics+0x153/0x310
[   26.189850]  kasan_atomics+0x1dd/0x310
[   26.190375]  ? __pfx_kasan_atomics+0x10/0x10
[   26.190998]  ? __pfx_kasan_atomics+0x10/0x10
[   26.191554]  kunit_try_run_case+0x1b3/0x490
[   26.192105]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.192705]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   26.193237]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   26.193850]  ? __kthread_parkme+0x82/0x160
[   26.194199]  ? preempt_count_sub+0x50/0x80
[   26.194541]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.195080]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   26.195513]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.196014]  kthread+0x257/0x310
[   26.196413]  ? __pfx_kthread+0x10/0x10
[   26.196867]  ret_from_fork+0x41/0x80
[   26.197274]  ? __pfx_kthread+0x10/0x10
[   26.197625]  ret_from_fork_asm+0x1a/0x30
[   26.198107]  </TASK>
[   26.198402] 
[   26.198655] Allocated by task 272:
[   26.198933]  kasan_save_stack+0x3d/0x60
[   26.199360]  kasan_save_track+0x18/0x40
[   26.199752]  kasan_save_alloc_info+0x3b/0x50
[   26.200184]  __kasan_kmalloc+0xb7/0xc0
[   26.200649]  __kmalloc_cache_noprof+0x184/0x410
[   26.201048]  kasan_atomics+0x96/0x310
[   26.201340]  kunit_try_run_case+0x1b3/0x490
[   26.201905]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.202302]  kthread+0x257/0x310
[   26.203627]  ret_from_fork+0x41/0x80
[   26.204031]  ret_from_fork_asm+0x1a/0x30
[   26.204392] 
[   26.204637] The buggy address belongs to the object at ffff8881028c7700
[   26.204637]  which belongs to the cache kmalloc-64 of size 64
[   26.205443] The buggy address is located 0 bytes to the right of
[   26.205443]  allocated 48-byte region [ffff8881028c7700, ffff8881028c7730)
[   26.207512] 
[   26.207751] The buggy address belongs to the physical page:
[   26.208187] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1028c7
[   26.208772] flags: 0x200000000000000(node=0|zone=2)
[   26.209232] page_type: f5(slab)
[   26.209916] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   26.210462] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   26.210942] page dumped because: kasan: bad access detected
[   26.211251] 
[   26.211410] Memory state around the buggy address:
[   26.211953]  ffff8881028c7600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.212641]  ffff8881028c7680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.213142] >ffff8881028c7700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   26.213728]                                      ^
[   26.214022]  ffff8881028c7780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.214736]  ffff8881028c7800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.215399] ==================================================================
[   26.387768] ==================================================================
[   26.388422] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x194b/0x5450
[   26.389165] Write of size 8 at addr ffff8881028c7730 by task kunit_try_catch/272
[   26.389672] 
[   26.389875] CPU: 0 UID: 0 PID: 272 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241126 #1
[   26.390447] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.390942] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   26.391790] Call Trace:
[   26.392108]  <TASK>
[   26.392388]  dump_stack_lvl+0x73/0xb0
[   26.392892]  print_report+0xd1/0x640
[   26.393311]  ? __virt_addr_valid+0x1db/0x2d0
[   26.393834]  ? kasan_complete_mode_report_info+0x2a/0x200
[   26.394253]  kasan_report+0x102/0x140
[   26.394743]  ? kasan_atomics_helper+0x194b/0x5450
[   26.395123]  ? kasan_atomics_helper+0x194b/0x5450
[   26.395705]  kasan_check_range+0x10c/0x1c0
[   26.396165]  __kasan_check_write+0x18/0x20
[   26.396511]  kasan_atomics_helper+0x194b/0x5450
[   26.397035]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   26.397542]  ? __kmalloc_cache_noprof+0x184/0x410
[   26.397923]  ? trace_hardirqs_on+0x37/0xe0
[   26.398387]  ? kasan_atomics+0x153/0x310
[   26.398818]  kasan_atomics+0x1dd/0x310
[   26.399122]  ? __pfx_kasan_atomics+0x10/0x10
[   26.399434]  ? __pfx_kasan_atomics+0x10/0x10
[   26.401581]  kunit_try_run_case+0x1b3/0x490
[   26.402088]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.402612]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   26.403100]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   26.404039]  ? __kthread_parkme+0x82/0x160
[   26.404763]  ? preempt_count_sub+0x50/0x80
[   26.405953]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.406859]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   26.408165]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.408805]  kthread+0x257/0x310
[   26.409163]  ? __pfx_kthread+0x10/0x10
[   26.409610]  ret_from_fork+0x41/0x80
[   26.410073]  ? __pfx_kthread+0x10/0x10
[   26.410547]  ret_from_fork_asm+0x1a/0x30
[   26.411084]  </TASK>
[   26.411364] 
[   26.411553] Allocated by task 272:
[   26.411852]  kasan_save_stack+0x3d/0x60
[   26.412307]  kasan_save_track+0x18/0x40
[   26.412832]  kasan_save_alloc_info+0x3b/0x50
[   26.413299]  __kasan_kmalloc+0xb7/0xc0
[   26.413700]  __kmalloc_cache_noprof+0x184/0x410
[   26.414218]  kasan_atomics+0x96/0x310
[   26.414678]  kunit_try_run_case+0x1b3/0x490
[   26.414977]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.415390]  kthread+0x257/0x310
