Hay
Date
Nov. 22, 2024, 6:35 a.m.

Environment
qemu-x86_64

[   29.317015] ==================================================================
[   29.318122] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b70/0x5450
[   29.319331] Write of size 4 at addr ffff888101abdcb0 by task kunit_try_catch/273
[   29.320011] 
[   29.320439] CPU: 0 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241122 #1
[   29.321466] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.322183] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   29.323128] Call Trace:
[   29.323605]  <TASK>
[   29.324011]  dump_stack_lvl+0x73/0xb0
[   29.324513]  print_report+0xd1/0x640
[   29.325080]  ? __virt_addr_valid+0x1db/0x2d0
[   29.325697]  ? kasan_complete_mode_report_info+0x2a/0x200
[   29.326451]  kasan_report+0x102/0x140
[   29.326990]  ? kasan_atomics_helper+0x4b70/0x5450
[   29.327656]  ? kasan_atomics_helper+0x4b70/0x5450
[   29.328488]  __asan_report_store4_noabort+0x1b/0x30
[   29.329121]  kasan_atomics_helper+0x4b70/0x5450
[   29.329800]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   29.330595]  ? ret_from_fork_asm+0x1a/0x30
[   29.331196]  ? ret_from_fork+0x41/0x80
[   29.331797]  kasan_atomics+0x1dd/0x310
[   29.332441]  ? __pfx_kasan_atomics+0x10/0x10
[   29.333024]  ? __pfx_read_tsc+0x10/0x10
[   29.333579]  ? ktime_get_ts64+0x84/0x230
[   29.333960]  kunit_try_run_case+0x1b3/0x490
[   29.334729]  ? __pfx_kunit_try_run_case+0x10/0x10
[   29.335229]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   29.335641]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   29.336550]  ? __kthread_parkme+0x82/0x160
[   29.337119]  ? preempt_count_sub+0x50/0x80
[   29.337861]  ? __pfx_kunit_try_run_case+0x10/0x10
[   29.338625]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   29.339212]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   29.339706]  kthread+0x257/0x310
[   29.339968]  ? __pfx_kthread+0x10/0x10
[   29.340237]  ret_from_fork+0x41/0x80
[   29.341448]  ? __pfx_kthread+0x10/0x10
[   29.342218]  ret_from_fork_asm+0x1a/0x30
[   29.342967]  </TASK>
[   29.343257] 
[   29.343416] Allocated by task 273:
[   29.343800]  kasan_save_stack+0x3d/0x60
[   29.344121]  kasan_save_track+0x18/0x40
[   29.344651]  kasan_save_alloc_info+0x3b/0x50
[   29.344966]  __kasan_kmalloc+0xb7/0xc0
[   29.345512]  __kmalloc_cache_noprof+0x184/0x410
[   29.346487]  kasan_atomics+0x96/0x310
[   29.347011]  kunit_try_run_case+0x1b3/0x490
[   29.347716]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   29.348163]  kthread+0x257/0x310
[   29.348582]  ret_from_fork+0x41/0x80
[   29.348946]  ret_from_fork_asm+0x1a/0x30
[   29.349183] 
[   29.349334] The buggy address belongs to the object at ffff888101abdc80
[   29.349334]  which belongs to the cache kmalloc-64 of size 64
[   29.350962] The buggy address is located 0 bytes to the right of
[   29.350962]  allocated 48-byte region [ffff888101abdc80, ffff888101abdcb0)
[   29.352255] 
[   29.352728] The buggy address belongs to the physical page:
[   29.353649] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101abd
[   29.354490] flags: 0x200000000000000(node=0|zone=2)
[   29.355070] page_type: f5(slab)
[   29.355332] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   29.356179] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   29.357033] page dumped because: kasan: bad access detected
[   29.357379] 
[   29.357649] Memory state around the buggy address:
[   29.358085]  ffff888101abdb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.358840]  ffff888101abdc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.359254] >ffff888101abdc80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   29.359851]                                      ^
[   29.360308]  ffff888101abdd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.360857]  ffff888101abdd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.361528] ==================================================================
[   30.644754] ==================================================================
[   30.649596] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x13b6/0x5450
[   30.650180] Read of size 8 at addr ffff888101abdcb0 by task kunit_try_catch/273
[   30.650559] 
[   30.650737] CPU: 0 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241122 #1
[   30.651277] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.651525] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   30.654689] Call Trace:
[   30.655215]  <TASK>
[   30.655920]  dump_stack_lvl+0x73/0xb0
[   30.656531]  print_report+0xd1/0x640
[   30.657099]  ? __virt_addr_valid+0x1db/0x2d0
[   30.657763]  ? kasan_complete_mode_report_info+0x2a/0x200
[   30.658600]  kasan_report+0x102/0x140
[   30.659260]  ? kasan_atomics_helper+0x13b6/0x5450
[   30.659946]  ? kasan_atomics_helper+0x13b6/0x5450
[   30.660707]  kasan_check_range+0x10c/0x1c0
[   30.661081]  __kasan_check_read+0x15/0x20
[   30.661445]  kasan_atomics_helper+0x13b6/0x5450
[   30.662285]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   30.662578]  ? ret_from_fork_asm+0x1a/0x30
[   30.663372]  ? ret_from_fork+0x41/0x80
[   30.664010]  kasan_atomics+0x1dd/0x310
[   30.664715]  ? __pfx_kasan_atomics+0x10/0x10
[   30.665102]  ? __pfx_read_tsc+0x10/0x10
[   30.665522]  ? ktime_get_ts64+0x84/0x230
[   30.665972]  kunit_try_run_case+0x1b3/0x490
[   30.666535]  ? __pfx_kunit_try_run_case+0x10/0x10
[   30.666888]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   30.667516]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   30.667965]  ? __kthread_parkme+0x82/0x160
[   30.668410]  ? preempt_count_sub+0x50/0x80
[   30.668803]  ? __pfx_kunit_try_run_case+0x10/0x10
[   30.669404]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   30.669960]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   30.670438]  kthread+0x257/0x310
[   30.670897]  ? __pfx_kthread+0x10/0x10
[   30.671333]  ret_from_fork+0x41/0x80
[   30.671781]  ? __pfx_kthread+0x10/0x10
[   30.672109]  ret_from_fork_asm+0x1a/0x30
[   30.672705]  </TASK>
[   30.673025] 
[   30.673251] Allocated by task 273:
[   30.673619]  kasan_save_stack+0x3d/0x60
[   30.674006]  kasan_save_track+0x18/0x40
[   30.674500]  kasan_save_alloc_info+0x3b/0x50
[   30.674801]  __kasan_kmalloc+0xb7/0xc0
[   30.675232]  __kmalloc_cache_noprof+0x184/0x410
[   30.675794]  kasan_atomics+0x96/0x310
[   30.676124]  kunit_try_run_case+0x1b3/0x490
[   30.676561]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   30.677133]  kthread+0x257/0x310
[   30.677411]  ret_from_fork+0x41/0x80
[   30.677864]  ret_from_fork_asm+0x1a/0x30
[   30.678342] 
[   30.678565] The buggy address belongs to the object at ffff888101abdc80
[   30.678565]  which belongs to the cache kmalloc-64 of size 64
[   30.679694] The buggy address is located 0 bytes to the right of
[   30.679694]  allocated 48-byte region [ffff888101abdc80, ffff888101abdcb0)
[   30.680540] 
[   30.680707] The buggy address belongs to the physical page:
[   30.681367] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101abd
[   30.682191] flags: 0x200000000000000(node=0|zone=2)
[   30.682769] page_type: f5(slab)
[   30.683234] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   30.684046] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   30.684732] page dumped because: kasan: bad access detected
[   30.685389] 
[   30.685629] Memory state around the buggy address:
[   30.686148]  ffff888101abdb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   30.686928]  ffff888101abdc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   30.687668] >ffff888101abdc80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   30.688399]                                      ^
[   30.688931]  ffff888101abdd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.689162]  ffff888101abdd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.689532] ==================================================================
[   30.900934] ==================================================================
[   30.901572] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1650/0x5450
[   30.902578] Write of size 8 at addr ffff888101abdcb0 by task kunit_try_catch/273
[   30.903036] 
[   30.903219] CPU: 0 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241122 #1
[   30.904291] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.904855] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   30.905874] Call Trace:
[   30.906226]  <TASK>
[   30.906569]  dump_stack_lvl+0x73/0xb0
[   30.907084]  print_report+0xd1/0x640
[   30.907649]  ? __virt_addr_valid+0x1db/0x2d0
[   30.908214]  ? kasan_complete_mode_report_info+0x2a/0x200
[   30.908945]  kasan_report+0x102/0x140
[   30.909496]  ? kasan_atomics_helper+0x1650/0x5450
[   30.910092]  ? kasan_atomics_helper+0x1650/0x5450
[   30.910650]  kasan_check_range+0x10c/0x1c0
[   30.911066]  __kasan_check_write+0x18/0x20
[   30.911485]  kasan_atomics_helper+0x1650/0x5450
[   30.912000]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   30.912526]  ? ret_from_fork_asm+0x1a/0x30
[   30.912999]  ? ret_from_fork+0x41/0x80
[   30.913512]  kasan_atomics+0x1dd/0x310
[   30.913926]  ? __pfx_kasan_atomics+0x10/0x10
[   30.914476]  ? __pfx_read_tsc+0x10/0x10
[   30.914920]  ? ktime_get_ts64+0x84/0x230
[   30.915383]  kunit_try_run_case+0x1b3/0x490
[   30.915707]  ? __pfx_kunit_try_run_case+0x10/0x10
[   30.916277]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   30.916812]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   30.917299]  ? __kthread_parkme+0x82/0x160
[   30.917773]  ? preempt_count_sub+0x50/0x80
[   30.918314]  ? __pfx_kunit_try_run_case+0x10/0x10
[   30.918764]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   30.919456]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   30.920025]  kthread+0x257/0x310
[   30.920482]  ? __pfx_kthread+0x10/0x10
[   30.920835]  ret_from_fork+0x41/0x80
[   30.921283]  ? __pfx_kthread+0x10/0x10
[   30.921681]  ret_from_fork_asm+0x1a/0x30
[   30.922151]  </TASK>
[   30.922466] 
[   30.922692] Allocated by task 273:
[   30.923113]  kasan_save_stack+0x3d/0x60
[   30.923525]  kasan_save_track+0x18/0x40
[   30.923961]  kasan_save_alloc_info+0x3b/0x50
[   30.924361]  __kasan_kmalloc+0xb7/0xc0
[   30.924734]  __kmalloc_cache_noprof+0x184/0x410
[   30.925205]  kasan_atomics+0x96/0x310
[   30.925651]  kunit_try_run_case+0x1b3/0x490
[   30.926153]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   30.926578]  kthread+0x257/0x310
[   30.926954]  ret_from_fork+0x41/0x80
[   30.927429]  ret_from_fork_asm+0x1a/0x30
[   30.927904] 
[   30.928082] The buggy address belongs to the object at ffff888101abdc80
[   30.928082]  which belongs to the cache kmalloc-64 of size 64
[   30.929035] The buggy address is located 0 bytes to the right of
[   30.929035]  allocated 48-byte region [ffff888101abdc80, ffff888101abdcb0)
[   30.930022] 
[   30.930320] The buggy address belongs to the physical page:
[   30.930755] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101abd
[   30.931441] flags: 0x200000000000000(node=0|zone=2)
[   30.931744] page_type: f5(slab)
[   30.932009] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   30.932630] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   30.934322] page dumped because: kasan: bad access detected
[   30.935216] 
[   30.935963] Memory state around the buggy address:
[   30.936565]  ffff888101abdb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   30.937335]  ffff888101abdc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   30.937809] >ffff888101abdc80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   30.938643]                                      ^
[   30.939179]  ffff888101abdd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.940030]  ffff888101abdd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.940910] ==================================================================
[   31.938366] ==================================================================
[   31.938793] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x5117/0x5450
[   31.939958] Read of size 8 at addr ffff888101abdcb0 by task kunit_try_catch/273
[   31.940577] 
[   31.940841] CPU: 0 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241122 #1
[   31.941345] Tainted: [B]=BAD_PAGE, [N]=TEST
[   31.941599] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   31.942326] Call Trace:
[   31.942685]  <TASK>
[   31.943093]  dump_stack_lvl+0x73/0xb0
[   31.943628]  print_report+0xd1/0x640
[   31.944070]  ? __virt_addr_valid+0x1db/0x2d0
[   31.944680]  ? kasan_complete_mode_report_info+0x2a/0x200
[   31.945298]  kasan_report+0x102/0x140
[   31.945693]  ? kasan_atomics_helper+0x5117/0x5450
[   31.946164]  ? kasan_atomics_helper+0x5117/0x5450
[   31.946683]  __asan_report_load8_noabort+0x18/0x20
[   31.947446]  kasan_atomics_helper+0x5117/0x5450
[   31.947971]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   31.948489]  ? ret_from_fork_asm+0x1a/0x30
[   31.948782]  ? ret_from_fork+0x41/0x80
[   31.949110]  kasan_atomics+0x1dd/0x310
[   31.949580]  ? __pfx_kasan_atomics+0x10/0x10
[   31.950154]  ? __pfx_read_tsc+0x10/0x10
[   31.950645]  ? ktime_get_ts64+0x84/0x230
[   31.951139]  kunit_try_run_case+0x1b3/0x490
[   31.951702]  ? __pfx_kunit_try_run_case+0x10/0x10
[   31.952296]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   31.952836]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   31.953488]  ? __kthread_parkme+0x82/0x160
[   31.953950]  ? preempt_count_sub+0x50/0x80
[   31.954477]  ? __pfx_kunit_try_run_case+0x10/0x10
[   31.954954]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   31.955647]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   31.956021]  kthread+0x257/0x310
[   31.956336]  ? __pfx_kthread+0x10/0x10
[   31.956795]  ret_from_fork+0x41/0x80
[   31.957233]  ? __pfx_kthread+0x10/0x10
[   31.957644]  ret_from_fork_asm+0x1a/0x30
[   31.958171]  </TASK>
[   31.958359] 
[   31.958583] Allocated by task 273:
[   31.959056]  kasan_save_stack+0x3d/0x60
[   31.959636]  kasan_save_track+0x18/0x40
[   31.960226]  kasan_save_alloc_info+0x3b/0x50
[   31.960545]  __kasan_kmalloc+0xb7/0xc0
[   31.960858]  __kmalloc_cache_noprof+0x184/0x410
[   31.961237]  kasan_atomics+0x96/0x310
[   31.961662]  kunit_try_run_case+0x1b3/0x490
[   31.962134]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   31.962729]  kthread+0x257/0x310
[   31.963127]  ret_from_fork+0x41/0x80
[   31.963616]  ret_from_fork_asm+0x1a/0x30
[   31.964132] 
[   31.964349] The buggy address belongs to the object at ffff888101abdc80
[   31.964349]  which belongs to the cache kmalloc-64 of size 64
[   31.965361] The buggy address is located 0 bytes to the right of
[   31.965361]  allocated 48-byte region [ffff888101abdc80, ffff888101abdcb0)
[   31.966294] 
[   31.966534] The buggy address belongs to the physical page:
[   31.966982] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101abd
[   31.967504] flags: 0x200000000000000(node=0|zone=2)
[   31.968326] page_type: f5(slab)
[   31.968721] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   31.969229] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   31.969930] page dumped because: kasan: bad access detected
[   31.970482] 
[   31.970637] Memory state around the buggy address:
[   31.970929]  ffff888101abdb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   31.971726]  ffff888101abdc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   31.972704] >ffff888101abdc80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   31.973248]                                      ^
[   31.973612]  ffff888101abdd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.974373]  ffff888101abdd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.975041] ==================================================================
[   31.474769] ==================================================================
[   31.475555] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1e13/0x5450
[   31.476297] Write of size 8 at addr ffff888101abdcb0 by task kunit_try_catch/273
[   31.476902] 
[   31.477172] CPU: 0 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241122 #1
[   31.478024] Tainted: [B]=BAD_PAGE, [N]=TEST
[   31.479245] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   31.481946] Call Trace:
[   31.482175]  <TASK>
[   31.482374]  dump_stack_lvl+0x73/0xb0
[   31.483947]  print_report+0xd1/0x640
[   31.484386]  ? __virt_addr_valid+0x1db/0x2d0
[   31.484880]  ? kasan_complete_mode_report_info+0x2a/0x200
[   31.486491]  kasan_report+0x102/0x140
[   31.486927]  ? kasan_atomics_helper+0x1e13/0x5450
[   31.488276]  ? kasan_atomics_helper+0x1e13/0x5450
[   31.488986]  kasan_check_range+0x10c/0x1c0
[   31.489839]  __kasan_check_write+0x18/0x20
[   31.490557]  kasan_atomics_helper+0x1e13/0x5450
[   31.490984]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   31.491529]  ? ret_from_fork_asm+0x1a/0x30
[   31.492092]  ? ret_from_fork+0x41/0x80
[   31.492573]  kasan_atomics+0x1dd/0x310
[   31.493005]  ? __pfx_kasan_atomics+0x10/0x10
[   31.493408]  ? __pfx_read_tsc+0x10/0x10
[   31.493885]  ? ktime_get_ts64+0x84/0x230
[   31.494337]  kunit_try_run_case+0x1b3/0x490
[   31.494704]  ? __pfx_kunit_try_run_case+0x10/0x10
[   31.495214]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   31.495877]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   31.496289]  ? __kthread_parkme+0x82/0x160
[   31.496663]  ? preempt_count_sub+0x50/0x80
[   31.497140]  ? __pfx_kunit_try_run_case+0x10/0x10
[   31.497600]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   31.497995]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   31.498538]  kthread+0x257/0x310
[   31.499093]  ? __pfx_kthread+0x10/0x10
[   31.499630]  ret_from_fork+0x41/0x80
[   31.500067]  ? __pfx_kthread+0x10/0x10
[   31.500638]  ret_from_fork_asm+0x1a/0x30
[   31.501128]  </TASK>
[   31.501525] 
[   31.501750] Allocated by task 273:
[   31.502029]  kasan_save_stack+0x3d/0x60
[   31.502585]  kasan_save_track+0x18/0x40
[   31.502932]  kasan_save_alloc_info+0x3b/0x50
[   31.503408]  __kasan_kmalloc+0xb7/0xc0
[   31.503894]  __kmalloc_cache_noprof+0x184/0x410
[   31.504228]  kasan_atomics+0x96/0x310
[   31.504737]  kunit_try_run_case+0x1b3/0x490
[   31.505105]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   31.505713]  kthread+0x257/0x310
[   31.506110]  ret_from_fork+0x41/0x80
[   31.506422]  ret_from_fork_asm+0x1a/0x30
[   31.506701] 
[   31.506881] The buggy address belongs to the object at ffff888101abdc80
[   31.506881]  which belongs to the cache kmalloc-64 of size 64
[   31.507443] The buggy address is located 0 bytes to the right of
[   31.507443]  allocated 48-byte region [ffff888101abdc80, ffff888101abdcb0)
[   31.508694] 
[   31.509025] The buggy address belongs to the physical page:
[   31.509664] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101abd
[   31.510440] flags: 0x200000000000000(node=0|zone=2)
[   31.510764] page_type: f5(slab)
[   31.512240] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   31.512945] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   31.514781] page dumped because: kasan: bad access detected
[   31.515164] 
[   31.515356] Memory state around the buggy address:
[   31.515793]  ffff888101abdb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   31.516153]  ffff888101abdc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   31.516976] >ffff888101abdc80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   31.517433]                                      ^
[   31.517736]  ffff888101abdd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.518473]  ffff888101abdd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.519116] ==================================================================
[   30.477080] ==================================================================
[   30.477784] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1218/0x5450
[   30.479353] Write of size 4 at addr ffff888101abdcb0 by task kunit_try_catch/273
[   30.480011] 
[   30.480287] CPU: 0 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241122 #1
[   30.480986] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.481238] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   30.481720] Call Trace:
[   30.482057]  <TASK>
[   30.482374]  dump_stack_lvl+0x73/0xb0
[   30.482799]  print_report+0xd1/0x640
[   30.483238]  ? __virt_addr_valid+0x1db/0x2d0
[   30.483747]  ? kasan_complete_mode_report_info+0x2a/0x200
[   30.484337]  kasan_report+0x102/0x140
[   30.484764]  ? kasan_atomics_helper+0x1218/0x5450
[   30.485285]  ? kasan_atomics_helper+0x1218/0x5450
[   30.485777]  kasan_check_range+0x10c/0x1c0
[   30.486114]  __kasan_check_write+0x18/0x20
[   30.486480]  kasan_atomics_helper+0x1218/0x5450
[   30.486963]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   30.487501]  ? ret_from_fork_asm+0x1a/0x30
[   30.487956]  ? ret_from_fork+0x41/0x80
[   30.488453]  kasan_atomics+0x1dd/0x310
[   30.488940]  ? __pfx_kasan_atomics+0x10/0x10
[   30.489381]  ? __pfx_read_tsc+0x10/0x10
[   30.489658]  ? ktime_get_ts64+0x84/0x230
[   30.490064]  kunit_try_run_case+0x1b3/0x490
[   30.490574]  ? __pfx_kunit_try_run_case+0x10/0x10
[   30.491077]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   30.491619]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   30.492051]  ? __kthread_parkme+0x82/0x160
[   30.492478]  ? preempt_count_sub+0x50/0x80
[   30.492866]  ? __pfx_kunit_try_run_case+0x10/0x10
[   30.493203]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   30.493858]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   30.494453]  kthread+0x257/0x310
[   30.494739]  ? __pfx_kthread+0x10/0x10
[   30.495177]  ret_from_fork+0x41/0x80
[   30.495504]  ? __pfx_kthread+0x10/0x10
[   30.495787]  ret_from_fork_asm+0x1a/0x30
[   30.496304]  </TASK>
[   30.496602] 
[   30.496841] Allocated by task 273:
[   30.497206]  kasan_save_stack+0x3d/0x60
[   30.497650]  kasan_save_track+0x18/0x40
[   30.498034]  kasan_save_alloc_info+0x3b/0x50
[   30.498533]  __kasan_kmalloc+0xb7/0xc0
[   30.498847]  __kmalloc_cache_noprof+0x184/0x410
[   30.499192]  kasan_atomics+0x96/0x310
[   30.499505]  kunit_try_run_case+0x1b3/0x490
[   30.499786]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   30.500383]  kthread+0x257/0x310
[   30.500759]  ret_from_fork+0x41/0x80
[   30.501185]  ret_from_fork_asm+0x1a/0x30
[   30.501651] 
[   30.501888] The buggy address belongs to the object at ffff888101abdc80
[   30.501888]  which belongs to the cache kmalloc-64 of size 64
[   30.502947] The buggy address is located 0 bytes to the right of
[   30.502947]  allocated 48-byte region [ffff888101abdc80, ffff888101abdcb0)
[   30.503849] 
[   30.504023] The buggy address belongs to the physical page:
[   30.504485] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101abd
[   30.505170] flags: 0x200000000000000(node=0|zone=2)
[   30.505557] page_type: f5(slab)
[   30.505940] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   30.506516] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   30.507010] page dumped because: kasan: bad access detected
[   30.507539] 
[   30.507766] Memory state around the buggy address:
[   30.508137]  ffff888101abdb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   30.508697]  ffff888101abdc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   30.509214] >ffff888101abdc80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   30.511841]                                      ^
[   30.512330]  ffff888101abdd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.513050]  ffff888101abdd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.513523] ==================================================================
[   30.861738] ==================================================================
[   30.862862] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x15b7/0x5450
[   30.863526] Write of size 8 at addr ffff888101abdcb0 by task kunit_try_catch/273
[   30.864197] 
[   30.864526] CPU: 0 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241122 #1
[   30.865511] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.865993] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   30.866636] Call Trace:
[   30.867048]  <TASK>
[   30.867529]  dump_stack_lvl+0x73/0xb0
[   30.867993]  print_report+0xd1/0x640
[   30.868551]  ? __virt_addr_valid+0x1db/0x2d0
[   30.868886]  ? kasan_complete_mode_report_info+0x2a/0x200
[   30.869595]  kasan_report+0x102/0x140
[   30.870102]  ? kasan_atomics_helper+0x15b7/0x5450
[   30.870619]  ? kasan_atomics_helper+0x15b7/0x5450
[   30.871155]  kasan_check_range+0x10c/0x1c0
[   30.871568]  __kasan_check_write+0x18/0x20
[   30.872114]  kasan_atomics_helper+0x15b7/0x5450
[   30.872564]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   30.873211]  ? ret_from_fork_asm+0x1a/0x30
[   30.873627]  ? ret_from_fork+0x41/0x80
[   30.874186]  kasan_atomics+0x1dd/0x310
[   30.874597]  ? __pfx_kasan_atomics+0x10/0x10
[   30.875174]  ? __pfx_read_tsc+0x10/0x10
[   30.875598]  ? ktime_get_ts64+0x84/0x230
[   30.875941]  kunit_try_run_case+0x1b3/0x490
[   30.876598]  ? __pfx_kunit_try_run_case+0x10/0x10
[   30.877184]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   30.877712]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   30.878355]  ? __kthread_parkme+0x82/0x160
[   30.878743]  ? preempt_count_sub+0x50/0x80
[   30.879074]  ? __pfx_kunit_try_run_case+0x10/0x10
[   30.879682]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   30.880561]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   30.881189]  kthread+0x257/0x310
[   30.881686]  ? __pfx_kthread+0x10/0x10
[   30.882209]  ret_from_fork+0x41/0x80
[   30.882581]  ? __pfx_kthread+0x10/0x10
[   30.883102]  ret_from_fork_asm+0x1a/0x30
[   30.883552]  </TASK>
[   30.883849] 
[   30.884074] Allocated by task 273:
[   30.884465]  kasan_save_stack+0x3d/0x60
[   30.884745]  kasan_save_track+0x18/0x40
[   30.885271]  kasan_save_alloc_info+0x3b/0x50
[   30.885895]  __kasan_kmalloc+0xb7/0xc0
[   30.886436]  __kmalloc_cache_noprof+0x184/0x410
[   30.886897]  kasan_atomics+0x96/0x310
[   30.887393]  kunit_try_run_case+0x1b3/0x490
[   30.887682]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   30.888213]  kthread+0x257/0x310
[   30.888707]  ret_from_fork+0x41/0x80
[   30.889302]  ret_from_fork_asm+0x1a/0x30
[   30.889799] 
[   30.890137] The buggy address belongs to the object at ffff888101abdc80
[   30.890137]  which belongs to the cache kmalloc-64 of size 64
[   30.891106] The buggy address is located 0 bytes to the right of
[   30.891106]  allocated 48-byte region [ffff888101abdc80, ffff888101abdcb0)
[   30.891950] 
[   30.892332] The buggy address belongs to the physical page:
[   30.892894] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101abd
[   30.893562] flags: 0x200000000000000(node=0|zone=2)
[   30.894116] page_type: f5(slab)
[   30.894571] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   30.895157] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   30.896026] page dumped because: kasan: bad access detected
[   30.896635] 
[   30.896887] Memory state around the buggy address:
[   30.897578]  ffff888101abdb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   30.898419]  ffff888101abdc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   30.898883] >ffff888101abdc80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   30.899215]                                      ^
[   30.899419]  ffff888101abdd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.899632]  ffff888101abdd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.899894] ==================================================================
[   30.602620] ==================================================================
[   30.603655] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x49d0/0x5450
[   30.604367] Read of size 4 at addr ffff888101abdcb0 by task kunit_try_catch/273
[   30.604991] 
[   30.605283] CPU: 0 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241122 #1
[   30.606040] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.606484] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   30.607370] Call Trace:
[   30.607682]  <TASK>
[   30.607988]  dump_stack_lvl+0x73/0xb0
[   30.608442]  print_report+0xd1/0x640
[   30.608807]  ? __virt_addr_valid+0x1db/0x2d0
[   30.609509]  ? kasan_complete_mode_report_info+0x2a/0x200
[   30.609994]  kasan_report+0x102/0x140
[   30.610520]  ? kasan_atomics_helper+0x49d0/0x5450
[   30.611055]  ? kasan_atomics_helper+0x49d0/0x5450
[   30.611432]  __asan_report_load4_noabort+0x18/0x20
[   30.612021]  kasan_atomics_helper+0x49d0/0x5450
[   30.612666]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   30.613195]  ? ret_from_fork_asm+0x1a/0x30
[   30.613689]  ? ret_from_fork+0x41/0x80
[   30.614194]  kasan_atomics+0x1dd/0x310
[   30.614618]  ? __pfx_kasan_atomics+0x10/0x10
[   30.615003]  ? __pfx_read_tsc+0x10/0x10
[   30.615549]  ? ktime_get_ts64+0x84/0x230
[   30.616023]  kunit_try_run_case+0x1b3/0x490
[   30.616567]  ? __pfx_kunit_try_run_case+0x10/0x10
[   30.617036]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   30.617632]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   30.618203]  ? __kthread_parkme+0x82/0x160
[   30.618687]  ? preempt_count_sub+0x50/0x80
[   30.619153]  ? __pfx_kunit_try_run_case+0x10/0x10
[   30.619764]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   30.620429]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   30.620906]  kthread+0x257/0x310
[   30.621236]  ? __pfx_kthread+0x10/0x10
[   30.621643]  ret_from_fork+0x41/0x80
[   30.622125]  ? __pfx_kthread+0x10/0x10
[   30.622594]  ret_from_fork_asm+0x1a/0x30
[   30.623077]  </TASK>
[   30.623360] 
[   30.623577] Allocated by task 273:
[   30.623997]  kasan_save_stack+0x3d/0x60
[   30.624537]  kasan_save_track+0x18/0x40
[   30.624964]  kasan_save_alloc_info+0x3b/0x50
[   30.625530]  __kasan_kmalloc+0xb7/0xc0
[   30.626005]  __kmalloc_cache_noprof+0x184/0x410
[   30.626506]  kasan_atomics+0x96/0x310
[   30.626943]  kunit_try_run_case+0x1b3/0x490
[   30.627457]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   30.628003]  kthread+0x257/0x310
[   30.628433]  ret_from_fork+0x41/0x80
[   30.628915]  ret_from_fork_asm+0x1a/0x30
[   30.629295] 
[   30.629604] The buggy address belongs to the object at ffff888101abdc80
[   30.629604]  which belongs to the cache kmalloc-64 of size 64
[   30.630709] The buggy address is located 0 bytes to the right of
[   30.630709]  allocated 48-byte region [ffff888101abdc80, ffff888101abdcb0)
[   30.631633] 
[   30.631789] The buggy address belongs to the physical page:
[   30.632475] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101abd
[   30.633139] flags: 0x200000000000000(node=0|zone=2)
[   30.633650] page_type: f5(slab)
[   30.633932] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   30.634433] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   30.635162] page dumped because: kasan: bad access detected
[   30.635730] 
[   30.636011] Memory state around the buggy address:
[   30.636557]  ffff888101abdb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   30.639469]  ffff888101abdc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   30.641071] >ffff888101abdc80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   30.641677]                                      ^
[   30.642200]  ffff888101abdd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.642710]  ffff888101abdd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.643485] ==================================================================
[   30.395792] ==================================================================
[   30.396686] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1149/0x5450
[   30.397332] Write of size 4 at addr ffff888101abdcb0 by task kunit_try_catch/273
[   30.397860] 
[   30.398028] CPU: 0 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241122 #1
[   30.399057] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.399517] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   30.400260] Call Trace:
[   30.400566]  <TASK>
[   30.400789]  dump_stack_lvl+0x73/0xb0
[   30.401116]  print_report+0xd1/0x640
[   30.401396]  ? __virt_addr_valid+0x1db/0x2d0
[   30.401700]  ? kasan_complete_mode_report_info+0x2a/0x200
[   30.402280]  kasan_report+0x102/0x140
[   30.402840]  ? kasan_atomics_helper+0x1149/0x5450
[   30.403362]  ? kasan_atomics_helper+0x1149/0x5450
[   30.403903]  kasan_check_range+0x10c/0x1c0
