Hay
Date
Nov. 28, 2024, 2:36 a.m.

Environment
qemu-arm64
qemu-x86_64

[   35.494805] ==================================================================
[   35.495509] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xad4/0x4858
[   35.496351] Write of size 4 at addr fff00000c63df030 by task kunit_try_catch/253
[   35.496912] 
[   35.497834] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241128 #1
[   35.499173] Tainted: [B]=BAD_PAGE, [N]=TEST
[   35.499878] Hardware name: linux,dummy-virt (DT)
[   35.500657] Call trace:
[   35.501254]  show_stack+0x20/0x38 (C)
[   35.501964]  dump_stack_lvl+0x8c/0xd0
[   35.502696]  print_report+0x118/0x5e0
[   35.503232]  kasan_report+0xc8/0x118
[   35.503774]  kasan_check_range+0x100/0x1a8
[   35.504355]  __kasan_check_write+0x20/0x30
[   35.504997]  kasan_atomics_helper+0xad4/0x4858
[   35.505571]  kasan_atomics+0x198/0x2e8
[   35.506182]  kunit_try_run_case+0x14c/0x3d0
[   35.506769]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.507523]  kthread+0x24c/0x2d0
[   35.508048]  ret_from_fork+0x10/0x20
[   35.508638] 
[   35.508997] Allocated by task 253:
[   35.509533]  kasan_save_stack+0x3c/0x68
[   35.510014]  kasan_save_track+0x20/0x40
[   35.510617]  kasan_save_alloc_info+0x40/0x58
[   35.511229]  __kasan_kmalloc+0xd4/0xd8
[   35.511824]  __kmalloc_cache_noprof+0x15c/0x3c0
[   35.512486]  kasan_atomics+0xb8/0x2e8
[   35.513019]  kunit_try_run_case+0x14c/0x3d0
[   35.513661]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.514342]  kthread+0x24c/0x2d0
[   35.514831]  ret_from_fork+0x10/0x20
[   35.515380] 
[   35.515682] The buggy address belongs to the object at fff00000c63df000
[   35.515682]  which belongs to the cache kmalloc-64 of size 64
[   35.516906] The buggy address is located 0 bytes to the right of
[   35.516906]  allocated 48-byte region [fff00000c63df000, fff00000c63df030)
[   35.518099] 
[   35.518426] The buggy address belongs to the physical page:
[   35.519046] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063df
[   35.519998] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   35.520715] page_type: f5(slab)
[   35.521224] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   35.522047] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   35.522865] page dumped because: kasan: bad access detected
[   35.523404] 
[   35.523749] Memory state around the buggy address:
[   35.524428]  fff00000c63def00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   35.525141]  fff00000c63def80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   35.526031] >fff00000c63df000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   35.526806]                                      ^
[   35.527432]  fff00000c63df080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.528169]  fff00000c63df100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.529031] ==================================================================
[   35.564570] ==================================================================
[   35.565316] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xb70/0x4858
[   35.566061] Write of size 4 at addr fff00000c63df030 by task kunit_try_catch/253
[   35.566892] 
[   35.567247] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241128 #1
[   35.568361] Tainted: [B]=BAD_PAGE, [N]=TEST
[   35.568904] Hardware name: linux,dummy-virt (DT)
[   35.569527] Call trace:
[   35.569924]  show_stack+0x20/0x38 (C)
[   35.571679]  dump_stack_lvl+0x8c/0xd0
[   35.572148]  print_report+0x118/0x5e0
[   35.573010]  kasan_report+0xc8/0x118
[   35.573556]  kasan_check_range+0x100/0x1a8
[   35.574103]  __kasan_check_write+0x20/0x30
[   35.574757]  kasan_atomics_helper+0xb70/0x4858
[   35.575357]  kasan_atomics+0x198/0x2e8
[   35.575965]  kunit_try_run_case+0x14c/0x3d0
[   35.576607]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.577218]  kthread+0x24c/0x2d0
[   35.577814]  ret_from_fork+0x10/0x20
[   35.578429] 
[   35.578773] Allocated by task 253:
[   35.579279]  kasan_save_stack+0x3c/0x68
[   35.579827]  kasan_save_track+0x20/0x40
[   35.580319]  kasan_save_alloc_info+0x40/0x58
[   35.580951]  __kasan_kmalloc+0xd4/0xd8
[   35.581484]  __kmalloc_cache_noprof+0x15c/0x3c0
[   35.582156]  kasan_atomics+0xb8/0x2e8
[   35.582723]  kunit_try_run_case+0x14c/0x3d0
[   35.583281]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.583924]  kthread+0x24c/0x2d0
[   35.584475]  ret_from_fork+0x10/0x20
[   35.585038] 
[   35.585878] The buggy address belongs to the object at fff00000c63df000
[   35.585878]  which belongs to the cache kmalloc-64 of size 64
[   35.587002] The buggy address is located 0 bytes to the right of
[   35.587002]  allocated 48-byte region [fff00000c63df000, fff00000c63df030)
[   35.588259] 
[   35.588624] The buggy address belongs to the physical page:
[   35.589280] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063df
[   35.590243] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   35.591026] page_type: f5(slab)
[   35.591577] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   35.592453] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   35.593236] page dumped because: kasan: bad access detected
[   35.593918] 
[   35.594265] Memory state around the buggy address:
[   35.594921]  fff00000c63def00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   35.595701]  fff00000c63def80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   35.596555] >fff00000c63df000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   35.597379]                                      ^
[   35.598051]  fff00000c63df080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.598817]  fff00000c63df100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.599510] ==================================================================
[   35.278513] ==================================================================
[   35.279825] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x894/0x4858
[   35.280715] Write of size 4 at addr fff00000c63df030 by task kunit_try_catch/253
[   35.281725] 
[   35.282073] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241128 #1
[   35.283054] Tainted: [B]=BAD_PAGE, [N]=TEST
[   35.283639] Hardware name: linux,dummy-virt (DT)
[   35.284203] Call trace:
[   35.284609]  show_stack+0x20/0x38 (C)
[   35.285166]  dump_stack_lvl+0x8c/0xd0
[   35.285785]  print_report+0x118/0x5e0
[   35.286402]  kasan_report+0xc8/0x118
[   35.286980]  kasan_check_range+0x100/0x1a8
[   35.287627]  __kasan_check_write+0x20/0x30
[   35.288240]  kasan_atomics_helper+0x894/0x4858
[   35.288913]  kasan_atomics+0x198/0x2e8
[   35.289534]  kunit_try_run_case+0x14c/0x3d0
[   35.290348]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.291071]  kthread+0x24c/0x2d0
[   35.291555]  ret_from_fork+0x10/0x20
[   35.292054] 
[   35.292461] Allocated by task 253:
[   35.292985]  kasan_save_stack+0x3c/0x68
[   35.293685]  kasan_save_track+0x20/0x40
[   35.294355]  kasan_save_alloc_info+0x40/0x58
[   35.295038]  __kasan_kmalloc+0xd4/0xd8
[   35.295699]  __kmalloc_cache_noprof+0x15c/0x3c0
[   35.296434]  kasan_atomics+0xb8/0x2e8
[   35.297020]  kunit_try_run_case+0x14c/0x3d0
[   35.297742]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.298506]  kthread+0x24c/0x2d0
[   35.299103]  ret_from_fork+0x10/0x20
[   35.299726] 
[   35.300144] The buggy address belongs to the object at fff00000c63df000
[   35.300144]  which belongs to the cache kmalloc-64 of size 64
[   35.301433] The buggy address is located 0 bytes to the right of
[   35.301433]  allocated 48-byte region [fff00000c63df000, fff00000c63df030)
[   35.302801] 
[   35.303201] The buggy address belongs to the physical page:
[   35.303857] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063df
[   35.304853] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   35.305691] page_type: f5(slab)
[   35.306267] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   35.307213] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   35.308133] page dumped because: kasan: bad access detected
[   35.308844] 
[   35.309233] Memory state around the buggy address:
[   35.309891]  fff00000c63def00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   35.310798]  fff00000c63def80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   35.311659] >fff00000c63df000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   35.312390]                                      ^
[   35.312919]  fff00000c63df080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.313663]  fff00000c63df100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.314588] ==================================================================
[   35.846720] ==================================================================
[   35.847523] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xdd4/0x4858
[   35.849212] Read of size 8 at addr fff00000c63df030 by task kunit_try_catch/253
[   35.850389] 
[   35.850966] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241128 #1
[   35.852195] Tainted: [B]=BAD_PAGE, [N]=TEST
[   35.852661] Hardware name: linux,dummy-virt (DT)
[   35.853230] Call trace:
[   35.853617]  show_stack+0x20/0x38 (C)
[   35.854205]  dump_stack_lvl+0x8c/0xd0
[   35.854753]  print_report+0x118/0x5e0
[   35.855327]  kasan_report+0xc8/0x118
[   35.855921]  kasan_check_range+0x100/0x1a8
[   35.856507]  __kasan_check_read+0x20/0x30
[   35.857100]  kasan_atomics_helper+0xdd4/0x4858
[   35.857731]  kasan_atomics+0x198/0x2e8
[   35.858346]  kunit_try_run_case+0x14c/0x3d0
[   35.858921]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.859684]  kthread+0x24c/0x2d0
[   35.860225]  ret_from_fork+0x10/0x20
[   35.860768] 
[   35.861107] Allocated by task 253:
[   35.861594]  kasan_save_stack+0x3c/0x68
[   35.862187]  kasan_save_track+0x20/0x40
[   35.862734]  kasan_save_alloc_info+0x40/0x58
[   35.863345]  __kasan_kmalloc+0xd4/0xd8
[   35.863934]  __kmalloc_cache_noprof+0x15c/0x3c0
[   35.864609]  kasan_atomics+0xb8/0x2e8
[   35.865107]  kunit_try_run_case+0x14c/0x3d0
[   35.865678]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.866425]  kthread+0x24c/0x2d0
[   35.866858]  ret_from_fork+0x10/0x20
[   35.867437] 
[   35.867804] The buggy address belongs to the object at fff00000c63df000
[   35.867804]  which belongs to the cache kmalloc-64 of size 64
[   35.868873] The buggy address is located 0 bytes to the right of
[   35.868873]  allocated 48-byte region [fff00000c63df000, fff00000c63df030)
[   35.870130] 
[   35.870493] The buggy address belongs to the physical page:
[   35.871137] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063df
[   35.872025] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   35.872859] page_type: f5(slab)
[   35.873346] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   35.874212] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   35.875056] page dumped because: kasan: bad access detected
[   35.875660] 
[   35.876009] Memory state around the buggy address:
[   35.876587]  fff00000c63def00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   35.877373]  fff00000c63def80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   35.878196] >fff00000c63df000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   35.878946]                                      ^
[   35.879525]  fff00000c63df080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.880340]  fff00000c63df100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.881041] ==================================================================
[   36.666244] ==================================================================
[   36.667105] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1644/0x4858
[   36.667907] Write of size 8 at addr fff00000c63df030 by task kunit_try_catch/253
[   36.668846] 
[   36.669293] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241128 #1
[   36.670465] Tainted: [B]=BAD_PAGE, [N]=TEST
[   36.671075] Hardware name: linux,dummy-virt (DT)
[   36.671756] Call trace:
[   36.672263]  show_stack+0x20/0x38 (C)
[   36.672939]  dump_stack_lvl+0x8c/0xd0
[   36.673528]  print_report+0x118/0x5e0
[   36.674214]  kasan_report+0xc8/0x118
[   36.674842]  kasan_check_range+0x100/0x1a8
[   36.675525]  __kasan_check_write+0x20/0x30
[   36.676209]  kasan_atomics_helper+0x1644/0x4858
[   36.676923]  kasan_atomics+0x198/0x2e8
[   36.677595]  kunit_try_run_case+0x14c/0x3d0
[   36.678299]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.679086]  kthread+0x24c/0x2d0
[   36.679698]  ret_from_fork+0x10/0x20
[   36.680360] 
[   36.680747] Allocated by task 253:
[   36.681300]  kasan_save_stack+0x3c/0x68
[   36.681941]  kasan_save_track+0x20/0x40
[   36.682533]  kasan_save_alloc_info+0x40/0x58
[   36.683225]  __kasan_kmalloc+0xd4/0xd8
[   36.683832]  __kmalloc_cache_noprof+0x15c/0x3c0
[   36.684500]  kasan_atomics+0xb8/0x2e8
[   36.685090]  kunit_try_run_case+0x14c/0x3d0
[   36.685741]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.686482]  kthread+0x24c/0x2d0
[   36.687034]  ret_from_fork+0x10/0x20
[   36.687619] 
[   36.688023] The buggy address belongs to the object at fff00000c63df000
[   36.688023]  which belongs to the cache kmalloc-64 of size 64
[   36.689245] The buggy address is located 0 bytes to the right of
[   36.689245]  allocated 48-byte region [fff00000c63df000, fff00000c63df030)
[   36.690565] 
[   36.690885] The buggy address belongs to the physical page:
[   36.691610] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063df
[   36.692569] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   36.693399] page_type: f5(slab)
[   36.693932] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   36.694878] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   36.695769] page dumped because: kasan: bad access detected
[   36.696479] 
[   36.696865] Memory state around the buggy address:
[   36.697562]  fff00000c63def00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   36.698479]  fff00000c63def80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   36.699292] >fff00000c63df000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   36.700152]                                      ^
[   36.700803]  fff00000c63df080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.701664]  fff00000c63df100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.702468] ==================================================================
[   36.590889] ==================================================================
[   36.591559] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x15b4/0x4858
[   36.592415] Write of size 8 at addr fff00000c63df030 by task kunit_try_catch/253
[   36.594392] 
[   36.594782] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241128 #1
[   36.596138] Tainted: [B]=BAD_PAGE, [N]=TEST
[   36.596886] Hardware name: linux,dummy-virt (DT)
[   36.597448] Call trace:
[   36.597815]  show_stack+0x20/0x38 (C)
[   36.598647]  dump_stack_lvl+0x8c/0xd0
[   36.599247]  print_report+0x118/0x5e0
[   36.600035]  kasan_report+0xc8/0x118
[   36.600608]  kasan_check_range+0x100/0x1a8
[   36.601457]  __kasan_check_write+0x20/0x30
[   36.602222]  kasan_atomics_helper+0x15b4/0x4858
[   36.603003]  kasan_atomics+0x198/0x2e8
[   36.603588]  kunit_try_run_case+0x14c/0x3d0
[   36.604445]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.605317]  kthread+0x24c/0x2d0
[   36.606028]  ret_from_fork+0x10/0x20
[   36.606629] 
[   36.607195] Allocated by task 253:
[   36.607819]  kasan_save_stack+0x3c/0x68
[   36.608564]  kasan_save_track+0x20/0x40
[   36.609098]  kasan_save_alloc_info+0x40/0x58
[   36.609944]  __kasan_kmalloc+0xd4/0xd8
[   36.610661]  __kmalloc_cache_noprof+0x15c/0x3c0
[   36.611432]  kasan_atomics+0xb8/0x2e8
[   36.611984]  kunit_try_run_case+0x14c/0x3d0
[   36.612769]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.613463]  kthread+0x24c/0x2d0
[   36.613958]  ret_from_fork+0x10/0x20
[   36.614569] 
[   36.614903] The buggy address belongs to the object at fff00000c63df000
[   36.614903]  which belongs to the cache kmalloc-64 of size 64
[   36.616151] The buggy address is located 0 bytes to the right of
[   36.616151]  allocated 48-byte region [fff00000c63df000, fff00000c63df030)
[   36.617410] 
[   36.617770] The buggy address belongs to the physical page:
[   36.618414] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063df
[   36.619309] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   36.620094] page_type: f5(slab)
[   36.620694] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   36.621571] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   36.622428] page dumped because: kasan: bad access detected
[   36.623078] 
[   36.623461] Memory state around the buggy address:
[   36.624082]  fff00000c63def00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   36.624856]  fff00000c63def80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   36.625789] >fff00000c63df000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   36.626700]                                      ^
[   36.627252]  fff00000c63df080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.628152]  fff00000c63df100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.628933] ==================================================================
[   35.459642] ==================================================================
[   35.460446] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa6c/0x4858
[   35.461096] Write of size 4 at addr fff00000c63df030 by task kunit_try_catch/253
[   35.462108] 
[   35.462664] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241128 #1
[   35.463709] Tainted: [B]=BAD_PAGE, [N]=TEST
[   35.464320] Hardware name: linux,dummy-virt (DT)
[   35.464904] Call trace:
[   35.465858]  show_stack+0x20/0x38 (C)
[   35.466429]  dump_stack_lvl+0x8c/0xd0
[   35.467017]  print_report+0x118/0x5e0
[   35.467595]  kasan_report+0xc8/0x118
[   35.468096]  kasan_check_range+0x100/0x1a8
[   35.468643]  __kasan_check_write+0x20/0x30
[   35.469280]  kasan_atomics_helper+0xa6c/0x4858
[   35.469889]  kasan_atomics+0x198/0x2e8
[   35.470385]  kunit_try_run_case+0x14c/0x3d0
[   35.471031]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.471796]  kthread+0x24c/0x2d0
[   35.472380]  ret_from_fork+0x10/0x20
[   35.472924] 
[   35.473285] Allocated by task 253:
[   35.473809]  kasan_save_stack+0x3c/0x68
[   35.474393]  kasan_save_track+0x20/0x40
[   35.474920]  kasan_save_alloc_info+0x40/0x58
[   35.475504]  __kasan_kmalloc+0xd4/0xd8
[   35.476013]  __kmalloc_cache_noprof+0x15c/0x3c0
[   35.476557]  kasan_atomics+0xb8/0x2e8
[   35.477147]  kunit_try_run_case+0x14c/0x3d0
[   35.477764]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.478367]  kthread+0x24c/0x2d0
[   35.478915]  ret_from_fork+0x10/0x20
[   35.479493] 
[   35.479842] The buggy address belongs to the object at fff00000c63df000
[   35.479842]  which belongs to the cache kmalloc-64 of size 64
[   35.480922] The buggy address is located 0 bytes to the right of
[   35.480922]  allocated 48-byte region [fff00000c63df000, fff00000c63df030)
[   35.482165] 
[   35.482514] The buggy address belongs to the physical page:
[   35.483204] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063df
[   35.484131] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   35.484942] page_type: f5(slab)
[   35.485449] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   35.486228] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   35.486980] page dumped because: kasan: bad access detected
[   35.487695] 
[   35.488009] Memory state around the buggy address:
[   35.488681]  fff00000c63def00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   35.489487]  fff00000c63def80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   35.490225] >fff00000c63df000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   35.490959]                                      ^
[   35.491542]  fff00000c63df080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.492287]  fff00000c63df100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.493024] ==================================================================
[   35.742170] ==================================================================
[   35.742946] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3dd8/0x4858
[   35.743731] Read of size 4 at addr fff00000c63df030 by task kunit_try_catch/253
[   35.745554] 
[   35.745989] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241128 #1
[   35.746986] Tainted: [B]=BAD_PAGE, [N]=TEST
[   35.747598] Hardware name: linux,dummy-virt (DT)
[   35.748128] Call trace:
[   35.748564]  show_stack+0x20/0x38 (C)
[   35.749161]  dump_stack_lvl+0x8c/0xd0
[   35.749769]  print_report+0x118/0x5e0
[   35.750392]  kasan_report+0xc8/0x118
[   35.750899]  __asan_report_load4_noabort+0x20/0x30
[   35.751604]  kasan_atomics_helper+0x3dd8/0x4858
[   35.752288]  kasan_atomics+0x198/0x2e8
[   35.752822]  kunit_try_run_case+0x14c/0x3d0
[   35.753459]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.754211]  kthread+0x24c/0x2d0
[   35.754776]  ret_from_fork+0x10/0x20
[   35.755341] 
[   35.755694] Allocated by task 253:
[   35.756193]  kasan_save_stack+0x3c/0x68
[   35.756678]  kasan_save_track+0x20/0x40
[   35.757261]  kasan_save_alloc_info+0x40/0x58
[   35.757940]  __kasan_kmalloc+0xd4/0xd8
[   35.758532]  __kmalloc_cache_noprof+0x15c/0x3c0
[   35.759212]  kasan_atomics+0xb8/0x2e8
[   35.759739]  kunit_try_run_case+0x14c/0x3d0
[   35.760408]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.761162]  kthread+0x24c/0x2d0
[   35.761607]  ret_from_fork+0x10/0x20
[   35.762194] 
[   35.762501] The buggy address belongs to the object at fff00000c63df000
[   35.762501]  which belongs to the cache kmalloc-64 of size 64
[   35.763700] The buggy address is located 0 bytes to the right of
[   35.763700]  allocated 48-byte region [fff00000c63df000, fff00000c63df030)
[   35.764812] 
[   35.765186] The buggy address belongs to the physical page:
[   35.765860] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063df
[   35.766688] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   35.767356] page_type: f5(slab)
[   35.767911] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   35.768820] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   35.769618] page dumped because: kasan: bad access detected
[   35.770332] 
[   35.770637] Memory state around the buggy address:
[   35.771156]  fff00000c63def00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   35.771998]  fff00000c63def80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   35.772777] >fff00000c63df000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   35.773414]                                      ^
[   35.774057]  fff00000c63df080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.774845]  fff00000c63df100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.775649] ==================================================================
[   36.704511] ==================================================================
[   36.705300] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3df4/0x4858
[   36.706316] Read of size 8 at addr fff00000c63df030 by task kunit_try_catch/253
[   36.706898] 
[   36.708088] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241128 #1
[   36.709293] Tainted: [B]=BAD_PAGE, [N]=TEST
[   36.709743] Hardware name: linux,dummy-virt (DT)
[   36.710362] Call trace:
[   36.710733]  show_stack+0x20/0x38 (C)
[   36.711304]  dump_stack_lvl+0x8c/0xd0
[   36.711846]  print_report+0x118/0x5e0
[   36.712426]  kasan_report+0xc8/0x118
[   36.712898]  __asan_report_load8_noabort+0x20/0x30
[   36.713722]  kasan_atomics_helper+0x3df4/0x4858
[   36.714377]  kasan_atomics+0x198/0x2e8
[   36.714968]  kunit_try_run_case+0x14c/0x3d0
[   36.715549]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.716250]  kthread+0x24c/0x2d0
[   36.716820]  ret_from_fork+0x10/0x20
[   36.717356] 
[   36.717711] Allocated by task 253:
[   36.718237]  kasan_save_stack+0x3c/0x68
[   36.718820]  kasan_save_track+0x20/0x40
[   36.719330]  kasan_save_alloc_info+0x40/0x58
[   36.719974]  __kasan_kmalloc+0xd4/0xd8
[   36.720526]  __kmalloc_cache_noprof+0x15c/0x3c0
[   36.721095]  kasan_atomics+0xb8/0x2e8
[   36.721625]  kunit_try_run_case+0x14c/0x3d0
[   36.722131]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.722873]  kthread+0x24c/0x2d0
[   36.723384]  ret_from_fork+0x10/0x20
[   36.723861] 
[   36.724216] The buggy address belongs to the object at fff00000c63df000
[   36.724216]  which belongs to the cache kmalloc-64 of size 64
[   36.725272] The buggy address is located 0 bytes to the right of
[   36.725272]  allocated 48-byte region [fff00000c63df000, fff00000c63df030)
[   36.726627] 
[   36.726978] The buggy address belongs to the physical page:
[   36.727588] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063df
[   36.728341] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   36.729171] page_type: f5(slab)
[   36.729706] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   36.730641] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   36.731423] page dumped because: kasan: bad access detected
[   36.732076] 
[   36.732872] Memory state around the buggy address:
[   36.733506]  fff00000c63def00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   36.734475]  fff00000c63def80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   36.735415] >fff00000c63df000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   36.736335]                                      ^
[   36.736913]  fff00000c63df080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.737677]  fff00000c63df100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.738410] ==================================================================
[   36.230826] ==================================================================
[   36.231693] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1190/0x4858
[   36.232535] Write of size 8 at addr fff00000c63df030 by task kunit_try_catch/253
[   36.233358] 
[   36.233720] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241128 #1
[   36.234624] Tainted: [B]=BAD_PAGE, [N]=TEST
[   36.235219] Hardware name: linux,dummy-virt (DT)
[   36.235831] Call trace:
[   36.236250]  show_stack+0x20/0x38 (C)
[   36.236847]  dump_stack_lvl+0x8c/0xd0
[   36.237413]  print_report+0x118/0x5e0
[   36.238054]  kasan_report+0xc8/0x118
[   36.238649]  kasan_check_range+0x100/0x1a8
[   36.239323]  __kasan_check_write+0x20/0x30
[   36.239986]  kasan_atomics_helper+0x1190/0x4858
[   36.240621]  kasan_atomics+0x198/0x2e8
[   36.241238]  kunit_try_run_case+0x14c/0x3d0
[   36.241806]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.242463]  kthread+0x24c/0x2d0
[   36.243031]  ret_from_fork+0x10/0x20
[   36.243591] 
[   36.243938] Allocated by task 253:
[   36.244462]  kasan_save_stack+0x3c/0x68
[   36.244997]  kasan_save_track+0x20/0x40
[   36.245539]  kasan_save_alloc_info+0x40/0x58
[   36.246088]  __kasan_kmalloc+0xd4/0xd8
[   36.246662]  __kmalloc_cache_noprof+0x15c/0x3c0
[   36.247228]  kasan_atomics+0xb8/0x2e8
[   36.247830]  kunit_try_run_case+0x14c/0x3d0
[   36.248464]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.249223]  kthread+0x24c/0x2d0
[   36.249763]  ret_from_fork+0x10/0x20
[   36.250256] 
[   36.250607] The buggy address belongs to the object at fff00000c63df000
[   36.250607]  which belongs to the cache kmalloc-64 of size 64
[   36.251625] The buggy address is located 0 bytes to the right of
[   36.251625]  allocated 48-byte region [fff00000c63df000, fff00000c63df030)
[   36.252950] 
[   36.253324] The buggy address belongs to the physical page:
[   36.253945] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063df
[   36.254790] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   36.255621] page_type: f5(slab)
[   36.256040] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   36.256937] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   36.257706] page dumped because: kasan: bad access detected
[   36.258427] 
[   36.258745] Memory state around the buggy address:
[   36.259300]  fff00000c63def00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   36.260088]  fff00000c63def80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   36.260968] >fff00000c63df000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   36.261628]                                      ^
[   36.262297]  fff00000c63df080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.263078]  fff00000c63df100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.263891] ==================================================================
[   35.530817] ==================================================================
[   35.531551] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3dcc/0x4858
[   35.533645] Read of size 4 at addr fff00000c63df030 by task kunit_try_catch/253
[   35.534415] 
[   35.534776] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241128 #1
[   35.535837] Tainted: [B]=BAD_PAGE, [N]=TEST
[   35.536440] Hardware name: linux,dummy-virt (DT)
[   35.536993] Call trace:
[   35.537217]  show_stack+0x20/0x38 (C)
[   35.537493]  dump_stack_lvl+0x8c/0xd0
[   35.537761]  print_report+0x118/0x5e0
[   35.538013]  kasan_report+0xc8/0x118
[   35.538280]  __asan_report_load4_noabort+0x20/0x30
[   35.538577]  kasan_atomics_helper+0x3dcc/0x4858
[   35.538857]  kasan_atomics+0x198/0x2e8
[   35.539110]  kunit_try_run_case+0x14c/0x3d0
[   35.539402]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.539712]  kthread+0x24c/0x2d0
[   35.539952]  ret_from_fork+0x10/0x20
[   35.540326] 
[   35.540628] Allocated by task 253:
[   35.541033]  kasan_save_stack+0x3c/0x68
[   35.541589]  kasan_save_track+0x20/0x40
[   35.542213]  kasan_save_alloc_info+0x40/0x58
[   35.542908]  __kasan_kmalloc+0xd4/0xd8
[   35.543547]  __kmalloc_cache_noprof+0x15c/0x3c0
[   35.544256]  kasan_atomics+0xb8/0x2e8
[   35.544854]  kunit_try_run_case+0x14c/0x3d0
[   35.545560]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.546241]  kthread+0x24c/0x2d0
[   35.546691]  ret_from_fork+0x10/0x20
[   35.547156] 
[   35.547504] The buggy address belongs to the object at fff00000c63df000
[   35.547504]  which belongs to the cache kmalloc-64 of size 64
[   35.548917] The buggy address is located 0 bytes to the right of
[   35.548917]  allocated 48-byte region [fff00000c63df000, fff00000c63df030)
[   35.550355] 
[   35.550719] The buggy address belongs to the physical page:
[   35.551750] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063df
[   35.552806] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   35.553660] page_type: f5(slab)
[   35.554149] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   35.555004] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   35.555866] page dumped because: kasan: bad access detected
[   35.556658] 
[   35.556970] Memory state around the buggy address:
[   35.557578]  fff00000c63def00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   35.558323]  fff00000c63def80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   35.559134] >fff00000c63df000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   35.560021]                                      ^
[   35.560690]  fff00000c63df080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.561595]  fff00000c63df100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.562332] ==================================================================
[   36.160875] ==================================================================
[   36.161619] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x10c0/0x4858
[   36.162513] Write of size 8 at addr fff00000c63df030 by task kunit_try_catch/253
[   36.163373] 
[   36.163668] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241128 #1
[   36.164600] Tainted: [B]=BAD_PAGE, [N]=TEST
[   36.165256] Hardware name: linux,dummy-virt (DT)
[   36.165746] Call trace:
[   36.166226]  show_stack+0x20/0x38 (C)
[   36.166840]  dump_stack_lvl+0x8c/0xd0
[   36.167380]  print_report+0x118/0x5e0
[   36.168021]  kasan_report+0xc8/0x118
[   36.168633]  kasan_check_range+0x100/0x1a8
[   36.169277]  __kasan_check_write+0x20/0x30
[   36.169914]  kasan_atomics_helper+0x10c0/0x4858
[   36.170676]  kasan_atomics+0x198/0x2e8
[   36.171193]  kunit_try_run_case+0x14c/0x3d0
[   36.171855]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.172647]  kthread+0x24c/0x2d0
[   36.173226]  ret_from_fork+0x10/0x20
[   36.173785] 
[   36.174082] Allocated by task 253:
[   36.174662]  kasan_save_stack+0x3c/0x68
[   36.175261]  kasan_save_track+0x20/0x40
[   36.175858]  kasan_save_alloc_info+0x40/0x58
[   36.176496]  __kasan_kmalloc+0xd4/0xd8
[   36.177084]  __kmalloc_cache_noprof+0x15c/0x3c0
[   36.177640]  kasan_atomics+0xb8/0x2e8
[   36.178220]  kunit_try_run_case+0x14c/0x3d0
[   36.178834]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.179568]  kthread+0x24c/0x2d0
[   36.180030]  ret_from_fork+0x10/0x20
[   36.180618] 
[   36.180965] The buggy address belongs to the object at fff00000c63df000
[   36.180965]  which belongs to the cache kmalloc-64 of size 64
[   36.181957] The buggy address is located 0 bytes to the right of
[   36.181957]  allocated 48-byte region [fff00000c63df000, fff00000c63df030)
[   36.183337] 
[   36.183692] The buggy address belongs to the physical page:
[   36.184288] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063df
[   36.185205] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   36.185892] page_type: f5(slab)
[   36.186441] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   36.187268] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   36.187963] page dumped because: kasan: bad access detected
[   36.188671] 
[   36.189008] Memory state around the buggy address:
[   36.189648]  fff00000c63def00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   36.190457]  fff00000c63def80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   36.191168] >fff00000c63df000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   36.192000]                                      ^
[   36.192671]  fff00000c63df080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.193452]  fff00000c63df100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.194141] ==================================================================
[   36.844717] ==================================================================
[   36.845502] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e20/0x4858
[   36.846522] Read of size 8 at addr fff00000c63df030 by task kunit_try_catch/253
[   36.847412] 
[   36.847864] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241128 #1
[   36.849095] Tainted: [B]=BAD_PAGE, [N]=TEST
[   36.849756] Hardware name: linux,dummy-virt (DT)
[   36.850432] Call trace:
[   36.850928]  show_stack+0x20/0x38 (C)
[   36.851597]  dump_stack_lvl+0x8c/0xd0
[   36.852247]  print_report+0x118/0x5e0
[   36.852922]  kasan_report+0xc8/0x118
[   36.853569]  __asan_report_load8_noabort+0x20/0x30
[   36.854313]  kasan_atomics_helper+0x3e20/0x4858
[   36.855016]  kasan_atomics+0x198/0x2e8
[   36.855655]  kunit_try_run_case+0x14c/0x3d0
[   36.856363]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.857142]  kthread+0x24c/0x2d0
[   36.857784]  ret_from_fork+0x10/0x20
[   36.858432] 
[   36.858792] Allocated by task 253:
[   36.859403]  kasan_save_stack+0x3c/0x68
[   36.860049]  kasan_save_track+0x20/0x40
[   36.860694]  kasan_save_alloc_info+0x40/0x58
[   36.861367]  __kasan_kmalloc+0xd4/0xd8
[   36.861974]  __kmalloc_cache_noprof+0x15c/0x3c0
[   36.862653]  kasan_atomics+0xb8/0x2e8
[   36.863266]  kunit_try_run_case+0x14c/0x3d0
[   36.863978]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.864735]  kthread+0x24c/0x2d0
[   36.865302]  ret_from_fork+0x10/0x20
[   36.865770] 
[   36.866077] The buggy address belongs to the object at fff00000c63df000
[   36.866077]  which belongs to the cache kmalloc-64 of size 64
[   36.867225] The buggy address is located 0 bytes to the right of
[   36.867225]  allocated 48-byte region [fff00000c63df000, fff00000c63df030)
[   36.868732] 
[   36.869093] The buggy address belongs to the physical page:
[   36.869746] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063df
[   36.870759] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   36.871656] page_type: f5(slab)
[   36.872293] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   36.873239] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   36.874164] page dumped because: kasan: bad access detected
[   36.874866] 
[   36.875272] Memory state around the buggy address:
[   36.875916]  fff00000c63def00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   36.876822]  fff00000c63def80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   36.877672] >fff00000c63df000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   36.878564]                                      ^
[   36.879218]  fff00000c63df080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.880171]  fff00000c63df100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.881006] ==================================================================
[   34.808196] ==================================================================
[   34.808893] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f94/0x4858
[   34.809646] Write of size 4 at addr fff00000c63df030 by task kunit_try_catch/253
[   34.810538] 
[   34.810927] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241128 #1
[   34.813366] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.813851] Hardware name: linux,dummy-virt (DT)
[   34.814478] Call trace:
[   34.814915]  show_stack+0x20/0x38 (C)
[   34.815445]  dump_stack_lvl+0x8c/0xd0
[   34.816040]  print_report+0x118/0x5e0
[   34.816663]  kasan_report+0xc8/0x118
[   34.817523]  __asan_report_store4_noabort+0x20/0x30
[   34.818147]  kasan_atomics_helper+0x3f94/0x4858
[   34.818716]  kasan_atomics+0x198/0x2e8
[   34.819775]  kunit_try_run_case+0x14c/0x3d0
[   34.820140]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.820603]  kthread+0x24c/0x2d0
[   34.821197]  ret_from_fork+0x10/0x20
[   34.822224] 
[   34.822619] Allocated by task 253:
[   34.823129]  kasan_save_stack+0x3c/0x68
[   34.823798]  kasan_save_track+0x20/0x40
[   34.824419]  kasan_save_alloc_info+0x40/0x58
[   34.825348]  __kasan_kmalloc+0xd4/0xd8
[   34.826263]  __kmalloc_cache_noprof+0x15c/0x3c0
[   34.826842]  kasan_atomics+0xb8/0x2e8
[   34.827356]  kunit_try_run_case+0x14c/0x3d0
[   34.827980]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.828831]  kthread+0x24c/0x2d0
[   34.829610]  ret_from_fork+0x10/0x20
[   34.830193] 
[   34.830535] The buggy address belongs to the object at fff00000c63df000
[   34.830535]  which belongs to the cache kmalloc-64 of size 64
[   34.831669] The buggy address is located 0 bytes to the right of
[   34.831669]  allocated 48-byte region [fff00000c63df000, fff00000c63df030)
[   34.832846] 
[   34.833983] The buggy address belongs to the physical page:
[   34.834758] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063df
[   34.835579] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   34.836299] page_type: f5(slab)
[   34.836827] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   34.838144] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   34.839076] page dumped because: kasan: bad access detected
[   34.839766] 
[   34.840087] Memory state around the buggy address:
[   34.840742]  fff00000c63def00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   34.842631]  fff00000c63def80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   34.843434] >fff00000c63df000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   34.844199]                                      ^
[   34.844735]  fff00000c63df080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.845939]  fff00000c63df100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.846639] ==================================================================
[   35.811652] ==================================================================
[   35.812454] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e04/0x4858
[   35.813249] Read of size 4 at addr fff00000c63df030 by task kunit_try_catch/253
[   35.814012] 
[   35.814409] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241128 #1
[   35.815367] Tainted: [B]=BAD_PAGE, [N]=TEST
[   35.815930] Hardware name: linux,dummy-virt (DT)
[   35.816531] Call trace:
[   35.816895]  show_stack+0x20/0x38 (C)
[   35.817524]  dump_stack_lvl+0x8c/0xd0
[   35.818158]  print_report+0x118/0x5e0
[   35.818691]  kasan_report+0xc8/0x118
[   35.819431]  __asan_report_load4_noabort+0x20/0x30
[   35.820070]  kasan_atomics_helper+0x3e04/0x4858
[   35.820846]  kasan_atomics+0x198/0x2e8
[   35.821542]  kunit_try_run_case+0x14c/0x3d0
[   35.822270]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.823077]  kthread+0x24c/0x2d0
[   35.823629]  ret_from_fork+0x10/0x20
[   35.824201] 
[   35.824568] Allocated by task 253:
[   35.825147]  kasan_save_stack+0x3c/0x68
[   35.825703]  kasan_save_track+0x20/0x40
[   35.826368]  kasan_save_alloc_info+0x40/0x58
[   35.826948]  __kasan_kmalloc+0xd4/0xd8
[   35.827618]  __kmalloc_cache_noprof+0x15c/0x3c0
[   35.828262]  kasan_atomics+0xb8/0x2e8
[   35.828813]  kunit_try_run_case+0x14c/0x3d0
[   35.829492]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.830243]  kthread+0x24c/0x2d0
[   35.830775]  ret_from_fork+0x10/0x20
[   35.831295] 
[   35.831678] The buggy address belongs to the object at fff00000c63df000
[   35.831678]  which belongs to the cache kmalloc-64 of size 64
[   35.832897] The buggy address is located 0 bytes to the right of
[   35.832897]  allocated 48-byte region [fff00000c63df000, fff00000c63df030)
[   35.834179] 
[   35.834561] The buggy address belongs to the physical page:
[   35.835149] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063df
[   35.836107] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   35.836901] page_type: f5(slab)
[   35.837511] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   35.838407] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   35.839095] page dumped because: kasan: bad access detected
[   35.839720] 
[   35.840079] Memory state around the buggy address:
[   35.840615]  fff00000c63def00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   35.841404]  fff00000c63def80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   35.842167] >fff00000c63df000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   35.842859]                                      ^
[   35.843519]  fff00000c63df080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.844257]  fff00000c63df100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.844950] ==================================================================
[   34.648131] ==================================================================
[   34.649240] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x24c/0x4858
[   34.650003] Write of size 4 at addr fff00000c63df030 by task kunit_try_catch/253
[   34.650690] 
[   34.651077] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241128 #1
[   34.652366] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.652874] Hardware name: linux,dummy-virt (DT)
[   34.654338] Call trace:
[   34.654805]  show_stack+0x20/0x38 (C)
[   34.655449]  dump_stack_lvl+0x8c/0xd0
[   34.656095]  print_report+0x118/0x5e0
[   34.656730]  kasan_report+0xc8/0x118
[   34.657659]  kasan_check_range+0x100/0x1a8
[   34.658278]  __kasan_check_write+0x20/0x30
[   34.658829]  kasan_atomics_helper+0x24c/0x4858
[   34.659391]  kasan_atomics+0x198/0x2e8
[   34.660032]  kunit_try_run_case+0x14c/0x3d0
[   34.660618]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.661466]  kthread+0x24c/0x2d0
[   34.661955]  ret_from_fork+0x10/0x20
[   34.662721] 
[   34.663058] Allocated by task 253:
[   34.664263]  kasan_save_stack+0x3c/0x68
[   34.664762]  kasan_save_track+0x20/0x40
[   34.665694]  kasan_save_alloc_info+0x40/0x58
[   34.666278]  __kasan_kmalloc+0xd4/0xd8
[   34.666897]  __kmalloc_cache_noprof+0x15c/0x3c0
[   34.667535]  kasan_atomics+0xb8/0x2e8
[   34.668152]  kunit_try_run_case+0x14c/0x3d0
[   34.668774]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.670242]  kthread+0x24c/0x2d0
[   34.670798]  ret_from_fork+0x10/0x20
[   34.671410] 
[   34.671786] The buggy address belongs to the object at fff00000c63df000
[   34.671786]  which belongs to the cache kmalloc-64 of size 64
[   34.673076] The buggy address is located 0 bytes to the right of
[   34.673076]  allocated 48-byte region [fff00000c63df000, fff00000c63df030)
[   34.674672] 
[   34.675052] The buggy address belongs to the physical page:
[   34.675747] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063df
[   34.676638] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   34.678366] page_type: f5(slab)
[   34.678874] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   34.679741] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   34.680630] page dumped because: kasan: bad access detected
[   34.681644] 
[   34.681992] Memory state around the buggy address:
[   34.682791]  fff00000c63def00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   34.683549]  fff00000c63def80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   34.684367] >fff00000c63df000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   34.685162]                                      ^
[   34.686393]  fff00000c63df080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.687182]  fff00000c63df100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.688294] ==================================================================
[   34.972140] ==================================================================
[   34.973018] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4e4/0x4858
[   34.973892] Write of size 4 at addr fff00000c63df030 by task kunit_try_catch/253
[   34.975039] 
[   34.975438] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241128 #1
[   34.976720] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.977552] Hardware name: linux,dummy-virt (DT)
[   34.978106] Call trace:
[   34.978481]  show_stack+0x20/0x38 (C)
[   34.978988]  dump_stack_lvl+0x8c/0xd0
[   34.979607]  print_report+0x118/0x5e0
[   34.980203]  kasan_report+0xc8/0x118
[   34.980747]  kasan_check_range+0x100/0x1a8
[   34.982271]  __kasan_check_write+0x20/0x30
[   34.982923]  kasan_atomics_helper+0x4e4/0x4858
[   34.983633]  kasan_atomics+0x198/0x2e8
[   34.984231]  kunit_try_run_case+0x14c/0x3d0
[   34.984870]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.985645]  kthread+0x24c/0x2d0
[   34.986554]  ret_from_fork+0x10/0x20
[   34.987167] 
[   34.987535] Allocated by task 253:
[   34.987982]  kasan_save_stack+0x3c/0x68
[   34.988640]  kasan_save_track+0x20/0x40
[   34.989405]  kasan_save_alloc_info+0x40/0x58
[   34.990622]  __kasan_kmalloc+0xd4/0xd8
[   34.991181]  __kmalloc_cache_noprof+0x15c/0x3c0
[   34.991854]  kasan_atomics+0xb8/0x2e8
[   34.992461]  kunit_try_run_case+0x14c/0x3d0
[   34.992991]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.993967]  kthread+0x24c/0x2d0
[   34.994537]  ret_from_fork+0x10/0x20
[   34.995132] 
[   34.995536] The buggy address belongs to the object at fff00000c63df000
[   34.995536]  which belongs to the cache kmalloc-64 of size 64
[   34.996850] The buggy address is located 0 bytes to the right of
[   34.996850]  allocated 48-byte region [fff00000c63df000, fff00000c63df030)
[   34.998998] 
[   34.999366] The buggy address belongs to the physical page:
[   35.000014] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063df
[   35.000852] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   35.002077] page_type: f5(slab)
[   35.002701] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   35.003651] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   35.004479] page dumped because: kasan: bad access detected
[   35.005286] 
[   35.005670] Memory state around the buggy address:
[   35.006580]  fff00000c63def00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   35.007407]  fff00000c63def80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   35.008488] >fff00000c63df000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   35.009685]                                      ^
[   35.010280]  fff00000c63df080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.011004]  fff00000c63df100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.011931] ==================================================================
[   36.630357] ==================================================================
[   36.631238] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3db0/0x4858
[   36.632180] Read of size 8 at addr fff00000c63df030 by task kunit_try_catch/253
[   36.632828] 
[   36.633216] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241128 #1
[   36.634307] Tainted: [B]=BAD_PAGE, [N]=TEST
[   36.634825] Hardware name: linux,dummy-virt (DT)
[   36.635334] Call trace:
[   36.635685]  show_stack+0x20/0x38 (C)
[   36.636345]  dump_stack_lvl+0x8c/0xd0
[   36.637002]  print_report+0x118/0x5e0
[   36.637600]  kasan_report+0xc8/0x118
[   36.638264]  __asan_report_load8_noabort+0x20/0x30
[   36.638990]  kasan_atomics_helper+0x3db0/0x4858
[   36.639707]  kasan_atomics+0x198/0x2e8
[   36.640367]  kunit_try_run_case+0x14c/0x3d0
[   36.640955]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.641690]  kthread+0x24c/0x2d0
[   36.642307]  ret_from_fork+0x10/0x20
[   36.642845] 
[   36.643237] Allocated by task 253:
[   36.643717]  kasan_save_stack+0x3c/0x68
[   36.644334]  kasan_save_track+0x20/0x40
[   36.644932]  kasan_save_alloc_info+0x40/0x58
[   36.645614]  __kasan_kmalloc+0xd4/0xd8
[   36.646206]  __kmalloc_cache_noprof+0x15c/0x3c0
[   36.646889]  kasan_atomics+0xb8/0x2e8
[   36.647464]  kunit_try_run_case+0x14c/0x3d0
[   36.648131]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.648804]  kthread+0x24c/0x2d0
[   36.649398]  ret_from_fork+0x10/0x20
[   36.649915] 
[   36.650314] The buggy address belongs to the object at fff00000c63df000
[   36.650314]  which belongs to the cache kmalloc-64 of size 64
[   36.651631] The buggy address is located 0 bytes to the right of
[   36.651631]  allocated 48-byte region [fff00000c63df000, fff00000c63df030)
[   36.652938] 
[   36.653312] The buggy address belongs to the physical page:
[   36.653937] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063df
[   36.654766] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   36.655567] page_type: f5(slab)
[   36.655990] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   36.657032] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   36.657972] page dumped because: kasan: bad access detected
[   36.658702] 
[   36.659128] Memory state around the buggy address:
[   36.659683]  fff00000c63def00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   36.660611]  fff00000c63def80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   36.661470] >fff00000c63df000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   36.662267]                                      ^
[   36.662870]  fff00000c63df080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.663624]  fff00000c63df100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.664541] ==================================================================
[   36.334827] ==================================================================
[   36.335547] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x12d8/0x4858
[   36.336201] Write of size 8 at addr fff00000c63df030 by task kunit_try_catch/253
[   36.337130] 
[   36.337550] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241128 #1
[   36.338605] Tainted: [B]=BAD_PAGE, [N]=TEST
[   36.339185] Hardware name: linux,dummy-virt (DT)
[   36.339748] Call trace:
[   36.340184]  show_stack+0x20/0x38 (C)
[   36.340803]  dump_stack_lvl+0x8c/0xd0
[   36.341337]  print_report+0x118/0x5e0
[   36.341937]  kasan_report+0xc8/0x118
[   36.342508]  kasan_check_range+0x100/0x1a8
[   36.343027]  __kasan_check_write+0x20/0x30
[   36.343684]  kasan_atomics_helper+0x12d8/0x4858
[   36.344373]  kasan_atomics+0x198/0x2e8
[   36.345025]  kunit_try_run_case+0x14c/0x3d0
[   36.345653]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.346401]  kthread+0x24c/0x2d0
[   36.346996]  ret_from_fork+0x10/0x20
[   36.347561] 
[   36.347914] Allocated by task 253:
[   36.348460]  kasan_save_stack+0x3c/0x68
[   36.349039]  kasan_save_track+0x20/0x40
[   36.349842]  kasan_save_alloc_info+0x40/0x58
[   36.350354]  __kasan_kmalloc+0xd4/0xd8
[   36.350929]  __kmalloc_cache_noprof+0x15c/0x3c0
[   36.351562]  kasan_atomics+0xb8/0x2e8
[   36.352084]  kunit_try_run_case+0x14c/0x3d0
[   36.352656]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.353277]  kthread+0x24c/0x2d0
[   36.353816]  ret_from_fork+0x10/0x20
[   36.354391] 
[   36.354721] The buggy address belongs to the object at fff00000c63df000
[   36.354721]  which belongs to the cache kmalloc-64 of size 64
[   36.355854] The buggy address is located 0 bytes to the right of
[   36.355854]  allocated 48-byte region [fff00000c63df000, fff00000c63df030)
[   36.357043] 
[   36.357401] The buggy address belongs to the physical page:
[   36.358131] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063df
[   36.358910] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   36.359730] page_type: f5(slab)
[   36.360293] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   36.361045] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   36.361929] page dumped because: kasan: bad access detected
[   36.362539] 
[   36.362879] Memory state around the buggy address:
[   36.363475]  fff00000c63def00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   36.364300]  fff00000c63def80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   36.364968] >fff00000c63df000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   36.365815]                                      ^
[   36.366345]  fff00000c63df080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.367142]  fff00000c63df100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.367972] ==================================================================
[   34.889715] ==================================================================
[   34.890361] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x414/0x4858
[   34.891059] Write of size 4 at addr fff00000c63df030 by task kunit_try_catch/253
[   34.892698] 
[   34.893159] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241128 #1
[   34.894684] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.895074] Hardware name: linux,dummy-virt (DT)
[   34.895708] Call trace:
[   34.896194]  show_stack+0x20/0x38 (C)
[   34.896791]  dump_stack_lvl+0x8c/0xd0
[   34.897841]  print_report+0x118/0x5e0
[   34.898853]  kasan_report+0xc8/0x118
[   34.899176]  kasan_check_range+0x100/0x1a8
[   34.899785]  __kasan_check_write+0x20/0x30
[   34.900392]  kasan_atomics_helper+0x414/0x4858
[   34.901015]  kasan_atomics+0x198/0x2e8
[   34.901580]  kunit_try_run_case+0x14c/0x3d0
[   34.902156]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.902846]  kthread+0x24c/0x2d0
[   34.903463]  ret_from_fork+0x10/0x20
[   34.904350] 
[   34.904699] Allocated by task 253:
[   34.905279]  kasan_save_stack+0x3c/0x68
[   34.905779]  kasan_save_track+0x20/0x40
[   34.906775]  kasan_save_alloc_info+0x40/0x58
[   34.907792]  __kasan_kmalloc+0xd4/0xd8
[   34.908520]  __kmalloc_cache_noprof+0x15c/0x3c0
[   34.909595]  kasan_atomics+0xb8/0x2e8
[   34.910309]  kunit_try_run_case+0x14c/0x3d0
[   34.910922]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.911816]  kthread+0x24c/0x2d0
[   34.912510]  ret_from_fork+0x10/0x20
[   34.913422] 
[   34.914197] The buggy address belongs to the object at fff00000c63df000
[   34.914197]  which belongs to the cache kmalloc-64 of size 64
