Hay
Date
Nov. 27, 2024, 3:37 a.m.

Environment
qemu-arm64
qemu-x86_64

[   53.374731] ==================================================================
[   53.375355] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xdd4/0x4858
[   53.376376] Read of size 8 at addr fff00000c616b330 by task kunit_try_catch/254
[   53.377395] 
[   53.377690] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241127 #1
[   53.379194] Tainted: [B]=BAD_PAGE, [N]=TEST
[   53.379850] Hardware name: linux,dummy-virt (DT)
[   53.380494] Call trace:
[   53.380881]  show_stack+0x20/0x38 (C)
[   53.381504]  dump_stack_lvl+0x8c/0xd0
[   53.382056]  print_report+0x118/0x5e0
[   53.382655]  kasan_report+0xc8/0x118
[   53.383195]  kasan_check_range+0x100/0x1a8
[   53.383721]  __kasan_check_read+0x20/0x30
[   53.384532]  kasan_atomics_helper+0xdd4/0x4858
[   53.385148]  kasan_atomics+0x198/0x2e8
[   53.385749]  kunit_try_run_case+0x14c/0x3d0
[   53.386257]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   53.387068]  kthread+0x24c/0x2d0
[   53.387696]  ret_from_fork+0x10/0x20
[   53.388355] 
[   53.388749] Allocated by task 254:
[   53.389228]  kasan_save_stack+0x3c/0x68
[   53.389885]  kasan_save_track+0x20/0x40
[   53.390426]  kasan_save_alloc_info+0x40/0x58
[   53.391060]  __kasan_kmalloc+0xd4/0xd8
[   53.391582]  __kmalloc_cache_noprof+0x15c/0x3c0
[   53.392263]  kasan_atomics+0xb8/0x2e8
[   53.392825]  kunit_try_run_case+0x14c/0x3d0
[   53.393412]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   53.394206]  kthread+0x24c/0x2d0
[   53.394740]  ret_from_fork+0x10/0x20
[   53.395276] 
[   53.395636] The buggy address belongs to the object at fff00000c616b300
[   53.395636]  which belongs to the cache kmalloc-64 of size 64
[   53.396926] The buggy address is located 0 bytes to the right of
[   53.396926]  allocated 48-byte region [fff00000c616b300, fff00000c616b330)
[   53.398335] 
[   53.398669] The buggy address belongs to the physical page:
[   53.399350] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10616b
[   53.400216] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   53.401160] page_type: f5(slab)
[   53.401657] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   53.402590] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   53.403487] page dumped because: kasan: bad access detected
[   53.404252] 
[   53.404621] Memory state around the buggy address:
[   53.405188]  fff00000c616b200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   53.406108]  fff00000c616b280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   53.406935] >fff00000c616b300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   53.407870]                                      ^
[   53.408501]  fff00000c616b380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   53.409384]  fff00000c616b400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   53.410249] ==================================================================
[   53.992960] ==================================================================
[   53.993785] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f04/0x4858
[   53.994812] Read of size 8 at addr fff00000c616b330 by task kunit_try_catch/254
[   53.995803] 
[   53.996162] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241127 #1
[   53.997535] Tainted: [B]=BAD_PAGE, [N]=TEST
[   53.998185] Hardware name: linux,dummy-virt (DT)
[   53.998994] Call trace:
[   53.999467]  show_stack+0x20/0x38 (C)
[   54.000195]  dump_stack_lvl+0x8c/0xd0
[   54.000943]  print_report+0x118/0x5e0
[   54.001558]  kasan_report+0xc8/0x118
[   54.002155]  __asan_report_load8_noabort+0x20/0x30
[   54.002891]  kasan_atomics_helper+0x3f04/0x4858
[   54.003594]  kasan_atomics+0x198/0x2e8
[   54.004091]  kunit_try_run_case+0x14c/0x3d0
[   54.004764]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   54.005495]  kthread+0x24c/0x2d0
[   54.006116]  ret_from_fork+0x10/0x20
[   54.006784] 
[   54.007170] Allocated by task 254:
[   54.007756]  kasan_save_stack+0x3c/0x68
[   54.008508]  kasan_save_track+0x20/0x40
[   54.009203]  kasan_save_alloc_info+0x40/0x58
[   54.009926]  __kasan_kmalloc+0xd4/0xd8
[   54.010555]  __kmalloc_cache_noprof+0x15c/0x3c0
[   54.011235]  kasan_atomics+0xb8/0x2e8
[   54.011948]  kunit_try_run_case+0x14c/0x3d0
[   54.012678]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   54.013482]  kthread+0x24c/0x2d0
[   54.014126]  ret_from_fork+0x10/0x20
[   54.014704] 
[   54.015117] The buggy address belongs to the object at fff00000c616b300
[   54.015117]  which belongs to the cache kmalloc-64 of size 64
[   54.016721] The buggy address is located 0 bytes to the right of
[   54.016721]  allocated 48-byte region [fff00000c616b300, fff00000c616b330)
[   54.018117] 
[   54.018606] The buggy address belongs to the physical page:
[   54.019423] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10616b
[   54.020423] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   54.021239] page_type: f5(slab)
[   54.021792] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   54.022826] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   54.023833] page dumped because: kasan: bad access detected
[   54.024685] 
[   54.025032] Memory state around the buggy address:
[   54.025746]  fff00000c616b200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   54.026840]  fff00000c616b280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   54.027744] >fff00000c616b300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   54.028635]                                      ^
[   54.029371]  fff00000c616b380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   54.030345]  fff00000c616b400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   54.031222] ==================================================================
[   53.490893] ==================================================================
[   53.491969] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e5c/0x4858
[   53.492650] Write of size 8 at addr fff00000c616b330 by task kunit_try_catch/254
[   53.493708] 
[   53.494000] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241127 #1
[   53.495164] Tainted: [B]=BAD_PAGE, [N]=TEST
[   53.495924] Hardware name: linux,dummy-virt (DT)
[   53.496564] Call trace:
[   53.497014]  show_stack+0x20/0x38 (C)
[   53.497656]  dump_stack_lvl+0x8c/0xd0
[   53.498206]  print_report+0x118/0x5e0
[   53.498750]  kasan_report+0xc8/0x118
[   53.499405]  __asan_report_store8_noabort+0x20/0x30
[   53.500068]  kasan_atomics_helper+0x3e5c/0x4858
[   53.500691]  kasan_atomics+0x198/0x2e8
[   53.501216]  kunit_try_run_case+0x14c/0x3d0
[   53.501886]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   53.502588]  kthread+0x24c/0x2d0
[   53.503249]  ret_from_fork+0x10/0x20
[   53.503806] 
[   53.504236] Allocated by task 254:
[   53.504735]  kasan_save_stack+0x3c/0x68
[   53.505217]  kasan_save_track+0x20/0x40
[   53.505882]  kasan_save_alloc_info+0x40/0x58
[   53.506520]  __kasan_kmalloc+0xd4/0xd8
[   53.507148]  __kmalloc_cache_noprof+0x15c/0x3c0
[   53.507835]  kasan_atomics+0xb8/0x2e8
[   53.508418]  kunit_try_run_case+0x14c/0x3d0
[   53.509033]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   53.509702]  kthread+0x24c/0x2d0
[   53.510376]  ret_from_fork+0x10/0x20