[   26.415886]  ret_from_fork+0x41/0x80
[   26.416302]  ret_from_fork_asm+0x1a/0x30
[   26.416762] 
[   26.416929] The buggy address belongs to the object at ffff8881028c7700
[   26.416929]  which belongs to the cache kmalloc-64 of size 64
[   26.417885] The buggy address is located 0 bytes to the right of
[   26.417885]  allocated 48-byte region [ffff8881028c7700, ffff8881028c7730)
[   26.418943] 
[   26.419118] The buggy address belongs to the physical page:
[   26.419527] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1028c7
[   26.420306] flags: 0x200000000000000(node=0|zone=2)
[   26.420857] page_type: f5(slab)
[   26.421231] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   26.421808] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   26.422322] page dumped because: kasan: bad access detected
[   26.422810] 
[   26.423039] Memory state around the buggy address:
[   26.423526]  ffff8881028c7600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.424155]  ffff8881028c7680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.424558] >ffff8881028c7700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   26.425236]                                      ^
[   26.425786]  ffff8881028c7780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.426374]  ffff8881028c7800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.426818] ==================================================================
[   25.606373] ==================================================================
[   25.607569] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a1e/0x5450
[   25.608109] Read of size 4 at addr ffff8881028c7730 by task kunit_try_catch/272
[   25.608648] 
[   25.608831] CPU: 0 UID: 0 PID: 272 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241126 #1
[   25.609788] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.610111] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   25.611023] Call Trace:
[   25.611283]  <TASK>
[   25.611647]  dump_stack_lvl+0x73/0xb0
[   25.612008]  print_report+0xd1/0x640
[   25.612515]  ? __virt_addr_valid+0x1db/0x2d0
[   25.612941]  ? kasan_complete_mode_report_info+0x2a/0x200
[   25.613381]  kasan_report+0x102/0x140
[   25.613981]  ? kasan_atomics_helper+0x4a1e/0x5450
[   25.614423]  ? kasan_atomics_helper+0x4a1e/0x5450
[   25.615079]  __asan_report_load4_noabort+0x18/0x20
[   25.615551]  kasan_atomics_helper+0x4a1e/0x5450
[   25.616133]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   25.616704]  ? __kmalloc_cache_noprof+0x184/0x410
[   25.617090]  ? trace_hardirqs_on+0x37/0xe0
[   25.617614]  ? kasan_atomics+0x153/0x310
[   25.618005]  kasan_atomics+0x1dd/0x310
[   25.618426]  ? __pfx_kasan_atomics+0x10/0x10
[   25.618889]  ? __pfx_kasan_atomics+0x10/0x10
[   25.619214]  kunit_try_run_case+0x1b3/0x490
[   25.621556]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.622087]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   25.622621]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   25.622960]  ? __kthread_parkme+0x82/0x160
[   25.623809]  ? preempt_count_sub+0x50/0x80
[   25.625430]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.625876]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   25.626255]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.626656]  kthread+0x257/0x310
[   25.627050]  ? __pfx_kthread+0x10/0x10
[   25.627469]  ret_from_fork+0x41/0x80
[   25.627914]  ? __pfx_kthread+0x10/0x10
[   25.628335]  ret_from_fork_asm+0x1a/0x30
[   25.628886]  </TASK>
[   25.629092] 
[   25.629249] Allocated by task 272:
[   25.629654]  kasan_save_stack+0x3d/0x60
[   25.630089]  kasan_save_track+0x18/0x40
[   25.630378]  kasan_save_alloc_info+0x3b/0x50
[   25.630981]  __kasan_kmalloc+0xb7/0xc0
[   25.631275]  __kmalloc_cache_noprof+0x184/0x410
[   25.631795]  kasan_atomics+0x96/0x310
[   25.632093]  kunit_try_run_case+0x1b3/0x490
[   25.632388]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.632855]  kthread+0x257/0x310
[   25.633277]  ret_from_fork+0x41/0x80
[   25.633725]  ret_from_fork_asm+0x1a/0x30
[   25.634170] 
[   25.634392] The buggy address belongs to the object at ffff8881028c7700
[   25.634392]  which belongs to the cache kmalloc-64 of size 64
[   25.635582] The buggy address is located 0 bytes to the right of
[   25.635582]  allocated 48-byte region [ffff8881028c7700, ffff8881028c7730)
[   25.636405] 
[   25.636602] The buggy address belongs to the physical page:
[   25.636909] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1028c7
[   25.637645] flags: 0x200000000000000(node=0|zone=2)
[   25.638134] page_type: f5(slab)
[   25.638522] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   25.639211] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   25.639630] page dumped because: kasan: bad access detected
[   25.639940] 
[   25.640162] Memory state around the buggy address:
[   25.640619]  ffff8881028c7600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.641287]  ffff8881028c7680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.642153] >ffff8881028c7700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   25.642596]                                      ^
[   25.643117]  ffff8881028c7780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.643547]  ffff8881028c7800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.644172] ==================================================================