[   34.915358] The buggy address is located 0 bytes to the right of
[   34.915358]  allocated 48-byte region [fff00000c63df000, fff00000c63df030)
[   34.917554] 
[   34.917964] The buggy address belongs to the physical page:
[   34.918636] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063df
[   34.919497] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   34.920177] page_type: f5(slab)
[   34.920686] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   34.921620] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   34.923323] page dumped because: kasan: bad access detected
[   34.923922] 
[   34.924287] Memory state around the buggy address:
[   34.924864]  fff00000c63def00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   34.926149]  fff00000c63def80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   34.926881] >fff00000c63df000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   34.927639]                                      ^
[   34.928227]  fff00000c63df080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.929436]  fff00000c63df100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.930103] ==================================================================
[   35.388679] ==================================================================
[   35.389928] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x99c/0x4858
[   35.390722] Write of size 4 at addr fff00000c63df030 by task kunit_try_catch/253
[   35.391521] 
[   35.391860] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241128 #1
[   35.392941] Tainted: [B]=BAD_PAGE, [N]=TEST
[   35.393526] Hardware name: linux,dummy-virt (DT)
[   35.394045] Call trace:
[   35.394504]  show_stack+0x20/0x38 (C)
[   35.395140]  dump_stack_lvl+0x8c/0xd0
[   35.395755]  print_report+0x118/0x5e0
[   35.396273]  kasan_report+0xc8/0x118
[   35.396885]  kasan_check_range+0x100/0x1a8
[   35.397568]  __kasan_check_write+0x20/0x30
[   35.398172]  kasan_atomics_helper+0x99c/0x4858
[   35.398755]  kasan_atomics+0x198/0x2e8
[   35.399384]  kunit_try_run_case+0x14c/0x3d0
[   35.399958]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.400729]  kthread+0x24c/0x2d0
[   35.401238]  ret_from_fork+0x10/0x20
[   35.401801] 
[   35.402097] Allocated by task 253:
[   35.402633]  kasan_save_stack+0x3c/0x68
[   35.403229]  kasan_save_track+0x20/0x40
[   35.403797]  kasan_save_alloc_info+0x40/0x58
[   35.404456]  __kasan_kmalloc+0xd4/0xd8
[   35.404980]  __kmalloc_cache_noprof+0x15c/0x3c0
[   35.405585]  kasan_atomics+0xb8/0x2e8
[   35.406181]  kunit_try_run_case+0x14c/0x3d0
[   35.406798]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.407414]  kthread+0x24c/0x2d0
[   35.407985]  ret_from_fork+0x10/0x20
[   35.408565] 
[   35.408909] The buggy address belongs to the object at fff00000c63df000
[   35.408909]  which belongs to the cache kmalloc-64 of size 64
[   35.410097] The buggy address is located 0 bytes to the right of
[   35.410097]  allocated 48-byte region [fff00000c63df000, fff00000c63df030)
[   35.411188] 
[   35.411538] The buggy address belongs to the physical page:
[   35.412233] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063df
[   35.413156] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   35.413798] page_type: f5(slab)
[   35.414348] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   35.415165] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   35.416054] page dumped because: kasan: bad access detected
[   35.416584] 
[   35.416929] Memory state around the buggy address:
[   35.417610]  fff00000c63def00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   35.418387]  fff00000c63def80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   35.419160] >fff00000c63df000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   35.419988]                                      ^
[   35.420549]  fff00000c63df080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.421407]  fff00000c63df100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.422150] ==================================================================
[   36.369566] ==================================================================
[   36.370381] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1384/0x4858
[   36.371317] Write of size 8 at addr fff00000c63df030 by task kunit_try_catch/253
[   36.372070] 
[   36.372470] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241128 #1
[   36.373600] Tainted: [B]=BAD_PAGE, [N]=TEST
[   36.374063] Hardware name: linux,dummy-virt (DT)
[   36.374681] Call trace:
[   36.375013]  show_stack+0x20/0x38 (C)
[   36.375612]  dump_stack_lvl+0x8c/0xd0
[   36.376254]  print_report+0x118/0x5e0
[   36.376875]  kasan_report+0xc8/0x118
[   36.377519]  kasan_check_range+0x100/0x1a8
[   36.378094]  __kasan_check_write+0x20/0x30
[   36.378734]  kasan_atomics_helper+0x1384/0x4858
[   36.379381]  kasan_atomics+0x198/0x2e8
[   36.379985]  kunit_try_run_case+0x14c/0x3d0
[   36.380741]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.381795]  kthread+0x24c/0x2d0
[   36.382971]  ret_from_fork+0x10/0x20
[   36.383753] 
[   36.384189] Allocated by task 253:
[   36.384651]  kasan_save_stack+0x3c/0x68
[   36.384922]  kasan_save_track+0x20/0x40
[   36.385252]  kasan_save_alloc_info+0x40/0x58
[   36.386093]  __kasan_kmalloc+0xd4/0xd8
[   36.386786]  __kmalloc_cache_noprof+0x15c/0x3c0
[   36.387550]  kasan_atomics+0xb8/0x2e8
[   36.388102]  kunit_try_run_case+0x14c/0x3d0
[   36.388734]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.389469]  kthread+0x24c/0x2d0
[   36.390031]  ret_from_fork+0x10/0x20
[   36.390522] 
[   36.390872] The buggy address belongs to the object at fff00000c63df000
[   36.390872]  which belongs to the cache kmalloc-64 of size 64
[   36.392096] The buggy address is located 0 bytes to the right of
[   36.392096]  allocated 48-byte region [fff00000c63df000, fff00000c63df030)
[   36.393390] 
[   36.393743] The buggy address belongs to the physical page:
[   36.394466] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063df
[   36.395428] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   36.396213] page_type: f5(slab)
[   36.396757] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   36.397614] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   36.398359] page dumped because: kasan: bad access detected
[   36.399081] 
[   36.399434] Memory state around the buggy address:
[   36.400043]  fff00000c63def00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   36.400897]  fff00000c63def80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   36.401758] >fff00000c63df000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   36.402591]                                      ^
[   36.403211]  fff00000c63df080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.404044]  fff00000c63df100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.404844] ==================================================================
[   35.777546] ==================================================================
[   35.778155] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xd3c/0x4858
[   35.779008] Write of size 4 at addr fff00000c63df030 by task kunit_try_catch/253
[   35.779860] 
[   35.780239] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241128 #1
[   35.781161] Tainted: [B]=BAD_PAGE, [N]=TEST
[   35.781746] Hardware name: linux,dummy-virt (DT)
[   35.782394] Call trace:
[   35.782823]  show_stack+0x20/0x38 (C)
[   35.783361]  dump_stack_lvl+0x8c/0xd0
[   35.783969]  print_report+0x118/0x5e0
[   35.784570]  kasan_report+0xc8/0x118
[   35.785076]  kasan_check_range+0x100/0x1a8
[   35.785738]  __kasan_check_write+0x20/0x30
[   35.786335]  kasan_atomics_helper+0xd3c/0x4858
[   35.786920]  kasan_atomics+0x198/0x2e8
[   35.787515]  kunit_try_run_case+0x14c/0x3d0
[   35.788417]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.789126]  kthread+0x24c/0x2d0
[   35.789642]  ret_from_fork+0x10/0x20
[   35.790249] 
[   35.790568] Allocated by task 253:
[   35.790972]  kasan_save_stack+0x3c/0x68
[   35.791572]  kasan_save_track+0x20/0x40
[   35.792098]  kasan_save_alloc_info+0x40/0x58
[   35.792732]  __kasan_kmalloc+0xd4/0xd8
[   35.793335]  __kmalloc_cache_noprof+0x15c/0x3c0
[   35.793980]  kasan_atomics+0xb8/0x2e8
[   35.794506]  kunit_try_run_case+0x14c/0x3d0
[   35.795060]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.795808]  kthread+0x24c/0x2d0
[   35.796336]  ret_from_fork+0x10/0x20
[   35.796777] 
[   35.797145] The buggy address belongs to the object at fff00000c63df000
[   35.797145]  which belongs to the cache kmalloc-64 of size 64
[   35.798261] The buggy address is located 0 bytes to the right of
[   35.798261]  allocated 48-byte region [fff00000c63df000, fff00000c63df030)
[   35.799480] 
[   35.799828] The buggy address belongs to the physical page:
[   35.800542] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063df
[   35.801332] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   35.802068] page_type: f5(slab)
[   35.802609] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   35.803402] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   35.804230] page dumped because: kasan: bad access detected
[   35.804870] 
[   35.805224] Memory state around the buggy address:
[   35.805795]  fff00000c63def00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   35.806572]  fff00000c63def80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   35.807325] >fff00000c63df000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   35.808155]                                      ^
[   35.808799]  fff00000c63df080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.809520]  fff00000c63df100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.810316] ==================================================================
[   35.423778] ==================================================================
[   35.424586] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa04/0x4858
[   35.426596] Write of size 4 at addr fff00000c63df030 by task kunit_try_catch/253
[   35.427403] 
[   35.427929] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241128 #1
[   35.428972] Tainted: [B]=BAD_PAGE, [N]=TEST
[   35.429497] Hardware name: linux,dummy-virt (DT)
[   35.430003] Call trace:
[   35.430451]  show_stack+0x20/0x38 (C)
[   35.430962]  dump_stack_lvl+0x8c/0xd0
[   35.431588]  print_report+0x118/0x5e0
[   35.432127]  kasan_report+0xc8/0x118
[   35.432729]  kasan_check_range+0x100/0x1a8
[   35.433264]  __kasan_check_write+0x20/0x30
[   35.433871]  kasan_atomics_helper+0xa04/0x4858
[   35.434553]  kasan_atomics+0x198/0x2e8
[   35.435182]  kunit_try_run_case+0x14c/0x3d0
[   35.435789]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.436410]  kthread+0x24c/0x2d0
[   35.436980]  ret_from_fork+0x10/0x20
[   35.437623] 
[   35.437953] Allocated by task 253:
[   35.438396]  kasan_save_stack+0x3c/0x68
[   35.438983]  kasan_save_track+0x20/0x40
[   35.439567]  kasan_save_alloc_info+0x40/0x58
[   35.440215]  __kasan_kmalloc+0xd4/0xd8
[   35.440724]  __kmalloc_cache_noprof+0x15c/0x3c0
[   35.441357]  kasan_atomics+0xb8/0x2e8
[   35.441927]  kunit_try_run_case+0x14c/0x3d0
[   35.442470]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.443166]  kthread+0x24c/0x2d0
[   35.443709]  ret_from_fork+0x10/0x20
[   35.444190] 
[   35.444549] The buggy address belongs to the object at fff00000c63df000
[   35.444549]  which belongs to the cache kmalloc-64 of size 64
[   35.445656] The buggy address is located 0 bytes to the right of
[   35.445656]  allocated 48-byte region [fff00000c63df000, fff00000c63df030)
[   35.446811] 
[   35.447175] The buggy address belongs to the physical page:
[   35.447877] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063df
[   35.448724] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   35.449550] page_type: f5(slab)
[   35.450076] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   35.450920] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   35.451653] page dumped because: kasan: bad access detected
[   35.452334] 
[   35.452681] Memory state around the buggy address:
[   35.453277]  fff00000c63def00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   35.454053]  fff00000c63def80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   35.454820] >fff00000c63df000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   35.455470]                                      ^
[   35.456135]  fff00000c63df080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.456884]  fff00000c63df100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.457655] ==================================================================
[   36.808021] ==================================================================
[   36.808879] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x175c/0x4858
[   36.809804] Write of size 8 at addr fff00000c63df030 by task kunit_try_catch/253
[   36.810710] 
[   36.811110] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241128 #1
[   36.812107] Tainted: [B]=BAD_PAGE, [N]=TEST
[   36.812590] Hardware name: linux,dummy-virt (DT)
[   36.813219] Call trace:
[   36.813564]  show_stack+0x20/0x38 (C)
[   36.814251]  dump_stack_lvl+0x8c/0xd0
[   36.814901]  print_report+0x118/0x5e0
[   36.815515]  kasan_report+0xc8/0x118
[   36.816132]  kasan_check_range+0x100/0x1a8
[   36.816743]  __kasan_check_write+0x20/0x30
[   36.817448]  kasan_atomics_helper+0x175c/0x4858
[   36.818097]  kasan_atomics+0x198/0x2e8
[   36.818625]  kunit_try_run_case+0x14c/0x3d0
[   36.819276]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.820038]  kthread+0x24c/0x2d0
[   36.820584]  ret_from_fork+0x10/0x20
[   36.821098] 
[   36.821466] Allocated by task 253:
[   36.821997]  kasan_save_stack+0x3c/0x68
[   36.822525]  kasan_save_track+0x20/0x40
[   36.823051]  kasan_save_alloc_info+0x40/0x58
[   36.823681]  __kasan_kmalloc+0xd4/0xd8
[   36.824289]  __kmalloc_cache_noprof+0x15c/0x3c0
[   36.824934]  kasan_atomics+0xb8/0x2e8
[   36.825342]  kunit_try_run_case+0x14c/0x3d0
[   36.826316]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.826896]  kthread+0x24c/0x2d0
[   36.827306]  ret_from_fork+0x10/0x20
[   36.827700] 
[   36.827938] The buggy address belongs to the object at fff00000c63df000
[   36.827938]  which belongs to the cache kmalloc-64 of size 64
[   36.829702] The buggy address is located 0 bytes to the right of
[   36.829702]  allocated 48-byte region [fff00000c63df000, fff00000c63df030)
[   36.831065] 
[   36.831486] The buggy address belongs to the physical page:
[   36.832324] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063df
[   36.833349] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   36.834026] page_type: f5(slab)
[   36.834472] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   36.835307] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   36.836090] page dumped because: kasan: bad access detected
[   36.836879] 
[   36.837241] Memory state around the buggy address:
[   36.837993]  fff00000c63def00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   36.838811]  fff00000c63def80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   36.839735] >fff00000c63df000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   36.840609]                                      ^
[   36.841311]  fff00000c63df080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.842237]  fff00000c63df100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.843056] ==================================================================
[   35.052137] ==================================================================
[   35.053429] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x5b4/0x4858
[   35.054226] Write of size 4 at addr fff00000c63df030 by task kunit_try_catch/253
[   35.055126] 
[   35.055581] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241128 #1
[   35.056760] Tainted: [B]=BAD_PAGE, [N]=TEST
[   35.057419] Hardware name: linux,dummy-virt (DT)
[   35.058174] Call trace:
[   35.058636]  show_stack+0x20/0x38 (C)
[   35.059319]  dump_stack_lvl+0x8c/0xd0
[   35.060007]  print_report+0x118/0x5e0
[   35.060688]  kasan_report+0xc8/0x118
[   35.061334]  kasan_check_range+0x100/0x1a8
[   35.062064]  __kasan_check_write+0x20/0x30
[   35.062765]  kasan_atomics_helper+0x5b4/0x4858
[   35.063526]  kasan_atomics+0x198/0x2e8
[   35.064188]  kunit_try_run_case+0x14c/0x3d0
[   35.064925]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.065732]  kthread+0x24c/0x2d0
[   35.066377]  ret_from_fork+0x10/0x20
[   35.067029] 
[   35.067440] Allocated by task 253:
[   35.067965]  kasan_save_stack+0x3c/0x68
[   35.068642]  kasan_save_track+0x20/0x40
[   35.069275]  kasan_save_alloc_info+0x40/0x58
[   35.069925]  __kasan_kmalloc+0xd4/0xd8
[   35.070614]  __kmalloc_cache_noprof+0x15c/0x3c0
[   35.071298]  kasan_atomics+0xb8/0x2e8
[   35.071889]  kunit_try_run_case+0x14c/0x3d0
[   35.072652]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.073344]  kthread+0x24c/0x2d0
[   35.073919]  ret_from_fork+0x10/0x20
[   35.074481] 
[   35.074877] The buggy address belongs to the object at fff00000c63df000
[   35.074877]  which belongs to the cache kmalloc-64 of size 64
[   35.076214] The buggy address is located 0 bytes to the right of
[   35.076214]  allocated 48-byte region [fff00000c63df000, fff00000c63df030)
[   35.077579] 
[   35.077962] The buggy address belongs to the physical page:
[   35.078711] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063df
[   35.079663] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   35.080501] page_type: f5(slab)
[   35.081060] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   35.082010] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   35.082886] page dumped because: kasan: bad access detected
[   35.083495] 
[   35.083804] Memory state around the buggy address:
[   35.084387]  fff00000c63def00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   35.085102]  fff00000c63def80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   35.085992] >fff00000c63df000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   35.086902]                                      ^
[   35.087602]  fff00000c63df080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.088547]  fff00000c63df100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.089381] ==================================================================
[   35.202211] ==================================================================
[   35.203275] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x760/0x4858
[   35.203637] Write of size 4 at addr fff00000c63df030 by task kunit_try_catch/253
[   35.203983] 
[   35.204187] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241128 #1
[   35.206096] Tainted: [B]=BAD_PAGE, [N]=TEST
[   35.206548] Hardware name: linux,dummy-virt (DT)
[   35.207181] Call trace:
[   35.207642]  show_stack+0x20/0x38 (C)
[   35.208217]  dump_stack_lvl+0x8c/0xd0
[   35.208785]  print_report+0x118/0x5e0
[   35.209373]  kasan_report+0xc8/0x118
[   35.209960]  kasan_check_range+0x100/0x1a8
[   35.210547]  __kasan_check_write+0x20/0x30
[   35.211202]  kasan_atomics_helper+0x760/0x4858
[   35.211826]  kasan_atomics+0x198/0x2e8
[   35.212414]  kunit_try_run_case+0x14c/0x3d0
[   35.212995]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.213748]  kthread+0x24c/0x2d0
[   35.214334]  ret_from_fork+0x10/0x20
[   35.214897] 
[   35.215221] Allocated by task 253:
[   35.215750]  kasan_save_stack+0x3c/0x68
[   35.216305]  kasan_save_track+0x20/0x40
[   35.216902]  kasan_save_alloc_info+0x40/0x58
[   35.217575]  __kasan_kmalloc+0xd4/0xd8
[   35.218159]  __kmalloc_cache_noprof+0x15c/0x3c0
[   35.218725]  kasan_atomics+0xb8/0x2e8
[   35.219284]  kunit_try_run_case+0x14c/0x3d0
[   35.219797]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.220499]  kthread+0x24c/0x2d0
[   35.221023]  ret_from_fork+0x10/0x20
[   35.221552] 
[   35.221848] The buggy address belongs to the object at fff00000c63df000
[   35.221848]  which belongs to the cache kmalloc-64 of size 64
[   35.223059] The buggy address is located 0 bytes to the right of
[   35.223059]  allocated 48-byte region [fff00000c63df000, fff00000c63df030)
[   35.224263] 
[   35.224576] The buggy address belongs to the physical page:
[   35.225246] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063df
[   35.226072] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   35.226802] page_type: f5(slab)
[   35.227360] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   35.228076] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   35.228976] page dumped because: kasan: bad access detected
[   35.229637] 
[   35.229953] Memory state around the buggy address:
[   35.230571]  fff00000c63def00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   35.231374]  fff00000c63def80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   35.232154] >fff00000c63df000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   35.232911]                                      ^
[   35.233495]  fff00000c63df080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.234267]  fff00000c63df100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.234957] ==================================================================
[   36.091335] ==================================================================
[   36.092145] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xff0/0x4858
[   36.093019] Write of size 8 at addr fff00000c63df030 by task kunit_try_catch/253
[   36.093765] 
[   36.094165] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241128 #1
[   36.095163] Tainted: [B]=BAD_PAGE, [N]=TEST
[   36.095659] Hardware name: linux,dummy-virt (DT)
[   36.096222] Call trace:
[   36.096653]  show_stack+0x20/0x38 (C)
[   36.097257]  dump_stack_lvl+0x8c/0xd0
[   36.097894]  print_report+0x118/0x5e0
[   36.098462]  kasan_report+0xc8/0x118
[   36.098969]  kasan_check_range+0x100/0x1a8
[   36.099634]  __kasan_check_write+0x20/0x30
[   36.100352]  kasan_atomics_helper+0xff0/0x4858
[   36.100960]  kasan_atomics+0x198/0x2e8
[   36.101573]  kunit_try_run_case+0x14c/0x3d0
[   36.102231]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.102912]  kthread+0x24c/0x2d0
[   36.103401]  ret_from_fork+0x10/0x20
[   36.104004] 
[   36.104366] Allocated by task 253:
[   36.104827]  kasan_save_stack+0x3c/0x68
[   36.105431]  kasan_save_track+0x20/0x40
[   36.105923]  kasan_save_alloc_info+0x40/0x58
[   36.106575]  __kasan_kmalloc+0xd4/0xd8
[   36.107162]  __kmalloc_cache_noprof+0x15c/0x3c0
[   36.107798]  kasan_atomics+0xb8/0x2e8
[   36.108396]  kunit_try_run_case+0x14c/0x3d0
[   36.109000]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.109710]  kthread+0x24c/0x2d0
[   36.110276]  ret_from_fork+0x10/0x20
[   36.110825] 
[   36.111183] The buggy address belongs to the object at fff00000c63df000
[   36.111183]  which belongs to the cache kmalloc-64 of size 64
[   36.112252] The buggy address is located 0 bytes to the right of
[   36.112252]  allocated 48-byte region [fff00000c63df000, fff00000c63df030)
[   36.113506] 
[   36.113814] The buggy address belongs to the physical page:
[   36.114511] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063df
[   36.115294] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   36.116083] page_type: f5(slab)
[   36.116571] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   36.117527] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   36.118301] page dumped because: kasan: bad access detected
[   36.118927] 
[   36.119297] Memory state around the buggy address:
[   36.119795]  fff00000c63def00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   36.120625]  fff00000c63def80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   36.121497] >fff00000c63df000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   36.122214]                                      ^
[   36.122847]  fff00000c63df080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.123578]  fff00000c63df100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.124364] ==================================================================
[   34.604891] ==================================================================
[   34.605628] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1ec/0x4858
[   34.607129] Read of size 4 at addr fff00000c63df030 by task kunit_try_catch/253
[   34.608736] 
[   34.609199] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241128 #1
[   34.610614] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.611169] Hardware name: linux,dummy-virt (DT)
[   34.611780] Call trace:
[   34.612222]  show_stack+0x20/0x38 (C)
[   34.612864]  dump_stack_lvl+0x8c/0xd0
[   34.614193]  print_report+0x118/0x5e0
[   34.614789]  kasan_report+0xc8/0x118
[   34.615448]  kasan_check_range+0x100/0x1a8
[   34.616094]  __kasan_check_read+0x20/0x30
[   34.616745]  kasan_atomics_helper+0x1ec/0x4858
[   34.617746]  kasan_atomics+0x198/0x2e8
[   34.618369]  kunit_try_run_case+0x14c/0x3d0
[   34.619003]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.619807]  kthread+0x24c/0x2d0
[   34.620298]  ret_from_fork+0x10/0x20
[   34.620893] 
[   34.621256] Allocated by task 253:
[   34.622647]  kasan_save_stack+0x3c/0x68
[   34.623374]  kasan_save_track+0x20/0x40
[   34.623929]  kasan_save_alloc_info+0x40/0x58
[   34.624487]  __kasan_kmalloc+0xd4/0xd8
[   34.625635]  __kmalloc_cache_noprof+0x15c/0x3c0
[   34.626180]  kasan_atomics+0xb8/0x2e8
[   34.626902]  kunit_try_run_case+0x14c/0x3d0
[   34.627652]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.628517]  kthread+0x24c/0x2d0
[   34.629280]  ret_from_fork+0x10/0x20
[   34.630069] 
[   34.630406] The buggy address belongs to the object at fff00000c63df000
[   34.630406]  which belongs to the cache kmalloc-64 of size 64
[   34.632108] The buggy address is located 0 bytes to the right of
[   34.632108]  allocated 48-byte region [fff00000c63df000, fff00000c63df030)
[   34.633940] 
[   34.634306] The buggy address belongs to the physical page:
[   34.634845] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063df
[   34.635725] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   34.636557] page_type: f5(slab)
[   34.637303] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   34.638311] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   34.639139] page dumped because: kasan: bad access detected
[   34.639766] 
[   34.640162] Memory state around the buggy address:
[   34.640814]  fff00000c63def00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   34.641496]  fff00000c63def80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   34.642256] >fff00000c63df000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   34.642937]                                      ^
[   34.643871]  fff00000c63df080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.644659]  fff00000c63df100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.645602] ==================================================================
[   35.601368] ==================================================================
[   35.602039] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3dbc/0x4858
[   35.602802] Read of size 4 at addr fff00000c63df030 by task kunit_try_catch/253
[   35.603648] 
[   35.604056] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241128 #1
[   35.605062] Tainted: [B]=BAD_PAGE, [N]=TEST
[   35.605710] Hardware name: linux,dummy-virt (DT)
[   35.606246] Call trace:
[   35.606749]  show_stack+0x20/0x38 (C)
[   35.607375]  dump_stack_lvl+0x8c/0xd0
[   35.608047]  print_report+0x118/0x5e0
[   35.608659]  kasan_report+0xc8/0x118
[   35.609303]  __asan_report_load4_noabort+0x20/0x30
[   35.609945]  kasan_atomics_helper+0x3dbc/0x4858
[   35.610638]  kasan_atomics+0x198/0x2e8
[   35.611261]  kunit_try_run_case+0x14c/0x3d0
[   35.611937]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.612680]  kthread+0x24c/0x2d0
[   35.613257]  ret_from_fork+0x10/0x20
[   35.613845] 
[   35.614198] Allocated by task 253:
[   35.614762]  kasan_save_stack+0x3c/0x68
[   35.615349]  kasan_save_track+0x20/0x40
[   35.615973]  kasan_save_alloc_info+0x40/0x58
[   35.616580]  __kasan_kmalloc+0xd4/0xd8
[   35.617214]  __kmalloc_cache_noprof+0x15c/0x3c0
[   35.617841]  kasan_atomics+0xb8/0x2e8
[   35.618444]  kunit_try_run_case+0x14c/0x3d0
[   35.619049]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.619792]  kthread+0x24c/0x2d0
[   35.620353]  ret_from_fork+0x10/0x20
[   35.620922] 
[   35.621308] The buggy address belongs to the object at fff00000c63df000
[   35.621308]  which belongs to the cache kmalloc-64 of size 64
[   35.622506] The buggy address is located 0 bytes to the right of
[   35.622506]  allocated 48-byte region [fff00000c63df000, fff00000c63df030)
[   35.623819] 
[   35.624237] The buggy address belongs to the physical page:
[   35.625059] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063df
[   35.625988] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   35.626780] page_type: f5(slab)
[   35.627276] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   35.628222] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   35.629067] page dumped because: kasan: bad access detected
[   35.629735] 
[   35.630096] Memory state around the buggy address:
[   35.630795]  fff00000c63def00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   35.631557]  fff00000c63def80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   35.632423] >fff00000c63df000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   35.633230]                                      ^
[   35.633834]  fff00000c63df080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.634661]  fff00000c63df100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.635433] ==================================================================
[   36.300339] ==================================================================
[   36.301229] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x126c/0x4858
[   36.302172] Write of size 8 at addr fff00000c63df030 by task kunit_try_catch/253
[   36.303050] 
[   36.303433] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241128 #1
[   36.304471] Tainted: [B]=BAD_PAGE, [N]=TEST
[   36.305033] Hardware name: linux,dummy-virt (DT)
[   36.305673] Call trace:
[   36.306094]  show_stack+0x20/0x38 (C)
[   36.306712]  dump_stack_lvl+0x8c/0xd0
[   36.307223]  print_report+0x118/0x5e0
[   36.307858]  kasan_report+0xc8/0x118
[   36.308417]  kasan_check_range+0x100/0x1a8
[   36.308963]  __kasan_check_write+0x20/0x30
[   36.309617]  kasan_atomics_helper+0x126c/0x4858
[   36.310220]  kasan_atomics+0x198/0x2e8
[   36.310814]  kunit_try_run_case+0x14c/0x3d0
[   36.311477]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.312101]  kthread+0x24c/0x2d0
[   36.312691]  ret_from_fork+0x10/0x20
[   36.313280] 
[   36.313630] Allocated by task 253:
[   36.314134]  kasan_save_stack+0x3c/0x68
[   36.314719]  kasan_save_track+0x20/0x40
[   36.315261]  kasan_save_alloc_info+0x40/0x58
[   36.315901]  __kasan_kmalloc+0xd4/0xd8
[   36.316499]  __kmalloc_cache_noprof+0x15c/0x3c0
[   36.317048]  kasan_atomics+0xb8/0x2e8
[   36.317668]  kunit_try_run_case+0x14c/0x3d0
[   36.318246]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.318864]  kthread+0x24c/0x2d0
[   36.319413]  ret_from_fork+0x10/0x20
[   36.319971] 
[   36.320301] The buggy address belongs to the object at fff00000c63df000
[   36.320301]  which belongs to the cache kmalloc-64 of size 64
[   36.321544] The buggy address is located 0 bytes to the right of
[   36.321544]  allocated 48-byte region [fff00000c63df000, fff00000c63df030)
[   36.322728] 
[   36.323077] The buggy address belongs to the physical page:
[   36.323597] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063df
[   36.324541] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   36.325263] page_type: f5(slab)
[   36.325775] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   36.326624] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   36.327450] page dumped because: kasan: bad access detected
[   36.328082] 
[   36.328434] Memory state around the buggy address:
[   36.328983]  fff00000c63def00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   36.329755]  fff00000c63def80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   36.330524] >fff00000c63df000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   36.331285]                                      ^
[   36.331885]  fff00000c63df080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.332692]  fff00000c63df100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.333441] ==================================================================
[   34.566759] ==================================================================
[   34.567569] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f7c/0x4858
[   34.568214] Write of size 4 at addr fff00000c63df030 by task kunit_try_catch/253
[   34.569000] 
[   34.569404] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241128 #1
[   34.570449] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.571018] Hardware name: linux,dummy-virt (DT)
[   34.572646] Call trace:
[   34.573402]  show_stack+0x20/0x38 (C)
[   34.573937]  dump_stack_lvl+0x8c/0xd0
[   34.574560]  print_report+0x118/0x5e0
[   34.575050]  kasan_report+0xc8/0x118
[   34.575654]  __asan_report_store4_noabort+0x20/0x30
[   34.576330]  kasan_atomics_helper+0x3f7c/0x4858
[   34.577020]  kasan_atomics+0x198/0x2e8
[   34.577611]  kunit_try_run_case+0x14c/0x3d0
[   34.578255]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.578895]  kthread+0x24c/0x2d0
[   34.579694]  ret_from_fork+0x10/0x20
[   34.580285] 
[   34.580580] Allocated by task 253:
[   34.581843]  kasan_save_stack+0x3c/0x68
[   34.582479]  kasan_save_track+0x20/0x40
[   34.583144]  kasan_save_alloc_info+0x40/0x58
[   34.583442]  __kasan_kmalloc+0xd4/0xd8
[   34.583691]  __kmalloc_cache_noprof+0x15c/0x3c0
[   34.583961]  kasan_atomics+0xb8/0x2e8
[   34.584425]  kunit_try_run_case+0x14c/0x3d0
[   34.585768]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.586731]  kthread+0x24c/0x2d0
[   34.587288]  ret_from_fork+0x10/0x20
[   34.587882] 
[   34.588258] The buggy address belongs to the object at fff00000c63df000
[   34.588258]  which belongs to the cache kmalloc-64 of size 64
[   34.589908] The buggy address is located 0 bytes to the right of
[   34.589908]  allocated 48-byte region [fff00000c63df000, fff00000c63df030)
[   34.591373] 
[   34.591897] The buggy address belongs to the physical page:
[   34.592698] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063df
[   34.593518] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   34.594331] page_type: f5(slab)
[   34.594870] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   34.595618] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   34.596493] page dumped because: kasan: bad access detected
[   34.597298] 
[   34.597719] Memory state around the buggy address:
[   34.598302]  fff00000c63def00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   34.599241]  fff00000c63def80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   34.599945] >fff00000c63df000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   34.600850]                                      ^
[   34.601516]  fff00000c63df080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.602540]  fff00000c63df100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.603368] ==================================================================
[   36.479005] ==================================================================
[   36.479661] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x147c/0x4858
[   36.480561] Write of size 8 at addr fff00000c63df030 by task kunit_try_catch/253
[   36.482202] 
[   36.482620] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241128 #1
[   36.483727] Tainted: [B]=BAD_PAGE, [N]=TEST
[   36.484360] Hardware name: linux,dummy-virt (DT)
[   36.484911] Call trace:
[   36.485392]  show_stack+0x20/0x38 (C)
[   36.486071]  dump_stack_lvl+0x8c/0xd0
[   36.486678]  print_report+0x118/0x5e0
[   36.487328]  kasan_report+0xc8/0x118
[   36.487941]  kasan_check_range+0x100/0x1a8
[   36.488637]  __kasan_check_write+0x20/0x30
[   36.489238]  kasan_atomics_helper+0x147c/0x4858
[   36.489928]  kasan_atomics+0x198/0x2e8
[   36.490527]  kunit_try_run_case+0x14c/0x3d0
[   36.491192]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.491910]  kthread+0x24c/0x2d0
[   36.492504]  ret_from_fork+0x10/0x20
[   36.493092] 
[   36.493527] Allocated by task 253:
[   36.494014]  kasan_save_stack+0x3c/0x68
[   36.494654]  kasan_save_track+0x20/0x40
[   36.495226]  kasan_save_alloc_info+0x40/0x58
[   36.495893]  __kasan_kmalloc+0xd4/0xd8
[   36.496400]  __kmalloc_cache_noprof+0x15c/0x3c0
[   36.497041]  kasan_atomics+0xb8/0x2e8
[   36.497637]  kunit_try_run_case+0x14c/0x3d0
[   36.498279]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.498878]  kthread+0x24c/0x2d0
[   36.499471]  ret_from_fork+0x10/0x20
[   36.500032] 
[   36.500439] The buggy address belongs to the object at fff00000c63df000
[   36.500439]  which belongs to the cache kmalloc-64 of size 64
[   36.501678] The buggy address is located 0 bytes to the right of
[   36.501678]  allocated 48-byte region [fff00000c63df000, fff00000c63df030)
[   36.502953] 
[   36.503324] The buggy address belongs to the physical page:
[   36.503973] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063df
[   36.504965] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   36.505758] page_type: f5(slab)
[   36.506291] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   36.507191] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   36.508019] page dumped because: kasan: bad access detected
[   36.508689] 
[   36.509071] Memory state around the buggy address:
[   36.509704]  fff00000c63def00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   36.510474]  fff00000c63def80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   36.511314] >fff00000c63df000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   36.512110]                                      ^
[   36.512720]  fff00000c63df080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.513570]  fff00000c63df100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.514367] ==================================================================
[   34.768825] ==================================================================
[   34.770575] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x32c/0x4858
[   34.771425] Write of size 4 at addr fff00000c63df030 by task kunit_try_catch/253
[   34.772289] 
[   34.772646] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241128 #1
[   34.773784] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.774771] Hardware name: linux,dummy-virt (DT)
[   34.775320] Call trace:
[   34.775742]  show_stack+0x20/0x38 (C)
[   34.776340]  dump_stack_lvl+0x8c/0xd0
[   34.776949]  print_report+0x118/0x5e0
[   34.777862]  kasan_report+0xc8/0x118
[   34.778257]  kasan_check_range+0x100/0x1a8
[   34.778905]  __kasan_check_write+0x20/0x30
[   34.780053]  kasan_atomics_helper+0x32c/0x4858
[   34.780737]  kasan_atomics+0x198/0x2e8
[   34.781619]  kunit_try_run_case+0x14c/0x3d0
[   34.782033]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.782814]  kthread+0x24c/0x2d0
[   34.783395]  ret_from_fork+0x10/0x20
[   34.783979] 
[   34.784356] Allocated by task 253:
[   34.784887]  kasan_save_stack+0x3c/0x68
[   34.785531]  kasan_save_track+0x20/0x40
[   34.786351]  kasan_save_alloc_info+0x40/0x58
[   34.786975]  __kasan_kmalloc+0xd4/0xd8
[   34.787558]  __kmalloc_cache_noprof+0x15c/0x3c0
[   34.788078]  kasan_atomics+0xb8/0x2e8
[   34.789343]  kunit_try_run_case+0x14c/0x3d0
[   34.789859]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.790207]  kthread+0x24c/0x2d0
[   34.790444]  ret_from_fork+0x10/0x20
[   34.790681] 
[   34.790834] The buggy address belongs to the object at fff00000c63df000
[   34.790834]  which belongs to the cache kmalloc-64 of size 64
[   34.792834] The buggy address is located 0 bytes to the right of
[   34.792834]  allocated 48-byte region [fff00000c63df000, fff00000c63df030)
[   34.794017] 
[   34.795092] The buggy address belongs to the physical page:
[   34.795720] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063df
[   34.796534] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   34.797639] page_type: f5(slab)
[   34.798091] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   34.799018] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   34.799875] page dumped because: kasan: bad access detected
[   34.800465] 
[   34.800801] Memory state around the buggy address:
[   34.802022]  fff00000c63def00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   34.802941]  fff00000c63def80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   34.803636] >fff00000c63df000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   34.804428]                                      ^
[   34.805077]  fff00000c63df080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.806270]  fff00000c63df100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.807030] ==================================================================
[   34.931313] ==================================================================
[   34.932094] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x47c/0x4858
[   34.932773] Write of size 4 at addr fff00000c63df030 by task kunit_try_catch/253
[   34.933855] 
[   34.934798] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241128 #1
[   34.935946] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.936998] Hardware name: linux,dummy-virt (DT)
[   34.937544] Call trace:
[   34.937880]  show_stack+0x20/0x38 (C)
[   34.939021]  dump_stack_lvl+0x8c/0xd0
[   34.939544]  print_report+0x118/0x5e0
[   34.939992]  kasan_report+0xc8/0x118
[   34.940452]  kasan_check_range+0x100/0x1a8
[   34.941529]  __kasan_check_write+0x20/0x30
[   34.942405]  kasan_atomics_helper+0x47c/0x4858
[   34.943109]  kasan_atomics+0x198/0x2e8
[   34.943633]  kunit_try_run_case+0x14c/0x3d0
[   34.944447]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.945678]  kthread+0x24c/0x2d0
[   34.946141]  ret_from_fork+0x10/0x20
[   34.946868] 
[   34.947196] Allocated by task 253:
[   34.947680]  kasan_save_stack+0x3c/0x68
[   34.948171]  kasan_save_track+0x20/0x40
[   34.948763]  kasan_save_alloc_info+0x40/0x58
[   34.949418]  __kasan_kmalloc+0xd4/0xd8
[   34.949867]  __kmalloc_cache_noprof+0x15c/0x3c0
[   34.950986]  kasan_atomics+0xb8/0x2e8
[   34.951402]  kunit_try_run_case+0x14c/0x3d0
[   34.951685]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.951983]  kthread+0x24c/0x2d0
[   34.952229]  ret_from_fork+0x10/0x20
[   34.952481] 
[   34.952636] The buggy address belongs to the object at fff00000c63df000
[   34.952636]  which belongs to the cache kmalloc-64 of size 64
[   34.955023] The buggy address is located 0 bytes to the right of
[   34.955023]  allocated 48-byte region [fff00000c63df000, fff00000c63df030)
[   34.956471] 
[   34.956983] The buggy address belongs to the physical page:
[   34.957795] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063df
[   34.959181] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   34.960023] page_type: f5(slab)
[   34.960604] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   34.961432] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   34.962169] page dumped because: kasan: bad access detected
[   34.963073] 
[   34.963398] Memory state around the buggy address:
[   34.963960]  fff00000c63def00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   34.965200]  fff00000c63def80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   34.966199] >fff00000c63df000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   34.967401]                                      ^
[   34.968203]  fff00000c63df080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.969386]  fff00000c63df100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.970657] ==================================================================
[   35.015245] ==================================================================
[   35.015946] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x54c/0x4858
[   35.016801] Write of size 4 at addr fff00000c63df030 by task kunit_try_catch/253
[   35.017552] 
[   35.017927] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241128 #1
[   35.019093] Tainted: [B]=BAD_PAGE, [N]=TEST
[   35.019652] Hardware name: linux,dummy-virt (DT)
[   35.020255] Call trace:
[   35.020612]  show_stack+0x20/0x38 (C)
[   35.021296]  dump_stack_lvl+0x8c/0xd0
[   35.021956]  print_report+0x118/0x5e0
[   35.022620]  kasan_report+0xc8/0x118
[   35.023281]  kasan_check_range+0x100/0x1a8
[   35.023877]  __kasan_check_write+0x20/0x30
[   35.024572]  kasan_atomics_helper+0x54c/0x4858
[   35.025241]  kasan_atomics+0x198/0x2e8
[   35.025866]  kunit_try_run_case+0x14c/0x3d0
[   35.026495]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.027255]  kthread+0x24c/0x2d0
[   35.027898]  ret_from_fork+0x10/0x20
[   35.028499] 
[   35.028880] Allocated by task 253:
[   35.029385]  kasan_save_stack+0x3c/0x68
[   35.029985]  kasan_save_track+0x20/0x40
[   35.030653]  kasan_save_alloc_info+0x40/0x58
[   35.031338]  __kasan_kmalloc+0xd4/0xd8
[   35.031935]  __kmalloc_cache_noprof+0x15c/0x3c0
[   35.032644]  kasan_atomics+0xb8/0x2e8
[   35.033214]  kunit_try_run_case+0x14c/0x3d0
[   35.033808]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.034584]  kthread+0x24c/0x2d0
[   35.035073]  ret_from_fork+0x10/0x20
[   35.035690] 
[   35.036068] The buggy address belongs to the object at fff00000c63df000
[   35.036068]  which belongs to the cache kmalloc-64 of size 64
[   35.037281] The buggy address is located 0 bytes to the right of
[   35.037281]  allocated 48-byte region [fff00000c63df000, fff00000c63df030)
[   35.038623] 
[   35.039017] The buggy address belongs to the physical page:
[   35.039686] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063df
[   35.040530] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   35.041394] page_type: f5(slab)
[   35.041895] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   35.042834] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   35.043508] page dumped because: kasan: bad access detected
[   35.044375] 
[   35.044878] Memory state around the buggy address:
[   35.045618]  fff00000c63def00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   35.046357]  fff00000c63def80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   35.047085] >fff00000c63df000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   35.047922]                                      ^
[   35.048660]  fff00000c63df080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.049540]  fff00000c63df100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.050473] ==================================================================
[   35.951240] ==================================================================
[   35.952021] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e5c/0x4858
[   35.952827] Write of size 8 at addr fff00000c63df030 by task kunit_try_catch/253
[   35.953973] 
[   35.954322] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241128 #1
[   35.956104] Tainted: [B]=BAD_PAGE, [N]=TEST
[   35.957062] Hardware name: linux,dummy-virt (DT)
[   35.957747] Call trace:
[   35.958158]  show_stack+0x20/0x38 (C)
[   35.958767]  dump_stack_lvl+0x8c/0xd0
[   35.959373]  print_report+0x118/0x5e0
[   35.959925]  kasan_report+0xc8/0x118
[   35.960422]  __asan_report_store8_noabort+0x20/0x30
[   35.961106]  kasan_atomics_helper+0x3e5c/0x4858
[   35.961782]  kasan_atomics+0x198/0x2e8
[   35.962345]  kunit_try_run_case+0x14c/0x3d0
[   35.962893]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.963568]  kthread+0x24c/0x2d0
[   35.964145]  ret_from_fork+0x10/0x20
[   35.964732] 
[   35.965086] Allocated by task 253:
[   35.965622]  kasan_save_stack+0x3c/0x68
[   35.966163]  kasan_save_track+0x20/0x40
[   35.966765]  kasan_save_alloc_info+0x40/0x58
[   35.967420]  __kasan_kmalloc+0xd4/0xd8
[   35.967973]  __kmalloc_cache_noprof+0x15c/0x3c0
[   35.968625]  kasan_atomics+0xb8/0x2e8
[   35.969104]  kunit_try_run_case+0x14c/0x3d0
[   35.969752]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.970438]  kthread+0x24c/0x2d0
[   35.970889]  ret_from_fork+0x10/0x20
[   35.971475] 
[   35.971824] The buggy address belongs to the object at fff00000c63df000
[   35.971824]  which belongs to the cache kmalloc-64 of size 64
[   35.972908] The buggy address is located 0 bytes to the right of
[   35.972908]  allocated 48-byte region [fff00000c63df000, fff00000c63df030)
[   35.974153] 
[   35.974520] The buggy address belongs to the physical page:
[   35.975080] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063df
[   35.976168] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   35.976872] page_type: f5(slab)
[   35.977363] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   35.978208] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   35.979025] page dumped because: kasan: bad access detected
[   35.979639] 
[   35.979982] Memory state around the buggy address:
[   35.980542]  fff00000c63def00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   35.981385]  fff00000c63def80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   35.982100] >fff00000c63df000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   35.982883]                                      ^
[   35.983542]  fff00000c63df080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.984284]  fff00000c63df100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.985089] ==================================================================
[   36.516532] ==================================================================
[   36.517183] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x14e4/0x4858
[   36.518048] Write of size 8 at addr fff00000c63df030 by task kunit_try_catch/253
[   36.518903] 
[   36.519275] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241128 #1
[   36.520436] Tainted: [B]=BAD_PAGE, [N]=TEST
[   36.520921] Hardware name: linux,dummy-virt (DT)
[   36.521558] Call trace:
[   36.522029]  show_stack+0x20/0x38 (C)
[   36.522609]  dump_stack_lvl+0x8c/0xd0
[   36.523292]  print_report+0x118/0x5e0
[   36.523874]  kasan_report+0xc8/0x118
[   36.524505]  kasan_check_range+0x100/0x1a8
[   36.525072]  __kasan_check_write+0x20/0x30
[   36.525773]  kasan_atomics_helper+0x14e4/0x4858
[   36.526471]  kasan_atomics+0x198/0x2e8
[   36.527140]  kunit_try_run_case+0x14c/0x3d0
[   36.527809]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.528625]  kthread+0x24c/0x2d0
[   36.529188]  ret_from_fork+0x10/0x20
[   36.529829] 
[   36.530130] Allocated by task 253:
[   36.530595]  kasan_save_stack+0x3c/0x68
[   36.531199]  kasan_save_track+0x20/0x40
[   36.531737]  kasan_save_alloc_info+0x40/0x58
[   36.532252]  __kasan_kmalloc+0xd4/0xd8
[   36.532836]  __kmalloc_cache_noprof+0x15c/0x3c0
[   36.533468]  kasan_atomics+0xb8/0x2e8
[   36.534038]  kunit_try_run_case+0x14c/0x3d0
[   36.534612]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.535355]  kthread+0x24c/0x2d0
[   36.535895]  ret_from_fork+0x10/0x20
[   36.536455] 
[   36.536802] The buggy address belongs to the object at fff00000c63df000
[   36.536802]  which belongs to the cache kmalloc-64 of size 64
[   36.537952] The buggy address is located 0 bytes to the right of
[   36.537952]  allocated 48-byte region [fff00000c63df000, fff00000c63df030)
[   36.539037] 
[   36.539408] The buggy address belongs to the physical page:
[   36.540092] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063df
[   36.540905] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   36.541682] page_type: f5(slab)
[   36.542155] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   36.542997] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   36.544097] page dumped because: kasan: bad access detected
[   36.544735] 
[   36.545041] Memory state around the buggy address:
[   36.546008]  fff00000c63def00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   36.546795]  fff00000c63def80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   36.547568] >fff00000c63df000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   36.548342]                                      ^
[   36.548918]  fff00000c63df080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.549672]  fff00000c63df100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.550490] ==================================================================
[   35.986621] ==================================================================
[   35.987409] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xeb8/0x4858
[   35.988045] Write of size 8 at addr fff00000c63df030 by task kunit_try_catch/253
[   35.988959] 
[   35.989353] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241128 #1
[   35.990314] Tainted: [B]=BAD_PAGE, [N]=TEST
[   35.990791] Hardware name: linux,dummy-virt (DT)
[   35.991425] Call trace:
[   35.991773]  show_stack+0x20/0x38 (C)
[   35.992398]  dump_stack_lvl+0x8c/0xd0
[   35.993006]  print_report+0x118/0x5e0
[   35.993710]  kasan_report+0xc8/0x118
[   35.994315]  kasan_check_range+0x100/0x1a8
[   35.994837]  __kasan_check_write+0x20/0x30
[   35.995489]  kasan_atomics_helper+0xeb8/0x4858
[   35.996134]  kasan_atomics+0x198/0x2e8
[   35.996718]  kunit_try_run_case+0x14c/0x3d0
[   35.997258]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.998039]  kthread+0x24c/0x2d0
[   35.998559]  ret_from_fork+0x10/0x20
[   35.999186] 
[   35.999544] Allocated by task 253:
[   36.000063]  kasan_save_stack+0x3c/0x68
[   36.000648]  kasan_save_track+0x20/0x40
[   36.001226]  kasan_save_alloc_info+0x40/0x58
[   36.001851]  __kasan_kmalloc+0xd4/0xd8
[   36.002395]  __kmalloc_cache_noprof+0x15c/0x3c0
[   36.003027]  kasan_atomics+0xb8/0x2e8
[   36.003548]  kunit_try_run_case+0x14c/0x3d0
[   36.004191]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.004938]  kthread+0x24c/0x2d0
[   36.005489]  ret_from_fork+0x10/0x20
[   36.006044] 
[   36.006655] The buggy address belongs to the object at fff00000c63df000
[   36.006655]  which belongs to the cache kmalloc-64 of size 64
[   36.007839] The buggy address is located 0 bytes to the right of
[   36.007839]  allocated 48-byte region [fff00000c63df000, fff00000c63df030)
[   36.009019] 
[   36.009389] The buggy address belongs to the physical page:
[   36.009947] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063df
[   36.010836] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   36.011536] page_type: f5(slab)
[   36.012018] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   36.012886] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   36.013682] page dumped because: kasan: bad access detected
[   36.014206] 
[   36.014559] Memory state around the buggy address:
[   36.015207]  fff00000c63def00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   36.015969]  fff00000c63def80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   36.016853] >fff00000c63df000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   36.017561]                                      ^
[   36.018213]  fff00000c63df080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.018926]  fff00000c63df100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.019746] ==================================================================
[   36.774151] ==================================================================
[   36.774979] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e10/0x4858
[   36.775686] Read of size 8 at addr fff00000c63df030 by task kunit_try_catch/253
[   36.776449] 
[   36.776813] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241128 #1