[   53.510970] 
[   53.511286] The buggy address belongs to the object at fff00000c616b300
[   53.511286]  which belongs to the cache kmalloc-64 of size 64
[   53.512463] The buggy address is located 0 bytes to the right of
[   53.512463]  allocated 48-byte region [fff00000c616b300, fff00000c616b330)
[   53.513930] 
[   53.514226] The buggy address belongs to the physical page:
[   53.515046] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10616b
[   53.516011] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   53.516783] page_type: f5(slab)
[   53.517387] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   53.518326] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   53.519242] page dumped because: kasan: bad access detected
[   53.519874] 
[   53.520197] Memory state around the buggy address:
[   53.520840]  fff00000c616b200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   53.521674]  fff00000c616b280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   53.522548] >fff00000c616b300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   53.523401]                                      ^
[   53.523956]  fff00000c616b380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   53.524793]  fff00000c616b400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   53.525699] ==================================================================
[   52.211062] ==================================================================
[   52.212042] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x40fc/0x4858
[   52.213000] Read of size 4 at addr fff00000c616b330 by task kunit_try_catch/254
[   52.214264] 
[   52.214754] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241127 #1
[   52.216372] Tainted: [B]=BAD_PAGE, [N]=TEST
[   52.216875] Hardware name: linux,dummy-virt (DT)
[   52.217702] Call trace:
[   52.218095]  show_stack+0x20/0x38 (C)
[   52.218705]  dump_stack_lvl+0x8c/0xd0
[   52.219351]  print_report+0x118/0x5e0
[   52.219987]  kasan_report+0xc8/0x118
[   52.220635]  __asan_report_load4_noabort+0x20/0x30
[   52.221313]  kasan_atomics_helper+0x40fc/0x4858
[   52.221941]  kasan_atomics+0x198/0x2e8
[   52.222621]  kunit_try_run_case+0x14c/0x3d0
[   52.223225]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   52.223991]  kthread+0x24c/0x2d0
[   52.224588]  ret_from_fork+0x10/0x20
[   52.225172] 
[   52.225481] Allocated by task 254:
[   52.226048]  kasan_save_stack+0x3c/0x68
[   52.226757]  kasan_save_track+0x20/0x40
[   52.227345]  kasan_save_alloc_info+0x40/0x58
[   52.227890]  __kasan_kmalloc+0xd4/0xd8
[   52.228511]  __kmalloc_cache_noprof+0x15c/0x3c0
[   52.229329]  kasan_atomics+0xb8/0x2e8
[   52.229800]  kunit_try_run_case+0x14c/0x3d0
[   52.230508]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   52.231185]  kthread+0x24c/0x2d0
[   52.231854]  ret_from_fork+0x10/0x20
[   52.232761] 
[   52.233771] The buggy address belongs to the object at fff00000c616b300
[   52.233771]  which belongs to the cache kmalloc-64 of size 64
[   52.235235] The buggy address is located 0 bytes to the right of
[   52.235235]  allocated 48-byte region [fff00000c616b300, fff00000c616b330)
[   52.238613] 
[   52.238871] The buggy address belongs to the physical page:
[   52.240258] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10616b
[   52.242022] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   52.243873] page_type: f5(slab)
[   52.245078] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   52.245694] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   52.246371] page dumped because: kasan: bad access detected
[   52.247550] 
[   52.247852] Memory state around the buggy address:
[   52.248499]  fff00000c616b200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   52.249384]  fff00000c616b280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   52.250219] >fff00000c616b300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   52.251081]                                      ^
[   52.251889]  fff00000c616b380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   52.252695]  fff00000c616b400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   52.253659] ==================================================================
[   53.565005] ==================================================================
[   53.565856] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf20/0x4858
[   53.566734] Write of size 8 at addr fff00000c616b330 by task kunit_try_catch/254
[   53.567497] 
[   53.567978] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241127 #1
[   53.569096] Tainted: [B]=BAD_PAGE, [N]=TEST
[   53.569666] Hardware name: linux,dummy-virt (DT)
[   53.570352] Call trace:
[   53.570870]  show_stack+0x20/0x38 (C)
[   53.571473]  dump_stack_lvl+0x8c/0xd0
[   53.572038]  print_report+0x118/0x5e0
[   53.572615]  kasan_report+0xc8/0x118
[   53.573201]  kasan_check_range+0x100/0x1a8
[   53.573823]  __kasan_check_write+0x20/0x30
[   53.574477]  kasan_atomics_helper+0xf20/0x4858
[   53.575061]  kasan_atomics+0x198/0x2e8
[   53.575767]  kunit_try_run_case+0x14c/0x3d0
[   53.576413]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   53.577220]  kthread+0x24c/0x2d0
[   53.577865]  ret_from_fork+0x10/0x20
[   53.578420] 
[   53.578829] Allocated by task 254:
[   53.579330]  kasan_save_stack+0x3c/0x68
[   53.579929]  kasan_save_track+0x20/0x40
[   53.580512]  kasan_save_alloc_info+0x40/0x58
[   53.581143]  __kasan_kmalloc+0xd4/0xd8
[   53.581704]  __kmalloc_cache_noprof+0x15c/0x3c0
[   53.582357]  kasan_atomics+0xb8/0x2e8
[   53.582832]  kunit_try_run_case+0x14c/0x3d0
[   53.583529]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   53.584230]  kthread+0x24c/0x2d0
[   53.584797]  ret_from_fork+0x10/0x20
[   53.585352] 
[   53.585651] The buggy address belongs to the object at fff00000c616b300
[   53.585651]  which belongs to the cache kmalloc-64 of size 64
[   53.586983] The buggy address is located 0 bytes to the right of
[   53.586983]  allocated 48-byte region [fff00000c616b300, fff00000c616b330)
[   53.588421] 
[   53.588745] The buggy address belongs to the physical page:
[   53.589368] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10616b
[   53.590138] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   53.591099] page_type: f5(slab)
[   53.591632] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   53.592700] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   53.593596] page dumped because: kasan: bad access detected
[   53.594175] 
[   53.594561] Memory state around the buggy address:
[   53.595164]  fff00000c616b200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   53.596139]  fff00000c616b280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   53.597065] >fff00000c616b300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   53.597915]                                      ^
[   53.598347]  fff00000c616b380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   53.598904]  fff00000c616b400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   53.600852] ==================================================================
[   54.034021] ==================================================================
[   54.034816] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1414/0x4858