[   26.517328] ==================================================================
[   26.518100] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1b23/0x5450
[   26.518766] Write of size 8 at addr ffff8881028c7730 by task kunit_try_catch/272
[   26.519367] 
[   26.519727] CPU: 0 UID: 0 PID: 272 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241126 #1
[   26.520380] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.520886] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   26.521551] Call Trace:
[   26.521828]  <TASK>
[   26.522036]  dump_stack_lvl+0x73/0xb0
[   26.522686]  print_report+0xd1/0x640
[   26.523125]  ? __virt_addr_valid+0x1db/0x2d0
[   26.524439]  ? kasan_complete_mode_report_info+0x2a/0x200
[   26.525046]  kasan_report+0x102/0x140
[   26.525620]  ? kasan_atomics_helper+0x1b23/0x5450
[   26.526135]  ? kasan_atomics_helper+0x1b23/0x5450
[   26.526551]  kasan_check_range+0x10c/0x1c0
[   26.526917]  __kasan_check_write+0x18/0x20
[   26.527408]  kasan_atomics_helper+0x1b23/0x5450
[   26.527976]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   26.528547]  ? __kmalloc_cache_noprof+0x184/0x410
[   26.528939]  ? trace_hardirqs_on+0x37/0xe0
[   26.529444]  ? kasan_atomics+0x153/0x310
[   26.529925]  kasan_atomics+0x1dd/0x310
[   26.530406]  ? __pfx_kasan_atomics+0x10/0x10
[   26.530882]  ? __pfx_kasan_atomics+0x10/0x10
[   26.531207]  kunit_try_run_case+0x1b3/0x490
[   26.531759]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.532264]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   26.532828]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   26.533386]  ? __kthread_parkme+0x82/0x160
[   26.533900]  ? preempt_count_sub+0x50/0x80
[   26.534378]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.534979]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   26.535628]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.536112]  kthread+0x257/0x310
[   26.536437]  ? __pfx_kthread+0x10/0x10
[   26.536964]  ret_from_fork+0x41/0x80
[   26.537290]  ? __pfx_kthread+0x10/0x10
[   26.537827]  ret_from_fork_asm+0x1a/0x30
[   26.538196]  </TASK>
[   26.538533] 
[   26.538806] Allocated by task 272:
[   26.539131]  kasan_save_stack+0x3d/0x60
[   26.539639]  kasan_save_track+0x18/0x40
[   26.539954]  kasan_save_alloc_info+0x3b/0x50
[   26.540459]  __kasan_kmalloc+0xb7/0xc0
[   26.540806]  __kmalloc_cache_noprof+0x184/0x410
[   26.541107]  kasan_atomics+0x96/0x310
[   26.541385]  kunit_try_run_case+0x1b3/0x490
[   26.541908]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.542457]  kthread+0x257/0x310
[   26.542939]  ret_from_fork+0x41/0x80
[   26.543350]  ret_from_fork_asm+0x1a/0x30
[   26.543869] 
[   26.544099] The buggy address belongs to the object at ffff8881028c7700
[   26.544099]  which belongs to the cache kmalloc-64 of size 64
[   26.545056] The buggy address is located 0 bytes to the right of
[   26.545056]  allocated 48-byte region [ffff8881028c7700, ffff8881028c7730)
[   26.546030] 
[   26.546314] The buggy address belongs to the physical page:
[   26.546926] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1028c7
[   26.547569] flags: 0x200000000000000(node=0|zone=2)
[   26.548101] page_type: f5(slab)
[   26.548531] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   26.549140] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   26.549724] page dumped because: kasan: bad access detected
[   26.550143] 
[   26.550417] Memory state around the buggy address:
[   26.550903]  ffff8881028c7600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.551521]  ffff8881028c7680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.552179] >ffff8881028c7700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   26.552734]                                      ^
[   26.553246]  ffff8881028c7780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.553916]  ffff8881028c7800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.554393] ==================================================================
[   24.866136] ==================================================================
[   24.866581] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x698/0x5450
[   24.867189] Write of size 4 at addr ffff8881028c7730 by task kunit_try_catch/272
[   24.867943] 
[   24.868201] CPU: 0 UID: 0 PID: 272 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241126 #1
[   24.868987] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.869249] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   24.870091] Call Trace:
[   24.870537]  <TASK>
[   24.870931]  dump_stack_lvl+0x73/0xb0
[   24.871568]  print_report+0xd1/0x640
[   24.872537]  ? __virt_addr_valid+0x1db/0x2d0
[   24.873057]  ? kasan_complete_mode_report_info+0x2a/0x200
[   24.873523]  kasan_report+0x102/0x140
[   24.873960]  ? kasan_atomics_helper+0x698/0x5450
[   24.874382]  ? kasan_atomics_helper+0x698/0x5450
[   24.875043]  kasan_check_range+0x10c/0x1c0
[   24.875458]  __kasan_check_write+0x18/0x20
[   24.875973]  kasan_atomics_helper+0x698/0x5450
[   24.876462]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   24.876834]  ? __kmalloc_cache_noprof+0x184/0x410
[   24.877354]  ? trace_hardirqs_on+0x37/0xe0
[   24.877679]  ? kasan_atomics+0x153/0x310