[   36.777936] Tainted: [B]=BAD_PAGE, [N]=TEST
[   36.778420] Hardware name: linux,dummy-virt (DT)
[   36.779035] Call trace:
[   36.779488]  show_stack+0x20/0x38 (C)
[   36.780047]  dump_stack_lvl+0x8c/0xd0
[   36.780664]  print_report+0x118/0x5e0
[   36.781273]  kasan_report+0xc8/0x118
[   36.781860]  __asan_report_load8_noabort+0x20/0x30
[   36.782501]  kasan_atomics_helper+0x3e10/0x4858
[   36.783156]  kasan_atomics+0x198/0x2e8
[   36.783719]  kunit_try_run_case+0x14c/0x3d0
[   36.784389]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.785150]  kthread+0x24c/0x2d0
[   36.785639]  ret_from_fork+0x10/0x20
[   36.786251] 
[   36.786561] Allocated by task 253:
[   36.787014]  kasan_save_stack+0x3c/0x68
[   36.787599]  kasan_save_track+0x20/0x40
[   36.788142]  kasan_save_alloc_info+0x40/0x58
[   36.788666]  __kasan_kmalloc+0xd4/0xd8
[   36.789267]  __kmalloc_cache_noprof+0x15c/0x3c0
[   36.789927]  kasan_atomics+0xb8/0x2e8
[   36.790483]  kunit_try_run_case+0x14c/0x3d0
[   36.791125]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.791729]  kthread+0x24c/0x2d0
[   36.792308]  ret_from_fork+0x10/0x20
[   36.792794] 
[   36.793162] The buggy address belongs to the object at fff00000c63df000
[   36.793162]  which belongs to the cache kmalloc-64 of size 64
[   36.794287] The buggy address is located 0 bytes to the right of
[   36.794287]  allocated 48-byte region [fff00000c63df000, fff00000c63df030)
[   36.795551] 
[   36.795897] The buggy address belongs to the physical page:
[   36.796509] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063df
[   36.797441] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   36.798058] page_type: f5(slab)
[   36.798612] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   36.799513] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   36.800250] page dumped because: kasan: bad access detected
[   36.800957] 
[   36.801316] Memory state around the buggy address:
[   36.801806]  fff00000c63def00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   36.802665]  fff00000c63def80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   36.803405] >fff00000c63df000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   36.804182]                                      ^
[   36.804758]  fff00000c63df080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.805536]  fff00000c63df100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.806290] ==================================================================
[   34.526854] ==================================================================
[   34.527999] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x40a8/0x4858
[   34.528714] Read of size 4 at addr fff00000c63df030 by task kunit_try_catch/253
[   34.530509] 
[   34.531205] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241128 #1
[   34.532422] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.534174] Hardware name: linux,dummy-virt (DT)
[   34.534996] Call trace:
[   34.535533]  show_stack+0x20/0x38 (C)
[   34.536180]  dump_stack_lvl+0x8c/0xd0
[   34.536736]  print_report+0x118/0x5e0
[   34.537314]  kasan_report+0xc8/0x118
[   34.537986]  __asan_report_load4_noabort+0x20/0x30
[   34.538526]  kasan_atomics_helper+0x40a8/0x4858
[   34.539052]  kasan_atomics+0x198/0x2e8
[   34.539782]  kunit_try_run_case+0x14c/0x3d0
[   34.540533]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.541336]  kthread+0x24c/0x2d0
[   34.541934]  ret_from_fork+0x10/0x20
[   34.542607] 
[   34.542960] Allocated by task 253:
[   34.543459]  kasan_save_stack+0x3c/0x68
[   34.544123]  kasan_save_track+0x20/0x40
[   34.544663]  kasan_save_alloc_info+0x40/0x58
[   34.545330]  __kasan_kmalloc+0xd4/0xd8
[   34.545862]  __kmalloc_cache_noprof+0x15c/0x3c0
[   34.546522]  kasan_atomics+0xb8/0x2e8
[   34.547096]  kunit_try_run_case+0x14c/0x3d0
[   34.547899]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.548685]  kthread+0x24c/0x2d0
[   34.549321]  ret_from_fork+0x10/0x20
[   34.549925] 
[   34.550598] The buggy address belongs to the object at fff00000c63df000
[   34.550598]  which belongs to the cache kmalloc-64 of size 64
[   34.551797] The buggy address is located 0 bytes to the right of
[   34.551797]  allocated 48-byte region [fff00000c63df000, fff00000c63df030)
[   34.553055] 
[   34.553480] The buggy address belongs to the physical page:
[   34.554367] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063df
[   34.555110] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   34.555944] page_type: f5(slab)
[   34.556527] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   34.557398] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   34.558272] page dumped because: kasan: bad access detected
[   34.558927] 
[   34.559334] Memory state around the buggy address:
[   34.559858]  fff00000c63def00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   34.560721]  fff00000c63def80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   34.561779] >fff00000c63df000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   34.562931]                                      ^
[   34.563432]  fff00000c63df080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.564168]  fff00000c63df100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.564994] ==================================================================
[   35.882552] ==================================================================
[   35.883341] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f58/0x4858
[   35.884063] Read of size 8 at addr fff00000c63df030 by task kunit_try_catch/253
[   35.884964] 
[   35.885359] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241128 #1
[   35.886403] Tainted: [B]=BAD_PAGE, [N]=TEST
[   35.886979] Hardware name: linux,dummy-virt (DT)
[   35.887590] Call trace:
[   35.888020]  show_stack+0x20/0x38 (C)
[   35.888613]  dump_stack_lvl+0x8c/0xd0
[   35.889130]  print_report+0x118/0x5e0
[   35.889726]  kasan_report+0xc8/0x118
[   35.890268]  __asan_report_load8_noabort+0x20/0x30
[   35.890969]  kasan_atomics_helper+0x3f58/0x4858
[   35.891578]  kasan_atomics+0x198/0x2e8
[   35.892064]  kunit_try_run_case+0x14c/0x3d0
[   35.892717]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.893479]  kthread+0x24c/0x2d0
[   35.894054]  ret_from_fork+0x10/0x20
[   35.894664] 
[   35.895003] Allocated by task 253:
[   35.895532]  kasan_save_stack+0x3c/0x68
[   35.896008]  kasan_save_track+0x20/0x40
[   35.896617]  kasan_save_alloc_info+0x40/0x58
[   35.897242]  __kasan_kmalloc+0xd4/0xd8
[   35.897863]  __kmalloc_cache_noprof+0x15c/0x3c0
[   35.898529]  kasan_atomics+0xb8/0x2e8
[   35.899126]  kunit_try_run_case+0x14c/0x3d0
[   35.899617]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.900380]  kthread+0x24c/0x2d0
[   35.900928]  ret_from_fork+0x10/0x20
[   35.901511] 
[   35.901852] The buggy address belongs to the object at fff00000c63df000
[   35.901852]  which belongs to the cache kmalloc-64 of size 64
[   35.903007] The buggy address is located 0 bytes to the right of
[   35.903007]  allocated 48-byte region [fff00000c63df000, fff00000c63df030)
[   35.904177] 
[   35.904541] The buggy address belongs to the physical page:
[   35.905179] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063df
[   35.906137] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   35.906852] page_type: f5(slab)
[   35.907398] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   35.908189] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   35.909066] page dumped because: kasan: bad access detected
[   35.909666] 
[   35.910022] Memory state around the buggy address:
[   35.910568]  fff00000c63def00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   35.911403]  fff00000c63def80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   35.912169] >fff00000c63df000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   35.912891]                                      ^
[   35.913558]  fff00000c63df080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.914292]  fff00000c63df100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.915098] ==================================================================
[   35.638436] ==================================================================
[   35.639032] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xc08/0x4858
[   35.639693] Write of size 4 at addr fff00000c63df030 by task kunit_try_catch/253
[   35.640571] 
[   35.640949] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241128 #1
[   35.641840] Tainted: [B]=BAD_PAGE, [N]=TEST
[   35.642440] Hardware name: linux,dummy-virt (DT)
[   35.643062] Call trace:
[   35.643511]  show_stack+0x20/0x38 (C)
[   35.644067]  dump_stack_lvl+0x8c/0xd0
[   35.644612]  print_report+0x118/0x5e0
[   35.645229]  kasan_report+0xc8/0x118
[   35.645816]  kasan_check_range+0x100/0x1a8
[   35.646428]  __kasan_check_write+0x20/0x30
[   35.647072]  kasan_atomics_helper+0xc08/0x4858
[   35.647778]  kasan_atomics+0x198/0x2e8
[   35.648361]  kunit_try_run_case+0x14c/0x3d0
[   35.648938]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.649709]  kthread+0x24c/0x2d0
[   35.650288]  ret_from_fork+0x10/0x20
[   35.650889] 
[   35.651211] Allocated by task 253:
[   35.651720]  kasan_save_stack+0x3c/0x68
[   35.652316]  kasan_save_track+0x20/0x40
[   35.653067]  kasan_save_alloc_info+0x40/0x58
[   35.653715]  __kasan_kmalloc+0xd4/0xd8
[   35.654253]  __kmalloc_cache_noprof+0x15c/0x3c0
[   35.654767]  kasan_atomics+0xb8/0x2e8
[   35.655367]  kunit_try_run_case+0x14c/0x3d0
[   35.655883]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.656638]  kthread+0x24c/0x2d0
[   35.657183]  ret_from_fork+0x10/0x20
[   35.657756] 
[   35.658071] The buggy address belongs to the object at fff00000c63df000
[   35.658071]  which belongs to the cache kmalloc-64 of size 64
[   35.659191] The buggy address is located 0 bytes to the right of
[   35.659191]  allocated 48-byte region [fff00000c63df000, fff00000c63df030)
[   35.660362] 
[   35.660721] The buggy address belongs to the physical page:
[   35.661297] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063df
[   35.662207] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   35.662973] page_type: f5(slab)
[   35.663470] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   35.664564] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   35.665379] page dumped because: kasan: bad access detected
[   35.665937] 
[   35.666295] Memory state around the buggy address:
[   35.666923]  fff00000c63def00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   35.667668]  fff00000c63def80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   35.668538] >fff00000c63df000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   35.669238]                                      ^
[   35.669881]  fff00000c63df080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.670608]  fff00000c63df100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.671310] ==================================================================
[   36.882856] ==================================================================
[   36.883475] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x17ec/0x4858
[   36.884410] Write of size 8 at addr fff00000c63df030 by task kunit_try_catch/253
[   36.885407] 
[   36.885853] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241128 #1
[   36.887011] Tainted: [B]=BAD_PAGE, [N]=TEST
[   36.887638] Hardware name: linux,dummy-virt (DT)
[   36.888296] Call trace:
[   36.888725]  show_stack+0x20/0x38 (C)
[   36.889364]  dump_stack_lvl+0x8c/0xd0
[   36.890050]  print_report+0x118/0x5e0
[   36.890744]  kasan_report+0xc8/0x118
[   36.891415]  kasan_check_range+0x100/0x1a8
[   36.892142]  __kasan_check_write+0x20/0x30
[   36.892827]  kasan_atomics_helper+0x17ec/0x4858
[   36.893596]  kasan_atomics+0x198/0x2e8
[   36.894255]  kunit_try_run_case+0x14c/0x3d0
[   36.894982]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.895756]  kthread+0x24c/0x2d0
[   36.896426]  ret_from_fork+0x10/0x20
[   36.897052] 
[   36.897476] Allocated by task 253:
[   36.898016]  kasan_save_stack+0x3c/0x68
[   36.898660]  kasan_save_track+0x20/0x40
[   36.899328]  kasan_save_alloc_info+0x40/0x58
[   36.899974]  __kasan_kmalloc+0xd4/0xd8
[   36.900651]  __kmalloc_cache_noprof+0x15c/0x3c0
[   36.901349]  kasan_atomics+0xb8/0x2e8
[   36.901944]  kunit_try_run_case+0x14c/0x3d0
[   36.902646]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.903407]  kthread+0x24c/0x2d0
[   36.903969]  ret_from_fork+0x10/0x20
[   36.904636] 
[   36.905007] The buggy address belongs to the object at fff00000c63df000
[   36.905007]  which belongs to the cache kmalloc-64 of size 64
[   36.906333] The buggy address is located 0 bytes to the right of
[   36.906333]  allocated 48-byte region [fff00000c63df000, fff00000c63df030)
[   36.907666] 
[   36.908020] The buggy address belongs to the physical page:
[   36.908786] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063df
[   36.909787] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   36.910551] page_type: f5(slab)
[   36.910983] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   36.911692] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   36.912623] page dumped because: kasan: bad access detected
[   36.913361] 
[   36.913737] Memory state around the buggy address:
[   36.914329]  fff00000c63def00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   36.915131]  fff00000c63def80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   36.915976] >fff00000c63df000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   36.916799]                                      ^
[   36.917413]  fff00000c63df080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.918208]  fff00000c63df100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.918990] ==================================================================
[   35.092134] ==================================================================
[   35.092857] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x61c/0x4858
[   35.093996] Write of size 4 at addr fff00000c63df030 by task kunit_try_catch/253
[   35.095188] 
[   35.095661] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241128 #1
[   35.096815] Tainted: [B]=BAD_PAGE, [N]=TEST
[   35.097496] Hardware name: linux,dummy-virt (DT)
[   35.098090] Call trace:
[   35.098606]  show_stack+0x20/0x38 (C)
[   35.099324]  dump_stack_lvl+0x8c/0xd0
[   35.099980]  print_report+0x118/0x5e0
[   35.100688]  kasan_report+0xc8/0x118
[   35.101347]  kasan_check_range+0x100/0x1a8
[   35.102032]  __kasan_check_write+0x20/0x30
[   35.102752]  kasan_atomics_helper+0x61c/0x4858
[   35.103395]  kasan_atomics+0x198/0x2e8
[   35.103955]  kunit_try_run_case+0x14c/0x3d0
[   35.104664]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.105325]  kthread+0x24c/0x2d0
[   35.105945]  ret_from_fork+0x10/0x20
[   35.106601] 
[   35.106961] Allocated by task 253:
[   35.107482]  kasan_save_stack+0x3c/0x68
[   35.108025]  kasan_save_track+0x20/0x40
[   35.108644]  kasan_save_alloc_info+0x40/0x58
[   35.109313]  __kasan_kmalloc+0xd4/0xd8
[   35.109888]  __kmalloc_cache_noprof+0x15c/0x3c0
[   35.110445]  kasan_atomics+0xb8/0x2e8
[   35.111064]  kunit_try_run_case+0x14c/0x3d0
[   35.111704]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.112413]  kthread+0x24c/0x2d0
[   35.113000]  ret_from_fork+0x10/0x20
[   35.113534] 
[   35.113915] The buggy address belongs to the object at fff00000c63df000
[   35.113915]  which belongs to the cache kmalloc-64 of size 64
[   35.115163] The buggy address is located 0 bytes to the right of
[   35.115163]  allocated 48-byte region [fff00000c63df000, fff00000c63df030)
[   35.116447] 
[   35.116809] The buggy address belongs to the physical page:
[   35.117467] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063df
[   35.118447] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   35.119216] page_type: f5(slab)
[   35.119729] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   35.120653] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   35.121453] page dumped because: kasan: bad access detected
[   35.122170] 
[   35.122504] Memory state around the buggy address:
[   35.123215]  fff00000c63def00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   35.124138]  fff00000c63def80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   35.124971] >fff00000c63df000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   35.125811]                                      ^
[   35.126452]  fff00000c63df080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.127202]  fff00000c63df100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.127884] ==================================================================
[   36.551799] ==================================================================
[   36.553472] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x154c/0x4858
[   36.554183] Write of size 8 at addr fff00000c63df030 by task kunit_try_catch/253
[   36.555222] 
[   36.555681] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241128 #1
[   36.556882] Tainted: [B]=BAD_PAGE, [N]=TEST
[   36.557509] Hardware name: linux,dummy-virt (DT)
[   36.558057] Call trace:
[   36.558434]  show_stack+0x20/0x38 (C)
[   36.558934]  dump_stack_lvl+0x8c/0xd0
[   36.559449]  print_report+0x118/0x5e0
[   36.560056]  kasan_report+0xc8/0x118
[   36.560813]  kasan_check_range+0x100/0x1a8
[   36.561526]  __kasan_check_write+0x20/0x30
[   36.562299]  kasan_atomics_helper+0x154c/0x4858
[   36.562996]  kasan_atomics+0x198/0x2e8
[   36.563652]  kunit_try_run_case+0x14c/0x3d0
[   36.564366]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.565163]  kthread+0x24c/0x2d0
[   36.565803]  ret_from_fork+0x10/0x20
[   36.566458] 
[   36.566826] Allocated by task 253:
[   36.567446]  kasan_save_stack+0x3c/0x68
[   36.568021]  kasan_save_track+0x20/0x40
[   36.568680]  kasan_save_alloc_info+0x40/0x58
[   36.569361]  __kasan_kmalloc+0xd4/0xd8
[   36.570012]  __kmalloc_cache_noprof+0x15c/0x3c0
[   36.570701]  kasan_atomics+0xb8/0x2e8
[   36.571313]  kunit_try_run_case+0x14c/0x3d0
[   36.572021]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.572781]  kthread+0x24c/0x2d0
[   36.573359]  ret_from_fork+0x10/0x20
[   36.573955] 
[   36.574381] The buggy address belongs to the object at fff00000c63df000
[   36.574381]  which belongs to the cache kmalloc-64 of size 64
[   36.575625] The buggy address is located 0 bytes to the right of
[   36.575625]  allocated 48-byte region [fff00000c63df000, fff00000c63df030)
[   36.576986] 
[   36.577415] The buggy address belongs to the physical page:
[   36.577985] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063df
[   36.578991] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   36.579844] page_type: f5(slab)
[   36.580413] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   36.581350] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   36.582255] page dumped because: kasan: bad access detected
[   36.582932] 
[   36.583302] Memory state around the buggy address:
[   36.584001]  fff00000c63def00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   36.584806]  fff00000c63def80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   36.585734] >fff00000c63df000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   36.586574]                                      ^
[   36.587216]  fff00000c63df080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.588079]  fff00000c63df100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.588911] ==================================================================
[   34.689589] ==================================================================
[   34.691059] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x2b0/0x4858
[   34.692012] Read of size 4 at addr fff00000c63df030 by task kunit_try_catch/253
[   34.693024] 
[   34.693781] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241128 #1
[   34.695301] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.695981] Hardware name: linux,dummy-virt (DT)
[   34.696823] Call trace:
[   34.697438]  show_stack+0x20/0x38 (C)
[   34.698277]  dump_stack_lvl+0x8c/0xd0
[   34.698784]  print_report+0x118/0x5e0
[   34.699714]  kasan_report+0xc8/0x118
[   34.700342]  kasan_check_range+0x100/0x1a8
[   34.700970]  __kasan_check_read+0x20/0x30
[   34.701690]  kasan_atomics_helper+0x2b0/0x4858
[   34.702317]  kasan_atomics+0x198/0x2e8
[   34.702876]  kunit_try_run_case+0x14c/0x3d0
[   34.703802]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.704462]  kthread+0x24c/0x2d0
[   34.705552]  ret_from_fork+0x10/0x20
[   34.706094] 
[   34.706463] Allocated by task 253:
[   34.707000]  kasan_save_stack+0x3c/0x68
[   34.707514]  kasan_save_track+0x20/0x40
[   34.708109]  kasan_save_alloc_info+0x40/0x58
[   34.708825]  __kasan_kmalloc+0xd4/0xd8
[   34.709828]  __kmalloc_cache_noprof+0x15c/0x3c0
[   34.710364]  kasan_atomics+0xb8/0x2e8
[   34.710939]  kunit_try_run_case+0x14c/0x3d0
[   34.711569]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.712129]  kthread+0x24c/0x2d0
[   34.712667]  ret_from_fork+0x10/0x20
[   34.713672] 
[   34.714038] The buggy address belongs to the object at fff00000c63df000
[   34.714038]  which belongs to the cache kmalloc-64 of size 64
[   34.715054] The buggy address is located 0 bytes to the right of
[   34.715054]  allocated 48-byte region [fff00000c63df000, fff00000c63df030)
[   34.716143] 
[   34.716505] The buggy address belongs to the physical page:
[   34.717549] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063df
[   34.718487] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   34.719091] page_type: f5(slab)
[   34.719651] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   34.720553] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   34.721714] page dumped because: kasan: bad access detected
[   34.722260] 
[   34.722542] Memory state around the buggy address:
[   34.723081]  fff00000c63def00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   34.723878]  fff00000c63def80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   34.724677] >fff00000c63df000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   34.725432]                                      ^
[   34.726553]  fff00000c63df080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.727327]  fff00000c63df100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.728099] ==================================================================
[   36.021829] ==================================================================
[   36.022472] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf20/0x4858
[   36.023321] Write of size 8 at addr fff00000c63df030 by task kunit_try_catch/253
[   36.024074] 
[   36.024420] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241128 #1
[   36.025475] Tainted: [B]=BAD_PAGE, [N]=TEST
[   36.026030] Hardware name: linux,dummy-virt (DT)
[   36.026525] Call trace:
[   36.026949]  show_stack+0x20/0x38 (C)
[   36.027600]  dump_stack_lvl+0x8c/0xd0
[   36.028096]  print_report+0x118/0x5e0
[   36.028727]  kasan_report+0xc8/0x118
[   36.029328]  kasan_check_range+0x100/0x1a8
[   36.029883]  __kasan_check_write+0x20/0x30
[   36.030535]  kasan_atomics_helper+0xf20/0x4858
[   36.031178]  kasan_atomics+0x198/0x2e8
[   36.031773]  kunit_try_run_case+0x14c/0x3d0
[   36.032421]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.033176]  kthread+0x24c/0x2d0
[   36.033747]  ret_from_fork+0x10/0x20
[   36.034269] 
[   36.034618] Allocated by task 253:
[   36.035149]  kasan_save_stack+0x3c/0x68
[   36.035733]  kasan_save_track+0x20/0x40
[   36.036314]  kasan_save_alloc_info+0x40/0x58
[   36.036920]  __kasan_kmalloc+0xd4/0xd8
[   36.037560]  __kmalloc_cache_noprof+0x15c/0x3c0
[   36.038214]  kasan_atomics+0xb8/0x2e8
[   36.038710]  kunit_try_run_case+0x14c/0x3d0
[   36.039271]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.039990]  kthread+0x24c/0x2d0
[   36.040552]  ret_from_fork+0x10/0x20
[   36.041070] 
[   36.041414] The buggy address belongs to the object at fff00000c63df000
[   36.041414]  which belongs to the cache kmalloc-64 of size 64
[   36.042624] The buggy address is located 0 bytes to the right of
[   36.042624]  allocated 48-byte region [fff00000c63df000, fff00000c63df030)
[   36.043749] 
[   36.044105] The buggy address belongs to the physical page:
[   36.044781] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063df
[   36.045594] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   36.046403] page_type: f5(slab)
[   36.046867] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   36.047819] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   36.048602] page dumped because: kasan: bad access detected
[   36.049224] 
[   36.049524] Memory state around the buggy address:
[   36.050172]  fff00000c63def00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   36.050809]  fff00000c63def80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   36.051675] >fff00000c63df000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   36.052429]                                      ^
[   36.053001]  fff00000c63df080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.053714]  fff00000c63df100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.054504] ==================================================================
[   36.125771] ==================================================================
[   36.126475] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1058/0x4858
[   36.127144] Write of size 8 at addr fff00000c63df030 by task kunit_try_catch/253
[   36.127995] 
[   36.128352] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241128 #1
[   36.129514] Tainted: [B]=BAD_PAGE, [N]=TEST
[   36.129946] Hardware name: linux,dummy-virt (DT)
[   36.130592] Call trace:
[   36.131034]  show_stack+0x20/0x38 (C)
[   36.132029]  dump_stack_lvl+0x8c/0xd0
[   36.132619]  print_report+0x118/0x5e0
[   36.133243]  kasan_report+0xc8/0x118
[   36.133847]  kasan_check_range+0x100/0x1a8
[   36.134403]  __kasan_check_write+0x20/0x30
[   36.135045]  kasan_atomics_helper+0x1058/0x4858
[   36.135720]  kasan_atomics+0x198/0x2e8
[   36.136353]  kunit_try_run_case+0x14c/0x3d0
[   36.136992]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.137748]  kthread+0x24c/0x2d0
[   36.138262]  ret_from_fork+0x10/0x20
[   36.138813] 
[   36.139164] Allocated by task 253:
[   36.139685]  kasan_save_stack+0x3c/0x68
[   36.140296]  kasan_save_track+0x20/0x40
[   36.140826]  kasan_save_alloc_info+0x40/0x58
[   36.141357]  __kasan_kmalloc+0xd4/0xd8
[   36.141936]  __kmalloc_cache_noprof+0x15c/0x3c0
[   36.142567]  kasan_atomics+0xb8/0x2e8
[   36.143097]  kunit_try_run_case+0x14c/0x3d0
[   36.143727]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.144453]  kthread+0x24c/0x2d0
[   36.144922]  ret_from_fork+0x10/0x20
[   36.145509] 
[   36.145830] The buggy address belongs to the object at fff00000c63df000
[   36.145830]  which belongs to the cache kmalloc-64 of size 64
[   36.147024] The buggy address is located 0 bytes to the right of
[   36.147024]  allocated 48-byte region [fff00000c63df000, fff00000c63df030)
[   36.148219] 
[   36.148584] The buggy address belongs to the physical page:
[   36.149272] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063df
[   36.150128] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   36.150753] page_type: f5(slab)
[   36.151298] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   36.152137] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   36.153030] page dumped because: kasan: bad access detected
[   36.153631] 
[   36.153974] Memory state around the buggy address:
[   36.154570]  fff00000c63def00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   36.155353]  fff00000c63def80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   36.156066] >fff00000c63df000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   36.156849]                                      ^
[   36.157528]  fff00000c63df080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.158215]  fff00000c63df100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.159003] ==================================================================
[   36.739961] ==================================================================
[   36.740825] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x16d0/0x4858
[   36.741685] Write of size 8 at addr fff00000c63df030 by task kunit_try_catch/253
[   36.742575] 
[   36.742910] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241128 #1
[   36.743942] Tainted: [B]=BAD_PAGE, [N]=TEST
[   36.744543] Hardware name: linux,dummy-virt (DT)
[   36.745032] Call trace:
[   36.745474]  show_stack+0x20/0x38 (C)
[   36.746023]  dump_stack_lvl+0x8c/0xd0
[   36.746669]  print_report+0x118/0x5e0
[   36.747293]  kasan_report+0xc8/0x118
[   36.747885]  kasan_check_range+0x100/0x1a8
[   36.748496]  __kasan_check_write+0x20/0x30
[   36.749152]  kasan_atomics_helper+0x16d0/0x4858
[   36.749845]  kasan_atomics+0x198/0x2e8
[   36.750460]  kunit_try_run_case+0x14c/0x3d0
[   36.751125]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.751741]  kthread+0x24c/0x2d0
[   36.752327]  ret_from_fork+0x10/0x20
[   36.752852] 
[   36.753220] Allocated by task 253:
[   36.753714]  kasan_save_stack+0x3c/0x68
[   36.754321]  kasan_save_track+0x20/0x40
[   36.754897]  kasan_save_alloc_info+0x40/0x58
[   36.755490]  __kasan_kmalloc+0xd4/0xd8
[   36.755950]  __kmalloc_cache_noprof+0x15c/0x3c0
[   36.756621]  kasan_atomics+0xb8/0x2e8
[   36.757162]  kunit_try_run_case+0x14c/0x3d0
[   36.757794]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.758422]  kthread+0x24c/0x2d0
[   36.758966]  ret_from_fork+0x10/0x20
[   36.759539] 
[   36.759884] The buggy address belongs to the object at fff00000c63df000
[   36.759884]  which belongs to the cache kmalloc-64 of size 64
[   36.760947] The buggy address is located 0 bytes to the right of
[   36.760947]  allocated 48-byte region [fff00000c63df000, fff00000c63df030)
[   36.762187] 
[   36.762543] The buggy address belongs to the physical page:
[   36.763238] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063df
[   36.764098] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   36.764792] page_type: f5(slab)
[   36.765334] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   36.766169] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   36.766891] page dumped because: kasan: bad access detected
[   36.767579] 
[   36.767930] Memory state around the buggy address:
[   36.768563]  fff00000c63def00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   36.769335]  fff00000c63def80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   36.770081] >fff00000c63df000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   36.770822]                                      ^
[   36.771431]  fff00000c63df080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.772163]  fff00000c63df100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.772966] ==================================================================
[   35.916464] ==================================================================
[   35.917252] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xe44/0x4858
[   35.918167] Write of size 8 at addr fff00000c63df030 by task kunit_try_catch/253
[   35.919050] 
[   35.919458] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241128 #1
[   35.920466] Tainted: [B]=BAD_PAGE, [N]=TEST
[   35.921028] Hardware name: linux,dummy-virt (DT)
[   35.921660] Call trace:
[   35.922073]  show_stack+0x20/0x38 (C)
[   35.922691]  dump_stack_lvl+0x8c/0xd0
[   35.923328]  print_report+0x118/0x5e0
[   35.923916]  kasan_report+0xc8/0x118
[   35.924416]  kasan_check_range+0x100/0x1a8
[   35.925057]  __kasan_check_write+0x20/0x30
[   35.925658]  kasan_atomics_helper+0xe44/0x4858
[   35.926238]  kasan_atomics+0x198/0x2e8
[   35.926854]  kunit_try_run_case+0x14c/0x3d0
[   35.927551]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.928326]  kthread+0x24c/0x2d0
[   35.928802]  ret_from_fork+0x10/0x20
[   35.929414] 
[   35.929761] Allocated by task 253:
[   35.930303]  kasan_save_stack+0x3c/0x68
[   35.930832]  kasan_save_track+0x20/0x40
[   35.931348]  kasan_save_alloc_info+0x40/0x58
[   35.931979]  __kasan_kmalloc+0xd4/0xd8
[   35.932577]  __kmalloc_cache_noprof+0x15c/0x3c0
[   35.933223]  kasan_atomics+0xb8/0x2e8
[   35.933710]  kunit_try_run_case+0x14c/0x3d0
[   35.934352]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.934948]  kthread+0x24c/0x2d0
[   35.935505]  ret_from_fork+0x10/0x20
[   35.936014] 
[   35.936384] The buggy address belongs to the object at fff00000c63df000
[   35.936384]  which belongs to the cache kmalloc-64 of size 64
[   35.937524] The buggy address is located 0 bytes to the right of
[   35.937524]  allocated 48-byte region [fff00000c63df000, fff00000c63df030)
[   35.938696] 
[   35.939048] The buggy address belongs to the physical page:
[   35.939625] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063df
[   35.940520] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   35.941241] page_type: f5(slab)
[   35.941758] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   35.942668] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   35.943445] page dumped because: kasan: bad access detected
[   35.944045] 
[   35.944428] Memory state around the buggy address:
[   35.945032]  fff00000c63def00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   35.945828]  fff00000c63def80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   35.946545] >fff00000c63df000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   35.947321]                                      ^
[   35.948001]  fff00000c63df080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.948717]  fff00000c63df100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.949504] ==================================================================
[   36.406320] ==================================================================
[   36.406988] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f04/0x4858
[   36.407912] Read of size 8 at addr fff00000c63df030 by task kunit_try_catch/253
[   36.408754] 
[   36.409224] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241128 #1
[   36.410260] Tainted: [B]=BAD_PAGE, [N]=TEST
[   36.410877] Hardware name: linux,dummy-virt (DT)
[   36.411437] Call trace:
[   36.411904]  show_stack+0x20/0x38 (C)
[   36.412562]  dump_stack_lvl+0x8c/0xd0
[   36.413180]  print_report+0x118/0x5e0
[   36.413821]  kasan_report+0xc8/0x118
[   36.414449]  __asan_report_load8_noabort+0x20/0x30
[   36.415082]  kasan_atomics_helper+0x3f04/0x4858
[   36.415810]  kasan_atomics+0x198/0x2e8
[   36.416474]  kunit_try_run_case+0x14c/0x3d0
[   36.417009]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.417944]  kthread+0x24c/0x2d0
[   36.418480]  ret_from_fork+0x10/0x20
[   36.418972] 
[   36.419280] Allocated by task 253:
[   36.419733]  kasan_save_stack+0x3c/0x68
[   36.420408]  kasan_save_track+0x20/0x40
[   36.421359]  kasan_save_alloc_info+0x40/0x58
[   36.421961]  __kasan_kmalloc+0xd4/0xd8
[   36.422576]  __kmalloc_cache_noprof+0x15c/0x3c0
[   36.423241]  kasan_atomics+0xb8/0x2e8
[   36.423846]  kunit_try_run_case+0x14c/0x3d0
[   36.424462]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.425499]  kthread+0x24c/0x2d0
[   36.425849]  ret_from_fork+0x10/0x20
[   36.426499] 
[   36.426856] The buggy address belongs to the object at fff00000c63df000
[   36.426856]  which belongs to the cache kmalloc-64 of size 64
[   36.428129] The buggy address is located 0 bytes to the right of
[   36.428129]  allocated 48-byte region [fff00000c63df000, fff00000c63df030)
[   36.429388] 
[   36.429787] The buggy address belongs to the physical page:
[   36.430539] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063df
[   36.431462] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   36.432441] page_type: f5(slab)
[   36.433093] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   36.433890] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   36.434648] page dumped because: kasan: bad access detected
[   36.435278] 
[   36.435612] Memory state around the buggy address:
[   36.436312]  fff00000c63def00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   36.437001]  fff00000c63def80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   36.437930] >fff00000c63df000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   36.438621]                                      ^
[   36.439326]  fff00000c63df080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.440041]  fff00000c63df100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.440898] ==================================================================
[   36.196302] ==================================================================
[   36.197132] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1128/0x4858
[   36.198002] Write of size 8 at addr fff00000c63df030 by task kunit_try_catch/253
[   36.198711] 
[   36.199093] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241128 #1
[   36.200146] Tainted: [B]=BAD_PAGE, [N]=TEST
[   36.200686] Hardware name: linux,dummy-virt (DT)
[   36.201205] Call trace:
[   36.201635]  show_stack+0x20/0x38 (C)
[   36.202255]  dump_stack_lvl+0x8c/0xd0
[   36.202818]  print_report+0x118/0x5e0
[   36.203384]  kasan_report+0xc8/0x118
[   36.203892]  kasan_check_range+0x100/0x1a8
[   36.204569]  __kasan_check_write+0x20/0x30
[   36.205230]  kasan_atomics_helper+0x1128/0x4858
[   36.205907]  kasan_atomics+0x198/0x2e8
[   36.206474]  kunit_try_run_case+0x14c/0x3d0
[   36.207049]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.207745]  kthread+0x24c/0x2d0
[   36.208321]  ret_from_fork+0x10/0x20
[   36.208888] 
[   36.209254] Allocated by task 253:
[   36.209761]  kasan_save_stack+0x3c/0x68
[   36.210307]  kasan_save_track+0x20/0x40
[   36.210890]  kasan_save_alloc_info+0x40/0x58
[   36.211510]  __kasan_kmalloc+0xd4/0xd8
[   36.212086]  __kmalloc_cache_noprof+0x15c/0x3c0
[   36.212688]  kasan_atomics+0xb8/0x2e8
[   36.213225]  kunit_try_run_case+0x14c/0x3d0
[   36.213851]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.214453]  kthread+0x24c/0x2d0
[   36.214998]  ret_from_fork+0x10/0x20
[   36.215499] 
[   36.215851] The buggy address belongs to the object at fff00000c63df000
[   36.215851]  which belongs to the cache kmalloc-64 of size 64
[   36.216913] The buggy address is located 0 bytes to the right of
[   36.216913]  allocated 48-byte region [fff00000c63df000, fff00000c63df030)
[   36.218270] 
[   36.218630] The buggy address belongs to the physical page:
[   36.219183] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063df
[   36.220127] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   36.220873] page_type: f5(slab)
[   36.221330] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   36.222225] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   36.223083] page dumped because: kasan: bad access detected
[   36.223607] 
[   36.223948] Memory state around the buggy address:
[   36.224677]  fff00000c63def00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   36.225489]  fff00000c63def80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   36.226351] >fff00000c63df000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   36.227161]                                      ^
[   36.227748]  fff00000c63df080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.228516]  fff00000c63df100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.229194] ==================================================================
[   35.166342] ==================================================================
[   35.167191] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x6ec/0x4858
[   35.167887] Write of size 4 at addr fff00000c63df030 by task kunit_try_catch/253
[   35.168797] 
[   35.169228] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241128 #1
[   35.170128] Tainted: [B]=BAD_PAGE, [N]=TEST
[   35.170709] Hardware name: linux,dummy-virt (DT)
[   35.171345] Call trace:
[   35.171780]  show_stack+0x20/0x38 (C)
[   35.172343]  dump_stack_lvl+0x8c/0xd0
[   35.172963]  print_report+0x118/0x5e0
[   35.173484]  kasan_report+0xc8/0x118
[   35.174074]  kasan_check_range+0x100/0x1a8
[   35.174697]  __kasan_check_write+0x20/0x30
[   35.175272]  kasan_atomics_helper+0x6ec/0x4858
[   35.175932]  kasan_atomics+0x198/0x2e8
[   35.176552]  kunit_try_run_case+0x14c/0x3d0
[   35.177174]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.177830]  kthread+0x24c/0x2d0
[   35.178403]  ret_from_fork+0x10/0x20
[   35.179012] 
[   35.179326] Allocated by task 253:
[   35.179833]  kasan_save_stack+0x3c/0x68
[   35.180449]  kasan_save_track+0x20/0x40
[   35.181033]  kasan_save_alloc_info+0x40/0x58
[   35.181689]  __kasan_kmalloc+0xd4/0xd8
[   35.182212]  __kmalloc_cache_noprof+0x15c/0x3c0
[   35.182859]  kasan_atomics+0xb8/0x2e8
[   35.183441]  kunit_try_run_case+0x14c/0x3d0
[   35.184007]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.184632]  kthread+0x24c/0x2d0
[   35.185202]  ret_from_fork+0x10/0x20
[   35.185678] 
[   35.186033] The buggy address belongs to the object at fff00000c63df000
[   35.186033]  which belongs to the cache kmalloc-64 of size 64
[   35.187146] The buggy address is located 0 bytes to the right of
[   35.187146]  allocated 48-byte region [fff00000c63df000, fff00000c63df030)
[   35.188356] 
[   35.188704] The buggy address belongs to the physical page:
[   35.189401] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063df
[   35.190201] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   35.190963] page_type: f5(slab)
[   35.191503] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   35.192297] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   35.193194] page dumped because: kasan: bad access detected
[   35.193805] 
[   35.194175] Memory state around the buggy address:
[   35.194733]  fff00000c63def00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   35.195461]  fff00000c63def80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   35.196299] >fff00000c63df000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   35.196995]                                      ^
[   35.197681]  fff00000c63df080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.198466]  fff00000c63df100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.199156] ==================================================================
[   35.318392] ==================================================================
[   35.319289] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x42d8/0x4858
[   35.319654] Read of size 4 at addr fff00000c63df030 by task kunit_try_catch/253
[   35.319990] 
[   35.320201] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241128 #1
[   35.321585] Tainted: [B]=BAD_PAGE, [N]=TEST
[   35.322083] Hardware name: linux,dummy-virt (DT)
[   35.322819] Call trace:
[   35.323319]  show_stack+0x20/0x38 (C)
[   35.324036]  dump_stack_lvl+0x8c/0xd0
[   35.324779]  print_report+0x118/0x5e0
[   35.325716]  kasan_report+0xc8/0x118
[   35.326255]  __asan_report_load4_noabort+0x20/0x30
[   35.326985]  kasan_atomics_helper+0x42d8/0x4858
[   35.327684]  kasan_atomics+0x198/0x2e8
[   35.328298]  kunit_try_run_case+0x14c/0x3d0
[   35.328931]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.329625]  kthread+0x24c/0x2d0
[   35.330107]  ret_from_fork+0x10/0x20
[   35.330680] 
[   35.331028] Allocated by task 253:
[   35.331541]  kasan_save_stack+0x3c/0x68
[   35.332028]  kasan_save_track+0x20/0x40
[   35.332634]  kasan_save_alloc_info+0x40/0x58
[   35.333155]  __kasan_kmalloc+0xd4/0xd8
[   35.333740]  __kmalloc_cache_noprof+0x15c/0x3c0
[   35.334345]  kasan_atomics+0xb8/0x2e8
[   35.334861]  kunit_try_run_case+0x14c/0x3d0
[   35.335432]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.336173]  kthread+0x24c/0x2d0
[   35.336634]  ret_from_fork+0x10/0x20
[   35.337220] 
[   35.337529] The buggy address belongs to the object at fff00000c63df000
[   35.337529]  which belongs to the cache kmalloc-64 of size 64
[   35.338730] The buggy address is located 0 bytes to the right of
[   35.338730]  allocated 48-byte region [fff00000c63df000, fff00000c63df030)
[   35.339985] 
[   35.340354] The buggy address belongs to the physical page:
[   35.340954] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063df
[   35.341767] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   35.342554] page_type: f5(slab)
[   35.343051] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   35.343921] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   35.344722] page dumped because: kasan: bad access detected
[   35.345355] 
[   35.345662] Memory state around the buggy address:
[   35.346190]  fff00000c63def00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   35.347011]  fff00000c63def80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   35.347822] >fff00000c63df000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   35.348604]                                      ^
[   35.349260]  fff00000c63df080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.349981]  fff00000c63df100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.350732] ==================================================================
[   34.848735] ==================================================================
[   34.849627] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3ac/0x4858
[   34.851035] Write of size 4 at addr fff00000c63df030 by task kunit_try_catch/253
[   34.852352] 
[   34.852818] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241128 #1
[   34.853782] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.854431] Hardware name: linux,dummy-virt (DT)
[   34.854908] Call trace:
[   34.855334]  show_stack+0x20/0x38 (C)
[   34.855940]  dump_stack_lvl+0x8c/0xd0
[   34.857384]  print_report+0x118/0x5e0
[   34.857906]  kasan_report+0xc8/0x118
[   34.858866]  kasan_check_range+0x100/0x1a8
[   34.859604]  __kasan_check_write+0x20/0x30
[   34.860218]  kasan_atomics_helper+0x3ac/0x4858
[   34.860832]  kasan_atomics+0x198/0x2e8
[   34.861605]  kunit_try_run_case+0x14c/0x3d0
[   34.862218]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.862973]  kthread+0x24c/0x2d0
[   34.863757]  ret_from_fork+0x10/0x20
[   34.864259] 
[   34.864607] Allocated by task 253:
[   34.866088]  kasan_save_stack+0x3c/0x68
[   34.866703]  kasan_save_track+0x20/0x40
[   34.867251]  kasan_save_alloc_info+0x40/0x58
[   34.867841]  __kasan_kmalloc+0xd4/0xd8
[   34.868437]  __kmalloc_cache_noprof+0x15c/0x3c0
[   34.869422]  kasan_atomics+0xb8/0x2e8
[   34.869909]  kunit_try_run_case+0x14c/0x3d0
[   34.870497]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.871154]  kthread+0x24c/0x2d0
[   34.871688]  ret_from_fork+0x10/0x20
[   34.872217] 
[   34.872576] The buggy address belongs to the object at fff00000c63df000
[   34.872576]  which belongs to the cache kmalloc-64 of size 64
[   34.874561] The buggy address is located 0 bytes to the right of
[   34.874561]  allocated 48-byte region [fff00000c63df000, fff00000c63df030)
[   34.875808] 
[   34.876177] The buggy address belongs to the physical page:
[   34.876707] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063df
[   34.878053] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   34.878802] page_type: f5(slab)
[   34.879302] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   34.880099] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   34.880929] page dumped because: kasan: bad access detected
[   34.881585] 
[   34.881927] Memory state around the buggy address:
[   34.882564]  fff00000c63def00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   34.883851]  fff00000c63def80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   34.884769] >fff00000c63df000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   34.885511]                                      ^
[   34.886168]  fff00000c63df080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.886888]  fff00000c63df100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.888051] ==================================================================
[   35.352426] ==================================================================
[   35.354021] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x934/0x4858
[   35.354869] Write of size 4 at addr fff00000c63df030 by task kunit_try_catch/253
[   35.355594] 
[   35.355850] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241128 #1
[   35.357707] Tainted: [B]=BAD_PAGE, [N]=TEST
[   35.358320] Hardware name: linux,dummy-virt (DT)
[   35.358936] Call trace:
[   35.359474]  show_stack+0x20/0x38 (C)
[   35.360016]  dump_stack_lvl+0x8c/0xd0
[   35.360606]  print_report+0x118/0x5e0
[   35.361253]  kasan_report+0xc8/0x118
[   35.361828]  kasan_check_range+0x100/0x1a8
[   35.362559]  __kasan_check_write+0x20/0x30
[   35.363092]  kasan_atomics_helper+0x934/0x4858
[   35.363772]  kasan_atomics+0x198/0x2e8
[   35.364291]  kunit_try_run_case+0x14c/0x3d0
[   35.364937]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.365611]  kthread+0x24c/0x2d0
[   35.366200]  ret_from_fork+0x10/0x20
[   35.366724] 
[   35.367079] Allocated by task 253:
[   35.367654]  kasan_save_stack+0x3c/0x68
[   35.368150]  kasan_save_track+0x20/0x40
[   35.368733]  kasan_save_alloc_info+0x40/0x58
[   35.369292]  __kasan_kmalloc+0xd4/0xd8
[   35.369874]  __kmalloc_cache_noprof+0x15c/0x3c0
[   35.370441]  kasan_atomics+0xb8/0x2e8
[   35.370984]  kunit_try_run_case+0x14c/0x3d0
[   35.371537]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.372282]  kthread+0x24c/0x2d0
[   35.372820]  ret_from_fork+0x10/0x20
[   35.373404] 
[   35.373754] The buggy address belongs to the object at fff00000c63df000
[   35.373754]  which belongs to the cache kmalloc-64 of size 64
[   35.374901] The buggy address is located 0 bytes to the right of
[   35.374901]  allocated 48-byte region [fff00000c63df000, fff00000c63df030)
[   35.376070] 
[   35.376446] The buggy address belongs to the physical page:
[   35.377065] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063df
[   35.378004] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   35.378704] page_type: f5(slab)
[   35.379262] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   35.380077] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   35.380884] page dumped because: kasan: bad access detected
[   35.381483] 
[   35.381837] Memory state around the buggy address:
[   35.382422]  fff00000c63def00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   35.383292]  fff00000c63def80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   35.384081] >fff00000c63df000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   35.384898]                                      ^
[   35.385559]  fff00000c63df080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.386280]  fff00000c63df100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.387092] ==================================================================
[   35.707180] ==================================================================
[   35.708170] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xca0/0x4858
[   35.709023] Write of size 4 at addr fff00000c63df030 by task kunit_try_catch/253
[   35.709766] 
[   35.710156] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241128 #1
[   35.711133] Tainted: [B]=BAD_PAGE, [N]=TEST
[   35.711718] Hardware name: linux,dummy-virt (DT)
[   35.712335] Call trace:
[   35.712726]  show_stack+0x20/0x38 (C)
[   35.713353]  dump_stack_lvl+0x8c/0xd0
[   35.713967]  print_report+0x118/0x5e0
[   35.714580]  kasan_report+0xc8/0x118
[   35.715165]  kasan_check_range+0x100/0x1a8
[   35.715807]  __kasan_check_write+0x20/0x30
[   35.716367]  kasan_atomics_helper+0xca0/0x4858
[   35.717027]  kasan_atomics+0x198/0x2e8
[   35.717620]  kunit_try_run_case+0x14c/0x3d0
[   35.718285]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.719044]  kthread+0x24c/0x2d0
[   35.719580]  ret_from_fork+0x10/0x20
[   35.720150] 
[   35.720495] Allocated by task 253:
[   35.721022]  kasan_save_stack+0x3c/0x68
[   35.721621]  kasan_save_track+0x20/0x40
[   35.722167]  kasan_save_alloc_info+0x40/0x58
[   35.722729]  __kasan_kmalloc+0xd4/0xd8
[   35.723324]  __kmalloc_cache_noprof+0x15c/0x3c0
[   35.723968]  kasan_atomics+0xb8/0x2e8
[   35.724489]  kunit_try_run_case+0x14c/0x3d0
[   35.725072]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.725704]  kthread+0x24c/0x2d0
[   35.726320]  ret_from_fork+0x10/0x20
[   35.726861] 
[   35.727208] The buggy address belongs to the object at fff00000c63df000
[   35.727208]  which belongs to the cache kmalloc-64 of size 64
[   35.728492] The buggy address is located 0 bytes to the right of
[   35.728492]  allocated 48-byte region [fff00000c63df000, fff00000c63df030)
[   35.729606] 
[   35.729957] The buggy address belongs to the physical page:
[   35.730656] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063df
[   35.731612] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   35.732271] page_type: f5(slab)
[   35.732801] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   35.733629] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   35.734478] page dumped because: kasan: bad access detected
[   35.735042] 
[   35.735406] Memory state around the buggy address:
[   35.736039]  fff00000c63def00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   35.736787]  fff00000c63def80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   35.737531] >fff00000c63df000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   35.738325]                                      ^
[   35.738954]  fff00000c63df080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.739678]  fff00000c63df100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.740466] ==================================================================
[   35.130595] ==================================================================
[   35.131803] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x684/0x4858
[   35.132554] Write of size 4 at addr fff00000c63df030 by task kunit_try_catch/253
[   35.133890] 
[   35.134409] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241128 #1
[   35.135154] Tainted: [B]=BAD_PAGE, [N]=TEST
[   35.135597] Hardware name: linux,dummy-virt (DT)
[   35.136226] Call trace:
[   35.136639]  show_stack+0x20/0x38 (C)
[   35.137141]  dump_stack_lvl+0x8c/0xd0
[   35.137784]  print_report+0x118/0x5e0
[   35.138367]  kasan_report+0xc8/0x118
[   35.138963]  kasan_check_range+0x100/0x1a8
[   35.139562]  __kasan_check_write+0x20/0x30
[   35.140095]  kasan_atomics_helper+0x684/0x4858
[   35.140776]  kasan_atomics+0x198/0x2e8
[   35.141372]  kunit_try_run_case+0x14c/0x3d0
[   35.141890]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.142662]  kthread+0x24c/0x2d0
[   35.143245]  ret_from_fork+0x10/0x20
[   35.143780] 
[   35.144100] Allocated by task 253:
[   35.144599]  kasan_save_stack+0x3c/0x68
[   35.145130]  kasan_save_track+0x20/0x40
[   35.145715]  kasan_save_alloc_info+0x40/0x58
[   35.146241]  __kasan_kmalloc+0xd4/0xd8
[   35.146820]  __kmalloc_cache_noprof+0x15c/0x3c0
[   35.147426]  kasan_atomics+0xb8/0x2e8
[   35.147951]  kunit_try_run_case+0x14c/0x3d0
[   35.148598]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.149177]  kthread+0x24c/0x2d0
[   35.149709]  ret_from_fork+0x10/0x20
[   35.150275] 
[   35.150620] The buggy address belongs to the object at fff00000c63df000
[   35.150620]  which belongs to the cache kmalloc-64 of size 64
[   35.151738] The buggy address is located 0 bytes to the right of
[   35.151738]  allocated 48-byte region [fff00000c63df000, fff00000c63df030)
[   35.152874] 
[   35.153240] The buggy address belongs to the physical page:
[   35.153915] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063df