[   54.035762] Write of size 8 at addr fff00000c616b330 by task kunit_try_catch/254
[   54.036572] 
[   54.037015] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241127 #1
[   54.038324] Tainted: [B]=BAD_PAGE, [N]=TEST
[   54.038982] Hardware name: linux,dummy-virt (DT)
[   54.039656] Call trace:
[   54.040150]  show_stack+0x20/0x38 (C)
[   54.040818]  dump_stack_lvl+0x8c/0xd0
[   54.041488]  print_report+0x118/0x5e0
[   54.042102]  kasan_report+0xc8/0x118
[   54.042716]  kasan_check_range+0x100/0x1a8
[   54.043424]  __kasan_check_write+0x20/0x30
[   54.044100]  kasan_atomics_helper+0x1414/0x4858
[   54.044763]  kasan_atomics+0x198/0x2e8
[   54.045405]  kunit_try_run_case+0x14c/0x3d0
[   54.046094]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   54.046907]  kthread+0x24c/0x2d0
[   54.047550]  ret_from_fork+0x10/0x20
[   54.048016] 
[   54.048557] Allocated by task 254:
[   54.049155]  kasan_save_stack+0x3c/0x68
[   54.049777]  kasan_save_track+0x20/0x40
[   54.050489]  kasan_save_alloc_info+0x40/0x58
[   54.051195]  __kasan_kmalloc+0xd4/0xd8
[   54.051872]  __kmalloc_cache_noprof+0x15c/0x3c0
[   54.052537]  kasan_atomics+0xb8/0x2e8
[   54.053096]  kunit_try_run_case+0x14c/0x3d0
[   54.053709]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   54.054483]  kthread+0x24c/0x2d0
[   54.055087]  ret_from_fork+0x10/0x20
[   54.055745] 
[   54.056112] The buggy address belongs to the object at fff00000c616b300
[   54.056112]  which belongs to the cache kmalloc-64 of size 64
[   54.057628] The buggy address is located 0 bytes to the right of
[   54.057628]  allocated 48-byte region [fff00000c616b300, fff00000c616b330)
[   54.059179] 
[   54.059602] The buggy address belongs to the physical page:
[   54.060396] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10616b
[   54.061466] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   54.062394] page_type: f5(slab)
[   54.062961] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   54.063975] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   54.064925] page dumped because: kasan: bad access detected
[   54.065664] 
[   54.065997] Memory state around the buggy address:
[   54.066742]  fff00000c616b200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   54.067816]  fff00000c616b280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   54.068698] >fff00000c616b300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   54.069562]                                      ^
[   54.070240]  fff00000c616b380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   54.071254]  fff00000c616b400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   54.072141] ==================================================================
[   53.527355] ==================================================================
[   53.528089] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xeb8/0x4858
[   53.529241] Write of size 8 at addr fff00000c616b330 by task kunit_try_catch/254
[   53.530128] 
[   53.530522] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241127 #1
[   53.531667] Tainted: [B]=BAD_PAGE, [N]=TEST
[   53.532247] Hardware name: linux,dummy-virt (DT)
[   53.532951] Call trace:
[   53.533348]  show_stack+0x20/0x38 (C)
[   53.533962]  dump_stack_lvl+0x8c/0xd0
[   53.534490]  print_report+0x118/0x5e0
[   53.535118]  kasan_report+0xc8/0x118
[   53.535695]  kasan_check_range+0x100/0x1a8
[   53.536325]  __kasan_check_write+0x20/0x30
[   53.536887]  kasan_atomics_helper+0xeb8/0x4858
[   53.537594]  kasan_atomics+0x198/0x2e8
[   53.538090]  kunit_try_run_case+0x14c/0x3d0
[   53.538853]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   53.539623]  kthread+0x24c/0x2d0
[   53.540193]  ret_from_fork+0x10/0x20
[   53.540734] 
[   53.541078] Allocated by task 254:
[   53.541583]  kasan_save_stack+0x3c/0x68
[   53.542105]  kasan_save_track+0x20/0x40
[   53.542727]  kasan_save_alloc_info+0x40/0x58
[   53.543441]  __kasan_kmalloc+0xd4/0xd8
[   53.543958]  __kmalloc_cache_noprof+0x15c/0x3c0
[   53.544610]  kasan_atomics+0xb8/0x2e8
[   53.545154]  kunit_try_run_case+0x14c/0x3d0
[   53.545764]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   53.546550]  kthread+0x24c/0x2d0
[   53.547005]  ret_from_fork+0x10/0x20
[   53.547555] 
[   53.547909] The buggy address belongs to the object at fff00000c616b300
[   53.547909]  which belongs to the cache kmalloc-64 of size 64
[   53.549206] The buggy address is located 0 bytes to the right of
[   53.549206]  allocated 48-byte region [fff00000c616b300, fff00000c616b330)
[   53.550612] 
[   53.550891] The buggy address belongs to the physical page:
[   53.551610] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10616b
[   53.552564] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   53.553322] page_type: f5(slab)
[   53.553869] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   53.554775] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   53.555832] page dumped because: kasan: bad access detected
[   53.556474] 
[   53.556794] Memory state around the buggy address:
[   53.557399]  fff00000c616b200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   53.558215]  fff00000c616b280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   53.559067] >fff00000c616b300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   53.559973]                                      ^
[   53.560615]  fff00000c616b380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   53.561519]  fff00000c616b400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   53.562367] ==================================================================
[   52.121977] ==================================================================
[   52.123216] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x24c/0x4858
[   52.124566] Write of size 4 at addr fff00000c616b330 by task kunit_try_catch/254
[   52.126498] 
[   52.126783] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241127 #1
[   52.128063] Tainted: [B]=BAD_PAGE, [N]=TEST
[   52.128647] Hardware name: linux,dummy-virt (DT)
[   52.129412] Call trace:
[   52.129875]  show_stack+0x20/0x38 (C)
[   52.130608]  dump_stack_lvl+0x8c/0xd0
[   52.131339]  print_report+0x118/0x5e0
[   52.132039]  kasan_report+0xc8/0x118
[   52.132733]  kasan_check_range+0x100/0x1a8
[   52.133459]  __kasan_check_write+0x20/0x30
[   52.134381]  kasan_atomics_helper+0x24c/0x4858
[   52.135117]  kasan_atomics+0x198/0x2e8
[   52.135648]  kunit_try_run_case+0x14c/0x3d0
[   52.136342]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   52.137096]  kthread+0x24c/0x2d0
[   52.137952]  ret_from_fork+0x10/0x20
[   52.138499] 
[   52.138850] Allocated by task 254:
[   52.139317]  kasan_save_stack+0x3c/0x68
[   52.139926]  kasan_save_track+0x20/0x40
[   52.140464]  kasan_save_alloc_info+0x40/0x58
[   52.141390]  __kasan_kmalloc+0xd4/0xd8
[   52.142100]  __kmalloc_cache_noprof+0x15c/0x3c0
[   52.142736]  kasan_atomics+0xb8/0x2e8
[   52.143288]  kunit_try_run_case+0x14c/0x3d0
[   52.143808]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   52.144632]  kthread+0x24c/0x2d0
[   52.145072]  ret_from_fork+0x10/0x20
[   52.145894] 
[   52.146249] The buggy address belongs to the object at fff00000c616b300
[   52.146249]  which belongs to the cache kmalloc-64 of size 64