[   24.878017]  kasan_atomics+0x1dd/0x310
[   24.878447]  ? __pfx_kasan_atomics+0x10/0x10
[   24.879129]  ? __pfx_kasan_atomics+0x10/0x10
[   24.879810]  kunit_try_run_case+0x1b3/0x490
[   24.880140]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.880460]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   24.881102]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   24.881882]  ? __kthread_parkme+0x82/0x160
[   24.882428]  ? preempt_count_sub+0x50/0x80
[   24.883004]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.883447]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   24.884067]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.884420]  kthread+0x257/0x310
[   24.884897]  ? __pfx_kthread+0x10/0x10
[   24.885307]  ret_from_fork+0x41/0x80
[   24.885861]  ? __pfx_kthread+0x10/0x10
[   24.886450]  ret_from_fork_asm+0x1a/0x30
[   24.887045]  </TASK>
[   24.887401] 
[   24.887653] Allocated by task 272:
[   24.888069]  kasan_save_stack+0x3d/0x60
[   24.888437]  kasan_save_track+0x18/0x40
[   24.888966]  kasan_save_alloc_info+0x3b/0x50
[   24.889435]  __kasan_kmalloc+0xb7/0xc0
[   24.889990]  __kmalloc_cache_noprof+0x184/0x410
[   24.890513]  kasan_atomics+0x96/0x310
[   24.890947]  kunit_try_run_case+0x1b3/0x490
[   24.891403]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.892158]  kthread+0x257/0x310
[   24.892564]  ret_from_fork+0x41/0x80
[   24.892999]  ret_from_fork_asm+0x1a/0x30
[   24.893530] 
[   24.893807] The buggy address belongs to the object at ffff8881028c7700
[   24.893807]  which belongs to the cache kmalloc-64 of size 64
[   24.894891] The buggy address is located 0 bytes to the right of
[   24.894891]  allocated 48-byte region [ffff8881028c7700, ffff8881028c7730)
[   24.895511] 
[   24.895805] The buggy address belongs to the physical page:
[   24.896373] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1028c7
[   24.897288] flags: 0x200000000000000(node=0|zone=2)
[   24.897898] page_type: f5(slab)
[   24.898185] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   24.898613] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   24.899004] page dumped because: kasan: bad access detected
[   24.899601] 
[   24.899877] Memory state around the buggy address:
[   24.900328]  ffff8881028c7600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.901131]  ffff8881028c7680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.901860] >ffff8881028c7700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   24.902332]                                      ^
[   24.902800]  ffff8881028c7780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.903539]  ffff8881028c7800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.904296] ==================================================================
[   26.982563] ==================================================================
[   26.984446] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x20c9/0x5450
[   26.985154] Write of size 8 at addr ffff8881028c7730 by task kunit_try_catch/272
[   26.985868] 
[   26.986132] CPU: 0 UID: 0 PID: 272 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241126 #1
[   26.986783] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.987210] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   26.987952] Call Trace:
[   26.988257]  <TASK>
[   26.988542]  dump_stack_lvl+0x73/0xb0
[   26.988929]  print_report+0xd1/0x640
[   26.989219]  ? __virt_addr_valid+0x1db/0x2d0
[   26.989759]  ? kasan_complete_mode_report_info+0x2a/0x200
[   26.990309]  kasan_report+0x102/0x140
[   26.990811]  ? kasan_atomics_helper+0x20c9/0x5450
[   26.991220]  ? kasan_atomics_helper+0x20c9/0x5450
[   26.992552]  kasan_check_range+0x10c/0x1c0
[   26.993072]  __kasan_check_write+0x18/0x20
[   26.993983]  kasan_atomics_helper+0x20c9/0x5450
[   26.994685]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   26.995270]  ? __kmalloc_cache_noprof+0x184/0x410
[   26.995843]  ? trace_hardirqs_on+0x37/0xe0
[   26.996258]  ? kasan_atomics+0x153/0x310
[   26.996662]  kasan_atomics+0x1dd/0x310
[   26.997085]  ? __pfx_kasan_atomics+0x10/0x10
[   26.997661]  ? __pfx_kasan_atomics+0x10/0x10
[   26.998173]  kunit_try_run_case+0x1b3/0x490
[   26.998640]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.999012]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   26.999469]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   27.000049]  ? __kthread_parkme+0x82/0x160
[   27.000395]  ? preempt_count_sub+0x50/0x80
[   27.000918]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.001367]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   27.001944]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.002455]  kthread+0x257/0x310
[   27.002800]  ? __pfx_kthread+0x10/0x10
[   27.003229]  ret_from_fork+0x41/0x80
[   27.003725]  ? __pfx_kthread+0x10/0x10
[   27.004134]  ret_from_fork_asm+0x1a/0x30
[   27.004655]  </TASK>
[   27.004943] 
[   27.005160] Allocated by task 272:
[   27.005473]  kasan_save_stack+0x3d/0x60
[   27.005898]  kasan_save_track+0x18/0x40
[   27.006188]  kasan_save_alloc_info+0x3b/0x50
[   27.006509]  __kasan_kmalloc+0xb7/0xc0
[   27.006973]  __kmalloc_cache_noprof+0x184/0x410
[   27.007441]  kasan_atomics+0x96/0x310
[   27.007906]  kunit_try_run_case+0x1b3/0x490
[   27.008362]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.008955]  kthread+0x257/0x310