[   30.404362]  __kasan_check_write+0x18/0x20
[   30.404870]  kasan_atomics_helper+0x1149/0x5450
[   30.405346]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   30.405950]  ? ret_from_fork_asm+0x1a/0x30
[   30.406282]  ? ret_from_fork+0x41/0x80
[   30.406585]  kasan_atomics+0x1dd/0x310
[   30.407874]  ? __pfx_kasan_atomics+0x10/0x10
[   30.409177]  ? __pfx_read_tsc+0x10/0x10
[   30.409634]  ? ktime_get_ts64+0x84/0x230
[   30.410039]  kunit_try_run_case+0x1b3/0x490
[   30.410910]  ? __pfx_kunit_try_run_case+0x10/0x10
[   30.411239]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   30.411574]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   30.411923]  ? __kthread_parkme+0x82/0x160
[   30.412212]  ? preempt_count_sub+0x50/0x80
[   30.412503]  ? __pfx_kunit_try_run_case+0x10/0x10
[   30.412806]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   30.416939]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   30.417491]  kthread+0x257/0x310
[   30.418554]  ? __pfx_kthread+0x10/0x10
[   30.418863]  ret_from_fork+0x41/0x80
[   30.419188]  ? __pfx_kthread+0x10/0x10
[   30.419476]  ret_from_fork_asm+0x1a/0x30
[   30.419776]  </TASK>
[   30.421068] 
[   30.421705] Allocated by task 273:
[   30.422485]  kasan_save_stack+0x3d/0x60
[   30.423009]  kasan_save_track+0x18/0x40
[   30.423175]  kasan_save_alloc_info+0x3b/0x50
[   30.423979]  __kasan_kmalloc+0xb7/0xc0
[   30.424401]  __kmalloc_cache_noprof+0x184/0x410
[   30.424883]  kasan_atomics+0x96/0x310
[   30.425293]  kunit_try_run_case+0x1b3/0x490
[   30.425707]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   30.426180]  kthread+0x257/0x310
[   30.426448]  ret_from_fork+0x41/0x80
[   30.426700]  ret_from_fork_asm+0x1a/0x30
[   30.427011] 
[   30.427167] The buggy address belongs to the object at ffff888101abdc80
[   30.427167]  which belongs to the cache kmalloc-64 of size 64
[   30.428143] The buggy address is located 0 bytes to the right of
[   30.428143]  allocated 48-byte region [ffff888101abdc80, ffff888101abdcb0)
[   30.428983] 
[   30.429204] The buggy address belongs to the physical page:
[   30.429739] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101abd
[   30.430447] flags: 0x200000000000000(node=0|zone=2)
[   30.430841] page_type: f5(slab)
[   30.431091] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   30.431805] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   30.432421] page dumped because: kasan: bad access detected
[   30.432723] 
[   30.432925] Memory state around the buggy address:
[   30.433440]  ffff888101abdb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   30.434114]  ffff888101abdc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   30.434614] >ffff888101abdc80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   30.435000]                                      ^
[   30.435478]  ffff888101abdd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.436106]  ffff888101abdd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.436766] ==================================================================
[   30.813793] ==================================================================
[   30.814441] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x151e/0x5450
[   30.814975] Write of size 8 at addr ffff888101abdcb0 by task kunit_try_catch/273
[   30.817289] 
[   30.817453] CPU: 0 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241122 #1
[   30.818256] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.819001] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   30.820366] Call Trace:
[   30.820588]  <TASK>
[   30.820765]  dump_stack_lvl+0x73/0xb0
[   30.821484]  print_report+0xd1/0x640
[   30.822153]  ? __virt_addr_valid+0x1db/0x2d0
[   30.822874]  ? kasan_complete_mode_report_info+0x2a/0x200
[   30.823524]  kasan_report+0x102/0x140
[   30.824030]  ? kasan_atomics_helper+0x151e/0x5450
[   30.824881]  ? kasan_atomics_helper+0x151e/0x5450
[   30.825614]  kasan_check_range+0x10c/0x1c0
[   30.825968]  __kasan_check_write+0x18/0x20
[   30.826456]  kasan_atomics_helper+0x151e/0x5450
[   30.826839]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   30.827475]  ? ret_from_fork_asm+0x1a/0x30
[   30.827913]  ? ret_from_fork+0x41/0x80
[   30.828294]  kasan_atomics+0x1dd/0x310
[   30.828698]  ? __pfx_kasan_atomics+0x10/0x10
[   30.830047]  ? __pfx_read_tsc+0x10/0x10
[   30.830405]  ? ktime_get_ts64+0x84/0x230
[   30.831038]  kunit_try_run_case+0x1b3/0x490
[   30.831868]  ? __pfx_kunit_try_run_case+0x10/0x10
[   30.832275]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   30.832920]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   30.833402]  ? __kthread_parkme+0x82/0x160
[   30.833809]  ? preempt_count_sub+0x50/0x80
[   30.834665]  ? __pfx_kunit_try_run_case+0x10/0x10
[   30.835438]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   30.835997]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   30.837218]  kthread+0x257/0x310
[   30.837541]  ? __pfx_kthread+0x10/0x10
[   30.837864]  ret_from_fork+0x41/0x80
[   30.838543]  ? __pfx_kthread+0x10/0x10
[   30.839190]  ret_from_fork_asm+0x1a/0x30
[   30.839658]  </TASK>
[   30.839933] 
[   30.840121] Allocated by task 273:
[   30.841164]  kasan_save_stack+0x3d/0x60
[   30.841567]  kasan_save_track+0x18/0x40
[   30.842008]  kasan_save_alloc_info+0x3b/0x50
[   30.842436]  __kasan_kmalloc+0xb7/0xc0
[   30.842780]  __kmalloc_cache_noprof+0x184/0x410
[   30.843184]  kasan_atomics+0x96/0x310
[   30.844200]  kunit_try_run_case+0x1b3/0x490
[   30.844641]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   30.845178]  kthread+0x257/0x310
[   30.845875]  ret_from_fork+0x41/0x80
[   30.846132]  ret_from_fork_asm+0x1a/0x30
[   30.846785] 
[   30.847060] The buggy address belongs to the object at ffff888101abdc80
[   30.847060]  which belongs to the cache kmalloc-64 of size 64
[   30.848480] The buggy address is located 0 bytes to the right of
[   30.848480]  allocated 48-byte region [ffff888101abdc80, ffff888101abdcb0)
[   30.850021] 
[   30.850184] The buggy address belongs to the physical page:
[   30.850481] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101abd
[   30.851246] flags: 0x200000000000000(node=0|zone=2)
[   30.852177] page_type: f5(slab)
[   30.852638] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   30.853716] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   30.854684] page dumped because: kasan: bad access detected
[   30.855104] 
[   30.855352] Memory state around the buggy address:
[   30.856195]  ffff888101abdb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   30.856708]  ffff888101abdc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   30.857218] >ffff888101abdc80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   30.857765]                                      ^
[   30.858262]  ffff888101abdd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.858776]  ffff888101abdd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.860059] ==================================================================
[   31.224533] ==================================================================
[   31.225732] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1a80/0x5450
[   31.226541] Write of size 8 at addr ffff888101abdcb0 by task kunit_try_catch/273
[   31.227412] 
[   31.227748] CPU: 0 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241122 #1
[   31.229023] Tainted: [B]=BAD_PAGE, [N]=TEST
[   31.229399] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   31.230513] Call Trace:
[   31.230723]  <TASK>
[   31.231181]  dump_stack_lvl+0x73/0xb0
[   31.232172]  print_report+0xd1/0x640
[   31.232737]  ? __virt_addr_valid+0x1db/0x2d0
[   31.233352]  ? kasan_complete_mode_report_info+0x2a/0x200
[   31.233969]  kasan_report+0x102/0x140
[   31.234537]  ? kasan_atomics_helper+0x1a80/0x5450
[   31.235060]  ? kasan_atomics_helper+0x1a80/0x5450
[   31.235729]  kasan_check_range+0x10c/0x1c0
[   31.236209]  __kasan_check_write+0x18/0x20
[   31.236773]  kasan_atomics_helper+0x1a80/0x5450
[   31.237290]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   31.238007]  ? ret_from_fork_asm+0x1a/0x30
[   31.238309]  ? ret_from_fork+0x41/0x80
[   31.238975]  kasan_atomics+0x1dd/0x310
[   31.239658]  ? __pfx_kasan_atomics+0x10/0x10
[   31.240213]  ? __pfx_read_tsc+0x10/0x10
[   31.240685]  ? ktime_get_ts64+0x84/0x230
[   31.241239]  kunit_try_run_case+0x1b3/0x490
[   31.241727]  ? __pfx_kunit_try_run_case+0x10/0x10
[   31.242415]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   31.242810]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   31.243158]  ? __kthread_parkme+0x82/0x160
[   31.243668]  ? preempt_count_sub+0x50/0x80
[   31.244532]  ? __pfx_kunit_try_run_case+0x10/0x10
[   31.245047]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   31.245894]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   31.246287]  kthread+0x257/0x310
[   31.246877]  ? __pfx_kthread+0x10/0x10
[   31.247411]  ret_from_fork+0x41/0x80
[   31.248042]  ? __pfx_kthread+0x10/0x10
[   31.248622]  ret_from_fork_asm+0x1a/0x30
[   31.249015]  </TASK>
[   31.249325] 
[   31.249546] Allocated by task 273:
[   31.250141]  kasan_save_stack+0x3d/0x60
[   31.250695]  kasan_save_track+0x18/0x40
[   31.251266]  kasan_save_alloc_info+0x3b/0x50
[   31.251562]  __kasan_kmalloc+0xb7/0xc0
[   31.251836]  __kmalloc_cache_noprof+0x184/0x410
[   31.252335]  kasan_atomics+0x96/0x310
[   31.253006]  kunit_try_run_case+0x1b3/0x490
[   31.253602]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   31.254360]  kthread+0x257/0x310
[   31.254734]  ret_from_fork+0x41/0x80
[   31.255230]  ret_from_fork_asm+0x1a/0x30
[   31.255880] 
[   31.256044] The buggy address belongs to the object at ffff888101abdc80
[   31.256044]  which belongs to the cache kmalloc-64 of size 64
[   31.257096] The buggy address is located 0 bytes to the right of
[   31.257096]  allocated 48-byte region [ffff888101abdc80, ffff888101abdcb0)
[   31.257936] 
[   31.258232] The buggy address belongs to the physical page:
[   31.258848] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101abd
[   31.259702] flags: 0x200000000000000(node=0|zone=2)
[   31.260241] page_type: f5(slab)
[   31.260880] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   31.261449] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   31.262178] page dumped because: kasan: bad access detected
[   31.262882] 
[   31.263143] Memory state around the buggy address:
[   31.263741]  ffff888101abdb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   31.264269]  ffff888101abdc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   31.264983] >ffff888101abdc80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   31.265347]                                      ^
[   31.265790]  ffff888101abdd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.267034]  ffff888101abdd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.267748] ==================================================================
[   29.650375] ==================================================================
[   29.651070] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x730/0x5450
[   29.651643] Write of size 4 at addr ffff888101abdcb0 by task kunit_try_catch/273
[   29.653622] 
[   29.654034] CPU: 0 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241122 #1
[   29.656737] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.657666] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   29.658607] Call Trace:
[   29.658982]  <TASK>
[   29.659187]  dump_stack_lvl+0x73/0xb0
[   29.659724]  print_report+0xd1/0x640
[   29.660584]  ? __virt_addr_valid+0x1db/0x2d0
[   29.660993]  ? kasan_complete_mode_report_info+0x2a/0x200
[   29.661871]  kasan_report+0x102/0x140
[   29.662218]  ? kasan_atomics_helper+0x730/0x5450
[   29.662934]  ? kasan_atomics_helper+0x730/0x5450
[   29.663313]  kasan_check_range+0x10c/0x1c0
[   29.664233]  __kasan_check_write+0x18/0x20
[   29.664647]  kasan_atomics_helper+0x730/0x5450
[   29.665219]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   29.666052]  ? ret_from_fork_asm+0x1a/0x30
[   29.666444]  ? ret_from_fork+0x41/0x80
[   29.667088]  kasan_atomics+0x1dd/0x310
[   29.667768]  ? __pfx_kasan_atomics+0x10/0x10
[   29.668513]  ? __pfx_read_tsc+0x10/0x10
[   29.668916]  ? ktime_get_ts64+0x84/0x230
[   29.669557]  kunit_try_run_case+0x1b3/0x490
[   29.670172]  ? __pfx_kunit_try_run_case+0x10/0x10
[   29.670856]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   29.671477]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   29.672131]  ? __kthread_parkme+0x82/0x160
[   29.672844]  ? preempt_count_sub+0x50/0x80
[   29.673473]  ? __pfx_kunit_try_run_case+0x10/0x10
[   29.674141]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   29.674914]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   29.675626]  kthread+0x257/0x310
[   29.676155]  ? __pfx_kthread+0x10/0x10
[   29.676875]  ret_from_fork+0x41/0x80
[   29.677455]  ? __pfx_kthread+0x10/0x10
[   29.678026]  ret_from_fork_asm+0x1a/0x30
[   29.678631]  </TASK>
[   29.679219] 
[   29.679439] Allocated by task 273:
[   29.679793]  kasan_save_stack+0x3d/0x60
[   29.680163]  kasan_save_track+0x18/0x40
[   29.680677]  kasan_save_alloc_info+0x3b/0x50
[   29.681175]  __kasan_kmalloc+0xb7/0xc0
[   29.681548]  __kmalloc_cache_noprof+0x184/0x410
[   29.681948]  kasan_atomics+0x96/0x310
[   29.682375]  kunit_try_run_case+0x1b3/0x490
[   29.682996]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   29.683362]  kthread+0x257/0x310
[   29.683659]  ret_from_fork+0x41/0x80
[   29.684129]  ret_from_fork_asm+0x1a/0x30
[   29.684690] 
[   29.684932] The buggy address belongs to the object at ffff888101abdc80
[   29.684932]  which belongs to the cache kmalloc-64 of size 64
[   29.685624] The buggy address is located 0 bytes to the right of
[   29.685624]  allocated 48-byte region [ffff888101abdc80, ffff888101abdcb0)
[   29.686672] 
[   29.686862] The buggy address belongs to the physical page:
[   29.687162] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101abd
[   29.687806] flags: 0x200000000000000(node=0|zone=2)
[   29.688309] page_type: f5(slab)
[   29.688685] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   29.689508] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   29.690211] page dumped because: kasan: bad access detected
[   29.690615] 
[   29.690773] Memory state around the buggy address:
[   29.691075]  ffff888101abdb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.691597]  ffff888101abdc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.692342] >ffff888101abdc80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   29.693033]                                      ^
[   29.693616]  ffff888101abdd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.694113]  ffff888101abdd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.694673] ==================================================================
[   30.059847] ==================================================================
[   30.062933] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xd48/0x5450
[   30.063660] Write of size 4 at addr ffff888101abdcb0 by task kunit_try_catch/273
[   30.064084] 
[   30.064266] CPU: 0 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241122 #1
[   30.065240] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.065567] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   30.066031] Call Trace:
[   30.066242]  <TASK>
[   30.066520]  dump_stack_lvl+0x73/0xb0
[   30.066979]  print_report+0xd1/0x640
[   30.067412]  ? __virt_addr_valid+0x1db/0x2d0
[   30.067900]  ? kasan_complete_mode_report_info+0x2a/0x200
[   30.068522]  kasan_report+0x102/0x140
[   30.068924]  ? kasan_atomics_helper+0xd48/0x5450
[   30.069303]  ? kasan_atomics_helper+0xd48/0x5450
[   30.069850]  kasan_check_range+0x10c/0x1c0
[   30.070164]  __kasan_check_write+0x18/0x20
[   30.070444]  kasan_atomics_helper+0xd48/0x5450
[   30.070747]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   30.071253]  ? ret_from_fork_asm+0x1a/0x30
[   30.071867]  ? ret_from_fork+0x41/0x80
[   30.072344]  kasan_atomics+0x1dd/0x310
[   30.072802]  ? __pfx_kasan_atomics+0x10/0x10
[   30.073333]  ? __pfx_read_tsc+0x10/0x10
[   30.073800]  ? ktime_get_ts64+0x84/0x230
[   30.074294]  kunit_try_run_case+0x1b3/0x490
[   30.074670]  ? __pfx_kunit_try_run_case+0x10/0x10
[   30.075000]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   30.075315]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   30.075631]  ? __kthread_parkme+0x82/0x160
[   30.076096]  ? preempt_count_sub+0x50/0x80
[   30.076699]  ? __pfx_kunit_try_run_case+0x10/0x10
[   30.077272]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   30.078569]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   30.080100]  kthread+0x257/0x310
[   30.081018]  ? __pfx_kthread+0x10/0x10
[   30.082532]  ret_from_fork+0x41/0x80
[   30.083583]  ? __pfx_kthread+0x10/0x10
[   30.083979]  ret_from_fork_asm+0x1a/0x30
[   30.084872]  </TASK>
[   30.085094] 
[   30.085662] Allocated by task 273:
[   30.085967]  kasan_save_stack+0x3d/0x60
[   30.086588]  kasan_save_track+0x18/0x40
[   30.087488]  kasan_save_alloc_info+0x3b/0x50
[   30.087871]  __kasan_kmalloc+0xb7/0xc0
[   30.088144]  __kmalloc_cache_noprof+0x184/0x410
[   30.089104]  kasan_atomics+0x96/0x310
[   30.089436]  kunit_try_run_case+0x1b3/0x490
[   30.090029]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   30.090952]  kthread+0x257/0x310
[   30.091687]  ret_from_fork+0x41/0x80
[   30.092021]  ret_from_fork_asm+0x1a/0x30
[   30.092597] 
[   30.093202] The buggy address belongs to the object at ffff888101abdc80
[   30.093202]  which belongs to the cache kmalloc-64 of size 64
[   30.094234] The buggy address is located 0 bytes to the right of
[   30.094234]  allocated 48-byte region [ffff888101abdc80, ffff888101abdcb0)
[   30.095079] 
[   30.095258] The buggy address belongs to the physical page:
[   30.095527] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101abd
[   30.095773] flags: 0x200000000000000(node=0|zone=2)
[   30.096777] page_type: f5(slab)
[   30.097053] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   30.098044] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   30.098916] page dumped because: kasan: bad access detected
[   30.099501] 
[   30.099724] Memory state around the buggy address:
[   30.100062]  ffff888101abdb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   30.101278]  ffff888101abdc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   30.102168] >ffff888101abdc80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   30.102870]                                      ^
[   30.103606]  ffff888101abdd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.104321]  ffff888101abdd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.105182] ==================================================================
[   31.179072] ==================================================================
[   31.180560] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x19e4/0x5450
[   31.181615] Write of size 8 at addr ffff888101abdcb0 by task kunit_try_catch/273
[   31.182214] 
[   31.182873] CPU: 0 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241122 #1
[   31.184270] Tainted: [B]=BAD_PAGE, [N]=TEST
[   31.184648] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   31.185980] Call Trace:
[   31.186296]  <TASK>
[   31.186913]  dump_stack_lvl+0x73/0xb0
[   31.187206]  print_report+0xd1/0x640
[   31.187635]  ? __virt_addr_valid+0x1db/0x2d0
[   31.188277]  ? kasan_complete_mode_report_info+0x2a/0x200
[   31.189200]  kasan_report+0x102/0x140
[   31.189807]  ? kasan_atomics_helper+0x19e4/0x5450
[   31.190330]  ? kasan_atomics_helper+0x19e4/0x5450
[   31.191079]  kasan_check_range+0x10c/0x1c0
[   31.191522]  __kasan_check_write+0x18/0x20
[   31.192171]  kasan_atomics_helper+0x19e4/0x5450
[   31.192810]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   31.193441]  ? ret_from_fork_asm+0x1a/0x30
[   31.194037]  ? ret_from_fork+0x41/0x80
[   31.194562]  kasan_atomics+0x1dd/0x310
[   31.195037]  ? __pfx_kasan_atomics+0x10/0x10
[   31.195602]  ? __pfx_read_tsc+0x10/0x10
[   31.196120]  ? ktime_get_ts64+0x84/0x230
[   31.196736]  kunit_try_run_case+0x1b3/0x490
[   31.197069]  ? __pfx_kunit_try_run_case+0x10/0x10
[   31.197311]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   31.197890]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   31.198486]  ? __kthread_parkme+0x82/0x160
[   31.199116]  ? preempt_count_sub+0x50/0x80
[   31.199769]  ? __pfx_kunit_try_run_case+0x10/0x10
[   31.200361]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   31.201185]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   31.201843]  kthread+0x257/0x310
[   31.202310]  ? __pfx_kthread+0x10/0x10
[   31.202896]  ret_from_fork+0x41/0x80
[   31.203276]  ? __pfx_kthread+0x10/0x10
[   31.203577]  ret_from_fork_asm+0x1a/0x30
[   31.203776]  </TASK>
[   31.203960] 
[   31.204109] Allocated by task 273:
[   31.204560]  kasan_save_stack+0x3d/0x60
[   31.205006]  kasan_save_track+0x18/0x40
[   31.205401]  kasan_save_alloc_info+0x3b/0x50
[   31.205691]  __kasan_kmalloc+0xb7/0xc0
[   31.206190]  __kmalloc_cache_noprof+0x184/0x410
[   31.207282]  kasan_atomics+0x96/0x310
[   31.207720]  kunit_try_run_case+0x1b3/0x490
[   31.208069]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   31.208609]  kthread+0x257/0x310
[   31.209104]  ret_from_fork+0x41/0x80
[   31.209584]  ret_from_fork_asm+0x1a/0x30
[   31.209886] 
[   31.210212] The buggy address belongs to the object at ffff888101abdc80
[   31.210212]  which belongs to the cache kmalloc-64 of size 64
[   31.211741] The buggy address is located 0 bytes to the right of
[   31.211741]  allocated 48-byte region [ffff888101abdc80, ffff888101abdcb0)
[   31.212847] 
[   31.213186] The buggy address belongs to the physical page:
[   31.213536] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101abd
[   31.214293] flags: 0x200000000000000(node=0|zone=2)
[   31.215226] page_type: f5(slab)
[   31.215609] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   31.216537] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   31.217047] page dumped because: kasan: bad access detected
[   31.217350] 
[   31.217661] Memory state around the buggy address:
[   31.218455]  ffff888101abdb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   31.219360]  ffff888101abdc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   31.220314] >ffff888101abdc80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   31.220902]                                      ^
[   31.221411]  ffff888101abdd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.221955]  ffff888101abdd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.222415] ==================================================================
[   31.314867] ==================================================================
[   31.315524] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1c19/0x5450
[   31.316327] Write of size 8 at addr ffff888101abdcb0 by task kunit_try_catch/273
[   31.317107] 
[   31.317465] CPU: 0 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241122 #1
[   31.318471] Tainted: [B]=BAD_PAGE, [N]=TEST
[   31.318864] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   31.319517] Call Trace:
[   31.319853]  <TASK>
[   31.320192]  dump_stack_lvl+0x73/0xb0
[   31.320710]  print_report+0xd1/0x640
[   31.321015]  ? __virt_addr_valid+0x1db/0x2d0
[   31.321548]  ? kasan_complete_mode_report_info+0x2a/0x200
[   31.322200]  kasan_report+0x102/0x140
[   31.322701]  ? kasan_atomics_helper+0x1c19/0x5450
[   31.323521]  ? kasan_atomics_helper+0x1c19/0x5450
[   31.324102]  kasan_check_range+0x10c/0x1c0
[   31.324637]  __kasan_check_write+0x18/0x20
[   31.324956]  kasan_atomics_helper+0x1c19/0x5450
[   31.325536]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   31.325971]  ? ret_from_fork_asm+0x1a/0x30
[   31.326486]  ? ret_from_fork+0x41/0x80
[   31.326948]  kasan_atomics+0x1dd/0x310
[   31.327357]  ? __pfx_kasan_atomics+0x10/0x10
[   31.327710]  ? __pfx_read_tsc+0x10/0x10
[   31.328161]  ? ktime_get_ts64+0x84/0x230
[   31.328648]  kunit_try_run_case+0x1b3/0x490
[   31.329187]  ? __pfx_kunit_try_run_case+0x10/0x10
[   31.329666]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   31.330015]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   31.330533]  ? __kthread_parkme+0x82/0x160
[   31.331047]  ? preempt_count_sub+0x50/0x80
[   31.331480]  ? __pfx_kunit_try_run_case+0x10/0x10
[   31.332001]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   31.332409]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   31.333007]  kthread+0x257/0x310
[   31.333456]  ? __pfx_kthread+0x10/0x10
[   31.333947]  ret_from_fork+0x41/0x80
[   31.334412]  ? __pfx_kthread+0x10/0x10
[   31.334847]  ret_from_fork_asm+0x1a/0x30
[   31.335159]  </TASK>
[   31.335536] 
[   31.335762] Allocated by task 273:
[   31.336180]  kasan_save_stack+0x3d/0x60
[   31.336638]  kasan_save_track+0x18/0x40
[   31.337068]  kasan_save_alloc_info+0x3b/0x50
[   31.337504]  __kasan_kmalloc+0xb7/0xc0
[   31.337971]  __kmalloc_cache_noprof+0x184/0x410
[   31.338455]  kasan_atomics+0x96/0x310
[   31.338838]  kunit_try_run_case+0x1b3/0x490
[   31.339420]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   31.339859]  kthread+0x257/0x310
[   31.340292]  ret_from_fork+0x41/0x80
[   31.340607]  ret_from_fork_asm+0x1a/0x30
[   31.341055] 
[   31.341316] The buggy address belongs to the object at ffff888101abdc80
[   31.341316]  which belongs to the cache kmalloc-64 of size 64
[   31.342199] The buggy address is located 0 bytes to the right of
[   31.342199]  allocated 48-byte region [ffff888101abdc80, ffff888101abdcb0)
[   31.342977] 
[   31.343209] The buggy address belongs to the physical page:
[   31.343631] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101abd
[   31.344409] flags: 0x200000000000000(node=0|zone=2)
[   31.344850] page_type: f5(slab)
[   31.345185] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   31.345796] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   31.346372] page dumped because: kasan: bad access detected
[   31.346921] 
[   31.347081] Memory state around the buggy address:
[   31.347406]  ffff888101abdb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   31.347777]  ffff888101abdc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   31.348515] >ffff888101abdc80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   31.349222]                                      ^
[   31.349746]  ffff888101abdd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.350312]  ffff888101abdd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.350873] ==================================================================
[   30.236188] ==================================================================
[   30.236699] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xfaa/0x5450
[   30.237362] Write of size 4 at addr ffff888101abdcb0 by task kunit_try_catch/273
[   30.238045] 
[   30.238337] CPU: 0 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241122 #1
[   30.238959] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.239376] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   30.240163] Call Trace:
[   30.240520]  <TASK>
[   30.240856]  dump_stack_lvl+0x73/0xb0
[   30.241357]  print_report+0xd1/0x640
[   30.241675]  ? __virt_addr_valid+0x1db/0x2d0
[   30.242211]  ? kasan_complete_mode_report_info+0x2a/0x200
[   30.242697]  kasan_report+0x102/0x140
[   30.243001]  ? kasan_atomics_helper+0xfaa/0x5450
[   30.243368]  ? kasan_atomics_helper+0xfaa/0x5450
[   30.243693]  kasan_check_range+0x10c/0x1c0
[   30.244131]  __kasan_check_write+0x18/0x20
[   30.244684]  kasan_atomics_helper+0xfaa/0x5450
[   30.245275]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   30.245785]  ? ret_from_fork_asm+0x1a/0x30
[   30.246272]  ? ret_from_fork+0x41/0x80
[   30.246718]  kasan_atomics+0x1dd/0x310
[   30.247303]  ? __pfx_kasan_atomics+0x10/0x10
[   30.247833]  ? __pfx_read_tsc+0x10/0x10
[   30.248330]  ? ktime_get_ts64+0x84/0x230
[   30.248773]  kunit_try_run_case+0x1b3/0x490
[   30.249192]  ? __pfx_kunit_try_run_case+0x10/0x10
[   30.249756]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   30.250215]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   30.250594]  ? __kthread_parkme+0x82/0x160
[   30.250906]  ? preempt_count_sub+0x50/0x80
[   30.251466]  ? __pfx_kunit_try_run_case+0x10/0x10
[   30.252044]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   30.252715]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   30.253342]  kthread+0x257/0x310
[   30.253665]  ? __pfx_kthread+0x10/0x10
[   30.253982]  ret_from_fork+0x41/0x80
[   30.254293]  ? __pfx_kthread+0x10/0x10
[   30.254574]  ret_from_fork_asm+0x1a/0x30
[   30.254894]  </TASK>
[   30.255216] 
[   30.255511] Allocated by task 273:
[   30.255960]  kasan_save_stack+0x3d/0x60
[   30.256517]  kasan_save_track+0x18/0x40
[   30.256951]  kasan_save_alloc_info+0x3b/0x50
[   30.257487]  __kasan_kmalloc+0xb7/0xc0
[   30.257937]  __kmalloc_cache_noprof+0x184/0x410
[   30.258489]  kasan_atomics+0x96/0x310
[   30.258931]  kunit_try_run_case+0x1b3/0x490
[   30.259973]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   30.261049]  kthread+0x257/0x310
[   30.261409]  ret_from_fork+0x41/0x80
[   30.261674]  ret_from_fork_asm+0x1a/0x30
[   30.262979] 
[   30.263452] The buggy address belongs to the object at ffff888101abdc80
[   30.263452]  which belongs to the cache kmalloc-64 of size 64
[   30.264301] The buggy address is located 0 bytes to the right of
[   30.264301]  allocated 48-byte region [ffff888101abdc80, ffff888101abdcb0)
[   30.264910] 
[   30.265134] The buggy address belongs to the physical page:
[   30.265628] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101abd
[   30.266411] flags: 0x200000000000000(node=0|zone=2)
[   30.266912] page_type: f5(slab)
[   30.267293] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   30.267807] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   30.268384] page dumped because: kasan: bad access detected
[   30.268890] 
[   30.269114] Memory state around the buggy address:
[   30.269555]  ffff888101abdb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   30.270160]  ffff888101abdc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   30.270706] >ffff888101abdc80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   30.271457]                                      ^
[   30.271747]  ffff888101abdd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.272445]  ffff888101abdd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.273960] ==================================================================
[   30.438335] ==================================================================
[   30.439142] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a04/0x5450
[   30.439888] Read of size 4 at addr ffff888101abdcb0 by task kunit_try_catch/273
[   30.440537] 
[   30.440720] CPU: 0 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241122 #1
[   30.441289] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.441708] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   30.442561] Call Trace:
[   30.442864]  <TASK>
[   30.443063]  dump_stack_lvl+0x73/0xb0
[   30.443627]  print_report+0xd1/0x640
[   30.444043]  ? __virt_addr_valid+0x1db/0x2d0
[   30.445322]  ? kasan_complete_mode_report_info+0x2a/0x200
[   30.445680]  kasan_report+0x102/0x140
[   30.446591]  ? kasan_atomics_helper+0x4a04/0x5450
[   30.447097]  ? kasan_atomics_helper+0x4a04/0x5450
[   30.447609]  __asan_report_load4_noabort+0x18/0x20
[   30.450045]  kasan_atomics_helper+0x4a04/0x5450
[   30.450401]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   30.450926]  ? ret_from_fork_asm+0x1a/0x30
[   30.451273]  ? ret_from_fork+0x41/0x80
[   30.451713]  kasan_atomics+0x1dd/0x310
[   30.452528]  ? __pfx_kasan_atomics+0x10/0x10
[   30.453294]  ? __pfx_read_tsc+0x10/0x10
[   30.453657]  ? ktime_get_ts64+0x84/0x230
[   30.454058]  kunit_try_run_case+0x1b3/0x490
[   30.454476]  ? __pfx_kunit_try_run_case+0x10/0x10
[   30.454944]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   30.455284]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   30.455804]  ? __kthread_parkme+0x82/0x160
[   30.456258]  ? preempt_count_sub+0x50/0x80
[   30.456697]  ? __pfx_kunit_try_run_case+0x10/0x10
[   30.457198]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   30.457703]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   30.458550]  kthread+0x257/0x310