[   52.147602] The buggy address is located 0 bytes to the right of
[   52.147602]  allocated 48-byte region [fff00000c616b300, fff00000c616b330)
[   52.149070] 
[   52.149533] The buggy address belongs to the physical page:
[   52.150217] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10616b
[   52.151452] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   52.152410] page_type: f5(slab)
[   52.153040] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   52.154161] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   52.155082] page dumped because: kasan: bad access detected
[   52.155994] 
[   52.156354] Memory state around the buggy address:
[   52.157033]  fff00000c616b200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   52.158075]  fff00000c616b280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   52.158926] >fff00000c616b300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   52.159777]                                      ^
[   52.160540]  fff00000c616b380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   52.161725]  fff00000c616b400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   52.162676] ==================================================================
[   53.030985] ==================================================================
[   53.031769] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3dcc/0x4858
[   53.032556] Read of size 4 at addr fff00000c616b330 by task kunit_try_catch/254
[   53.033227] 
[   53.033690] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241127 #1
[   53.034951] Tainted: [B]=BAD_PAGE, [N]=TEST
[   53.035518] Hardware name: linux,dummy-virt (DT)
[   53.036095] Call trace:
[   53.036501]  show_stack+0x20/0x38 (C)
[   53.036930]  dump_stack_lvl+0x8c/0xd0
[   53.037497]  print_report+0x118/0x5e0
[   53.037922]  kasan_report+0xc8/0x118
[   53.038356]  __asan_report_load4_noabort+0x20/0x30
[   53.038908]  kasan_atomics_helper+0x3dcc/0x4858
[   53.039444]  kasan_atomics+0x198/0x2e8
[   53.040136]  kunit_try_run_case+0x14c/0x3d0
[   53.040978]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   53.041568]  kthread+0x24c/0x2d0
[   53.042008]  ret_from_fork+0x10/0x20
[   53.042492] 
[   53.042751] Allocated by task 254:
[   53.043140]  kasan_save_stack+0x3c/0x68
[   53.043616]  kasan_save_track+0x20/0x40
[   53.044385]  kasan_save_alloc_info+0x40/0x58
[   53.045068]  __kasan_kmalloc+0xd4/0xd8
[   53.045848]  __kmalloc_cache_noprof+0x15c/0x3c0
[   53.046690]  kasan_atomics+0xb8/0x2e8
[   53.047279]  kunit_try_run_case+0x14c/0x3d0
[   53.047778]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   53.048541]  kthread+0x24c/0x2d0
[   53.049182]  ret_from_fork+0x10/0x20
[   53.049836] 
[   53.050223] The buggy address belongs to the object at fff00000c616b300
[   53.050223]  which belongs to the cache kmalloc-64 of size 64
[   53.051341] The buggy address is located 0 bytes to the right of
[   53.051341]  allocated 48-byte region [fff00000c616b300, fff00000c616b330)
[   53.053034] 
[   53.053508] The buggy address belongs to the physical page:
[   53.054175] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10616b
[   53.055147] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   53.056085] page_type: f5(slab)
[   53.056687] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   53.057677] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   53.058388] page dumped because: kasan: bad access detected
[   53.059274] 
[   53.059626] Memory state around the buggy address:
[   53.060455]  fff00000c616b200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   53.061411]  fff00000c616b280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   53.062470] >fff00000c616b300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   53.063248]                                      ^
[   53.063909]  fff00000c616b380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   53.064737]  fff00000c616b400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   53.065681] ==================================================================
[   52.333628] ==================================================================
[   52.334450] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3ac/0x4858
[   52.335540] Write of size 4 at addr fff00000c616b330 by task kunit_try_catch/254
[   52.336482] 
[   52.336776] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241127 #1
[   52.337850] Tainted: [B]=BAD_PAGE, [N]=TEST
[   52.338521] Hardware name: linux,dummy-virt (DT)
[   52.339080] Call trace:
[   52.339509]  show_stack+0x20/0x38 (C)
[   52.340133]  dump_stack_lvl+0x8c/0xd0
[   52.340668]  print_report+0x118/0x5e0
[   52.341352]  kasan_report+0xc8/0x118
[   52.341897]  kasan_check_range+0x100/0x1a8
[   52.342525]  __kasan_check_write+0x20/0x30
[   52.343130]  kasan_atomics_helper+0x3ac/0x4858
[   52.343887]  kasan_atomics+0x198/0x2e8
[   52.344634]  kunit_try_run_case+0x14c/0x3d0
[   52.345420]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   52.346105]  kthread+0x24c/0x2d0
[   52.346795]  ret_from_fork+0x10/0x20
[   52.347381] 
[   52.347721] Allocated by task 254:
[   52.348234]  kasan_save_stack+0x3c/0x68
[   52.348878]  kasan_save_track+0x20/0x40
[   52.349356]  kasan_save_alloc_info+0x40/0x58
[   52.350144]  __kasan_kmalloc+0xd4/0xd8
[   52.350749]  __kmalloc_cache_noprof+0x15c/0x3c0
[   52.351396]  kasan_atomics+0xb8/0x2e8
[   52.351952]  kunit_try_run_case+0x14c/0x3d0
[   52.352495]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   52.353280]  kthread+0x24c/0x2d0
[   52.353848]  ret_from_fork+0x10/0x20
[   52.354357] 
[   52.354756] The buggy address belongs to the object at fff00000c616b300
[   52.354756]  which belongs to the cache kmalloc-64 of size 64
[   52.356087] The buggy address is located 0 bytes to the right of
[   52.356087]  allocated 48-byte region [fff00000c616b300, fff00000c616b330)
[   52.357497] 
[   52.357786] The buggy address belongs to the physical page:
[   52.358426] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10616b
[   52.359347] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   52.360251] page_type: f5(slab)
[   52.360874] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   52.361781] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   52.362656] page dumped because: kasan: bad access detected
[   52.363368] 
[   52.363665] Memory state around the buggy address:
[   52.364370]  fff00000c616b200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   52.365249]  fff00000c616b280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   52.366123] >fff00000c616b300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   52.366991]                                      ^
[   52.367597]  fff00000c616b380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   52.368455]  fff00000c616b400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   52.369269] ==================================================================
[   51.994490] ==================================================================
[   51.995965] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x40a8/0x4858
[   51.996977] Read of size 4 at addr fff00000c616b330 by task kunit_try_catch/254
[   51.998802] 
[   51.999223] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241127 #1