[   27.009287]  ret_from_fork+0x41/0x80
[   27.009750]  ret_from_fork_asm+0x1a/0x30
[   27.010071] 
[   27.010299] The buggy address belongs to the object at ffff8881028c7700
[   27.010299]  which belongs to the cache kmalloc-64 of size 64
[   27.011123] The buggy address is located 0 bytes to the right of
[   27.011123]  allocated 48-byte region [ffff8881028c7700, ffff8881028c7730)
[   27.011910] 
[   27.012129] The buggy address belongs to the physical page:
[   27.012688] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1028c7
[   27.013375] flags: 0x200000000000000(node=0|zone=2)
[   27.013917] page_type: f5(slab)
[   27.014182] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   27.014854] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   27.015277] page dumped because: kasan: bad access detected
[   27.015853] 
[   27.016081] Memory state around the buggy address:
[   27.016553]  ffff8881028c7600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.017095]  ffff8881028c7680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.017782] >ffff8881028c7700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   27.018219]                                      ^
[   27.018528]  ffff8881028c7780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.019193]  ffff8881028c7800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.019873] ==================================================================
[   27.175782] ==================================================================
[   27.176478] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x5117/0x5450
[   27.177980] Read of size 8 at addr ffff8881028c7730 by task kunit_try_catch/272
[   27.178566] 
[   27.180792] CPU: 0 UID: 0 PID: 272 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241126 #1
[   27.181531] Tainted: [B]=BAD_PAGE, [N]=TEST
[   27.181988] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   27.182683] Call Trace:
[   27.182906]  <TASK>
[   27.183106]  dump_stack_lvl+0x73/0xb0
[   27.183406]  print_report+0xd1/0x640
[   27.183888]  ? __virt_addr_valid+0x1db/0x2d0
[   27.184374]  ? kasan_complete_mode_report_info+0x2a/0x200
[   27.184993]  kasan_report+0x102/0x140
[   27.185453]  ? kasan_atomics_helper+0x5117/0x5450
[   27.186015]  ? kasan_atomics_helper+0x5117/0x5450
[   27.186371]  __asan_report_load8_noabort+0x18/0x20
[   27.186932]  kasan_atomics_helper+0x5117/0x5450
[   27.187420]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   27.187997]  ? __kmalloc_cache_noprof+0x184/0x410
[   27.188415]  ? trace_hardirqs_on+0x37/0xe0
[   27.188791]  ? kasan_atomics+0x153/0x310
[   27.189097]  kasan_atomics+0x1dd/0x310
[   27.189525]  ? __pfx_kasan_atomics+0x10/0x10
[   27.190037]  ? __pfx_kasan_atomics+0x10/0x10
[   27.190540]  kunit_try_run_case+0x1b3/0x490
[   27.191056]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.191560]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   27.192088]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   27.192423]  ? __kthread_parkme+0x82/0x160
[   27.192796]  ? preempt_count_sub+0x50/0x80
[   27.193106]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.193423]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   27.194085]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.194704]  kthread+0x257/0x310
[   27.195105]  ? __pfx_kthread+0x10/0x10
[   27.195627]  ret_from_fork+0x41/0x80
[   27.196059]  ? __pfx_kthread+0x10/0x10
[   27.196500]  ret_from_fork_asm+0x1a/0x30
[   27.197001]  </TASK>
[   27.197289] 
[   27.197528] Allocated by task 272:
[   27.197941]  kasan_save_stack+0x3d/0x60
[   27.198371]  kasan_save_track+0x18/0x40
[   27.198849]  kasan_save_alloc_info+0x3b/0x50
[   27.199160]  __kasan_kmalloc+0xb7/0xc0
[   27.199628]  __kmalloc_cache_noprof+0x184/0x410
[   27.199995]  kasan_atomics+0x96/0x310
[   27.200409]  kunit_try_run_case+0x1b3/0x490
[   27.200820]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.201224]  kthread+0x257/0x310
[   27.201646]  ret_from_fork+0x41/0x80
[   27.202024]  ret_from_fork_asm+0x1a/0x30
[   27.202465] 
[   27.202737] The buggy address belongs to the object at ffff8881028c7700
[   27.202737]  which belongs to the cache kmalloc-64 of size 64
[   27.203605] The buggy address is located 0 bytes to the right of
[   27.203605]  allocated 48-byte region [ffff8881028c7700, ffff8881028c7730)
[   27.204286] 
[   27.204535] The buggy address belongs to the physical page:
[   27.205089] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1028c7
[   27.205873] flags: 0x200000000000000(node=0|zone=2)
[   27.206306] page_type: f5(slab)
[   27.206619] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   27.207259] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   27.207968] page dumped because: kasan: bad access detected
[   27.208380] 
[   27.210630] Memory state around the buggy address:
[   27.211105]  ffff8881028c7600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.211764]  ffff8881028c7680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.212368] >ffff8881028c7700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   27.214768]                                      ^
[   27.215230]  ffff8881028c7780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.215983]  ffff8881028c7800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.217666] ==================================================================