[   30.458993]  ? __pfx_kthread+0x10/0x10
[   30.459426]  ret_from_fork+0x41/0x80
[   30.459759]  ? __pfx_kthread+0x10/0x10
[   30.460225]  ret_from_fork_asm+0x1a/0x30
[   30.460650]  </TASK>
[   30.460860] 
[   30.461078] Allocated by task 273:
[   30.461485]  kasan_save_stack+0x3d/0x60
[   30.461926]  kasan_save_track+0x18/0x40
[   30.462309]  kasan_save_alloc_info+0x3b/0x50
[   30.462601]  __kasan_kmalloc+0xb7/0xc0
[   30.462959]  __kmalloc_cache_noprof+0x184/0x410
[   30.463458]  kasan_atomics+0x96/0x310
[   30.463891]  kunit_try_run_case+0x1b3/0x490
[   30.464374]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   30.464897]  kthread+0x257/0x310
[   30.465138]  ret_from_fork+0x41/0x80
[   30.465584]  ret_from_fork_asm+0x1a/0x30
[   30.466038] 
[   30.466296] The buggy address belongs to the object at ffff888101abdc80
[   30.466296]  which belongs to the cache kmalloc-64 of size 64
[   30.466911] The buggy address is located 0 bytes to the right of
[   30.466911]  allocated 48-byte region [ffff888101abdc80, ffff888101abdcb0)
[   30.467537] 
[   30.467771] The buggy address belongs to the physical page:
[   30.468325] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101abd
[   30.469103] flags: 0x200000000000000(node=0|zone=2)
[   30.469639] page_type: f5(slab)
[   30.470029] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   30.470732] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   30.471320] page dumped because: kasan: bad access detected
[   30.471772] 
[   30.472008] Memory state around the buggy address:
[   30.472398]  ffff888101abdb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   30.472763]  ffff888101abdc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   30.473462] >ffff888101abdc80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   30.474107]                                      ^
[   30.474617]  ffff888101abdd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.475060]  ffff888101abdd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.475639] ==================================================================
[   30.361197] ==================================================================
[   30.361652] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a1e/0x5450
[   30.362093] Read of size 4 at addr ffff888101abdcb0 by task kunit_try_catch/273
[   30.362599] 
[   30.362931] CPU: 0 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241122 #1
[   30.363743] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.364344] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   30.365049] Call Trace:
[   30.365261]  <TASK>
[   30.365458]  dump_stack_lvl+0x73/0xb0
[   30.365755]  print_report+0xd1/0x640
[   30.366203]  ? __virt_addr_valid+0x1db/0x2d0
[   30.366668]  ? kasan_complete_mode_report_info+0x2a/0x200
[   30.367402]  kasan_report+0x102/0x140
[   30.367788]  ? kasan_atomics_helper+0x4a1e/0x5450
[   30.368302]  ? kasan_atomics_helper+0x4a1e/0x5450
[   30.368696]  __asan_report_load4_noabort+0x18/0x20
[   30.369197]  kasan_atomics_helper+0x4a1e/0x5450
[   30.369687]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   30.370077]  ? ret_from_fork_asm+0x1a/0x30
[   30.370588]  ? ret_from_fork+0x41/0x80
[   30.370967]  kasan_atomics+0x1dd/0x310
[   30.371302]  ? __pfx_kasan_atomics+0x10/0x10
[   30.371678]  ? __pfx_read_tsc+0x10/0x10
[   30.371974]  ? ktime_get_ts64+0x84/0x230
[   30.372261]  kunit_try_run_case+0x1b3/0x490
[   30.372724]  ? __pfx_kunit_try_run_case+0x10/0x10
[   30.373391]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   30.373961]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   30.374587]  ? __kthread_parkme+0x82/0x160
[   30.374982]  ? preempt_count_sub+0x50/0x80
[   30.375276]  ? __pfx_kunit_try_run_case+0x10/0x10
[   30.375965]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   30.376709]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   30.377086]  kthread+0x257/0x310
[   30.377348]  ? __pfx_kthread+0x10/0x10
[   30.377617]  ret_from_fork+0x41/0x80
[   30.378011]  ? __pfx_kthread+0x10/0x10
[   30.378463]  ret_from_fork_asm+0x1a/0x30
[   30.379005]  </TASK>
[   30.379364] 
[   30.379587] Allocated by task 273:
[   30.379964]  kasan_save_stack+0x3d/0x60
[   30.380401]  kasan_save_track+0x18/0x40
[   30.380745]  kasan_save_alloc_info+0x3b/0x50
[   30.381060]  __kasan_kmalloc+0xb7/0xc0
[   30.381433]  __kmalloc_cache_noprof+0x184/0x410
[   30.381964]  kasan_atomics+0x96/0x310
[   30.382398]  kunit_try_run_case+0x1b3/0x490
[   30.382859]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   30.383382]  kthread+0x257/0x310
[   30.383675]  ret_from_fork+0x41/0x80
[   30.384092]  ret_from_fork_asm+0x1a/0x30
[   30.384476] 
[   30.384700] The buggy address belongs to the object at ffff888101abdc80
[   30.384700]  which belongs to the cache kmalloc-64 of size 64
[   30.385515] The buggy address is located 0 bytes to the right of
[   30.385515]  allocated 48-byte region [ffff888101abdc80, ffff888101abdcb0)
[   30.386810] 
[   30.387009] The buggy address belongs to the physical page:
[   30.387308] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101abd
[   30.387710] flags: 0x200000000000000(node=0|zone=2)
[   30.388210] page_type: f5(slab)
[   30.388575] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   30.389614] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   30.390324] page dumped because: kasan: bad access detected
[   30.390814] 
[   30.391056] Memory state around the buggy address:
[   30.391534]  ffff888101abdb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   30.391956]  ffff888101abdc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   30.392384] >ffff888101abdc80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   30.393047]                                      ^
[   30.393664]  ffff888101abdd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.394324]  ffff888101abdd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.394694] ==================================================================
[   31.269891] ==================================================================
[   31.270862] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1b23/0x5450
[   31.271320] Write of size 8 at addr ffff888101abdcb0 by task kunit_try_catch/273
[   31.272163] 
[   31.272398] CPU: 0 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241122 #1
[   31.273191] Tainted: [B]=BAD_PAGE, [N]=TEST
[   31.274213] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   31.274993] Call Trace:
[   31.275922]  <TASK>
[   31.276259]  dump_stack_lvl+0x73/0xb0
[   31.276769]  print_report+0xd1/0x640
[   31.276986]  ? __virt_addr_valid+0x1db/0x2d0
[   31.277161]  ? kasan_complete_mode_report_info+0x2a/0x200
[   31.277986]  kasan_report+0x102/0x140
[   31.278360]  ? kasan_atomics_helper+0x1b23/0x5450
[   31.278736]  ? kasan_atomics_helper+0x1b23/0x5450
[   31.279394]  kasan_check_range+0x10c/0x1c0
[   31.279723]  __kasan_check_write+0x18/0x20
[   31.280130]  kasan_atomics_helper+0x1b23/0x5450
[   31.281252]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   31.281758]  ? ret_from_fork_asm+0x1a/0x30
[   31.282559]  ? ret_from_fork+0x41/0x80
[   31.283294]  kasan_atomics+0x1dd/0x310
[   31.283648]  ? __pfx_kasan_atomics+0x10/0x10
[   31.284280]  ? __pfx_read_tsc+0x10/0x10
[   31.284914]  ? ktime_get_ts64+0x84/0x230
[   31.285521]  kunit_try_run_case+0x1b3/0x490
[   31.286197]  ? __pfx_kunit_try_run_case+0x10/0x10
[   31.286849]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   31.287557]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   31.288289]  ? __kthread_parkme+0x82/0x160
[   31.288985]  ? preempt_count_sub+0x50/0x80
[   31.289637]  ? __pfx_kunit_try_run_case+0x10/0x10
[   31.290252]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   31.291156]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   31.291553]  kthread+0x257/0x310
[   31.292382]  ? __pfx_kthread+0x10/0x10
[   31.292783]  ret_from_fork+0x41/0x80
[   31.293492]  ? __pfx_kthread+0x10/0x10
[   31.293891]  ret_from_fork_asm+0x1a/0x30
[   31.294333]  </TASK>
[   31.294525] 
[   31.294739] Allocated by task 273:
[   31.295152]  kasan_save_stack+0x3d/0x60
[   31.295651]  kasan_save_track+0x18/0x40
[   31.296057]  kasan_save_alloc_info+0x3b/0x50
[   31.296442]  __kasan_kmalloc+0xb7/0xc0
[   31.296969]  __kmalloc_cache_noprof+0x184/0x410
[   31.297321]  kasan_atomics+0x96/0x310
[   31.297729]  kunit_try_run_case+0x1b3/0x490
[   31.298196]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   31.298521]  kthread+0x257/0x310
[   31.298767]  ret_from_fork+0x41/0x80
[   31.299230]  ret_from_fork_asm+0x1a/0x30
[   31.299652] 
[   31.299939] The buggy address belongs to the object at ffff888101abdc80
[   31.299939]  which belongs to the cache kmalloc-64 of size 64
[   31.301325] The buggy address is located 0 bytes to the right of
[   31.301325]  allocated 48-byte region [ffff888101abdc80, ffff888101abdcb0)
[   31.301947] 
[   31.302101] The buggy address belongs to the physical page:
[   31.302505] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101abd
[   31.303322] flags: 0x200000000000000(node=0|zone=2)
[   31.303837] page_type: f5(slab)
[   31.304385] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   31.304984] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   31.305643] page dumped because: kasan: bad access detected
[   31.306123] 
[   31.306312] Memory state around the buggy address:
[   31.306655]  ffff888101abdb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   31.308044]  ffff888101abdc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   31.309991] >ffff888101abdc80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   31.310760]                                      ^
[   31.311416]  ffff888101abdd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.312288]  ffff888101abdd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.312982] ==================================================================
[   31.088177] ==================================================================
[   31.088577] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x18b2/0x5450
[   31.089091] Write of size 8 at addr ffff888101abdcb0 by task kunit_try_catch/273
[   31.089881] 
[   31.090201] CPU: 0 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241122 #1
[   31.090698] Tainted: [B]=BAD_PAGE, [N]=TEST
[   31.091859] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   31.092781] Call Trace:
[   31.093307]  <TASK>
[   31.093721]  dump_stack_lvl+0x73/0xb0
[   31.094314]  print_report+0xd1/0x640
[   31.094740]  ? __virt_addr_valid+0x1db/0x2d0
[   31.095159]  ? kasan_complete_mode_report_info+0x2a/0x200
[   31.096037]  kasan_report+0x102/0x140
[   31.096622]  ? kasan_atomics_helper+0x18b2/0x5450
[   31.097525]  ? kasan_atomics_helper+0x18b2/0x5450
[   31.097990]  kasan_check_range+0x10c/0x1c0
[   31.098664]  __kasan_check_write+0x18/0x20
[   31.099031]  kasan_atomics_helper+0x18b2/0x5450
[   31.099556]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   31.100060]  ? ret_from_fork_asm+0x1a/0x30
[   31.101106]  ? ret_from_fork+0x41/0x80
[   31.101493]  kasan_atomics+0x1dd/0x310
[   31.102290]  ? __pfx_kasan_atomics+0x10/0x10
[   31.102700]  ? __pfx_read_tsc+0x10/0x10
[   31.103287]  ? ktime_get_ts64+0x84/0x230
[   31.103655]  kunit_try_run_case+0x1b3/0x490
[   31.104074]  ? __pfx_kunit_try_run_case+0x10/0x10
[   31.104917]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   31.105325]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   31.106087]  ? __kthread_parkme+0x82/0x160
[   31.106691]  ? preempt_count_sub+0x50/0x80
[   31.107300]  ? __pfx_kunit_try_run_case+0x10/0x10
[   31.107750]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   31.108258]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   31.109208]  kthread+0x257/0x310
[   31.109561]  ? __pfx_kthread+0x10/0x10
[   31.110328]  ret_from_fork+0x41/0x80
[   31.110724]  ? __pfx_kthread+0x10/0x10
[   31.111106]  ret_from_fork_asm+0x1a/0x30
[   31.111582]  </TASK>
[   31.111852] 
[   31.112015] Allocated by task 273:
[   31.113217]  kasan_save_stack+0x3d/0x60
[   31.113600]  kasan_save_track+0x18/0x40
[   31.114357]  kasan_save_alloc_info+0x3b/0x50
[   31.114795]  __kasan_kmalloc+0xb7/0xc0
[   31.115180]  __kmalloc_cache_noprof+0x184/0x410
[   31.116004]  kasan_atomics+0x96/0x310
[   31.116478]  kunit_try_run_case+0x1b3/0x490
[   31.116864]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   31.117291]  kthread+0x257/0x310
[   31.118271]  ret_from_fork+0x41/0x80
[   31.118609]  ret_from_fork_asm+0x1a/0x30
[   31.119195] 
[   31.119682] The buggy address belongs to the object at ffff888101abdc80
[   31.119682]  which belongs to the cache kmalloc-64 of size 64
[   31.120886] The buggy address is located 0 bytes to the right of
[   31.120886]  allocated 48-byte region [ffff888101abdc80, ffff888101abdcb0)
[   31.122392] 
[   31.122695] The buggy address belongs to the physical page:
[   31.123469] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101abd
[   31.124068] flags: 0x200000000000000(node=0|zone=2)
[   31.124538] page_type: f5(slab)
[   31.124870] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   31.125467] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   31.126027] page dumped because: kasan: bad access detected
[   31.126506] 
[   31.126699] Memory state around the buggy address:
[   31.128037]  ffff888101abdb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   31.128642]  ffff888101abdc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   31.129731] >ffff888101abdc80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   31.130522]                                      ^
[   31.131149]  ffff888101abdd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.131898]  ffff888101abdd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.132632] ==================================================================
[   29.943767] ==================================================================
[   29.944334] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xb6b/0x5450
[   29.944802] Write of size 4 at addr ffff888101abdcb0 by task kunit_try_catch/273
[   29.945203] 
[   29.945508] CPU: 0 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241122 #1
[   29.946489] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.947067] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   29.948027] Call Trace:
[   29.948244]  <TASK>
[   29.948443]  dump_stack_lvl+0x73/0xb0
[   29.948750]  print_report+0xd1/0x640
[   29.949159]  ? __virt_addr_valid+0x1db/0x2d0
[   29.949638]  ? kasan_complete_mode_report_info+0x2a/0x200
[   29.950290]  kasan_report+0x102/0x140
[   29.950582]  ? kasan_atomics_helper+0xb6b/0x5450
[   29.950908]  ? kasan_atomics_helper+0xb6b/0x5450
[   29.951223]  kasan_check_range+0x10c/0x1c0
[   29.951520]  __kasan_check_write+0x18/0x20
[   29.951807]  kasan_atomics_helper+0xb6b/0x5450
[   29.952349]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   29.952878]  ? ret_from_fork_asm+0x1a/0x30
[   29.953457]  ? ret_from_fork+0x41/0x80
[   29.953940]  kasan_atomics+0x1dd/0x310
[   29.954377]  ? __pfx_kasan_atomics+0x10/0x10
[   29.954862]  ? __pfx_read_tsc+0x10/0x10
[   29.955323]  ? ktime_get_ts64+0x84/0x230
[   29.955790]  kunit_try_run_case+0x1b3/0x490
[   29.956297]  ? __pfx_kunit_try_run_case+0x10/0x10
[   29.956806]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   29.957244]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   29.957761]  ? __kthread_parkme+0x82/0x160
[   29.958147]  ? preempt_count_sub+0x50/0x80
[   29.958713]  ? __pfx_kunit_try_run_case+0x10/0x10
[   29.959128]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   29.959899]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   29.960238]  kthread+0x257/0x310
[   29.960665]  ? __pfx_kthread+0x10/0x10
[   29.961108]  ret_from_fork+0x41/0x80
[   29.961496]  ? __pfx_kthread+0x10/0x10
[   29.962025]  ret_from_fork_asm+0x1a/0x30
[   29.962470]  </TASK>
[   29.962662] 
[   29.962815] Allocated by task 273:
[   29.963072]  kasan_save_stack+0x3d/0x60
[   29.963343]  kasan_save_track+0x18/0x40
[   29.963605]  kasan_save_alloc_info+0x3b/0x50
[   29.963941]  __kasan_kmalloc+0xb7/0xc0
[   29.964364]  __kmalloc_cache_noprof+0x184/0x410
[   29.964850]  kasan_atomics+0x96/0x310
[   29.965260]  kunit_try_run_case+0x1b3/0x490
[   29.965785]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   29.966342]  kthread+0x257/0x310
[   29.966717]  ret_from_fork+0x41/0x80
[   29.967106]  ret_from_fork_asm+0x1a/0x30
[   29.967669] 
[   29.967896] The buggy address belongs to the object at ffff888101abdc80
[   29.967896]  which belongs to the cache kmalloc-64 of size 64
[   29.968758] The buggy address is located 0 bytes to the right of
[   29.968758]  allocated 48-byte region [ffff888101abdc80, ffff888101abdcb0)
[   29.969938] 
[   29.970108] The buggy address belongs to the physical page:
[   29.970603] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101abd
[   29.971211] flags: 0x200000000000000(node=0|zone=2)
[   29.971693] page_type: f5(slab)
[   29.972089] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   29.972984] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   29.973563] page dumped because: kasan: bad access detected
[   29.974099] 
[   29.974308] Memory state around the buggy address:
[   29.974597]  ffff888101abdb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.974991]  ffff888101abdc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.975357] >ffff888101abdc80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   29.975712]                                      ^
[   29.976159]  ffff888101abdd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.976790]  ffff888101abdd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.977671] ==================================================================
[   30.942806] ==================================================================
[   30.943645] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x16e8/0x5450
[   30.944290] Write of size 8 at addr ffff888101abdcb0 by task kunit_try_catch/273
[   30.946234] 
[   30.946507] CPU: 0 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241122 #1
[   30.947579] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.947979] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   30.949050] Call Trace:
[   30.949682]  <TASK>
[   30.949873]  dump_stack_lvl+0x73/0xb0
[   30.950343]  print_report+0xd1/0x640
[   30.951210]  ? __virt_addr_valid+0x1db/0x2d0
[   30.951668]  ? kasan_complete_mode_report_info+0x2a/0x200
[   30.952580]  kasan_report+0x102/0x140
[   30.952964]  ? kasan_atomics_helper+0x16e8/0x5450
[   30.953632]  ? kasan_atomics_helper+0x16e8/0x5450
[   30.953977]  kasan_check_range+0x10c/0x1c0
[   30.954784]  __kasan_check_write+0x18/0x20
[   30.955414]  kasan_atomics_helper+0x16e8/0x5450
[   30.955874]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   30.956336]  ? ret_from_fork_asm+0x1a/0x30
[   30.956732]  ? ret_from_fork+0x41/0x80
[   30.957605]  kasan_atomics+0x1dd/0x310
[   30.958031]  ? __pfx_kasan_atomics+0x10/0x10
[   30.958764]  ? __pfx_read_tsc+0x10/0x10
[   30.959187]  ? ktime_get_ts64+0x84/0x230
[   30.959928]  kunit_try_run_case+0x1b3/0x490
[   30.960570]  ? __pfx_kunit_try_run_case+0x10/0x10
[   30.961081]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   30.961861]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   30.962586]  ? __kthread_parkme+0x82/0x160
[   30.962979]  ? preempt_count_sub+0x50/0x80
[   30.963732]  ? __pfx_kunit_try_run_case+0x10/0x10
[   30.964198]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   30.965090]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   30.965762]  kthread+0x257/0x310
[   30.966215]  ? __pfx_kthread+0x10/0x10
[   30.966605]  ret_from_fork+0x41/0x80
[   30.967376]  ? __pfx_kthread+0x10/0x10
[   30.967805]  ret_from_fork_asm+0x1a/0x30
[   30.968563]  </TASK>
[   30.968792] 
[   30.969069] Allocated by task 273:
[   30.969865]  kasan_save_stack+0x3d/0x60
[   30.970266]  kasan_save_track+0x18/0x40
[   30.970893]  kasan_save_alloc_info+0x3b/0x50
[   30.971674]  __kasan_kmalloc+0xb7/0xc0
[   30.972101]  __kmalloc_cache_noprof+0x184/0x410
[   30.972833]  kasan_atomics+0x96/0x310
[   30.973224]  kunit_try_run_case+0x1b3/0x490
[   30.973773]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   30.974164]  kthread+0x257/0x310
[   30.974574]  ret_from_fork+0x41/0x80
[   30.974964]  ret_from_fork_asm+0x1a/0x30
[   30.975330] 
[   30.975547] The buggy address belongs to the object at ffff888101abdc80
[   30.975547]  which belongs to the cache kmalloc-64 of size 64
[   30.977201] The buggy address is located 0 bytes to the right of
[   30.977201]  allocated 48-byte region [ffff888101abdc80, ffff888101abdcb0)
[   30.978704] 
[   30.979362] The buggy address belongs to the physical page:
[   30.979675] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101abd
[   30.981003] flags: 0x200000000000000(node=0|zone=2)
[   30.981386] page_type: f5(slab)
[   30.981773] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   30.982812] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   30.983352] page dumped because: kasan: bad access detected
[   30.984191] 
[   30.984364] Memory state around the buggy address:
[   30.985104]  ffff888101abdb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   30.986133]  ffff888101abdc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   30.986886] >ffff888101abdc80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   30.987875]                                      ^
[   30.988588]  ffff888101abdd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.989282]  ffff888101abdd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.990136] ==================================================================
[   31.352169] ==================================================================
[   31.352928] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4f32/0x5450
[   31.353923] Read of size 8 at addr ffff888101abdcb0 by task kunit_try_catch/273
[   31.354589] 
[   31.354885] CPU: 0 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241122 #1
[   31.355675] Tainted: [B]=BAD_PAGE, [N]=TEST
[   31.355920] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   31.356644] Call Trace:
[   31.357013]  <TASK>
[   31.357346]  dump_stack_lvl+0x73/0xb0
[   31.357872]  print_report+0xd1/0x640
[   31.358364]  ? __virt_addr_valid+0x1db/0x2d0
[   31.359020]  ? kasan_complete_mode_report_info+0x2a/0x200
[   31.359419]  kasan_report+0x102/0x140
[   31.359691]  ? kasan_atomics_helper+0x4f32/0x5450
[   31.360181]  ? kasan_atomics_helper+0x4f32/0x5450
[   31.360740]  __asan_report_load8_noabort+0x18/0x20
[   31.361285]  kasan_atomics_helper+0x4f32/0x5450
[   31.361752]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   31.362297]  ? ret_from_fork_asm+0x1a/0x30
[   31.362595]  ? ret_from_fork+0x41/0x80
[   31.362920]  kasan_atomics+0x1dd/0x310
[   31.363396]  ? __pfx_kasan_atomics+0x10/0x10
[   31.363944]  ? __pfx_read_tsc+0x10/0x10
[   31.364464]  ? ktime_get_ts64+0x84/0x230
[   31.364927]  kunit_try_run_case+0x1b3/0x490
[   31.365495]  ? __pfx_kunit_try_run_case+0x10/0x10
[   31.365880]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   31.366212]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   31.366586]  ? __kthread_parkme+0x82/0x160
[   31.366902]  ? preempt_count_sub+0x50/0x80
[   31.367423]  ? __pfx_kunit_try_run_case+0x10/0x10
[   31.367961]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   31.368592]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   31.369195]  kthread+0x257/0x310
[   31.369628]  ? __pfx_kthread+0x10/0x10
[   31.370140]  ret_from_fork+0x41/0x80
[   31.370594]  ? __pfx_kthread+0x10/0x10
[   31.371051]  ret_from_fork_asm+0x1a/0x30
[   31.371479]  </TASK>
[   31.371673] 
[   31.371842] Allocated by task 273:
[   31.372206]  kasan_save_stack+0x3d/0x60
[   31.372721]  kasan_save_track+0x18/0x40
[   31.373186]  kasan_save_alloc_info+0x3b/0x50
[   31.373693]  __kasan_kmalloc+0xb7/0xc0
[   31.374436]  __kmalloc_cache_noprof+0x184/0x410
[   31.375251]  kasan_atomics+0x96/0x310
[   31.375603]  kunit_try_run_case+0x1b3/0x490
[   31.376067]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   31.376508]  kthread+0x257/0x310
[   31.379030]  ret_from_fork+0x41/0x80
[   31.380130]  ret_from_fork_asm+0x1a/0x30
[   31.381140] 
[   31.381757] The buggy address belongs to the object at ffff888101abdc80
[   31.381757]  which belongs to the cache kmalloc-64 of size 64
[   31.383677] The buggy address is located 0 bytes to the right of
[   31.383677]  allocated 48-byte region [ffff888101abdc80, ffff888101abdcb0)
[   31.384402] 
[   31.384632] The buggy address belongs to the physical page:
[   31.385107] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101abd
[   31.386494] flags: 0x200000000000000(node=0|zone=2)
[   31.386905] page_type: f5(slab)
[   31.387262] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   31.388177] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   31.388903] page dumped because: kasan: bad access detected
[   31.389560] 
[   31.389785] Memory state around the buggy address:
[   31.390631]  ffff888101abdb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   31.391240]  ffff888101abdc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   31.391929] >ffff888101abdc80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   31.392527]                                      ^
[   31.393444]  ffff888101abdd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.393854]  ffff888101abdd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.394810] ==================================================================
[   29.407563] ==================================================================
[   29.407975] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b56/0x5450
[   29.408579] Read of size 4 at addr ffff888101abdcb0 by task kunit_try_catch/273
[   29.409371] 
[   29.409669] CPU: 0 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241122 #1
[   29.410792] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.411172] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   29.412120] Call Trace:
[   29.412637]  <TASK>
[   29.413331]  dump_stack_lvl+0x73/0xb0
[   29.413984]  print_report+0xd1/0x640
[   29.414512]  ? __virt_addr_valid+0x1db/0x2d0
[   29.415166]  ? kasan_complete_mode_report_info+0x2a/0x200
[   29.415893]  kasan_report+0x102/0x140
[   29.416451]  ? kasan_atomics_helper+0x4b56/0x5450
[   29.417156]  ? kasan_atomics_helper+0x4b56/0x5450
[   29.417898]  __asan_report_load4_noabort+0x18/0x20
[   29.418662]  kasan_atomics_helper+0x4b56/0x5450
[   29.419011]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   29.419733]  ? ret_from_fork_asm+0x1a/0x30
[   29.420296]  ? ret_from_fork+0x41/0x80
[   29.420857]  kasan_atomics+0x1dd/0x310
[   29.421401]  ? __pfx_kasan_atomics+0x10/0x10
[   29.421962]  ? __pfx_read_tsc+0x10/0x10
[   29.422466]  ? ktime_get_ts64+0x84/0x230
[   29.423095]  kunit_try_run_case+0x1b3/0x490
[   29.423572]  ? __pfx_kunit_try_run_case+0x10/0x10
[   29.424015]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   29.424344]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   29.424791]  ? __kthread_parkme+0x82/0x160
[   29.425248]  ? preempt_count_sub+0x50/0x80
[   29.425566]  ? __pfx_kunit_try_run_case+0x10/0x10
[   29.426099]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   29.426801]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   29.427253]  kthread+0x257/0x310
[   29.427689]  ? __pfx_kthread+0x10/0x10
[   29.428123]  ret_from_fork+0x41/0x80
[   29.428693]  ? __pfx_kthread+0x10/0x10
[   29.429001]  ret_from_fork_asm+0x1a/0x30
[   29.429514]  </TASK>
[   29.429855] 
[   29.430107] Allocated by task 273:
[   29.430337]  kasan_save_stack+0x3d/0x60
[   29.430817]  kasan_save_track+0x18/0x40
[   29.431441]  kasan_save_alloc_info+0x3b/0x50
[   29.431797]  __kasan_kmalloc+0xb7/0xc0
[   29.432086]  __kmalloc_cache_noprof+0x184/0x410
[   29.432442]  kasan_atomics+0x96/0x310
[   29.432884]  kunit_try_run_case+0x1b3/0x490
[   29.433463]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   29.434015]  kthread+0x257/0x310
[   29.434416]  ret_from_fork+0x41/0x80
[   29.434866]  ret_from_fork_asm+0x1a/0x30
[   29.435317] 
[   29.435502] The buggy address belongs to the object at ffff888101abdc80
[   29.435502]  which belongs to the cache kmalloc-64 of size 64
[   29.436080] The buggy address is located 0 bytes to the right of
[   29.436080]  allocated 48-byte region [ffff888101abdc80, ffff888101abdcb0)
[   29.436842] 
[   29.437071] The buggy address belongs to the physical page:
[   29.437749] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101abd
[   29.438577] flags: 0x200000000000000(node=0|zone=2)
[   29.438912] page_type: f5(slab)
[   29.439154] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   29.439938] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   29.440792] page dumped because: kasan: bad access detected
[   29.441242] 
[   29.441461] Memory state around the buggy address:
[   29.441789]  ffff888101abdb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.442379]  ffff888101abdc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.442850] >ffff888101abdc80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   29.443407]                                      ^
[   29.443908]  ffff888101abdd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.444643]  ffff888101abdd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.445050] ==================================================================
[   30.321578] ==================================================================
[   30.322309] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x107a/0x5450
[   30.323540] Write of size 4 at addr ffff888101abdcb0 by task kunit_try_catch/273
[   30.324004] 
[   30.324290] CPU: 0 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241122 #1
[   30.325639] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.326262] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   30.326937] Call Trace:
[   30.327174]  <TASK>
[   30.328331]  dump_stack_lvl+0x73/0xb0
[   30.328697]  print_report+0xd1/0x640
[   30.329275]  ? __virt_addr_valid+0x1db/0x2d0
[   30.329705]  ? kasan_complete_mode_report_info+0x2a/0x200
[   30.330483]  kasan_report+0x102/0x140
[   30.330872]  ? kasan_atomics_helper+0x107a/0x5450
[   30.331290]  ? kasan_atomics_helper+0x107a/0x5450
[   30.331698]  kasan_check_range+0x10c/0x1c0
[   30.332635]  __kasan_check_write+0x18/0x20
[   30.333180]  kasan_atomics_helper+0x107a/0x5450
[   30.333930]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   30.334314]  ? ret_from_fork_asm+0x1a/0x30
[   30.335008]  ? ret_from_fork+0x41/0x80
[   30.335654]  kasan_atomics+0x1dd/0x310
[   30.336260]  ? __pfx_kasan_atomics+0x10/0x10
[   30.336698]  ? __pfx_read_tsc+0x10/0x10
[   30.337077]  ? ktime_get_ts64+0x84/0x230
[   30.337482]  kunit_try_run_case+0x1b3/0x490
[   30.338467]  ? __pfx_kunit_try_run_case+0x10/0x10
[   30.338921]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   30.339532]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   30.340142]  ? __kthread_parkme+0x82/0x160
[   30.340761]  ? preempt_count_sub+0x50/0x80
[   30.341114]  ? __pfx_kunit_try_run_case+0x10/0x10
[   30.341855]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   30.342589]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   30.343324]  kthread+0x257/0x310
[   30.343603]  ? __pfx_kthread+0x10/0x10
[   30.344047]  ret_from_fork+0x41/0x80
[   30.344400]  ? __pfx_kthread+0x10/0x10
[   30.344845]  ret_from_fork_asm+0x1a/0x30
[   30.345178]  </TASK>
[   30.345505] 
[   30.345717] Allocated by task 273:
[   30.345983]  kasan_save_stack+0x3d/0x60
[   30.346389]  kasan_save_track+0x18/0x40
[   30.346814]  kasan_save_alloc_info+0x3b/0x50
[   30.347169]  __kasan_kmalloc+0xb7/0xc0
[   30.347436]  __kmalloc_cache_noprof+0x184/0x410
[   30.347909]  kasan_atomics+0x96/0x310
[   30.348383]  kunit_try_run_case+0x1b3/0x490
[   30.348804]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   30.349418]  kthread+0x257/0x310
[   30.349701]  ret_from_fork+0x41/0x80
[   30.350059]  ret_from_fork_asm+0x1a/0x30
[   30.350334] 
[   30.350494] The buggy address belongs to the object at ffff888101abdc80
[   30.350494]  which belongs to the cache kmalloc-64 of size 64
[   30.351606] The buggy address is located 0 bytes to the right of