[   35.154741] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   35.155602] page_type: f5(slab)
[   35.156184] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   35.157047] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   35.157991] page dumped because: kasan: bad access detected
[   35.158611] 
[   35.158987] Memory state around the buggy address:
[   35.159676]  fff00000c63def00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   35.160430]  fff00000c63def80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   35.161331] >fff00000c63df000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   35.162054]                                      ^
[   35.162752]  fff00000c63df080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.163525]  fff00000c63df100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.164356] ==================================================================
[   35.672910] ==================================================================
[   35.674006] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3de4/0x4858
[   35.674918] Read of size 4 at addr fff00000c63df030 by task kunit_try_catch/253
[   35.675657] 
[   35.676034] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241128 #1
[   35.677059] Tainted: [B]=BAD_PAGE, [N]=TEST
[   35.677626] Hardware name: linux,dummy-virt (DT)
[   35.678159] Call trace:
[   35.678574]  show_stack+0x20/0x38 (C)
[   35.679190]  dump_stack_lvl+0x8c/0xd0
[   35.679788]  print_report+0x118/0x5e0
[   35.680325]  kasan_report+0xc8/0x118
[   35.680908]  __asan_report_load4_noabort+0x20/0x30
[   35.681574]  kasan_atomics_helper+0x3de4/0x4858
[   35.682256]  kasan_atomics+0x198/0x2e8
[   35.682786]  kunit_try_run_case+0x14c/0x3d0
[   35.683448]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.684127]  kthread+0x24c/0x2d0
[   35.684687]  ret_from_fork+0x10/0x20
[   35.685271] 
[   35.685572] Allocated by task 253:
[   35.686091]  kasan_save_stack+0x3c/0x68
[   35.686622]  kasan_save_track+0x20/0x40
[   35.687224]  kasan_save_alloc_info+0x40/0x58
[   35.687755]  __kasan_kmalloc+0xd4/0xd8
[   35.688362]  __kmalloc_cache_noprof+0x15c/0x3c0
[   35.688957]  kasan_atomics+0xb8/0x2e8
[   35.689463]  kunit_try_run_case+0x14c/0x3d0
[   35.690081]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.690776]  kthread+0x24c/0x2d0
[   35.691278]  ret_from_fork+0x10/0x20
[   35.691859] 
[   35.692229] The buggy address belongs to the object at fff00000c63df000
[   35.692229]  which belongs to the cache kmalloc-64 of size 64
[   35.693371] The buggy address is located 0 bytes to the right of
[   35.693371]  allocated 48-byte region [fff00000c63df000, fff00000c63df030)
[   35.694565] 
[   35.694911] The buggy address belongs to the physical page:
[   35.695618] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063df
[   35.696460] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   35.697331] page_type: f5(slab)
[   35.697928] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   35.698816] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   35.699667] page dumped because: kasan: bad access detected
[   35.700343] 
[   35.700649] Memory state around the buggy address:
[   35.701162]  fff00000c63def00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   35.702005]  fff00000c63def80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   35.702769] >fff00000c63df000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   35.703473]                                      ^
[   35.704141]  fff00000c63df080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.704892]  fff00000c63df100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.705642] ==================================================================
[   35.238084] ==================================================================
[   35.238810] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x7cc/0x4858
[   35.239552] Write of size 4 at addr fff00000c63df030 by task kunit_try_catch/253
[   35.240106] 
[   35.240989] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241128 #1
[   35.242283] Tainted: [B]=BAD_PAGE, [N]=TEST
[   35.242994] Hardware name: linux,dummy-virt (DT)
[   35.243710] Call trace:
[   35.244070]  show_stack+0x20/0x38 (C)
[   35.244594]  dump_stack_lvl+0x8c/0xd0
[   35.245093]  print_report+0x118/0x5e0
[   35.246014]  kasan_report+0xc8/0x118
[   35.246768]  kasan_check_range+0x100/0x1a8
[   35.247517]  __kasan_check_write+0x20/0x30
[   35.248299]  kasan_atomics_helper+0x7cc/0x4858
[   35.249067]  kasan_atomics+0x198/0x2e8
[   35.249799]  kunit_try_run_case+0x14c/0x3d0
[   35.250570]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.251404]  kthread+0x24c/0x2d0
[   35.251883]  ret_from_fork+0x10/0x20
[   35.252713] 
[   35.253207] Allocated by task 253:
[   35.253810]  kasan_save_stack+0x3c/0x68
[   35.254539]  kasan_save_track+0x20/0x40
[   35.255247]  kasan_save_alloc_info+0x40/0x58
[   35.255991]  __kasan_kmalloc+0xd4/0xd8
[   35.256700]  __kmalloc_cache_noprof+0x15c/0x3c0
[   35.257271]  kasan_atomics+0xb8/0x2e8
[   35.257713]  kunit_try_run_case+0x14c/0x3d0
[   35.258246]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.258868]  kthread+0x24c/0x2d0
[   35.259854]  ret_from_fork+0x10/0x20
[   35.260603] 
[   35.261100] The buggy address belongs to the object at fff00000c63df000
[   35.261100]  which belongs to the cache kmalloc-64 of size 64
[   35.262579] The buggy address is located 0 bytes to the right of
[   35.262579]  allocated 48-byte region [fff00000c63df000, fff00000c63df030)
[   35.264096] 
[   35.264646] The buggy address belongs to the physical page:
[   35.265402] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063df
[   35.266411] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   35.267262] page_type: f5(slab)
[   35.267774] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   35.268855] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   35.269822] page dumped because: kasan: bad access detected
[   35.270624] 
[   35.270942] Memory state around the buggy address:
[   35.271779]  fff00000c63def00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   35.272723]  fff00000c63def80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   35.273543] >fff00000c63df000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   35.274461]                                      ^
[   35.275015]  fff00000c63df080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.276034]  fff00000c63df100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.276959] ==================================================================
[   36.056159] ==================================================================
[   36.056907] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf88/0x4858
[   36.057851] Write of size 8 at addr fff00000c63df030 by task kunit_try_catch/253
[   36.058571] 
[   36.058936] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241128 #1
[   36.060063] Tainted: [B]=BAD_PAGE, [N]=TEST
[   36.060678] Hardware name: linux,dummy-virt (DT)
[   36.061356] Call trace:
[   36.061784]  show_stack+0x20/0x38 (C)
[   36.062408]  dump_stack_lvl+0x8c/0xd0
[   36.063005]  print_report+0x118/0x5e0
[   36.063602]  kasan_report+0xc8/0x118
[   36.064211]  kasan_check_range+0x100/0x1a8
[   36.064853]  __kasan_check_write+0x20/0x30
[   36.065508]  kasan_atomics_helper+0xf88/0x4858
[   36.066090]  kasan_atomics+0x198/0x2e8
[   36.066737]  kunit_try_run_case+0x14c/0x3d0
[   36.067315]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.068033]  kthread+0x24c/0x2d0
[   36.068634]  ret_from_fork+0x10/0x20
[   36.069240] 
[   36.069583] Allocated by task 253:
[   36.070087]  kasan_save_stack+0x3c/0x68
[   36.070708]  kasan_save_track+0x20/0x40
[   36.071269]  kasan_save_alloc_info+0x40/0x58
[   36.071896]  __kasan_kmalloc+0xd4/0xd8
[   36.072497]  __kmalloc_cache_noprof+0x15c/0x3c0
[   36.073087]  kasan_atomics+0xb8/0x2e8
[   36.073675]  kunit_try_run_case+0x14c/0x3d0
[   36.074274]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.075009]  kthread+0x24c/0x2d0
[   36.075562]  ret_from_fork+0x10/0x20
[   36.076130] 
[   36.076467] The buggy address belongs to the object at fff00000c63df000
[   36.076467]  which belongs to the cache kmalloc-64 of size 64
[   36.077579] The buggy address is located 0 bytes to the right of
[   36.077579]  allocated 48-byte region [fff00000c63df000, fff00000c63df030)
[   36.078737] 
[   36.079091] The buggy address belongs to the physical page:
[   36.079654] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063df
[   36.080550] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   36.081376] page_type: f5(slab)
[   36.081915] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   36.082730] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   36.083586] page dumped because: kasan: bad access detected
[   36.084318] 
[   36.084667] Memory state around the buggy address:
[   36.085166]  fff00000c63def00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   36.086031]  fff00000c63def80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   36.086796] >fff00000c63df000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   36.087600]                                      ^
[   36.088143]  fff00000c63df080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.088965]  fff00000c63df100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.089796] ==================================================================
[   36.265156] ==================================================================
[   36.265897] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x11f8/0x4858
[   36.266758] Write of size 8 at addr fff00000c63df030 by task kunit_try_catch/253
[   36.267678] 
[   36.268070] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241128 #1
[   36.269064] Tainted: [B]=BAD_PAGE, [N]=TEST
[   36.269632] Hardware name: linux,dummy-virt (DT)
[   36.270213] Call trace:
[   36.270568]  show_stack+0x20/0x38 (C)
[   36.271207]  dump_stack_lvl+0x8c/0xd0
[   36.271816]  print_report+0x118/0x5e0
[   36.272374]  kasan_report+0xc8/0x118
[   36.272994]  kasan_check_range+0x100/0x1a8
[   36.273562]  __kasan_check_write+0x20/0x30
[   36.274252]  kasan_atomics_helper+0x11f8/0x4858
[   36.274981]  kasan_atomics+0x198/0x2e8
[   36.275606]  kunit_try_run_case+0x14c/0x3d0
[   36.276171]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.276987]  kthread+0x24c/0x2d0
[   36.277631]  ret_from_fork+0x10/0x20
[   36.278295] 
[   36.278631] Allocated by task 253:
[   36.279091]  kasan_save_stack+0x3c/0x68
[   36.279697]  kasan_save_track+0x20/0x40
[   36.280212]  kasan_save_alloc_info+0x40/0x58
[   36.280839]  __kasan_kmalloc+0xd4/0xd8
[   36.281445]  __kmalloc_cache_noprof+0x15c/0x3c0
[   36.282023]  kasan_atomics+0xb8/0x2e8
[   36.282580]  kunit_try_run_case+0x14c/0x3d0
[   36.283147]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.283764]  kthread+0x24c/0x2d0
[   36.284331]  ret_from_fork+0x10/0x20
[   36.284913] 
[   36.285277] The buggy address belongs to the object at fff00000c63df000
[   36.285277]  which belongs to the cache kmalloc-64 of size 64
[   36.286351] The buggy address is located 0 bytes to the right of
[   36.286351]  allocated 48-byte region [fff00000c63df000, fff00000c63df030)
[   36.287726] 
[   36.288026] The buggy address belongs to the physical page:
[   36.288740] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063df
[   36.289549] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   36.290368] page_type: f5(slab)
[   36.290910] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   36.291796] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   36.292443] page dumped because: kasan: bad access detected
[   36.293154] 
[   36.293495] Memory state around the buggy address:
[   36.294164]  fff00000c63def00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   36.294831]  fff00000c63def80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   36.295715] >fff00000c63df000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   36.296561]                                      ^
[   36.297215]  fff00000c63df080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.298011]  fff00000c63df100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.298856] ==================================================================
[   34.729502] ==================================================================
[   34.730876] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x40fc/0x4858
[   34.731598] Read of size 4 at addr fff00000c63df030 by task kunit_try_catch/253
[   34.732469] 
[   34.732870] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241128 #1
[   34.734436] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.734996] Hardware name: linux,dummy-virt (DT)
[   34.735661] Call trace:
[   34.736109]  show_stack+0x20/0x38 (C)
[   34.736702]  dump_stack_lvl+0x8c/0xd0
[   34.737664]  print_report+0x118/0x5e0
[   34.738153]  kasan_report+0xc8/0x118
[   34.738764]  __asan_report_load4_noabort+0x20/0x30
[   34.739893]  kasan_atomics_helper+0x40fc/0x4858
[   34.740375]  kasan_atomics+0x198/0x2e8
[   34.741474]  kunit_try_run_case+0x14c/0x3d0
[   34.742062]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.742870]  kthread+0x24c/0x2d0
[   34.743486]  ret_from_fork+0x10/0x20
[   34.744135] 
[   34.744472] Allocated by task 253:
[   34.745488]  kasan_save_stack+0x3c/0x68
[   34.745983]  kasan_save_track+0x20/0x40
[   34.746508]  kasan_save_alloc_info+0x40/0x58
[   34.747047]  __kasan_kmalloc+0xd4/0xd8
[   34.748091]  __kmalloc_cache_noprof+0x15c/0x3c0
[   34.748732]  kasan_atomics+0xb8/0x2e8
[   34.749790]  kunit_try_run_case+0x14c/0x3d0
[   34.750380]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.751166]  kthread+0x24c/0x2d0
[   34.751787]  ret_from_fork+0x10/0x20
[   34.752391] 
[   34.752882] The buggy address belongs to the object at fff00000c63df000
[   34.752882]  which belongs to the cache kmalloc-64 of size 64
[   34.754061] The buggy address is located 0 bytes to the right of
[   34.754061]  allocated 48-byte region [fff00000c63df000, fff00000c63df030)
[   34.755615] 
[   34.756224] The buggy address belongs to the physical page:
[   34.757394] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063df
[   34.758354] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   34.758941] page_type: f5(slab)
[   34.759527] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   34.760392] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   34.761721] page dumped because: kasan: bad access detected
[   34.762737] 
[   34.763142] Memory state around the buggy address:
[   34.763451]  fff00000c63def00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   34.763802]  fff00000c63def80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   34.764184] >fff00000c63df000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   34.764782]                                      ^
[   34.765445]  fff00000c63df080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.766663]  fff00000c63df100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.767359] ==================================================================
[   36.442389] ==================================================================
[   36.442903] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1414/0x4858
[   36.443854] Write of size 8 at addr fff00000c63df030 by task kunit_try_catch/253
[   36.444658] 
[   36.444996] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241128 #1
[   36.446311] Tainted: [B]=BAD_PAGE, [N]=TEST
[   36.446908] Hardware name: linux,dummy-virt (DT)
[   36.447559] Call trace:
[   36.447863]  show_stack+0x20/0x38 (C)
[   36.448552]  dump_stack_lvl+0x8c/0xd0
[   36.449191]  print_report+0x118/0x5e0
[   36.449765]  kasan_report+0xc8/0x118
[   36.450406]  kasan_check_range+0x100/0x1a8
[   36.451051]  __kasan_check_write+0x20/0x30
[   36.451694]  kasan_atomics_helper+0x1414/0x4858
[   36.452381]  kasan_atomics+0x198/0x2e8
[   36.452988]  kunit_try_run_case+0x14c/0x3d0
[   36.453620]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.454363]  kthread+0x24c/0x2d0
[   36.454974]  ret_from_fork+0x10/0x20
[   36.455578] 
[   36.455966] Allocated by task 253:
[   36.456495]  kasan_save_stack+0x3c/0x68
[   36.457148]  kasan_save_track+0x20/0x40
[   36.457686]  kasan_save_alloc_info+0x40/0x58
[   36.458401]  __kasan_kmalloc+0xd4/0xd8
[   36.458944]  __kmalloc_cache_noprof+0x15c/0x3c0
[   36.459644]  kasan_atomics+0xb8/0x2e8
[   36.460223]  kunit_try_run_case+0x14c/0x3d0
[   36.460884]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.461584]  kthread+0x24c/0x2d0
[   36.462085]  ret_from_fork+0x10/0x20
[   36.462716] 
[   36.463105] The buggy address belongs to the object at fff00000c63df000
[   36.463105]  which belongs to the cache kmalloc-64 of size 64
[   36.464420] The buggy address is located 0 bytes to the right of
[   36.464420]  allocated 48-byte region [fff00000c63df000, fff00000c63df030)
[   36.465662] 
[   36.466069] The buggy address belongs to the physical page:
[   36.466818] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063df
[   36.467710] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   36.468553] page_type: f5(slab)
[   36.469072] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   36.469992] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   36.470823] page dumped because: kasan: bad access detected
[   36.471497] 
[   36.471852] Memory state around the buggy address:
[   36.472504]  fff00000c63def00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   36.473364]  fff00000c63def80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   36.474155] >fff00000c63df000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   36.474968]                                      ^
[   36.475546]  fff00000c63df080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.476422]  fff00000c63df100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.477281] ==================================================================

[   27.633859] ==================================================================
[   27.634954] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x19e4/0x5450
[   27.636134] Write of size 8 at addr ffff888102a32530 by task kunit_try_catch/273
[   27.637737] 
[   27.637932] CPU: 0 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241128 #1
[   27.638917] Tainted: [B]=BAD_PAGE, [N]=TEST
[   27.639360] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   27.640482] Call Trace:
[   27.640775]  <TASK>
[   27.641037]  dump_stack_lvl+0x73/0xb0
[   27.641831]  print_report+0xd1/0x640
[   27.642274]  ? __virt_addr_valid+0x1db/0x2d0
[   27.642789]  ? kasan_complete_mode_report_info+0x2a/0x200
[   27.643274]  kasan_report+0x102/0x140
[   27.643771]  ? kasan_atomics_helper+0x19e4/0x5450
[   27.644397]  ? kasan_atomics_helper+0x19e4/0x5450
[   27.644820]  kasan_check_range+0x10c/0x1c0
[   27.645468]  __kasan_check_write+0x18/0x20
[   27.646032]  kasan_atomics_helper+0x19e4/0x5450
[   27.646605]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   27.647140]  ? __kmalloc_cache_noprof+0x184/0x410
[   27.647770]  ? kasan_atomics+0x153/0x310
[   27.648265]  kasan_atomics+0x1dd/0x310
[   27.648800]  ? __pfx_kasan_atomics+0x10/0x10
[   27.649438]  ? __pfx_read_tsc+0x10/0x10
[   27.649864]  ? ktime_get_ts64+0x84/0x230
[   27.650430]  kunit_try_run_case+0x1b3/0x490
[   27.650866]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.651491]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   27.652125]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   27.652658]  ? __kthread_parkme+0x82/0x160
[   27.653168]  ? preempt_count_sub+0x50/0x80
[   27.653682]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.654291]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   27.654810]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.655566]  kthread+0x257/0x310
[   27.656226]  ? __pfx_kthread+0x10/0x10
[   27.656906]  ret_from_fork+0x41/0x80
[   27.657485]  ? __pfx_kthread+0x10/0x10
[   27.657883]  ret_from_fork_asm+0x1a/0x30
[   27.658373]  </TASK>
[   27.658627] 
[   27.658888] Allocated by task 273:
[   27.659301]  kasan_save_stack+0x3d/0x60
[   27.659821]  kasan_save_track+0x18/0x40
[   27.660378]  kasan_save_alloc_info+0x3b/0x50
[   27.660940]  __kasan_kmalloc+0xb7/0xc0
[   27.661327]  __kmalloc_cache_noprof+0x184/0x410
[   27.661903]  kasan_atomics+0x96/0x310
[   27.662323]  kunit_try_run_case+0x1b3/0x490
[   27.662859]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.663490]  kthread+0x257/0x310
[   27.663833]  ret_from_fork+0x41/0x80
[   27.664320]  ret_from_fork_asm+0x1a/0x30
[   27.664875] 
[   27.665197] The buggy address belongs to the object at ffff888102a32500
[   27.665197]  which belongs to the cache kmalloc-64 of size 64
[   27.666423] The buggy address is located 0 bytes to the right of
[   27.666423]  allocated 48-byte region [ffff888102a32500, ffff888102a32530)
[   27.667419] 
[   27.667578] The buggy address belongs to the physical page:
[   27.668248] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a32
[   27.669124] flags: 0x200000000000000(node=0|zone=2)
[   27.669540] page_type: f5(slab)
[   27.669817] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   27.670854] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   27.671527] page dumped because: kasan: bad access detected
[   27.672006] 
[   27.672377] Memory state around the buggy address:
[   27.672891]  ffff888102a32400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.673497]  ffff888102a32480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.674397] >ffff888102a32500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   27.675046]                                      ^
[   27.675586]  ffff888102a32580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.676182]  ffff888102a32600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.676786] ==================================================================
[   26.392478] ==================================================================
[   26.393479] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xc71/0x5450
[   26.394097] Write of size 4 at addr ffff888102a32530 by task kunit_try_catch/273
[   26.394673] 
[   26.394901] CPU: 0 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241128 #1
[   26.396143] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.396676] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   26.397534] Call Trace:
[   26.397821]  <TASK>
[   26.398150]  dump_stack_lvl+0x73/0xb0
[   26.398746]  print_report+0xd1/0x640
[   26.399119]  ? __virt_addr_valid+0x1db/0x2d0
[   26.399740]  ? kasan_complete_mode_report_info+0x2a/0x200
[   26.400245]  kasan_report+0x102/0x140
[   26.400785]  ? kasan_atomics_helper+0xc71/0x5450
[   26.401459]  ? kasan_atomics_helper+0xc71/0x5450
[   26.402002]  kasan_check_range+0x10c/0x1c0
[   26.402603]  __kasan_check_write+0x18/0x20
[   26.403148]  kasan_atomics_helper+0xc71/0x5450
[   26.403592]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   26.404271]  ? __kmalloc_cache_noprof+0x184/0x410
[   26.404690]  ? kasan_atomics+0x153/0x310
[   26.405285]  kasan_atomics+0x1dd/0x310
[   26.405642]  ? __pfx_kasan_atomics+0x10/0x10
[   26.406310]  ? __pfx_read_tsc+0x10/0x10
[   26.406847]  ? ktime_get_ts64+0x84/0x230
[   26.407210]  kunit_try_run_case+0x1b3/0x490
[   26.407817]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.408380]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   26.408789]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   26.409431]  ? __kthread_parkme+0x82/0x160
[   26.409999]  ? preempt_count_sub+0x50/0x80
[   26.410547]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.410913]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   26.411598]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.412195]  kthread+0x257/0x310
[   26.412499]  ? __pfx_kthread+0x10/0x10
[   26.412968]  ret_from_fork+0x41/0x80
[   26.413321]  ? __pfx_kthread+0x10/0x10
[   26.413889]  ret_from_fork_asm+0x1a/0x30
[   26.414501]  </TASK>
[   26.414761] 
[   26.415038] Allocated by task 273:
[   26.415422]  kasan_save_stack+0x3d/0x60
[   26.415928]  kasan_save_track+0x18/0x40
[   26.416388]  kasan_save_alloc_info+0x3b/0x50
[   26.416753]  __kasan_kmalloc+0xb7/0xc0
[   26.417367]  __kmalloc_cache_noprof+0x184/0x410
[   26.417759]  kasan_atomics+0x96/0x310
[   26.418330]  kunit_try_run_case+0x1b3/0x490
[   26.418738]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.419452]  kthread+0x257/0x310
[   26.419771]  ret_from_fork+0x41/0x80
[   26.420258]  ret_from_fork_asm+0x1a/0x30
[   26.420670] 
[   26.420974] The buggy address belongs to the object at ffff888102a32500
[   26.420974]  which belongs to the cache kmalloc-64 of size 64
[   26.422126] The buggy address is located 0 bytes to the right of
[   26.422126]  allocated 48-byte region [ffff888102a32500, ffff888102a32530)
[   26.423531] 
[   26.423759] The buggy address belongs to the physical page:
[   26.424285] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a32
[   26.425006] flags: 0x200000000000000(node=0|zone=2)
[   26.425675] page_type: f5(slab)
[   26.426130] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   26.426888] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   26.427668] page dumped because: kasan: bad access detected
[   26.428274] 
[   26.428499] Memory state around the buggy address:
[   26.428993]  ffff888102a32400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.429754]  ffff888102a32480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.430495] >ffff888102a32500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   26.431109]                                      ^
[   26.431565]  ffff888102a32580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.432281]  ffff888102a32600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.432980] ==================================================================
[   25.609557] ==================================================================
[   25.610353] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4ba4/0x5450
[   25.610875] Write of size 4 at addr ffff888102a32530 by task kunit_try_catch/273
[   25.611773] 
[   25.612087] CPU: 0 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241128 #1
[   25.612889] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.613161] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   25.614598] Call Trace:
[   25.614953]  <TASK>
[   25.615205]  dump_stack_lvl+0x73/0xb0
[   25.615874]  print_report+0xd1/0x640
[   25.616602]  ? __virt_addr_valid+0x1db/0x2d0
[   25.616997]  ? kasan_complete_mode_report_info+0x2a/0x200
[   25.617740]  kasan_report+0x102/0x140
[   25.618391]  ? kasan_atomics_helper+0x4ba4/0x5450
[   25.619011]  ? kasan_atomics_helper+0x4ba4/0x5450
[   25.619545]  __asan_report_store4_noabort+0x1b/0x30
[   25.620157]  kasan_atomics_helper+0x4ba4/0x5450
[   25.620857]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   25.621967]  ? __kmalloc_cache_noprof+0x184/0x410
[   25.622866]  ? kasan_atomics+0x153/0x310
[   25.623590]  kasan_atomics+0x1dd/0x310
[   25.623987]  ? __pfx_kasan_atomics+0x10/0x10
[   25.625041]  ? __pfx_read_tsc+0x10/0x10
[   25.626031]  ? ktime_get_ts64+0x84/0x230
[   25.626622]  kunit_try_run_case+0x1b3/0x490
[   25.627028]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.627467]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   25.627879]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   25.629422]  ? __kthread_parkme+0x82/0x160
[   25.629856]  ? preempt_count_sub+0x50/0x80
[   25.630544]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.631145]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   25.631695]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.632694]  kthread+0x257/0x310
[   25.632997]  ? __pfx_kthread+0x10/0x10
[   25.633591]  ret_from_fork+0x41/0x80
[   25.634872]  ? __pfx_kthread+0x10/0x10
[   25.635356]  ret_from_fork_asm+0x1a/0x30
[   25.635751]  </TASK>
[   25.636448] 
[   25.636766] Allocated by task 273:
[   25.637021]  kasan_save_stack+0x3d/0x60
[   25.638060]  kasan_save_track+0x18/0x40
[   25.638801]  kasan_save_alloc_info+0x3b/0x50
[   25.639350]  __kasan_kmalloc+0xb7/0xc0
[   25.639830]  __kmalloc_cache_noprof+0x184/0x410
[   25.640781]  kasan_atomics+0x96/0x310
[   25.641272]  kunit_try_run_case+0x1b3/0x490
[   25.641864]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.643300]  kthread+0x257/0x310
[   25.643890]  ret_from_fork+0x41/0x80
[   25.644523]  ret_from_fork_asm+0x1a/0x30
[   25.645155] 
[   25.645413] The buggy address belongs to the object at ffff888102a32500
[   25.645413]  which belongs to the cache kmalloc-64 of size 64
[   25.647460] The buggy address is located 0 bytes to the right of
[   25.647460]  allocated 48-byte region [ffff888102a32500, ffff888102a32530)
[   25.648737] 
[   25.649002] The buggy address belongs to the physical page:
[   25.649546] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a32
[   25.650457] flags: 0x200000000000000(node=0|zone=2)
[   25.651494] page_type: f5(slab)
[   25.651816] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   25.652567] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   25.653244] page dumped because: kasan: bad access detected
[   25.654798] 
[   25.655101] Memory state around the buggy address:
[   25.655615]  ffff888102a32400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.656483]  ffff888102a32480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.657291] >ffff888102a32500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   25.658122]                                      ^
[   25.659234]  ffff888102a32580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.659859]  ffff888102a32600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.660752] ==================================================================
[   27.318971] ==================================================================
[   27.319652] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x15b7/0x5450
[   27.320554] Write of size 8 at addr ffff888102a32530 by task kunit_try_catch/273
[   27.321320] 
[   27.321964] CPU: 0 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241128 #1
[   27.322955] Tainted: [B]=BAD_PAGE, [N]=TEST
[   27.323494] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   27.324730] Call Trace:
[   27.325025]  <TASK>
[   27.325305]  dump_stack_lvl+0x73/0xb0
[   27.325646]  print_report+0xd1/0x640
[   27.326119]  ? __virt_addr_valid+0x1db/0x2d0
[   27.326631]  ? kasan_complete_mode_report_info+0x2a/0x200
[   27.326997]  kasan_report+0x102/0x140
[   27.327627]  ? kasan_atomics_helper+0x15b7/0x5450
[   27.328354]  ? kasan_atomics_helper+0x15b7/0x5450
[   27.328974]  kasan_check_range+0x10c/0x1c0
[   27.329616]  __kasan_check_write+0x18/0x20
[   27.330118]  kasan_atomics_helper+0x15b7/0x5450
[   27.330763]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   27.331443]  ? __kmalloc_cache_noprof+0x184/0x410
[   27.332123]  ? kasan_atomics+0x153/0x310
[   27.332541]  kasan_atomics+0x1dd/0x310
[   27.333052]  ? __pfx_kasan_atomics+0x10/0x10
[   27.333607]  ? __pfx_read_tsc+0x10/0x10
[   27.333989]  ? ktime_get_ts64+0x84/0x230
[   27.334677]  kunit_try_run_case+0x1b3/0x490
[   27.335192]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.335788]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   27.336415]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   27.336994]  ? __kthread_parkme+0x82/0x160
[   27.337610]  ? preempt_count_sub+0x50/0x80
[   27.337995]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.338753]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   27.339400]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.340000]  kthread+0x257/0x310
[   27.340481]  ? __pfx_kthread+0x10/0x10
[   27.341023]  ret_from_fork+0x41/0x80
[   27.341545]  ? __pfx_kthread+0x10/0x10
[   27.341958]  ret_from_fork_asm+0x1a/0x30
[   27.342658]  </TASK>
[   27.342957] 
[   27.343323] Allocated by task 273:
[   27.343730]  kasan_save_stack+0x3d/0x60
[   27.344197]  kasan_save_track+0x18/0x40
[   27.344676]  kasan_save_alloc_info+0x3b/0x50
[   27.345028]  __kasan_kmalloc+0xb7/0xc0
[   27.345660]  __kmalloc_cache_noprof+0x184/0x410
[   27.346284]  kasan_atomics+0x96/0x310
[   27.346599]  kunit_try_run_case+0x1b3/0x490
[   27.346935]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.347777]  kthread+0x257/0x310
[   27.348317]  ret_from_fork+0x41/0x80
[   27.348670]  ret_from_fork_asm+0x1a/0x30
[   27.349275] 
[   27.349610] The buggy address belongs to the object at ffff888102a32500
[   27.349610]  which belongs to the cache kmalloc-64 of size 64
[   27.350743] The buggy address is located 0 bytes to the right of
[   27.350743]  allocated 48-byte region [ffff888102a32500, ffff888102a32530)
[   27.351792] 
[   27.352055] The buggy address belongs to the physical page:
[   27.352793] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a32
[   27.353906] flags: 0x200000000000000(node=0|zone=2)
[   27.354736] page_type: f5(slab)
[   27.355399] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   27.356074] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   27.356743] page dumped because: kasan: bad access detected
[   27.357236] 
[   27.358017] Memory state around the buggy address:
[   27.358606]  ffff888102a32400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.358891]  ffff888102a32480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.359417] >ffff888102a32500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   27.360373]                                      ^
[   27.361140]  ffff888102a32580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.361809]  ffff888102a32600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.362543] ==================================================================
[   27.501490] ==================================================================
[   27.502402] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1819/0x5450
[   27.503184] Write of size 8 at addr ffff888102a32530 by task kunit_try_catch/273
[   27.503852] 
[   27.504039] CPU: 0 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241128 #1
[   27.504802] Tainted: [B]=BAD_PAGE, [N]=TEST
[   27.505348] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   27.506313] Call Trace:
[   27.506562]  <TASK>
[   27.506773]  dump_stack_lvl+0x73/0xb0
[   27.507294]  print_report+0xd1/0x640
[   27.508050]  ? __virt_addr_valid+0x1db/0x2d0
[   27.508391]  ? kasan_complete_mode_report_info+0x2a/0x200
[   27.509028]  kasan_report+0x102/0x140
[   27.509445]  ? kasan_atomics_helper+0x1819/0x5450
[   27.509973]  ? kasan_atomics_helper+0x1819/0x5450
[   27.510510]  kasan_check_range+0x10c/0x1c0
[   27.510875]  __kasan_check_write+0x18/0x20
[   27.511442]  kasan_atomics_helper+0x1819/0x5450
[   27.511805]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   27.512371]  ? __kmalloc_cache_noprof+0x184/0x410
[   27.512969]  ? kasan_atomics+0x153/0x310
[   27.513470]  kasan_atomics+0x1dd/0x310
[   27.513800]  ? __pfx_kasan_atomics+0x10/0x10
[   27.514261]  ? __pfx_read_tsc+0x10/0x10
[   27.514762]  ? ktime_get_ts64+0x84/0x230
[   27.515356]  kunit_try_run_case+0x1b3/0x490
[   27.515892]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.516485]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   27.516820]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   27.517474]  ? __kthread_parkme+0x82/0x160
[   27.518025]  ? preempt_count_sub+0x50/0x80
[   27.518533]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.518956]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   27.519659]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.520286]  kthread+0x257/0x310
[   27.520680]  ? __pfx_kthread+0x10/0x10
[   27.521036]  ret_from_fork+0x41/0x80
[   27.521379]  ? __pfx_kthread+0x10/0x10
[   27.521673]  ret_from_fork_asm+0x1a/0x30
[   27.521994]  </TASK>
[   27.522243] 
[   27.522465] Allocated by task 273:
[   27.522898]  kasan_save_stack+0x3d/0x60
[   27.523497]  kasan_save_track+0x18/0x40
[   27.523980]  kasan_save_alloc_info+0x3b/0x50
[   27.524561]  __kasan_kmalloc+0xb7/0xc0
[   27.525060]  __kmalloc_cache_noprof+0x184/0x410
[   27.525533]  kasan_atomics+0x96/0x310
[   27.525922]  kunit_try_run_case+0x1b3/0x490
[   27.526286]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.526839]  kthread+0x257/0x310
[   27.527260]  ret_from_fork+0x41/0x80
[   27.527595]  ret_from_fork_asm+0x1a/0x30
[   27.528000] 
[   27.528188] The buggy address belongs to the object at ffff888102a32500
[   27.528188]  which belongs to the cache kmalloc-64 of size 64
[   27.529211] The buggy address is located 0 bytes to the right of
[   27.529211]  allocated 48-byte region [ffff888102a32500, ffff888102a32530)
[   27.530325] 
[   27.530571] The buggy address belongs to the physical page:
[   27.531111] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a32
[   27.531825] flags: 0x200000000000000(node=0|zone=2)
[   27.532206] page_type: f5(slab)
[   27.532541] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   27.533449] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   27.534195] page dumped because: kasan: bad access detected
[   27.534754] 
[   27.534998] Memory state around the buggy address:
[   27.535481]  ffff888102a32400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.536144]  ffff888102a32480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.536599] >ffff888102a32500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   27.537006]                                      ^
[   27.537599]  ffff888102a32580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.538383]  ffff888102a32600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.539008] ==================================================================
[   26.999771] ==================================================================
[   27.000939] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x12e7/0x5450
[   27.001744] Write of size 4 at addr ffff888102a32530 by task kunit_try_catch/273
[   27.002402] 
[   27.002705] CPU: 0 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241128 #1
[   27.003730] Tainted: [B]=BAD_PAGE, [N]=TEST
[   27.004266] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   27.005127] Call Trace:
[   27.005583]  <TASK>
[   27.005813]  dump_stack_lvl+0x73/0xb0
[   27.006321]  print_report+0xd1/0x640
[   27.006804]  ? __virt_addr_valid+0x1db/0x2d0
[   27.007285]  ? kasan_complete_mode_report_info+0x2a/0x200
[   27.007741]  kasan_report+0x102/0x140
[   27.008309]  ? kasan_atomics_helper+0x12e7/0x5450
[   27.008939]  ? kasan_atomics_helper+0x12e7/0x5450
[   27.009381]  kasan_check_range+0x10c/0x1c0
[   27.009987]  __kasan_check_write+0x18/0x20
[   27.010404]  kasan_atomics_helper+0x12e7/0x5450
[   27.010995]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   27.011496]  ? __kmalloc_cache_noprof+0x184/0x410
[   27.012110]  ? kasan_atomics+0x153/0x310
[   27.012549]  kasan_atomics+0x1dd/0x310
[   27.013051]  ? __pfx_kasan_atomics+0x10/0x10
[   27.013769]  ? __pfx_read_tsc+0x10/0x10
[   27.014246]  ? ktime_get_ts64+0x84/0x230
[   27.014702]  kunit_try_run_case+0x1b3/0x490
[   27.015311]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.015745]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   27.016283]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   27.016885]  ? __kthread_parkme+0x82/0x160
[   27.017322]  ? preempt_count_sub+0x50/0x80
[   27.017969]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.018534]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   27.019173]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.019722]  kthread+0x257/0x310
[   27.020163]  ? __pfx_kthread+0x10/0x10
[   27.020574]  ret_from_fork+0x41/0x80
[   27.021118]  ? __pfx_kthread+0x10/0x10
[   27.021489]  ret_from_fork_asm+0x1a/0x30
[   27.022016]  </TASK>
[   27.022732] 
[   27.023312] Allocated by task 273:
[   27.023640]  kasan_save_stack+0x3d/0x60
[   27.024085]  kasan_save_track+0x18/0x40
[   27.024641]  kasan_save_alloc_info+0x3b/0x50
[   27.025355]  __kasan_kmalloc+0xb7/0xc0
[   27.025884]  __kmalloc_cache_noprof+0x184/0x410
[   27.026401]  kasan_atomics+0x96/0x310
[   27.026839]  kunit_try_run_case+0x1b3/0x490
[   27.027772]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.028322]  kthread+0x257/0x310
[   27.028700]  ret_from_fork+0x41/0x80
[   27.029122]  ret_from_fork_asm+0x1a/0x30
[   27.029711] 
[   27.029983] The buggy address belongs to the object at ffff888102a32500
[   27.029983]  which belongs to the cache kmalloc-64 of size 64
[   27.031253] The buggy address is located 0 bytes to the right of
[   27.031253]  allocated 48-byte region [ffff888102a32500, ffff888102a32530)
[   27.032390] 
[   27.032683] The buggy address belongs to the physical page:
[   27.033615] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a32
[   27.034545] flags: 0x200000000000000(node=0|zone=2)
[   27.035043] page_type: f5(slab)
[   27.035632] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   27.036550] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   27.037315] page dumped because: kasan: bad access detected
[   27.037859] 
[   27.038169] Memory state around the buggy address:
[   27.038621]  ffff888102a32400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.039410]  ffff888102a32480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.040150] >ffff888102a32500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   27.040829]                                      ^
[   27.041447]  ffff888102a32580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.042112]  ffff888102a32600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.042761] ==================================================================
[   27.585489] ==================================================================
[   27.586392] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x194b/0x5450
[   27.587376] Write of size 8 at addr ffff888102a32530 by task kunit_try_catch/273
[   27.588048] 
[   27.588251] CPU: 0 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241128 #1
[   27.588808] Tainted: [B]=BAD_PAGE, [N]=TEST
[   27.589324] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   27.590671] Call Trace:
[   27.591153]  <TASK>
[   27.591371]  dump_stack_lvl+0x73/0xb0
[   27.592172]  print_report+0xd1/0x640
[   27.593087]  ? __virt_addr_valid+0x1db/0x2d0
[   27.593749]  ? kasan_complete_mode_report_info+0x2a/0x200
[   27.594488]  kasan_report+0x102/0x140
[   27.595083]  ? kasan_atomics_helper+0x194b/0x5450
[   27.595755]  ? kasan_atomics_helper+0x194b/0x5450
[   27.596491]  kasan_check_range+0x10c/0x1c0
[   27.596954]  __kasan_check_write+0x18/0x20
[   27.597511]  kasan_atomics_helper+0x194b/0x5450
[   27.597994]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   27.598663]  ? __kmalloc_cache_noprof+0x184/0x410
[   27.599139]  ? kasan_atomics+0x153/0x310
[   27.599954]  kasan_atomics+0x1dd/0x310
[   27.600595]  ? __pfx_kasan_atomics+0x10/0x10
[   27.601070]  ? __pfx_read_tsc+0x10/0x10
[   27.601720]  ? ktime_get_ts64+0x84/0x230
[   27.602149]  kunit_try_run_case+0x1b3/0x490
[   27.602690]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.603502]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   27.604052]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   27.604628]  ? __kthread_parkme+0x82/0x160
[   27.605222]  ? preempt_count_sub+0x50/0x80
[   27.605720]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.606419]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   27.607017]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.607774]  kthread+0x257/0x310
[   27.608272]  ? __pfx_kthread+0x10/0x10
[   27.608753]  ret_from_fork+0x41/0x80
[   27.609162]  ? __pfx_kthread+0x10/0x10
[   27.609900]  ret_from_fork_asm+0x1a/0x30
[   27.610560]  </TASK>
[   27.611049] 
[   27.611309] Allocated by task 273:
[   27.611739]  kasan_save_stack+0x3d/0x60
[   27.612405]  kasan_save_track+0x18/0x40
[   27.612883]  kasan_save_alloc_info+0x3b/0x50
[   27.613459]  __kasan_kmalloc+0xb7/0xc0
[   27.614155]  __kmalloc_cache_noprof+0x184/0x410
[   27.614646]  kasan_atomics+0x96/0x310
[   27.615059]  kunit_try_run_case+0x1b3/0x490
[   27.615732]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.616442]  kthread+0x257/0x310
[   27.616822]  ret_from_fork+0x41/0x80
[   27.617307]  ret_from_fork_asm+0x1a/0x30
[   27.618051] 
[   27.618261] The buggy address belongs to the object at ffff888102a32500
[   27.618261]  which belongs to the cache kmalloc-64 of size 64
[   27.619686] The buggy address is located 0 bytes to the right of
[   27.619686]  allocated 48-byte region [ffff888102a32500, ffff888102a32530)
[   27.621111] 
[   27.621291] The buggy address belongs to the physical page:
[   27.621952] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a32
[   27.622773] flags: 0x200000000000000(node=0|zone=2)
[   27.623516] page_type: f5(slab)
[   27.624000] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   27.624736] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   27.625643] page dumped because: kasan: bad access detected
[   27.626475] 
[   27.626693] Memory state around the buggy address:
[   27.627138]  ffff888102a32400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.627828]  ffff888102a32480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.628408] >ffff888102a32500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   27.629135]                                      ^
[   27.629930]  ffff888102a32580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.630738]  ffff888102a32600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.631586] ==================================================================
[   25.801869] ==================================================================
[   25.803569] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b56/0x5450
[   25.804063] Read of size 4 at addr ffff888102a32530 by task kunit_try_catch/273
[   25.804861] 
[   25.805151] CPU: 0 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241128 #1
[   25.805837] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.806380] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   25.807203] Call Trace:
[   25.807464]  <TASK>
[   25.807726]  dump_stack_lvl+0x73/0xb0
[   25.808282]  print_report+0xd1/0x640
[   25.808696]  ? __virt_addr_valid+0x1db/0x2d0
[   25.809146]  ? kasan_complete_mode_report_info+0x2a/0x200
[   25.809741]  kasan_report+0x102/0x140
[   25.810254]  ? kasan_atomics_helper+0x4b56/0x5450
[   25.810638]  ? kasan_atomics_helper+0x4b56/0x5450
[   25.811236]  __asan_report_load4_noabort+0x18/0x20
[   25.811667]  kasan_atomics_helper+0x4b56/0x5450
[   25.812199]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   25.812795]  ? __kmalloc_cache_noprof+0x184/0x410
[   25.813182]  ? kasan_atomics+0x153/0x310
[   25.813670]  kasan_atomics+0x1dd/0x310
[   25.814136]  ? __pfx_kasan_atomics+0x10/0x10
[   25.814581]  ? __pfx_read_tsc+0x10/0x10
[   25.814895]  ? ktime_get_ts64+0x84/0x230
[   25.815383]  kunit_try_run_case+0x1b3/0x490
[   25.815900]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.816416]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   25.816932]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   25.817504]  ? __kthread_parkme+0x82/0x160
[   25.818005]  ? preempt_count_sub+0x50/0x80
[   25.818431]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.818951]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   25.819565]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.819932]  kthread+0x257/0x310
[   25.820389]  ? __pfx_kthread+0x10/0x10
[   25.820856]  ret_from_fork+0x41/0x80
[   25.821225]  ? __pfx_kthread+0x10/0x10
[   25.821738]  ret_from_fork_asm+0x1a/0x30
[   25.822269]  </TASK>
[   25.822516] 
[   25.822772] Allocated by task 273:
[   25.823133]  kasan_save_stack+0x3d/0x60
[   25.823601]  kasan_save_track+0x18/0x40
[   25.823894]  kasan_save_alloc_info+0x3b/0x50
[   25.824412]  __kasan_kmalloc+0xb7/0xc0
[   25.824733]  __kmalloc_cache_noprof+0x184/0x410
[   25.825301]  kasan_atomics+0x96/0x310
[   25.825705]  kunit_try_run_case+0x1b3/0x490
[   25.826250]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.826646]  kthread+0x257/0x310
[   25.826899]  ret_from_fork+0x41/0x80
[   25.827309]  ret_from_fork_asm+0x1a/0x30
[   25.827810] 
[   25.828057] The buggy address belongs to the object at ffff888102a32500
[   25.828057]  which belongs to the cache kmalloc-64 of size 64
[   25.829007] The buggy address is located 0 bytes to the right of
[   25.829007]  allocated 48-byte region [ffff888102a32500, ffff888102a32530)
[   25.830330] 
[   25.830554] The buggy address belongs to the physical page:
[   25.831011] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a32
[   25.831710] flags: 0x200000000000000(node=0|zone=2)
[   25.832361] page_type: f5(slab)
[   25.832656] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   25.833212] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   25.833849] page dumped because: kasan: bad access detected
[   25.834258] 
[   25.834533] Memory state around the buggy address:
[   25.836134]  ffff888102a32400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.837028]  ffff888102a32480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.837566] >ffff888102a32500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   25.837837]                                      ^
[   25.838035]  ffff888102a32580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.839266]  ffff888102a32600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.840355] ==================================================================
[   26.604684] ==================================================================
[   26.605828] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf11/0x5450
[   26.606479] Write of size 4 at addr ffff888102a32530 by task kunit_try_catch/273
[   26.607181] 
[   26.607478] CPU: 0 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241128 #1
[   26.608293] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.608761] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   26.609509] Call Trace:
[   26.609859]  <TASK>
[   26.610197]  dump_stack_lvl+0x73/0xb0
[   26.610702]  print_report+0xd1/0x640
[   26.611049]  ? __virt_addr_valid+0x1db/0x2d0
[   26.611596]  ? kasan_complete_mode_report_info+0x2a/0x200
[   26.612053]  kasan_report+0x102/0x140
[   26.612533]  ? kasan_atomics_helper+0xf11/0x5450
[   26.613015]  ? kasan_atomics_helper+0xf11/0x5450
[   26.613442]  kasan_check_range+0x10c/0x1c0
[   26.613989]  __kasan_check_write+0x18/0x20
[   26.614450]  kasan_atomics_helper+0xf11/0x5450
[   26.614780]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   26.615273]  ? __kmalloc_cache_noprof+0x184/0x410
[   26.615840]  ? kasan_atomics+0x153/0x310
[   26.616358]  kasan_atomics+0x1dd/0x310
[   26.616778]  ? __pfx_kasan_atomics+0x10/0x10
[   26.617349]  ? __pfx_read_tsc+0x10/0x10
[   26.617737]  ? ktime_get_ts64+0x84/0x230
[   26.618123]  kunit_try_run_case+0x1b3/0x490
[   26.618630]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.619218]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   26.619582]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   26.619960]  ? __kthread_parkme+0x82/0x160
[   26.620561]  ? preempt_count_sub+0x50/0x80
[   26.621130]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.621648]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   26.622210]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.622678]  kthread+0x257/0x310
[   26.623063]  ? __pfx_kthread+0x10/0x10
[   26.623462]  ret_from_fork+0x41/0x80
[   26.623823]  ? __pfx_kthread+0x10/0x10
[   26.624323]  ret_from_fork_asm+0x1a/0x30
[   26.624862]  </TASK>
[   26.625187] 
[   26.625364] Allocated by task 273:
[   26.625703]  kasan_save_stack+0x3d/0x60
[   26.626223]  kasan_save_track+0x18/0x40
[   26.626648]  kasan_save_alloc_info+0x3b/0x50
[   26.627036]  __kasan_kmalloc+0xb7/0xc0
[   26.627377]  __kmalloc_cache_noprof+0x184/0x410
[   26.627882]  kasan_atomics+0x96/0x310
[   26.628407]  kunit_try_run_case+0x1b3/0x490
[   26.628840]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.629238]  kthread+0x257/0x310
[   26.629680]  ret_from_fork+0x41/0x80
[   26.630199]  ret_from_fork_asm+0x1a/0x30
[   26.630635] 
[   26.630794] The buggy address belongs to the object at ffff888102a32500
[   26.630794]  which belongs to the cache kmalloc-64 of size 64
[   26.631974] The buggy address is located 0 bytes to the right of
[   26.631974]  allocated 48-byte region [ffff888102a32500, ffff888102a32530)
[   26.633013] 
[   26.633284] The buggy address belongs to the physical page:
[   26.633750] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a32
[   26.634392] flags: 0x200000000000000(node=0|zone=2)
[   26.634844] page_type: f5(slab)
[   26.635184] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   26.635641] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   26.636459] page dumped because: kasan: bad access detected
[   26.637442] 
[   26.637729] Memory state around the buggy address:
[   26.638317]  ffff888102a32400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.639021]  ffff888102a32480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.639939] >ffff888102a32500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   26.640556]                                      ^
[   26.640931]  ffff888102a32580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.641712]  ffff888102a32600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.642568] ==================================================================
[   27.226640] ==================================================================
[   27.227312] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x50d6/0x5450
[   27.228579] Write of size 8 at addr ffff888102a32530 by task kunit_try_catch/273
[   27.229955] 
[   27.230208] CPU: 0 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241128 #1
[   27.231170] Tainted: [B]=BAD_PAGE, [N]=TEST
[   27.231973] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   27.233191] Call Trace:
[   27.233594]  <TASK>
[   27.233873]  dump_stack_lvl+0x73/0xb0
[   27.234490]  print_report+0xd1/0x640
[   27.234885]  ? __virt_addr_valid+0x1db/0x2d0
[   27.235358]  ? kasan_complete_mode_report_info+0x2a/0x200
[   27.235734]  kasan_report+0x102/0x140
[   27.236210]  ? kasan_atomics_helper+0x50d6/0x5450
[   27.236760]  ? kasan_atomics_helper+0x50d6/0x5450
[   27.237281]  __asan_report_store8_noabort+0x1b/0x30
[   27.237669]  kasan_atomics_helper+0x50d6/0x5450
[   27.238275]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   27.238972]  ? __kmalloc_cache_noprof+0x184/0x410
[   27.240033]  ? kasan_atomics+0x153/0x310
[   27.240654]  kasan_atomics+0x1dd/0x310
[   27.241089]  ? __pfx_kasan_atomics+0x10/0x10
[   27.241786]  ? __pfx_read_tsc+0x10/0x10
[   27.242366]  ? ktime_get_ts64+0x84/0x230
[   27.243143]  kunit_try_run_case+0x1b3/0x490
[   27.243797]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.244268]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   27.244793]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   27.245375]  ? __kthread_parkme+0x82/0x160
[   27.245824]  ? preempt_count_sub+0x50/0x80
[   27.246608]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.247139]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   27.247748]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.248588]  kthread+0x257/0x310
[   27.249137]  ? __pfx_kthread+0x10/0x10
[   27.249602]  ret_from_fork+0x41/0x80
[   27.250219]  ? __pfx_kthread+0x10/0x10
[   27.250626]  ret_from_fork_asm+0x1a/0x30
[   27.251118]  </TASK>
[   27.251484] 
[   27.251753] Allocated by task 273:
[   27.252270]  kasan_save_stack+0x3d/0x60
[   27.252918]  kasan_save_track+0x18/0x40
[   27.253756]  kasan_save_alloc_info+0x3b/0x50