[   26.767698] ==================================================================
[   26.768085] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1eab/0x5450
[   26.769836] Write of size 8 at addr ffff8881028c7730 by task kunit_try_catch/272
[   26.770317] 
[   26.770535] CPU: 0 UID: 0 PID: 272 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241126 #1
[   26.772170] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.772686] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   26.772965] Call Trace:
[   26.773081]  <TASK>
[   26.773188]  dump_stack_lvl+0x73/0xb0
[   26.773347]  print_report+0xd1/0x640
[   26.774303]  ? __virt_addr_valid+0x1db/0x2d0
[   26.775175]  ? kasan_complete_mode_report_info+0x2a/0x200
[   26.775883]  kasan_report+0x102/0x140
[   26.776387]  ? kasan_atomics_helper+0x1eab/0x5450
[   26.777060]  ? kasan_atomics_helper+0x1eab/0x5450
[   26.777673]  kasan_check_range+0x10c/0x1c0
[   26.778207]  __kasan_check_write+0x18/0x20
[   26.778614]  kasan_atomics_helper+0x1eab/0x5450
[   26.779109]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   26.779652]  ? __kmalloc_cache_noprof+0x184/0x410
[   26.780140]  ? trace_hardirqs_on+0x37/0xe0
[   26.781116]  ? kasan_atomics+0x153/0x310
[   26.781540]  kasan_atomics+0x1dd/0x310
[   26.782334]  ? __pfx_kasan_atomics+0x10/0x10
[   26.782928]  ? __pfx_kasan_atomics+0x10/0x10
[   26.783338]  kunit_try_run_case+0x1b3/0x490
[   26.783879]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.784268]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   26.785755]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   26.786216]  ? __kthread_parkme+0x82/0x160
[   26.786854]  ? preempt_count_sub+0x50/0x80
[   26.787515]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.788154]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   26.789182]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.789844]  kthread+0x257/0x310
[   26.790153]  ? __pfx_kthread+0x10/0x10
[   26.790594]  ret_from_fork+0x41/0x80
[   26.791055]  ? __pfx_kthread+0x10/0x10
[   26.791376]  ret_from_fork_asm+0x1a/0x30
[   26.792379]  </TASK>
[   26.792841] 
[   26.793256] Allocated by task 272:
[   26.793620]  kasan_save_stack+0x3d/0x60
[   26.794277]  kasan_save_track+0x18/0x40
[   26.794721]  kasan_save_alloc_info+0x3b/0x50
[   26.795393]  __kasan_kmalloc+0xb7/0xc0
[   26.796036]  __kmalloc_cache_noprof+0x184/0x410
[   26.796636]  kasan_atomics+0x96/0x310
[   26.797036]  kunit_try_run_case+0x1b3/0x490
[   26.797407]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.797959]  kthread+0x257/0x310
[   26.798279]  ret_from_fork+0x41/0x80
[   26.799272]  ret_from_fork_asm+0x1a/0x30
[   26.799587] 
[   26.800265] The buggy address belongs to the object at ffff8881028c7700
[   26.800265]  which belongs to the cache kmalloc-64 of size 64
[   26.801569] The buggy address is located 0 bytes to the right of
[   26.801569]  allocated 48-byte region [ffff8881028c7700, ffff8881028c7730)
[   26.802588] 
[   26.802812] The buggy address belongs to the physical page:
[   26.803294] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1028c7
[   26.804371] flags: 0x200000000000000(node=0|zone=2)
[   26.805168] page_type: f5(slab)
[   26.805636] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   26.806473] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   26.807013] page dumped because: kasan: bad access detected
[   26.807463] 
[   26.808194] Memory state around the buggy address:
[   26.808671]  ffff8881028c7600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.809377]  ffff8881028c7680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.810232] >ffff8881028c7700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   26.811057]                                      ^
[   26.811461]  ffff8881028c7780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.812458]  ffff8881028c7800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.813125] ==================================================================
[   24.652897] ==================================================================
[   24.653647] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b56/0x5450
[   24.654321] Read of size 4 at addr ffff8881028c7730 by task kunit_try_catch/272
[   24.654749] 
[   24.655000] CPU: 0 UID: 0 PID: 272 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241126 #1
[   24.655900] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.656318] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   24.657010] Call Trace:
[   24.657248]  <TASK>
[   24.657676]  dump_stack_lvl+0x73/0xb0
[   24.658068]  print_report+0xd1/0x640
[   24.658502]  ? __virt_addr_valid+0x1db/0x2d0
[   24.658886]  ? kasan_complete_mode_report_info+0x2a/0x200
[   24.659378]  kasan_report+0x102/0x140
[   24.659738]  ? kasan_atomics_helper+0x4b56/0x5450
[   24.660062]  ? kasan_atomics_helper+0x4b56/0x5450
[   24.660619]  __asan_report_load4_noabort+0x18/0x20
[   24.661123]  kasan_atomics_helper+0x4b56/0x5450
[   24.661671]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   24.662192]  ? __kmalloc_cache_noprof+0x184/0x410
[   24.662640]  ? trace_hardirqs_on+0x37/0xe0
[   24.662934]  ? kasan_atomics+0x153/0x310
[   24.663375]  kasan_atomics+0x1dd/0x310
[   24.663881]  ? __pfx_kasan_atomics+0x10/0x10