[   30.351606]  allocated 48-byte region [ffff888101abdc80, ffff888101abdcb0)
[   30.352329] 
[   30.352497] The buggy address belongs to the physical page:
[   30.352794] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101abd
[   30.353526] flags: 0x200000000000000(node=0|zone=2)
[   30.354030] page_type: f5(slab)
[   30.354430] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   30.355124] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   30.355577] page dumped because: kasan: bad access detected
[   30.355903] 
[   30.356052] Memory state around the buggy address:
[   30.356584]  ffff888101abdb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   30.357219]  ffff888101abdc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   30.357852] >ffff888101abdc80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   30.358335]                                      ^
[   30.358745]  ffff888101abdd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.359479]  ffff888101abdd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.359864] ==================================================================
[   29.277934] ==================================================================
[   29.278306] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b8a/0x5450
[   29.278703] Read of size 4 at addr ffff888101abdcb0 by task kunit_try_catch/273
[   29.279414] 
[   29.279660] CPU: 0 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241122 #1
[   29.280673] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.281099] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   29.281963] Call Trace:
[   29.282299]  <TASK>
[   29.282648]  dump_stack_lvl+0x73/0xb0
[   29.283054]  print_report+0xd1/0x640
[   29.283533]  ? __virt_addr_valid+0x1db/0x2d0
[   29.284064]  ? kasan_complete_mode_report_info+0x2a/0x200
[   29.284460]  kasan_report+0x102/0x140
[   29.284735]  ? kasan_atomics_helper+0x4b8a/0x5450
[   29.285234]  ? kasan_atomics_helper+0x4b8a/0x5450
[   29.285966]  __asan_report_load4_noabort+0x18/0x20
[   29.286627]  kasan_atomics_helper+0x4b8a/0x5450
[   29.287198]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   29.287807]  ? ret_from_fork_asm+0x1a/0x30
[   29.288283]  ? ret_from_fork+0x41/0x80
[   29.288593]  kasan_atomics+0x1dd/0x310
[   29.289019]  ? __pfx_kasan_atomics+0x10/0x10
[   29.289696]  ? __pfx_read_tsc+0x10/0x10
[   29.290206]  ? ktime_get_ts64+0x84/0x230
[   29.290696]  kunit_try_run_case+0x1b3/0x490
[   29.291177]  ? __pfx_kunit_try_run_case+0x10/0x10
[   29.291771]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   29.292325]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   29.292890]  ? __kthread_parkme+0x82/0x160
[   29.293457]  ? preempt_count_sub+0x50/0x80
[   29.293920]  ? __pfx_kunit_try_run_case+0x10/0x10
[   29.294229]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   29.294629]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   29.295087]  kthread+0x257/0x310
[   29.295680]  ? __pfx_kthread+0x10/0x10
[   29.296216]  ret_from_fork+0x41/0x80
[   29.296789]  ? __pfx_kthread+0x10/0x10
[   29.297231]  ret_from_fork_asm+0x1a/0x30
[   29.297804]  </TASK>
[   29.298171] 
[   29.298442] Allocated by task 273:
[   29.298933]  kasan_save_stack+0x3d/0x60
[   29.299472]  kasan_save_track+0x18/0x40
[   29.299984]  kasan_save_alloc_info+0x3b/0x50
[   29.300545]  __kasan_kmalloc+0xb7/0xc0
[   29.300977]  __kmalloc_cache_noprof+0x184/0x410
[   29.301308]  kasan_atomics+0x96/0x310
[   29.301575]  kunit_try_run_case+0x1b3/0x490
[   29.301865]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   29.302528]  kthread+0x257/0x310
[   29.302974]  ret_from_fork+0x41/0x80
[   29.303401]  ret_from_fork_asm+0x1a/0x30
[   29.303911] 
[   29.304200] The buggy address belongs to the object at ffff888101abdc80
[   29.304200]  which belongs to the cache kmalloc-64 of size 64
[   29.305241] The buggy address is located 0 bytes to the right of
[   29.305241]  allocated 48-byte region [ffff888101abdc80, ffff888101abdcb0)
[   29.306230] 
[   29.306439] The buggy address belongs to the physical page:
[   29.306733] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101abd
[   29.307622] flags: 0x200000000000000(node=0|zone=2)
[   29.308137] page_type: f5(slab)
[   29.308604] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   29.309419] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   29.310070] page dumped because: kasan: bad access detected
[   29.310640] 
[   29.310882] Memory state around the buggy address:
[   29.311236]  ffff888101abdb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.312024]  ffff888101abdc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.312481] >ffff888101abdc80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   29.313199]                                      ^
[   29.315060]  ffff888101abdd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.315457]  ffff888101abdd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.315810] ==================================================================
[   31.561308] ==================================================================
[   31.562127] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1f44/0x5450
[   31.562958] Write of size 8 at addr ffff888101abdcb0 by task kunit_try_catch/273
[   31.563352] 
[   31.563539] CPU: 0 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241122 #1
[   31.564665] Tainted: [B]=BAD_PAGE, [N]=TEST
[   31.565038] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   31.565917] Call Trace:
[   31.566133]  <TASK>
[   31.566423]  dump_stack_lvl+0x73/0xb0
[   31.566946]  print_report+0xd1/0x640
[   31.567394]  ? __virt_addr_valid+0x1db/0x2d0
[   31.567860]  ? kasan_complete_mode_report_info+0x2a/0x200
[   31.568208]  kasan_report+0x102/0x140
[   31.568482]  ? kasan_atomics_helper+0x1f44/0x5450
[   31.569073]  ? kasan_atomics_helper+0x1f44/0x5450
[   31.569675]  kasan_check_range+0x10c/0x1c0
[   31.570189]  __kasan_check_write+0x18/0x20
[   31.570636]  kasan_atomics_helper+0x1f44/0x5450
[   31.572329]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   31.572998]  ? ret_from_fork_asm+0x1a/0x30
[   31.573294]  ? ret_from_fork+0x41/0x80
[   31.573743]  kasan_atomics+0x1dd/0x310
[   31.574212]  ? __pfx_kasan_atomics+0x10/0x10
[   31.576009]  ? __pfx_read_tsc+0x10/0x10
[   31.576521]  ? ktime_get_ts64+0x84/0x230
[   31.577067]  kunit_try_run_case+0x1b3/0x490
[   31.577655]  ? __pfx_kunit_try_run_case+0x10/0x10
[   31.578260]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   31.578896]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   31.579532]  ? __kthread_parkme+0x82/0x160
[   31.580069]  ? preempt_count_sub+0x50/0x80
[   31.580605]  ? __pfx_kunit_try_run_case+0x10/0x10
[   31.580897]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   31.581497]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   31.582063]  kthread+0x257/0x310
[   31.582448]  ? __pfx_kthread+0x10/0x10
[   31.582741]  ret_from_fork+0x41/0x80
[   31.583223]  ? __pfx_kthread+0x10/0x10
[   31.583719]  ret_from_fork_asm+0x1a/0x30
[   31.584145]  </TASK>
[   31.584488] 
[   31.584690] Allocated by task 273:
[   31.585086]  kasan_save_stack+0x3d/0x60
[   31.585451]  kasan_save_track+0x18/0x40
[   31.585875]  kasan_save_alloc_info+0x3b/0x50
[   31.586434]  __kasan_kmalloc+0xb7/0xc0
[   31.586874]  __kmalloc_cache_noprof+0x184/0x410
[   31.587177]  kasan_atomics+0x96/0x310
[   31.587494]  kunit_try_run_case+0x1b3/0x490
[   31.587944]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   31.588542]  kthread+0x257/0x310
[   31.588939]  ret_from_fork+0x41/0x80
[   31.589384]  ret_from_fork_asm+0x1a/0x30
[   31.589856] 
[   31.590094] The buggy address belongs to the object at ffff888101abdc80
[   31.590094]  which belongs to the cache kmalloc-64 of size 64
[   31.590709] The buggy address is located 0 bytes to the right of
[   31.590709]  allocated 48-byte region [ffff888101abdc80, ffff888101abdcb0)
[   31.591866] 
[   31.592101] The buggy address belongs to the physical page:
[   31.592582] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101abd
[   31.593172] flags: 0x200000000000000(node=0|zone=2)
[   31.593734] page_type: f5(slab)
[   31.594083] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   31.594533] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   31.595316] page dumped because: kasan: bad access detected
[   31.595847] 
[   31.596068] Memory state around the buggy address:
[   31.596546]  ffff888101abdb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   31.597075]  ffff888101abdc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   31.597792] >ffff888101abdc80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   31.598314]                                      ^
[   31.598728]  ffff888101abdd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.599519]  ffff888101abdd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.600029] ==================================================================
[   31.682762] ==================================================================
[   31.683386] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4f9a/0x5450
[   31.684031] Read of size 8 at addr ffff888101abdcb0 by task kunit_try_catch/273
[   31.684588] 
[   31.684876] CPU: 0 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241122 #1
[   31.685558] Tainted: [B]=BAD_PAGE, [N]=TEST
[   31.685838] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   31.686327] Call Trace:
[   31.686542]  <TASK>
[   31.686740]  dump_stack_lvl+0x73/0xb0
[   31.687226]  print_report+0xd1/0x640
[   31.687696]  ? __virt_addr_valid+0x1db/0x2d0
[   31.688186]  ? kasan_complete_mode_report_info+0x2a/0x200
[   31.688775]  kasan_report+0x102/0x140
[   31.689308]  ? kasan_atomics_helper+0x4f9a/0x5450
[   31.689809]  ? kasan_atomics_helper+0x4f9a/0x5450
[   31.690467]  __asan_report_load8_noabort+0x18/0x20
[   31.690939]  kasan_atomics_helper+0x4f9a/0x5450
[   31.691510]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   31.691907]  ? ret_from_fork_asm+0x1a/0x30
[   31.692433]  ? ret_from_fork+0x41/0x80
[   31.692795]  kasan_atomics+0x1dd/0x310
[   31.693309]  ? __pfx_kasan_atomics+0x10/0x10
[   31.693625]  ? __pfx_read_tsc+0x10/0x10
[   31.693965]  ? ktime_get_ts64+0x84/0x230
[   31.694429]  kunit_try_run_case+0x1b3/0x490
[   31.694968]  ? __pfx_kunit_try_run_case+0x10/0x10
[   31.695501]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   31.696289]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   31.697034]  ? __kthread_parkme+0x82/0x160
[   31.699413]  ? preempt_count_sub+0x50/0x80
[   31.699857]  ? __pfx_kunit_try_run_case+0x10/0x10
[   31.700361]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   31.700787]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   31.702840]  kthread+0x257/0x310
[   31.704024]  ? __pfx_kthread+0x10/0x10
[   31.704314]  ret_from_fork+0x41/0x80
[   31.704580]  ? __pfx_kthread+0x10/0x10
[   31.704866]  ret_from_fork_asm+0x1a/0x30
[   31.705321]  </TASK>
[   31.705597] 
[   31.705806] Allocated by task 273:
[   31.706802]  kasan_save_stack+0x3d/0x60
[   31.707255]  kasan_save_track+0x18/0x40
[   31.707652]  kasan_save_alloc_info+0x3b/0x50
[   31.708120]  __kasan_kmalloc+0xb7/0xc0
[   31.708642]  __kmalloc_cache_noprof+0x184/0x410
[   31.710154]  kasan_atomics+0x96/0x310
[   31.710563]  kunit_try_run_case+0x1b3/0x490
[   31.711206]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   31.711794]  kthread+0x257/0x310
[   31.712192]  ret_from_fork+0x41/0x80
[   31.712922]  ret_from_fork_asm+0x1a/0x30
[   31.713552] 
[   31.713778] The buggy address belongs to the object at ffff888101abdc80
[   31.713778]  which belongs to the cache kmalloc-64 of size 64
[   31.714690] The buggy address is located 0 bytes to the right of
[   31.714690]  allocated 48-byte region [ffff888101abdc80, ffff888101abdcb0)
[   31.715865] 
[   31.716199] The buggy address belongs to the physical page:
[   31.716739] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101abd
[   31.717459] flags: 0x200000000000000(node=0|zone=2)
[   31.717783] page_type: f5(slab)
[   31.718162] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   31.719192] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   31.720360] page dumped because: kasan: bad access detected
[   31.720966] 
[   31.721124] Memory state around the buggy address:
[   31.721565]  ffff888101abdb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   31.722420]  ffff888101abdc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   31.722800] >ffff888101abdc80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   31.723549]                                      ^
[   31.724264]  ffff888101abdd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.724863]  ffff888101abdd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.725785] ==================================================================
[   31.435410] ==================================================================
[   31.435968] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1d7b/0x5450
[   31.436750] Write of size 8 at addr ffff888101abdcb0 by task kunit_try_catch/273
[   31.437395] 
[   31.437670] CPU: 0 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241122 #1
[   31.438577] Tainted: [B]=BAD_PAGE, [N]=TEST
[   31.439031] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   31.439740] Call Trace:
[   31.440065]  <TASK>
[   31.440473]  dump_stack_lvl+0x73/0xb0
[   31.441011]  print_report+0xd1/0x640
[   31.441440]  ? __virt_addr_valid+0x1db/0x2d0
[   31.441967]  ? kasan_complete_mode_report_info+0x2a/0x200
[   31.442527]  kasan_report+0x102/0x140
[   31.442948]  ? kasan_atomics_helper+0x1d7b/0x5450
[   31.443597]  ? kasan_atomics_helper+0x1d7b/0x5450
[   31.444055]  kasan_check_range+0x10c/0x1c0
[   31.444565]  __kasan_check_write+0x18/0x20
[   31.445037]  kasan_atomics_helper+0x1d7b/0x5450
[   31.445591]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   31.446125]  ? ret_from_fork_asm+0x1a/0x30
[   31.446679]  ? ret_from_fork+0x41/0x80
[   31.447136]  kasan_atomics+0x1dd/0x310
[   31.447736]  ? __pfx_kasan_atomics+0x10/0x10
[   31.448075]  ? __pfx_read_tsc+0x10/0x10
[   31.448549]  ? ktime_get_ts64+0x84/0x230
[   31.449125]  kunit_try_run_case+0x1b3/0x490
[   31.449694]  ? __pfx_kunit_try_run_case+0x10/0x10
[   31.450215]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   31.450585]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   31.450924]  ? __kthread_parkme+0x82/0x160
[   31.451536]  ? preempt_count_sub+0x50/0x80
[   31.452105]  ? __pfx_kunit_try_run_case+0x10/0x10
[   31.452708]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   31.453437]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   31.454020]  kthread+0x257/0x310
[   31.454392]  ? __pfx_kthread+0x10/0x10
[   31.454920]  ret_from_fork+0x41/0x80
[   31.455280]  ? __pfx_kthread+0x10/0x10
[   31.455706]  ret_from_fork_asm+0x1a/0x30
[   31.456104]  </TASK>
[   31.456293] 
[   31.456440] Allocated by task 273:
[   31.456665]  kasan_save_stack+0x3d/0x60
[   31.457161]  kasan_save_track+0x18/0x40
[   31.457631]  kasan_save_alloc_info+0x3b/0x50
[   31.458163]  __kasan_kmalloc+0xb7/0xc0
[   31.458707]  __kmalloc_cache_noprof+0x184/0x410
[   31.459235]  kasan_atomics+0x96/0x310
[   31.459768]  kunit_try_run_case+0x1b3/0x490
[   31.460227]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   31.460594]  kthread+0x257/0x310
[   31.460854]  ret_from_fork+0x41/0x80
[   31.461370]  ret_from_fork_asm+0x1a/0x30
[   31.461954] 
[   31.462188] The buggy address belongs to the object at ffff888101abdc80
[   31.462188]  which belongs to the cache kmalloc-64 of size 64
[   31.463427] The buggy address is located 0 bytes to the right of
[   31.463427]  allocated 48-byte region [ffff888101abdc80, ffff888101abdcb0)
[   31.464445] 
[   31.464708] The buggy address belongs to the physical page:
[   31.465191] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101abd
[   31.465882] flags: 0x200000000000000(node=0|zone=2)
[   31.466424] page_type: f5(slab)
[   31.466896] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   31.467513] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   31.468140] page dumped because: kasan: bad access detected
[   31.468501] 
[   31.468657] Memory state around the buggy address:
[   31.469158]  ffff888101abdb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   31.470004]  ffff888101abdc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   31.470755] >ffff888101abdc80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   31.471521]                                      ^
[   31.472004]  ffff888101abdd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.472430]  ffff888101abdd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.473157] ==================================================================
[   29.237731] ==================================================================
[   29.238952] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4ba4/0x5450
[   29.239600] Write of size 4 at addr ffff888101abdcb0 by task kunit_try_catch/273
[   29.240331] 
[   29.240585] CPU: 0 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241122 #1
[   29.241235] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.241721] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   29.242432] Call Trace:
[   29.242697]  <TASK>
[   29.242916]  dump_stack_lvl+0x73/0xb0
[   29.243430]  print_report+0xd1/0x640
[   29.243873]  ? __virt_addr_valid+0x1db/0x2d0
[   29.244414]  ? kasan_complete_mode_report_info+0x2a/0x200
[   29.244900]  kasan_report+0x102/0x140
[   29.245177]  ? kasan_atomics_helper+0x4ba4/0x5450
[   29.245748]  ? kasan_atomics_helper+0x4ba4/0x5450
[   29.246322]  __asan_report_store4_noabort+0x1b/0x30
[   29.246879]  kasan_atomics_helper+0x4ba4/0x5450
[   29.247363]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   29.247733]  ? ret_from_fork_asm+0x1a/0x30
[   29.248196]  ? ret_from_fork+0x41/0x80
[   29.248587]  kasan_atomics+0x1dd/0x310
[   29.248993]  ? __pfx_kasan_atomics+0x10/0x10
[   29.249529]  ? __pfx_read_tsc+0x10/0x10
[   29.250011]  ? ktime_get_ts64+0x84/0x230
[   29.250498]  kunit_try_run_case+0x1b3/0x490
[   29.250945]  ? __pfx_kunit_try_run_case+0x10/0x10
[   29.251523]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   29.252287]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   29.252730]  ? __kthread_parkme+0x82/0x160
[   29.253328]  ? preempt_count_sub+0x50/0x80
[   29.253969]  ? __pfx_kunit_try_run_case+0x10/0x10
[   29.254486]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   29.255291]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   29.256011]  kthread+0x257/0x310
[   29.256301]  ? __pfx_kthread+0x10/0x10
[   29.256574]  ret_from_fork+0x41/0x80
[   29.256917]  ? __pfx_kthread+0x10/0x10
[   29.257467]  ret_from_fork_asm+0x1a/0x30
[   29.257963]  </TASK>
[   29.258332] 
[   29.258551] Allocated by task 273:
[   29.258980]  kasan_save_stack+0x3d/0x60
[   29.259515]  kasan_save_track+0x18/0x40
[   29.259959]  kasan_save_alloc_info+0x3b/0x50
[   29.260387]  __kasan_kmalloc+0xb7/0xc0
[   29.260799]  __kmalloc_cache_noprof+0x184/0x410
[   29.261143]  kasan_atomics+0x96/0x310
[   29.261660]  kunit_try_run_case+0x1b3/0x490
[   29.262200]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   29.262730]  kthread+0x257/0x310
[   29.263290]  ret_from_fork+0x41/0x80
[   29.263613]  ret_from_fork_asm+0x1a/0x30
[   29.263907] 
[   29.264200] The buggy address belongs to the object at ffff888101abdc80
[   29.264200]  which belongs to the cache kmalloc-64 of size 64
[   29.265399] The buggy address is located 0 bytes to the right of
[   29.265399]  allocated 48-byte region [ffff888101abdc80, ffff888101abdcb0)
[   29.266197] 
[   29.266407] The buggy address belongs to the physical page:
[   29.266701] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101abd
[   29.267626] flags: 0x200000000000000(node=0|zone=2)
[   29.268229] page_type: f5(slab)
[   29.268700] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   29.269538] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   29.270123] page dumped because: kasan: bad access detected
[   29.270687] 
[   29.270925] Memory state around the buggy address:
[   29.271428]  ffff888101abdb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.272073]  ffff888101abdc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.272642] >ffff888101abdc80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   29.273231]                                      ^
[   29.273782]  ffff888101abdd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.274459]  ffff888101abdd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.275042] ==================================================================
[   31.848772] ==================================================================
[   31.850977] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4fa7/0x5450
[   31.851453] Read of size 8 at addr ffff888101abdcb0 by task kunit_try_catch/273
[   31.851857] 
[   31.852015] CPU: 0 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241122 #1
[   31.854067] Tainted: [B]=BAD_PAGE, [N]=TEST
[   31.854864] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   31.856292] Call Trace:
[   31.856705]  <TASK>
[   31.857197]  dump_stack_lvl+0x73/0xb0
[   31.857632]  print_report+0xd1/0x640
[   31.858002]  ? __virt_addr_valid+0x1db/0x2d0
[   31.859281]  ? kasan_complete_mode_report_info+0x2a/0x200
[   31.859908]  kasan_report+0x102/0x140
[   31.860341]  ? kasan_atomics_helper+0x4fa7/0x5450
[   31.860755]  ? kasan_atomics_helper+0x4fa7/0x5450
[   31.861316]  __asan_report_load8_noabort+0x18/0x20
[   31.861839]  kasan_atomics_helper+0x4fa7/0x5450
[   31.862660]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   31.863175]  ? ret_from_fork_asm+0x1a/0x30
[   31.864125]  ? ret_from_fork+0x41/0x80
[   31.864497]  kasan_atomics+0x1dd/0x310
[   31.864890]  ? __pfx_kasan_atomics+0x10/0x10
[   31.865764]  ? __pfx_read_tsc+0x10/0x10
[   31.866359]  ? ktime_get_ts64+0x84/0x230
[   31.866804]  kunit_try_run_case+0x1b3/0x490
[   31.867161]  ? __pfx_kunit_try_run_case+0x10/0x10
[   31.867690]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   31.868068]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   31.868630]  ? __kthread_parkme+0x82/0x160
[   31.869027]  ? preempt_count_sub+0x50/0x80
[   31.869575]  ? __pfx_kunit_try_run_case+0x10/0x10
[   31.870175]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   31.870791]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   31.871256]  kthread+0x257/0x310
[   31.871615]  ? __pfx_kthread+0x10/0x10
[   31.872311]  ret_from_fork+0x41/0x80
[   31.873325]  ? __pfx_kthread+0x10/0x10
[   31.873894]  ret_from_fork_asm+0x1a/0x30
[   31.874632]  </TASK>
[   31.874916] 
[   31.875140] Allocated by task 273:
[   31.875463]  kasan_save_stack+0x3d/0x60
[   31.875914]  kasan_save_track+0x18/0x40
[   31.876958]  kasan_save_alloc_info+0x3b/0x50
[   31.877234]  __kasan_kmalloc+0xb7/0xc0
[   31.877730]  __kmalloc_cache_noprof+0x184/0x410
[   31.878805]  kasan_atomics+0x96/0x310
[   31.879219]  kunit_try_run_case+0x1b3/0x490
[   31.879709]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   31.880520]  kthread+0x257/0x310
[   31.880940]  ret_from_fork+0x41/0x80
[   31.881675]  ret_from_fork_asm+0x1a/0x30
[   31.881960] 
[   31.882174] The buggy address belongs to the object at ffff888101abdc80
[   31.882174]  which belongs to the cache kmalloc-64 of size 64
[   31.883368] The buggy address is located 0 bytes to the right of
[   31.883368]  allocated 48-byte region [ffff888101abdc80, ffff888101abdcb0)
[   31.885077] 
[   31.885587] The buggy address belongs to the physical page:
[   31.885986] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101abd
[   31.886874] flags: 0x200000000000000(node=0|zone=2)
[   31.887378] page_type: f5(slab)
[   31.888109] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   31.888567] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   31.889268] page dumped because: kasan: bad access detected
[   31.890059] 
[   31.890305] Memory state around the buggy address:
[   31.890974]  ffff888101abdb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   31.891980]  ffff888101abdc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   31.892661] >ffff888101abdc80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   31.893365]                                      ^
[   31.893848]  ffff888101abdd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.894709]  ffff888101abdd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.895242] ==================================================================
[   29.697072] ==================================================================
[   29.698304] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x7c8/0x5450
[   29.698739] Write of size 4 at addr ffff888101abdcb0 by task kunit_try_catch/273
[   29.699448] 
[   29.699688] CPU: 0 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241122 #1
[   29.700739] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.701019] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   29.701760] Call Trace:
[   29.702194]  <TASK>
[   29.702512]  dump_stack_lvl+0x73/0xb0
[   29.702935]  print_report+0xd1/0x640
[   29.703218]  ? __virt_addr_valid+0x1db/0x2d0
[   29.703707]  ? kasan_complete_mode_report_info+0x2a/0x200
[   29.704331]  kasan_report+0x102/0x140
[   29.704703]  ? kasan_atomics_helper+0x7c8/0x5450
[   29.705118]  ? kasan_atomics_helper+0x7c8/0x5450
[   29.705444]  kasan_check_range+0x10c/0x1c0
[   29.705965]  __kasan_check_write+0x18/0x20
[   29.706468]  kasan_atomics_helper+0x7c8/0x5450
[   29.706990]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   29.707441]  ? ret_from_fork_asm+0x1a/0x30
[   29.708027]  ? ret_from_fork+0x41/0x80
[   29.708461]  kasan_atomics+0x1dd/0x310
[   29.708845]  ? __pfx_kasan_atomics+0x10/0x10
[   29.709378]  ? __pfx_read_tsc+0x10/0x10
[   29.709689]  ? ktime_get_ts64+0x84/0x230
[   29.710018]  kunit_try_run_case+0x1b3/0x490
[   29.710381]  ? __pfx_kunit_try_run_case+0x10/0x10
[   29.710904]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   29.711416]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   29.711948]  ? __kthread_parkme+0x82/0x160
[   29.712414]  ? preempt_count_sub+0x50/0x80
[   29.712708]  ? __pfx_kunit_try_run_case+0x10/0x10
[   29.713226]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   29.714055]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   29.714754]  kthread+0x257/0x310
[   29.715167]  ? __pfx_kthread+0x10/0x10
[   29.715613]  ret_from_fork+0x41/0x80
[   29.715916]  ? __pfx_kthread+0x10/0x10
[   29.716188]  ret_from_fork_asm+0x1a/0x30
[   29.716644]  </TASK>
[   29.716948] 
[   29.717203] Allocated by task 273:
[   29.717698]  kasan_save_stack+0x3d/0x60
[   29.718145]  kasan_save_track+0x18/0x40
[   29.718582]  kasan_save_alloc_info+0x3b/0x50
[   29.719048]  __kasan_kmalloc+0xb7/0xc0
[   29.719518]  __kmalloc_cache_noprof+0x184/0x410
[   29.719867]  kasan_atomics+0x96/0x310
[   29.720309]  kunit_try_run_case+0x1b3/0x490
[   29.720651]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   29.721110]  kthread+0x257/0x310
[   29.721639]  ret_from_fork+0x41/0x80
[   29.721937]  ret_from_fork_asm+0x1a/0x30
[   29.722216] 
[   29.722436] The buggy address belongs to the object at ffff888101abdc80
[   29.722436]  which belongs to the cache kmalloc-64 of size 64
[   29.723688] The buggy address is located 0 bytes to the right of
[   29.723688]  allocated 48-byte region [ffff888101abdc80, ffff888101abdcb0)
[   29.724454] 
[   29.724614] The buggy address belongs to the physical page:
[   29.725142] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101abd
[   29.725871] flags: 0x200000000000000(node=0|zone=2)
[   29.726182] page_type: f5(slab)
[   29.726426] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   29.726810] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   29.727556] page dumped because: kasan: bad access detected
[   29.728089] 
[   29.728318] Memory state around the buggy address:
[   29.728786]  ffff888101abdb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.729634]  ffff888101abdc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.730236] >ffff888101abdc80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   29.730784]                                      ^
[   29.731095]  ffff888101abdd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.731637]  ffff888101abdd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.732361] ==================================================================
[   30.690973] ==================================================================
[   30.691610] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4eb0/0x5450
[   30.692561] Read of size 8 at addr ffff888101abdcb0 by task kunit_try_catch/273
[   30.693346] 
[   30.693458] CPU: 0 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241122 #1
[   30.693750] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.693983] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   30.694583] Call Trace:
[   30.694949]  <TASK>
[   30.695252]  dump_stack_lvl+0x73/0xb0
[   30.695605]  print_report+0xd1/0x640
[   30.695988]  ? __virt_addr_valid+0x1db/0x2d0
[   30.696559]  ? kasan_complete_mode_report_info+0x2a/0x200
[   30.696998]  kasan_report+0x102/0x140
[   30.697495]  ? kasan_atomics_helper+0x4eb0/0x5450
[   30.697933]  ? kasan_atomics_helper+0x4eb0/0x5450
[   30.698498]  __asan_report_load8_noabort+0x18/0x20
[   30.699008]  kasan_atomics_helper+0x4eb0/0x5450
[   30.699551]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   30.700047]  ? ret_from_fork_asm+0x1a/0x30
[   30.700421]  ? ret_from_fork+0x41/0x80
[   30.700898]  kasan_atomics+0x1dd/0x310
[   30.701328]  ? __pfx_kasan_atomics+0x10/0x10
[   30.701752]  ? __pfx_read_tsc+0x10/0x10
[   30.702064]  ? ktime_get_ts64+0x84/0x230
[   30.702440]  kunit_try_run_case+0x1b3/0x490
[   30.702962]  ? __pfx_kunit_try_run_case+0x10/0x10
[   30.703514]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   30.704028]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   30.704510]  ? __kthread_parkme+0x82/0x160
[   30.704802]  ? preempt_count_sub+0x50/0x80
[   30.705294]  ? __pfx_kunit_try_run_case+0x10/0x10
[   30.705743]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   30.706322]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   30.706887]  kthread+0x257/0x310
[   30.707185]  ? __pfx_kthread+0x10/0x10
[   30.707669]  ret_from_fork+0x41/0x80
[   30.708089]  ? __pfx_kthread+0x10/0x10
[   30.708471]  ret_from_fork_asm+0x1a/0x30
[   30.709031]  </TASK>
[   30.709311] 
[   30.709542] Allocated by task 273:
[   30.709785]  kasan_save_stack+0x3d/0x60
[   30.710246]  kasan_save_track+0x18/0x40
[   30.710679]  kasan_save_alloc_info+0x3b/0x50
[   30.711072]  __kasan_kmalloc+0xb7/0xc0
[   30.711383]  __kmalloc_cache_noprof+0x184/0x410
[   30.712115]  kasan_atomics+0x96/0x310
[   30.712585]  kunit_try_run_case+0x1b3/0x490
[   30.712895]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   30.713215]  kthread+0x257/0x310
[   30.713575]  ret_from_fork+0x41/0x80
[   30.716292]  ret_from_fork_asm+0x1a/0x30
[   30.717565] 
[   30.717867] The buggy address belongs to the object at ffff888101abdc80
[   30.717867]  which belongs to the cache kmalloc-64 of size 64
[   30.719198] The buggy address is located 0 bytes to the right of
[   30.719198]  allocated 48-byte region [ffff888101abdc80, ffff888101abdcb0)
[   30.720515] 
[   30.720807] The buggy address belongs to the physical page:
[   30.721452] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101abd
[   30.722339] flags: 0x200000000000000(node=0|zone=2)
[   30.722727] page_type: f5(slab)
[   30.723182] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   30.724288] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   30.724522] page dumped because: kasan: bad access detected
[   30.724691] 
[   30.724770] Memory state around the buggy address:
[   30.725032]  ffff888101abdb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   30.725720]  ffff888101abdc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   30.727201] >ffff888101abdc80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   30.727886]                                      ^
[   30.728238]  ffff888101abdd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.728674]  ffff888101abdd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.729379] ==================================================================