[   52.000431] Tainted: [B]=BAD_PAGE, [N]=TEST
[   52.001012] Hardware name: linux,dummy-virt (DT)
[   52.001759] Call trace:
[   52.002209]  show_stack+0x20/0x38 (C)
[   52.002843]  dump_stack_lvl+0x8c/0xd0
[   52.003733]  print_report+0x118/0x5e0
[   52.004501]  kasan_report+0xc8/0x118
[   52.005282]  __asan_report_load4_noabort+0x20/0x30
[   52.006209]  kasan_atomics_helper+0x40a8/0x4858
[   52.006953]  kasan_atomics+0x198/0x2e8
[   52.007562]  kunit_try_run_case+0x14c/0x3d0
[   52.008184]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   52.008920]  kthread+0x24c/0x2d0
[   52.009717]  ret_from_fork+0x10/0x20
[   52.010415] 
[   52.010706] Allocated by task 254:
[   52.011527]  kasan_save_stack+0x3c/0x68
[   52.012142]  kasan_save_track+0x20/0x40
[   52.012971]  kasan_save_alloc_info+0x40/0x58
[   52.013800]  __kasan_kmalloc+0xd4/0xd8
[   52.014447]  __kmalloc_cache_noprof+0x15c/0x3c0
[   52.015255]  kasan_atomics+0xb8/0x2e8
[   52.015816]  kunit_try_run_case+0x14c/0x3d0
[   52.016456]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   52.017088]  kthread+0x24c/0x2d0
[   52.017747]  ret_from_fork+0x10/0x20
[   52.018394] 
[   52.018767] The buggy address belongs to the object at fff00000c616b300
[   52.018767]  which belongs to the cache kmalloc-64 of size 64
[   52.020535] The buggy address is located 0 bytes to the right of
[   52.020535]  allocated 48-byte region [fff00000c616b300, fff00000c616b330)
[   52.022447] 
[   52.022973] The buggy address belongs to the physical page:
[   52.023560] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10616b
[   52.024480] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   52.025337] page_type: f5(slab)
[   52.026010] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   52.026976] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   52.027802] page dumped because: kasan: bad access detected
[   52.028536] 
[   52.028879] Memory state around the buggy address:
[   52.029540]  fff00000c616b200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   52.030264]  fff00000c616b280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   52.031326] >fff00000c616b300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   52.032121]                                      ^
[   52.032852]  fff00000c616b380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   52.033832]  fff00000c616b400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   52.034883] ==================================================================
[   53.105773] ==================================================================
[   53.106826] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3dbc/0x4858
[   53.107768] Read of size 4 at addr fff00000c616b330 by task kunit_try_catch/254
[   53.108556] 
[   53.108909] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241127 #1
[   53.109992] Tainted: [B]=BAD_PAGE, [N]=TEST
[   53.110763] Hardware name: linux,dummy-virt (DT)
[   53.111430] Call trace:
[   53.111890]  show_stack+0x20/0x38 (C)
[   53.112564]  dump_stack_lvl+0x8c/0xd0
[   53.113247]  print_report+0x118/0x5e0
[   53.113812]  kasan_report+0xc8/0x118
[   53.114479]  __asan_report_load4_noabort+0x20/0x30
[   53.115102]  kasan_atomics_helper+0x3dbc/0x4858
[   53.115823]  kasan_atomics+0x198/0x2e8
[   53.116375]  kunit_try_run_case+0x14c/0x3d0
[   53.117008]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   53.117735]  kthread+0x24c/0x2d0
[   53.118377]  ret_from_fork+0x10/0x20
[   53.118956] 
[   53.119268] Allocated by task 254:
[   53.119843]  kasan_save_stack+0x3c/0x68
[   53.120518]  kasan_save_track+0x20/0x40
[   53.121156]  kasan_save_alloc_info+0x40/0x58
[   53.121764]  __kasan_kmalloc+0xd4/0xd8
[   53.122335]  __kmalloc_cache_noprof+0x15c/0x3c0
[   53.122895]  kasan_atomics+0xb8/0x2e8
[   53.123543]  kunit_try_run_case+0x14c/0x3d0
[   53.124150]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   53.124889]  kthread+0x24c/0x2d0
[   53.125499]  ret_from_fork+0x10/0x20
[   53.126051] 
[   53.126399] The buggy address belongs to the object at fff00000c616b300
[   53.126399]  which belongs to the cache kmalloc-64 of size 64
[   53.127851] The buggy address is located 0 bytes to the right of
[   53.127851]  allocated 48-byte region [fff00000c616b300, fff00000c616b330)
[   53.129149] 
[   53.129500] The buggy address belongs to the physical page:
[   53.130152] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10616b
[   53.131040] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   53.131886] page_type: f5(slab)
[   53.132443] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   53.133380] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   53.134289] page dumped because: kasan: bad access detected
[   53.135015] 
[   53.135388] Memory state around the buggy address:
[   53.135999]  fff00000c616b200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   53.136841]  fff00000c616b280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   53.137708] >fff00000c616b300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   53.138658]                                      ^
[   53.139286]  fff00000c616b380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   53.140130]  fff00000c616b400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   53.141099] ==================================================================
[   52.682032] ==================================================================
[   52.683620] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x760/0x4858
[   52.684706] Write of size 4 at addr fff00000c616b330 by task kunit_try_catch/254
[   52.685872] 
[   52.686258] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241127 #1
[   52.687681] Tainted: [B]=BAD_PAGE, [N]=TEST
[   52.688236] Hardware name: linux,dummy-virt (DT)
[   52.688787] Call trace:
[   52.689240]  show_stack+0x20/0x38 (C)
[   52.689803]  dump_stack_lvl+0x8c/0xd0
[   52.690496]  print_report+0x118/0x5e0
[   52.691044]  kasan_report+0xc8/0x118
[   52.691705]  kasan_check_range+0x100/0x1a8
[   52.692491]  __kasan_check_write+0x20/0x30
[   52.693195]  kasan_atomics_helper+0x760/0x4858
[   52.693792]  kasan_atomics+0x198/0x2e8
[   52.694508]  kunit_try_run_case+0x14c/0x3d0
[   52.695137]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   52.695967]  kthread+0x24c/0x2d0
[   52.696546]  ret_from_fork+0x10/0x20
[   52.697142] 
[   52.697527] Allocated by task 254:
[   52.698024]  kasan_save_stack+0x3c/0x68
[   52.698763]  kasan_save_track+0x20/0x40
[   52.699382]  kasan_save_alloc_info+0x40/0x58
[   52.699994]  __kasan_kmalloc+0xd4/0xd8
[   52.700495]  __kmalloc_cache_noprof+0x15c/0x3c0
[   52.701208]  kasan_atomics+0xb8/0x2e8
[   52.701710]  kunit_try_run_case+0x14c/0x3d0
[   52.702339]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   52.702975]  kthread+0x24c/0x2d0
[   52.703606]  ret_from_fork+0x10/0x20
[   52.704153] 
[   52.704461] The buggy address belongs to the object at fff00000c616b300
[   52.704461]  which belongs to the cache kmalloc-64 of size 64
[   52.705854] The buggy address is located 0 bytes to the right of
[   52.705854]  allocated 48-byte region [fff00000c616b300, fff00000c616b330)
[   52.707317] 
[   52.707732] The buggy address belongs to the physical page:
[   52.708363] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10616b
[   52.709396] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   52.710162] page_type: f5(slab)
[   52.710628] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   52.711592] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   52.712554] page dumped because: kasan: bad access detected
[   52.713335] 
[   52.713682] Memory state around the buggy address:
[   52.714315]  fff00000c616b200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   52.715147]  fff00000c616b280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   52.716054] >fff00000c616b300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   52.716983]                                      ^
[   52.717737]  fff00000c616b380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   52.718685]  fff00000c616b400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   52.719561] ==================================================================
[   53.257578] ==================================================================
[   53.258355] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3dd8/0x4858
[   53.259409] Read of size 4 at addr fff00000c616b330 by task kunit_try_catch/254
[   53.260430] 
[   53.260802] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241127 #1
[   53.262067] Tainted: [B]=BAD_PAGE, [N]=TEST
[   53.262584] Hardware name: linux,dummy-virt (DT)
[   53.263495] Call trace:
[   53.263930]  show_stack+0x20/0x38 (C)
[   53.264683]  dump_stack_lvl+0x8c/0xd0
[   53.265347]  print_report+0x118/0x5e0
[   53.266055]  kasan_report+0xc8/0x118
[   53.266744]  __asan_report_load4_noabort+0x20/0x30
[   53.267476]  kasan_atomics_helper+0x3dd8/0x4858
[   53.268157]  kasan_atomics+0x198/0x2e8
[   53.268805]  kunit_try_run_case+0x14c/0x3d0
[   53.269618]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   53.270310]  kthread+0x24c/0x2d0
[   53.270899]  ret_from_fork+0x10/0x20
[   53.271655] 
[   53.272053] Allocated by task 254:
[   53.272700]  kasan_save_stack+0x3c/0x68
[   53.273349]  kasan_save_track+0x20/0x40
[   53.274080]  kasan_save_alloc_info+0x40/0x58
[   53.274804]  __kasan_kmalloc+0xd4/0xd8
[   53.275558]  __kmalloc_cache_noprof+0x15c/0x3c0
[   53.276238]  kasan_atomics+0xb8/0x2e8
[   53.276911]  kunit_try_run_case+0x14c/0x3d0
[   53.277599]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   53.278383]  kthread+0x24c/0x2d0
[   53.278964]  ret_from_fork+0x10/0x20
[   53.279575] 
[   53.279921] The buggy address belongs to the object at fff00000c616b300
[   53.279921]  which belongs to the cache kmalloc-64 of size 64
[   53.281376] The buggy address is located 0 bytes to the right of
[   53.281376]  allocated 48-byte region [fff00000c616b300, fff00000c616b330)
[   53.282870] 
[   53.283230] The buggy address belongs to the physical page:
[   53.283864] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10616b
[   53.284784] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   53.285658] page_type: f5(slab)
[   53.286142] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   53.287107] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   53.288205] page dumped because: kasan: bad access detected
[   53.289043] 
[   53.289485] Memory state around the buggy address:
[   53.290245]  fff00000c616b200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   53.291240]  fff00000c616b280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   53.292240] >fff00000c616b300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   53.293149]                                      ^
[   53.293905]  fff00000c616b380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   53.295015]  fff00000c616b400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   53.296003] ==================================================================
[   53.142637] ==================================================================
[   53.143406] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xc08/0x4858
[   53.144343] Write of size 4 at addr fff00000c616b330 by task kunit_try_catch/254
[   53.145226] 
[   53.145661] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241127 #1
[   53.146844] Tainted: [B]=BAD_PAGE, [N]=TEST
[   53.147456] Hardware name: linux,dummy-virt (DT)
[   53.147984] Call trace:
[   53.148487]  show_stack+0x20/0x38 (C)
[   53.149140]  dump_stack_lvl+0x8c/0xd0
[   53.149675]  print_report+0x118/0x5e0
[   53.150277]  kasan_report+0xc8/0x118
[   53.150893]  kasan_check_range+0x100/0x1a8
[   53.151513]  __kasan_check_write+0x20/0x30
[   53.152110]  kasan_atomics_helper+0xc08/0x4858
[   53.152741]  kasan_atomics+0x198/0x2e8
[   53.153402]  kunit_try_run_case+0x14c/0x3d0
[   53.154009]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   53.154749]  kthread+0x24c/0x2d0
[   53.155361]  ret_from_fork+0x10/0x20
[   53.156005] 
[   53.156308] Allocated by task 254:
[   53.156851]  kasan_save_stack+0x3c/0x68
[   53.157394]  kasan_save_track+0x20/0x40
[   53.157913]  kasan_save_alloc_info+0x40/0x58
[   53.158726]  __kasan_kmalloc+0xd4/0xd8
[   53.159443]  __kmalloc_cache_noprof+0x15c/0x3c0
[   53.160194]  kasan_atomics+0xb8/0x2e8
[   53.160746]  kunit_try_run_case+0x14c/0x3d0
[   53.161396]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   53.162129]  kthread+0x24c/0x2d0
[   53.162735]  ret_from_fork+0x10/0x20
[   53.163245] 
[   53.163559] The buggy address belongs to the object at fff00000c616b300
[   53.163559]  which belongs to the cache kmalloc-64 of size 64
[   53.164996] The buggy address is located 0 bytes to the right of
[   53.164996]  allocated 48-byte region [fff00000c616b300, fff00000c616b330)
[   53.166349] 
[   53.166693] The buggy address belongs to the physical page:
[   53.167541] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10616b
[   53.168454] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   53.169226] page_type: f5(slab)
[   53.169711] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   53.170643] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   53.171520] page dumped because: kasan: bad access detected
[   53.172214] 
[   53.172572] Memory state around the buggy address:
[   53.173169]  fff00000c616b200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   53.174025]  fff00000c616b280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   53.174947] >fff00000c616b300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   53.175759]                                      ^
[   53.176385]  fff00000c616b380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   53.177280]  fff00000c616b400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   53.178160] ==================================================================
[   53.639959] ==================================================================
[   53.640872] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xff0/0x4858
[   53.642013] Write of size 8 at addr fff00000c616b330 by task kunit_try_catch/254
[   53.642959] 
[   53.643322] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241127 #1
[   53.644276] Tainted: [B]=BAD_PAGE, [N]=TEST
[   53.644987] Hardware name: linux,dummy-virt (DT)
[   53.645620] Call trace:
[   53.646149]  show_stack+0x20/0x38 (C)
[   53.646692]  dump_stack_lvl+0x8c/0xd0