[   24.664349]  ? __pfx_kasan_atomics+0x10/0x10
[   24.664791]  kunit_try_run_case+0x1b3/0x490
[   24.665182]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.665786]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   24.666201]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   24.666625]  ? __kthread_parkme+0x82/0x160
[   24.667085]  ? preempt_count_sub+0x50/0x80
[   24.667462]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.668016]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   24.668396]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.669005]  kthread+0x257/0x310
[   24.669396]  ? __pfx_kthread+0x10/0x10
[   24.669804]  ret_from_fork+0x41/0x80
[   24.670177]  ? __pfx_kthread+0x10/0x10
[   24.670467]  ret_from_fork_asm+0x1a/0x30
[   24.670852]  </TASK>
[   24.671048] 
[   24.671264] Allocated by task 272:
[   24.671692]  kasan_save_stack+0x3d/0x60
[   24.672122]  kasan_save_track+0x18/0x40
[   24.672555]  kasan_save_alloc_info+0x3b/0x50
[   24.673055]  __kasan_kmalloc+0xb7/0xc0
[   24.673464]  __kmalloc_cache_noprof+0x184/0x410
[   24.673977]  kasan_atomics+0x96/0x310
[   24.674386]  kunit_try_run_case+0x1b3/0x490
[   24.674891]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.675372]  kthread+0x257/0x310
[   24.675697]  ret_from_fork+0x41/0x80
[   24.675968]  ret_from_fork_asm+0x1a/0x30
[   24.676242] 
[   24.676401] The buggy address belongs to the object at ffff8881028c7700
[   24.676401]  which belongs to the cache kmalloc-64 of size 64
[   24.677472] The buggy address is located 0 bytes to the right of
[   24.677472]  allocated 48-byte region [ffff8881028c7700, ffff8881028c7730)
[   24.678630] 
[   24.678858] The buggy address belongs to the physical page:
[   24.679366] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1028c7
[   24.680034] flags: 0x200000000000000(node=0|zone=2)
[   24.680525] page_type: f5(slab)
[   24.680827] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   24.681403] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   24.681857] page dumped because: kasan: bad access detected
[   24.682171] 
[   24.682386] Memory state around the buggy address:
[   24.682893]  ffff8881028c7600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.683522]  ffff8881028c7680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.684183] >ffff8881028c7700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   24.684859]                                      ^
[   24.685358]  ffff8881028c7780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.685973]  ffff8881028c7800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.686383] ==================================================================
[   26.592863] ==================================================================
[   26.593657] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4f32/0x5450
[   26.594358] Read of size 8 at addr ffff8881028c7730 by task kunit_try_catch/272
[   26.595207] 
[   26.595540] CPU: 0 UID: 0 PID: 272 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241126 #1
[   26.596180] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.596442] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   26.597228] Call Trace:
[   26.597642]  <TASK>
[   26.597990]  dump_stack_lvl+0x73/0xb0
[   26.598444]  print_report+0xd1/0x640
[   26.598977]  ? __virt_addr_valid+0x1db/0x2d0
[   26.599476]  ? kasan_complete_mode_report_info+0x2a/0x200
[   26.600007]  kasan_report+0x102/0x140
[   26.600383]  ? kasan_atomics_helper+0x4f32/0x5450
[   26.600978]  ? kasan_atomics_helper+0x4f32/0x5450
[   26.601524]  __asan_report_load8_noabort+0x18/0x20
[   26.602108]  kasan_atomics_helper+0x4f32/0x5450
[   26.602671]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   26.603179]  ? __kmalloc_cache_noprof+0x184/0x410
[   26.603822]  ? trace_hardirqs_on+0x37/0xe0
[   26.604165]  ? kasan_atomics+0x153/0x310
[   26.604540]  kasan_atomics+0x1dd/0x310
[   26.605097]  ? __pfx_kasan_atomics+0x10/0x10
[   26.605663]  ? __pfx_kasan_atomics+0x10/0x10
[   26.606161]  kunit_try_run_case+0x1b3/0x490
[   26.606472]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.607154]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   26.607779]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   26.608379]  ? __kthread_parkme+0x82/0x160
[   26.608910]  ? preempt_count_sub+0x50/0x80
[   26.609441]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.609995]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   26.610384]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.610806]  kthread+0x257/0x310
[   26.611272]  ? __pfx_kthread+0x10/0x10
[   26.611908]  ret_from_fork+0x41/0x80
[   26.612334]  ? __pfx_kthread+0x10/0x10
[   26.612904]  ret_from_fork_asm+0x1a/0x30
[   26.613437]  </TASK>
[   26.613856] 
[   26.614146] Allocated by task 272:
[   26.614554]  kasan_save_stack+0x3d/0x60
[   26.615114]  kasan_save_track+0x18/0x40
[   26.615699]  kasan_save_alloc_info+0x3b/0x50
[   26.616092]  __kasan_kmalloc+0xb7/0xc0
[   26.616431]  __kmalloc_cache_noprof+0x184/0x410
[   26.617044]  kasan_atomics+0x96/0x310
[   26.617475]  kunit_try_run_case+0x1b3/0x490
[   26.618002]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.618564]  kthread+0x257/0x310
[   26.619068]  ret_from_fork+0x41/0x80
[   26.619459]  ret_from_fork_asm+0x1a/0x30
[   26.619950] 