[   31.601628] ==================================================================
[   31.602343] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4f73/0x5450
[   31.604148] Read of size 8 at addr ffff888101abdcb0 by task kunit_try_catch/273
[   31.604619] 
[   31.604806] CPU: 0 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241122 #1
[   31.605520] Tainted: [B]=BAD_PAGE, [N]=TEST
[   31.606461] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   31.608066] Call Trace:
[   31.608752]  <TASK>
[   31.609055]  dump_stack_lvl+0x73/0xb0
[   31.609533]  print_report+0xd1/0x640
[   31.610071]  ? __virt_addr_valid+0x1db/0x2d0
[   31.610591]  ? kasan_complete_mode_report_info+0x2a/0x200
[   31.611233]  kasan_report+0x102/0x140
[   31.611770]  ? kasan_atomics_helper+0x4f73/0x5450
[   31.612166]  ? kasan_atomics_helper+0x4f73/0x5450
[   31.612803]  __asan_report_load8_noabort+0x18/0x20
[   31.613529]  kasan_atomics_helper+0x4f73/0x5450
[   31.613918]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   31.614354]  ? ret_from_fork_asm+0x1a/0x30
[   31.614726]  ? ret_from_fork+0x41/0x80
[   31.615174]  kasan_atomics+0x1dd/0x310
[   31.615568]  ? __pfx_kasan_atomics+0x10/0x10
[   31.616677]  ? __pfx_read_tsc+0x10/0x10
[   31.617319]  ? ktime_get_ts64+0x84/0x230
[   31.617962]  kunit_try_run_case+0x1b3/0x490
[   31.618613]  ? __pfx_kunit_try_run_case+0x10/0x10
[   31.619052]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   31.619560]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   31.620216]  ? __kthread_parkme+0x82/0x160
[   31.621136]  ? preempt_count_sub+0x50/0x80
[   31.621771]  ? __pfx_kunit_try_run_case+0x10/0x10
[   31.622728]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   31.623195]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   31.623929]  kthread+0x257/0x310
[   31.624553]  ? __pfx_kthread+0x10/0x10
[   31.625249]  ret_from_fork+0x41/0x80
[   31.625739]  ? __pfx_kthread+0x10/0x10
[   31.626191]  ret_from_fork_asm+0x1a/0x30
[   31.626614]  </TASK>
[   31.626920] 
[   31.627142] Allocated by task 273:
[   31.627466]  kasan_save_stack+0x3d/0x60
[   31.627850]  kasan_save_track+0x18/0x40
[   31.628269]  kasan_save_alloc_info+0x3b/0x50
[   31.629240]  __kasan_kmalloc+0xb7/0xc0
[   31.629584]  __kmalloc_cache_noprof+0x184/0x410
[   31.629909]  kasan_atomics+0x96/0x310
[   31.630174]  kunit_try_run_case+0x1b3/0x490
[   31.631099]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   31.631792]  kthread+0x257/0x310
[   31.632305]  ret_from_fork+0x41/0x80
[   31.632887]  ret_from_fork_asm+0x1a/0x30
[   31.633449] 
[   31.633685] The buggy address belongs to the object at ffff888101abdc80
[   31.633685]  which belongs to the cache kmalloc-64 of size 64
[   31.634976] The buggy address is located 0 bytes to the right of
[   31.634976]  allocated 48-byte region [ffff888101abdc80, ffff888101abdcb0)
[   31.636306] 
[   31.636609] The buggy address belongs to the physical page:
[   31.637208] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101abd
[   31.638085] flags: 0x200000000000000(node=0|zone=2)
[   31.638515] page_type: f5(slab)
[   31.638849] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   31.639639] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   31.640278] page dumped because: kasan: bad access detected
[   31.640848] 
[   31.641034] Memory state around the buggy address:
[   31.641381]  ffff888101abdb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   31.642105]  ffff888101abdc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   31.642588] >ffff888101abdc80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   31.643304]                                      ^
[   31.643681]  ffff888101abdd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.644183]  ffff888101abdd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.644854] ==================================================================
[   31.896379] ==================================================================
[   31.898351] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x224d/0x5450
[   31.898986] Write of size 8 at addr ffff888101abdcb0 by task kunit_try_catch/273
[   31.900149] 
[   31.900922] CPU: 0 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241122 #1
[   31.902109] Tainted: [B]=BAD_PAGE, [N]=TEST
[   31.902777] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   31.903457] Call Trace:
[   31.903694]  <TASK>
[   31.904254]  dump_stack_lvl+0x73/0xb0
[   31.904668]  print_report+0xd1/0x640
[   31.905036]  ? __virt_addr_valid+0x1db/0x2d0
[   31.905898]  ? kasan_complete_mode_report_info+0x2a/0x200
[   31.906631]  kasan_report+0x102/0x140
[   31.907032]  ? kasan_atomics_helper+0x224d/0x5450
[   31.907799]  ? kasan_atomics_helper+0x224d/0x5450
[   31.908275]  kasan_check_range+0x10c/0x1c0
[   31.909062]  __kasan_check_write+0x18/0x20
[   31.909661]  kasan_atomics_helper+0x224d/0x5450
[   31.910134]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   31.910904]  ? ret_from_fork_asm+0x1a/0x30
[   31.911328]  ? ret_from_fork+0x41/0x80
[   31.912151]  kasan_atomics+0x1dd/0x310
[   31.913025]  ? __pfx_kasan_atomics+0x10/0x10
[   31.913565]  ? __pfx_read_tsc+0x10/0x10
[   31.913925]  ? ktime_get_ts64+0x84/0x230
[   31.914315]  kunit_try_run_case+0x1b3/0x490
[   31.915091]  ? __pfx_kunit_try_run_case+0x10/0x10
[   31.915892]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   31.916463]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   31.917033]  ? __kthread_parkme+0x82/0x160
[   31.917681]  ? preempt_count_sub+0x50/0x80
[   31.918152]  ? __pfx_kunit_try_run_case+0x10/0x10
[   31.918455]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   31.919193]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   31.919917]  kthread+0x257/0x310
[   31.920415]  ? __pfx_kthread+0x10/0x10
[   31.920869]  ret_from_fork+0x41/0x80
[   31.921070]  ? __pfx_kthread+0x10/0x10
[   31.921222]  ret_from_fork_asm+0x1a/0x30
[   31.921491]  </TASK>
[   31.921769] 
[   31.921988] Allocated by task 273:
[   31.922315]  kasan_save_stack+0x3d/0x60
[   31.922593]  kasan_save_track+0x18/0x40
[   31.923019]  kasan_save_alloc_info+0x3b/0x50
[   31.923534]  __kasan_kmalloc+0xb7/0xc0
[   31.923936]  __kmalloc_cache_noprof+0x184/0x410
[   31.924233]  kasan_atomics+0x96/0x310
[   31.924639]  kunit_try_run_case+0x1b3/0x490
[   31.925141]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   31.925882]  kthread+0x257/0x310
[   31.926157]  ret_from_fork+0x41/0x80
[   31.926617]  ret_from_fork_asm+0x1a/0x30
[   31.926963] 
[   31.927232] The buggy address belongs to the object at ffff888101abdc80
[   31.927232]  which belongs to the cache kmalloc-64 of size 64
[   31.927883] The buggy address is located 0 bytes to the right of
[   31.927883]  allocated 48-byte region [ffff888101abdc80, ffff888101abdcb0)
[   31.929134] 
[   31.929405] The buggy address belongs to the physical page:
[   31.929775] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101abd
[   31.930496] flags: 0x200000000000000(node=0|zone=2)
[   31.931017] page_type: f5(slab)
[   31.931263] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   31.931654] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   31.932052] page dumped because: kasan: bad access detected
[   31.932484] 
[   31.932741] Memory state around the buggy address:
[   31.933259]  ffff888101abdb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   31.934176]  ffff888101abdc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   31.934784] >ffff888101abdc80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   31.935173]                                      ^
[   31.935724]  ffff888101abdd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.936507]  ffff888101abdd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.937127] ==================================================================
[   31.134789] ==================================================================
[   31.135721] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x194b/0x5450
[   31.136552] Write of size 8 at addr ffff888101abdcb0 by task kunit_try_catch/273
[   31.137050] 
[   31.137254] CPU: 0 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241122 #1
[   31.138962] Tainted: [B]=BAD_PAGE, [N]=TEST
[   31.139886] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   31.140655] Call Trace:
[   31.140925]  <TASK>
[   31.141209]  dump_stack_lvl+0x73/0xb0
[   31.141811]  print_report+0xd1/0x640
[   31.142222]  ? __virt_addr_valid+0x1db/0x2d0
[   31.142530]  ? kasan_complete_mode_report_info+0x2a/0x200
[   31.143334]  kasan_report+0x102/0x140
[   31.143962]  ? kasan_atomics_helper+0x194b/0x5450
[   31.144447]  ? kasan_atomics_helper+0x194b/0x5450
[   31.144918]  kasan_check_range+0x10c/0x1c0
[   31.145504]  __kasan_check_write+0x18/0x20
[   31.146134]  kasan_atomics_helper+0x194b/0x5450
[   31.146761]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   31.147121]  ? ret_from_fork_asm+0x1a/0x30
[   31.147784]  ? ret_from_fork+0x41/0x80
[   31.148309]  kasan_atomics+0x1dd/0x310
[   31.148751]  ? __pfx_kasan_atomics+0x10/0x10
[   31.149282]  ? __pfx_read_tsc+0x10/0x10
[   31.149738]  ? ktime_get_ts64+0x84/0x230
[   31.150350]  kunit_try_run_case+0x1b3/0x490
[   31.150833]  ? __pfx_kunit_try_run_case+0x10/0x10
[   31.151291]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   31.151788]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   31.152373]  ? __kthread_parkme+0x82/0x160
[   31.152974]  ? preempt_count_sub+0x50/0x80
[   31.153287]  ? __pfx_kunit_try_run_case+0x10/0x10
[   31.154165]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   31.154719]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   31.155095]  kthread+0x257/0x310
[   31.155723]  ? __pfx_kthread+0x10/0x10
[   31.156286]  ret_from_fork+0x41/0x80
[   31.156919]  ? __pfx_kthread+0x10/0x10
[   31.157408]  ret_from_fork_asm+0x1a/0x30
[   31.157723]  </TASK>
[   31.158071] 
[   31.158319] Allocated by task 273:
[   31.159004]  kasan_save_stack+0x3d/0x60
[   31.159633]  kasan_save_track+0x18/0x40
[   31.160077]  kasan_save_alloc_info+0x3b/0x50
[   31.160423]  __kasan_kmalloc+0xb7/0xc0
[   31.160686]  __kmalloc_cache_noprof+0x184/0x410
[   31.161358]  kasan_atomics+0x96/0x310
[   31.162048]  kunit_try_run_case+0x1b3/0x490
[   31.162660]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   31.163038]  kthread+0x257/0x310
[   31.163641]  ret_from_fork+0x41/0x80
[   31.164068]  ret_from_fork_asm+0x1a/0x30
[   31.164485] 
[   31.164644] The buggy address belongs to the object at ffff888101abdc80
[   31.164644]  which belongs to the cache kmalloc-64 of size 64
[   31.165860] The buggy address is located 0 bytes to the right of
[   31.165860]  allocated 48-byte region [ffff888101abdc80, ffff888101abdcb0)
[   31.167192] 
[   31.167357] The buggy address belongs to the physical page:
[   31.167723] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101abd
[   31.169000] flags: 0x200000000000000(node=0|zone=2)
[   31.169708] page_type: f5(slab)
[   31.170109] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   31.170989] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   31.171503] page dumped because: kasan: bad access detected
[   31.172037] 
[   31.172221] Memory state around the buggy address:
[   31.173261]  ffff888101abdb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   31.173644]  ffff888101abdc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   31.174561] >ffff888101abdc80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   31.175655]                                      ^
[   31.175981]  ffff888101abdd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.176878]  ffff888101abdd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.177678] ==================================================================
[   29.820540] ==================================================================
[   29.821205] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x993/0x5450
[   29.821744] Write of size 4 at addr ffff888101abdcb0 by task kunit_try_catch/273
[   29.822410] 
[   29.822602] CPU: 0 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241122 #1
[   29.823330] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.823733] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   29.824599] Call Trace:
[   29.824877]  <TASK>
[   29.825277]  dump_stack_lvl+0x73/0xb0
[   29.825696]  print_report+0xd1/0x640
[   29.826212]  ? __virt_addr_valid+0x1db/0x2d0
[   29.826744]  ? kasan_complete_mode_report_info+0x2a/0x200
[   29.827391]  kasan_report+0x102/0x140
[   29.827674]  ? kasan_atomics_helper+0x993/0x5450
[   29.828172]  ? kasan_atomics_helper+0x993/0x5450
[   29.828922]  kasan_check_range+0x10c/0x1c0
[   29.829561]  __kasan_check_write+0x18/0x20
[   29.830104]  kasan_atomics_helper+0x993/0x5450
[   29.830569]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   29.831142]  ? ret_from_fork_asm+0x1a/0x30
[   29.831485]  ? ret_from_fork+0x41/0x80
[   29.831804]  kasan_atomics+0x1dd/0x310
[   29.832378]  ? __pfx_kasan_atomics+0x10/0x10
[   29.833045]  ? __pfx_read_tsc+0x10/0x10
[   29.833594]  ? ktime_get_ts64+0x84/0x230
[   29.834135]  kunit_try_run_case+0x1b3/0x490
[   29.834714]  ? __pfx_kunit_try_run_case+0x10/0x10
[   29.835123]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   29.835789]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   29.836146]  ? __kthread_parkme+0x82/0x160
[   29.836478]  ? preempt_count_sub+0x50/0x80
[   29.836946]  ? __pfx_kunit_try_run_case+0x10/0x10
[   29.837564]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   29.838336]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   29.838963]  kthread+0x257/0x310
[   29.839240]  ? __pfx_kthread+0x10/0x10
[   29.839631]  ret_from_fork+0x41/0x80
[   29.839968]  ? __pfx_kthread+0x10/0x10
[   29.840492]  ret_from_fork_asm+0x1a/0x30
[   29.841049]  </TASK>
[   29.841456] 
[   29.841679] Allocated by task 273:
[   29.842065]  kasan_save_stack+0x3d/0x60
[   29.842597]  kasan_save_track+0x18/0x40
[   29.843108]  kasan_save_alloc_info+0x3b/0x50
[   29.843563]  __kasan_kmalloc+0xb7/0xc0
[   29.843851]  __kmalloc_cache_noprof+0x184/0x410
[   29.844299]  kasan_atomics+0x96/0x310
[   29.844798]  kunit_try_run_case+0x1b3/0x490
[   29.845435]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   29.846087]  kthread+0x257/0x310
[   29.846491]  ret_from_fork+0x41/0x80
[   29.846756]  ret_from_fork_asm+0x1a/0x30
[   29.847213] 
[   29.847478] The buggy address belongs to the object at ffff888101abdc80
[   29.847478]  which belongs to the cache kmalloc-64 of size 64
[   29.849952] The buggy address is located 0 bytes to the right of
[   29.849952]  allocated 48-byte region [ffff888101abdc80, ffff888101abdcb0)
[   29.851663] 
[   29.851930] The buggy address belongs to the physical page:
[   29.852511] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101abd
[   29.853414] flags: 0x200000000000000(node=0|zone=2)
[   29.854169] page_type: f5(slab)
[   29.854717] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   29.855724] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   29.856258] page dumped because: kasan: bad access detected
[   29.856661] 
[   29.856851] Memory state around the buggy address:
[   29.857255]  ffff888101abdb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.857955]  ffff888101abdc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.858543] >ffff888101abdc80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   29.858970]                                      ^
[   29.859306]  ffff888101abdd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.859981]  ffff888101abdd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.860860] ==================================================================
[   29.364152] ==================================================================
[   29.364915] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e0/0x5450
[   29.366265] Read of size 4 at addr ffff888101abdcb0 by task kunit_try_catch/273
[   29.366774] 
[   29.366978] CPU: 0 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241122 #1
[   29.367951] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.368249] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   29.368994] Call Trace:
[   29.369351]  <TASK>
[   29.369621]  dump_stack_lvl+0x73/0xb0
[   29.370074]  print_report+0xd1/0x640
[   29.370363]  ? __virt_addr_valid+0x1db/0x2d0
[   29.370899]  ? kasan_complete_mode_report_info+0x2a/0x200
[   29.371241]  kasan_report+0x102/0x140
[   29.371662]  ? kasan_atomics_helper+0x3e0/0x5450
[   29.372181]  ? kasan_atomics_helper+0x3e0/0x5450
[   29.372560]  kasan_check_range+0x10c/0x1c0
[   29.372951]  __kasan_check_read+0x15/0x20
[   29.373420]  kasan_atomics_helper+0x3e0/0x5450
[   29.373769]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   29.374299]  ? ret_from_fork_asm+0x1a/0x30
[   29.374601]  ? ret_from_fork+0x41/0x80
[   29.375065]  kasan_atomics+0x1dd/0x310
[   29.375517]  ? __pfx_kasan_atomics+0x10/0x10
[   29.375811]  ? __pfx_read_tsc+0x10/0x10
[   29.377146]  ? ktime_get_ts64+0x84/0x230
[   29.378764]  kunit_try_run_case+0x1b3/0x490
[   29.379380]  ? __pfx_kunit_try_run_case+0x10/0x10
[   29.380178]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   29.380815]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   29.381308]  ? __kthread_parkme+0x82/0x160
[   29.381686]  ? preempt_count_sub+0x50/0x80
[   29.382159]  ? __pfx_kunit_try_run_case+0x10/0x10
[   29.382581]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   29.383782]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   29.384514]  kthread+0x257/0x310
[   29.385120]  ? __pfx_kthread+0x10/0x10
[   29.385811]  ret_from_fork+0x41/0x80
[   29.386454]  ? __pfx_kthread+0x10/0x10
[   29.387113]  ret_from_fork_asm+0x1a/0x30
[   29.387560]  </TASK>
[   29.387862] 
[   29.388343] Allocated by task 273:
[   29.388912]  kasan_save_stack+0x3d/0x60
[   29.389269]  kasan_save_track+0x18/0x40
[   29.390145]  kasan_save_alloc_info+0x3b/0x50
[   29.390773]  __kasan_kmalloc+0xb7/0xc0
[   29.391130]  __kmalloc_cache_noprof+0x184/0x410
[   29.391619]  kasan_atomics+0x96/0x310
[   29.392198]  kunit_try_run_case+0x1b3/0x490
[   29.392609]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   29.393494]  kthread+0x257/0x310
[   29.393881]  ret_from_fork+0x41/0x80
[   29.394646]  ret_from_fork_asm+0x1a/0x30
[   29.395140] 
[   29.395423] The buggy address belongs to the object at ffff888101abdc80
[   29.395423]  which belongs to the cache kmalloc-64 of size 64
[   29.396194] The buggy address is located 0 bytes to the right of
[   29.396194]  allocated 48-byte region [ffff888101abdc80, ffff888101abdcb0)
[   29.397796] 
[   29.398052] The buggy address belongs to the physical page:
[   29.398739] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101abd
[   29.399807] flags: 0x200000000000000(node=0|zone=2)
[   29.400187] page_type: f5(slab)
[   29.400610] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   29.401577] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   29.402416] page dumped because: kasan: bad access detected
[   29.403048] 
[   29.403270] Memory state around the buggy address:
[   29.403923]  ffff888101abdb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.404487]  ffff888101abdc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.405258] >ffff888101abdc80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   29.406228]                                      ^
[   29.406426]  ffff888101abdd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.406635]  ffff888101abdd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.406853] ==================================================================
[   29.776187] ==================================================================
[   29.776795] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x8fa/0x5450
[   29.777513] Write of size 4 at addr ffff888101abdcb0 by task kunit_try_catch/273
[   29.778152] 
[   29.778449] CPU: 0 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241122 #1
[   29.779124] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.779555] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   29.780424] Call Trace:
[   29.780737]  <TASK>
[   29.781038]  dump_stack_lvl+0x73/0xb0
[   29.781545]  print_report+0xd1/0x640
[   29.781958]  ? __virt_addr_valid+0x1db/0x2d0
[   29.782360]  ? kasan_complete_mode_report_info+0x2a/0x200
[   29.782919]  kasan_report+0x102/0x140
[   29.783428]  ? kasan_atomics_helper+0x8fa/0x5450
[   29.783759]  ? kasan_atomics_helper+0x8fa/0x5450
[   29.784103]  kasan_check_range+0x10c/0x1c0
[   29.784641]  __kasan_check_write+0x18/0x20
[   29.785118]  kasan_atomics_helper+0x8fa/0x5450
[   29.785675]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   29.786206]  ? ret_from_fork_asm+0x1a/0x30
[   29.786699]  ? ret_from_fork+0x41/0x80
[   29.787194]  kasan_atomics+0x1dd/0x310
[   29.787640]  ? __pfx_kasan_atomics+0x10/0x10
[   29.787952]  ? __pfx_read_tsc+0x10/0x10
[   29.788314]  ? ktime_get_ts64+0x84/0x230
[   29.788677]  kunit_try_run_case+0x1b3/0x490
[   29.790158]  ? __pfx_kunit_try_run_case+0x10/0x10
[   29.790522]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   29.790885]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   29.792609]  ? __kthread_parkme+0x82/0x160
[   29.793362]  ? preempt_count_sub+0x50/0x80
[   29.794214]  ? __pfx_kunit_try_run_case+0x10/0x10
[   29.794663]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   29.795202]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   29.796228]  kthread+0x257/0x310
[   29.796887]  ? __pfx_kthread+0x10/0x10
[   29.797514]  ret_from_fork+0x41/0x80
[   29.797926]  ? __pfx_kthread+0x10/0x10
[   29.798335]  ret_from_fork_asm+0x1a/0x30
[   29.798768]  </TASK>
[   29.799163] 
[   29.799392] Allocated by task 273:
[   29.800010]  kasan_save_stack+0x3d/0x60
[   29.800517]  kasan_save_track+0x18/0x40
[   29.801107]  kasan_save_alloc_info+0x3b/0x50
[   29.801718]  __kasan_kmalloc+0xb7/0xc0
[   29.802266]  __kmalloc_cache_noprof+0x184/0x410
[   29.803025]  kasan_atomics+0x96/0x310
[   29.803581]  kunit_try_run_case+0x1b3/0x490
[   29.803889]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   29.804423]  kthread+0x257/0x310
[   29.805551]  ret_from_fork+0x41/0x80
[   29.805916]  ret_from_fork_asm+0x1a/0x30
[   29.806209] 
[   29.806816] The buggy address belongs to the object at ffff888101abdc80
[   29.806816]  which belongs to the cache kmalloc-64 of size 64
[   29.807813] The buggy address is located 0 bytes to the right of
[   29.807813]  allocated 48-byte region [ffff888101abdc80, ffff888101abdcb0)
[   29.809104] 
[   29.809333] The buggy address belongs to the physical page:
[   29.810086] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101abd
[   29.811112] flags: 0x200000000000000(node=0|zone=2)
[   29.811795] page_type: f5(slab)
[   29.812219] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   29.813090] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   29.814104] page dumped because: kasan: bad access detected
[   29.814492] 
[   29.814709] Memory state around the buggy address:
[   29.815434]  ffff888101abdb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.816294]  ffff888101abdc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.816907] >ffff888101abdc80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   29.817438]                                      ^
[   29.817915]  ffff888101abdd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.818416]  ffff888101abdd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.818912] ==================================================================
[   29.733872] ==================================================================
[   29.734797] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x861/0x5450
[   29.735560] Write of size 4 at addr ffff888101abdcb0 by task kunit_try_catch/273
[   29.736171] 
[   29.736426] CPU: 0 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241122 #1
[   29.737095] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.737355] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   29.737788] Call Trace:
[   29.738129]  <TASK>
[   29.738418]  dump_stack_lvl+0x73/0xb0
[   29.738967]  print_report+0xd1/0x640
[   29.739432]  ? __virt_addr_valid+0x1db/0x2d0
[   29.739932]  ? kasan_complete_mode_report_info+0x2a/0x200
[   29.740568]  kasan_report+0x102/0x140
[   29.740993]  ? kasan_atomics_helper+0x861/0x5450
[   29.741531]  ? kasan_atomics_helper+0x861/0x5450
[   29.741939]  kasan_check_range+0x10c/0x1c0
[   29.742439]  __kasan_check_write+0x18/0x20
[   29.742849]  kasan_atomics_helper+0x861/0x5450
[   29.743163]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   29.743656]  ? ret_from_fork_asm+0x1a/0x30
[   29.744317]  ? ret_from_fork+0x41/0x80
[   29.744806]  kasan_atomics+0x1dd/0x310
[   29.745243]  ? __pfx_kasan_atomics+0x10/0x10
[   29.745647]  ? __pfx_read_tsc+0x10/0x10
[   29.746039]  ? ktime_get_ts64+0x84/0x230
[   29.746590]  kunit_try_run_case+0x1b3/0x490
[   29.747115]  ? __pfx_kunit_try_run_case+0x10/0x10
[   29.747738]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   29.748184]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   29.748725]  ? __kthread_parkme+0x82/0x160
[   29.749157]  ? preempt_count_sub+0x50/0x80
[   29.749461]  ? __pfx_kunit_try_run_case+0x10/0x10
[   29.749761]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   29.752546]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   29.752914]  kthread+0x257/0x310
[   29.753175]  ? __pfx_kthread+0x10/0x10
[   29.753449]  ret_from_fork+0x41/0x80
[   29.753721]  ? __pfx_kthread+0x10/0x10
[   29.756436]  ret_from_fork_asm+0x1a/0x30
[   29.757807]  </TASK>
[   29.758312] 
[   29.758549] Allocated by task 273:
[   29.758929]  kasan_save_stack+0x3d/0x60
[   29.759412]  kasan_save_track+0x18/0x40
[   29.759816]  kasan_save_alloc_info+0x3b/0x50
[   29.760319]  __kasan_kmalloc+0xb7/0xc0
[   29.760740]  __kmalloc_cache_noprof+0x184/0x410
[   29.761060]  kasan_atomics+0x96/0x310
[   29.761556]  kunit_try_run_case+0x1b3/0x490
[   29.761959]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   29.762541]  kthread+0x257/0x310
[   29.762862]  ret_from_fork+0x41/0x80
[   29.763426]  ret_from_fork_asm+0x1a/0x30
[   29.763861] 
[   29.764112] The buggy address belongs to the object at ffff888101abdc80
[   29.764112]  which belongs to the cache kmalloc-64 of size 64
[   29.765075] The buggy address is located 0 bytes to the right of
[   29.765075]  allocated 48-byte region [ffff888101abdc80, ffff888101abdcb0)
[   29.765940] 
[   29.766172] The buggy address belongs to the physical page:
[   29.766721] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101abd
[   29.767351] flags: 0x200000000000000(node=0|zone=2)
[   29.767989] page_type: f5(slab)
[   29.768453] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   29.769119] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   29.769790] page dumped because: kasan: bad access detected
[   29.770409] 
[   29.770580] Memory state around the buggy address:
[   29.770879]  ffff888101abdb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.771291]  ffff888101abdc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.771958] >ffff888101abdc80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   29.772669]                                      ^
[   29.773158]  ffff888101abdd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.773876]  ffff888101abdd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.774410] ==================================================================
[   30.107721] ==================================================================
[   30.108345] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xde1/0x5450
[   30.108756] Write of size 4 at addr ffff888101abdcb0 by task kunit_try_catch/273
[   30.109255] 
[   30.109439] CPU: 0 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241122 #1
[   30.111001] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.111772] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   30.112419] Call Trace:
[   30.113070]  <TASK>
[   30.113318]  dump_stack_lvl+0x73/0xb0
[   30.114064]  print_report+0xd1/0x640
[   30.114610]  ? __virt_addr_valid+0x1db/0x2d0
[   30.115071]  ? kasan_complete_mode_report_info+0x2a/0x200
[   30.115866]  kasan_report+0x102/0x140
[   30.116222]  ? kasan_atomics_helper+0xde1/0x5450
[   30.117405]  ? kasan_atomics_helper+0xde1/0x5450
[   30.117779]  kasan_check_range+0x10c/0x1c0
[   30.118449]  __kasan_check_write+0x18/0x20
[   30.119174]  kasan_atomics_helper+0xde1/0x5450
[   30.120251]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   30.120697]  ? ret_from_fork_asm+0x1a/0x30
[   30.121293]  ? ret_from_fork+0x41/0x80
[   30.122028]  kasan_atomics+0x1dd/0x310
[   30.122428]  ? __pfx_kasan_atomics+0x10/0x10
[   30.122808]  ? __pfx_read_tsc+0x10/0x10
[   30.123246]  ? ktime_get_ts64+0x84/0x230
[   30.123811]  kunit_try_run_case+0x1b3/0x490
[   30.124227]  ? __pfx_kunit_try_run_case+0x10/0x10
[   30.124801]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   30.125198]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   30.125526]  ? __kthread_parkme+0x82/0x160
[   30.126023]  ? preempt_count_sub+0x50/0x80
[   30.126806]  ? __pfx_kunit_try_run_case+0x10/0x10
[   30.128001]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   30.128586]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   30.129418]  kthread+0x257/0x310
[   30.129854]  ? __pfx_kthread+0x10/0x10
[   30.130646]  ret_from_fork+0x41/0x80
[   30.131108]  ? __pfx_kthread+0x10/0x10
[   30.131887]  ret_from_fork_asm+0x1a/0x30
[   30.132424]  </TASK>
[   30.132653] 
[   30.132889] Allocated by task 273:
[   30.133698]  kasan_save_stack+0x3d/0x60
[   30.134138]  kasan_save_track+0x18/0x40
[   30.134519]  kasan_save_alloc_info+0x3b/0x50
[   30.135316]  __kasan_kmalloc+0xb7/0xc0
[   30.135792]  __kmalloc_cache_noprof+0x184/0x410
[   30.136270]  kasan_atomics+0x96/0x310
[   30.137128]  kunit_try_run_case+0x1b3/0x490
[   30.137495]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   30.138366]  kthread+0x257/0x310
[   30.138737]  ret_from_fork+0x41/0x80
[   30.139159]  ret_from_fork_asm+0x1a/0x30
[   30.140139] 
[   30.140337] The buggy address belongs to the object at ffff888101abdc80
[   30.140337]  which belongs to the cache kmalloc-64 of size 64
[   30.140975] The buggy address is located 0 bytes to the right of
[   30.140975]  allocated 48-byte region [ffff888101abdc80, ffff888101abdcb0)
[   30.143351] 
[   30.143550] The buggy address belongs to the physical page:
[   30.143884] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101abd
[   30.144942] flags: 0x200000000000000(node=0|zone=2)
[   30.145322] page_type: f5(slab)
[   30.146091] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   30.147042] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   30.147846] page dumped because: kasan: bad access detected
[   30.148481] 
[   30.148657] Memory state around the buggy address:
[   30.149121]  ffff888101abdb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   30.149913]  ffff888101abdc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   30.150346] >ffff888101abdc80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   30.150663]                                      ^
[   30.150905]  ffff888101abdd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.151121]  ffff888101abdd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.151324] ==================================================================
[   30.193584] ==================================================================
[   30.194344] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf11/0x5450
[   30.195106] Write of size 4 at addr ffff888101abdcb0 by task kunit_try_catch/273
[   30.195779] 
[   30.196077] CPU: 0 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241122 #1
[   30.196773] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.197064] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   30.197769] Call Trace:
[   30.198361]  <TASK>
[   30.198612]  dump_stack_lvl+0x73/0xb0
[   30.200008]  print_report+0xd1/0x640
[   30.200386]  ? __virt_addr_valid+0x1db/0x2d0
[   30.202446]  ? kasan_complete_mode_report_info+0x2a/0x200
[   30.203116]  kasan_report+0x102/0x140
[   30.203775]  ? kasan_atomics_helper+0xf11/0x5450
[   30.204538]  ? kasan_atomics_helper+0xf11/0x5450
[   30.204951]  kasan_check_range+0x10c/0x1c0
[   30.205548]  __kasan_check_write+0x18/0x20
[   30.206118]  kasan_atomics_helper+0xf11/0x5450