[   53.647341]  print_report+0x118/0x5e0
[   53.648005]  kasan_report+0xc8/0x118
[   53.648615]  kasan_check_range+0x100/0x1a8
[   53.649348]  __kasan_check_write+0x20/0x30
[   53.649973]  kasan_atomics_helper+0xff0/0x4858
[   53.650667]  kasan_atomics+0x198/0x2e8
[   53.651221]  kunit_try_run_case+0x14c/0x3d0
[   53.651841]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   53.652564]  kthread+0x24c/0x2d0
[   53.653072]  ret_from_fork+0x10/0x20
[   53.653747] 
[   53.654065] Allocated by task 254:
[   53.654594]  kasan_save_stack+0x3c/0x68
[   53.655181]  kasan_save_track+0x20/0x40
[   53.655706]  kasan_save_alloc_info+0x40/0x58
[   53.656408]  __kasan_kmalloc+0xd4/0xd8
[   53.656907]  __kmalloc_cache_noprof+0x15c/0x3c0
[   53.657655]  kasan_atomics+0xb8/0x2e8
[   53.658169]  kunit_try_run_case+0x14c/0x3d0
[   53.658829]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   53.659432]  kthread+0x24c/0x2d0
[   53.660025]  ret_from_fork+0x10/0x20
[   53.660508] 
[   53.660900] The buggy address belongs to the object at fff00000c616b300
[   53.660900]  which belongs to the cache kmalloc-64 of size 64
[   53.662327] The buggy address is located 0 bytes to the right of
[   53.662327]  allocated 48-byte region [fff00000c616b300, fff00000c616b330)
[   53.663764] 
[   53.664098] The buggy address belongs to the physical page:
[   53.664746] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10616b
[   53.665713] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   53.666566] page_type: f5(slab)
[   53.667168] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   53.668077] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   53.669039] page dumped because: kasan: bad access detected
[   53.669743] 
[   53.670069] Memory state around the buggy address:
[   53.670725]  fff00000c616b200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   53.671687]  fff00000c616b280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   53.672682] >fff00000c616b300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   53.673597]                                      ^
[   53.674149]  fff00000c616b380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   53.675024]  fff00000c616b400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   53.675850] ==================================================================
[   52.077377] ==================================================================
[   52.079332] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1ec/0x4858
[   52.079944] Read of size 4 at addr fff00000c616b330 by task kunit_try_catch/254
[   52.081247] 
[   52.081709] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241127 #1
[   52.082779] Tainted: [B]=BAD_PAGE, [N]=TEST
[   52.083193] Hardware name: linux,dummy-virt (DT)
[   52.084122] Call trace:
[   52.084708]  show_stack+0x20/0x38 (C)
[   52.085422]  dump_stack_lvl+0x8c/0xd0
[   52.086267]  print_report+0x118/0x5e0
[   52.087019]  kasan_report+0xc8/0x118
[   52.087819]  kasan_check_range+0x100/0x1a8
[   52.088632]  __kasan_check_read+0x20/0x30
[   52.089467]  kasan_atomics_helper+0x1ec/0x4858
[   52.090163]  kasan_atomics+0x198/0x2e8
[   52.090924]  kunit_try_run_case+0x14c/0x3d0
[   52.091645]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   52.092243]  kthread+0x24c/0x2d0
[   52.092895]  ret_from_fork+0x10/0x20
[   52.093655] 
[   52.094052] Allocated by task 254:
[   52.094595]  kasan_save_stack+0x3c/0x68
[   52.095245]  kasan_save_track+0x20/0x40
[   52.096220]  kasan_save_alloc_info+0x40/0x58
[   52.096872]  __kasan_kmalloc+0xd4/0xd8
[   52.097691]  __kmalloc_cache_noprof+0x15c/0x3c0
[   52.098150]  kasan_atomics+0xb8/0x2e8
[   52.098920]  kunit_try_run_case+0x14c/0x3d0
[   52.099790]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   52.100623]  kthread+0x24c/0x2d0
[   52.101454]  ret_from_fork+0x10/0x20
[   52.102144] 
[   52.102409] The buggy address belongs to the object at fff00000c616b300
[   52.102409]  which belongs to the cache kmalloc-64 of size 64
[   52.104075] The buggy address is located 0 bytes to the right of
[   52.104075]  allocated 48-byte region [fff00000c616b300, fff00000c616b330)
[   52.106167] 
[   52.106403] The buggy address belongs to the physical page:
[   52.107428] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10616b
[   52.108361] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   52.109262] page_type: f5(slab)
[   52.110157] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   52.111058] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   52.112000] page dumped because: kasan: bad access detected
[   52.112705] 
[   52.112999] Memory state around the buggy address:
[   52.113729]  fff00000c616b200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   52.114606]  fff00000c616b280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   52.115458] >fff00000c616b300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   52.116240]                                      ^
[   52.116968]  fff00000c616b380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   52.117979]  fff00000c616b400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   52.118831] ==================================================================
[   52.801951] ==================================================================
[   52.802702] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x42d8/0x4858
[   52.803946] Read of size 4 at addr fff00000c616b330 by task kunit_try_catch/254
[   52.805663] 
[   52.806133] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241127 #1
[   52.807681] Tainted: [B]=BAD_PAGE, [N]=TEST
[   52.808269] Hardware name: linux,dummy-virt (DT)
[   52.808829] Call trace:
[   52.809215]  show_stack+0x20/0x38 (C)
[   52.809761]  dump_stack_lvl+0x8c/0xd0
[   52.810491]  print_report+0x118/0x5e0
[   52.811185]  kasan_report+0xc8/0x118
[   52.811913]  __asan_report_load4_noabort+0x20/0x30
[   52.812562]  kasan_atomics_helper+0x42d8/0x4858
[   52.813230]  kasan_atomics+0x198/0x2e8
[   52.813860]  kunit_try_run_case+0x14c/0x3d0
[   52.814481]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   52.815346]  kthread+0x24c/0x2d0
[   52.815853]  ret_from_fork+0x10/0x20
[   52.816465] 
[   52.816753] Allocated by task 254:
[   52.817288]  kasan_save_stack+0x3c/0x68
[   52.817820]  kasan_save_track+0x20/0x40
[   52.818472]  kasan_save_alloc_info+0x40/0x58
[   52.819002]  __kasan_kmalloc+0xd4/0xd8
[   52.819677]  __kmalloc_cache_noprof+0x15c/0x3c0
[   52.820309]  kasan_atomics+0xb8/0x2e8
[   52.820976]  kunit_try_run_case+0x14c/0x3d0
[   52.821652]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   52.822528]  kthread+0x24c/0x2d0
[   52.823002]  ret_from_fork+0x10/0x20
[   52.823625] 
[   52.823947] The buggy address belongs to the object at fff00000c616b300
[   52.823947]  which belongs to the cache kmalloc-64 of size 64
[   52.825394] The buggy address is located 0 bytes to the right of
[   52.825394]  allocated 48-byte region [fff00000c616b300, fff00000c616b330)
[   52.826755] 
[   52.827052] The buggy address belongs to the physical page:
[   52.827835] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10616b
[   52.828777] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   52.829632] page_type: f5(slab)