[   27.254264]  __kasan_kmalloc+0xb7/0xc0
[   27.254965]  __kmalloc_cache_noprof+0x184/0x410
[   27.255587]  kasan_atomics+0x96/0x310
[   27.255983]  kunit_try_run_case+0x1b3/0x490
[   27.256509]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.257055]  kthread+0x257/0x310
[   27.257461]  ret_from_fork+0x41/0x80
[   27.257911]  ret_from_fork_asm+0x1a/0x30
[   27.258595] 
[   27.258853] The buggy address belongs to the object at ffff888102a32500
[   27.258853]  which belongs to the cache kmalloc-64 of size 64
[   27.260806] The buggy address is located 0 bytes to the right of
[   27.260806]  allocated 48-byte region [ffff888102a32500, ffff888102a32530)
[   27.261752] 
[   27.261987] The buggy address belongs to the physical page:
[   27.262495] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a32
[   27.263128] flags: 0x200000000000000(node=0|zone=2)
[   27.264049] page_type: f5(slab)
[   27.264449] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   27.265473] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   27.266523] page dumped because: kasan: bad access detected
[   27.267555] 
[   27.267764] Memory state around the buggy address:
[   27.268317]  ffff888102a32400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.268659]  ffff888102a32480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.268930] >ffff888102a32500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   27.269305]                                      ^
[   27.270063]  ffff888102a32580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.271059]  ffff888102a32600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.271689] ==================================================================
[   26.739547] ==================================================================
[   26.740246] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x107a/0x5450
[   26.741127] Write of size 4 at addr ffff888102a32530 by task kunit_try_catch/273
[   26.741880] 
[   26.742253] CPU: 0 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241128 #1
[   26.743172] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.743538] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   26.744522] Call Trace:
[   26.744856]  <TASK>
[   26.745059]  dump_stack_lvl+0x73/0xb0
[   26.745675]  print_report+0xd1/0x640
[   26.746293]  ? __virt_addr_valid+0x1db/0x2d0
[   26.746768]  ? kasan_complete_mode_report_info+0x2a/0x200
[   26.747367]  kasan_report+0x102/0x140
[   26.747828]  ? kasan_atomics_helper+0x107a/0x5450
[   26.748422]  ? kasan_atomics_helper+0x107a/0x5450
[   26.748905]  kasan_check_range+0x10c/0x1c0
[   26.749421]  __kasan_check_write+0x18/0x20
[   26.749940]  kasan_atomics_helper+0x107a/0x5450
[   26.750716]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   26.751170]  ? __kmalloc_cache_noprof+0x184/0x410
[   26.751723]  ? kasan_atomics+0x153/0x310
[   26.752160]  kasan_atomics+0x1dd/0x310
[   26.752587]  ? __pfx_kasan_atomics+0x10/0x10
[   26.753034]  ? __pfx_read_tsc+0x10/0x10
[   26.753510]  ? ktime_get_ts64+0x84/0x230
[   26.754012]  kunit_try_run_case+0x1b3/0x490
[   26.754524]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.754927]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   26.755489]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   26.756007]  ? __kthread_parkme+0x82/0x160
[   26.756461]  ? preempt_count_sub+0x50/0x80
[   26.756766]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.757400]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   26.758051]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.758667]  kthread+0x257/0x310
[   26.758934]  ? __pfx_kthread+0x10/0x10
[   26.759427]  ret_from_fork+0x41/0x80
[   26.759906]  ? __pfx_kthread+0x10/0x10
[   26.760387]  ret_from_fork_asm+0x1a/0x30
[   26.760845]  </TASK>
[   26.761098] 
[   26.761277] Allocated by task 273:
[   26.761727]  kasan_save_stack+0x3d/0x60
[   26.762253]  kasan_save_track+0x18/0x40
[   26.762703]  kasan_save_alloc_info+0x3b/0x50
[   26.763155]  __kasan_kmalloc+0xb7/0xc0
[   26.763654]  __kmalloc_cache_noprof+0x184/0x410
[   26.763994]  kasan_atomics+0x96/0x310
[   26.764331]  kunit_try_run_case+0x1b3/0x490
[   26.764650]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.764994]  kthread+0x257/0x310
[   26.765516]  ret_from_fork+0x41/0x80
[   26.766025]  ret_from_fork_asm+0x1a/0x30
[   26.766591] 
[   26.766845] The buggy address belongs to the object at ffff888102a32500
[   26.766845]  which belongs to the cache kmalloc-64 of size 64
[   26.768040] The buggy address is located 0 bytes to the right of
[   26.768040]  allocated 48-byte region [ffff888102a32500, ffff888102a32530)
[   26.769225] 
[   26.769454] The buggy address belongs to the physical page:
[   26.770198] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a32
[   26.770867] flags: 0x200000000000000(node=0|zone=2)
[   26.771258] page_type: f5(slab)
[   26.771690] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   26.772475] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   26.772904] page dumped because: kasan: bad access detected
[   26.773310] 
[   26.773597] Memory state around the buggy address:
[   26.774228]  ffff888102a32400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.775117]  ffff888102a32480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.775930] >ffff888102a32500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   26.776727]                                      ^
[   26.777041]  ffff888102a32580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.777697]  ffff888102a32600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.778584] ==================================================================
[   27.457689] ==================================================================
[   27.458703] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1780/0x5450
[   27.460499] Write of size 8 at addr ffff888102a32530 by task kunit_try_catch/273
[   27.461203] 
[   27.461450] CPU: 0 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241128 #1
[   27.463664] Tainted: [B]=BAD_PAGE, [N]=TEST
[   27.464049] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   27.465136] Call Trace:
[   27.465678]  <TASK>
[   27.466284]  dump_stack_lvl+0x73/0xb0
[   27.466957]  print_report+0xd1/0x640
[   27.467378]  ? __virt_addr_valid+0x1db/0x2d0
[   27.467837]  ? kasan_complete_mode_report_info+0x2a/0x200
[   27.468475]  kasan_report+0x102/0x140
[   27.468776]  ? kasan_atomics_helper+0x1780/0x5450
[   27.469929]  ? kasan_atomics_helper+0x1780/0x5450
[   27.470612]  kasan_check_range+0x10c/0x1c0
[   27.471071]  __kasan_check_write+0x18/0x20
[   27.472011]  kasan_atomics_helper+0x1780/0x5450
[   27.472698]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   27.473385]  ? __kmalloc_cache_noprof+0x184/0x410
[   27.473869]  ? kasan_atomics+0x153/0x310
[   27.474298]  kasan_atomics+0x1dd/0x310
[   27.474666]  ? __pfx_kasan_atomics+0x10/0x10
[   27.475158]  ? __pfx_read_tsc+0x10/0x10
[   27.475600]  ? ktime_get_ts64+0x84/0x230
[   27.476043]  kunit_try_run_case+0x1b3/0x490
[   27.476669]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.477055]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   27.478123]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   27.478725]  ? __kthread_parkme+0x82/0x160
[   27.479132]  ? preempt_count_sub+0x50/0x80
[   27.479587]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.480169]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   27.480664]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.481415]  kthread+0x257/0x310
[   27.481710]  ? __pfx_kthread+0x10/0x10
[   27.482397]  ret_from_fork+0x41/0x80
[   27.482871]  ? __pfx_kthread+0x10/0x10
[   27.483221]  ret_from_fork_asm+0x1a/0x30
[   27.483751]  </TASK>
[   27.483985] 
[   27.484230] Allocated by task 273:
[   27.484638]  kasan_save_stack+0x3d/0x60
[   27.485002]  kasan_save_track+0x18/0x40
[   27.485527]  kasan_save_alloc_info+0x3b/0x50
[   27.485960]  __kasan_kmalloc+0xb7/0xc0
[   27.486372]  __kmalloc_cache_noprof+0x184/0x410
[   27.486872]  kasan_atomics+0x96/0x310
[   27.487277]  kunit_try_run_case+0x1b3/0x490
[   27.487791]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.488395]  kthread+0x257/0x310
[   27.488742]  ret_from_fork+0x41/0x80
[   27.489209]  ret_from_fork_asm+0x1a/0x30
[   27.489610] 
[   27.489852] The buggy address belongs to the object at ffff888102a32500
[   27.489852]  which belongs to the cache kmalloc-64 of size 64
[   27.490867] The buggy address is located 0 bytes to the right of
[   27.490867]  allocated 48-byte region [ffff888102a32500, ffff888102a32530)
[   27.491842] 
[   27.492090] The buggy address belongs to the physical page:
[   27.492654] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a32
[   27.493306] flags: 0x200000000000000(node=0|zone=2)
[   27.493786] page_type: f5(slab)
[   27.494041] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   27.494846] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   27.495359] page dumped because: kasan: bad access detected
[   27.495840] 
[   27.496106] Memory state around the buggy address:
[   27.496683]  ffff888102a32400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.497488]  ffff888102a32480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.497917] >ffff888102a32500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   27.498703]                                      ^
[   27.499206]  ffff888102a32580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.499790]  ffff888102a32600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.500241] ==================================================================
[   26.825459] ==================================================================
[   26.826290] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1149/0x5450
[   26.828527] Write of size 4 at addr ffff888102a32530 by task kunit_try_catch/273
[   26.829305] 
[   26.829737] CPU: 0 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241128 #1
[   26.830856] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.831237] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   26.832324] Call Trace:
[   26.832695]  <TASK>
[   26.833076]  dump_stack_lvl+0x73/0xb0
[   26.833487]  print_report+0xd1/0x640
[   26.834021]  ? __virt_addr_valid+0x1db/0x2d0
[   26.834612]  ? kasan_complete_mode_report_info+0x2a/0x200
[   26.835202]  kasan_report+0x102/0x140
[   26.835811]  ? kasan_atomics_helper+0x1149/0x5450
[   26.836472]  ? kasan_atomics_helper+0x1149/0x5450
[   26.837249]  kasan_check_range+0x10c/0x1c0
[   26.837777]  __kasan_check_write+0x18/0x20
[   26.838269]  kasan_atomics_helper+0x1149/0x5450
[   26.838612]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   26.839150]  ? __kmalloc_cache_noprof+0x184/0x410
[   26.839799]  ? kasan_atomics+0x153/0x310
[   26.840562]  kasan_atomics+0x1dd/0x310
[   26.841498]  ? __pfx_kasan_atomics+0x10/0x10
[   26.841934]  ? __pfx_read_tsc+0x10/0x10
[   26.842959]  ? ktime_get_ts64+0x84/0x230
[   26.843609]  kunit_try_run_case+0x1b3/0x490
[   26.843995]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.844665]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   26.845168]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   26.845707]  ? __kthread_parkme+0x82/0x160
[   26.846399]  ? preempt_count_sub+0x50/0x80
[   26.846827]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.847444]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   26.847957]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.848707]  kthread+0x257/0x310
[   26.849202]  ? __pfx_kthread+0x10/0x10
[   26.849788]  ret_from_fork+0x41/0x80
[   26.850280]  ? __pfx_kthread+0x10/0x10
[   26.850778]  ret_from_fork_asm+0x1a/0x30
[   26.851383]  </TASK>
[   26.851688] 
[   26.851927] Allocated by task 273:
[   26.852298]  kasan_save_stack+0x3d/0x60
[   26.852855]  kasan_save_track+0x18/0x40
[   26.853314]  kasan_save_alloc_info+0x3b/0x50
[   26.853840]  __kasan_kmalloc+0xb7/0xc0
[   26.854368]  __kmalloc_cache_noprof+0x184/0x410
[   26.854810]  kasan_atomics+0x96/0x310
[   26.855309]  kunit_try_run_case+0x1b3/0x490
[   26.855925]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.856528]  kthread+0x257/0x310
[   26.856936]  ret_from_fork+0x41/0x80
[   26.857514]  ret_from_fork_asm+0x1a/0x30
[   26.857961] 
[   26.858238] The buggy address belongs to the object at ffff888102a32500
[   26.858238]  which belongs to the cache kmalloc-64 of size 64
[   26.859400] The buggy address is located 0 bytes to the right of
[   26.859400]  allocated 48-byte region [ffff888102a32500, ffff888102a32530)
[   26.860570] 
[   26.860827] The buggy address belongs to the physical page:
[   26.861515] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a32
[   26.862400] flags: 0x200000000000000(node=0|zone=2)
[   26.862837] page_type: f5(slab)
[   26.863377] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   26.864167] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   26.864852] page dumped because: kasan: bad access detected
[   26.865450] 
[   26.865669] Memory state around the buggy address:
[   26.866236]  ffff888102a32400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.867017]  ffff888102a32480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.867768] >ffff888102a32500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   26.868468]                                      ^
[   26.868922]  ffff888102a32580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.869689]  ffff888102a32600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.870317] ==================================================================
[   27.678307] ==================================================================
[   27.678803] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1a80/0x5450
[   27.679662] Write of size 8 at addr ffff888102a32530 by task kunit_try_catch/273
[   27.680393] 
[   27.680690] CPU: 0 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241128 #1
[   27.681614] Tainted: [B]=BAD_PAGE, [N]=TEST
[   27.681903] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   27.682700] Call Trace:
[   27.683012]  <TASK>
[   27.683382]  dump_stack_lvl+0x73/0xb0
[   27.683789]  print_report+0xd1/0x640
[   27.684234]  ? __virt_addr_valid+0x1db/0x2d0
[   27.684613]  ? kasan_complete_mode_report_info+0x2a/0x200
[   27.685251]  kasan_report+0x102/0x140
[   27.685706]  ? kasan_atomics_helper+0x1a80/0x5450
[   27.686138]  ? kasan_atomics_helper+0x1a80/0x5450
[   27.686734]  kasan_check_range+0x10c/0x1c0
[   27.687230]  __kasan_check_write+0x18/0x20
[   27.687666]  kasan_atomics_helper+0x1a80/0x5450
[   27.688155]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   27.688755]  ? __kmalloc_cache_noprof+0x184/0x410
[   27.689141]  ? kasan_atomics+0x153/0x310
[   27.689777]  kasan_atomics+0x1dd/0x310
[   27.690243]  ? __pfx_kasan_atomics+0x10/0x10
[   27.690782]  ? __pfx_read_tsc+0x10/0x10
[   27.691191]  ? ktime_get_ts64+0x84/0x230
[   27.691553]  kunit_try_run_case+0x1b3/0x490
[   27.692114]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.692626]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   27.693196]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   27.693642]  ? __kthread_parkme+0x82/0x160
[   27.694033]  ? preempt_count_sub+0x50/0x80
[   27.694546]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.695012]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   27.695577]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.696142]  kthread+0x257/0x310
[   27.696535]  ? __pfx_kthread+0x10/0x10
[   27.696920]  ret_from_fork+0x41/0x80
[   27.697450]  ? __pfx_kthread+0x10/0x10
[   27.697844]  ret_from_fork_asm+0x1a/0x30
[   27.698217]  </TASK>
[   27.698466] 
[   27.698725] Allocated by task 273:
[   27.699217]  kasan_save_stack+0x3d/0x60
[   27.699663]  kasan_save_track+0x18/0x40
[   27.700175]  kasan_save_alloc_info+0x3b/0x50
[   27.700609]  __kasan_kmalloc+0xb7/0xc0
[   27.700953]  __kmalloc_cache_noprof+0x184/0x410
[   27.701456]  kasan_atomics+0x96/0x310
[   27.701909]  kunit_try_run_case+0x1b3/0x490
[   27.702319]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.702810]  kthread+0x257/0x310
[   27.703183]  ret_from_fork+0x41/0x80
[   27.703474]  ret_from_fork_asm+0x1a/0x30
[   27.703760] 
[   27.704003] The buggy address belongs to the object at ffff888102a32500
[   27.704003]  which belongs to the cache kmalloc-64 of size 64
[   27.705421] The buggy address is located 0 bytes to the right of
[   27.705421]  allocated 48-byte region [ffff888102a32500, ffff888102a32530)
[   27.706459] 
[   27.706636] The buggy address belongs to the physical page:
[   27.707127] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a32
[   27.707802] flags: 0x200000000000000(node=0|zone=2)
[   27.708377] page_type: f5(slab)
[   27.708693] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   27.709391] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   27.710026] page dumped because: kasan: bad access detected
[   27.710556] 
[   27.710784] Memory state around the buggy address:
[   27.711152]  ffff888102a32400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.711827]  ffff888102a32480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.712509] >ffff888102a32500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   27.712997]                                      ^
[   27.713626]  ffff888102a32580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.714315]  ffff888102a32600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.714867] ==================================================================
[   25.931697] ==================================================================
[   25.932731] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x566/0x5450
[   25.933855] Write of size 4 at addr ffff888102a32530 by task kunit_try_catch/273
[   25.934896] 
[   25.935547] CPU: 0 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241128 #1
[   25.936770] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.937199] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   25.938081] Call Trace:
[   25.938489]  <TASK>
[   25.938868]  dump_stack_lvl+0x73/0xb0
[   25.939475]  print_report+0xd1/0x640
[   25.939954]  ? __virt_addr_valid+0x1db/0x2d0
[   25.940627]  ? kasan_complete_mode_report_info+0x2a/0x200
[   25.941383]  kasan_report+0x102/0x140
[   25.941896]  ? kasan_atomics_helper+0x566/0x5450
[   25.942549]  ? kasan_atomics_helper+0x566/0x5450
[   25.943118]  kasan_check_range+0x10c/0x1c0
[   25.943678]  __kasan_check_write+0x18/0x20
[   25.944259]  kasan_atomics_helper+0x566/0x5450
[   25.944850]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   25.945443]  ? __kmalloc_cache_noprof+0x184/0x410
[   25.945993]  ? kasan_atomics+0x153/0x310
[   25.946586]  kasan_atomics+0x1dd/0x310
[   25.947047]  ? __pfx_kasan_atomics+0x10/0x10
[   25.947640]  ? __pfx_read_tsc+0x10/0x10
[   25.948263]  ? ktime_get_ts64+0x84/0x230
[   25.948736]  kunit_try_run_case+0x1b3/0x490
[   25.949349]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.949938]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   25.950481]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   25.950947]  ? __kthread_parkme+0x82/0x160
[   25.951648]  ? preempt_count_sub+0x50/0x80
[   25.952237]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.952764]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   25.953559]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.954197]  kthread+0x257/0x310
[   25.954735]  ? __pfx_kthread+0x10/0x10
[   25.955281]  ret_from_fork+0x41/0x80
[   25.955602]  ? __pfx_kthread+0x10/0x10
[   25.955967]  ret_from_fork_asm+0x1a/0x30
[   25.956562]  </TASK>
[   25.956830] 
[   25.957280] Allocated by task 273:
[   25.957728]  kasan_save_stack+0x3d/0x60
[   25.958405]  kasan_save_track+0x18/0x40
[   25.958761]  kasan_save_alloc_info+0x3b/0x50
[   25.959541]  __kasan_kmalloc+0xb7/0xc0
[   25.959869]  __kmalloc_cache_noprof+0x184/0x410
[   25.960617]  kasan_atomics+0x96/0x310
[   25.960909]  kunit_try_run_case+0x1b3/0x490
[   25.961471]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.961988]  kthread+0x257/0x310
[   25.962331]  ret_from_fork+0x41/0x80
[   25.962962]  ret_from_fork_asm+0x1a/0x30
[   25.963582] 
[   25.963771] The buggy address belongs to the object at ffff888102a32500
[   25.963771]  which belongs to the cache kmalloc-64 of size 64
[   25.965153] The buggy address is located 0 bytes to the right of
[   25.965153]  allocated 48-byte region [ffff888102a32500, ffff888102a32530)
[   25.966473] 
[   25.966828] The buggy address belongs to the physical page:
[   25.967363] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a32
[   25.968301] flags: 0x200000000000000(node=0|zone=2)
[   25.968833] page_type: f5(slab)
[   25.969311] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   25.970135] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   25.970876] page dumped because: kasan: bad access detected
[   25.971487] 
[   25.971856] Memory state around the buggy address:
[   25.972436]  ffff888102a32400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.973217]  ffff888102a32480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.974029] >ffff888102a32500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   25.974825]                                      ^
[   25.975359]  ffff888102a32580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.976015]  ffff888102a32600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.976639] ==================================================================
[   25.841975] ==================================================================
[   25.842648] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a1/0x5450
[   25.843461] Write of size 4 at addr ffff888102a32530 by task kunit_try_catch/273
[   25.844367] 
[   25.844710] CPU: 0 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241128 #1
[   25.845818] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.846468] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   25.847368] Call Trace:
[   25.847967]  <TASK>
[   25.848276]  dump_stack_lvl+0x73/0xb0
[   25.848867]  print_report+0xd1/0x640
[   25.849302]  ? __virt_addr_valid+0x1db/0x2d0
[   25.849768]  ? kasan_complete_mode_report_info+0x2a/0x200
[   25.850295]  kasan_report+0x102/0x140
[   25.850798]  ? kasan_atomics_helper+0x4a1/0x5450
[   25.851187]  ? kasan_atomics_helper+0x4a1/0x5450
[   25.851999]  kasan_check_range+0x10c/0x1c0
[   25.852654]  __kasan_check_write+0x18/0x20
[   25.853162]  kasan_atomics_helper+0x4a1/0x5450
[   25.853789]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   25.854435]  ? __kmalloc_cache_noprof+0x184/0x410
[   25.855194]  ? kasan_atomics+0x153/0x310
[   25.855582]  kasan_atomics+0x1dd/0x310
[   25.856190]  ? __pfx_kasan_atomics+0x10/0x10
[   25.856608]  ? __pfx_read_tsc+0x10/0x10
[   25.857252]  ? ktime_get_ts64+0x84/0x230
[   25.857908]  kunit_try_run_case+0x1b3/0x490
[   25.858549]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.859031]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   25.859666]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   25.860315]  ? __kthread_parkme+0x82/0x160
[   25.860769]  ? preempt_count_sub+0x50/0x80
[   25.861467]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.862047]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   25.862790]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.863475]  kthread+0x257/0x310
[   25.863935]  ? __pfx_kthread+0x10/0x10
[   25.864594]  ret_from_fork+0x41/0x80
[   25.865210]  ? __pfx_kthread+0x10/0x10
[   25.865605]  ret_from_fork_asm+0x1a/0x30
[   25.866187]  </TASK>
[   25.866616] 
[   25.866849] Allocated by task 273:
[   25.867451]  kasan_save_stack+0x3d/0x60
[   25.867950]  kasan_save_track+0x18/0x40
[   25.868594]  kasan_save_alloc_info+0x3b/0x50
[   25.869035]  __kasan_kmalloc+0xb7/0xc0
[   25.869710]  __kmalloc_cache_noprof+0x184/0x410
[   25.870297]  kasan_atomics+0x96/0x310
[   25.870758]  kunit_try_run_case+0x1b3/0x490
[   25.871423]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.872135]  kthread+0x257/0x310
[   25.872719]  ret_from_fork+0x41/0x80
[   25.873000]  ret_from_fork_asm+0x1a/0x30
[   25.873803] 
[   25.874021] The buggy address belongs to the object at ffff888102a32500
[   25.874021]  which belongs to the cache kmalloc-64 of size 64
[   25.875542] The buggy address is located 0 bytes to the right of
[   25.875542]  allocated 48-byte region [ffff888102a32500, ffff888102a32530)
[   25.876898] 
[   25.877122] The buggy address belongs to the physical page:
[   25.877730] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a32
[   25.878501] flags: 0x200000000000000(node=0|zone=2)
[   25.878917] page_type: f5(slab)
[   25.879563] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   25.880323] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   25.881150] page dumped because: kasan: bad access detected
[   25.881772] 
[   25.882131] Memory state around the buggy address:
[   25.882651]  ffff888102a32400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.883507]  ffff888102a32480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.884258] >ffff888102a32500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   25.884962]                                      ^
[   25.885489]  ffff888102a32580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.886408]  ffff888102a32600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.887061] ==================================================================
[   25.757868] ==================================================================
[   25.759479] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e0/0x5450
[   25.760504] Read of size 4 at addr ffff888102a32530 by task kunit_try_catch/273
[   25.761509] 
[   25.761823] CPU: 0 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241128 #1
[   25.762632] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.763110] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   25.764156] Call Trace:
[   25.764476]  <TASK>
[   25.764781]  dump_stack_lvl+0x73/0xb0
[   25.765163]  print_report+0xd1/0x640
[   25.765655]  ? __virt_addr_valid+0x1db/0x2d0
[   25.766563]  ? kasan_complete_mode_report_info+0x2a/0x200
[   25.767101]  kasan_report+0x102/0x140
[   25.767746]  ? kasan_atomics_helper+0x3e0/0x5450
[   25.768571]  ? kasan_atomics_helper+0x3e0/0x5450
[   25.769402]  kasan_check_range+0x10c/0x1c0
[   25.770035]  __kasan_check_read+0x15/0x20
[   25.770396]  kasan_atomics_helper+0x3e0/0x5450
[   25.770973]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   25.771486]  ? __kmalloc_cache_noprof+0x184/0x410
[   25.771880]  ? kasan_atomics+0x153/0x310
[   25.772262]  kasan_atomics+0x1dd/0x310
[   25.772934]  ? __pfx_kasan_atomics+0x10/0x10
[   25.773593]  ? __pfx_read_tsc+0x10/0x10
[   25.773972]  ? ktime_get_ts64+0x84/0x230
[   25.774504]  kunit_try_run_case+0x1b3/0x490
[   25.775110]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.775651]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   25.776189]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   25.776752]  ? __kthread_parkme+0x82/0x160
[   25.777294]  ? preempt_count_sub+0x50/0x80
[   25.777762]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.778277]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   25.778793]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.779453]  kthread+0x257/0x310
[   25.779796]  ? __pfx_kthread+0x10/0x10
[   25.780436]  ret_from_fork+0x41/0x80
[   25.780875]  ? __pfx_kthread+0x10/0x10
[   25.781320]  ret_from_fork_asm+0x1a/0x30
[   25.781957]  </TASK>
[   25.782226] 
[   25.782403] Allocated by task 273:
[   25.782871]  kasan_save_stack+0x3d/0x60
[   25.783519]  kasan_save_track+0x18/0x40
[   25.783847]  kasan_save_alloc_info+0x3b/0x50
[   25.784308]  __kasan_kmalloc+0xb7/0xc0
[   25.784772]  __kmalloc_cache_noprof+0x184/0x410
[   25.785301]  kasan_atomics+0x96/0x310
[   25.785804]  kunit_try_run_case+0x1b3/0x490
[   25.786240]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.786599]  kthread+0x257/0x310
[   25.786943]  ret_from_fork+0x41/0x80
[   25.787570]  ret_from_fork_asm+0x1a/0x30
[   25.788200] 
[   25.788417] The buggy address belongs to the object at ffff888102a32500
[   25.788417]  which belongs to the cache kmalloc-64 of size 64
[   25.789440] The buggy address is located 0 bytes to the right of
[   25.789440]  allocated 48-byte region [ffff888102a32500, ffff888102a32530)
[   25.790853] 
[   25.791233] The buggy address belongs to the physical page:
[   25.791731] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a32
[   25.792397] flags: 0x200000000000000(node=0|zone=2)
[   25.793045] page_type: f5(slab)
[   25.793606] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   25.794374] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   25.794960] page dumped because: kasan: bad access detected
[   25.795550] 
[   25.795697] Memory state around the buggy address:
[   25.796355]  ffff888102a32400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.797190]  ffff888102a32480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.797943] >ffff888102a32500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   25.798592]                                      ^
[   25.799235]  ffff888102a32580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.799869]  ffff888102a32600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.800703] ==================================================================
[   26.688987] ==================================================================
[   26.690816] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a38/0x5450
[   26.691801] Read of size 4 at addr ffff888102a32530 by task kunit_try_catch/273
[   26.692329] 
[   26.693199] CPU: 0 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241128 #1
[   26.694278] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.694745] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   26.695737] Call Trace:
[   26.696045]  <TASK>
[   26.696421]  dump_stack_lvl+0x73/0xb0
[   26.697004]  print_report+0xd1/0x640
[   26.697409]  ? __virt_addr_valid+0x1db/0x2d0
[   26.697949]  ? kasan_complete_mode_report_info+0x2a/0x200
[   26.698681]  kasan_report+0x102/0x140
[   26.699423]  ? kasan_atomics_helper+0x4a38/0x5450
[   26.699915]  ? kasan_atomics_helper+0x4a38/0x5450
[   26.700718]  __asan_report_load4_noabort+0x18/0x20
[   26.701848]  kasan_atomics_helper+0x4a38/0x5450
[   26.702391]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   26.703127]  ? __kmalloc_cache_noprof+0x184/0x410
[   26.704136]  ? kasan_atomics+0x153/0x310
[   26.704570]  kasan_atomics+0x1dd/0x310
[   26.705212]  ? __pfx_kasan_atomics+0x10/0x10
[   26.705741]  ? __pfx_read_tsc+0x10/0x10
[   26.706125]  ? ktime_get_ts64+0x84/0x230
[   26.707216]  kunit_try_run_case+0x1b3/0x490
[   26.707648]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.708307]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   26.708806]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   26.709604]  ? __kthread_parkme+0x82/0x160
[   26.710035]  ? preempt_count_sub+0x50/0x80
[   26.711360]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.711830]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   26.712547]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.713480]  kthread+0x257/0x310
[   26.714011]  ? __pfx_kthread+0x10/0x10
[   26.714578]  ret_from_fork+0x41/0x80
[   26.714979]  ? __pfx_kthread+0x10/0x10
[   26.715768]  ret_from_fork_asm+0x1a/0x30
[   26.716629]  </TASK>
[   26.716872] 
[   26.717012] Allocated by task 273:
[   26.717872]  kasan_save_stack+0x3d/0x60
[   26.718429]  kasan_save_track+0x18/0x40
[   26.718840]  kasan_save_alloc_info+0x3b/0x50
[   26.719764]  __kasan_kmalloc+0xb7/0xc0
[   26.720906]  __kmalloc_cache_noprof+0x184/0x410
[   26.721381]  kasan_atomics+0x96/0x310
[   26.721800]  kunit_try_run_case+0x1b3/0x490
[   26.722264]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.722922]  kthread+0x257/0x310
[   26.723193]  ret_from_fork+0x41/0x80
[   26.723707]  ret_from_fork_asm+0x1a/0x30
[   26.724179] 
[   26.724536] The buggy address belongs to the object at ffff888102a32500
[   26.724536]  which belongs to the cache kmalloc-64 of size 64
[   26.725186] The buggy address is located 0 bytes to the right of
[   26.725186]  allocated 48-byte region [ffff888102a32500, ffff888102a32530)
[   26.727074] 
[   26.727403] The buggy address belongs to the physical page:
[   26.727942] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a32
[   26.729233] flags: 0x200000000000000(node=0|zone=2)
[   26.730299] page_type: f5(slab)
[   26.730734] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   26.731759] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   26.732393] page dumped because: kasan: bad access detected
[   26.732882] 
[   26.733111] Memory state around the buggy address:
[   26.733631]  ffff888102a32400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.734387]  ffff888102a32480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.735023] >ffff888102a32500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   26.735676]                                      ^
[   26.736302]  ffff888102a32580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.736915]  ffff888102a32600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.737677] ==================================================================
[   27.043954] ==================================================================
[   27.044641] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x49d0/0x5450
[   27.045325] Read of size 4 at addr ffff888102a32530 by task kunit_try_catch/273
[   27.047012] 
[   27.047366] CPU: 0 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241128 #1
[   27.047967] Tainted: [B]=BAD_PAGE, [N]=TEST
[   27.048593] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   27.049374] Call Trace:
[   27.049793]  <TASK>
[   27.050178]  dump_stack_lvl+0x73/0xb0
[   27.050599]  print_report+0xd1/0x640
[   27.051251]  ? __virt_addr_valid+0x1db/0x2d0
[   27.051868]  ? kasan_complete_mode_report_info+0x2a/0x200
[   27.052617]  kasan_report+0x102/0x140
[   27.053016]  ? kasan_atomics_helper+0x49d0/0x5450
[   27.053664]  ? kasan_atomics_helper+0x49d0/0x5450
[   27.054312]  __asan_report_load4_noabort+0x18/0x20
[   27.054928]  kasan_atomics_helper+0x49d0/0x5450
[   27.055487]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   27.055937]  ? __kmalloc_cache_noprof+0x184/0x410
[   27.056627]  ? kasan_atomics+0x153/0x310
[   27.057010]  kasan_atomics+0x1dd/0x310
[   27.057552]  ? __pfx_kasan_atomics+0x10/0x10
[   27.058184]  ? __pfx_read_tsc+0x10/0x10
[   27.058705]  ? ktime_get_ts64+0x84/0x230
[   27.059307]  kunit_try_run_case+0x1b3/0x490
[   27.059912]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.060673]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   27.061282]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   27.061855]  ? __kthread_parkme+0x82/0x160
[   27.062391]  ? preempt_count_sub+0x50/0x80
[   27.062857]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.063396]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   27.063921]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.064563]  kthread+0x257/0x310
[   27.064899]  ? __pfx_kthread+0x10/0x10
[   27.065457]  ret_from_fork+0x41/0x80
[   27.065885]  ? __pfx_kthread+0x10/0x10
[   27.066404]  ret_from_fork_asm+0x1a/0x30
[   27.066872]  </TASK>
[   27.067229] 
[   27.067556] Allocated by task 273:
[   27.067989]  kasan_save_stack+0x3d/0x60
[   27.068526]  kasan_save_track+0x18/0x40
[   27.068953]  kasan_save_alloc_info+0x3b/0x50
[   27.069582]  __kasan_kmalloc+0xb7/0xc0
[   27.069983]  __kmalloc_cache_noprof+0x184/0x410
[   27.070585]  kasan_atomics+0x96/0x310
[   27.071185]  kunit_try_run_case+0x1b3/0x490
[   27.071723]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.072370]  kthread+0x257/0x310
[   27.072768]  ret_from_fork+0x41/0x80
[   27.073234]  ret_from_fork_asm+0x1a/0x30
[   27.073750] 
[   27.073923] The buggy address belongs to the object at ffff888102a32500
[   27.073923]  which belongs to the cache kmalloc-64 of size 64
[   27.075059] The buggy address is located 0 bytes to the right of
[   27.075059]  allocated 48-byte region [ffff888102a32500, ffff888102a32530)
[   27.076390] 
[   27.076698] The buggy address belongs to the physical page:
[   27.077126] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a32
[   27.077988] flags: 0x200000000000000(node=0|zone=2)
[   27.078516] page_type: f5(slab)
[   27.079008] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   27.079660] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   27.080487] page dumped because: kasan: bad access detected
[   27.080960] 
[   27.081192] Memory state around the buggy address:
[   27.081703]  ffff888102a32400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.082510]  ffff888102a32480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.083150] >ffff888102a32500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   27.083878]                                      ^
[   27.084508]  ffff888102a32580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.085173]  ffff888102a32600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.085628] ==================================================================
[   26.064962] ==================================================================
[   26.065949] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x730/0x5450
[   26.068293] Write of size 4 at addr ffff888102a32530 by task kunit_try_catch/273
[   26.069275] 
[   26.069639] CPU: 0 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241128 #1
[   26.070833] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.071320] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   26.072235] Call Trace:
[   26.072568]  <TASK>
[   26.072884]  dump_stack_lvl+0x73/0xb0
[   26.073354]  print_report+0xd1/0x640
[   26.073753]  ? __virt_addr_valid+0x1db/0x2d0
[   26.074160]  ? kasan_complete_mode_report_info+0x2a/0x200
[   26.074888]  kasan_report+0x102/0x140
[   26.075312]  ? kasan_atomics_helper+0x730/0x5450
[   26.075626]  ? kasan_atomics_helper+0x730/0x5450
[   26.075925]  kasan_check_range+0x10c/0x1c0
[   26.076396]  __kasan_check_write+0x18/0x20
[   26.076697]  kasan_atomics_helper+0x730/0x5450
[   26.077328]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   26.077989]  ? __kmalloc_cache_noprof+0x184/0x410
[   26.078448]  ? kasan_atomics+0x153/0x310
[   26.078869]  kasan_atomics+0x1dd/0x310
[   26.079520]  ? __pfx_kasan_atomics+0x10/0x10
[   26.080158]  ? __pfx_read_tsc+0x10/0x10
[   26.080576]  ? ktime_get_ts64+0x84/0x230
[   26.081147]  kunit_try_run_case+0x1b3/0x490
[   26.081731]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.082231]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   26.082676]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   26.084295]  ? __kthread_parkme+0x82/0x160
[   26.084727]  ? preempt_count_sub+0x50/0x80
[   26.085173]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.085646]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   26.086143]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.086723]  kthread+0x257/0x310
[   26.087116]  ? __pfx_kthread+0x10/0x10
[   26.087591]  ret_from_fork+0x41/0x80
[   26.087959]  ? __pfx_kthread+0x10/0x10
[   26.088462]  ret_from_fork_asm+0x1a/0x30
[   26.088828]  </TASK>
[   26.089121] 
[   26.089368] Allocated by task 273:
[   26.089800]  kasan_save_stack+0x3d/0x60
[   26.090178]  kasan_save_track+0x18/0x40
[   26.090631]  kasan_save_alloc_info+0x3b/0x50
[   26.091118]  __kasan_kmalloc+0xb7/0xc0
[   26.091431]  __kmalloc_cache_noprof+0x184/0x410
[   26.091949]  kasan_atomics+0x96/0x310
[   26.092475]  kunit_try_run_case+0x1b3/0x490
[   26.092936]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.093508]  kthread+0x257/0x310
[   26.093795]  ret_from_fork+0x41/0x80
[   26.094323]  ret_from_fork_asm+0x1a/0x30
[   26.094747] 
[   26.094909] The buggy address belongs to the object at ffff888102a32500
[   26.094909]  which belongs to the cache kmalloc-64 of size 64
[   26.095971] The buggy address is located 0 bytes to the right of
[   26.095971]  allocated 48-byte region [ffff888102a32500, ffff888102a32530)
[   26.097130] 
[   26.097310] The buggy address belongs to the physical page:
[   26.097860] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a32
[   26.098570] flags: 0x200000000000000(node=0|zone=2)
[   26.098894] page_type: f5(slab)
[   26.099434] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   26.100196] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   26.100942] page dumped because: kasan: bad access detected
[   26.101485] 
[   26.101728] Memory state around the buggy address:
[   26.102227]  ffff888102a32400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.102762]  ffff888102a32480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.103429] >ffff888102a32500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   26.104023]                                      ^
[   26.104487]  ffff888102a32580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.105271]  ffff888102a32600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.105720] ==================================================================
[   27.087039] ==================================================================
[   27.087805] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x13b6/0x5450
[   27.088667] Read of size 8 at addr ffff888102a32530 by task kunit_try_catch/273
[   27.089401] 
[   27.089721] CPU: 0 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241128 #1
[   27.090594] Tainted: [B]=BAD_PAGE, [N]=TEST
[   27.091235] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   27.092386] Call Trace:
[   27.092607]  <TASK>
[   27.092800]  dump_stack_lvl+0x73/0xb0
[   27.093246]  print_report+0xd1/0x640
[   27.093688]  ? __virt_addr_valid+0x1db/0x2d0
[   27.094146]  ? kasan_complete_mode_report_info+0x2a/0x200
[   27.096011]  kasan_report+0x102/0x140
[   27.096777]  ? kasan_atomics_helper+0x13b6/0x5450
[   27.097152]  ? kasan_atomics_helper+0x13b6/0x5450
[   27.097696]  kasan_check_range+0x10c/0x1c0
[   27.098143]  __kasan_check_read+0x15/0x20
[   27.098622]  kasan_atomics_helper+0x13b6/0x5450
[   27.099024]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   27.099576]  ? __kmalloc_cache_noprof+0x184/0x410
[   27.099957]  ? kasan_atomics+0x153/0x310
[   27.100479]  kasan_atomics+0x1dd/0x310
[   27.100813]  ? __pfx_kasan_atomics+0x10/0x10
[   27.101423]  ? __pfx_read_tsc+0x10/0x10
[   27.101836]  ? ktime_get_ts64+0x84/0x230
[   27.102371]  kunit_try_run_case+0x1b3/0x490
[   27.102743]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.103372]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   27.103818]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   27.104281]  ? __kthread_parkme+0x82/0x160
[   27.104832]  ? preempt_count_sub+0x50/0x80
[   27.105425]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.105811]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   27.106430]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.106894]  kthread+0x257/0x310
[   27.107400]  ? __pfx_kthread+0x10/0x10
[   27.107771]  ret_from_fork+0x41/0x80
[   27.108265]  ? __pfx_kthread+0x10/0x10
[   27.108643]  ret_from_fork_asm+0x1a/0x30
[   27.109210]  </TASK>
[   27.109511] 
[   27.109686] Allocated by task 273:
[   27.110162]  kasan_save_stack+0x3d/0x60
[   27.110654]  kasan_save_track+0x18/0x40
[   27.110934]  kasan_save_alloc_info+0x3b/0x50
[   27.111489]  __kasan_kmalloc+0xb7/0xc0
[   27.111773]  __kmalloc_cache_noprof+0x184/0x410
[   27.112395]  kasan_atomics+0x96/0x310
[   27.112761]  kunit_try_run_case+0x1b3/0x490
[   27.113291]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.113816]  kthread+0x257/0x310
[   27.115141]  ret_from_fork+0x41/0x80
[   27.115542]  ret_from_fork_asm+0x1a/0x30
[   27.115795] 
[   27.115896] The buggy address belongs to the object at ffff888102a32500
[   27.115896]  which belongs to the cache kmalloc-64 of size 64
[   27.117407] The buggy address is located 0 bytes to the right of
[   27.117407]  allocated 48-byte region [ffff888102a32500, ffff888102a32530)
[   27.119614] 
[   27.119784] The buggy address belongs to the physical page:
[   27.120708] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a32
[   27.121630] flags: 0x200000000000000(node=0|zone=2)
[   27.122153] page_type: f5(slab)
[   27.122694] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   27.123352] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   27.123995] page dumped because: kasan: bad access detected
[   27.124627] 
[   27.124864] Memory state around the buggy address:
[   27.125638]  ffff888102a32400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.126581]  ffff888102a32480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.127452] >ffff888102a32500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   27.128201]                                      ^
[   27.128545]  ffff888102a32580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.129510]  ffff888102a32600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.130273] ==================================================================
[   26.146518] ==================================================================
[   26.147667] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x861/0x5450
[   26.148324] Write of size 4 at addr ffff888102a32530 by task kunit_try_catch/273
[   26.148767] 
[   26.148948] CPU: 0 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241128 #1
[   26.150123] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.150627] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   26.151419] Call Trace:
[   26.151637]  <TASK>
[   26.151838]  dump_stack_lvl+0x73/0xb0
[   26.152207]  print_report+0xd1/0x640
[   26.152687]  ? __virt_addr_valid+0x1db/0x2d0
[   26.153274]  ? kasan_complete_mode_report_info+0x2a/0x200
[   26.153952]  kasan_report+0x102/0x140
[   26.154492]  ? kasan_atomics_helper+0x861/0x5450
[   26.154856]  ? kasan_atomics_helper+0x861/0x5450
[   26.155475]  kasan_check_range+0x10c/0x1c0
[   26.155863]  __kasan_check_write+0x18/0x20
[   26.156351]  kasan_atomics_helper+0x861/0x5450
[   26.156726]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   26.157205]  ? __kmalloc_cache_noprof+0x184/0x410
[   26.157792]  ? kasan_atomics+0x153/0x310
[   26.158326]  kasan_atomics+0x1dd/0x310
[   26.158676]  ? __pfx_kasan_atomics+0x10/0x10
[   26.159049]  ? __pfx_read_tsc+0x10/0x10
[   26.159611]  ? ktime_get_ts64+0x84/0x230
[   26.160047]  kunit_try_run_case+0x1b3/0x490
[   26.160513]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.161053]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   26.161618]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   26.162115]  ? __kthread_parkme+0x82/0x160
[   26.162642]  ? preempt_count_sub+0x50/0x80
[   26.163143]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.163627]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   26.164274]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.164710]  kthread+0x257/0x310
[   26.164984]  ? __pfx_kthread+0x10/0x10
[   26.165571]  ret_from_fork+0x41/0x80
[   26.166004]  ? __pfx_kthread+0x10/0x10
[   26.166359]  ret_from_fork_asm+0x1a/0x30
[   26.166880]  </TASK>
[   26.167234] 
[   26.167483] Allocated by task 273:
[   26.167866]  kasan_save_stack+0x3d/0x60
[   26.168219]  kasan_save_track+0x18/0x40
[   26.168696]  kasan_save_alloc_info+0x3b/0x50
[   26.169207]  __kasan_kmalloc+0xb7/0xc0
[   26.169731]  __kmalloc_cache_noprof+0x184/0x410
[   26.170041]  kasan_atomics+0x96/0x310
[   26.170413]  kunit_try_run_case+0x1b3/0x490
[   26.170879]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.171556]  kthread+0x257/0x310
[   26.171842]  ret_from_fork+0x41/0x80
[   26.172323]  ret_from_fork_asm+0x1a/0x30
[   26.172727] 
[   26.172961] The buggy address belongs to the object at ffff888102a32500
[   26.172961]  which belongs to the cache kmalloc-64 of size 64
[   26.173834] The buggy address is located 0 bytes to the right of
[   26.173834]  allocated 48-byte region [ffff888102a32500, ffff888102a32530)
[   26.174914] 
[   26.175220] The buggy address belongs to the physical page:
[   26.175879] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a32
[   26.176526] flags: 0x200000000000000(node=0|zone=2)
[   26.178168] page_type: f5(slab)
[   26.178598] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   26.179198] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   26.179841] page dumped because: kasan: bad access detected
[   26.180412] 
[   26.180635] Memory state around the buggy address:
[   26.181111]  ffff888102a32400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.181756]  ffff888102a32480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.182437] >ffff888102a32500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   26.183038]                                      ^
[   26.183530]  ffff888102a32580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.184000]  ffff888102a32600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.184792] ==================================================================
[   28.385390] ==================================================================
[   28.387284] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x5117/0x5450
[   28.388193] Read of size 8 at addr ffff888102a32530 by task kunit_try_catch/273
[   28.388618] 
[   28.389521] CPU: 0 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241128 #1
[   28.390221] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.390646] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   28.391487] Call Trace:
[   28.391724]  <TASK>
[   28.391926]  dump_stack_lvl+0x73/0xb0
[   28.392597]  print_report+0xd1/0x640
[   28.393079]  ? __virt_addr_valid+0x1db/0x2d0
[   28.393719]  ? kasan_complete_mode_report_info+0x2a/0x200
[   28.394566]  kasan_report+0x102/0x140
[   28.395346]  ? kasan_atomics_helper+0x5117/0x5450
[   28.395763]  ? kasan_atomics_helper+0x5117/0x5450
[   28.396203]  __asan_report_load8_noabort+0x18/0x20
[   28.396634]  kasan_atomics_helper+0x5117/0x5450
[   28.397048]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   28.397608]  ? __kmalloc_cache_noprof+0x184/0x410
[   28.398022]  ? kasan_atomics+0x153/0x310
[   28.398500]  kasan_atomics+0x1dd/0x310
[   28.398839]  ? __pfx_kasan_atomics+0x10/0x10
[   28.399369]  ? __pfx_read_tsc+0x10/0x10
[   28.400008]  ? ktime_get_ts64+0x84/0x230
[   28.400948]  kunit_try_run_case+0x1b3/0x490
[   28.401709]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.402032]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   28.402659]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   28.403531]  ? __kthread_parkme+0x82/0x160
[   28.403967]  ? preempt_count_sub+0x50/0x80
[   28.404632]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.404999]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   28.405632]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.406300]  kthread+0x257/0x310
[   28.406789]  ? __pfx_kthread+0x10/0x10
[   28.407215]  ret_from_fork+0x41/0x80
[   28.407698]  ? __pfx_kthread+0x10/0x10
[   28.408140]  ret_from_fork_asm+0x1a/0x30
[   28.408634]  </TASK>
[   28.408951] 
[   28.409263] Allocated by task 273:
[   28.409586]  kasan_save_stack+0x3d/0x60
[   28.410145]  kasan_save_track+0x18/0x40
[   28.410517]  kasan_save_alloc_info+0x3b/0x50
[   28.411045]  __kasan_kmalloc+0xb7/0xc0
[   28.411484]  __kmalloc_cache_noprof+0x184/0x410
[   28.412005]  kasan_atomics+0x96/0x310
[   28.412425]  kunit_try_run_case+0x1b3/0x490
[   28.412854]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.413628]  kthread+0x257/0x310
[   28.414049]  ret_from_fork+0x41/0x80
[   28.414600]  ret_from_fork_asm+0x1a/0x30
[   28.414998] 
[   28.415303] The buggy address belongs to the object at ffff888102a32500
[   28.415303]  which belongs to the cache kmalloc-64 of size 64
[   28.416510] The buggy address is located 0 bytes to the right of
[   28.416510]  allocated 48-byte region [ffff888102a32500, ffff888102a32530)
[   28.417637] 
[   28.417901] The buggy address belongs to the physical page:
[   28.418633] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a32
[   28.419444] flags: 0x200000000000000(node=0|zone=2)
[   28.419919] page_type: f5(slab)
[   28.420291] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   28.421019] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   28.421809] page dumped because: kasan: bad access detected
[   28.422480] 
[   28.422695] Memory state around the buggy address:
[   28.423242]  ffff888102a32400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.423952]  ffff888102a32480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.424701] >ffff888102a32500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   28.425460]                                      ^
[   28.425883]  ffff888102a32580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.426551]  ffff888102a32600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.427102] ==================================================================
[   26.309816] ==================================================================
[   26.310613] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xac8/0x5450
[   26.311237] Write of size 4 at addr ffff888102a32530 by task kunit_try_catch/273
[   26.311842] 
[   26.312124] CPU: 0 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241128 #1
[   26.312932] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.313376] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   26.314114] Call Trace:
[   26.314407]  <TASK>
[   26.314724]  dump_stack_lvl+0x73/0xb0
[   26.315142]  print_report+0xd1/0x640
[   26.315622]  ? __virt_addr_valid+0x1db/0x2d0
[   26.315942]  ? kasan_complete_mode_report_info+0x2a/0x200
[   26.316474]  kasan_report+0x102/0x140
[   26.316772]  ? kasan_atomics_helper+0xac8/0x5450
[   26.317389]  ? kasan_atomics_helper+0xac8/0x5450
[   26.318001]  kasan_check_range+0x10c/0x1c0
[   26.318469]  __kasan_check_write+0x18/0x20
[   26.318958]  kasan_atomics_helper+0xac8/0x5450
[   26.319409]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   26.319934]  ? __kmalloc_cache_noprof+0x184/0x410
[   26.320405]  ? kasan_atomics+0x153/0x310
[   26.320836]  kasan_atomics+0x1dd/0x310
[   26.321356]  ? __pfx_kasan_atomics+0x10/0x10
[   26.321774]  ? __pfx_read_tsc+0x10/0x10
[   26.322303]  ? ktime_get_ts64+0x84/0x230
[   26.322734]  kunit_try_run_case+0x1b3/0x490
[   26.323146]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.323653]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   26.324137]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   26.324591]  ? __kthread_parkme+0x82/0x160
[   26.325021]  ? preempt_count_sub+0x50/0x80
[   26.325424]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.325952]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   26.326661]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.327260]  kthread+0x257/0x310
[   26.327705]  ? __pfx_kthread+0x10/0x10
[   26.328060]  ret_from_fork+0x41/0x80
[   26.328589]  ? __pfx_kthread+0x10/0x10
[   26.328975]  ret_from_fork_asm+0x1a/0x30
[   26.329420]  </TASK>
[   26.329670] 
[   26.329913] Allocated by task 273:
[   26.330299]  kasan_save_stack+0x3d/0x60
[   26.330712]  kasan_save_track+0x18/0x40
[   26.331187]  kasan_save_alloc_info+0x3b/0x50
[   26.331534]  __kasan_kmalloc+0xb7/0xc0
[   26.331811]  __kmalloc_cache_noprof+0x184/0x410
[   26.332227]  kasan_atomics+0x96/0x310
[   26.332679]  kunit_try_run_case+0x1b3/0x490
[   26.333860]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.334805]  kthread+0x257/0x310
[   26.335618]  ret_from_fork+0x41/0x80
[   26.336111]  ret_from_fork_asm+0x1a/0x30