[   30.206599]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   30.207098]  ? ret_from_fork_asm+0x1a/0x30
[   30.207439]  ? ret_from_fork+0x41/0x80
[   30.207987]  kasan_atomics+0x1dd/0x310
[   30.208453]  ? __pfx_kasan_atomics+0x10/0x10
[   30.208814]  ? __pfx_read_tsc+0x10/0x10
[   30.209218]  ? ktime_get_ts64+0x84/0x230
[   30.209725]  kunit_try_run_case+0x1b3/0x490
[   30.210288]  ? __pfx_kunit_try_run_case+0x10/0x10
[   30.210681]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   30.211287]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   30.211812]  ? __kthread_parkme+0x82/0x160
[   30.212281]  ? preempt_count_sub+0x50/0x80
[   30.212771]  ? __pfx_kunit_try_run_case+0x10/0x10
[   30.213308]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   30.213673]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   30.214344]  kthread+0x257/0x310
[   30.214743]  ? __pfx_kthread+0x10/0x10
[   30.215122]  ret_from_fork+0x41/0x80
[   30.215596]  ? __pfx_kthread+0x10/0x10
[   30.216035]  ret_from_fork_asm+0x1a/0x30
[   30.216545]  </TASK>
[   30.216846] 
[   30.217111] Allocated by task 273:
[   30.217462]  kasan_save_stack+0x3d/0x60
[   30.217942]  kasan_save_track+0x18/0x40
[   30.218346]  kasan_save_alloc_info+0x3b/0x50
[   30.218761]  __kasan_kmalloc+0xb7/0xc0
[   30.219220]  __kmalloc_cache_noprof+0x184/0x410
[   30.219591]  kasan_atomics+0x96/0x310
[   30.220019]  kunit_try_run_case+0x1b3/0x490
[   30.220389]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   30.220711]  kthread+0x257/0x310
[   30.221151]  ret_from_fork+0x41/0x80
[   30.221595]  ret_from_fork_asm+0x1a/0x30
[   30.222099] 
[   30.222408] The buggy address belongs to the object at ffff888101abdc80
[   30.222408]  which belongs to the cache kmalloc-64 of size 64
[   30.223488] The buggy address is located 0 bytes to the right of
[   30.223488]  allocated 48-byte region [ffff888101abdc80, ffff888101abdcb0)
[   30.224163] 
[   30.224446] The buggy address belongs to the physical page:
[   30.224990] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101abd
[   30.225736] flags: 0x200000000000000(node=0|zone=2)
[   30.226225] page_type: f5(slab)
[   30.226514] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   30.226923] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   30.227338] page dumped because: kasan: bad access detected
[   30.227899] 
[   30.228160] Memory state around the buggy address:
[   30.229640]  ffff888101abdb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   30.230731]  ffff888101abdc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   30.232185] >ffff888101abdc80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   30.232900]                                      ^
[   30.233444]  ffff888101abdd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.234134]  ffff888101abdd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.234682] ==================================================================
[   29.484059] ==================================================================
[   29.484505] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b3c/0x5450
[   29.484956] Write of size 4 at addr ffff888101abdcb0 by task kunit_try_catch/273
[   29.485709] 
[   29.486024] CPU: 0 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241122 #1
[   29.487193] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.487473] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   29.487930] Call Trace:
[   29.488139]  <TASK>
[   29.488326]  dump_stack_lvl+0x73/0xb0
[   29.488803]  print_report+0xd1/0x640
[   29.489290]  ? __virt_addr_valid+0x1db/0x2d0
[   29.489917]  ? kasan_complete_mode_report_info+0x2a/0x200
[   29.490609]  kasan_report+0x102/0x140
[   29.491056]  ? kasan_atomics_helper+0x4b3c/0x5450
[   29.491688]  ? kasan_atomics_helper+0x4b3c/0x5450
[   29.492200]  __asan_report_store4_noabort+0x1b/0x30
[   29.492702]  kasan_atomics_helper+0x4b3c/0x5450
[   29.493040]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   29.493415]  ? ret_from_fork_asm+0x1a/0x30
[   29.494051]  ? ret_from_fork+0x41/0x80
[   29.494612]  kasan_atomics+0x1dd/0x310
[   29.495045]  ? __pfx_kasan_atomics+0x10/0x10
[   29.495440]  ? __pfx_read_tsc+0x10/0x10
[   29.495894]  ? ktime_get_ts64+0x84/0x230
[   29.496396]  kunit_try_run_case+0x1b3/0x490
[   29.496772]  ? __pfx_kunit_try_run_case+0x10/0x10
[   29.497269]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   29.497742]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   29.498171]  ? __kthread_parkme+0x82/0x160
[   29.498645]  ? preempt_count_sub+0x50/0x80
[   29.499021]  ? __pfx_kunit_try_run_case+0x10/0x10
[   29.499341]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   29.499695]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   29.500366]  kthread+0x257/0x310
[   29.500789]  ? __pfx_kthread+0x10/0x10
[   29.501277]  ret_from_fork+0x41/0x80
[   29.501726]  ? __pfx_kthread+0x10/0x10
[   29.502108]  ret_from_fork_asm+0x1a/0x30
[   29.503007]  </TASK>
[   29.503253] 
[   29.503441] Allocated by task 273:
[   29.503752]  kasan_save_stack+0x3d/0x60
[   29.504134]  kasan_save_track+0x18/0x40
[   29.505005]  kasan_save_alloc_info+0x3b/0x50
[   29.505326]  __kasan_kmalloc+0xb7/0xc0
[   29.505592]  __kmalloc_cache_noprof+0x184/0x410
[   29.505915]  kasan_atomics+0x96/0x310
[   29.506180]  kunit_try_run_case+0x1b3/0x490
[   29.506460]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   29.506776]  kthread+0x257/0x310
[   29.509452]  ret_from_fork+0x41/0x80
[   29.509921]  ret_from_fork_asm+0x1a/0x30
[   29.510431] 
[   29.510668] The buggy address belongs to the object at ffff888101abdc80
[   29.510668]  which belongs to the cache kmalloc-64 of size 64
[   29.511997] The buggy address is located 0 bytes to the right of
[   29.511997]  allocated 48-byte region [ffff888101abdc80, ffff888101abdcb0)
[   29.513285] 
[   29.513539] The buggy address belongs to the physical page:
[   29.514156] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101abd
[   29.515221] flags: 0x200000000000000(node=0|zone=2)
[   29.515794] page_type: f5(slab)
[   29.516213] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   29.517014] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   29.517959] page dumped because: kasan: bad access detected
[   29.518621] 
[   29.518888] Memory state around the buggy address:
[   29.519509]  ffff888101abdb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.520351]  ffff888101abdc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.521112] >ffff888101abdc80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   29.521895]                                      ^
[   29.522565]  ffff888101abdd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.523317]  ffff888101abdd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.523918] ==================================================================
[   30.514484] ==================================================================
[   30.515670] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x49ea/0x5450
[   30.517042] Read of size 4 at addr ffff888101abdcb0 by task kunit_try_catch/273
[   30.517759] 
[   30.518087] CPU: 0 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241122 #1
[   30.519231] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.519712] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   30.521807] Call Trace:
[   30.522063]  <TASK>
[   30.522261]  dump_stack_lvl+0x73/0xb0
[   30.522571]  print_report+0xd1/0x640
[   30.523000]  ? __virt_addr_valid+0x1db/0x2d0
[   30.523951]  ? kasan_complete_mode_report_info+0x2a/0x200
[   30.525281]  kasan_report+0x102/0x140
[   30.525706]  ? kasan_atomics_helper+0x49ea/0x5450
[   30.526240]  ? kasan_atomics_helper+0x49ea/0x5450
[   30.526748]  __asan_report_load4_noabort+0x18/0x20
[   30.527392]  kasan_atomics_helper+0x49ea/0x5450
[   30.528047]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   30.529075]  ? ret_from_fork_asm+0x1a/0x30
[   30.529752]  ? ret_from_fork+0x41/0x80
[   30.530378]  kasan_atomics+0x1dd/0x310
[   30.530736]  ? __pfx_kasan_atomics+0x10/0x10
[   30.531217]  ? __pfx_read_tsc+0x10/0x10
[   30.532041]  ? ktime_get_ts64+0x84/0x230
[   30.532676]  kunit_try_run_case+0x1b3/0x490
[   30.533314]  ? __pfx_kunit_try_run_case+0x10/0x10
[   30.533963]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   30.534949]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   30.535942]  ? __kthread_parkme+0x82/0x160
[   30.536310]  ? preempt_count_sub+0x50/0x80
[   30.537014]  ? __pfx_kunit_try_run_case+0x10/0x10
[   30.537489]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   30.537989]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   30.538435]  kthread+0x257/0x310
[   30.538777]  ? __pfx_kthread+0x10/0x10
[   30.539391]  ret_from_fork+0x41/0x80
[   30.539852]  ? __pfx_kthread+0x10/0x10
[   30.540396]  ret_from_fork_asm+0x1a/0x30
[   30.540809]  </TASK>
[   30.541195] 
[   30.541502] Allocated by task 273:
[   30.541856]  kasan_save_stack+0x3d/0x60
[   30.542146]  kasan_save_track+0x18/0x40
[   30.542675]  kasan_save_alloc_info+0x3b/0x50
[   30.543295]  __kasan_kmalloc+0xb7/0xc0
[   30.543726]  __kmalloc_cache_noprof+0x184/0x410
[   30.544207]  kasan_atomics+0x96/0x310
[   30.544727]  kunit_try_run_case+0x1b3/0x490
[   30.545129]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   30.545569]  kthread+0x257/0x310
[   30.546070]  ret_from_fork+0x41/0x80
[   30.546564]  ret_from_fork_asm+0x1a/0x30
[   30.547091] 
[   30.547422] The buggy address belongs to the object at ffff888101abdc80
[   30.547422]  which belongs to the cache kmalloc-64 of size 64
[   30.548288] The buggy address is located 0 bytes to the right of
[   30.548288]  allocated 48-byte region [ffff888101abdc80, ffff888101abdcb0)
[   30.549329] 
[   30.549539] The buggy address belongs to the physical page:
[   30.550147] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101abd
[   30.550857] flags: 0x200000000000000(node=0|zone=2)
[   30.551397] page_type: f5(slab)
[   30.551753] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   30.552558] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   30.553227] page dumped because: kasan: bad access detected
[   30.553737] 
[   30.554018] Memory state around the buggy address:
[   30.554509]  ffff888101abdb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   30.555194]  ffff888101abdc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   30.555899] >ffff888101abdc80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   30.556626]                                      ^
[   30.557045]  ffff888101abdd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.557782]  ffff888101abdd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.558407] ==================================================================
[   29.979160] ==================================================================
[   29.980120] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xc71/0x5450
[   29.981013] Write of size 4 at addr ffff888101abdcb0 by task kunit_try_catch/273
[   29.981836] 
[   29.982092] CPU: 0 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241122 #1
[   29.983102] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.983601] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   29.984275] Call Trace:
[   29.984495]  <TASK>
[   29.984685]  dump_stack_lvl+0x73/0xb0
[   29.985046]  print_report+0xd1/0x640
[   29.985461]  ? __virt_addr_valid+0x1db/0x2d0
[   29.986017]  ? kasan_complete_mode_report_info+0x2a/0x200
[   29.986779]  kasan_report+0x102/0x140
[   29.987244]  ? kasan_atomics_helper+0xc71/0x5450
[   29.987716]  ? kasan_atomics_helper+0xc71/0x5450
[   29.988120]  kasan_check_range+0x10c/0x1c0
[   29.988563]  __kasan_check_write+0x18/0x20
[   29.989029]  kasan_atomics_helper+0xc71/0x5450
[   29.989523]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   29.989961]  ? ret_from_fork_asm+0x1a/0x30
[   29.990252]  ? ret_from_fork+0x41/0x80
[   29.990557]  kasan_atomics+0x1dd/0x310
[   29.991024]  ? __pfx_kasan_atomics+0x10/0x10
[   29.991496]  ? __pfx_read_tsc+0x10/0x10
[   29.992039]  ? ktime_get_ts64+0x84/0x230
[   29.992748]  kunit_try_run_case+0x1b3/0x490
[   29.993233]  ? __pfx_kunit_try_run_case+0x10/0x10
[   29.993712]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   29.994076]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   29.994587]  ? __kthread_parkme+0x82/0x160
[   29.995089]  ? preempt_count_sub+0x50/0x80
[   29.995629]  ? __pfx_kunit_try_run_case+0x10/0x10
[   29.995968]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   29.996353]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   29.997097]  kthread+0x257/0x310
[   29.997605]  ? __pfx_kthread+0x10/0x10
[   29.998087]  ret_from_fork+0x41/0x80
[   29.998575]  ? __pfx_kthread+0x10/0x10
[   29.998925]  ret_from_fork_asm+0x1a/0x30
[   29.999236]  </TASK>
[   29.999426] 
[   29.999576] Allocated by task 273:
[   29.999797]  kasan_save_stack+0x3d/0x60
[   30.000241]  kasan_save_track+0x18/0x40
[   30.000652]  kasan_save_alloc_info+0x3b/0x50
[   30.001262]  __kasan_kmalloc+0xb7/0xc0
[   30.001730]  __kmalloc_cache_noprof+0x184/0x410
[   30.002246]  kasan_atomics+0x96/0x310
[   30.002680]  kunit_try_run_case+0x1b3/0x490
[   30.003147]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   30.003904]  kthread+0x257/0x310
[   30.004285]  ret_from_fork+0x41/0x80
[   30.004723]  ret_from_fork_asm+0x1a/0x30
[   30.005063] 
[   30.005221] The buggy address belongs to the object at ffff888101abdc80
[   30.005221]  which belongs to the cache kmalloc-64 of size 64
[   30.006261] The buggy address is located 0 bytes to the right of
[   30.006261]  allocated 48-byte region [ffff888101abdc80, ffff888101abdcb0)
[   30.007004] 
[   30.007172] The buggy address belongs to the physical page:
[   30.007476] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101abd
[   30.007901] flags: 0x200000000000000(node=0|zone=2)
[   30.008390] page_type: f5(slab)
[   30.008753] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   30.009645] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   30.010265] page dumped because: kasan: bad access detected
[   30.010738] 
[   30.010987] Memory state around the buggy address:
[   30.011463]  ffff888101abdb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   30.011977]  ffff888101abdc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   30.012578] >ffff888101abdc80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   30.013065]                                      ^
[   30.013667]  ffff888101abdd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.014184]  ffff888101abdd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.014752] ==================================================================
[   29.613655] ==================================================================
[   29.614299] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x698/0x5450
[   29.615036] Write of size 4 at addr ffff888101abdcb0 by task kunit_try_catch/273
[   29.615747] 
[   29.616015] CPU: 0 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241122 #1
[   29.616930] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.617320] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   29.618115] Call Trace:
[   29.618473]  <TASK>
[   29.618755]  dump_stack_lvl+0x73/0xb0
[   29.619148]  print_report+0xd1/0x640
[   29.619750]  ? __virt_addr_valid+0x1db/0x2d0
[   29.620211]  ? kasan_complete_mode_report_info+0x2a/0x200
[   29.620709]  kasan_report+0x102/0x140
[   29.621077]  ? kasan_atomics_helper+0x698/0x5450
[   29.621546]  ? kasan_atomics_helper+0x698/0x5450
[   29.623534]  kasan_check_range+0x10c/0x1c0
[   29.623921]  __kasan_check_write+0x18/0x20
[   29.624240]  kasan_atomics_helper+0x698/0x5450
[   29.624674]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   29.625283]  ? ret_from_fork_asm+0x1a/0x30
[   29.625696]  ? ret_from_fork+0x41/0x80
[   29.626031]  kasan_atomics+0x1dd/0x310
[   29.626429]  ? __pfx_kasan_atomics+0x10/0x10
[   29.626916]  ? __pfx_read_tsc+0x10/0x10
[   29.627223]  ? ktime_get_ts64+0x84/0x230
[   29.627709]  kunit_try_run_case+0x1b3/0x490
[   29.628081]  ? __pfx_kunit_try_run_case+0x10/0x10
[   29.628523]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   29.629002]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   29.629572]  ? __kthread_parkme+0x82/0x160
[   29.629963]  ? preempt_count_sub+0x50/0x80
[   29.630459]  ? __pfx_kunit_try_run_case+0x10/0x10
[   29.630770]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   29.631425]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   29.631963]  kthread+0x257/0x310
[   29.632343]  ? __pfx_kthread+0x10/0x10
[   29.632628]  ret_from_fork+0x41/0x80
[   29.633040]  ? __pfx_kthread+0x10/0x10
[   29.633497]  ret_from_fork_asm+0x1a/0x30
[   29.633991]  </TASK>
[   29.634278] 
[   29.634460] Allocated by task 273:
[   29.634691]  kasan_save_stack+0x3d/0x60
[   29.634984]  kasan_save_track+0x18/0x40
[   29.635440]  kasan_save_alloc_info+0x3b/0x50
[   29.635905]  __kasan_kmalloc+0xb7/0xc0
[   29.636338]  __kmalloc_cache_noprof+0x184/0x410
[   29.636917]  kasan_atomics+0x96/0x310
[   29.637207]  kunit_try_run_case+0x1b3/0x490
[   29.637689]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   29.638080]  kthread+0x257/0x310
[   29.638499]  ret_from_fork+0x41/0x80
[   29.638800]  ret_from_fork_asm+0x1a/0x30
[   29.639200] 
[   29.639401] The buggy address belongs to the object at ffff888101abdc80
[   29.639401]  which belongs to the cache kmalloc-64 of size 64
[   29.640436] The buggy address is located 0 bytes to the right of
[   29.640436]  allocated 48-byte region [ffff888101abdc80, ffff888101abdcb0)
[   29.641105] 
[   29.641372] The buggy address belongs to the physical page:
[   29.641891] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101abd
[   29.642479] flags: 0x200000000000000(node=0|zone=2)
[   29.642940] page_type: f5(slab)
[   29.643322] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   29.643813] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   29.644401] page dumped because: kasan: bad access detected
[   29.644699] 
[   29.644940] Memory state around the buggy address:
[   29.645447]  ffff888101abdb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.646114]  ffff888101abdc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.646789] >ffff888101abdc80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   29.647321]                                      ^
[   29.647610]  ffff888101abdd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.648291]  ffff888101abdd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.648929] ==================================================================
[   30.991900] ==================================================================
[   30.993337] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1780/0x5450
[   30.993849] Write of size 8 at addr ffff888101abdcb0 by task kunit_try_catch/273
[   30.994571] 
[   30.994842] CPU: 0 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241122 #1
[   30.996120] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.996541] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   30.997244] Call Trace:
[   30.997877]  <TASK>
[   30.998100]  dump_stack_lvl+0x73/0xb0
[   30.998968]  print_report+0xd1/0x640
[   30.999209]  ? __virt_addr_valid+0x1db/0x2d0
[   30.999917]  ? kasan_complete_mode_report_info+0x2a/0x200
[   31.000723]  kasan_report+0x102/0x140
[   31.001122]  ? kasan_atomics_helper+0x1780/0x5450
[   31.001893]  ? kasan_atomics_helper+0x1780/0x5450
[   31.002635]  kasan_check_range+0x10c/0x1c0
[   31.003061]  __kasan_check_write+0x18/0x20
[   31.003774]  kasan_atomics_helper+0x1780/0x5450
[   31.004232]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   31.004991]  ? ret_from_fork_asm+0x1a/0x30
[   31.005691]  ? ret_from_fork+0x41/0x80
[   31.006115]  kasan_atomics+0x1dd/0x310
[   31.006807]  ? __pfx_kasan_atomics+0x10/0x10
[   31.007267]  ? __pfx_read_tsc+0x10/0x10
[   31.008275]  ? ktime_get_ts64+0x84/0x230
[   31.008645]  kunit_try_run_case+0x1b3/0x490
[   31.009366]  ? __pfx_kunit_try_run_case+0x10/0x10
[   31.009787]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   31.010729]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   31.011196]  ? __kthread_parkme+0x82/0x160
[   31.011939]  ? preempt_count_sub+0x50/0x80
[   31.012598]  ? __pfx_kunit_try_run_case+0x10/0x10
[   31.013066]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   31.013944]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   31.014647]  kthread+0x257/0x310
[   31.015081]  ? __pfx_kthread+0x10/0x10
[   31.015843]  ret_from_fork+0x41/0x80
[   31.016458]  ? __pfx_kthread+0x10/0x10
[   31.016933]  ret_from_fork_asm+0x1a/0x30
[   31.017306]  </TASK>
[   31.018077] 
[   31.018234] Allocated by task 273:
[   31.018477]  kasan_save_stack+0x3d/0x60
[   31.019405]  kasan_save_track+0x18/0x40
[   31.019807]  kasan_save_alloc_info+0x3b/0x50
[   31.020581]  __kasan_kmalloc+0xb7/0xc0
[   31.020975]  __kmalloc_cache_noprof+0x184/0x410
[   31.021371]  kasan_atomics+0x96/0x310
[   31.022157]  kunit_try_run_case+0x1b3/0x490
[   31.022624]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   31.023459]  kthread+0x257/0x310
[   31.023841]  ret_from_fork+0x41/0x80
[   31.024249]  ret_from_fork_asm+0x1a/0x30
[   31.025355] 
[   31.025500] The buggy address belongs to the object at ffff888101abdc80
[   31.025500]  which belongs to the cache kmalloc-64 of size 64
[   31.026195] The buggy address is located 0 bytes to the right of
[   31.026195]  allocated 48-byte region [ffff888101abdc80, ffff888101abdcb0)
[   31.027649] 
[   31.027893] The buggy address belongs to the physical page:
[   31.028479] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101abd
[   31.029199] flags: 0x200000000000000(node=0|zone=2)
[   31.029754] page_type: f5(slab)
[   31.030151] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   31.031365] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   31.032034] page dumped because: kasan: bad access detected
[   31.032949] 
[   31.033172] Memory state around the buggy address:
[   31.034392]  ffff888101abdb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   31.034894]  ffff888101abdc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   31.035499] >ffff888101abdc80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   31.036491]                                      ^
[   31.036779]  ffff888101abdd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.037412]  ffff888101abdd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.037965] ==================================================================
[   31.039689] ==================================================================
[   31.040113] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1819/0x5450
[   31.041609] Write of size 8 at addr ffff888101abdcb0 by task kunit_try_catch/273
[   31.042117] 
[   31.042959] CPU: 0 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241122 #1
[   31.043749] Tainted: [B]=BAD_PAGE, [N]=TEST
[   31.044117] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   31.044846] Call Trace:
[   31.045122]  <TASK>
[   31.045346]  dump_stack_lvl+0x73/0xb0
[   31.045689]  print_report+0xd1/0x640
[   31.046759]  ? __virt_addr_valid+0x1db/0x2d0
[   31.047426]  ? kasan_complete_mode_report_info+0x2a/0x200
[   31.047790]  kasan_report+0x102/0x140
[   31.048778]  ? kasan_atomics_helper+0x1819/0x5450
[   31.049251]  ? kasan_atomics_helper+0x1819/0x5450
[   31.050128]  kasan_check_range+0x10c/0x1c0
[   31.050741]  __kasan_check_write+0x18/0x20
[   31.051154]  kasan_atomics_helper+0x1819/0x5450
[   31.052068]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   31.052887]  ? ret_from_fork_asm+0x1a/0x30
[   31.053267]  ? ret_from_fork+0x41/0x80
[   31.053747]  kasan_atomics+0x1dd/0x310
[   31.054184]  ? __pfx_kasan_atomics+0x10/0x10
[   31.055190]  ? __pfx_read_tsc+0x10/0x10
[   31.055568]  ? ktime_get_ts64+0x84/0x230
[   31.056331]  kunit_try_run_case+0x1b3/0x490
[   31.056733]  ? __pfx_kunit_try_run_case+0x10/0x10
[   31.057314]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   31.057953]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   31.058353]  ? __kthread_parkme+0x82/0x160
[   31.058740]  ? preempt_count_sub+0x50/0x80
[   31.059183]  ? __pfx_kunit_try_run_case+0x10/0x10
[   31.059585]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   31.060665]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   31.061322]  kthread+0x257/0x310
[   31.061928]  ? __pfx_kthread+0x10/0x10
[   31.062573]  ret_from_fork+0x41/0x80
[   31.063125]  ? __pfx_kthread+0x10/0x10
[   31.063580]  ret_from_fork_asm+0x1a/0x30
[   31.064357]  </TASK>
[   31.064784] 
[   31.064969] Allocated by task 273:
[   31.065843]  kasan_save_stack+0x3d/0x60
[   31.066178]  kasan_save_track+0x18/0x40
[   31.066657]  kasan_save_alloc_info+0x3b/0x50
[   31.067169]  __kasan_kmalloc+0xb7/0xc0
[   31.068071]  __kmalloc_cache_noprof+0x184/0x410
[   31.068750]  kasan_atomics+0x96/0x310
[   31.069380]  kunit_try_run_case+0x1b3/0x490
[   31.069798]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   31.070789]  kthread+0x257/0x310
[   31.071135]  ret_from_fork+0x41/0x80
[   31.071519]  ret_from_fork_asm+0x1a/0x30
[   31.072480] 
[   31.072675] The buggy address belongs to the object at ffff888101abdc80
[   31.072675]  which belongs to the cache kmalloc-64 of size 64
[   31.074199] The buggy address is located 0 bytes to the right of
[   31.074199]  allocated 48-byte region [ffff888101abdc80, ffff888101abdcb0)
[   31.075091] 
[   31.075533] The buggy address belongs to the physical page:
[   31.076230] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101abd
[   31.076627] flags: 0x200000000000000(node=0|zone=2)
[   31.077121] page_type: f5(slab)
[   31.077475] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   31.078840] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   31.079572] page dumped because: kasan: bad access detected
[   31.079954] 
[   31.080477] Memory state around the buggy address:
[   31.080953]  ffff888101abdb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   31.081622]  ffff888101abdc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   31.082202] >ffff888101abdc80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   31.082732]                                      ^
[   31.083804]  ffff888101abdd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.084767]  ffff888101abdd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.085266] ==================================================================
[   29.189406] ==================================================================
[   29.190483] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4bbe/0x5450
[   29.191413] Read of size 4 at addr ffff888101abdcb0 by task kunit_try_catch/273
[   29.192221] 
[   29.192902] CPU: 0 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241122 #1
[   29.193643] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.194198] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   29.195012] Call Trace:
[   29.195874]  <TASK>
[   29.196176]  dump_stack_lvl+0x73/0xb0
[   29.197129]  print_report+0xd1/0x640
[   29.197493]  ? __virt_addr_valid+0x1db/0x2d0
[   29.198068]  ? kasan_complete_mode_report_info+0x2a/0x200
[   29.198626]  kasan_report+0x102/0x140
[   29.198924]  ? kasan_atomics_helper+0x4bbe/0x5450
[   29.199508]  ? kasan_atomics_helper+0x4bbe/0x5450
[   29.200304]  __asan_report_load4_noabort+0x18/0x20
[   29.200804]  kasan_atomics_helper+0x4bbe/0x5450
[   29.201645]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   29.202495]  ? ret_from_fork_asm+0x1a/0x30
[   29.202842]  ? ret_from_fork+0x41/0x80
[   29.203143]  kasan_atomics+0x1dd/0x310
[   29.203810]  ? __pfx_kasan_atomics+0x10/0x10
[   29.204571]  ? __pfx_read_tsc+0x10/0x10
[   29.205028]  ? ktime_get_ts64+0x84/0x230
[   29.205775]  kunit_try_run_case+0x1b3/0x490
[   29.206119]  ? __pfx_kunit_try_run_case+0x10/0x10
[   29.206977]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   29.207697]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   29.208340]  ? __kthread_parkme+0x82/0x160
[   29.208638]  ? preempt_count_sub+0x50/0x80
[   29.209203]  ? __pfx_kunit_try_run_case+0x10/0x10
[   29.209837]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   29.210624]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   29.211336]  kthread+0x257/0x310
[   29.211629]  ? __pfx_kthread+0x10/0x10
[   29.212642]  ret_from_fork+0x41/0x80
[   29.213611]  ? __pfx_kthread+0x10/0x10
[   29.214297]  ret_from_fork_asm+0x1a/0x30
[   29.214725]  </TASK>
[   29.214969] 
[   29.215136] Allocated by task 273:
[   29.216718]  kasan_save_stack+0x3d/0x60
[   29.217627]  kasan_save_track+0x18/0x40
[   29.218435]  kasan_save_alloc_info+0x3b/0x50
[   29.218804]  __kasan_kmalloc+0xb7/0xc0
[   29.219354]  __kmalloc_cache_noprof+0x184/0x410
[   29.219966]  kasan_atomics+0x96/0x310
[   29.220380]  kunit_try_run_case+0x1b3/0x490
[   29.220713]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   29.221229]  kthread+0x257/0x310
[   29.221539]  ret_from_fork+0x41/0x80
[   29.222527]  ret_from_fork_asm+0x1a/0x30
[   29.222807] 
[   29.223273] The buggy address belongs to the object at ffff888101abdc80
[   29.223273]  which belongs to the cache kmalloc-64 of size 64
[   29.224204] The buggy address is located 0 bytes to the right of
[   29.224204]  allocated 48-byte region [ffff888101abdc80, ffff888101abdcb0)
[   29.225243] 
[   29.225512] The buggy address belongs to the physical page:
[   29.226441] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101abd
[   29.227318] flags: 0x200000000000000(node=0|zone=2)
[   29.227838] page_type: f5(slab)
[   29.228320] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   29.229223] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   29.230434] page dumped because: kasan: bad access detected
[   29.230754] 
[   29.230984] Memory state around the buggy address:
[   29.231540]  ffff888101abdb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.232347]  ffff888101abdc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.233048] >ffff888101abdc80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   29.233712]                                      ^
[   29.234221]  ffff888101abdd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.234686]  ffff888101abdd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.236050] ==================================================================
[   29.570281] ==================================================================
[   29.570910] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x5ff/0x5450
[   29.572550] Write of size 4 at addr ffff888101abdcb0 by task kunit_try_catch/273
[   29.573139] 
[   29.573417] CPU: 0 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241122 #1
[   29.574057] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.574314] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   29.575130] Call Trace:
[   29.575565]  <TASK>
[   29.575894]  dump_stack_lvl+0x73/0xb0
[   29.576341]  print_report+0xd1/0x640
[   29.576736]  ? __virt_addr_valid+0x1db/0x2d0
[   29.577068]  ? kasan_complete_mode_report_info+0x2a/0x200
[   29.577501]  kasan_report+0x102/0x140
[   29.577979]  ? kasan_atomics_helper+0x5ff/0x5450
[   29.578684]  ? kasan_atomics_helper+0x5ff/0x5450
[   29.579299]  kasan_check_range+0x10c/0x1c0
[   29.579736]  __kasan_check_write+0x18/0x20
[   29.580075]  kasan_atomics_helper+0x5ff/0x5450
[   29.580386]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   29.580724]  ? ret_from_fork_asm+0x1a/0x30
[   29.581361]  ? ret_from_fork+0x41/0x80
[   29.581812]  kasan_atomics+0x1dd/0x310
[   29.582303]  ? __pfx_kasan_atomics+0x10/0x10
[   29.582801]  ? __pfx_read_tsc+0x10/0x10
[   29.583221]  ? ktime_get_ts64+0x84/0x230
[   29.583710]  kunit_try_run_case+0x1b3/0x490
[   29.584035]  ? __pfx_kunit_try_run_case+0x10/0x10
[   29.584393]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   29.584921]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   29.585592]  ? __kthread_parkme+0x82/0x160
[   29.586056]  ? preempt_count_sub+0x50/0x80
[   29.586615]  ? __pfx_kunit_try_run_case+0x10/0x10
[   29.586991]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   29.587354]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   29.587689]  kthread+0x257/0x310
[   29.587963]  ? __pfx_kthread+0x10/0x10
[   29.588478]  ret_from_fork+0x41/0x80
[   29.588976]  ? __pfx_kthread+0x10/0x10