[   26.620204] The buggy address belongs to the object at ffff8881028c7700
[   26.620204]  which belongs to the cache kmalloc-64 of size 64
[   26.621156] The buggy address is located 0 bytes to the right of
[   26.621156]  allocated 48-byte region [ffff8881028c7700, ffff8881028c7730)
[   26.622197] 
[   26.622402] The buggy address belongs to the physical page:
[   26.623043] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1028c7
[   26.623667] flags: 0x200000000000000(node=0|zone=2)
[   26.624218] page_type: f5(slab)
[   26.624724] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   26.625403] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   26.625998] page dumped because: kasan: bad access detected
[   26.626673] 
[   26.626946] Memory state around the buggy address:
[   26.627242]  ffff8881028c7600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.627825]  ffff8881028c7680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.628502] >ffff8881028c7700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   26.629158]                                      ^
[   26.629702]  ffff8881028c7780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.630426]  ffff8881028c7800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.631068] ==================================================================
[   25.908863] ==================================================================
[   25.910365] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x13b6/0x5450
[   25.910934] Read of size 8 at addr ffff8881028c7730 by task kunit_try_catch/272
[   25.911327] 
[   25.911542] CPU: 0 UID: 0 PID: 272 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241126 #1
[   25.912156] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.912647] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   25.913423] Call Trace:
[   25.913822]  <TASK>
[   25.914164]  dump_stack_lvl+0x73/0xb0
[   25.914700]  print_report+0xd1/0x640
[   25.915141]  ? __virt_addr_valid+0x1db/0x2d0
[   25.915714]  ? kasan_complete_mode_report_info+0x2a/0x200
[   25.916233]  kasan_report+0x102/0x140
[   25.916882]  ? kasan_atomics_helper+0x13b6/0x5450
[   25.917225]  ? kasan_atomics_helper+0x13b6/0x5450
[   25.918702]  kasan_check_range+0x10c/0x1c0
[   25.919249]  __kasan_check_read+0x15/0x20
[   25.919740]  kasan_atomics_helper+0x13b6/0x5450
[   25.920243]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   25.921369]  ? __kmalloc_cache_noprof+0x184/0x410
[   25.921988]  ? trace_hardirqs_on+0x37/0xe0
[   25.922446]  ? kasan_atomics+0x153/0x310
[   25.922995]  kasan_atomics+0x1dd/0x310
[   25.923439]  ? __pfx_kasan_atomics+0x10/0x10
[   25.925941]  ? __pfx_kasan_atomics+0x10/0x10
[   25.926324]  kunit_try_run_case+0x1b3/0x490
[   25.926834]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.927278]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   25.928165]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   25.928912]  ? __kthread_parkme+0x82/0x160
[   25.929443]  ? preempt_count_sub+0x50/0x80
[   25.930066]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.930663]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   25.931406]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.932141]  kthread+0x257/0x310
[   25.932992]  ? __pfx_kthread+0x10/0x10
[   25.933392]  ret_from_fork+0x41/0x80
[   25.933846]  ? __pfx_kthread+0x10/0x10
[   25.934723]  ret_from_fork_asm+0x1a/0x30
[   25.935396]  </TASK>
[   25.935870] 
[   25.936012] Allocated by task 272:
[   25.936575]  kasan_save_stack+0x3d/0x60
[   25.937143]  kasan_save_track+0x18/0x40
[   25.937591]  kasan_save_alloc_info+0x3b/0x50
[   25.938510]  __kasan_kmalloc+0xb7/0xc0
[   25.939114]  __kmalloc_cache_noprof+0x184/0x410
[   25.939409]  kasan_atomics+0x96/0x310
[   25.939820]  kunit_try_run_case+0x1b3/0x490
[   25.940690]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.941031]  kthread+0x257/0x310
[   25.941522]  ret_from_fork+0x41/0x80
[   25.942055]  ret_from_fork_asm+0x1a/0x30
[   25.942610] 
[   25.942881] The buggy address belongs to the object at ffff8881028c7700
[   25.942881]  which belongs to the cache kmalloc-64 of size 64
[   25.944228] The buggy address is located 0 bytes to the right of
[   25.944228]  allocated 48-byte region [ffff8881028c7700, ffff8881028c7730)
[   25.945640] 
[   25.945930] The buggy address belongs to the physical page:
[   25.946654] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1028c7
[   25.947520] flags: 0x200000000000000(node=0|zone=2)
[   25.948343] page_type: f5(slab)
[   25.948713] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   25.949657] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   25.950269] page dumped because: kasan: bad access detected
[   25.950886] 
[   25.951053] Memory state around the buggy address:
[   25.951728]  ffff8881028c7600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.952653]  ffff8881028c7680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.953553] >ffff8881028c7700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   25.954203]                                      ^
[   25.954964]  ffff8881028c7780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.955450]  ffff8881028c7800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.956388] ==================================================================