[   26.336565] 
[   26.336745] The buggy address belongs to the object at ffff888102a32500
[   26.336745]  which belongs to the cache kmalloc-64 of size 64
[   26.337811] The buggy address is located 0 bytes to the right of
[   26.337811]  allocated 48-byte region [ffff888102a32500, ffff888102a32530)
[   26.338843] 
[   26.339047] The buggy address belongs to the physical page:
[   26.339441] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a32
[   26.340282] flags: 0x200000000000000(node=0|zone=2)
[   26.340715] page_type: f5(slab)
[   26.341121] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   26.341912] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   26.342581] page dumped because: kasan: bad access detected
[   26.343041] 
[   26.343314] Memory state around the buggy address:
[   26.343804]  ffff888102a32400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.344410]  ffff888102a32480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.345175] >ffff888102a32500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   26.345733]                                      ^
[   26.346243]  ffff888102a32580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.346917]  ffff888102a32600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.347522] ==================================================================
[   26.957026] ==================================================================
[   26.958115] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x49ea/0x5450
[   26.959396] Read of size 4 at addr ffff888102a32530 by task kunit_try_catch/273
[   26.960093] 
[   26.960229] CPU: 0 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241128 #1
[   26.960946] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.961239] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   26.962215] Call Trace:
[   26.962731]  <TASK>
[   26.963106]  dump_stack_lvl+0x73/0xb0
[   26.963622]  print_report+0xd1/0x640
[   26.964111]  ? __virt_addr_valid+0x1db/0x2d0
[   26.964725]  ? kasan_complete_mode_report_info+0x2a/0x200
[   26.965086]  kasan_report+0x102/0x140
[   26.965657]  ? kasan_atomics_helper+0x49ea/0x5450
[   26.966369]  ? kasan_atomics_helper+0x49ea/0x5450
[   26.966860]  __asan_report_load4_noabort+0x18/0x20
[   26.967720]  kasan_atomics_helper+0x49ea/0x5450
[   26.968393]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   26.968949]  ? __kmalloc_cache_noprof+0x184/0x410
[   26.969512]  ? kasan_atomics+0x153/0x310
[   26.970028]  kasan_atomics+0x1dd/0x310
[   26.970585]  ? __pfx_kasan_atomics+0x10/0x10
[   26.971009]  ? __pfx_read_tsc+0x10/0x10
[   26.971538]  ? ktime_get_ts64+0x84/0x230
[   26.972144]  kunit_try_run_case+0x1b3/0x490
[   26.972808]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.973291]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   26.973807]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   26.974361]  ? __kthread_parkme+0x82/0x160
[   26.974948]  ? preempt_count_sub+0x50/0x80
[   26.975386]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.975878]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   26.976597]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.977170]  kthread+0x257/0x310
[   26.977587]  ? __pfx_kthread+0x10/0x10
[   26.978133]  ret_from_fork+0x41/0x80
[   26.978536]  ? __pfx_kthread+0x10/0x10
[   26.979065]  ret_from_fork_asm+0x1a/0x30
[   26.979613]  </TASK>
[   26.979920] 
[   26.980250] Allocated by task 273:
[   26.980671]  kasan_save_stack+0x3d/0x60
[   26.981172]  kasan_save_track+0x18/0x40
[   26.981747]  kasan_save_alloc_info+0x3b/0x50
[   26.982325]  __kasan_kmalloc+0xb7/0xc0
[   26.982825]  __kmalloc_cache_noprof+0x184/0x410
[   26.983237]  kasan_atomics+0x96/0x310
[   26.983790]  kunit_try_run_case+0x1b3/0x490
[   26.984267]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.984826]  kthread+0x257/0x310
[   26.985402]  ret_from_fork+0x41/0x80
[   26.985776]  ret_from_fork_asm+0x1a/0x30
[   26.986230] 
[   26.986538] The buggy address belongs to the object at ffff888102a32500
[   26.986538]  which belongs to the cache kmalloc-64 of size 64
[   26.987520] The buggy address is located 0 bytes to the right of
[   26.987520]  allocated 48-byte region [ffff888102a32500, ffff888102a32530)
[   26.988529] 
[   26.988769] The buggy address belongs to the physical page:
[   26.989422] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a32
[   26.990202] flags: 0x200000000000000(node=0|zone=2)
[   26.990718] page_type: f5(slab)
[   26.991226] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   26.992023] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   26.992802] page dumped because: kasan: bad access detected
[   26.993362] 
[   26.993617] Memory state around the buggy address:
[   26.994154]  ffff888102a32400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.994813]  ffff888102a32480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.995528] >ffff888102a32500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   26.996380]                                      ^
[   26.996905]  ffff888102a32580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.997575]  ffff888102a32600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.998311] ==================================================================
[   27.796499] ==================================================================
[   27.797740] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4f32/0x5450
[   27.799006] Read of size 8 at addr ffff888102a32530 by task kunit_try_catch/273
[   27.799578] 
[   27.799887] CPU: 0 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241128 #1
[   27.800730] Tainted: [B]=BAD_PAGE, [N]=TEST
[   27.801188] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   27.801882] Call Trace:
[   27.802274]  <TASK>
[   27.802521]  dump_stack_lvl+0x73/0xb0
[   27.802964]  print_report+0xd1/0x640
[   27.803309]  ? __virt_addr_valid+0x1db/0x2d0
[   27.803649]  ? kasan_complete_mode_report_info+0x2a/0x200
[   27.804105]  kasan_report+0x102/0x140
[   27.804580]  ? kasan_atomics_helper+0x4f32/0x5450
[   27.805222]  ? kasan_atomics_helper+0x4f32/0x5450
[   27.805818]  __asan_report_load8_noabort+0x18/0x20
[   27.806444]  kasan_atomics_helper+0x4f32/0x5450
[   27.806980]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   27.807559]  ? __kmalloc_cache_noprof+0x184/0x410
[   27.807982]  ? kasan_atomics+0x153/0x310
[   27.808350]  kasan_atomics+0x1dd/0x310
[   27.808647]  ? __pfx_kasan_atomics+0x10/0x10
[   27.808962]  ? __pfx_read_tsc+0x10/0x10
[   27.809249]  ? ktime_get_ts64+0x84/0x230
[   27.809751]  kunit_try_run_case+0x1b3/0x490
[   27.810271]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.810885]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   27.811520]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   27.812125]  ? __kthread_parkme+0x82/0x160
[   27.812480]  ? preempt_count_sub+0x50/0x80
[   27.812783]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.813163]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   27.813785]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.814535]  kthread+0x257/0x310
[   27.814966]  ? __pfx_kthread+0x10/0x10
[   27.815546]  ret_from_fork+0x41/0x80
[   27.816004]  ? __pfx_kthread+0x10/0x10
[   27.816372]  ret_from_fork_asm+0x1a/0x30
[   27.816852]  </TASK>
[   27.817208] 
[   27.817438] Allocated by task 273:
[   27.817782]  kasan_save_stack+0x3d/0x60
[   27.818186]  kasan_save_track+0x18/0x40
[   27.818585]  kasan_save_alloc_info+0x3b/0x50
[   27.818991]  __kasan_kmalloc+0xb7/0xc0
[   27.819490]  __kmalloc_cache_noprof+0x184/0x410
[   27.819899]  kasan_atomics+0x96/0x310
[   27.820306]  kunit_try_run_case+0x1b3/0x490
[   27.820722]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.821263]  kthread+0x257/0x310
[   27.821697]  ret_from_fork+0x41/0x80
[   27.822038]  ret_from_fork_asm+0x1a/0x30
[   27.822422] 
[   27.822581] The buggy address belongs to the object at ffff888102a32500
[   27.822581]  which belongs to the cache kmalloc-64 of size 64
[   27.823629] The buggy address is located 0 bytes to the right of
[   27.823629]  allocated 48-byte region [ffff888102a32500, ffff888102a32530)
[   27.824358] 
[   27.824622] The buggy address belongs to the physical page:
[   27.825307] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a32
[   27.826273] flags: 0x200000000000000(node=0|zone=2)
[   27.826620] page_type: f5(slab)
[   27.826866] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   27.827751] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   27.828625] page dumped because: kasan: bad access detected
[   27.829042] 
[   27.829314] Memory state around the buggy address:
[   27.829765]  ffff888102a32400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.830436]  ffff888102a32480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.830945] >ffff888102a32500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   27.831521]                                      ^
[   27.831831]  ffff888102a32580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.832293]  ffff888102a32600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.832831] ==================================================================
[   28.089373] ==================================================================
[   28.090248] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x2007/0x5450
[   28.090779] Write of size 8 at addr ffff888102a32530 by task kunit_try_catch/273
[   28.091536] 
[   28.091749] CPU: 0 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241128 #1
[   28.092554] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.093046] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   28.093744] Call Trace:
[   28.094118]  <TASK>
[   28.094798]  dump_stack_lvl+0x73/0xb0
[   28.095378]  print_report+0xd1/0x640
[   28.095758]  ? __virt_addr_valid+0x1db/0x2d0
[   28.096114]  ? kasan_complete_mode_report_info+0x2a/0x200
[   28.096495]  kasan_report+0x102/0x140
[   28.096961]  ? kasan_atomics_helper+0x2007/0x5450
[   28.097648]  ? kasan_atomics_helper+0x2007/0x5450
[   28.098246]  kasan_check_range+0x10c/0x1c0
[   28.098643]  __kasan_check_write+0x18/0x20
[   28.098936]  kasan_atomics_helper+0x2007/0x5450
[   28.099529]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   28.100145]  ? __kmalloc_cache_noprof+0x184/0x410
[   28.100739]  ? kasan_atomics+0x153/0x310
[   28.101112]  kasan_atomics+0x1dd/0x310
[   28.101427]  ? __pfx_kasan_atomics+0x10/0x10
[   28.101974]  ? __pfx_read_tsc+0x10/0x10
[   28.102551]  ? ktime_get_ts64+0x84/0x230
[   28.103114]  kunit_try_run_case+0x1b3/0x490
[   28.103576]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.104006]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   28.104525]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   28.104929]  ? __kthread_parkme+0x82/0x160
[   28.105443]  ? preempt_count_sub+0x50/0x80
[   28.105929]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.106324]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   28.106778]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.107488]  kthread+0x257/0x310
[   28.107937]  ? __pfx_kthread+0x10/0x10
[   28.108465]  ret_from_fork+0x41/0x80
[   28.108789]  ? __pfx_kthread+0x10/0x10
[   28.109266]  ret_from_fork_asm+0x1a/0x30
[   28.109692]  </TASK>
[   28.109919] 
[   28.110210] Allocated by task 273:
[   28.110477]  kasan_save_stack+0x3d/0x60
[   28.110904]  kasan_save_track+0x18/0x40
[   28.111385]  kasan_save_alloc_info+0x3b/0x50
[   28.111690]  __kasan_kmalloc+0xb7/0xc0
[   28.112200]  __kmalloc_cache_noprof+0x184/0x410
[   28.112735]  kasan_atomics+0x96/0x310
[   28.113223]  kunit_try_run_case+0x1b3/0x490
[   28.113543]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.114254]  kthread+0x257/0x310
[   28.114588]  ret_from_fork+0x41/0x80
[   28.114874]  ret_from_fork_asm+0x1a/0x30
[   28.115355] 
[   28.115612] The buggy address belongs to the object at ffff888102a32500
[   28.115612]  which belongs to the cache kmalloc-64 of size 64
[   28.116386] The buggy address is located 0 bytes to the right of
[   28.116386]  allocated 48-byte region [ffff888102a32500, ffff888102a32530)
[   28.117717] 
[   28.117985] The buggy address belongs to the physical page:
[   28.118523] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a32
[   28.119297] flags: 0x200000000000000(node=0|zone=2)
[   28.119762] page_type: f5(slab)
[   28.120149] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   28.120786] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   28.121507] page dumped because: kasan: bad access detected
[   28.122000] 
[   28.122224] Memory state around the buggy address:
[   28.122651]  ffff888102a32400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.123294]  ffff888102a32480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.123877] >ffff888102a32500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   28.124420]                                      ^
[   28.124726]  ffff888102a32580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.125528]  ffff888102a32600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.126061] ==================================================================
[   28.339619] ==================================================================
[   28.340476] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x224d/0x5450
[   28.341704] Write of size 8 at addr ffff888102a32530 by task kunit_try_catch/273
[   28.342724] 
[   28.343129] CPU: 0 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241128 #1
[   28.345325] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.346012] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   28.346897] Call Trace:
[   28.347224]  <TASK>
[   28.347509]  dump_stack_lvl+0x73/0xb0
[   28.347976]  print_report+0xd1/0x640
[   28.348458]  ? __virt_addr_valid+0x1db/0x2d0
[   28.348991]  ? kasan_complete_mode_report_info+0x2a/0x200
[   28.349457]  kasan_report+0x102/0x140
[   28.349918]  ? kasan_atomics_helper+0x224d/0x5450
[   28.350635]  ? kasan_atomics_helper+0x224d/0x5450
[   28.351190]  kasan_check_range+0x10c/0x1c0
[   28.351611]  __kasan_check_write+0x18/0x20
[   28.352261]  kasan_atomics_helper+0x224d/0x5450
[   28.352901]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   28.353405]  ? __kmalloc_cache_noprof+0x184/0x410
[   28.353840]  ? kasan_atomics+0x153/0x310
[   28.354245]  kasan_atomics+0x1dd/0x310
[   28.354705]  ? __pfx_kasan_atomics+0x10/0x10
[   28.355041]  ? __pfx_read_tsc+0x10/0x10
[   28.355370]  ? ktime_get_ts64+0x84/0x230
[   28.355891]  kunit_try_run_case+0x1b3/0x490
[   28.356304]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.356886]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   28.357273]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   28.357962]  ? __kthread_parkme+0x82/0x160
[   28.358660]  ? preempt_count_sub+0x50/0x80
[   28.359303]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.359872]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   28.360597]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.361311]  kthread+0x257/0x310
[   28.361854]  ? __pfx_kthread+0x10/0x10
[   28.362397]  ret_from_fork+0x41/0x80
[   28.362689]  ? __pfx_kthread+0x10/0x10
[   28.363414]  ret_from_fork_asm+0x1a/0x30
[   28.363880]  </TASK>
[   28.364327] 
[   28.364570] Allocated by task 273:
[   28.364946]  kasan_save_stack+0x3d/0x60
[   28.365491]  kasan_save_track+0x18/0x40
[   28.366202]  kasan_save_alloc_info+0x3b/0x50
[   28.366650]  __kasan_kmalloc+0xb7/0xc0
[   28.367110]  __kmalloc_cache_noprof+0x184/0x410
[   28.367820]  kasan_atomics+0x96/0x310
[   28.368290]  kunit_try_run_case+0x1b3/0x490
[   28.368733]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.369491]  kthread+0x257/0x310
[   28.369859]  ret_from_fork+0x41/0x80
[   28.370492]  ret_from_fork_asm+0x1a/0x30
[   28.370845] 
[   28.371155] The buggy address belongs to the object at ffff888102a32500
[   28.371155]  which belongs to the cache kmalloc-64 of size 64
[   28.372413] The buggy address is located 0 bytes to the right of
[   28.372413]  allocated 48-byte region [ffff888102a32500, ffff888102a32530)
[   28.373614] 
[   28.373911] The buggy address belongs to the physical page:
[   28.374837] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a32
[   28.375588] flags: 0x200000000000000(node=0|zone=2)
[   28.376031] page_type: f5(slab)
[   28.376496] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   28.377277] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   28.377963] page dumped because: kasan: bad access detected
[   28.378571] 
[   28.378797] Memory state around the buggy address:
[   28.379434]  ffff888102a32400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.379998]  ffff888102a32480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.380755] >ffff888102a32500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   28.381355]                                      ^
[   28.381910]  ffff888102a32580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.383134]  ffff888102a32600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.383954] ==================================================================
[   25.978003] ==================================================================
[   25.978897] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x5ff/0x5450
[   25.979759] Write of size 4 at addr ffff888102a32530 by task kunit_try_catch/273
[   25.980981] 
[   25.981229] CPU: 0 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241128 #1
[   25.982364] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.982964] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   25.984054] Call Trace:
[   25.984241]  <TASK>
[   25.984433]  dump_stack_lvl+0x73/0xb0
[   25.984839]  print_report+0xd1/0x640
[   25.985447]  ? __virt_addr_valid+0x1db/0x2d0
[   25.985923]  ? kasan_complete_mode_report_info+0x2a/0x200
[   25.986317]  kasan_report+0x102/0x140
[   25.987040]  ? kasan_atomics_helper+0x5ff/0x5450
[   25.987756]  ? kasan_atomics_helper+0x5ff/0x5450
[   25.988364]  kasan_check_range+0x10c/0x1c0
[   25.988936]  __kasan_check_write+0x18/0x20
[   25.989526]  kasan_atomics_helper+0x5ff/0x5450
[   25.989946]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   25.990593]  ? __kmalloc_cache_noprof+0x184/0x410
[   25.991030]  ? kasan_atomics+0x153/0x310
[   25.991779]  kasan_atomics+0x1dd/0x310
[   25.992627]  ? __pfx_kasan_atomics+0x10/0x10
[   25.993033]  ? __pfx_read_tsc+0x10/0x10
[   25.993669]  ? ktime_get_ts64+0x84/0x230
[   25.994093]  kunit_try_run_case+0x1b3/0x490
[   25.994508]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.994927]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   25.995452]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   25.995927]  ? __kthread_parkme+0x82/0x160
[   25.996425]  ? preempt_count_sub+0x50/0x80
[   25.996940]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.997584]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   25.998293]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.998848]  kthread+0x257/0x310
[   25.999294]  ? __pfx_kthread+0x10/0x10
[   25.999694]  ret_from_fork+0x41/0x80
[   26.000250]  ? __pfx_kthread+0x10/0x10
[   26.000629]  ret_from_fork_asm+0x1a/0x30
[   26.001178]  </TASK>
[   26.001525] 
[   26.001801] Allocated by task 273:
[   26.002359]  kasan_save_stack+0x3d/0x60
[   26.002773]  kasan_save_track+0x18/0x40
[   26.003287]  kasan_save_alloc_info+0x3b/0x50
[   26.003724]  __kasan_kmalloc+0xb7/0xc0
[   26.003991]  __kmalloc_cache_noprof+0x184/0x410
[   26.004647]  kasan_atomics+0x96/0x310
[   26.005209]  kunit_try_run_case+0x1b3/0x490
[   26.005555]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.006249]  kthread+0x257/0x310
[   26.006699]  ret_from_fork+0x41/0x80
[   26.007182]  ret_from_fork_asm+0x1a/0x30
[   26.007622] 
[   26.007917] The buggy address belongs to the object at ffff888102a32500
[   26.007917]  which belongs to the cache kmalloc-64 of size 64
[   26.008872] The buggy address is located 0 bytes to the right of
[   26.008872]  allocated 48-byte region [ffff888102a32500, ffff888102a32530)
[   26.009993] 
[   26.010264] The buggy address belongs to the physical page:
[   26.010858] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a32
[   26.011550] flags: 0x200000000000000(node=0|zone=2)
[   26.012124] page_type: f5(slab)
[   26.012621] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   26.013361] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   26.013996] page dumped because: kasan: bad access detected
[   26.014641] 
[   26.014868] Memory state around the buggy address:
[   26.015472]  ffff888102a32400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.016123]  ffff888102a32480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.016926] >ffff888102a32500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   26.017596]                                      ^
[   26.018118]  ffff888102a32580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.018796]  ffff888102a32600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.019441] ==================================================================
[   28.127260] ==================================================================
[   28.128382] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4f9a/0x5450
[   28.130238] Read of size 8 at addr ffff888102a32530 by task kunit_try_catch/273
[   28.131642] 
[   28.131828] CPU: 0 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241128 #1
[   28.132814] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.133497] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   28.134256] Call Trace:
[   28.134505]  <TASK>
[   28.134808]  dump_stack_lvl+0x73/0xb0
[   28.135208]  print_report+0xd1/0x640
[   28.135698]  ? __virt_addr_valid+0x1db/0x2d0
[   28.136409]  ? kasan_complete_mode_report_info+0x2a/0x200
[   28.137195]  kasan_report+0x102/0x140
[   28.137759]  ? kasan_atomics_helper+0x4f9a/0x5450
[   28.138584]  ? kasan_atomics_helper+0x4f9a/0x5450
[   28.139164]  __asan_report_load8_noabort+0x18/0x20
[   28.139743]  kasan_atomics_helper+0x4f9a/0x5450
[   28.140387]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   28.140976]  ? __kmalloc_cache_noprof+0x184/0x410
[   28.141689]  ? kasan_atomics+0x153/0x310
[   28.142287]  kasan_atomics+0x1dd/0x310
[   28.142764]  ? __pfx_kasan_atomics+0x10/0x10
[   28.143374]  ? __pfx_read_tsc+0x10/0x10
[   28.143881]  ? ktime_get_ts64+0x84/0x230
[   28.144478]  kunit_try_run_case+0x1b3/0x490
[   28.145015]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.145740]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   28.146401]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   28.146984]  ? __kthread_parkme+0x82/0x160
[   28.147598]  ? preempt_count_sub+0x50/0x80
[   28.148170]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.148665]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   28.149418]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.150025]  kthread+0x257/0x310
[   28.150636]  ? __pfx_kthread+0x10/0x10
[   28.151033]  ret_from_fork+0x41/0x80
[   28.151532]  ? __pfx_kthread+0x10/0x10
[   28.151979]  ret_from_fork_asm+0x1a/0x30
[   28.152437]  </TASK>
[   28.152628] 
[   28.152870] Allocated by task 273:
[   28.153885]  kasan_save_stack+0x3d/0x60
[   28.154780]  kasan_save_track+0x18/0x40
[   28.155175]  kasan_save_alloc_info+0x3b/0x50
[   28.155482]  __kasan_kmalloc+0xb7/0xc0
[   28.155953]  __kmalloc_cache_noprof+0x184/0x410
[   28.156598]  kasan_atomics+0x96/0x310
[   28.157256]  kunit_try_run_case+0x1b3/0x490
[   28.157692]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.158996]  kthread+0x257/0x310
[   28.159591]  ret_from_fork+0x41/0x80
[   28.159899]  ret_from_fork_asm+0x1a/0x30
[   28.160356] 
[   28.160940] The buggy address belongs to the object at ffff888102a32500
[   28.160940]  which belongs to the cache kmalloc-64 of size 64
[   28.162053] The buggy address is located 0 bytes to the right of
[   28.162053]  allocated 48-byte region [ffff888102a32500, ffff888102a32530)
[   28.163614] 
[   28.164043] The buggy address belongs to the physical page:
[   28.165066] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a32
[   28.165899] flags: 0x200000000000000(node=0|zone=2)
[   28.166894] page_type: f5(slab)
[   28.167775] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   28.168711] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   28.169300] page dumped because: kasan: bad access detected
[   28.169799] 
[   28.169991] Memory state around the buggy address:
[   28.170575]  ffff888102a32400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.171707]  ffff888102a32480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.172495] >ffff888102a32500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   28.173190]                                      ^
[   28.173491]  ffff888102a32580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.174312]  ffff888102a32600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.175052] ==================================================================
[   27.132030] ==================================================================
[   27.132764] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4eb0/0x5450
[   27.133744] Read of size 8 at addr ffff888102a32530 by task kunit_try_catch/273
[   27.134940] 
[   27.135278] CPU: 0 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241128 #1
[   27.136427] Tainted: [B]=BAD_PAGE, [N]=TEST
[   27.136894] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   27.137879] Call Trace:
[   27.138285]  <TASK>
[   27.138727]  dump_stack_lvl+0x73/0xb0
[   27.139295]  print_report+0xd1/0x640
[   27.139789]  ? __virt_addr_valid+0x1db/0x2d0
[   27.140269]  ? kasan_complete_mode_report_info+0x2a/0x200
[   27.140805]  kasan_report+0x102/0x140
[   27.141188]  ? kasan_atomics_helper+0x4eb0/0x5450
[   27.141763]  ? kasan_atomics_helper+0x4eb0/0x5450
[   27.142148]  __asan_report_load8_noabort+0x18/0x20
[   27.142653]  kasan_atomics_helper+0x4eb0/0x5450
[   27.143487]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   27.144250]  ? __kmalloc_cache_noprof+0x184/0x410
[   27.144888]  ? kasan_atomics+0x153/0x310
[   27.145485]  kasan_atomics+0x1dd/0x310
[   27.146155]  ? __pfx_kasan_atomics+0x10/0x10
[   27.146691]  ? __pfx_read_tsc+0x10/0x10
[   27.147110]  ? ktime_get_ts64+0x84/0x230
[   27.147630]  kunit_try_run_case+0x1b3/0x490
[   27.148189]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.148686]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   27.149176]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   27.149766]  ? __kthread_parkme+0x82/0x160
[   27.150301]  ? preempt_count_sub+0x50/0x80
[   27.150797]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.151498]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   27.152639]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.153112]  kthread+0x257/0x310
[   27.153705]  ? __pfx_kthread+0x10/0x10
[   27.154222]  ret_from_fork+0x41/0x80
[   27.154577]  ? __pfx_kthread+0x10/0x10
[   27.155114]  ret_from_fork_asm+0x1a/0x30
[   27.155509]  </TASK>
[   27.155879] 
[   27.156177] Allocated by task 273:
[   27.156474]  kasan_save_stack+0x3d/0x60
[   27.156968]  kasan_save_track+0x18/0x40
[   27.157386]  kasan_save_alloc_info+0x3b/0x50
[   27.157927]  __kasan_kmalloc+0xb7/0xc0
[   27.158489]  __kmalloc_cache_noprof+0x184/0x410
[   27.159869]  kasan_atomics+0x96/0x310
[   27.160273]  kunit_try_run_case+0x1b3/0x490
[   27.160925]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.161443]  kthread+0x257/0x310
[   27.162034]  ret_from_fork+0x41/0x80
[   27.162534]  ret_from_fork_asm+0x1a/0x30
[   27.163110] 
[   27.163350] The buggy address belongs to the object at ffff888102a32500
[   27.163350]  which belongs to the cache kmalloc-64 of size 64
[   27.164671] The buggy address is located 0 bytes to the right of
[   27.164671]  allocated 48-byte region [ffff888102a32500, ffff888102a32530)
[   27.166003] 
[   27.166247] The buggy address belongs to the physical page:
[   27.167507] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a32
[   27.168219] flags: 0x200000000000000(node=0|zone=2)
[   27.168799] page_type: f5(slab)
[   27.169375] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   27.170014] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   27.170659] page dumped because: kasan: bad access detected
[   27.171105] 
[   27.171398] Memory state around the buggy address:
[   27.171862]  ffff888102a32400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.172623]  ffff888102a32480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.173666] >ffff888102a32500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   27.174418]                                      ^
[   27.174916]  ffff888102a32580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.175572]  ffff888102a32600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.176747] ==================================================================
[   26.476794] ==================================================================
[   26.477483] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xd48/0x5450
[   26.478393] Write of size 4 at addr ffff888102a32530 by task kunit_try_catch/273
[   26.478971] 
[   26.479378] CPU: 0 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241128 #1
[   26.480327] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.480622] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   26.481618] Call Trace:
[   26.481885]  <TASK>
[   26.482307]  dump_stack_lvl+0x73/0xb0
[   26.482704]  print_report+0xd1/0x640
[   26.483262]  ? __virt_addr_valid+0x1db/0x2d0
[   26.483870]  ? kasan_complete_mode_report_info+0x2a/0x200
[   26.484526]  kasan_report+0x102/0x140
[   26.484926]  ? kasan_atomics_helper+0xd48/0x5450
[   26.485579]  ? kasan_atomics_helper+0xd48/0x5450
[   26.486046]  kasan_check_range+0x10c/0x1c0
[   26.486607]  __kasan_check_write+0x18/0x20
[   26.487266]  kasan_atomics_helper+0xd48/0x5450
[   26.487711]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   26.488423]  ? __kmalloc_cache_noprof+0x184/0x410
[   26.488911]  ? kasan_atomics+0x153/0x310
[   26.489522]  kasan_atomics+0x1dd/0x310
[   26.490036]  ? __pfx_kasan_atomics+0x10/0x10
[   26.490666]  ? __pfx_read_tsc+0x10/0x10
[   26.491167]  ? ktime_get_ts64+0x84/0x230
[   26.491754]  kunit_try_run_case+0x1b3/0x490
[   26.492224]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.492734]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   26.493443]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   26.494046]  ? __kthread_parkme+0x82/0x160
[   26.494549]  ? preempt_count_sub+0x50/0x80
[   26.495138]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.495662]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   26.496413]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.497028]  kthread+0x257/0x310
[   26.497390]  ? __pfx_kthread+0x10/0x10
[   26.497848]  ret_from_fork+0x41/0x80
[   26.498308]  ? __pfx_kthread+0x10/0x10
[   26.498791]  ret_from_fork_asm+0x1a/0x30
[   26.499295]  </TASK>
[   26.499628] 
[   26.499881] Allocated by task 273:
[   26.500387]  kasan_save_stack+0x3d/0x60
[   26.500719]  kasan_save_track+0x18/0x40
[   26.501236]  kasan_save_alloc_info+0x3b/0x50
[   26.501716]  __kasan_kmalloc+0xb7/0xc0
[   26.502369]  __kmalloc_cache_noprof+0x184/0x410
[   26.502785]  kasan_atomics+0x96/0x310
[   26.503063]  kunit_try_run_case+0x1b3/0x490
[   26.503600]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.504108]  kthread+0x257/0x310
[   26.504452]  ret_from_fork+0x41/0x80
[   26.504922]  ret_from_fork_asm+0x1a/0x30
[   26.505450] 
[   26.505629] The buggy address belongs to the object at ffff888102a32500
[   26.505629]  which belongs to the cache kmalloc-64 of size 64
[   26.506985] The buggy address is located 0 bytes to the right of
[   26.506985]  allocated 48-byte region [ffff888102a32500, ffff888102a32530)
[   26.508951] 
[   26.509282] The buggy address belongs to the physical page:
[   26.509786] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a32
[   26.510575] flags: 0x200000000000000(node=0|zone=2)
[   26.511170] page_type: f5(slab)
[   26.511651] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   26.512373] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   26.513121] page dumped because: kasan: bad access detected
[   26.513650] 
[   26.513875] Memory state around the buggy address:
[   26.514385]  ffff888102a32400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.515147]  ffff888102a32480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.515812] >ffff888102a32500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   26.516517]                                      ^
[   26.516991]  ffff888102a32580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.517755]  ffff888102a32600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.518492] ==================================================================
[   27.364565] ==================================================================
[   27.365468] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1650/0x5450
[   27.365801] Write of size 8 at addr ffff888102a32530 by task kunit_try_catch/273
[   27.366105] 
[   27.366834] CPU: 0 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241128 #1
[   27.368429] Tainted: [B]=BAD_PAGE, [N]=TEST
[   27.368849] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   27.369604] Call Trace:
[   27.369885]  <TASK>
[   27.370111]  dump_stack_lvl+0x73/0xb0
[   27.371051]  print_report+0xd1/0x640
[   27.371637]  ? __virt_addr_valid+0x1db/0x2d0
[   27.371971]  ? kasan_complete_mode_report_info+0x2a/0x200
[   27.372538]  kasan_report+0x102/0x140
[   27.372854]  ? kasan_atomics_helper+0x1650/0x5450
[   27.373283]  ? kasan_atomics_helper+0x1650/0x5450
[   27.373908]  kasan_check_range+0x10c/0x1c0
[   27.374366]  __kasan_check_write+0x18/0x20
[   27.374746]  kasan_atomics_helper+0x1650/0x5450
[   27.375230]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   27.375692]  ? __kmalloc_cache_noprof+0x184/0x410
[   27.376265]  ? kasan_atomics+0x153/0x310
[   27.376612]  kasan_atomics+0x1dd/0x310
[   27.377133]  ? __pfx_kasan_atomics+0x10/0x10
[   27.377665]  ? __pfx_read_tsc+0x10/0x10
[   27.378026]  ? ktime_get_ts64+0x84/0x230
[   27.378486]  kunit_try_run_case+0x1b3/0x490
[   27.378829]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.379309]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   27.379893]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   27.380525]  ? __kthread_parkme+0x82/0x160
[   27.380988]  ? preempt_count_sub+0x50/0x80
[   27.381478]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.381944]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   27.382596]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.383148]  kthread+0x257/0x310
[   27.383581]  ? __pfx_kthread+0x10/0x10
[   27.383906]  ret_from_fork+0x41/0x80
[   27.384446]  ? __pfx_kthread+0x10/0x10
[   27.384821]  ret_from_fork_asm+0x1a/0x30
[   27.385424]  </TASK>
[   27.385701] 
[   27.385922] Allocated by task 273:
[   27.386329]  kasan_save_stack+0x3d/0x60
[   27.386660]  kasan_save_track+0x18/0x40
[   27.387212]  kasan_save_alloc_info+0x3b/0x50
[   27.387786]  __kasan_kmalloc+0xb7/0xc0
[   27.388991]  __kmalloc_cache_noprof+0x184/0x410
[   27.389907]  kasan_atomics+0x96/0x310
[   27.390427]  kunit_try_run_case+0x1b3/0x490
[   27.391098]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.391852]  kthread+0x257/0x310
[   27.392677]  ret_from_fork+0x41/0x80
[   27.393123]  ret_from_fork_asm+0x1a/0x30
[   27.393461] 
[   27.393961] The buggy address belongs to the object at ffff888102a32500
[   27.393961]  which belongs to the cache kmalloc-64 of size 64
[   27.395497] The buggy address is located 0 bytes to the right of
[   27.395497]  allocated 48-byte region [ffff888102a32500, ffff888102a32530)
[   27.396918] 
[   27.397089] The buggy address belongs to the physical page:
[   27.398128] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a32
[   27.398968] flags: 0x200000000000000(node=0|zone=2)
[   27.399601] page_type: f5(slab)
[   27.400025] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   27.400959] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   27.401620] page dumped because: kasan: bad access detected
[   27.402490] 
[   27.402662] Memory state around the buggy address:
[   27.403537]  ffff888102a32400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.404201]  ffff888102a32480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.404874] >ffff888102a32500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   27.405701]                                      ^
[   27.406375]  ffff888102a32580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.407166]  ffff888102a32600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.408106] ==================================================================
[   27.758776] ==================================================================
[   27.759380] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1c19/0x5450
[   27.759956] Write of size 8 at addr ffff888102a32530 by task kunit_try_catch/273
[   27.760807] 
[   27.761124] CPU: 0 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241128 #1
[   27.761957] Tainted: [B]=BAD_PAGE, [N]=TEST
[   27.762501] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   27.763169] Call Trace:
[   27.763509]  <TASK>
[   27.763849]  dump_stack_lvl+0x73/0xb0
[   27.764356]  print_report+0xd1/0x640
[   27.764713]  ? __virt_addr_valid+0x1db/0x2d0
[   27.765247]  ? kasan_complete_mode_report_info+0x2a/0x200
[   27.765660]  kasan_report+0x102/0x140
[   27.765946]  ? kasan_atomics_helper+0x1c19/0x5450
[   27.766607]  ? kasan_atomics_helper+0x1c19/0x5450
[   27.767134]  kasan_check_range+0x10c/0x1c0
[   27.767545]  __kasan_check_write+0x18/0x20
[   27.768039]  kasan_atomics_helper+0x1c19/0x5450
[   27.768502]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   27.768963]  ? __kmalloc_cache_noprof+0x184/0x410
[   27.769505]  ? kasan_atomics+0x153/0x310
[   27.769982]  kasan_atomics+0x1dd/0x310
[   27.770403]  ? __pfx_kasan_atomics+0x10/0x10
[   27.770808]  ? __pfx_read_tsc+0x10/0x10
[   27.771271]  ? ktime_get_ts64+0x84/0x230
[   27.771743]  kunit_try_run_case+0x1b3/0x490
[   27.772058]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.772685]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   27.773284]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   27.773737]  ? __kthread_parkme+0x82/0x160
[   27.774252]  ? preempt_count_sub+0x50/0x80
[   27.774576]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.774907]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   27.775372]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.776042]  kthread+0x257/0x310
[   27.776571]  ? __pfx_kthread+0x10/0x10
[   27.777123]  ret_from_fork+0x41/0x80
[   27.777595]  ? __pfx_kthread+0x10/0x10
[   27.777880]  ret_from_fork_asm+0x1a/0x30
[   27.778434]  </TASK>
[   27.778717] 
[   27.778943] Allocated by task 273:
[   27.779434]  kasan_save_stack+0x3d/0x60
[   27.779860]  kasan_save_track+0x18/0x40
[   27.780360]  kasan_save_alloc_info+0x3b/0x50
[   27.780765]  __kasan_kmalloc+0xb7/0xc0
[   27.781182]  __kmalloc_cache_noprof+0x184/0x410
[   27.781713]  kasan_atomics+0x96/0x310
[   27.781990]  kunit_try_run_case+0x1b3/0x490
[   27.782353]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.782964]  kthread+0x257/0x310
[   27.783475]  ret_from_fork+0x41/0x80
[   27.783921]  ret_from_fork_asm+0x1a/0x30
[   27.784465] 
[   27.784647] The buggy address belongs to the object at ffff888102a32500
[   27.784647]  which belongs to the cache kmalloc-64 of size 64
[   27.785658] The buggy address is located 0 bytes to the right of
[   27.785658]  allocated 48-byte region [ffff888102a32500, ffff888102a32530)
[   27.786790] 
[   27.787053] The buggy address belongs to the physical page:
[   27.787546] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a32
[   27.788153] flags: 0x200000000000000(node=0|zone=2)
[   27.788635] page_type: f5(slab)
[   27.789130] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   27.789835] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   27.790317] page dumped because: kasan: bad access detected
[   27.790919] 
[   27.791197] Memory state around the buggy address:
[   27.791772]  ffff888102a32400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.792491]  ffff888102a32480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.793192] >ffff888102a32500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   27.793853]                                      ^
[   27.794275]  ffff888102a32580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.795027]  ffff888102a32600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.795618] ==================================================================
[   28.218765] ==================================================================
[   28.219468] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4fb4/0x5450
[   28.220320] Read of size 8 at addr ffff888102a32530 by task kunit_try_catch/273
[   28.221138] 
[   28.221427] CPU: 0 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241128 #1
[   28.222323] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.222827] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   28.223646] Call Trace:
[   28.223999]  <TASK>
[   28.224390]  dump_stack_lvl+0x73/0xb0
[   28.224853]  print_report+0xd1/0x640
[   28.225409]  ? __virt_addr_valid+0x1db/0x2d0
[   28.226456]  ? kasan_complete_mode_report_info+0x2a/0x200
[   28.227036]  kasan_report+0x102/0x140
[   28.227980]  ? kasan_atomics_helper+0x4fb4/0x5450
[   28.229260]  ? kasan_atomics_helper+0x4fb4/0x5450
[   28.229842]  __asan_report_load8_noabort+0x18/0x20
[   28.230626]  kasan_atomics_helper+0x4fb4/0x5450
[   28.231086]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   28.231579]  ? __kmalloc_cache_noprof+0x184/0x410
[   28.232138]  ? kasan_atomics+0x153/0x310
[   28.232915]  kasan_atomics+0x1dd/0x310
[   28.233470]  ? __pfx_kasan_atomics+0x10/0x10
[   28.233918]  ? __pfx_read_tsc+0x10/0x10
[   28.234758]  ? ktime_get_ts64+0x84/0x230
[   28.235490]  kunit_try_run_case+0x1b3/0x490
[   28.236142]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.236648]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   28.237120]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   28.238011]  ? __kthread_parkme+0x82/0x160
[   28.238662]  ? preempt_count_sub+0x50/0x80
[   28.238988]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.239861]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   28.240782]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.241375]  kthread+0x257/0x310
[   28.241668]  ? __pfx_kthread+0x10/0x10
[   28.242124]  ret_from_fork+0x41/0x80
[   28.242533]  ? __pfx_kthread+0x10/0x10
[   28.242971]  ret_from_fork_asm+0x1a/0x30
[   28.243354]  </TASK>
[   28.243608] 
[   28.243764] Allocated by task 273:
[   28.244128]  kasan_save_stack+0x3d/0x60
[   28.244726]  kasan_save_track+0x18/0x40
[   28.245003]  kasan_save_alloc_info+0x3b/0x50
[   28.246235]  __kasan_kmalloc+0xb7/0xc0
[   28.246975]  __kmalloc_cache_noprof+0x184/0x410
[   28.247457]  kasan_atomics+0x96/0x310
[   28.247643]  kunit_try_run_case+0x1b3/0x490
[   28.247833]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.248055]  kthread+0x257/0x310
[   28.248751]  ret_from_fork+0x41/0x80
[   28.249472]  ret_from_fork_asm+0x1a/0x30
[   28.250421] 
[   28.250795] The buggy address belongs to the object at ffff888102a32500
[   28.250795]  which belongs to the cache kmalloc-64 of size 64
[   28.251740] The buggy address is located 0 bytes to the right of
[   28.251740]  allocated 48-byte region [ffff888102a32500, ffff888102a32530)
[   28.252754] 
[   28.252965] The buggy address belongs to the physical page:
[   28.253467] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a32
[   28.254316] flags: 0x200000000000000(node=0|zone=2)
[   28.254709] page_type: f5(slab)
[   28.255145] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   28.255826] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   28.256578] page dumped because: kasan: bad access detected
[   28.257283] 
[   28.257524] Memory state around the buggy address:
[   28.257920]  ffff888102a32400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.258563]  ffff888102a32480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.259124] >ffff888102a32500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   28.259804]                                      ^
[   28.260287]  ffff888102a32580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.260908]  ffff888102a32600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.261538] ==================================================================
[   28.302502] ==================================================================
[   28.303026] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4fa7/0x5450
[   28.303870] Read of size 8 at addr ffff888102a32530 by task kunit_try_catch/273
[   28.304431] 
[   28.304699] CPU: 0 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241128 #1
[   28.305536] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.305818] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   28.306567] Call Trace:
[   28.306932]  <TASK>
[   28.307321]  dump_stack_lvl+0x73/0xb0
[   28.307828]  print_report+0xd1/0x640
[   28.308224]  ? __virt_addr_valid+0x1db/0x2d0
[   28.308772]  ? kasan_complete_mode_report_info+0x2a/0x200
[   28.309281]  kasan_report+0x102/0x140
[   28.309710]  ? kasan_atomics_helper+0x4fa7/0x5450
[   28.310186]  ? kasan_atomics_helper+0x4fa7/0x5450
[   28.310732]  __asan_report_load8_noabort+0x18/0x20
[   28.311207]  kasan_atomics_helper+0x4fa7/0x5450
[   28.311577]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   28.312152]  ? __kmalloc_cache_noprof+0x184/0x410
[   28.312531]  ? kasan_atomics+0x153/0x310
[   28.312844]  kasan_atomics+0x1dd/0x310
[   28.313317]  ? __pfx_kasan_atomics+0x10/0x10
[   28.313916]  ? __pfx_read_tsc+0x10/0x10
[   28.314506]  ? ktime_get_ts64+0x84/0x230
[   28.314931]  kunit_try_run_case+0x1b3/0x490
[   28.315402]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.315952]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   28.316436]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   28.316861]  ? __kthread_parkme+0x82/0x160
[   28.317361]  ? preempt_count_sub+0x50/0x80
[   28.317797]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.318275]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   28.318880]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.319366]  kthread+0x257/0x310
[   28.319804]  ? __pfx_kthread+0x10/0x10
[   28.320284]  ret_from_fork+0x41/0x80
[   28.320635]  ? __pfx_kthread+0x10/0x10
[   28.320987]  ret_from_fork_asm+0x1a/0x30
[   28.321465]  </TASK>
[   28.321741] 
[   28.321972] Allocated by task 273:
[   28.322359]  kasan_save_stack+0x3d/0x60
[   28.322833]  kasan_save_track+0x18/0x40
[   28.323221]  kasan_save_alloc_info+0x3b/0x50
[   28.323744]  __kasan_kmalloc+0xb7/0xc0
[   28.324176]  __kmalloc_cache_noprof+0x184/0x410
[   28.324669]  kasan_atomics+0x96/0x310
[   28.324945]  kunit_try_run_case+0x1b3/0x490
[   28.325287]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.325975]  kthread+0x257/0x310
[   28.326496]  ret_from_fork+0x41/0x80
[   28.326944]  ret_from_fork_asm+0x1a/0x30
[   28.327286] 
[   28.327475] The buggy address belongs to the object at ffff888102a32500
[   28.327475]  which belongs to the cache kmalloc-64 of size 64
[   28.328773] The buggy address is located 0 bytes to the right of
[   28.328773]  allocated 48-byte region [ffff888102a32500, ffff888102a32530)
[   28.329883] 
[   28.330143] The buggy address belongs to the physical page:
[   28.330709] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a32
[   28.331212] flags: 0x200000000000000(node=0|zone=2)
[   28.331764] page_type: f5(slab)
[   28.332254] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   28.332843] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   28.333568] page dumped because: kasan: bad access detected
[   28.334013] 
[   28.334248] Memory state around the buggy address:
[   28.334717]  ffff888102a32400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.335378]  ffff888102a32480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.335789] >ffff888102a32500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   28.336431]                                      ^
[   28.336994]  ffff888102a32580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.337699]  ffff888102a32600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.338309] ==================================================================
[   27.178123] ==================================================================
[   27.179220] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1468/0x5450
[   27.180622] Write of size 8 at addr ffff888102a32530 by task kunit_try_catch/273
[   27.182219] 
[   27.182604] CPU: 0 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241128 #1
[   27.183770] Tainted: [B]=BAD_PAGE, [N]=TEST
[   27.184395] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   27.185330] Call Trace:
[   27.185652]  <TASK>
[   27.185917]  dump_stack_lvl+0x73/0xb0
[   27.186370]  print_report+0xd1/0x640
[   27.186664]  ? __virt_addr_valid+0x1db/0x2d0
[   27.187506]  ? kasan_complete_mode_report_info+0x2a/0x200
[   27.188088]  kasan_report+0x102/0x140
[   27.188809]  ? kasan_atomics_helper+0x1468/0x5450
[   27.189270]  ? kasan_atomics_helper+0x1468/0x5450
[   27.190308]  kasan_check_range+0x10c/0x1c0
[   27.190992]  __kasan_check_write+0x18/0x20
[   27.191519]  kasan_atomics_helper+0x1468/0x5450
[   27.191959]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   27.193062]  ? __kmalloc_cache_noprof+0x184/0x410
[   27.193515]  ? kasan_atomics+0x153/0x310
[   27.194183]  kasan_atomics+0x1dd/0x310
[   27.194625]  ? __pfx_kasan_atomics+0x10/0x10
[   27.195354]  ? __pfx_read_tsc+0x10/0x10
[   27.195950]  ? ktime_get_ts64+0x84/0x230
[   27.196708]  kunit_try_run_case+0x1b3/0x490
[   27.197115]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.198172]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   27.198995]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   27.199634]  ? __kthread_parkme+0x82/0x160
[   27.200185]  ? preempt_count_sub+0x50/0x80
[   27.200838]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.201296]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   27.201861]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.202516]  kthread+0x257/0x310
[   27.203279]  ? __pfx_kthread+0x10/0x10
[   27.203906]  ret_from_fork+0x41/0x80
[   27.204456]  ? __pfx_kthread+0x10/0x10
[   27.205011]  ret_from_fork_asm+0x1a/0x30
[   27.205578]  </TASK>
[   27.205886] 
[   27.206239] Allocated by task 273:
[   27.206747]  kasan_save_stack+0x3d/0x60
[   27.207317]  kasan_save_track+0x18/0x40
[   27.207732]  kasan_save_alloc_info+0x3b/0x50
[   27.208277]  __kasan_kmalloc+0xb7/0xc0
[   27.208663]  __kmalloc_cache_noprof+0x184/0x410
[   27.209319]  kasan_atomics+0x96/0x310
[   27.209785]  kunit_try_run_case+0x1b3/0x490
[   27.210420]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.210839]  kthread+0x257/0x310
[   27.211474]  ret_from_fork+0x41/0x80
[   27.211799]  ret_from_fork_asm+0x1a/0x30
[   27.212451] 
[   27.212672] The buggy address belongs to the object at ffff888102a32500
[   27.212672]  which belongs to the cache kmalloc-64 of size 64
[   27.213877] The buggy address is located 0 bytes to the right of
[   27.213877]  allocated 48-byte region [ffff888102a32500, ffff888102a32530)
[   27.215063] 
[   27.215480] The buggy address belongs to the physical page:
[   27.215884] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a32
[   27.216934] flags: 0x200000000000000(node=0|zone=2)
[   27.217548] page_type: f5(slab)
[   27.217936] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   27.218725] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   27.219501] page dumped because: kasan: bad access detected
[   27.220056] 
[   27.220279] Memory state around the buggy address:
[   27.220821]  ffff888102a32400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.221632]  ffff888102a32480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.222312] >ffff888102a32500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   27.222923]                                      ^
[   27.223473]  ffff888102a32580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.224209]  ffff888102a32600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.224817] ==================================================================
[   26.519839] ==================================================================
[   26.520597] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xde1/0x5450
[   26.521371] Write of size 4 at addr ffff888102a32530 by task kunit_try_catch/273
[   26.521992] 
[   26.522393] CPU: 0 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241128 #1
[   26.523379] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.523854] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   26.524691] Call Trace:
[   26.525063]  <TASK>
[   26.525404]  dump_stack_lvl+0x73/0xb0
[   26.525875]  print_report+0xd1/0x640
[   26.526491]  ? __virt_addr_valid+0x1db/0x2d0
[   26.526959]  ? kasan_complete_mode_report_info+0x2a/0x200
[   26.527522]  kasan_report+0x102/0x140
[   26.527982]  ? kasan_atomics_helper+0xde1/0x5450
[   26.528514]  ? kasan_atomics_helper+0xde1/0x5450
[   26.529037]  kasan_check_range+0x10c/0x1c0
[   26.529534]  __kasan_check_write+0x18/0x20
[   26.530037]  kasan_atomics_helper+0xde1/0x5450
[   26.530600]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   26.531287]  ? __kmalloc_cache_noprof+0x184/0x410
[   26.531757]  ? kasan_atomics+0x153/0x310
[   26.532297]  kasan_atomics+0x1dd/0x310
[   26.532817]  ? __pfx_kasan_atomics+0x10/0x10
[   26.533235]  ? __pfx_read_tsc+0x10/0x10
[   26.533774]  ? ktime_get_ts64+0x84/0x230
[   26.534275]  kunit_try_run_case+0x1b3/0x490
[   26.534724]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.535273]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   26.535723]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   26.536305]  ? __kthread_parkme+0x82/0x160
[   26.536801]  ? preempt_count_sub+0x50/0x80
[   26.537286]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.537856]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   26.538577]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.539156]  kthread+0x257/0x310
[   26.539614]  ? __pfx_kthread+0x10/0x10
[   26.539972]  ret_from_fork+0x41/0x80
[   26.540482]  ? __pfx_kthread+0x10/0x10
[   26.540919]  ret_from_fork_asm+0x1a/0x30
[   26.541465]  </TASK>
[   26.541862] 
[   26.542135] Allocated by task 273:
[   26.542523]  kasan_save_stack+0x3d/0x60
[   26.543037]  kasan_save_track+0x18/0x40
[   26.543548]  kasan_save_alloc_info+0x3b/0x50
[   26.544018]  __kasan_kmalloc+0xb7/0xc0
[   26.544517]  __kmalloc_cache_noprof+0x184/0x410
[   26.545144]  kasan_atomics+0x96/0x310
[   26.545475]  kunit_try_run_case+0x1b3/0x490
[   26.545974]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.546703]  kthread+0x257/0x310
[   26.547149]  ret_from_fork+0x41/0x80
[   26.547648]  ret_from_fork_asm+0x1a/0x30
[   26.548146] 
[   26.548393] The buggy address belongs to the object at ffff888102a32500
[   26.548393]  which belongs to the cache kmalloc-64 of size 64
[   26.549574] The buggy address is located 0 bytes to the right of
[   26.549574]  allocated 48-byte region [ffff888102a32500, ffff888102a32530)
[   26.550642] 
[   26.550947] The buggy address belongs to the physical page:
[   26.551481] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a32
[   26.552228] flags: 0x200000000000000(node=0|zone=2)