[   29.589419]  ret_from_fork_asm+0x1a/0x30
[   29.589925]  </TASK>
[   29.590239] 
[   29.590458] Allocated by task 273:
[   29.590811]  kasan_save_stack+0x3d/0x60
[   29.591255]  kasan_save_track+0x18/0x40
[   29.591684]  kasan_save_alloc_info+0x3b/0x50
[   29.592112]  __kasan_kmalloc+0xb7/0xc0
[   29.592538]  __kmalloc_cache_noprof+0x184/0x410
[   29.593019]  kasan_atomics+0x96/0x310
[   29.593289]  kunit_try_run_case+0x1b3/0x490
[   29.593734]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   29.595395]  kthread+0x257/0x310
[   29.595780]  ret_from_fork+0x41/0x80
[   29.596205]  ret_from_fork_asm+0x1a/0x30
[   29.596611] 
[   29.596786] The buggy address belongs to the object at ffff888101abdc80
[   29.596786]  which belongs to the cache kmalloc-64 of size 64
[   29.600463] The buggy address is located 0 bytes to the right of
[   29.600463]  allocated 48-byte region [ffff888101abdc80, ffff888101abdcb0)
[   29.601250] 
[   29.601481] The buggy address belongs to the physical page:
[   29.602571] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101abd
[   29.603504] flags: 0x200000000000000(node=0|zone=2)
[   29.604084] page_type: f5(slab)
[   29.604554] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   29.605260] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   29.605897] page dumped because: kasan: bad access detected
[   29.606394] 
[   29.606569] Memory state around the buggy address:
[   29.608083]  ffff888101abdb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.608456]  ffff888101abdc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.609691] >ffff888101abdc80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   29.610158]                                      ^
[   29.611050]  ffff888101abdd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.611494]  ffff888101abdd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.612291] ==================================================================
[   29.903378] ==================================================================
[   29.903977] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xac8/0x5450
[   29.904512] Write of size 4 at addr ffff888101abdcb0 by task kunit_try_catch/273
[   29.905216] 
[   29.905492] CPU: 0 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241122 #1
[   29.906209] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.906644] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   29.907104] Call Trace:
[   29.907506]  <TASK>
[   29.907795]  dump_stack_lvl+0x73/0xb0
[   29.908311]  print_report+0xd1/0x640
[   29.908731]  ? __virt_addr_valid+0x1db/0x2d0
[   29.909185]  ? kasan_complete_mode_report_info+0x2a/0x200
[   29.909747]  kasan_report+0x102/0x140
[   29.910129]  ? kasan_atomics_helper+0xac8/0x5450
[   29.910659]  ? kasan_atomics_helper+0xac8/0x5450
[   29.911086]  kasan_check_range+0x10c/0x1c0
[   29.911632]  __kasan_check_write+0x18/0x20
[   29.912053]  kasan_atomics_helper+0xac8/0x5450
[   29.912471]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   29.913014]  ? ret_from_fork_asm+0x1a/0x30
[   29.913515]  ? ret_from_fork+0x41/0x80
[   29.913946]  kasan_atomics+0x1dd/0x310
[   29.914238]  ? __pfx_kasan_atomics+0x10/0x10
[   29.914596]  ? __pfx_read_tsc+0x10/0x10
[   29.914895]  ? ktime_get_ts64+0x84/0x230
[   29.915391]  kunit_try_run_case+0x1b3/0x490
[   29.915927]  ? __pfx_kunit_try_run_case+0x10/0x10
[   29.916498]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   29.917012]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   29.917607]  ? __kthread_parkme+0x82/0x160
[   29.918093]  ? preempt_count_sub+0x50/0x80
[   29.918627]  ? __pfx_kunit_try_run_case+0x10/0x10
[   29.919038]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   29.920151]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   29.920718]  kthread+0x257/0x310
[   29.923559]  ? __pfx_kthread+0x10/0x10
[   29.924001]  ret_from_fork+0x41/0x80
[   29.924620]  ? __pfx_kthread+0x10/0x10
[   29.925053]  ret_from_fork_asm+0x1a/0x30
[   29.925864]  </TASK>
[   29.926211] 
[   29.926653] Allocated by task 273:
[   29.927008]  kasan_save_stack+0x3d/0x60
[   29.927692]  kasan_save_track+0x18/0x40
[   29.927985]  kasan_save_alloc_info+0x3b/0x50
[   29.928805]  __kasan_kmalloc+0xb7/0xc0
[   29.929110]  __kmalloc_cache_noprof+0x184/0x410
[   29.929859]  kasan_atomics+0x96/0x310
[   29.930232]  kunit_try_run_case+0x1b3/0x490
[   29.930722]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   29.931197]  kthread+0x257/0x310
[   29.931566]  ret_from_fork+0x41/0x80
[   29.931937]  ret_from_fork_asm+0x1a/0x30
[   29.932391] 
[   29.932660] The buggy address belongs to the object at ffff888101abdc80
[   29.932660]  which belongs to the cache kmalloc-64 of size 64
[   29.933266] The buggy address is located 0 bytes to the right of
[   29.933266]  allocated 48-byte region [ffff888101abdc80, ffff888101abdcb0)
[   29.934319] 
[   29.934558] The buggy address belongs to the physical page:
[   29.934918] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101abd
[   29.935345] flags: 0x200000000000000(node=0|zone=2)
[   29.935884] page_type: f5(slab)
[   29.936362] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   29.937055] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   29.937564] page dumped because: kasan: bad access detected
[   29.938121] 
[   29.938274] Memory state around the buggy address:
[   29.938912]  ffff888101abdb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.939496]  ffff888101abdc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.939964] >ffff888101abdc80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   29.940327]                                      ^
[   29.940611]  ffff888101abdd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.941308]  ffff888101abdd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.942179] ==================================================================
[   31.727137] ==================================================================
[   31.728789] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x20c9/0x5450
[   31.729537] Write of size 8 at addr ffff888101abdcb0 by task kunit_try_catch/273
[   31.730250] 
[   31.730546] CPU: 0 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241122 #1
[   31.731280] Tainted: [B]=BAD_PAGE, [N]=TEST
[   31.731891] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   31.732617] Call Trace:
[   31.733033]  <TASK>
[   31.733331]  dump_stack_lvl+0x73/0xb0
[   31.733701]  print_report+0xd1/0x640
[   31.734215]  ? __virt_addr_valid+0x1db/0x2d0
[   31.734702]  ? kasan_complete_mode_report_info+0x2a/0x200
[   31.735306]  kasan_report+0x102/0x140
[   31.735863]  ? kasan_atomics_helper+0x20c9/0x5450
[   31.736290]  ? kasan_atomics_helper+0x20c9/0x5450
[   31.736847]  kasan_check_range+0x10c/0x1c0
[   31.737374]  __kasan_check_write+0x18/0x20
[   31.737738]  kasan_atomics_helper+0x20c9/0x5450
[   31.738282]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   31.738684]  ? ret_from_fork_asm+0x1a/0x30
[   31.739193]  ? ret_from_fork+0x41/0x80
[   31.739629]  kasan_atomics+0x1dd/0x310
[   31.740162]  ? __pfx_kasan_atomics+0x10/0x10
[   31.740557]  ? __pfx_read_tsc+0x10/0x10
[   31.741093]  ? ktime_get_ts64+0x84/0x230
[   31.741497]  kunit_try_run_case+0x1b3/0x490
[   31.742014]  ? __pfx_kunit_try_run_case+0x10/0x10
[   31.742652]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   31.743223]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   31.743578]  ? __kthread_parkme+0x82/0x160
[   31.744469]  ? preempt_count_sub+0x50/0x80
[   31.745338]  ? __pfx_kunit_try_run_case+0x10/0x10
[   31.745684]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   31.746288]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   31.746717]  kthread+0x257/0x310
[   31.747711]  ? __pfx_kthread+0x10/0x10
[   31.748531]  ret_from_fork+0x41/0x80
[   31.748811]  ? __pfx_kthread+0x10/0x10
[   31.749752]  ret_from_fork_asm+0x1a/0x30
[   31.750238]  </TASK>
[   31.750575] 
[   31.750832] Allocated by task 273:
[   31.751263]  kasan_save_stack+0x3d/0x60
[   31.751801]  kasan_save_track+0x18/0x40
[   31.752338]  kasan_save_alloc_info+0x3b/0x50
[   31.752882]  __kasan_kmalloc+0xb7/0xc0
[   31.753407]  __kmalloc_cache_noprof+0x184/0x410
[   31.753965]  kasan_atomics+0x96/0x310
[   31.754456]  kunit_try_run_case+0x1b3/0x490
[   31.755007]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   31.755615]  kthread+0x257/0x310
[   31.756107]  ret_from_fork+0x41/0x80
[   31.756712]  ret_from_fork_asm+0x1a/0x30
[   31.757227] 
[   31.757475] The buggy address belongs to the object at ffff888101abdc80
[   31.757475]  which belongs to the cache kmalloc-64 of size 64
[   31.758719] The buggy address is located 0 bytes to the right of
[   31.758719]  allocated 48-byte region [ffff888101abdc80, ffff888101abdcb0)
[   31.760002] 
[   31.760244] The buggy address belongs to the physical page:
[   31.760882] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101abd
[   31.761470] flags: 0x200000000000000(node=0|zone=2)
[   31.761650] page_type: f5(slab)
[   31.761785] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   31.762288] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   31.762806] page dumped because: kasan: bad access detected
[   31.763251] 
[   31.763524] Memory state around the buggy address:
[   31.764008]  ffff888101abdb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   31.764401]  ffff888101abdc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   31.764802] >ffff888101abdc80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   31.765487]                                      ^
[   31.766151]  ffff888101abdd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.766592]  ffff888101abdd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.767104] ==================================================================
[   31.807674] ==================================================================
[   31.808633] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x218b/0x5450
[   31.809352] Write of size 8 at addr ffff888101abdcb0 by task kunit_try_catch/273
[   31.809937] 
[   31.810119] CPU: 0 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241122 #1
[   31.810612] Tainted: [B]=BAD_PAGE, [N]=TEST
[   31.811085] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   31.811938] Call Trace:
[   31.812289]  <TASK>
[   31.812582]  dump_stack_lvl+0x73/0xb0
[   31.813077]  print_report+0xd1/0x640
[   31.814616]  ? __virt_addr_valid+0x1db/0x2d0
[   31.814963]  ? kasan_complete_mode_report_info+0x2a/0x200
[   31.815360]  kasan_report+0x102/0x140
[   31.815682]  ? kasan_atomics_helper+0x218b/0x5450
[   31.817932]  ? kasan_atomics_helper+0x218b/0x5450
[   31.818332]  kasan_check_range+0x10c/0x1c0
[   31.818793]  __kasan_check_write+0x18/0x20
[   31.819148]  kasan_atomics_helper+0x218b/0x5450
[   31.819691]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   31.820169]  ? ret_from_fork_asm+0x1a/0x30
[   31.820466]  ? ret_from_fork+0x41/0x80
[   31.821045]  kasan_atomics+0x1dd/0x310
[   31.821569]  ? __pfx_kasan_atomics+0x10/0x10
[   31.822247]  ? __pfx_read_tsc+0x10/0x10
[   31.822784]  ? ktime_get_ts64+0x84/0x230
[   31.823326]  kunit_try_run_case+0x1b3/0x490
[   31.823888]  ? __pfx_kunit_try_run_case+0x10/0x10
[   31.824574]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   31.825164]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   31.825787]  ? __kthread_parkme+0x82/0x160
[   31.826409]  ? preempt_count_sub+0x50/0x80
[   31.826763]  ? __pfx_kunit_try_run_case+0x10/0x10
[   31.827355]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   31.828090]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   31.828800]  kthread+0x257/0x310
[   31.829151]  ? __pfx_kthread+0x10/0x10
[   31.829651]  ret_from_fork+0x41/0x80
[   31.830185]  ? __pfx_kthread+0x10/0x10
[   31.830636]  ret_from_fork_asm+0x1a/0x30
[   31.831103]  </TASK>
[   31.831465] 
[   31.831640] Allocated by task 273:
[   31.831957]  kasan_save_stack+0x3d/0x60
[   31.832370]  kasan_save_track+0x18/0x40
[   31.832893]  kasan_save_alloc_info+0x3b/0x50
[   31.833382]  __kasan_kmalloc+0xb7/0xc0
[   31.833729]  __kmalloc_cache_noprof+0x184/0x410
[   31.834230]  kasan_atomics+0x96/0x310
[   31.834634]  kunit_try_run_case+0x1b3/0x490
[   31.835144]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   31.835609]  kthread+0x257/0x310
[   31.835936]  ret_from_fork+0x41/0x80
[   31.836519]  ret_from_fork_asm+0x1a/0x30
[   31.836973] 
[   31.837197] The buggy address belongs to the object at ffff888101abdc80
[   31.837197]  which belongs to the cache kmalloc-64 of size 64
[   31.838228] The buggy address is located 0 bytes to the right of
[   31.838228]  allocated 48-byte region [ffff888101abdc80, ffff888101abdcb0)
[   31.839165] 
[   31.839458] The buggy address belongs to the physical page:
[   31.839921] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101abd
[   31.840361] flags: 0x200000000000000(node=0|zone=2)
[   31.841020] page_type: f5(slab)
[   31.841470] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   31.842065] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   31.842681] page dumped because: kasan: bad access detected
[   31.843232] 
[   31.843453] Memory state around the buggy address:
[   31.843844]  ffff888101abdb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   31.844217]  ffff888101abdc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   31.844900] >ffff888101abdc80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   31.845798]                                      ^
[   31.846263]  ffff888101abdd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.846752]  ffff888101abdd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.847131] ==================================================================
[   31.396710] ==================================================================
[   31.397349] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1ce2/0x5450
[   31.397610] Write of size 8 at addr ffff888101abdcb0 by task kunit_try_catch/273
[   31.397861] 
[   31.398105] CPU: 0 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241122 #1
[   31.399114] Tainted: [B]=BAD_PAGE, [N]=TEST
[   31.399645] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   31.400484] Call Trace:
[   31.400800]  <TASK>
[   31.401183]  dump_stack_lvl+0x73/0xb0
[   31.401647]  print_report+0xd1/0x640
[   31.402090]  ? __virt_addr_valid+0x1db/0x2d0
[   31.402626]  ? kasan_complete_mode_report_info+0x2a/0x200
[   31.403162]  kasan_report+0x102/0x140
[   31.403686]  ? kasan_atomics_helper+0x1ce2/0x5450
[   31.404122]  ? kasan_atomics_helper+0x1ce2/0x5450
[   31.404732]  kasan_check_range+0x10c/0x1c0
[   31.405161]  __kasan_check_write+0x18/0x20
[   31.405570]  kasan_atomics_helper+0x1ce2/0x5450
[   31.406122]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   31.406683]  ? ret_from_fork_asm+0x1a/0x30
[   31.407228]  ? ret_from_fork+0x41/0x80
[   31.407718]  kasan_atomics+0x1dd/0x310
[   31.408117]  ? __pfx_kasan_atomics+0x10/0x10
[   31.408682]  ? __pfx_read_tsc+0x10/0x10
[   31.409211]  ? ktime_get_ts64+0x84/0x230
[   31.409650]  kunit_try_run_case+0x1b3/0x490
[   31.410219]  ? __pfx_kunit_try_run_case+0x10/0x10
[   31.410743]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   31.411200]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   31.411803]  ? __kthread_parkme+0x82/0x160
[   31.412393]  ? preempt_count_sub+0x50/0x80
[   31.412889]  ? __pfx_kunit_try_run_case+0x10/0x10
[   31.413496]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   31.414071]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   31.414839]  kthread+0x257/0x310
[   31.415429]  ? __pfx_kthread+0x10/0x10
[   31.415975]  ret_from_fork+0x41/0x80
[   31.416416]  ? __pfx_kthread+0x10/0x10
[   31.416654]  ret_from_fork_asm+0x1a/0x30
[   31.417209]  </TASK>
[   31.417611] 
[   31.417842] Allocated by task 273:
[   31.418137]  kasan_save_stack+0x3d/0x60
[   31.418622]  kasan_save_track+0x18/0x40
[   31.419184]  kasan_save_alloc_info+0x3b/0x50
[   31.419697]  __kasan_kmalloc+0xb7/0xc0
[   31.420155]  __kmalloc_cache_noprof+0x184/0x410
[   31.420631]  kasan_atomics+0x96/0x310
[   31.421087]  kunit_try_run_case+0x1b3/0x490
[   31.421459]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   31.421781]  kthread+0x257/0x310
[   31.422063]  ret_from_fork+0x41/0x80
[   31.422511]  ret_from_fork_asm+0x1a/0x30
[   31.422956] 
[   31.423288] The buggy address belongs to the object at ffff888101abdc80
[   31.423288]  which belongs to the cache kmalloc-64 of size 64
[   31.424465] The buggy address is located 0 bytes to the right of
[   31.424465]  allocated 48-byte region [ffff888101abdc80, ffff888101abdcb0)
[   31.425571] 
[   31.425883] The buggy address belongs to the physical page:
[   31.426348] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101abd
[   31.426758] flags: 0x200000000000000(node=0|zone=2)
[   31.427322] page_type: f5(slab)
[   31.427723] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   31.428550] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   31.429374] page dumped because: kasan: bad access detected
[   31.429882] 
[   31.430090] Memory state around the buggy address:
[   31.430642]  ffff888101abdb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   31.431319]  ffff888101abdc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   31.431966] >ffff888101abdc80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   31.432359]                                      ^
[   31.432640]  ffff888101abdd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.433272]  ffff888101abdd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.433992] ==================================================================
[   29.525484] ==================================================================
[   29.527625] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x566/0x5450
[   29.528208] Write of size 4 at addr ffff888101abdcb0 by task kunit_try_catch/273
[   29.530669] 
[   29.530887] CPU: 0 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241122 #1
[   29.531865] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.532239] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   29.532999] Call Trace:
[   29.533258]  <TASK>
[   29.533493]  dump_stack_lvl+0x73/0xb0
[   29.534968]  print_report+0xd1/0x640
[   29.535579]  ? __virt_addr_valid+0x1db/0x2d0
[   29.536235]  ? kasan_complete_mode_report_info+0x2a/0x200
[   29.537019]  kasan_report+0x102/0x140
[   29.537617]  ? kasan_atomics_helper+0x566/0x5450
[   29.538264]  ? kasan_atomics_helper+0x566/0x5450
[   29.539012]  kasan_check_range+0x10c/0x1c0
[   29.539659]  __kasan_check_write+0x18/0x20
[   29.540081]  kasan_atomics_helper+0x566/0x5450
[   29.540760]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   29.541459]  ? ret_from_fork_asm+0x1a/0x30
[   29.542078]  ? ret_from_fork+0x41/0x80
[   29.542697]  kasan_atomics+0x1dd/0x310
[   29.543091]  ? __pfx_kasan_atomics+0x10/0x10
[   29.543850]  ? __pfx_read_tsc+0x10/0x10
[   29.544479]  ? ktime_get_ts64+0x84/0x230
[   29.544907]  kunit_try_run_case+0x1b3/0x490
[   29.545630]  ? __pfx_kunit_try_run_case+0x10/0x10
[   29.546272]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   29.547304]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   29.547704]  ? __kthread_parkme+0x82/0x160
[   29.548312]  ? preempt_count_sub+0x50/0x80
[   29.548754]  ? __pfx_kunit_try_run_case+0x10/0x10
[   29.549192]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   29.550387]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   29.550836]  kthread+0x257/0x310
[   29.551457]  ? __pfx_kthread+0x10/0x10
[   29.551838]  ret_from_fork+0x41/0x80
[   29.552103]  ? __pfx_kthread+0x10/0x10
[   29.553044]  ret_from_fork_asm+0x1a/0x30
[   29.553796]  </TASK>
[   29.554023] 
[   29.554492] Allocated by task 273:
[   29.554881]  kasan_save_stack+0x3d/0x60
[   29.555332]  kasan_save_track+0x18/0x40
[   29.555702]  kasan_save_alloc_info+0x3b/0x50
[   29.556087]  __kasan_kmalloc+0xb7/0xc0
[   29.556445]  __kmalloc_cache_noprof+0x184/0x410
[   29.556955]  kasan_atomics+0x96/0x310
[   29.557308]  kunit_try_run_case+0x1b3/0x490
[   29.557585]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   29.558216]  kthread+0x257/0x310
[   29.558620]  ret_from_fork+0x41/0x80
[   29.559074]  ret_from_fork_asm+0x1a/0x30
[   29.559436] 
[   29.559636] The buggy address belongs to the object at ffff888101abdc80
[   29.559636]  which belongs to the cache kmalloc-64 of size 64
[   29.560210] The buggy address is located 0 bytes to the right of
[   29.560210]  allocated 48-byte region [ffff888101abdc80, ffff888101abdcb0)
[   29.561279] 
[   29.561533] The buggy address belongs to the physical page:
[   29.561990] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101abd
[   29.562395] flags: 0x200000000000000(node=0|zone=2)
[   29.562994] page_type: f5(slab)
[   29.563516] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   29.564226] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   29.564632] page dumped because: kasan: bad access detected
[   29.565187] 
[   29.565400] Memory state around the buggy address:
[   29.565852]  ffff888101abdb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.566560]  ffff888101abdc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.567180] >ffff888101abdc80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   29.567661]                                      ^
[   29.568170]  ffff888101abdd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.568785]  ffff888101abdd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.569204] ==================================================================
[   30.560512] ==================================================================
[   30.561927] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x12e7/0x5450
[   30.563330] Write of size 4 at addr ffff888101abdcb0 by task kunit_try_catch/273
[   30.564078] 
[   30.564443] CPU: 0 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241122 #1
[   30.565309] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.565577] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   30.566541] Call Trace:
[   30.566968]  <TASK>
[   30.567293]  dump_stack_lvl+0x73/0xb0
[   30.567806]  print_report+0xd1/0x640
[   30.568464]  ? __virt_addr_valid+0x1db/0x2d0
[   30.569067]  ? kasan_complete_mode_report_info+0x2a/0x200
[   30.569648]  kasan_report+0x102/0x140
[   30.570296]  ? kasan_atomics_helper+0x12e7/0x5450
[   30.570960]  ? kasan_atomics_helper+0x12e7/0x5450
[   30.571641]  kasan_check_range+0x10c/0x1c0
[   30.572350]  __kasan_check_write+0x18/0x20
[   30.572860]  kasan_atomics_helper+0x12e7/0x5450
[   30.573479]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   30.573858]  ? ret_from_fork_asm+0x1a/0x30
[   30.574512]  ? ret_from_fork+0x41/0x80
[   30.575087]  kasan_atomics+0x1dd/0x310
[   30.575637]  ? __pfx_kasan_atomics+0x10/0x10
[   30.575925]  ? __pfx_read_tsc+0x10/0x10
[   30.576471]  ? ktime_get_ts64+0x84/0x230
[   30.576939]  kunit_try_run_case+0x1b3/0x490
[   30.577287]  ? __pfx_kunit_try_run_case+0x10/0x10
[   30.577668]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   30.578132]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   30.578505]  ? __kthread_parkme+0x82/0x160
[   30.578951]  ? preempt_count_sub+0x50/0x80
[   30.579631]  ? __pfx_kunit_try_run_case+0x10/0x10
[   30.580228]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   30.580875]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   30.581394]  kthread+0x257/0x310
[   30.581814]  ? __pfx_kthread+0x10/0x10
[   30.582378]  ret_from_fork+0x41/0x80
[   30.582839]  ? __pfx_kthread+0x10/0x10
[   30.583288]  ret_from_fork_asm+0x1a/0x30
[   30.583794]  </TASK>
[   30.584115] 
[   30.584417] Allocated by task 273:
[   30.584720]  kasan_save_stack+0x3d/0x60
[   30.585237]  kasan_save_track+0x18/0x40
[   30.585712]  kasan_save_alloc_info+0x3b/0x50
[   30.586278]  __kasan_kmalloc+0xb7/0xc0
[   30.586668]  __kmalloc_cache_noprof+0x184/0x410
[   30.587178]  kasan_atomics+0x96/0x310
[   30.587620]  kunit_try_run_case+0x1b3/0x490
[   30.588145]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   30.588642]  kthread+0x257/0x310
[   30.589055]  ret_from_fork+0x41/0x80
[   30.589537]  ret_from_fork_asm+0x1a/0x30
[   30.589995] 
[   30.590304] The buggy address belongs to the object at ffff888101abdc80
[   30.590304]  which belongs to the cache kmalloc-64 of size 64
[   30.591336] The buggy address is located 0 bytes to the right of
[   30.591336]  allocated 48-byte region [ffff888101abdc80, ffff888101abdcb0)
[   30.592232] 
[   30.592587] The buggy address belongs to the physical page:
[   30.593089] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101abd
[   30.593715] flags: 0x200000000000000(node=0|zone=2)
[   30.594329] page_type: f5(slab)
[   30.594755] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   30.595342] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   30.596061] page dumped because: kasan: bad access detected
[   30.596490] 
[   30.596649] Memory state around the buggy address:
[   30.597355]  ffff888101abdb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   30.598040]  ffff888101abdc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   30.598728] >ffff888101abdc80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   30.599391]                                      ^
[   30.599879]  ffff888101abdd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.600635]  ffff888101abdd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.601135] ==================================================================
[   30.731164] ==================================================================
[   30.731653] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1468/0x5450
[   30.732389] Write of size 8 at addr ffff888101abdcb0 by task kunit_try_catch/273
[   30.733100] 
[   30.733335] CPU: 0 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241122 #1
[   30.734086] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.734396] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   30.735225] Call Trace:
[   30.735585]  <TASK>
[   30.735887]  dump_stack_lvl+0x73/0xb0
[   30.736412]  print_report+0xd1/0x640
[   30.736766]  ? __virt_addr_valid+0x1db/0x2d0
[   30.737104]  ? kasan_complete_mode_report_info+0x2a/0x200
[   30.737726]  kasan_report+0x102/0x140
[   30.738152]  ? kasan_atomics_helper+0x1468/0x5450
[   30.738608]  ? kasan_atomics_helper+0x1468/0x5450
[   30.739214]  kasan_check_range+0x10c/0x1c0
[   30.739735]  __kasan_check_write+0x18/0x20
[   30.740209]  kasan_atomics_helper+0x1468/0x5450
[   30.740672]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   30.741165]  ? ret_from_fork_asm+0x1a/0x30
[   30.741691]  ? ret_from_fork+0x41/0x80
[   30.742116]  kasan_atomics+0x1dd/0x310
[   30.742461]  ? __pfx_kasan_atomics+0x10/0x10
[   30.742770]  ? __pfx_read_tsc+0x10/0x10
[   30.743218]  ? ktime_get_ts64+0x84/0x230
[   30.743753]  kunit_try_run_case+0x1b3/0x490
[   30.744237]  ? __pfx_kunit_try_run_case+0x10/0x10
[   30.744764]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   30.745357]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   30.745797]  ? __kthread_parkme+0x82/0x160
[   30.746300]  ? preempt_count_sub+0x50/0x80
[   30.746607]  ? __pfx_kunit_try_run_case+0x10/0x10
[   30.747110]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   30.747785]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   30.748430]  kthread+0x257/0x310
[   30.748843]  ? __pfx_kthread+0x10/0x10
[   30.749311]  ret_from_fork+0x41/0x80
[   30.749682]  ? __pfx_kthread+0x10/0x10
[   30.750162]  ret_from_fork_asm+0x1a/0x30
[   30.750680]  </TASK>
[   30.751010] 
[   30.751203] Allocated by task 273:
[   30.751610]  kasan_save_stack+0x3d/0x60
[   30.751939]  kasan_save_track+0x18/0x40
[   30.752447]  kasan_save_alloc_info+0x3b/0x50
[   30.752888]  __kasan_kmalloc+0xb7/0xc0
[   30.753346]  __kmalloc_cache_noprof+0x184/0x410
[   30.753790]  kasan_atomics+0x96/0x310
[   30.754168]  kunit_try_run_case+0x1b3/0x490
[   30.754676]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   30.755166]  kthread+0x257/0x310
[   30.755592]  ret_from_fork+0x41/0x80
[   30.756059]  ret_from_fork_asm+0x1a/0x30
[   30.756610] 
[   30.756899] The buggy address belongs to the object at ffff888101abdc80
[   30.756899]  which belongs to the cache kmalloc-64 of size 64
[   30.757689] The buggy address is located 0 bytes to the right of
[   30.757689]  allocated 48-byte region [ffff888101abdc80, ffff888101abdcb0)
[   30.758973] 
[   30.759317] The buggy address belongs to the physical page:
[   30.759920] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101abd
[   30.760771] flags: 0x200000000000000(node=0|zone=2)
[   30.761375] page_type: f5(slab)
[   30.761807] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   30.762622] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   30.763432] page dumped because: kasan: bad access detected
[   30.763987] 
[   30.764139] Memory state around the buggy address:
[   30.764664]  ffff888101abdb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   30.765469]  ffff888101abdc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   30.766239] >ffff888101abdc80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   30.767051]                                      ^
[   30.767607]  ffff888101abdd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.768059]  ffff888101abdd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.768607] ==================================================================
[   30.770201] ==================================================================
[   30.770854] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x50d6/0x5450
[   30.771485] Write of size 8 at addr ffff888101abdcb0 by task kunit_try_catch/273
[   30.772155] 
[   30.772463] CPU: 0 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241122 #1
[   30.773205] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.773667] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   30.774307] Call Trace:
[   30.774666]  <TASK>
[   30.774978]  dump_stack_lvl+0x73/0xb0
[   30.775441]  print_report+0xd1/0x640
[   30.775915]  ? __virt_addr_valid+0x1db/0x2d0
[   30.776314]  ? kasan_complete_mode_report_info+0x2a/0x200
[   30.776889]  kasan_report+0x102/0x140
[   30.777170]  ? kasan_atomics_helper+0x50d6/0x5450
[   30.777690]  ? kasan_atomics_helper+0x50d6/0x5450
[   30.778238]  __asan_report_store8_noabort+0x1b/0x30
[   30.778786]  kasan_atomics_helper+0x50d6/0x5450
[   30.779361]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   30.779691]  ? ret_from_fork_asm+0x1a/0x30
[   30.780161]  ? ret_from_fork+0x41/0x80
[   30.780494]  kasan_atomics+0x1dd/0x310
[   30.781012]  ? __pfx_kasan_atomics+0x10/0x10
[   30.781369]  ? __pfx_read_tsc+0x10/0x10
[   30.781648]  ? ktime_get_ts64+0x84/0x230
[   30.782139]  kunit_try_run_case+0x1b3/0x490
[   30.782647]  ? __pfx_kunit_try_run_case+0x10/0x10
[   30.783158]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   30.783732]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   30.784099]  ? __kthread_parkme+0x82/0x160
[   30.784623]  ? preempt_count_sub+0x50/0x80
[   30.785010]  ? __pfx_kunit_try_run_case+0x10/0x10
[   30.785371]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   30.786017]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   30.786632]  kthread+0x257/0x310
[   30.787161]  ? __pfx_kthread+0x10/0x10
[   30.788294]  ret_from_fork+0x41/0x80
[   30.789538]  ? __pfx_kthread+0x10/0x10
[   30.789949]  ret_from_fork_asm+0x1a/0x30
[   30.790987]  </TASK>
[   30.791538] 
[   30.791709] Allocated by task 273:
[   30.792070]  kasan_save_stack+0x3d/0x60
[   30.792465]  kasan_save_track+0x18/0x40
[   30.792876]  kasan_save_alloc_info+0x3b/0x50
[   30.794048]  __kasan_kmalloc+0xb7/0xc0
[   30.794391]  __kmalloc_cache_noprof+0x184/0x410
[   30.795193]  kasan_atomics+0x96/0x310
[   30.795664]  kunit_try_run_case+0x1b3/0x490
[   30.796582]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   30.797081]  kthread+0x257/0x310
[   30.797740]  ret_from_fork+0x41/0x80
[   30.798457]  ret_from_fork_asm+0x1a/0x30
[   30.799025] 
[   30.799252] The buggy address belongs to the object at ffff888101abdc80
[   30.799252]  which belongs to the cache kmalloc-64 of size 64
[   30.800305] The buggy address is located 0 bytes to the right of
[   30.800305]  allocated 48-byte region [ffff888101abdc80, ffff888101abdcb0)
[   30.801738] 
[   30.802212] The buggy address belongs to the physical page:
[   30.803206] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101abd
[   30.804007] flags: 0x200000000000000(node=0|zone=2)
[   30.804463] page_type: f5(slab)
[   30.804775] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   30.805183] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   30.805914] page dumped because: kasan: bad access detected
[   30.807336] 
[   30.807517] Memory state around the buggy address:
[   30.807813]  ffff888101abdb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   30.808967]  ffff888101abdc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   30.809636] >ffff888101abdc80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   30.810491]                                      ^
[   30.811059]  ffff888101abdd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.811713]  ffff888101abdd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.812540] ==================================================================
[   29.862414] ==================================================================
[   29.863204] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa2c/0x5450
[   29.863988] Write of size 4 at addr ffff888101abdcb0 by task kunit_try_catch/273
[   29.864589] 
[   29.864855] CPU: 0 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241122 #1
[   29.865694] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.866057] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   29.867045] Call Trace:
[   29.867343]  <TASK>
[   29.867595]  dump_stack_lvl+0x73/0xb0
[   29.868159]  print_report+0xd1/0x640
[   29.868679]  ? __virt_addr_valid+0x1db/0x2d0
[   29.869208]  ? kasan_complete_mode_report_info+0x2a/0x200
[   29.869778]  kasan_report+0x102/0x140
[   29.870227]  ? kasan_atomics_helper+0xa2c/0x5450
[   29.870633]  ? kasan_atomics_helper+0xa2c/0x5450
[   29.870983]  kasan_check_range+0x10c/0x1c0
[   29.871576]  __kasan_check_write+0x18/0x20
[   29.872175]  kasan_atomics_helper+0xa2c/0x5450
[   29.872677]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   29.873176]  ? ret_from_fork_asm+0x1a/0x30
[   29.873650]  ? ret_from_fork+0x41/0x80
[   29.874220]  kasan_atomics+0x1dd/0x310
[   29.874685]  ? __pfx_kasan_atomics+0x10/0x10
[   29.875151]  ? __pfx_read_tsc+0x10/0x10
[   29.875582]  ? ktime_get_ts64+0x84/0x230
[   29.875896]  kunit_try_run_case+0x1b3/0x490
[   29.876361]  ? __pfx_kunit_try_run_case+0x10/0x10
[   29.877009]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   29.877735]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   29.878262]  ? __kthread_parkme+0x82/0x160
[   29.878581]  ? preempt_count_sub+0x50/0x80
[   29.879173]  ? __pfx_kunit_try_run_case+0x10/0x10
[   29.879856]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   29.880435]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   29.881031]  kthread+0x257/0x310
[   29.881388]  ? __pfx_kthread+0x10/0x10
[   29.881928]  ret_from_fork+0x41/0x80
[   29.883245]  ? __pfx_kthread+0x10/0x10
[   29.884336]  ret_from_fork_asm+0x1a/0x30
[   29.884687]  </TASK>
[   29.884906] 
[   29.885061] Allocated by task 273:
[   29.886603]  kasan_save_stack+0x3d/0x60
[   29.886973]  kasan_save_track+0x18/0x40
[   29.887323]  kasan_save_alloc_info+0x3b/0x50
[   29.888225]  __kasan_kmalloc+0xb7/0xc0
[   29.888649]  __kmalloc_cache_noprof+0x184/0x410
[   29.889219]  kasan_atomics+0x96/0x310
[   29.889744]  kunit_try_run_case+0x1b3/0x490
[   29.890194]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   29.890879]  kthread+0x257/0x310
[   29.891334]  ret_from_fork+0x41/0x80
[   29.891561]  ret_from_fork_asm+0x1a/0x30
[   29.892016] 
[   29.892277] The buggy address belongs to the object at ffff888101abdc80
[   29.892277]  which belongs to the cache kmalloc-64 of size 64
[   29.893080] The buggy address is located 0 bytes to the right of
[   29.893080]  allocated 48-byte region [ffff888101abdc80, ffff888101abdcb0)
[   29.894085] 
[   29.894312] The buggy address belongs to the physical page:
[   29.894878] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101abd
[   29.895479] flags: 0x200000000000000(node=0|zone=2)
[   29.895955] page_type: f5(slab)
[   29.896198] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   29.896913] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   29.897631] page dumped because: kasan: bad access detected
[   29.898068] 
[   29.898225] Memory state around the buggy address:
[   29.898612]  ffff888101abdb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.899293]  ffff888101abdc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.899890] >ffff888101abdc80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   29.900551]                                      ^
[   29.901070]  ffff888101abdd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.901496]  ffff888101abdd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.902151] ==================================================================
[   31.520143] ==================================================================
[   31.520883] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1eab/0x5450
[   31.521492] Write of size 8 at addr ffff888101abdcb0 by task kunit_try_catch/273
[   31.521911] 
[   31.522189] CPU: 0 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241122 #1
[   31.523077] Tainted: [B]=BAD_PAGE, [N]=TEST
[   31.523582] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   31.524117] Call Trace:
[   31.524394]  <TASK>
[   31.524703]  dump_stack_lvl+0x73/0xb0
[   31.525187]  print_report+0xd1/0x640
[   31.525604]  ? __virt_addr_valid+0x1db/0x2d0
[   31.526093]  ? kasan_complete_mode_report_info+0x2a/0x200
[   31.526549]  kasan_report+0x102/0x140
[   31.527011]  ? kasan_atomics_helper+0x1eab/0x5450
[   31.527579]  ? kasan_atomics_helper+0x1eab/0x5450
[   31.527967]  kasan_check_range+0x10c/0x1c0
[   31.528513]  __kasan_check_write+0x18/0x20
[   31.528969]  kasan_atomics_helper+0x1eab/0x5450
[   31.529557]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   31.529944]  ? ret_from_fork_asm+0x1a/0x30
[   31.530415]  ? ret_from_fork+0x41/0x80
[   31.530921]  kasan_atomics+0x1dd/0x310
[   31.531328]  ? __pfx_kasan_atomics+0x10/0x10
[   31.531846]  ? __pfx_read_tsc+0x10/0x10
[   31.532174]  ? ktime_get_ts64+0x84/0x230
[   31.532623]  kunit_try_run_case+0x1b3/0x490
[   31.533074]  ? __pfx_kunit_try_run_case+0x10/0x10
[   31.533467]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   31.534026]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   31.534469]  ? __kthread_parkme+0x82/0x160
[   31.534841]  ? preempt_count_sub+0x50/0x80
[   31.535304]  ? __pfx_kunit_try_run_case+0x10/0x10
[   31.535792]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   31.536220]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   31.536565]  kthread+0x257/0x310
[   31.536847]  ? __pfx_kthread+0x10/0x10
[   31.537304]  ret_from_fork+0x41/0x80
[   31.537722]  ? __pfx_kthread+0x10/0x10
[   31.538285]  ret_from_fork_asm+0x1a/0x30
[   31.538754]  </TASK>
[   31.539093] 
[   31.539372] Allocated by task 273:
[   31.539718]  kasan_save_stack+0x3d/0x60
[   31.540844]  kasan_save_track+0x18/0x40
[   31.541261]  kasan_save_alloc_info+0x3b/0x50
[   31.541664]  __kasan_kmalloc+0xb7/0xc0
[   31.542030]  __kmalloc_cache_noprof+0x184/0x410
[   31.543530]  kasan_atomics+0x96/0x310
[   31.543999]  kunit_try_run_case+0x1b3/0x490
[   31.545386]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   31.545984]  kthread+0x257/0x310
[   31.547148]  ret_from_fork+0x41/0x80
[   31.547638]  ret_from_fork_asm+0x1a/0x30
[   31.548007] 
[   31.548187] The buggy address belongs to the object at ffff888101abdc80
[   31.548187]  which belongs to the cache kmalloc-64 of size 64
[   31.550238] The buggy address is located 0 bytes to the right of
[   31.550238]  allocated 48-byte region [ffff888101abdc80, ffff888101abdcb0)
[   31.551849] 
[   31.552033] The buggy address belongs to the physical page:
[   31.553007] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101abd
[   31.553439] flags: 0x200000000000000(node=0|zone=2)
[   31.553999] page_type: f5(slab)
[   31.554360] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   31.554937] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   31.555420] page dumped because: kasan: bad access detected
[   31.555983] 
[   31.556192] Memory state around the buggy address:
[   31.556480]  ffff888101abdb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   31.557201]  ffff888101abdc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   31.557697] >ffff888101abdc80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   31.558523]                                      ^
[   31.558962]  ffff888101abdd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.559786]  ffff888101abdd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.560276] ==================================================================
[   31.646375] ==================================================================
[   31.646993] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x2007/0x5450
[   31.647618] Write of size 8 at addr ffff888101abdcb0 by task kunit_try_catch/273
[   31.648335] 
[   31.648596] CPU: 0 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241122 #1
[   31.649461] Tainted: [B]=BAD_PAGE, [N]=TEST
[   31.649889] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   31.650612] Call Trace:
[   31.650941]  <TASK>
[   31.651305]  dump_stack_lvl+0x73/0xb0
[   31.651653]  print_report+0xd1/0x640
[   31.652092]  ? __virt_addr_valid+0x1db/0x2d0
[   31.652623]  ? kasan_complete_mode_report_info+0x2a/0x200
[   31.652993]  kasan_report+0x102/0x140
[   31.653504]  ? kasan_atomics_helper+0x2007/0x5450
[   31.654043]  ? kasan_atomics_helper+0x2007/0x5450
[   31.654596]  kasan_check_range+0x10c/0x1c0
[   31.655072]  __kasan_check_write+0x18/0x20
[   31.655572]  kasan_atomics_helper+0x2007/0x5450
[   31.655999]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   31.656555]  ? ret_from_fork_asm+0x1a/0x30
[   31.657062]  ? ret_from_fork+0x41/0x80
[   31.657410]  kasan_atomics+0x1dd/0x310
[   31.657898]  ? __pfx_kasan_atomics+0x10/0x10
[   31.658402]  ? __pfx_read_tsc+0x10/0x10
[   31.658791]  ? ktime_get_ts64+0x84/0x230
[   31.659285]  kunit_try_run_case+0x1b3/0x490
[   31.659788]  ? __pfx_kunit_try_run_case+0x10/0x10
[   31.660224]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   31.660660]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   31.661127]  ? __kthread_parkme+0x82/0x160
[   31.661649]  ? preempt_count_sub+0x50/0x80
[   31.662094]  ? __pfx_kunit_try_run_case+0x10/0x10
[   31.662554]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   31.662940]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   31.663325]  kthread+0x257/0x310
[   31.663589]  ? __pfx_kthread+0x10/0x10
[   31.663885]  ret_from_fork+0x41/0x80
[   31.664382]  ? __pfx_kthread+0x10/0x10
[   31.664829]  ret_from_fork_asm+0x1a/0x30
[   31.665322]  </TASK>
[   31.665615] 
[   31.665851] Allocated by task 273:
[   31.666233]  kasan_save_stack+0x3d/0x60
[   31.666740]  kasan_save_track+0x18/0x40
[   31.667210]  kasan_save_alloc_info+0x3b/0x50
[   31.667742]  __kasan_kmalloc+0xb7/0xc0
[   31.668172]  __kmalloc_cache_noprof+0x184/0x410
[   31.668707]  kasan_atomics+0x96/0x310
[   31.669185]  kunit_try_run_case+0x1b3/0x490
[   31.669633]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   31.669991]  kthread+0x257/0x310
[   31.670233]  ret_from_fork+0x41/0x80
[   31.670534]  ret_from_fork_asm+0x1a/0x30
[   31.670978] 
[   31.671274] The buggy address belongs to the object at ffff888101abdc80
[   31.671274]  which belongs to the cache kmalloc-64 of size 64
[   31.672400] The buggy address is located 0 bytes to the right of
[   31.672400]  allocated 48-byte region [ffff888101abdc80, ffff888101abdcb0)
[   31.673485] 
[   31.673652] The buggy address belongs to the physical page:
[   31.674089] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101abd
[   31.674886] flags: 0x200000000000000(node=0|zone=2)
[   31.675427] page_type: f5(slab)
[   31.675769] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   31.676181] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   31.676930] page dumped because: kasan: bad access detected
[   31.677487] 
[   31.677709] Memory state around the buggy address:
[   31.678293]  ffff888101abdb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   31.678766]  ffff888101abdc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   31.679574] >ffff888101abdc80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   31.680036]                                      ^
[   31.680576]  ffff888101abdd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.681072]  ffff888101abdd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.681629] ==================================================================
[   30.015634] ==================================================================
[   30.016754] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a86/0x5450
[   30.020001] Read of size 4 at addr ffff888101abdcb0 by task kunit_try_catch/273
[   30.020784] 
[   30.020998] CPU: 0 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241122 #1
[   30.021493] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.021749] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   30.022550] Call Trace:
[   30.022962]  <TASK>
[   30.023340]  dump_stack_lvl+0x73/0xb0
[   30.023792]  print_report+0xd1/0x640
[   30.024245]  ? __virt_addr_valid+0x1db/0x2d0
[   30.024746]  ? kasan_complete_mode_report_info+0x2a/0x200
[   30.025339]  kasan_report+0x102/0x140
[   30.025680]  ? kasan_atomics_helper+0x4a86/0x5450
[   30.026036]  ? kasan_atomics_helper+0x4a86/0x5450
[   30.026425]  __asan_report_load4_noabort+0x18/0x20
[   30.026943]  kasan_atomics_helper+0x4a86/0x5450
[   30.027477]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   30.028024]  ? ret_from_fork_asm+0x1a/0x30
[   30.028528]  ? ret_from_fork+0x41/0x80
[   30.028920]  kasan_atomics+0x1dd/0x310
[   30.029209]  ? __pfx_kasan_atomics+0x10/0x10
[   30.029681]  ? __pfx_read_tsc+0x10/0x10
[   30.030157]  ? ktime_get_ts64+0x84/0x230
[   30.030751]  kunit_try_run_case+0x1b3/0x490
[   30.031177]  ? __pfx_kunit_try_run_case+0x10/0x10
[   30.031705]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   30.032090]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   30.032579]  ? __kthread_parkme+0x82/0x160
[   30.033081]  ? preempt_count_sub+0x50/0x80
[   30.033444]  ? __pfx_kunit_try_run_case+0x10/0x10
[   30.033755]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   30.034142]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   30.034481]  kthread+0x257/0x310
[   30.034731]  ? __pfx_kthread+0x10/0x10
[   30.035242]  ret_from_fork+0x41/0x80
[   30.035650]  ? __pfx_kthread+0x10/0x10
[   30.036237]  ret_from_fork_asm+0x1a/0x30
[   30.036701]  </TASK>
[   30.037056] 
[   30.037315] Allocated by task 273:
[   30.037705]  kasan_save_stack+0x3d/0x60
[   30.038193]  kasan_save_track+0x18/0x40
[   30.038646]  kasan_save_alloc_info+0x3b/0x50
[   30.039108]  __kasan_kmalloc+0xb7/0xc0
[   30.039613]  __kmalloc_cache_noprof+0x184/0x410
[   30.040111]  kasan_atomics+0x96/0x310
[   30.040623]  kunit_try_run_case+0x1b3/0x490
[   30.041080]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   30.041408]  kthread+0x257/0x310
[   30.041646]  ret_from_fork+0x41/0x80
[   30.041992]  ret_from_fork_asm+0x1a/0x30
[   30.042432] 
[   30.042714] The buggy address belongs to the object at ffff888101abdc80
[   30.042714]  which belongs to the cache kmalloc-64 of size 64
[   30.043993] The buggy address is located 0 bytes to the right of
[   30.043993]  allocated 48-byte region [ffff888101abdc80, ffff888101abdcb0)
[   30.045399] 
[   30.045566] The buggy address belongs to the physical page:
[   30.045886] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101abd
[   30.046307] flags: 0x200000000000000(node=0|zone=2)
[   30.046603] page_type: f5(slab)
[   30.046862] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   30.047567] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   30.048264] page dumped because: kasan: bad access detected
[   30.048768] 
[   30.048961] Memory state around the buggy address:
[   30.049406]  ffff888101abdb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   30.052096]  ffff888101abdc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   30.052566] >ffff888101abdc80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   30.053020]                                      ^
[   30.055114]  ffff888101abdd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.055742]  ffff888101abdd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.057503] ==================================================================
[   29.446192] ==================================================================
[   29.447017] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a1/0x5450
[   29.448533] Write of size 4 at addr ffff888101abdcb0 by task kunit_try_catch/273
[   29.449513] 
[   29.449807] CPU: 0 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241122 #1
[   29.450627] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.451024] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   29.451685] Call Trace:
[   29.451939]  <TASK>
[   29.452254]  dump_stack_lvl+0x73/0xb0
[   29.452749]  print_report+0xd1/0x640
[   29.453191]  ? __virt_addr_valid+0x1db/0x2d0
[   29.453563]  ? kasan_complete_mode_report_info+0x2a/0x200
[   29.453936]  kasan_report+0x102/0x140
[   29.454213]  ? kasan_atomics_helper+0x4a1/0x5450
[   29.454694]  ? kasan_atomics_helper+0x4a1/0x5450
[   29.455241]  kasan_check_range+0x10c/0x1c0
[   29.455810]  __kasan_check_write+0x18/0x20
[   29.456290]  kasan_atomics_helper+0x4a1/0x5450
[   29.456774]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   29.457330]  ? ret_from_fork_asm+0x1a/0x30
[   29.457810]  ? ret_from_fork+0x41/0x80
[   29.458302]  kasan_atomics+0x1dd/0x310
[   29.458696]  ? __pfx_kasan_atomics+0x10/0x10
[   29.459031]  ? __pfx_read_tsc+0x10/0x10
[   29.459494]  ? ktime_get_ts64+0x84/0x230
[   29.460301]  kunit_try_run_case+0x1b3/0x490
[   29.460768]  ? __pfx_kunit_try_run_case+0x10/0x10
[   29.461272]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   29.461752]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   29.462116]  ? __kthread_parkme+0x82/0x160
[   29.462503]  ? preempt_count_sub+0x50/0x80
[   29.463139]  ? __pfx_kunit_try_run_case+0x10/0x10
[   29.463758]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   29.464303]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   29.464845]  kthread+0x257/0x310
[   29.465236]  ? __pfx_kthread+0x10/0x10
[   29.465535]  ret_from_fork+0x41/0x80
[   29.465805]  ? __pfx_kthread+0x10/0x10
[   29.466423]  ret_from_fork_asm+0x1a/0x30
[   29.466966]  </TASK>
[   29.467252] 
[   29.467469] Allocated by task 273:
[   29.467703]  kasan_save_stack+0x3d/0x60
[   29.467999]  kasan_save_track+0x18/0x40
[   29.468485]  kasan_save_alloc_info+0x3b/0x50
[   29.468979]  __kasan_kmalloc+0xb7/0xc0
[   29.469413]  __kmalloc_cache_noprof+0x184/0x410
[   29.469945]  kasan_atomics+0x96/0x310
[   29.470405]  kunit_try_run_case+0x1b3/0x490
[   29.470721]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   29.471236]  kthread+0x257/0x310
[   29.471631]  ret_from_fork+0x41/0x80
[   29.471959]  ret_from_fork_asm+0x1a/0x30
[   29.472471] 
[   29.472669] The buggy address belongs to the object at ffff888101abdc80
[   29.472669]  which belongs to the cache kmalloc-64 of size 64
[   29.473420] The buggy address is located 0 bytes to the right of
[   29.473420]  allocated 48-byte region [ffff888101abdc80, ffff888101abdcb0)
[   29.474559] 
[   29.474836] The buggy address belongs to the physical page:
[   29.475178] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101abd
[   29.475779] flags: 0x200000000000000(node=0|zone=2)
[   29.476106] page_type: f5(slab)
[   29.476349] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   29.476737] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   29.477427] page dumped because: kasan: bad access detected
[   29.478043] 
[   29.478275] Memory state around the buggy address:
[   29.478969]  ffff888101abdb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.479717]  ffff888101abdc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.480418] >ffff888101abdc80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   29.480919]                                      ^
[   29.481439]  ffff888101abdd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.481808]  ffff888101abdd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.482539] ==================================================================
[   30.152300] ==================================================================
[   30.153210] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xe79/0x5450
[   30.154072] Write of size 4 at addr ffff888101abdcb0 by task kunit_try_catch/273
[   30.154972] 
[   30.155384] CPU: 0 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241122 #1
[   30.156528] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.157000] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   30.158013] Call Trace:
[   30.158293]  <TASK>
[   30.158527]  dump_stack_lvl+0x73/0xb0
[   30.158962]  print_report+0xd1/0x640
[   30.160681]  ? __virt_addr_valid+0x1db/0x2d0
[   30.161093]  ? kasan_complete_mode_report_info+0x2a/0x200
[   30.162191]  kasan_report+0x102/0x140
[   30.162560]  ? kasan_atomics_helper+0xe79/0x5450
[   30.163134]  ? kasan_atomics_helper+0xe79/0x5450
[   30.163771]  kasan_check_range+0x10c/0x1c0
[   30.164450]  __kasan_check_write+0x18/0x20
[   30.164875]  kasan_atomics_helper+0xe79/0x5450
[   30.165920]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   30.166613]  ? ret_from_fork_asm+0x1a/0x30
[   30.166857]  ? ret_from_fork+0x41/0x80
[   30.167033]  kasan_atomics+0x1dd/0x310
[   30.167187]  ? __pfx_kasan_atomics+0x10/0x10
[   30.167813]  ? __pfx_read_tsc+0x10/0x10
[   30.168328]  ? ktime_get_ts64+0x84/0x230
[   30.168775]  kunit_try_run_case+0x1b3/0x490
[   30.169278]  ? __pfx_kunit_try_run_case+0x10/0x10
[   30.169740]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   30.170466]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   30.171069]  ? __kthread_parkme+0x82/0x160
[   30.171658]  ? preempt_count_sub+0x50/0x80
[   30.172201]  ? __pfx_kunit_try_run_case+0x10/0x10
[   30.172850]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   30.173498]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   30.173922]  kthread+0x257/0x310
[   30.174345]  ? __pfx_kthread+0x10/0x10
[   30.174785]  ret_from_fork+0x41/0x80
[   30.175202]  ? __pfx_kthread+0x10/0x10
[   30.175646]  ret_from_fork_asm+0x1a/0x30
[   30.176152]  </TASK>
[   30.176515] 
[   30.176742] Allocated by task 273:
[   30.177206]  kasan_save_stack+0x3d/0x60
[   30.177684]  kasan_save_track+0x18/0x40
[   30.178032]  kasan_save_alloc_info+0x3b/0x50
[   30.178533]  __kasan_kmalloc+0xb7/0xc0
[   30.178956]  __kmalloc_cache_noprof+0x184/0x410
[   30.179410]  kasan_atomics+0x96/0x310
[   30.179756]  kunit_try_run_case+0x1b3/0x490
[   30.180230]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   30.180806]  kthread+0x257/0x310
[   30.181200]  ret_from_fork+0x41/0x80
[   30.181640]  ret_from_fork_asm+0x1a/0x30
[   30.182034] 
[   30.182195] The buggy address belongs to the object at ffff888101abdc80
[   30.182195]  which belongs to the cache kmalloc-64 of size 64
[   30.183320] The buggy address is located 0 bytes to the right of
[   30.183320]  allocated 48-byte region [ffff888101abdc80, ffff888101abdcb0)
[   30.184195] 
[   30.184501] The buggy address belongs to the physical page:
[   30.184866] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101abd
[   30.185456] flags: 0x200000000000000(node=0|zone=2)
[   30.185853] page_type: f5(slab)
[   30.186236] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   30.186998] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   30.187706] page dumped because: kasan: bad access detected
[   30.188097] 
[   30.188404] Memory state around the buggy address:
[   30.188872]  ffff888101abdb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   30.189382]  ffff888101abdc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   30.189862] >ffff888101abdc80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   30.190583]                                      ^
[   30.191074]  ffff888101abdd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.191707]  ffff888101abdd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.192194] ==================================================================
[   30.276094] ==================================================================
[   30.277376] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a38/0x5450
[   30.278017] Read of size 4 at addr ffff888101abdcb0 by task kunit_try_catch/273
[   30.278598] 
[   30.279133] CPU: 0 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241122 #1
[   30.280371] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.281006] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   30.281607] Call Trace:
[   30.281937]  <TASK>
[   30.282200]  dump_stack_lvl+0x73/0xb0
[   30.282595]  print_report+0xd1/0x640
[   30.282972]  ? __virt_addr_valid+0x1db/0x2d0
[   30.283420]  ? kasan_complete_mode_report_info+0x2a/0x200
[   30.283991]  kasan_report+0x102/0x140
[   30.284386]  ? kasan_atomics_helper+0x4a38/0x5450
[   30.284808]  ? kasan_atomics_helper+0x4a38/0x5450
[   30.285669]  __asan_report_load4_noabort+0x18/0x20
[   30.286182]  kasan_atomics_helper+0x4a38/0x5450
[   30.286950]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   30.287631]  ? ret_from_fork_asm+0x1a/0x30
[   30.288064]  ? ret_from_fork+0x41/0x80
[   30.288755]  kasan_atomics+0x1dd/0x310
[   30.289571]  ? __pfx_kasan_atomics+0x10/0x10
[   30.290002]  ? __pfx_read_tsc+0x10/0x10
[   30.290958]  ? ktime_get_ts64+0x84/0x230
[   30.291520]  kunit_try_run_case+0x1b3/0x490
[   30.291966]  ? __pfx_kunit_try_run_case+0x10/0x10
[   30.292481]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   30.292908]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   30.293396]  ? __kthread_parkme+0x82/0x160
[   30.294191]  ? preempt_count_sub+0x50/0x80
[   30.294530]  ? __pfx_kunit_try_run_case+0x10/0x10
[   30.294983]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   30.296130]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   30.296947]  kthread+0x257/0x310
[   30.297444]  ? __pfx_kthread+0x10/0x10
[   30.297715]  ret_from_fork+0x41/0x80
[   30.298183]  ? __pfx_kthread+0x10/0x10
[   30.298547]  ret_from_fork_asm+0x1a/0x30
[   30.299415]  </TASK>
[   30.299712] 
[   30.299940] Allocated by task 273:
[   30.300265]  kasan_save_stack+0x3d/0x60
[   30.300631]  kasan_save_track+0x18/0x40
[   30.301799]  kasan_save_alloc_info+0x3b/0x50
[   30.302160]  __kasan_kmalloc+0xb7/0xc0
[   30.303102]  __kmalloc_cache_noprof+0x184/0x410
[   30.303624]  kasan_atomics+0x96/0x310
[   30.303995]  kunit_try_run_case+0x1b3/0x490
[   30.304856]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   30.305211]  kthread+0x257/0x310
[   30.305847]  ret_from_fork+0x41/0x80
[   30.306120]  ret_from_fork_asm+0x1a/0x30
[   30.306641] 
[   30.306810] The buggy address belongs to the object at ffff888101abdc80
[   30.306810]  which belongs to the cache kmalloc-64 of size 64
[   30.307791] The buggy address is located 0 bytes to the right of
[   30.307791]  allocated 48-byte region [ffff888101abdc80, ffff888101abdcb0)
[   30.308970] 
[   30.309444] The buggy address belongs to the physical page:
[   30.309980] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101abd
[   30.311489] flags: 0x200000000000000(node=0|zone=2)
[   30.311934] page_type: f5(slab)
[   30.312247] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   30.312915] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   30.314057] page dumped because: kasan: bad access detected
[   30.314856] 
[   30.315330] Memory state around the buggy address:
[   30.315974]  ffff888101abdb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   30.316636]  ffff888101abdc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   30.317450] >ffff888101abdc80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   30.318153]                                      ^
[   30.318755]  ffff888101abdd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.319566]  ffff888101abdd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.320335] ==================================================================
[   31.768149] ==================================================================
[   31.768837] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4fb4/0x5450
[   31.769758] Read of size 8 at addr ffff888101abdcb0 by task kunit_try_catch/273
[   31.770212] 
[   31.770398] CPU: 0 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241122 #1
[   31.771130] Tainted: [B]=BAD_PAGE, [N]=TEST
[   31.771549] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   31.772332] Call Trace:
[   31.772591]  <TASK>
[   31.772795]  dump_stack_lvl+0x73/0xb0
[   31.773291]  print_report+0xd1/0x640
[   31.773881]  ? __virt_addr_valid+0x1db/0x2d0
[   31.774443]  ? kasan_complete_mode_report_info+0x2a/0x200
[   31.774802]  kasan_report+0x102/0x140
[   31.775233]  ? kasan_atomics_helper+0x4fb4/0x5450
[   31.775741]  ? kasan_atomics_helper+0x4fb4/0x5450
[   31.776334]  __asan_report_load8_noabort+0x18/0x20
[   31.776897]  kasan_atomics_helper+0x4fb4/0x5450
[   31.777431]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   31.777777]  ? ret_from_fork_asm+0x1a/0x30
[   31.778508]  ? ret_from_fork+0x41/0x80
[   31.780337]  kasan_atomics+0x1dd/0x310
[   31.781070]  ? __pfx_kasan_atomics+0x10/0x10
[   31.782206]  ? __pfx_read_tsc+0x10/0x10
[   31.782975]  ? ktime_get_ts64+0x84/0x230
[   31.783460]  kunit_try_run_case+0x1b3/0x490
[   31.783918]  ? __pfx_kunit_try_run_case+0x10/0x10
[   31.784229]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   31.784752]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   31.785250]  ? __kthread_parkme+0x82/0x160
[   31.785923]  ? preempt_count_sub+0x50/0x80
[   31.786848]  ? __pfx_kunit_try_run_case+0x10/0x10
[   31.787247]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   31.787608]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   31.788100]  kthread+0x257/0x310
[   31.789140]  ? __pfx_kthread+0x10/0x10
[   31.789729]  ret_from_fork+0x41/0x80
[   31.790168]  ? __pfx_kthread+0x10/0x10
[   31.790465]  ret_from_fork_asm+0x1a/0x30
[   31.790979]  </TASK>
[   31.791234] 
[   31.791489] Allocated by task 273:
[   31.791857]  kasan_save_stack+0x3d/0x60
[   31.792283]  kasan_save_track+0x18/0x40
[   31.792665]  kasan_save_alloc_info+0x3b/0x50
[   31.792983]  __kasan_kmalloc+0xb7/0xc0
[   31.793383]  __kmalloc_cache_noprof+0x184/0x410
[   31.793884]  kasan_atomics+0x96/0x310
[   31.794319]  kunit_try_run_case+0x1b3/0x490
[   31.794720]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   31.795069]  kthread+0x257/0x310
[   31.795480]  ret_from_fork+0x41/0x80
[   31.795925]  ret_from_fork_asm+0x1a/0x30
[   31.796426] 
[   31.796646] The buggy address belongs to the object at ffff888101abdc80
[   31.796646]  which belongs to the cache kmalloc-64 of size 64
[   31.797380] The buggy address is located 0 bytes to the right of
[   31.797380]  allocated 48-byte region [ffff888101abdc80, ffff888101abdcb0)
[   31.798097] 
[   31.798327] The buggy address belongs to the physical page:
[   31.798874] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101abd
[   31.799847] flags: 0x200000000000000(node=0|zone=2)
[   31.800335] page_type: f5(slab)
[   31.800596] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   31.801207] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   31.801588] page dumped because: kasan: bad access detected
[   31.802173] 
[   31.802425] Memory state around the buggy address:
[   31.802937]  ffff888101abdb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   31.803661]  ffff888101abdc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   31.804060] >ffff888101abdc80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   31.804561]                                      ^
[   31.805077]  ffff888101abdd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.805974]  ffff888101abdd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.806509] ==================================================================