[   26.552846] page_type: f5(slab)
[   26.553233] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   26.554029] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   26.554673] page dumped because: kasan: bad access detected
[   26.555263] 
[   26.555422] Memory state around the buggy address:
[   26.555938]  ffff888102a32400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.556636]  ffff888102a32480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.557354] >ffff888102a32500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   26.558200]                                      ^
[   26.558796]  ffff888102a32580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.559451]  ffff888102a32600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.560142] ==================================================================
[   26.107379] ==================================================================
[   26.107888] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x7c8/0x5450
[   26.108609] Write of size 4 at addr ffff888102a32530 by task kunit_try_catch/273
[   26.109411] 
[   26.109702] CPU: 0 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241128 #1
[   26.110539] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.111127] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   26.111866] Call Trace:
[   26.112188]  <TASK>
[   26.112412]  dump_stack_lvl+0x73/0xb0
[   26.112907]  print_report+0xd1/0x640
[   26.113457]  ? __virt_addr_valid+0x1db/0x2d0
[   26.113916]  ? kasan_complete_mode_report_info+0x2a/0x200
[   26.114793]  kasan_report+0x102/0x140
[   26.115184]  ? kasan_atomics_helper+0x7c8/0x5450
[   26.116015]  ? kasan_atomics_helper+0x7c8/0x5450
[   26.116644]  kasan_check_range+0x10c/0x1c0
[   26.117026]  __kasan_check_write+0x18/0x20
[   26.117466]  kasan_atomics_helper+0x7c8/0x5450
[   26.117915]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   26.118301]  ? __kmalloc_cache_noprof+0x184/0x410
[   26.118761]  ? kasan_atomics+0x153/0x310
[   26.119320]  kasan_atomics+0x1dd/0x310
[   26.119805]  ? __pfx_kasan_atomics+0x10/0x10
[   26.120369]  ? __pfx_read_tsc+0x10/0x10
[   26.120676]  ? ktime_get_ts64+0x84/0x230
[   26.121149]  kunit_try_run_case+0x1b3/0x490
[   26.121602]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.122209]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   26.122593]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   26.123217]  ? __kthread_parkme+0x82/0x160
[   26.123668]  ? preempt_count_sub+0x50/0x80
[   26.123976]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.124581]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   26.125262]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.125962]  kthread+0x257/0x310
[   26.126403]  ? __pfx_kthread+0x10/0x10
[   26.126859]  ret_from_fork+0x41/0x80
[   26.127283]  ? __pfx_kthread+0x10/0x10
[   26.127720]  ret_from_fork_asm+0x1a/0x30
[   26.128036]  </TASK>
[   26.128427] 
[   26.128657] Allocated by task 273:
[   26.129131]  kasan_save_stack+0x3d/0x60
[   26.129640]  kasan_save_track+0x18/0x40
[   26.129969]  kasan_save_alloc_info+0x3b/0x50
[   26.130455]  __kasan_kmalloc+0xb7/0xc0
[   26.130772]  __kmalloc_cache_noprof+0x184/0x410
[   26.131382]  kasan_atomics+0x96/0x310
[   26.131726]  kunit_try_run_case+0x1b3/0x490
[   26.132213]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.132585]  kthread+0x257/0x310
[   26.133003]  ret_from_fork+0x41/0x80
[   26.133539]  ret_from_fork_asm+0x1a/0x30
[   26.134060] 
[   26.134362] The buggy address belongs to the object at ffff888102a32500
[   26.134362]  which belongs to the cache kmalloc-64 of size 64
[   26.135221] The buggy address is located 0 bytes to the right of
[   26.135221]  allocated 48-byte region [ffff888102a32500, ffff888102a32530)
[   26.136272] 
[   26.136528] The buggy address belongs to the physical page:
[   26.137145] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a32
[   26.137955] flags: 0x200000000000000(node=0|zone=2)
[   26.138564] page_type: f5(slab)
[   26.138904] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   26.139617] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   26.140225] page dumped because: kasan: bad access detected
[   26.140836] 
[   26.141138] Memory state around the buggy address:
[   26.141663]  ffff888102a32400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.142234]  ffff888102a32480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.142926] >ffff888102a32500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   26.143471]                                      ^
[   26.143786]  ffff888102a32580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.144245]  ffff888102a32600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.145010] ==================================================================
[   26.643729] ==================================================================
[   26.644905] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xfaa/0x5450
[   26.645806] Write of size 4 at addr ffff888102a32530 by task kunit_try_catch/273
[   26.646903] 
[   26.647157] CPU: 0 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241128 #1
[   26.648427] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.648823] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   26.649818] Call Trace:
[   26.650245]  <TASK>
[   26.650485]  dump_stack_lvl+0x73/0xb0
[   26.651015]  print_report+0xd1/0x640
[   26.651557]  ? __virt_addr_valid+0x1db/0x2d0
[   26.652031]  ? kasan_complete_mode_report_info+0x2a/0x200
[   26.652872]  kasan_report+0x102/0x140
[   26.653474]  ? kasan_atomics_helper+0xfaa/0x5450
[   26.654153]  ? kasan_atomics_helper+0xfaa/0x5450
[   26.654730]  kasan_check_range+0x10c/0x1c0
[   26.655130]  __kasan_check_write+0x18/0x20
[   26.655569]  kasan_atomics_helper+0xfaa/0x5450
[   26.656206]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   26.656668]  ? __kmalloc_cache_noprof+0x184/0x410
[   26.657135]  ? kasan_atomics+0x153/0x310
[   26.657687]  kasan_atomics+0x1dd/0x310
[   26.658238]  ? __pfx_kasan_atomics+0x10/0x10
[   26.658728]  ? __pfx_read_tsc+0x10/0x10
[   26.659725]  ? ktime_get_ts64+0x84/0x230
[   26.660170]  kunit_try_run_case+0x1b3/0x490
[   26.660614]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.661026]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   26.661968]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   26.662458]  ? __kthread_parkme+0x82/0x160
[   26.662867]  ? preempt_count_sub+0x50/0x80
[   26.663292]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.663813]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   26.664281]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.664916]  kthread+0x257/0x310
[   26.665274]  ? __pfx_kthread+0x10/0x10
[   26.665610]  ret_from_fork+0x41/0x80
[   26.666073]  ? __pfx_kthread+0x10/0x10
[   26.666955]  ret_from_fork_asm+0x1a/0x30
[   26.667617]  </TASK>
[   26.667918] 
[   26.668124] Allocated by task 273:
[   26.668479]  kasan_save_stack+0x3d/0x60
[   26.669178]  kasan_save_track+0x18/0x40
[   26.669983]  kasan_save_alloc_info+0x3b/0x50
[   26.670459]  __kasan_kmalloc+0xb7/0xc0
[   26.671013]  __kmalloc_cache_noprof+0x184/0x410
[   26.671778]  kasan_atomics+0x96/0x310
[   26.672355]  kunit_try_run_case+0x1b3/0x490
[   26.672867]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.673476]  kthread+0x257/0x310
[   26.673905]  ret_from_fork+0x41/0x80
[   26.674406]  ret_from_fork_asm+0x1a/0x30
[   26.674910] 
[   26.675260] The buggy address belongs to the object at ffff888102a32500
[   26.675260]  which belongs to the cache kmalloc-64 of size 64
[   26.676382] The buggy address is located 0 bytes to the right of
[   26.676382]  allocated 48-byte region [ffff888102a32500, ffff888102a32530)
[   26.677520] 
[   26.677810] The buggy address belongs to the physical page:
[   26.678469] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a32
[   26.679230] flags: 0x200000000000000(node=0|zone=2)
[   26.679733] page_type: f5(slab)
[   26.680169] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   26.680921] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   26.681678] page dumped because: kasan: bad access detected
[   26.682264] 
[   26.682523] Memory state around the buggy address:
[   26.683005]  ffff888102a32400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.683786]  ffff888102a32480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.684488] >ffff888102a32500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   26.684945]                                      ^
[   26.685652]  ffff888102a32580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.686297]  ffff888102a32600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.686974] ==================================================================
[   27.716160] ==================================================================
[   27.716685] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1b23/0x5450
[   27.717829] Write of size 8 at addr ffff888102a32530 by task kunit_try_catch/273
[   27.718893] 
[   27.719280] CPU: 0 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241128 #1
[   27.720733] Tainted: [B]=BAD_PAGE, [N]=TEST
[   27.721434] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   27.722721] Call Trace:
[   27.723013]  <TASK>
[   27.723424]  dump_stack_lvl+0x73/0xb0
[   27.724226]  print_report+0xd1/0x640
[   27.724832]  ? __virt_addr_valid+0x1db/0x2d0
[   27.725406]  ? kasan_complete_mode_report_info+0x2a/0x200
[   27.726705]  kasan_report+0x102/0x140
[   27.727103]  ? kasan_atomics_helper+0x1b23/0x5450
[   27.727872]  ? kasan_atomics_helper+0x1b23/0x5450
[   27.728610]  kasan_check_range+0x10c/0x1c0
[   27.728823]  __kasan_check_write+0x18/0x20
[   27.729014]  kasan_atomics_helper+0x1b23/0x5450
[   27.729357]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   27.730168]  ? __kmalloc_cache_noprof+0x184/0x410
[   27.730641]  ? kasan_atomics+0x153/0x310
[   27.731034]  kasan_atomics+0x1dd/0x310
[   27.731782]  ? __pfx_kasan_atomics+0x10/0x10
[   27.732364]  ? __pfx_read_tsc+0x10/0x10
[   27.732744]  ? ktime_get_ts64+0x84/0x230
[   27.733596]  kunit_try_run_case+0x1b3/0x490
[   27.734154]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.734641]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   27.735130]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   27.735802]  ? __kthread_parkme+0x82/0x160
[   27.736274]  ? preempt_count_sub+0x50/0x80
[   27.736818]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.737364]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   27.737957]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.738518]  kthread+0x257/0x310
[   27.738840]  ? __pfx_kthread+0x10/0x10
[   27.739369]  ret_from_fork+0x41/0x80
[   27.739753]  ? __pfx_kthread+0x10/0x10
[   27.740045]  ret_from_fork_asm+0x1a/0x30
[   27.740588]  </TASK>
[   27.740880] 
[   27.741112] Allocated by task 273:
[   27.741539]  kasan_save_stack+0x3d/0x60
[   27.741892]  kasan_save_track+0x18/0x40
[   27.742238]  kasan_save_alloc_info+0x3b/0x50
[   27.742725]  __kasan_kmalloc+0xb7/0xc0
[   27.743159]  __kmalloc_cache_noprof+0x184/0x410
[   27.743652]  kasan_atomics+0x96/0x310
[   27.744131]  kunit_try_run_case+0x1b3/0x490
[   27.744584]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.745214]  kthread+0x257/0x310
[   27.745545]  ret_from_fork+0x41/0x80
[   27.745977]  ret_from_fork_asm+0x1a/0x30
[   27.746316] 
[   27.746549] The buggy address belongs to the object at ffff888102a32500
[   27.746549]  which belongs to the cache kmalloc-64 of size 64
[   27.747598] The buggy address is located 0 bytes to the right of
[   27.747598]  allocated 48-byte region [ffff888102a32500, ffff888102a32530)
[   27.748697] 
[   27.748857] The buggy address belongs to the physical page:
[   27.749472] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a32
[   27.750216] flags: 0x200000000000000(node=0|zone=2)
[   27.750713] page_type: f5(slab)
[   27.751025] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   27.751770] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   27.752470] page dumped because: kasan: bad access detected
[   27.752894] 
[   27.753054] Memory state around the buggy address:
[   27.753668]  ffff888102a32400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.754125]  ffff888102a32480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.754846] >ffff888102a32500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   27.755594]                                      ^
[   27.755964]  ffff888102a32580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.756721]  ffff888102a32600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.757418] ==================================================================
[   26.186954] ==================================================================
[   26.187591] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x8fa/0x5450
[   26.188743] Write of size 4 at addr ffff888102a32530 by task kunit_try_catch/273
[   26.189405] 
[   26.189688] CPU: 0 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241128 #1
[   26.190490] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.190945] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   26.191722] Call Trace:
[   26.192053]  <TASK>
[   26.192412]  dump_stack_lvl+0x73/0xb0
[   26.192746]  print_report+0xd1/0x640
[   26.193238]  ? __virt_addr_valid+0x1db/0x2d0
[   26.193665]  ? kasan_complete_mode_report_info+0x2a/0x200
[   26.194208]  kasan_report+0x102/0x140
[   26.194601]  ? kasan_atomics_helper+0x8fa/0x5450
[   26.195182]  ? kasan_atomics_helper+0x8fa/0x5450
[   26.195716]  kasan_check_range+0x10c/0x1c0
[   26.196228]  __kasan_check_write+0x18/0x20
[   26.196685]  kasan_atomics_helper+0x8fa/0x5450
[   26.197058]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   26.197618]  ? __kmalloc_cache_noprof+0x184/0x410
[   26.197998]  ? kasan_atomics+0x153/0x310
[   26.198562]  kasan_atomics+0x1dd/0x310
[   26.198989]  ? __pfx_kasan_atomics+0x10/0x10
[   26.199421]  ? __pfx_read_tsc+0x10/0x10
[   26.199852]  ? ktime_get_ts64+0x84/0x230
[   26.200293]  kunit_try_run_case+0x1b3/0x490
[   26.200821]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.201240]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   26.201727]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   26.202088]  ? __kthread_parkme+0x82/0x160
[   26.202474]  ? preempt_count_sub+0x50/0x80
[   26.202984]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.203587]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   26.204188]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.204576]  kthread+0x257/0x310
[   26.205027]  ? __pfx_kthread+0x10/0x10
[   26.205592]  ret_from_fork+0x41/0x80
[   26.205945]  ? __pfx_kthread+0x10/0x10
[   26.206293]  ret_from_fork_asm+0x1a/0x30
[   26.206739]  </TASK>
[   26.207050] 
[   26.207429] Allocated by task 273:
[   26.207865]  kasan_save_stack+0x3d/0x60
[   26.208933]  kasan_save_track+0x18/0x40
[   26.209818]  kasan_save_alloc_info+0x3b/0x50
[   26.210878]  __kasan_kmalloc+0xb7/0xc0
[   26.211424]  __kmalloc_cache_noprof+0x184/0x410
[   26.211970]  kasan_atomics+0x96/0x310
[   26.212793]  kunit_try_run_case+0x1b3/0x490
[   26.213450]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.213911]  kthread+0x257/0x310
[   26.214625]  ret_from_fork+0x41/0x80
[   26.215108]  ret_from_fork_asm+0x1a/0x30
[   26.215441] 
[   26.215694] The buggy address belongs to the object at ffff888102a32500
[   26.215694]  which belongs to the cache kmalloc-64 of size 64
[   26.217331] The buggy address is located 0 bytes to the right of
[   26.217331]  allocated 48-byte region [ffff888102a32500, ffff888102a32530)
[   26.218670] 
[   26.219127] The buggy address belongs to the physical page:
[   26.219580] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a32
[   26.220720] flags: 0x200000000000000(node=0|zone=2)
[   26.220952] page_type: f5(slab)
[   26.221127] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   26.221626] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   26.222491] page dumped because: kasan: bad access detected
[   26.222849] 
[   26.223046] Memory state around the buggy address:
[   26.223376]  ffff888102a32400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.224134]  ffff888102a32480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.224799] >ffff888102a32500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   26.225594]                                      ^
[   26.225907]  ffff888102a32580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.226655]  ffff888102a32600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.227856] ==================================================================
[   26.561831] ==================================================================
[   26.562424] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xe79/0x5450
[   26.563227] Write of size 4 at addr ffff888102a32530 by task kunit_try_catch/273
[   26.565007] 
[   26.565371] CPU: 0 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241128 #1
[   26.566389] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.566782] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   26.567484] Call Trace:
[   26.567923]  <TASK>
[   26.568239]  dump_stack_lvl+0x73/0xb0
[   26.568750]  print_report+0xd1/0x640
[   26.569234]  ? __virt_addr_valid+0x1db/0x2d0
[   26.569892]  ? kasan_complete_mode_report_info+0x2a/0x200
[   26.570419]  kasan_report+0x102/0x140
[   26.570963]  ? kasan_atomics_helper+0xe79/0x5450
[   26.571543]  ? kasan_atomics_helper+0xe79/0x5450
[   26.571926]  kasan_check_range+0x10c/0x1c0
[   26.572501]  __kasan_check_write+0x18/0x20
[   26.572889]  kasan_atomics_helper+0xe79/0x5450
[   26.573537]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   26.573967]  ? __kmalloc_cache_noprof+0x184/0x410
[   26.574616]  ? kasan_atomics+0x153/0x310
[   26.575007]  kasan_atomics+0x1dd/0x310
[   26.575525]  ? __pfx_kasan_atomics+0x10/0x10
[   26.576126]  ? __pfx_read_tsc+0x10/0x10
[   26.576498]  ? ktime_get_ts64+0x84/0x230
[   26.577120]  kunit_try_run_case+0x1b3/0x490
[   26.577577]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.578115]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   26.578599]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   26.579243]  ? __kthread_parkme+0x82/0x160
[   26.579718]  ? preempt_count_sub+0x50/0x80
[   26.580179]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.580798]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   26.581504]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.582183]  kthread+0x257/0x310
[   26.582594]  ? __pfx_kthread+0x10/0x10
[   26.582974]  ret_from_fork+0x41/0x80
[   26.583576]  ? __pfx_kthread+0x10/0x10
[   26.584000]  ret_from_fork_asm+0x1a/0x30
[   26.584643]  </TASK>
[   26.584839] 
[   26.585146] Allocated by task 273:
[   26.585530]  kasan_save_stack+0x3d/0x60
[   26.585964]  kasan_save_track+0x18/0x40
[   26.586467]  kasan_save_alloc_info+0x3b/0x50
[   26.586776]  __kasan_kmalloc+0xb7/0xc0
[   26.587245]  __kmalloc_cache_noprof+0x184/0x410
[   26.587873]  kasan_atomics+0x96/0x310
[   26.588283]  kunit_try_run_case+0x1b3/0x490
[   26.588898]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.589478]  kthread+0x257/0x310
[   26.589941]  ret_from_fork+0x41/0x80
[   26.590504]  ret_from_fork_asm+0x1a/0x30
[   26.591052] 
[   26.591317] The buggy address belongs to the object at ffff888102a32500
[   26.591317]  which belongs to the cache kmalloc-64 of size 64
[   26.592476] The buggy address is located 0 bytes to the right of
[   26.592476]  allocated 48-byte region [ffff888102a32500, ffff888102a32530)
[   26.593685] 
[   26.593974] The buggy address belongs to the physical page:
[   26.594550] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a32
[   26.595399] flags: 0x200000000000000(node=0|zone=2)
[   26.595889] page_type: f5(slab)
[   26.596330] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   26.597008] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   26.597779] page dumped because: kasan: bad access detected
[   26.598377] 
[   26.598628] Memory state around the buggy address:
[   26.599110]  ffff888102a32400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.599865]  ffff888102a32480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.600546] >ffff888102a32500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   26.601278]                                      ^
[   26.601760]  ffff888102a32580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.602476]  ffff888102a32600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.603141] ==================================================================
[   27.409817] ==================================================================
[   27.410975] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x16e8/0x5450
[   27.411706] Write of size 8 at addr ffff888102a32530 by task kunit_try_catch/273
[   27.412330] 
[   27.412588] CPU: 0 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241128 #1
[   27.413486] Tainted: [B]=BAD_PAGE, [N]=TEST
[   27.413837] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   27.414522] Call Trace:
[   27.414876]  <TASK>
[   27.415261]  dump_stack_lvl+0x73/0xb0
[   27.415733]  print_report+0xd1/0x640
[   27.416171]  ? __virt_addr_valid+0x1db/0x2d0
[   27.416649]  ? kasan_complete_mode_report_info+0x2a/0x200
[   27.417056]  kasan_report+0x102/0x140
[   27.417576]  ? kasan_atomics_helper+0x16e8/0x5450
[   27.418051]  ? kasan_atomics_helper+0x16e8/0x5450
[   27.418705]  kasan_check_range+0x10c/0x1c0
[   27.419028]  __kasan_check_write+0x18/0x20
[   27.419615]  kasan_atomics_helper+0x16e8/0x5450
[   27.420327]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   27.420686]  ? __kmalloc_cache_noprof+0x184/0x410
[   27.420993]  ? kasan_atomics+0x153/0x310
[   27.421431]  kasan_atomics+0x1dd/0x310
[   27.422080]  ? __pfx_kasan_atomics+0x10/0x10
[   27.422897]  ? __pfx_read_tsc+0x10/0x10
[   27.423564]  ? ktime_get_ts64+0x84/0x230
[   27.424213]  kunit_try_run_case+0x1b3/0x490
[   27.424955]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.425496]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   27.426298]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   27.427130]  ? __kthread_parkme+0x82/0x160
[   27.428032]  ? preempt_count_sub+0x50/0x80
[   27.428623]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.429532]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   27.430662]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.431371]  kthread+0x257/0x310
[   27.431744]  ? __pfx_kthread+0x10/0x10
[   27.432206]  ret_from_fork+0x41/0x80
[   27.433354]  ? __pfx_kthread+0x10/0x10
[   27.433872]  ret_from_fork_asm+0x1a/0x30
[   27.434730]  </TASK>
[   27.434962] 
[   27.435229] Allocated by task 273:
[   27.436189]  kasan_save_stack+0x3d/0x60
[   27.437029]  kasan_save_track+0x18/0x40
[   27.437808]  kasan_save_alloc_info+0x3b/0x50
[   27.438241]  __kasan_kmalloc+0xb7/0xc0
[   27.438537]  __kmalloc_cache_noprof+0x184/0x410
[   27.439440]  kasan_atomics+0x96/0x310
[   27.439834]  kunit_try_run_case+0x1b3/0x490
[   27.440621]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.441440]  kthread+0x257/0x310
[   27.441988]  ret_from_fork+0x41/0x80
[   27.442380]  ret_from_fork_asm+0x1a/0x30
[   27.442748] 
[   27.443005] The buggy address belongs to the object at ffff888102a32500
[   27.443005]  which belongs to the cache kmalloc-64 of size 64
[   27.444026] The buggy address is located 0 bytes to the right of
[   27.444026]  allocated 48-byte region [ffff888102a32500, ffff888102a32530)
[   27.445506] 
[   27.445756] The buggy address belongs to the physical page:
[   27.446493] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a32
[   27.447436] flags: 0x200000000000000(node=0|zone=2)
[   27.448027] page_type: f5(slab)
[   27.448577] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   27.449427] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   27.450162] page dumped because: kasan: bad access detected
[   27.450799] 
[   27.451127] Memory state around the buggy address:
[   27.451694]  ffff888102a32400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.452525]  ffff888102a32480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.453378] >ffff888102a32500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   27.454159]                                      ^
[   27.454556]  ffff888102a32580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.455505]  ffff888102a32600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.456248] ==================================================================
[   26.871604] ==================================================================
[   26.872217] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a04/0x5450
[   26.872904] Read of size 4 at addr ffff888102a32530 by task kunit_try_catch/273
[   26.873714] 
[   26.873931] CPU: 0 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241128 #1
[   26.874875] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.875264] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   26.876084] Call Trace:
[   26.877204]  <TASK>
[   26.877528]  dump_stack_lvl+0x73/0xb0
[   26.877935]  print_report+0xd1/0x640
[   26.878529]  ? __virt_addr_valid+0x1db/0x2d0
[   26.879004]  ? kasan_complete_mode_report_info+0x2a/0x200
[   26.879564]  kasan_report+0x102/0x140
[   26.879944]  ? kasan_atomics_helper+0x4a04/0x5450
[   26.880573]  ? kasan_atomics_helper+0x4a04/0x5450
[   26.880961]  __asan_report_load4_noabort+0x18/0x20
[   26.881749]  kasan_atomics_helper+0x4a04/0x5450
[   26.882255]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   26.883029]  ? __kmalloc_cache_noprof+0x184/0x410
[   26.883672]  ? kasan_atomics+0x153/0x310
[   26.884181]  kasan_atomics+0x1dd/0x310
[   26.884701]  ? __pfx_kasan_atomics+0x10/0x10
[   26.885277]  ? __pfx_read_tsc+0x10/0x10
[   26.885649]  ? ktime_get_ts64+0x84/0x230
[   26.886216]  kunit_try_run_case+0x1b3/0x490
[   26.886643]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.887194]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   26.887842]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   26.888399]  ? __kthread_parkme+0x82/0x160
[   26.888836]  ? preempt_count_sub+0x50/0x80
[   26.889390]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.889833]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   26.890425]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.891166]  kthread+0x257/0x310
[   26.891523]  ? __pfx_kthread+0x10/0x10
[   26.892057]  ret_from_fork+0x41/0x80
[   26.892527]  ? __pfx_kthread+0x10/0x10
[   26.892951]  ret_from_fork_asm+0x1a/0x30
[   26.893436]  </TASK>
[   26.893772] 
[   26.893951] Allocated by task 273:
[   26.894419]  kasan_save_stack+0x3d/0x60
[   26.894783]  kasan_save_track+0x18/0x40
[   26.895397]  kasan_save_alloc_info+0x3b/0x50
[   26.895886]  __kasan_kmalloc+0xb7/0xc0
[   26.896300]  __kmalloc_cache_noprof+0x184/0x410
[   26.896834]  kasan_atomics+0x96/0x310
[   26.897262]  kunit_try_run_case+0x1b3/0x490
[   26.897879]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.898574]  kthread+0x257/0x310
[   26.898946]  ret_from_fork+0x41/0x80
[   26.899382]  ret_from_fork_asm+0x1a/0x30
[   26.899913] 
[   26.900212] The buggy address belongs to the object at ffff888102a32500
[   26.900212]  which belongs to the cache kmalloc-64 of size 64
[   26.901243] The buggy address is located 0 bytes to the right of
[   26.901243]  allocated 48-byte region [ffff888102a32500, ffff888102a32530)
[   26.902397] 
[   26.902655] The buggy address belongs to the physical page:
[   26.903181] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a32
[   26.903909] flags: 0x200000000000000(node=0|zone=2)
[   26.904461] page_type: f5(slab)
[   26.904831] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   26.905325] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   26.906060] page dumped because: kasan: bad access detected
[   26.906776] 
[   26.907029] Memory state around the buggy address:
[   26.907491]  ffff888102a32400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.908208]  ffff888102a32480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.908871] >ffff888102a32500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   26.909605]                                      ^
[   26.909922]  ffff888102a32580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.911225]  ffff888102a32600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.911920] ==================================================================
[   27.834431] ==================================================================
[   27.835479] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1ce2/0x5450
[   27.836165] Write of size 8 at addr ffff888102a32530 by task kunit_try_catch/273
[   27.836917] 
[   27.837200] CPU: 0 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241128 #1
[   27.837969] Tainted: [B]=BAD_PAGE, [N]=TEST
[   27.838505] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   27.839258] Call Trace:
[   27.839636]  <TASK>
[   27.839867]  dump_stack_lvl+0x73/0xb0
[   27.840421]  print_report+0xd1/0x640
[   27.840797]  ? __virt_addr_valid+0x1db/0x2d0
[   27.841213]  ? kasan_complete_mode_report_info+0x2a/0x200
[   27.841877]  kasan_report+0x102/0x140
[   27.842322]  ? kasan_atomics_helper+0x1ce2/0x5450
[   27.842785]  ? kasan_atomics_helper+0x1ce2/0x5450
[   27.843476]  kasan_check_range+0x10c/0x1c0
[   27.843841]  __kasan_check_write+0x18/0x20
[   27.844380]  kasan_atomics_helper+0x1ce2/0x5450
[   27.844950]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   27.845490]  ? __kmalloc_cache_noprof+0x184/0x410
[   27.845959]  ? kasan_atomics+0x153/0x310
[   27.846581]  kasan_atomics+0x1dd/0x310
[   27.846971]  ? __pfx_kasan_atomics+0x10/0x10
[   27.847626]  ? __pfx_read_tsc+0x10/0x10
[   27.848005]  ? ktime_get_ts64+0x84/0x230
[   27.848550]  kunit_try_run_case+0x1b3/0x490
[   27.848949]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.849609]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   27.850033]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   27.850700]  ? __kthread_parkme+0x82/0x160
[   27.851279]  ? preempt_count_sub+0x50/0x80
[   27.851799]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.852357]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   27.853052]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.853804]  kthread+0x257/0x310
[   27.854322]  ? __pfx_kthread+0x10/0x10
[   27.854836]  ret_from_fork+0x41/0x80
[   27.855296]  ? __pfx_kthread+0x10/0x10
[   27.855854]  ret_from_fork_asm+0x1a/0x30
[   27.856417]  </TASK>
[   27.856717] 
[   27.856957] Allocated by task 273:
[   27.857439]  kasan_save_stack+0x3d/0x60
[   27.857914]  kasan_save_track+0x18/0x40
[   27.858491]  kasan_save_alloc_info+0x3b/0x50
[   27.859042]  __kasan_kmalloc+0xb7/0xc0
[   27.859601]  __kmalloc_cache_noprof+0x184/0x410
[   27.860269]  kasan_atomics+0x96/0x310
[   27.860825]  kunit_try_run_case+0x1b3/0x490
[   27.861272]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.862021]  kthread+0x257/0x310
[   27.862442]  ret_from_fork+0x41/0x80
[   27.862814]  ret_from_fork_asm+0x1a/0x30
[   27.863290] 
[   27.863552] The buggy address belongs to the object at ffff888102a32500
[   27.863552]  which belongs to the cache kmalloc-64 of size 64
[   27.864209] The buggy address is located 0 bytes to the right of
[   27.864209]  allocated 48-byte region [ffff888102a32500, ffff888102a32530)
[   27.865739] 
[   27.866010] The buggy address belongs to the physical page:
[   27.866465] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a32
[   27.867427] flags: 0x200000000000000(node=0|zone=2)
[   27.867909] page_type: f5(slab)
[   27.868378] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   27.869230] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   27.870006] page dumped because: kasan: bad access detected
[   27.870606] 
[   27.870761] Memory state around the buggy address:
[   27.871398]  ffff888102a32400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.871938]  ffff888102a32480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.872763] >ffff888102a32500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   27.873467]                                      ^
[   27.874036]  ffff888102a32580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.874983]  ffff888102a32600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.875662] ==================================================================
[   27.921307] ==================================================================
[   27.921956] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1e13/0x5450
[   27.922836] Write of size 8 at addr ffff888102a32530 by task kunit_try_catch/273
[   27.923618] 
[   27.923740] CPU: 0 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241128 #1
[   27.924115] Tainted: [B]=BAD_PAGE, [N]=TEST
[   27.924290] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   27.924759] Call Trace:
[   27.924975]  <TASK>
[   27.925380]  dump_stack_lvl+0x73/0xb0
[   27.926292]  print_report+0xd1/0x640
[   27.926906]  ? __virt_addr_valid+0x1db/0x2d0
[   27.927830]  ? kasan_complete_mode_report_info+0x2a/0x200
[   27.929021]  kasan_report+0x102/0x140
[   27.929807]  ? kasan_atomics_helper+0x1e13/0x5450
[   27.930262]  ? kasan_atomics_helper+0x1e13/0x5450
[   27.930955]  kasan_check_range+0x10c/0x1c0
[   27.931731]  __kasan_check_write+0x18/0x20
[   27.932229]  kasan_atomics_helper+0x1e13/0x5450
[   27.932750]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   27.933280]  ? __kmalloc_cache_noprof+0x184/0x410
[   27.933935]  ? kasan_atomics+0x153/0x310
[   27.934526]  kasan_atomics+0x1dd/0x310
[   27.934919]  ? __pfx_kasan_atomics+0x10/0x10
[   27.935365]  ? __pfx_read_tsc+0x10/0x10
[   27.935767]  ? ktime_get_ts64+0x84/0x230
[   27.936162]  kunit_try_run_case+0x1b3/0x490
[   27.936670]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.936998]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   27.937687]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   27.938350]  ? __kthread_parkme+0x82/0x160
[   27.938729]  ? preempt_count_sub+0x50/0x80
[   27.939198]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.939863]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   27.940551]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.941048]  kthread+0x257/0x310
[   27.941465]  ? __pfx_kthread+0x10/0x10
[   27.941998]  ret_from_fork+0x41/0x80
[   27.942432]  ? __pfx_kthread+0x10/0x10
[   27.942935]  ret_from_fork_asm+0x1a/0x30
[   27.943461]  </TASK>
[   27.943759] 
[   27.944043] Allocated by task 273:
[   27.944479]  kasan_save_stack+0x3d/0x60
[   27.945003]  kasan_save_track+0x18/0x40
[   27.945403]  kasan_save_alloc_info+0x3b/0x50
[   27.945965]  __kasan_kmalloc+0xb7/0xc0
[   27.946383]  __kmalloc_cache_noprof+0x184/0x410
[   27.946707]  kasan_atomics+0x96/0x310
[   27.947265]  kunit_try_run_case+0x1b3/0x490
[   27.947630]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.948437]  kthread+0x257/0x310
[   27.948741]  ret_from_fork+0x41/0x80
[   27.949155]  ret_from_fork_asm+0x1a/0x30
[   27.949735] 
[   27.949936] The buggy address belongs to the object at ffff888102a32500
[   27.949936]  which belongs to the cache kmalloc-64 of size 64
[   27.951150] The buggy address is located 0 bytes to the right of
[   27.951150]  allocated 48-byte region [ffff888102a32500, ffff888102a32530)
[   27.952319] 
[   27.952605] The buggy address belongs to the physical page:
[   27.953111] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a32
[   27.953900] flags: 0x200000000000000(node=0|zone=2)
[   27.954489] page_type: f5(slab)
[   27.954873] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   27.955672] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   27.957031] page dumped because: kasan: bad access detected
[   27.957702] 
[   27.957895] Memory state around the buggy address:
[   27.958320]  ffff888102a32400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.958798]  ffff888102a32480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.959636] >ffff888102a32500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   27.960294]                                      ^
[   27.960794]  ffff888102a32580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.961610]  ffff888102a32600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.962306] ==================================================================
[   28.004999] ==================================================================
[   28.005958] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1f44/0x5450
[   28.006417] Write of size 8 at addr ffff888102a32530 by task kunit_try_catch/273
[   28.006853] 
[   28.006974] CPU: 0 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241128 #1
[   28.007442] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.008244] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   28.009761] Call Trace:
[   28.010277]  <TASK>
[   28.010728]  dump_stack_lvl+0x73/0xb0
[   28.011522]  print_report+0xd1/0x640
[   28.012211]  ? __virt_addr_valid+0x1db/0x2d0
[   28.012948]  ? kasan_complete_mode_report_info+0x2a/0x200
[   28.013523]  kasan_report+0x102/0x140
[   28.013983]  ? kasan_atomics_helper+0x1f44/0x5450
[   28.014477]  ? kasan_atomics_helper+0x1f44/0x5450
[   28.014933]  kasan_check_range+0x10c/0x1c0
[   28.015519]  __kasan_check_write+0x18/0x20
[   28.015839]  kasan_atomics_helper+0x1f44/0x5450
[   28.016353]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   28.016877]  ? __kmalloc_cache_noprof+0x184/0x410
[   28.017312]  ? kasan_atomics+0x153/0x310
[   28.017794]  kasan_atomics+0x1dd/0x310
[   28.018265]  ? __pfx_kasan_atomics+0x10/0x10
[   28.018739]  ? __pfx_read_tsc+0x10/0x10
[   28.019190]  ? ktime_get_ts64+0x84/0x230
[   28.019665]  kunit_try_run_case+0x1b3/0x490
[   28.020016]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.020484]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   28.021024]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   28.021645]  ? __kthread_parkme+0x82/0x160
[   28.022029]  ? preempt_count_sub+0x50/0x80
[   28.022423]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.023018]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   28.023540]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.023899]  kthread+0x257/0x310
[   28.024386]  ? __pfx_kthread+0x10/0x10
[   28.024871]  ret_from_fork+0x41/0x80
[   28.025303]  ? __pfx_kthread+0x10/0x10
[   28.025704]  ret_from_fork_asm+0x1a/0x30
[   28.026025]  </TASK>
[   28.026415] 
[   28.026659] Allocated by task 273:
[   28.027154]  kasan_save_stack+0x3d/0x60
[   28.027624]  kasan_save_track+0x18/0x40
[   28.027906]  kasan_save_alloc_info+0x3b/0x50
[   28.028279]  __kasan_kmalloc+0xb7/0xc0
[   28.028767]  __kmalloc_cache_noprof+0x184/0x410
[   28.029320]  kasan_atomics+0x96/0x310
[   28.029783]  kunit_try_run_case+0x1b3/0x490
[   28.030171]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.030716]  kthread+0x257/0x310
[   28.031192]  ret_from_fork+0x41/0x80
[   28.031595]  ret_from_fork_asm+0x1a/0x30
[   28.032033] 
[   28.032286] The buggy address belongs to the object at ffff888102a32500
[   28.032286]  which belongs to the cache kmalloc-64 of size 64
[   28.033928] The buggy address is located 0 bytes to the right of
[   28.033928]  allocated 48-byte region [ffff888102a32500, ffff888102a32530)
[   28.035186] 
[   28.035688] The buggy address belongs to the physical page:
[   28.036311] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a32
[   28.036996] flags: 0x200000000000000(node=0|zone=2)
[   28.037773] page_type: f5(slab)
[   28.038169] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   28.038963] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   28.039890] page dumped because: kasan: bad access detected
[   28.040386] 
[   28.040586] Memory state around the buggy address:
[   28.041082]  ffff888102a32400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.041752]  ffff888102a32480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.042310] >ffff888102a32500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   28.043369]                                      ^
[   28.044047]  ffff888102a32580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.044934]  ffff888102a32600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.045812] ==================================================================
[   26.228771] ==================================================================
[   26.229596] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x993/0x5450
[   26.230758] Write of size 4 at addr ffff888102a32530 by task kunit_try_catch/273
[   26.231672] 
[   26.231864] CPU: 0 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241128 #1
[   26.233316] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.233756] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   26.234612] Call Trace:
[   26.234994]  <TASK>
[   26.235254]  dump_stack_lvl+0x73/0xb0
[   26.235714]  print_report+0xd1/0x640
[   26.236394]  ? __virt_addr_valid+0x1db/0x2d0
[   26.237019]  ? kasan_complete_mode_report_info+0x2a/0x200
[   26.237749]  kasan_report+0x102/0x140
[   26.238153]  ? kasan_atomics_helper+0x993/0x5450
[   26.238542]  ? kasan_atomics_helper+0x993/0x5450
[   26.239107]  kasan_check_range+0x10c/0x1c0
[   26.239851]  __kasan_check_write+0x18/0x20
[   26.240242]  kasan_atomics_helper+0x993/0x5450
[   26.240904]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   26.241389]  ? __kmalloc_cache_noprof+0x184/0x410
[   26.241830]  ? kasan_atomics+0x153/0x310
[   26.242312]  kasan_atomics+0x1dd/0x310
[   26.242755]  ? __pfx_kasan_atomics+0x10/0x10
[   26.243282]  ? __pfx_read_tsc+0x10/0x10
[   26.243656]  ? ktime_get_ts64+0x84/0x230
[   26.244118]  kunit_try_run_case+0x1b3/0x490
[   26.244634]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.244972]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   26.245586]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   26.246121]  ? __kthread_parkme+0x82/0x160
[   26.246567]  ? preempt_count_sub+0x50/0x80
[   26.246960]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.247451]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   26.248111]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.248536]  kthread+0x257/0x310
[   26.248801]  ? __pfx_kthread+0x10/0x10
[   26.249330]  ret_from_fork+0x41/0x80
[   26.249830]  ? __pfx_kthread+0x10/0x10
[   26.250199]  ret_from_fork_asm+0x1a/0x30
[   26.250699]  </TASK>
[   26.251009] 
[   26.251351] Allocated by task 273:
[   26.251776]  kasan_save_stack+0x3d/0x60
[   26.252204]  kasan_save_track+0x18/0x40
[   26.252520]  kasan_save_alloc_info+0x3b/0x50
[   26.253033]  __kasan_kmalloc+0xb7/0xc0
[   26.253608]  __kmalloc_cache_noprof+0x184/0x410
[   26.254125]  kasan_atomics+0x96/0x310
[   26.254482]  kunit_try_run_case+0x1b3/0x490
[   26.254782]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.255409]  kthread+0x257/0x310
[   26.255845]  ret_from_fork+0x41/0x80
[   26.256357]  ret_from_fork_asm+0x1a/0x30
[   26.256827] 
[   26.257029] The buggy address belongs to the object at ffff888102a32500
[   26.257029]  which belongs to the cache kmalloc-64 of size 64
[   26.257987] The buggy address is located 0 bytes to the right of
[   26.257987]  allocated 48-byte region [ffff888102a32500, ffff888102a32530)
[   26.259005] 
[   26.259303] The buggy address belongs to the physical page:
[   26.259935] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a32
[   26.260649] flags: 0x200000000000000(node=0|zone=2)
[   26.260972] page_type: f5(slab)
[   26.261436] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   26.262231] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   26.262712] page dumped because: kasan: bad access detected
[   26.263364] 
[   26.263613] Memory state around the buggy address:
[   26.264026]  ffff888102a32400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.264684]  ffff888102a32480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.265384] >ffff888102a32500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   26.265929]                                      ^
[   26.266292]  ffff888102a32580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.267139]  ffff888102a32600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.267871] ==================================================================
[   25.663513] ==================================================================
[   25.664674] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b8a/0x5450
[   25.665268] Read of size 4 at addr ffff888102a32530 by task kunit_try_catch/273
[   25.665953] 
[   25.666314] CPU: 0 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241128 #1
[   25.667330] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.667703] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   25.668594] Call Trace:
[   25.668814]  <TASK>
[   25.669089]  dump_stack_lvl+0x73/0xb0
[   25.669670]  print_report+0xd1/0x640
[   25.670203]  ? __virt_addr_valid+0x1db/0x2d0
[   25.671035]  ? kasan_complete_mode_report_info+0x2a/0x200
[   25.671603]  kasan_report+0x102/0x140
[   25.672103]  ? kasan_atomics_helper+0x4b8a/0x5450
[   25.672746]  ? kasan_atomics_helper+0x4b8a/0x5450
[   25.673615]  __asan_report_load4_noabort+0x18/0x20
[   25.674150]  kasan_atomics_helper+0x4b8a/0x5450
[   25.674724]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   25.675276]  ? __kmalloc_cache_noprof+0x184/0x410
[   25.675788]  ? kasan_atomics+0x153/0x310
[   25.676420]  kasan_atomics+0x1dd/0x310
[   25.676925]  ? __pfx_kasan_atomics+0x10/0x10
[   25.677492]  ? __pfx_read_tsc+0x10/0x10
[   25.677859]  ? ktime_get_ts64+0x84/0x230
[   25.678202]  kunit_try_run_case+0x1b3/0x490
[   25.678848]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.679578]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   25.680281]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   25.680965]  ? __kthread_parkme+0x82/0x160
[   25.681423]  ? preempt_count_sub+0x50/0x80
[   25.682038]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.682698]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   25.683325]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.683767]  kthread+0x257/0x310
[   25.684367]  ? __pfx_kthread+0x10/0x10
[   25.684999]  ret_from_fork+0x41/0x80
[   25.685574]  ? __pfx_kthread+0x10/0x10
[   25.686174]  ret_from_fork_asm+0x1a/0x30
[   25.686839]  </TASK>
[   25.687231] 
[   25.687491] Allocated by task 273:
[   25.687990]  kasan_save_stack+0x3d/0x60
[   25.688601]  kasan_save_track+0x18/0x40
[   25.689042]  kasan_save_alloc_info+0x3b/0x50
[   25.689773]  __kasan_kmalloc+0xb7/0xc0
[   25.690285]  __kmalloc_cache_noprof+0x184/0x410
[   25.690895]  kasan_atomics+0x96/0x310
[   25.691317]  kunit_try_run_case+0x1b3/0x490
[   25.691914]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.692764]  kthread+0x257/0x310
[   25.693294]  ret_from_fork+0x41/0x80
[   25.693637]  ret_from_fork_asm+0x1a/0x30
[   25.694246] 
[   25.694575] The buggy address belongs to the object at ffff888102a32500
[   25.694575]  which belongs to the cache kmalloc-64 of size 64
[   25.695725] The buggy address is located 0 bytes to the right of
[   25.695725]  allocated 48-byte region [ffff888102a32500, ffff888102a32530)
[   25.696981] 
[   25.697408] The buggy address belongs to the physical page:
[   25.697899] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a32
[   25.698547] flags: 0x200000000000000(node=0|zone=2)
[   25.699169] page_type: f5(slab)
[   25.699871] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   25.700467] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   25.701484] page dumped because: kasan: bad access detected
[   25.702155] 
[   25.702497] Memory state around the buggy address:
[   25.702934]  ffff888102a32400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.703782]  ffff888102a32480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.704649] >ffff888102a32500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   25.705441]                                      ^
[   25.706066]  ffff888102a32580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.706891]  ffff888102a32600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.707592] ==================================================================
[   28.176473] ==================================================================
[   28.177021] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x20c9/0x5450
[   28.177902] Write of size 8 at addr ffff888102a32530 by task kunit_try_catch/273
[   28.178576] 
[   28.178762] CPU: 0 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241128 #1
[   28.179841] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.180442] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   28.181154] Call Trace:
[   28.181596]  <TASK>
[   28.181830]  dump_stack_lvl+0x73/0xb0
[   28.182290]  print_report+0xd1/0x640
[   28.182733]  ? __virt_addr_valid+0x1db/0x2d0
[   28.183288]  ? kasan_complete_mode_report_info+0x2a/0x200
[   28.183732]  kasan_report+0x102/0x140
[   28.184161]  ? kasan_atomics_helper+0x20c9/0x5450
[   28.184899]  ? kasan_atomics_helper+0x20c9/0x5450
[   28.185303]  kasan_check_range+0x10c/0x1c0
[   28.185649]  __kasan_check_write+0x18/0x20
[   28.186234]  kasan_atomics_helper+0x20c9/0x5450
[   28.187511]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   28.187843]  ? __kmalloc_cache_noprof+0x184/0x410
[   28.188654]  ? kasan_atomics+0x153/0x310
[   28.189307]  kasan_atomics+0x1dd/0x310
[   28.189657]  ? __pfx_kasan_atomics+0x10/0x10
[   28.190350]  ? __pfx_read_tsc+0x10/0x10
[   28.190962]  ? ktime_get_ts64+0x84/0x230
[   28.191482]  kunit_try_run_case+0x1b3/0x490
[   28.192386]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.193019]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   28.193611]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   28.194173]  ? __kthread_parkme+0x82/0x160
[   28.194730]  ? preempt_count_sub+0x50/0x80
[   28.195238]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.195762]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   28.196401]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.196972]  kthread+0x257/0x310
[   28.197505]  ? __pfx_kthread+0x10/0x10
[   28.197895]  ret_from_fork+0x41/0x80
[   28.198444]  ? __pfx_kthread+0x10/0x10
[   28.198810]  ret_from_fork_asm+0x1a/0x30
[   28.199373]  </TASK>
[   28.199719] 
[   28.199994] Allocated by task 273:
[   28.200394]  kasan_save_stack+0x3d/0x60
[   28.200903]  kasan_save_track+0x18/0x40
[   28.201429]  kasan_save_alloc_info+0x3b/0x50
[   28.201971]  __kasan_kmalloc+0xb7/0xc0
[   28.202415]  __kmalloc_cache_noprof+0x184/0x410
[   28.202927]  kasan_atomics+0x96/0x310
[   28.203412]  kunit_try_run_case+0x1b3/0x490
[   28.203928]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.204429]  kthread+0x257/0x310
[   28.204907]  ret_from_fork+0x41/0x80
[   28.205277]  ret_from_fork_asm+0x1a/0x30
[   28.205813] 
[   28.205997] The buggy address belongs to the object at ffff888102a32500
[   28.205997]  which belongs to the cache kmalloc-64 of size 64
[   28.207211] The buggy address is located 0 bytes to the right of
[   28.207211]  allocated 48-byte region [ffff888102a32500, ffff888102a32530)
[   28.208287] 
[   28.208615] The buggy address belongs to the physical page:
[   28.209294] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a32
[   28.209864] flags: 0x200000000000000(node=0|zone=2)
[   28.210571] page_type: f5(slab)
[   28.210885] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   28.211615] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   28.212534] page dumped because: kasan: bad access detected
[   28.213044] 
[   28.213248] Memory state around the buggy address:
[   28.213865]  ffff888102a32400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.214670]  ffff888102a32480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.215186] >ffff888102a32500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   28.215843]                                      ^
[   28.216441]  ffff888102a32580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.216944]  ffff888102a32600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.217811] ==================================================================
[   28.262798] ==================================================================
[   28.263551] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x218b/0x5450
[   28.264352] Write of size 8 at addr ffff888102a32530 by task kunit_try_catch/273
[   28.264803] 
[   28.265605] CPU: 0 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241128 #1
[   28.266542] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.266845] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   28.268399] Call Trace:
[   28.268868]  <TASK>
[   28.269305]  dump_stack_lvl+0x73/0xb0
[   28.269729]  print_report+0xd1/0x640
[   28.270110]  ? __virt_addr_valid+0x1db/0x2d0
[   28.270498]  ? kasan_complete_mode_report_info+0x2a/0x200
[   28.271120]  kasan_report+0x102/0x140
[   28.271491]  ? kasan_atomics_helper+0x218b/0x5450
[   28.271886]  ? kasan_atomics_helper+0x218b/0x5450
[   28.272543]  kasan_check_range+0x10c/0x1c0
[   28.272941]  __kasan_check_write+0x18/0x20
[   28.273440]  kasan_atomics_helper+0x218b/0x5450
[   28.273880]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   28.274358]  ? __kmalloc_cache_noprof+0x184/0x410
[   28.274847]  ? kasan_atomics+0x153/0x310
[   28.275352]  kasan_atomics+0x1dd/0x310
[   28.275671]  ? __pfx_kasan_atomics+0x10/0x10
[   28.276230]  ? __pfx_read_tsc+0x10/0x10
[   28.276694]  ? ktime_get_ts64+0x84/0x230
[   28.277130]  kunit_try_run_case+0x1b3/0x490
[   28.277656]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.278254]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   28.278643]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   28.279308]  ? __kthread_parkme+0x82/0x160
[   28.279631]  ? preempt_count_sub+0x50/0x80
[   28.280199]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.280608]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   28.281113]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.281756]  kthread+0x257/0x310
[   28.282111]  ? __pfx_kthread+0x10/0x10
[   28.282520]  ret_from_fork+0x41/0x80
[   28.282953]  ? __pfx_kthread+0x10/0x10
[   28.283413]  ret_from_fork_asm+0x1a/0x30
[   28.283956]  </TASK>
[   28.284313] 
[   28.284542] Allocated by task 273:
[   28.284785]  kasan_save_stack+0x3d/0x60
[   28.285366]  kasan_save_track+0x18/0x40
[   28.285916]  kasan_save_alloc_info+0x3b/0x50
[   28.286286]  __kasan_kmalloc+0xb7/0xc0
[   28.286951]  __kmalloc_cache_noprof+0x184/0x410
[   28.287318]  kasan_atomics+0x96/0x310
[   28.288409]  kunit_try_run_case+0x1b3/0x490
[   28.288948]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.289515]  kthread+0x257/0x310
[   28.289872]  ret_from_fork+0x41/0x80
[   28.290393]  ret_from_fork_asm+0x1a/0x30
[   28.290695] 
[   28.290937] The buggy address belongs to the object at ffff888102a32500
[   28.290937]  which belongs to the cache kmalloc-64 of size 64
[   28.291887] The buggy address is located 0 bytes to the right of
[   28.291887]  allocated 48-byte region [ffff888102a32500, ffff888102a32530)
[   28.292900] 
[   28.293169] The buggy address belongs to the physical page:
[   28.293685] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a32
[   28.294413] flags: 0x200000000000000(node=0|zone=2)
[   28.294848] page_type: f5(slab)
[   28.295237] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   28.295797] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   28.296470] page dumped because: kasan: bad access detected
[   28.297009] 
[   28.297306] Memory state around the buggy address:
[   28.297741]  ffff888102a32400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.298459]  ffff888102a32480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.298956] >ffff888102a32500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   28.299692]                                      ^
[   28.300180]  ffff888102a32580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.300732]  ffff888102a32600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.301513] ==================================================================
[   25.888477] ==================================================================
[   25.889168] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b3c/0x5450
[   25.889818] Write of size 4 at addr ffff888102a32530 by task kunit_try_catch/273
[   25.891135] 
[   25.891458] CPU: 0 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241128 #1
[   25.892248] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.892819] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   25.893828] Call Trace:
[   25.894264]  <TASK>
[   25.894598]  dump_stack_lvl+0x73/0xb0
[   25.895028]  print_report+0xd1/0x640
[   25.895462]  ? __virt_addr_valid+0x1db/0x2d0
[   25.896142]  ? kasan_complete_mode_report_info+0x2a/0x200
[   25.896734]  kasan_report+0x102/0x140
[   25.897125]  ? kasan_atomics_helper+0x4b3c/0x5450
[   25.897527]  ? kasan_atomics_helper+0x4b3c/0x5450
[   25.898033]  __asan_report_store4_noabort+0x1b/0x30
[   25.898610]  kasan_atomics_helper+0x4b3c/0x5450
[   25.899249]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   25.899827]  ? __kmalloc_cache_noprof+0x184/0x410
[   25.900524]  ? kasan_atomics+0x153/0x310
[   25.901039]  kasan_atomics+0x1dd/0x310
[   25.901614]  ? __pfx_kasan_atomics+0x10/0x10
[   25.902029]  ? __pfx_read_tsc+0x10/0x10
[   25.902561]  ? ktime_get_ts64+0x84/0x230
[   25.903043]  kunit_try_run_case+0x1b3/0x490
[   25.903539]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.904152]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   25.904590]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   25.905261]  ? __kthread_parkme+0x82/0x160
[   25.905863]  ? preempt_count_sub+0x50/0x80
[   25.906297]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.906927]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   25.907596]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.908254]  kthread+0x257/0x310
[   25.908593]  ? __pfx_kthread+0x10/0x10
[   25.909035]  ret_from_fork+0x41/0x80
[   25.909528]  ? __pfx_kthread+0x10/0x10
[   25.910022]  ret_from_fork_asm+0x1a/0x30
[   25.910567]  </TASK>
[   25.910940] 
[   25.911160] Allocated by task 273:
[   25.911586]  kasan_save_stack+0x3d/0x60
[   25.912179]  kasan_save_track+0x18/0x40
[   25.912586]  kasan_save_alloc_info+0x3b/0x50
[   25.913192]  __kasan_kmalloc+0xb7/0xc0
[   25.913521]  __kmalloc_cache_noprof+0x184/0x410
[   25.914001]  kasan_atomics+0x96/0x310
[   25.914565]  kunit_try_run_case+0x1b3/0x490
[   25.915005]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.915701]  kthread+0x257/0x310
[   25.916142]  ret_from_fork+0x41/0x80
[   25.916540]  ret_from_fork_asm+0x1a/0x30
[   25.916985] 
[   25.917384] The buggy address belongs to the object at ffff888102a32500
[   25.917384]  which belongs to the cache kmalloc-64 of size 64
[   25.918434] The buggy address is located 0 bytes to the right of
[   25.918434]  allocated 48-byte region [ffff888102a32500, ffff888102a32530)
[   25.919441] 
[   25.919721] The buggy address belongs to the physical page:
[   25.920524] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a32
[   25.921219] flags: 0x200000000000000(node=0|zone=2)
[   25.921624] page_type: f5(slab)
[   25.922163] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   25.922925] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   25.923737] page dumped because: kasan: bad access detected
[   25.924329] 
[   25.924622] Memory state around the buggy address:
[   25.925021]  ffff888102a32400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.925811]  ffff888102a32480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.926491] >ffff888102a32500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   25.927193]                                      ^
[   25.927517]  ffff888102a32580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.928856]  ffff888102a32600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.929875] ==================================================================
[   28.047524] ==================================================================
[   28.048906] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4f73/0x5450
[   28.050237] Read of size 8 at addr ffff888102a32530 by task kunit_try_catch/273
[   28.050885] 
[   28.051006] CPU: 0 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241128 #1
[   28.052382] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.053107] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   28.053955] Call Trace:
[   28.054685]  <TASK>
[   28.055010]  dump_stack_lvl+0x73/0xb0
[   28.055843]  print_report+0xd1/0x640
[   28.056407]  ? __virt_addr_valid+0x1db/0x2d0
[   28.057031]  ? kasan_complete_mode_report_info+0x2a/0x200
[   28.057686]  kasan_report+0x102/0x140
[   28.058085]  ? kasan_atomics_helper+0x4f73/0x5450
[   28.058937]  ? kasan_atomics_helper+0x4f73/0x5450
[   28.059412]  __asan_report_load8_noabort+0x18/0x20
[   28.059792]  kasan_atomics_helper+0x4f73/0x5450
[   28.060403]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   28.060912]  ? __kmalloc_cache_noprof+0x184/0x410
[   28.061550]  ? kasan_atomics+0x153/0x310
[   28.062001]  kasan_atomics+0x1dd/0x310
[   28.062908]  ? __pfx_kasan_atomics+0x10/0x10
[   28.063531]  ? __pfx_read_tsc+0x10/0x10
[   28.064003]  ? ktime_get_ts64+0x84/0x230
[   28.064579]  kunit_try_run_case+0x1b3/0x490
[   28.065284]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.065803]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   28.066231]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   28.066635]  ? __kthread_parkme+0x82/0x160
[   28.067116]  ? preempt_count_sub+0x50/0x80
[   28.067560]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.067921]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   28.068520]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.068946]  kthread+0x257/0x310
[   28.069413]  ? __pfx_kthread+0x10/0x10
[   28.069808]  ret_from_fork+0x41/0x80
[   28.070185]  ? __pfx_kthread+0x10/0x10
[   28.070701]  ret_from_fork_asm+0x1a/0x30
[   28.071161]  </TASK>
[   28.071470] 
[   28.071685] Allocated by task 273:
[   28.071930]  kasan_save_stack+0x3d/0x60
[   28.072478]  kasan_save_track+0x18/0x40
[   28.072943]  kasan_save_alloc_info+0x3b/0x50
[   28.073438]  __kasan_kmalloc+0xb7/0xc0
[   28.073729]  __kmalloc_cache_noprof+0x184/0x410
[   28.074271]  kasan_atomics+0x96/0x310
[   28.074670]  kunit_try_run_case+0x1b3/0x490
[   28.075238]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.075706]  kthread+0x257/0x310
[   28.075963]  ret_from_fork+0x41/0x80
[   28.076485]  ret_from_fork_asm+0x1a/0x30
[   28.076962] 
[   28.077261] The buggy address belongs to the object at ffff888102a32500
[   28.077261]  which belongs to the cache kmalloc-64 of size 64
[   28.078288] The buggy address is located 0 bytes to the right of
[   28.078288]  allocated 48-byte region [ffff888102a32500, ffff888102a32530)
[   28.079454] 
[   28.079618] The buggy address belongs to the physical page:
[   28.080029] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a32
[   28.080894] flags: 0x200000000000000(node=0|zone=2)
[   28.081426] page_type: f5(slab)
[   28.081688] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   28.082558] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   28.083308] page dumped because: kasan: bad access detected
[   28.083793] 
[   28.083982] Memory state around the buggy address:
[   28.084538]  ffff888102a32400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.085130]  ffff888102a32480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.085696] >ffff888102a32500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   28.086447]                                      ^
[   28.086796]  ffff888102a32580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.087272]  ffff888102a32600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.088058] ==================================================================
[   27.540469] ==================================================================
[   27.541463] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x18b2/0x5450
[   27.542397] Write of size 8 at addr ffff888102a32530 by task kunit_try_catch/273
[   27.543220] 
[   27.543569] CPU: 0 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241128 #1
[   27.544403] Tainted: [B]=BAD_PAGE, [N]=TEST
[   27.544679] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   27.545236] Call Trace:
[   27.545554]  <TASK>
[   27.545896]  dump_stack_lvl+0x73/0xb0
[   27.546592]  print_report+0xd1/0x640
[   27.547187]  ? __virt_addr_valid+0x1db/0x2d0
[   27.547726]  ? kasan_complete_mode_report_info+0x2a/0x200
[   27.548209]  kasan_report+0x102/0x140
[   27.548690]  ? kasan_atomics_helper+0x18b2/0x5450
[   27.549310]  ? kasan_atomics_helper+0x18b2/0x5450
[   27.549773]  kasan_check_range+0x10c/0x1c0
[   27.550364]  __kasan_check_write+0x18/0x20
[   27.550759]  kasan_atomics_helper+0x18b2/0x5450
[   27.551321]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   27.551666]  ? __kmalloc_cache_noprof+0x184/0x410
[   27.551990]  ? kasan_atomics+0x153/0x310
[   27.552480]  kasan_atomics+0x1dd/0x310
[   27.552999]  ? __pfx_kasan_atomics+0x10/0x10
[   27.553628]  ? __pfx_read_tsc+0x10/0x10
[   27.554146]  ? ktime_get_ts64+0x84/0x230
[   27.554706]  kunit_try_run_case+0x1b3/0x490
[   27.555298]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.555727]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   27.556053]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   27.556625]  ? __kthread_parkme+0x82/0x160
[   27.557210]  ? preempt_count_sub+0x50/0x80
[   27.557762]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.558403]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   27.558958]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.559457]  kthread+0x257/0x310
[   27.559845]  ? __pfx_kthread+0x10/0x10
[   27.560324]  ret_from_fork+0x41/0x80
[   27.560753]  ? __pfx_kthread+0x10/0x10
[   27.561236]  ret_from_fork_asm+0x1a/0x30
[   27.561662]  </TASK>
[   27.561915] 
[   27.562158] Allocated by task 273:
[   27.562511]  kasan_save_stack+0x3d/0x60
[   27.562851]  kasan_save_track+0x18/0x40
[   27.563303]  kasan_save_alloc_info+0x3b/0x50
[   27.564674]  __kasan_kmalloc+0xb7/0xc0
[   27.566033]  __kmalloc_cache_noprof+0x184/0x410
[   27.566535]  kasan_atomics+0x96/0x310
[   27.566879]  kunit_try_run_case+0x1b3/0x490
[   27.568459]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.568940]  kthread+0x257/0x310
[   27.569433]  ret_from_fork+0x41/0x80
[   27.569858]  ret_from_fork_asm+0x1a/0x30
[   27.570808] 
[   27.571367] The buggy address belongs to the object at ffff888102a32500
[   27.571367]  which belongs to the cache kmalloc-64 of size 64
[   27.572230] The buggy address is located 0 bytes to the right of
[   27.572230]  allocated 48-byte region [ffff888102a32500, ffff888102a32530)
[   27.573211] 
[   27.573705] The buggy address belongs to the physical page:
[   27.574165] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a32
[   27.575038] flags: 0x200000000000000(node=0|zone=2)
[   27.575746] page_type: f5(slab)
[   27.576071] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   27.576744] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   27.578203] page dumped because: kasan: bad access detected
[   27.578767] 
[   27.579028] Memory state around the buggy address:
[   27.579617]  ffff888102a32400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.580301]  ffff888102a32480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.581080] >ffff888102a32500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   27.581947]                                      ^
[   27.582272]  ffff888102a32580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.583009]  ffff888102a32600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.583762] ==================================================================
[   27.877114] ==================================================================
[   27.877840] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1d7b/0x5450
[   27.878762] Write of size 8 at addr ffff888102a32530 by task kunit_try_catch/273
[   27.879216] 
[   27.879565] CPU: 0 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241128 #1
[   27.880649] Tainted: [B]=BAD_PAGE, [N]=TEST
[   27.881006] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   27.881854] Call Trace:
[   27.882348]  <TASK>
[   27.882664]  dump_stack_lvl+0x73/0xb0
[   27.883461]  print_report+0xd1/0x640
[   27.883880]  ? __virt_addr_valid+0x1db/0x2d0
[   27.884548]  ? kasan_complete_mode_report_info+0x2a/0x200
[   27.885272]  kasan_report+0x102/0x140
[   27.885757]  ? kasan_atomics_helper+0x1d7b/0x5450
[   27.886431]  ? kasan_atomics_helper+0x1d7b/0x5450
[   27.886858]  kasan_check_range+0x10c/0x1c0
[   27.887645]  __kasan_check_write+0x18/0x20
[   27.888182]  kasan_atomics_helper+0x1d7b/0x5450
[   27.888519]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   27.889235]  ? __kmalloc_cache_noprof+0x184/0x410
[   27.889832]  ? kasan_atomics+0x153/0x310
[   27.890422]  kasan_atomics+0x1dd/0x310
[   27.890913]  ? __pfx_kasan_atomics+0x10/0x10
[   27.891359]  ? __pfx_read_tsc+0x10/0x10
[   27.891882]  ? ktime_get_ts64+0x84/0x230
[   27.892502]  kunit_try_run_case+0x1b3/0x490
[   27.892975]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.893510]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   27.894175]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   27.894750]  ? __kthread_parkme+0x82/0x160
[   27.895164]  ? preempt_count_sub+0x50/0x80
[   27.895812]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.896292]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   27.897127]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.897725]  kthread+0x257/0x310
[   27.898141]  ? __pfx_kthread+0x10/0x10
[   27.898667]  ret_from_fork+0x41/0x80
[   27.898988]  ? __pfx_kthread+0x10/0x10
[   27.899553]  ret_from_fork_asm+0x1a/0x30
[   27.900163]  </TASK>
[   27.900438] 
[   27.900709] Allocated by task 273:
[   27.901139]  kasan_save_stack+0x3d/0x60
[   27.901696]  kasan_save_track+0x18/0x40
[   27.902200]  kasan_save_alloc_info+0x3b/0x50
[   27.902530]  __kasan_kmalloc+0xb7/0xc0
[   27.903105]  __kmalloc_cache_noprof+0x184/0x410
[   27.903690]  kasan_atomics+0x96/0x310
[   27.904005]  kunit_try_run_case+0x1b3/0x490
[   27.904618]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.905268]  kthread+0x257/0x310
[   27.905795]  ret_from_fork+0x41/0x80
[   27.906910]  ret_from_fork_asm+0x1a/0x30
[   27.907362] 
[   27.907626] The buggy address belongs to the object at ffff888102a32500
[   27.907626]  which belongs to the cache kmalloc-64 of size 64
[   27.908701] The buggy address is located 0 bytes to the right of
[   27.908701]  allocated 48-byte region [ffff888102a32500, ffff888102a32530)
[   27.909933] 
[   27.910258] The buggy address belongs to the physical page:
[   27.910992] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a32
[   27.911666] flags: 0x200000000000000(node=0|zone=2)
[   27.912006] page_type: f5(slab)
[   27.912704] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   27.913165] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   27.914432] page dumped because: kasan: bad access detected
[   27.915005] 
[   27.915290] Memory state around the buggy address:
[   27.915732]  ffff888102a32400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.916389]  ffff888102a32480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.917279] >ffff888102a32500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   27.917988]                                      ^
[   27.918639]  ffff888102a32580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.919415]  ffff888102a32600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.920069] ==================================================================
[   25.710400] ==================================================================
[   25.711065] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b70/0x5450
[   25.712908] Write of size 4 at addr ffff888102a32530 by task kunit_try_catch/273
[   25.713917] 
[   25.714537] CPU: 0 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241128 #1
[   25.715660] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.716065] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   25.716812] Call Trace:
[   25.717086]  <TASK>
[   25.717441]  dump_stack_lvl+0x73/0xb0
[   25.717811]  print_report+0xd1/0x640
[   25.718508]  ? __virt_addr_valid+0x1db/0x2d0
[   25.718998]  ? kasan_complete_mode_report_info+0x2a/0x200
[   25.719844]  kasan_report+0x102/0x140
[   25.720396]  ? kasan_atomics_helper+0x4b70/0x5450
[   25.721058]  ? kasan_atomics_helper+0x4b70/0x5450
[   25.721794]  __asan_report_store4_noabort+0x1b/0x30
[   25.722404]  kasan_atomics_helper+0x4b70/0x5450
[   25.722921]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   25.723637]  ? __kmalloc_cache_noprof+0x184/0x410
[   25.724364]  ? kasan_atomics+0x153/0x310
[   25.724806]  kasan_atomics+0x1dd/0x310
[   25.725409]  ? __pfx_kasan_atomics+0x10/0x10
[   25.725965]  ? __pfx_read_tsc+0x10/0x10
[   25.726657]  ? ktime_get_ts64+0x84/0x230
[   25.727044]  kunit_try_run_case+0x1b3/0x490
[   25.727701]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.728308]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   25.728888]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   25.729636]  ? __kthread_parkme+0x82/0x160
[   25.730016]  ? preempt_count_sub+0x50/0x80
[   25.730589]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.731270]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   25.731926]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.732731]  kthread+0x257/0x310
[   25.733148]  ? __pfx_kthread+0x10/0x10
[   25.733687]  ret_from_fork+0x41/0x80
[   25.734037]  ? __pfx_kthread+0x10/0x10
[   25.734431]  ret_from_fork_asm+0x1a/0x30
[   25.734907]  </TASK>
[   25.735177] 
[   25.735438] Allocated by task 273:
[   25.735958]  kasan_save_stack+0x3d/0x60
[   25.736309]  kasan_save_track+0x18/0x40
[   25.736604]  kasan_save_alloc_info+0x3b/0x50
[   25.737370]  __kasan_kmalloc+0xb7/0xc0
[   25.737976]  __kmalloc_cache_noprof+0x184/0x410
[   25.738664]  kasan_atomics+0x96/0x310
[   25.739164]  kunit_try_run_case+0x1b3/0x490
[   25.739806]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.740300]  kthread+0x257/0x310
[   25.740739]  ret_from_fork+0x41/0x80
[   25.741451]  ret_from_fork_asm+0x1a/0x30
[   25.741900] 
[   25.742365] The buggy address belongs to the object at ffff888102a32500
[   25.742365]  which belongs to the cache kmalloc-64 of size 64
[   25.743590] The buggy address is located 0 bytes to the right of
[   25.743590]  allocated 48-byte region [ffff888102a32500, ffff888102a32530)
[   25.744853] 
[   25.745314] The buggy address belongs to the physical page:
[   25.746575] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a32
[   25.747670] flags: 0x200000000000000(node=0|zone=2)
[   25.747986] page_type: f5(slab)
[   25.748530] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   25.749308] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   25.750066] page dumped because: kasan: bad access detected
[   25.750803] 
[   25.750951] Memory state around the buggy address:
[   25.751617]  ffff888102a32400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.752318]  ffff888102a32480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.753290] >ffff888102a32500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   25.753930]                                      ^
[   25.754688]  ffff888102a32580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.755518]  ffff888102a32600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.756212] ==================================================================
[   27.273097] ==================================================================
[   27.273532] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x151e/0x5450
[   27.274720] Write of size 8 at addr ffff888102a32530 by task kunit_try_catch/273
[   27.275761] 
[   27.275943] CPU: 0 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241128 #1
[   27.277161] Tainted: [B]=BAD_PAGE, [N]=TEST
[   27.277956] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   27.279098] Call Trace:
[   27.279444]  <TASK>
[   27.279722]  dump_stack_lvl+0x73/0xb0
[   27.280467]  print_report+0xd1/0x640
[   27.280787]  ? __virt_addr_valid+0x1db/0x2d0
[   27.281407]  ? kasan_complete_mode_report_info+0x2a/0x200
[   27.281925]  kasan_report+0x102/0x140
[   27.282463]  ? kasan_atomics_helper+0x151e/0x5450
[   27.283120]  ? kasan_atomics_helper+0x151e/0x5450
[   27.283498]  kasan_check_range+0x10c/0x1c0
[   27.284008]  __kasan_check_write+0x18/0x20
[   27.284738]  kasan_atomics_helper+0x151e/0x5450
[   27.285172]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   27.285744]  ? __kmalloc_cache_noprof+0x184/0x410
[   27.286658]  ? kasan_atomics+0x153/0x310
[   27.287136]  kasan_atomics+0x1dd/0x310
[   27.287460]  ? __pfx_kasan_atomics+0x10/0x10
[   27.288125]  ? __pfx_read_tsc+0x10/0x10
[   27.288696]  ? ktime_get_ts64+0x84/0x230
[   27.289119]  kunit_try_run_case+0x1b3/0x490
[   27.289457]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.290121]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   27.291104]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   27.291503]  ? __kthread_parkme+0x82/0x160
[   27.292078]  ? preempt_count_sub+0x50/0x80
[   27.292783]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.293789]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   27.294321]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.294874]  kthread+0x257/0x310
[   27.295363]  ? __pfx_kthread+0x10/0x10
[   27.295946]  ret_from_fork+0x41/0x80
[   27.296555]  ? __pfx_kthread+0x10/0x10
[   27.297138]  ret_from_fork_asm+0x1a/0x30
[   27.297957]  </TASK>
[   27.298421] 
[   27.298694] Allocated by task 273:
[   27.299211]  kasan_save_stack+0x3d/0x60
[   27.299734]  kasan_save_track+0x18/0x40
[   27.300112]  kasan_save_alloc_info+0x3b/0x50
[   27.300783]  __kasan_kmalloc+0xb7/0xc0
[   27.301366]  __kmalloc_cache_noprof+0x184/0x410
[   27.302049]  kasan_atomics+0x96/0x310
[   27.302487]  kunit_try_run_case+0x1b3/0x490
[   27.302841]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.303510]  kthread+0x257/0x310
[   27.303907]  ret_from_fork+0x41/0x80
[   27.304371]  ret_from_fork_asm+0x1a/0x30
[   27.304861] 
[   27.305018] The buggy address belongs to the object at ffff888102a32500
[   27.305018]  which belongs to the cache kmalloc-64 of size 64
[   27.306235] The buggy address is located 0 bytes to the right of
[   27.306235]  allocated 48-byte region [ffff888102a32500, ffff888102a32530)
[   27.307470] 
[   27.307787] The buggy address belongs to the physical page:
[   27.308387] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a32
[   27.309207] flags: 0x200000000000000(node=0|zone=2)
[   27.309853] page_type: f5(slab)
[   27.310255] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   27.311034] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   27.311770] page dumped because: kasan: bad access detected
[   27.312368] 
[   27.312614] Memory state around the buggy address:
[   27.313166]  ffff888102a32400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.313762]  ffff888102a32480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.314630] >ffff888102a32500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   27.315309]                                      ^
[   27.315676]  ffff888102a32580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.316392]  ffff888102a32600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.316898] ==================================================================
[   27.963660] ==================================================================
[   27.964593] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1eab/0x5450
[   27.965426] Write of size 8 at addr ffff888102a32530 by task kunit_try_catch/273
[   27.966942] 
[   27.967145] CPU: 0 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241128 #1
[   27.968875] Tainted: [B]=BAD_PAGE, [N]=TEST
[   27.969529] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   27.970287] Call Trace:
[   27.970780]  <TASK>
[   27.971063]  dump_stack_lvl+0x73/0xb0
[   27.971581]  print_report+0xd1/0x640
[   27.971945]  ? __virt_addr_valid+0x1db/0x2d0
[   27.972316]  ? kasan_complete_mode_report_info+0x2a/0x200
[   27.972862]  kasan_report+0x102/0x140
[   27.973306]  ? kasan_atomics_helper+0x1eab/0x5450
[   27.973752]  ? kasan_atomics_helper+0x1eab/0x5450
[   27.974277]  kasan_check_range+0x10c/0x1c0
[   27.974739]  __kasan_check_write+0x18/0x20
[   27.975215]  kasan_atomics_helper+0x1eab/0x5450
[   27.975596]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   27.976182]  ? __kmalloc_cache_noprof+0x184/0x410
[   27.976625]  ? kasan_atomics+0x153/0x310
[   27.976977]  kasan_atomics+0x1dd/0x310
[   27.977517]  ? __pfx_kasan_atomics+0x10/0x10
[   27.978058]  ? __pfx_read_tsc+0x10/0x10
[   27.978502]  ? ktime_get_ts64+0x84/0x230
[   27.978895]  kunit_try_run_case+0x1b3/0x490
[   27.979372]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.979933]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   27.980372]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   27.980946]  ? __kthread_parkme+0x82/0x160
[   27.981430]  ? preempt_count_sub+0x50/0x80
[   27.981788]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.982302]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   27.982959]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.983659]  kthread+0x257/0x310
[   27.983979]  ? __pfx_kthread+0x10/0x10
[   27.984381]  ret_from_fork+0x41/0x80
[   27.984821]  ? __pfx_kthread+0x10/0x10
[   27.985277]  ret_from_fork_asm+0x1a/0x30
[   27.985703]  </TASK>
[   27.985900] 
[   27.986118] Allocated by task 273:
[   27.986556]  kasan_save_stack+0x3d/0x60
[   27.987061]  kasan_save_track+0x18/0x40
[   27.987431]  kasan_save_alloc_info+0x3b/0x50
[   27.987870]  __kasan_kmalloc+0xb7/0xc0
[   27.988379]  __kmalloc_cache_noprof+0x184/0x410
[   27.988846]  kasan_atomics+0x96/0x310
[   27.989226]  kunit_try_run_case+0x1b3/0x490
[   27.989718]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.990252]  kthread+0x257/0x310
[   27.990650]  ret_from_fork+0x41/0x80
[   27.991012]  ret_from_fork_asm+0x1a/0x30
[   27.991462] 
[   27.991681] The buggy address belongs to the object at ffff888102a32500
[   27.991681]  which belongs to the cache kmalloc-64 of size 64
[   27.992690] The buggy address is located 0 bytes to the right of
[   27.992690]  allocated 48-byte region [ffff888102a32500, ffff888102a32530)
[   27.993667] 
[   27.993920] The buggy address belongs to the physical page:
[   27.994485] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a32
[   27.994932] flags: 0x200000000000000(node=0|zone=2)
[   27.995460] page_type: f5(slab)
[   27.995879] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   27.996680] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   27.997149] page dumped because: kasan: bad access detected
[   27.997771] 
[   27.998011] Memory state around the buggy address:
[   27.998606]  ffff888102a32400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.999377]  ffff888102a32480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.999799] >ffff888102a32500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   28.000586]                                      ^
[   28.000969]  ffff888102a32580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.002221]  ffff888102a32600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.003212] ==================================================================
[   26.348936] ==================================================================
[   26.349495] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xb6b/0x5450
[   26.350266] Write of size 4 at addr ffff888102a32530 by task kunit_try_catch/273
[   26.350842] 
[   26.351155] CPU: 0 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241128 #1
[   26.351984] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.352517] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   26.353247] Call Trace:
[   26.353607]  <TASK>
[   26.353911]  dump_stack_lvl+0x73/0xb0
[   26.354396]  print_report+0xd1/0x640
[   26.354773]  ? __virt_addr_valid+0x1db/0x2d0
[   26.355212]  ? kasan_complete_mode_report_info+0x2a/0x200
[   26.355873]  kasan_report+0x102/0x140
[   26.356289]  ? kasan_atomics_helper+0xb6b/0x5450
[   26.356807]  ? kasan_atomics_helper+0xb6b/0x5450
[   26.357317]  kasan_check_range+0x10c/0x1c0
[   26.357848]  __kasan_check_write+0x18/0x20
[   26.358258]  kasan_atomics_helper+0xb6b/0x5450
[   26.358717]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   26.359319]  ? __kmalloc_cache_noprof+0x184/0x410
[   26.359696]  ? kasan_atomics+0x153/0x310
[   26.360212]  kasan_atomics+0x1dd/0x310
[   26.360574]  ? __pfx_kasan_atomics+0x10/0x10
[   26.361174]  ? __pfx_read_tsc+0x10/0x10
[   26.361627]  ? ktime_get_ts64+0x84/0x230
[   26.362153]  kunit_try_run_case+0x1b3/0x490
[   26.362601]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.362990]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   26.363608]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   26.364046]  ? __kthread_parkme+0x82/0x160
[   26.364693]  ? preempt_count_sub+0x50/0x80
[   26.365772]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.366410]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   26.367280]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.367763]  kthread+0x257/0x310
[   26.368249]  ? __pfx_kthread+0x10/0x10
[   26.369014]  ret_from_fork+0x41/0x80
[   26.369773]  ? __pfx_kthread+0x10/0x10
[   26.370417]  ret_from_fork_asm+0x1a/0x30
[   26.370897]  </TASK>
[   26.371367] 
[   26.371575] Allocated by task 273:
[   26.371954]  kasan_save_stack+0x3d/0x60
[   26.372448]  kasan_save_track+0x18/0x40
[   26.372941]  kasan_save_alloc_info+0x3b/0x50
[   26.373605]  __kasan_kmalloc+0xb7/0xc0
[   26.374030]  __kmalloc_cache_noprof+0x184/0x410
[   26.374678]  kasan_atomics+0x96/0x310
[   26.375124]  kunit_try_run_case+0x1b3/0x490
[   26.375815]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.376312]  kthread+0x257/0x310
[   26.376739]  ret_from_fork+0x41/0x80
[   26.377208]  ret_from_fork_asm+0x1a/0x30
[   26.377858] 
[   26.378054] The buggy address belongs to the object at ffff888102a32500
[   26.378054]  which belongs to the cache kmalloc-64 of size 64
[   26.378976] The buggy address is located 0 bytes to the right of
[   26.378976]  allocated 48-byte region [ffff888102a32500, ffff888102a32530)
[   26.380385] 
[   26.380552] The buggy address belongs to the physical page:
[   26.380943] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a32
[   26.381973] flags: 0x200000000000000(node=0|zone=2)
[   26.382679] page_type: f5(slab)
[   26.383129] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   26.384164] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   26.384757] page dumped because: kasan: bad access detected
[   26.385461] 
[   26.385677] Memory state around the buggy address:
[   26.386447]  ffff888102a32400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.386800]  ffff888102a32480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.387102] >ffff888102a32500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   26.388629]                                      ^
[   26.388955]  ffff888102a32580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.389826]  ffff888102a32600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.390421] ==================================================================
[   26.435056] ==================================================================
[   26.435873] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a86/0x5450
[   26.436995] Read of size 4 at addr ffff888102a32530 by task kunit_try_catch/273
[   26.437862] 
[   26.438249] CPU: 0 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241128 #1
[   26.439122] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.439541] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   26.440327] Call Trace:
[   26.440790]  <TASK>
[   26.441124]  dump_stack_lvl+0x73/0xb0
[   26.441661]  print_report+0xd1/0x640
[   26.442041]  ? __virt_addr_valid+0x1db/0x2d0
[   26.442623]  ? kasan_complete_mode_report_info+0x2a/0x200
[   26.443195]  kasan_report+0x102/0x140
[   26.443625]  ? kasan_atomics_helper+0x4a86/0x5450
[   26.444135]  ? kasan_atomics_helper+0x4a86/0x5450
[   26.444643]  __asan_report_load4_noabort+0x18/0x20
[   26.445207]  kasan_atomics_helper+0x4a86/0x5450
[   26.445762]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   26.446190]  ? __kmalloc_cache_noprof+0x184/0x410
[   26.446841]  ? kasan_atomics+0x153/0x310
[   26.447223]  kasan_atomics+0x1dd/0x310
[   26.447823]  ? __pfx_kasan_atomics+0x10/0x10
[   26.448512]  ? __pfx_read_tsc+0x10/0x10
[   26.449034]  ? ktime_get_ts64+0x84/0x230
[   26.449545]  kunit_try_run_case+0x1b3/0x490
[   26.450038]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.450518]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   26.451133]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   26.451569]  ? __kthread_parkme+0x82/0x160
[   26.452154]  ? preempt_count_sub+0x50/0x80
[   26.452643]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.453392]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   26.454202]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.454659]  kthread+0x257/0x310
[   26.455122]  ? __pfx_kthread+0x10/0x10
[   26.455570]  ret_from_fork+0x41/0x80
[   26.456051]  ? __pfx_kthread+0x10/0x10
[   26.456600]  ret_from_fork_asm+0x1a/0x30
[   26.457016]  </TASK>
[   26.457384] 
[   26.457601] Allocated by task 273:
[   26.457905]  kasan_save_stack+0x3d/0x60
[   26.458357]  kasan_save_track+0x18/0x40
[   26.458686]  kasan_save_alloc_info+0x3b/0x50
[   26.459237]  __kasan_kmalloc+0xb7/0xc0
[   26.459623]  __kmalloc_cache_noprof+0x184/0x410
[   26.460197]  kasan_atomics+0x96/0x310
[   26.460675]  kunit_try_run_case+0x1b3/0x490
[   26.461208]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.461827]  kthread+0x257/0x310
[   26.462370]  ret_from_fork+0x41/0x80
[   26.462909]  ret_from_fork_asm+0x1a/0x30
[   26.463415] 
[   26.463646] The buggy address belongs to the object at ffff888102a32500
[   26.463646]  which belongs to the cache kmalloc-64 of size 64
[   26.464608] The buggy address is located 0 bytes to the right of
[   26.464608]  allocated 48-byte region [ffff888102a32500, ffff888102a32530)
[   26.465791] 
[   26.466127] The buggy address belongs to the physical page:
[   26.466675] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a32
[   26.467432] flags: 0x200000000000000(node=0|zone=2)
[   26.467927] page_type: f5(slab)
[   26.468414] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   26.469277] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   26.469973] page dumped because: kasan: bad access detected
[   26.470463] 
[   26.470716] Memory state around the buggy address:
[   26.471403]  ffff888102a32400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.472007]  ffff888102a32480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.472675] >ffff888102a32500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   26.473352]                                      ^
[   26.473694]  ffff888102a32580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.474527]  ffff888102a32600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.475219] ==================================================================
[   26.779748] ==================================================================
[   26.780854] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a1e/0x5450
[   26.781711] Read of size 4 at addr ffff888102a32530 by task kunit_try_catch/273
[   26.782785] 
[   26.783041] CPU: 0 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241128 #1
[   26.783798] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.784072] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   26.784580] Call Trace:
[   26.785086]  <TASK>
[   26.785917]  dump_stack_lvl+0x73/0xb0
[   26.786563]  print_report+0xd1/0x640
[   26.787148]  ? __virt_addr_valid+0x1db/0x2d0
[   26.787894]  ? kasan_complete_mode_report_info+0x2a/0x200
[   26.788540]  kasan_report+0x102/0x140
[   26.788942]  ? kasan_atomics_helper+0x4a1e/0x5450
[   26.789980]  ? kasan_atomics_helper+0x4a1e/0x5450
[   26.790503]  __asan_report_load4_noabort+0x18/0x20
[   26.790740]  kasan_atomics_helper+0x4a1e/0x5450
[   26.790950]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   26.791840]  ? __kmalloc_cache_noprof+0x184/0x410
[   26.792662]  ? kasan_atomics+0x153/0x310
[   26.792971]  kasan_atomics+0x1dd/0x310
[   26.793534]  ? __pfx_kasan_atomics+0x10/0x10
[   26.793888]  ? __pfx_read_tsc+0x10/0x10
[   26.794470]  ? ktime_get_ts64+0x84/0x230
[   26.795023]  kunit_try_run_case+0x1b3/0x490
[   26.795493]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.796026]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   26.796647]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   26.797253]  ? __kthread_parkme+0x82/0x160
[   26.797794]  ? preempt_count_sub+0x50/0x80
[   26.798242]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.798787]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   26.799471]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.800107]  kthread+0x257/0x310
[   26.800582]  ? __pfx_kthread+0x10/0x10
[   26.800892]  ret_from_fork+0x41/0x80
[   26.801460]  ? __pfx_kthread+0x10/0x10
[   26.801830]  ret_from_fork_asm+0x1a/0x30
[   26.802445]  </TASK>
[   26.802767] 
[   26.803021] Allocated by task 273:
[   26.803477]  kasan_save_stack+0x3d/0x60
[   26.803910]  kasan_save_track+0x18/0x40
[   26.804472]  kasan_save_alloc_info+0x3b/0x50
[   26.805032]  __kasan_kmalloc+0xb7/0xc0
[   26.805571]  __kmalloc_cache_noprof+0x184/0x410
[   26.805982]  kasan_atomics+0x96/0x310
[   26.806737]  kunit_try_run_case+0x1b3/0x490
[   26.807410]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.808288]  kthread+0x257/0x310
[   26.808583]  ret_from_fork+0x41/0x80
[   26.809450]  ret_from_fork_asm+0x1a/0x30
[   26.809872] 
[   26.810081] The buggy address belongs to the object at ffff888102a32500
[   26.810081]  which belongs to the cache kmalloc-64 of size 64
[   26.811447] The buggy address is located 0 bytes to the right of
[   26.811447]  allocated 48-byte region [ffff888102a32500, ffff888102a32530)
[   26.812503] 
[   26.812736] The buggy address belongs to the physical page:
[   26.813256] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a32
[   26.814709] flags: 0x200000000000000(node=0|zone=2)
[   26.815446] page_type: f5(slab)
[   26.816380] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   26.817168] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   26.818259] page dumped because: kasan: bad access detected
[   26.819018] 
[   26.819264] Memory state around the buggy address:
[   26.819834]  ffff888102a32400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.820564]  ffff888102a32480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.821315] >ffff888102a32500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   26.822019]                                      ^
[   26.822573]  ffff888102a32580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.823253]  ffff888102a32600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.823826] ==================================================================
[   25.559987] ==================================================================
[   25.561236] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4bbe/0x5450
[   25.561851] Read of size 4 at addr ffff888102a32530 by task kunit_try_catch/273
[   25.562618] 
[   25.562791] CPU: 0 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241128 #1
[   25.563854] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.564945] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   25.566448] Call Trace:
[   25.566945]  <TASK>
[   25.567417]  dump_stack_lvl+0x73/0xb0
[   25.567871]  print_report+0xd1/0x640
[   25.568983]  ? __virt_addr_valid+0x1db/0x2d0
[   25.569477]  ? kasan_complete_mode_report_info+0x2a/0x200
[   25.570055]  kasan_report+0x102/0x140
[   25.570528]  ? kasan_atomics_helper+0x4bbe/0x5450
[   25.571402]  ? kasan_atomics_helper+0x4bbe/0x5450
[   25.572589]  __asan_report_load4_noabort+0x18/0x20
[   25.573698]  kasan_atomics_helper+0x4bbe/0x5450
[   25.574571]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   25.574980]  ? __kmalloc_cache_noprof+0x184/0x410
[   25.575450]  ? kasan_atomics+0x153/0x310
[   25.575814]  kasan_atomics+0x1dd/0x310
[   25.576476]  ? __pfx_kasan_atomics+0x10/0x10
[   25.576846]  ? __pfx_read_tsc+0x10/0x10
[   25.577802]  ? ktime_get_ts64+0x84/0x230
[   25.578420]  kunit_try_run_case+0x1b3/0x490
[   25.578973]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.579364]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   25.579926]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   25.580434]  ? __kthread_parkme+0x82/0x160
[   25.581066]  ? preempt_count_sub+0x50/0x80
[   25.581472]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.581941]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   25.582599]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.583021]  kthread+0x257/0x310
[   25.584054]  ? __pfx_kthread+0x10/0x10
[   25.584915]  ret_from_fork+0x41/0x80
[   25.585384]  ? __pfx_kthread+0x10/0x10
[   25.585736]  ret_from_fork_asm+0x1a/0x30
[   25.586253]  </TASK>
[   25.586702] 
[   25.587033] Allocated by task 273:
[   25.588251]  kasan_save_stack+0x3d/0x60
[   25.588563]  kasan_save_track+0x18/0x40
[   25.589147]  kasan_save_alloc_info+0x3b/0x50
[   25.589835]  __kasan_kmalloc+0xb7/0xc0
[   25.590554]  __kmalloc_cache_noprof+0x184/0x410
[   25.591030]  kasan_atomics+0x96/0x310
[   25.591396]  kunit_try_run_case+0x1b3/0x490
[   25.591814]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.592914]  kthread+0x257/0x310
[   25.593395]  ret_from_fork+0x41/0x80
[   25.593674]  ret_from_fork_asm+0x1a/0x30
[   25.593962] 
[   25.594188] The buggy address belongs to the object at ffff888102a32500
[   25.594188]  which belongs to the cache kmalloc-64 of size 64
[   25.595499] The buggy address is located 0 bytes to the right of
[   25.595499]  allocated 48-byte region [ffff888102a32500, ffff888102a32530)
[   25.596265] 
[   25.596665] The buggy address belongs to the physical page:
[   25.597289] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a32
[   25.598198] flags: 0x200000000000000(node=0|zone=2)
[   25.599299] page_type: f5(slab)
[   25.599753] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   25.600814] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   25.601663] page dumped because: kasan: bad access detected
[   25.602120] 
[   25.602648] Memory state around the buggy address:
[   25.603328]  ffff888102a32400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.604179]  ffff888102a32480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.604960] >ffff888102a32500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   25.605519]                                      ^
[   25.606178]  ffff888102a32580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.607562]  ffff888102a32600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.608051] ==================================================================
[   26.269124] ==================================================================
[   26.269876] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa2c/0x5450
[   26.270947] Write of size 4 at addr ffff888102a32530 by task kunit_try_catch/273
[   26.271382] 
[   26.271567] CPU: 0 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241128 #1
[   26.272646] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.273007] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   26.273938] Call Trace:
[   26.274327]  <TASK>
[   26.274568]  dump_stack_lvl+0x73/0xb0
[   26.275106]  print_report+0xd1/0x640
[   26.275560]  ? __virt_addr_valid+0x1db/0x2d0
[   26.275923]  ? kasan_complete_mode_report_info+0x2a/0x200
[   26.276452]  kasan_report+0x102/0x140
[   26.276865]  ? kasan_atomics_helper+0xa2c/0x5450
[   26.277462]  ? kasan_atomics_helper+0xa2c/0x5450
[   26.277842]  kasan_check_range+0x10c/0x1c0
[   26.278213]  __kasan_check_write+0x18/0x20
[   26.278754]  kasan_atomics_helper+0xa2c/0x5450
[   26.279398]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   26.280017]  ? __kmalloc_cache_noprof+0x184/0x410
[   26.280589]  ? kasan_atomics+0x153/0x310
[   26.280995]  kasan_atomics+0x1dd/0x310
[   26.281391]  ? __pfx_kasan_atomics+0x10/0x10
[   26.281846]  ? __pfx_read_tsc+0x10/0x10
[   26.282252]  ? ktime_get_ts64+0x84/0x230
[   26.282573]  kunit_try_run_case+0x1b3/0x490
[   26.283195]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.283756]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   26.284136]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   26.284721]  ? __kthread_parkme+0x82/0x160
[   26.285279]  ? preempt_count_sub+0x50/0x80
[   26.285710]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.286200]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   26.286736]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.287199]  kthread+0x257/0x310
[   26.287506]  ? __pfx_kthread+0x10/0x10
[   26.287993]  ret_from_fork+0x41/0x80
[   26.288523]  ? __pfx_kthread+0x10/0x10
[   26.288836]  ret_from_fork_asm+0x1a/0x30
[   26.289327]  </TASK>
[   26.289657] 
[   26.289841] Allocated by task 273:
[   26.290306]  kasan_save_stack+0x3d/0x60
[   26.290646]  kasan_save_track+0x18/0x40
[   26.290929]  kasan_save_alloc_info+0x3b/0x50
[   26.291458]  __kasan_kmalloc+0xb7/0xc0
[   26.291967]  __kmalloc_cache_noprof+0x184/0x410
[   26.292570]  kasan_atomics+0x96/0x310
[   26.293005]  kunit_try_run_case+0x1b3/0x490
[   26.293477]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.294005]  kthread+0x257/0x310
[   26.294374]  ret_from_fork+0x41/0x80
[   26.294802]  ret_from_fork_asm+0x1a/0x30
[   26.295265] 
[   26.295463] The buggy address belongs to the object at ffff888102a32500
[   26.295463]  which belongs to the cache kmalloc-64 of size 64
[   26.296503] The buggy address is located 0 bytes to the right of
[   26.296503]  allocated 48-byte region [ffff888102a32500, ffff888102a32530)
[   26.297573] 
[   26.297810] The buggy address belongs to the physical page:
[   26.298418] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a32
[   26.298882] flags: 0x200000000000000(node=0|zone=2)
[   26.299240] page_type: f5(slab)
[   26.299693] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   26.301313] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   26.302656] page dumped because: kasan: bad access detected
[   26.303166] 
[   26.303327] Memory state around the buggy address:
[   26.303725]  ffff888102a32400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.304535]  ffff888102a32480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.305025] >ffff888102a32500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   26.305729]                                      ^
[   26.306296]  ffff888102a32580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.306962]  ffff888102a32600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.307603] ==================================================================
[   26.913700] ==================================================================
[   26.914262] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1218/0x5450
[   26.915188] Write of size 4 at addr ffff888102a32530 by task kunit_try_catch/273
[   26.915610] 
[   26.915880] CPU: 0 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241128 #1
[   26.916963] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.917602] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   26.918242] Call Trace:
[   26.918666]  <TASK>
[   26.918997]  dump_stack_lvl+0x73/0xb0
[   26.919587]  print_report+0xd1/0x640
[   26.919875]  ? __virt_addr_valid+0x1db/0x2d0
[   26.920493]  ? kasan_complete_mode_report_info+0x2a/0x200
[   26.921260]  kasan_report+0x102/0x140
[   26.921637]  ? kasan_atomics_helper+0x1218/0x5450
[   26.922299]  ? kasan_atomics_helper+0x1218/0x5450
[   26.922817]  kasan_check_range+0x10c/0x1c0
[   26.923298]  __kasan_check_write+0x18/0x20
[   26.923837]  kasan_atomics_helper+0x1218/0x5450
[   26.924404]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   26.924827]  ? __kmalloc_cache_noprof+0x184/0x410
[   26.925475]  ? kasan_atomics+0x153/0x310
[   26.925957]  kasan_atomics+0x1dd/0x310
[   26.926576]  ? __pfx_kasan_atomics+0x10/0x10
[   26.926998]  ? __pfx_read_tsc+0x10/0x10
[   26.927507]  ? ktime_get_ts64+0x84/0x230
[   26.927972]  kunit_try_run_case+0x1b3/0x490
[   26.928528]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.929039]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   26.929674]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   26.930277]  ? __kthread_parkme+0x82/0x160
[   26.930803]  ? preempt_count_sub+0x50/0x80
[   26.931394]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.931944]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   26.932530]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.933186]  kthread+0x257/0x310
[   26.933631]  ? __pfx_kthread+0x10/0x10
[   26.934238]  ret_from_fork+0x41/0x80
[   26.934639]  ? __pfx_kthread+0x10/0x10
[   26.935048]  ret_from_fork_asm+0x1a/0x30
[   26.935615]  </TASK>
[   26.935835] 
[   26.935993] Allocated by task 273:
[   26.936521]  kasan_save_stack+0x3d/0x60
[   26.937113]  kasan_save_track+0x18/0x40
[   26.937420]  kasan_save_alloc_info+0x3b/0x50
[   26.937813]  __kasan_kmalloc+0xb7/0xc0
[   26.938528]  __kmalloc_cache_noprof+0x184/0x410
[   26.939176]  kasan_atomics+0x96/0x310
[   26.939551]  kunit_try_run_case+0x1b3/0x490
[   26.940015]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.940714]  kthread+0x257/0x310
[   26.941243]  ret_from_fork+0x41/0x80
[   26.941668]  ret_from_fork_asm+0x1a/0x30
[   26.942029] 
[   26.942457] The buggy address belongs to the object at ffff888102a32500
[   26.942457]  which belongs to the cache kmalloc-64 of size 64
[   26.943423] The buggy address is located 0 bytes to the right of
[   26.943423]  allocated 48-byte region [ffff888102a32500, ffff888102a32530)
[   26.944798] 
[   26.945046] The buggy address belongs to the physical page:
[   26.945570] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a32
[   26.946637] flags: 0x200000000000000(node=0|zone=2)
[   26.947207] page_type: f5(slab)
[   26.947498] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   26.948402] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   26.949191] page dumped because: kasan: bad access detected
[   26.949776] 
[   26.950132] Memory state around the buggy address:
[   26.950683]  ffff888102a32400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.951513]  ffff888102a32480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.952239] >ffff888102a32500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   26.952821]                                      ^
[   26.953430]  ffff888102a32580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.953972]  ffff888102a32600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.954826] ==================================================================
[   26.022531] ==================================================================
[   26.023085] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x698/0x5450
[   26.023825] Write of size 4 at addr ffff888102a32530 by task kunit_try_catch/273
[   26.025416] 
[   26.025708] CPU: 0 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241128 #1
[   26.026885] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.027626] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   26.028519] Call Trace:
[   26.028867]  <TASK>
[   26.029143]  dump_stack_lvl+0x73/0xb0
[   26.029617]  print_report+0xd1/0x640
[   26.030037]  ? __virt_addr_valid+0x1db/0x2d0
[   26.030550]  ? kasan_complete_mode_report_info+0x2a/0x200
[   26.031113]  kasan_report+0x102/0x140
[   26.031667]  ? kasan_atomics_helper+0x698/0x5450
[   26.032267]  ? kasan_atomics_helper+0x698/0x5450
[   26.032806]  kasan_check_range+0x10c/0x1c0
[   26.033277]  __kasan_check_write+0x18/0x20
[   26.033891]  kasan_atomics_helper+0x698/0x5450
[   26.034308]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   26.034871]  ? __kmalloc_cache_noprof+0x184/0x410
[   26.035366]  ? kasan_atomics+0x153/0x310
[   26.035903]  kasan_atomics+0x1dd/0x310
[   26.036323]  ? __pfx_kasan_atomics+0x10/0x10
[   26.036758]  ? __pfx_read_tsc+0x10/0x10
[   26.037037]  ? ktime_get_ts64+0x84/0x230
[   26.037881]  kunit_try_run_case+0x1b3/0x490
[   26.038460]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.039225]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   26.039778]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   26.040401]  ? __kthread_parkme+0x82/0x160
[   26.040912]  ? preempt_count_sub+0x50/0x80
[   26.041576]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.041991]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   26.042686]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.043365]  kthread+0x257/0x310
[   26.043931]  ? __pfx_kthread+0x10/0x10
[   26.044212]  ret_from_fork+0x41/0x80
[   26.044984]  ? __pfx_kthread+0x10/0x10
[   26.045416]  ret_from_fork_asm+0x1a/0x30
[   26.045943]  </TASK>
[   26.046296] 
[   26.046542] Allocated by task 273:
[   26.046879]  kasan_save_stack+0x3d/0x60
[   26.047436]  kasan_save_track+0x18/0x40
[   26.047803]  kasan_save_alloc_info+0x3b/0x50
[   26.048382]  __kasan_kmalloc+0xb7/0xc0
[   26.048854]  __kmalloc_cache_noprof+0x184/0x410
[   26.049410]  kasan_atomics+0x96/0x310
[   26.049963]  kunit_try_run_case+0x1b3/0x490
[   26.050477]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.051024]  kthread+0x257/0x310
[   26.051449]  ret_from_fork+0x41/0x80
[   26.051932]  ret_from_fork_asm+0x1a/0x30
[   26.052494] 
[   26.052654] The buggy address belongs to the object at ffff888102a32500
[   26.052654]  which belongs to the cache kmalloc-64 of size 64
[   26.054000] The buggy address is located 0 bytes to the right of
[   26.054000]  allocated 48-byte region [ffff888102a32500, ffff888102a32530)
[   26.055165] 
[   26.055539] The buggy address belongs to the physical page:
[   26.055995] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a32
[   26.056939] flags: 0x200000000000000(node=0|zone=2)
[   26.057634] page_type: f5(slab)
[   26.058021] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   26.058875] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   26.059514] page dumped because: kasan: bad access detected
[   26.060167] 
[   26.060347] Memory state around the buggy address:
[   26.060628]  ffff888102a32400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.061000]  ffff888102a32480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.061415] >ffff888102a32500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   26.061806]                                      ^
[   26.062098]  ffff888102a32580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.062618]  ffff888102a32600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.063062] ==================================================================