[   52.830136] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   52.831026] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   52.832022] page dumped because: kasan: bad access detected
[   52.832674] 
[   52.833022] Memory state around the buggy address:
[   52.833615]  fff00000c616b200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   52.834517]  fff00000c616b280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   52.835497] >fff00000c616b300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   52.836346]                                      ^
[   52.837379]  fff00000c616b380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   52.838332]  fff00000c616b400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   52.839332] ==================================================================
[   53.717558] ==================================================================
[   53.718399] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x10c0/0x4858
[   53.719139] Write of size 8 at addr fff00000c616b330 by task kunit_try_catch/254
[   53.720191] 
[   53.720588] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241127 #1
[   53.721766] Tainted: [B]=BAD_PAGE, [N]=TEST
[   53.722426] Hardware name: linux,dummy-virt (DT)
[   53.722998] Call trace:
[   53.723472]  show_stack+0x20/0x38 (C)
[   53.724041]  dump_stack_lvl+0x8c/0xd0
[   53.724634]  print_report+0x118/0x5e0
[   53.725177]  kasan_report+0xc8/0x118
[   53.725734]  kasan_check_range+0x100/0x1a8
[   53.726385]  __kasan_check_write+0x20/0x30
[   53.726963]  kasan_atomics_helper+0x10c0/0x4858
[   53.727655]  kasan_atomics+0x198/0x2e8
[   53.728149]  kunit_try_run_case+0x14c/0x3d0
[   53.728837]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   53.729685]  kthread+0x24c/0x2d0
[   53.730248]  ret_from_fork+0x10/0x20
[   53.730858] 
[   53.731164] Allocated by task 254:
[   53.731763]  kasan_save_stack+0x3c/0x68
[   53.732346]  kasan_save_track+0x20/0x40
[   53.732989]  kasan_save_alloc_info+0x40/0x58
[   53.733574]  __kasan_kmalloc+0xd4/0xd8
[   53.734191]  __kmalloc_cache_noprof+0x15c/0x3c0
[   53.734821]  kasan_atomics+0xb8/0x2e8
[   53.735358]  kunit_try_run_case+0x14c/0x3d0
[   53.735947]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   53.736793]  kthread+0x24c/0x2d0
[   53.737270]  ret_from_fork+0x10/0x20
[   53.737830] 
[   53.738128] The buggy address belongs to the object at fff00000c616b300
[   53.738128]  which belongs to the cache kmalloc-64 of size 64
[   53.739636] The buggy address is located 0 bytes to the right of
[   53.739636]  allocated 48-byte region [fff00000c616b300, fff00000c616b330)
[   53.741047] 
[   53.741345] The buggy address belongs to the physical page:
[   53.742124] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10616b
[   53.743022] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   53.743857] page_type: f5(slab)
[   53.744351] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   53.745189] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   53.746175] page dumped because: kasan: bad access detected
[   53.746899] 
[   53.747229] Memory state around the buggy address:
[   53.747853]  fff00000c616b200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   53.748691]  fff00000c616b280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   53.749650] >fff00000c616b300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   53.750520]                                      ^
[   53.751199]  fff00000c616b380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   53.752015]  fff00000c616b400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   53.752858] ==================================================================
[   54.187491] ==================================================================
[   54.188191] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x15b4/0x4858
[   54.188936] Write of size 8 at addr fff00000c616b330 by task kunit_try_catch/254
[   54.189979] 
[   54.190326] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241127 #1
[   54.191437] Tainted: [B]=BAD_PAGE, [N]=TEST
[   54.191972] Hardware name: linux,dummy-virt (DT)
[   54.192618] Call trace:
[   54.193081]  show_stack+0x20/0x38 (C)
[   54.193596]  dump_stack_lvl+0x8c/0xd0
[   54.194236]  print_report+0x118/0x5e0
[   54.194739]  kasan_report+0xc8/0x118
[   54.195478]  kasan_check_range+0x100/0x1a8
[   54.196096]  __kasan_check_write+0x20/0x30
[   54.196675]  kasan_atomics_helper+0x15b4/0x4858
[   54.197442]  kasan_atomics+0x198/0x2e8
[   54.197947]  kunit_try_run_case+0x14c/0x3d0
[   54.198672]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   54.199417]  kthread+0x24c/0x2d0
[   54.200077]  ret_from_fork+0x10/0x20
[   54.200560] 
[   54.200921] Allocated by task 254:
[   54.201530]  kasan_save_stack+0x3c/0x68
[   54.202075]  kasan_save_track+0x20/0x40
[   54.202744]  kasan_save_alloc_info+0x40/0x58
[   54.203444]  __kasan_kmalloc+0xd4/0xd8
[   54.203911]  __kmalloc_cache_noprof+0x15c/0x3c0
[   54.204658]  kasan_atomics+0xb8/0x2e8
[   54.205108]  kunit_try_run_case+0x14c/0x3d0
[   54.205792]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   54.206421]  kthread+0x24c/0x2d0
[   54.207041]  ret_from_fork+0x10/0x20
[   54.207624] 
[   54.208087] The buggy address belongs to the object at fff00000c616b300
[   54.208087]  which belongs to the cache kmalloc-64 of size 64
[   54.209498] The buggy address is located 0 bytes to the right of
[   54.209498]  allocated 48-byte region [fff00000c616b300, fff00000c616b330)
[   54.210906] 
[   54.211217] The buggy address belongs to the physical page:
[   54.211954] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10616b
[   54.212838] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   54.213718] page_type: f5(slab)
[   54.214199] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   54.215068] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   54.215975] page dumped because: kasan: bad access detected
[   54.216786] 
[   54.217094] Memory state around the buggy address:
[   54.217811]  fff00000c616b200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   54.218668]  fff00000c616b280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   54.219620] >fff00000c616b300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   54.220431]                                      ^
[   54.221008]  fff00000c616b380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   54.221879]  fff00000c616b400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   54.222801] ==================================================================
[   52.918108] ==================================================================
[   52.918947] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa04/0x4858
[   52.919742] Write of size 4 at addr fff00000c616b330 by task kunit_try_catch/254
[   52.920490] 
[   52.920916] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241127 #1
[   52.922350] Tainted: [B]=BAD_PAGE, [N]=TEST
[   52.922984] Hardware name: linux,dummy-virt (DT)
[   52.923640] Call trace:
[   52.923969]  show_stack+0x20/0x38 (C)
[   52.924632]  dump_stack_lvl+0x8c/0xd0
[   52.925173]  print_report+0x118/0x5e0
[   52.925786]  kasan_report+0xc8/0x118
[   52.926351]  kasan_check_range+0x100/0x1a8
[   52.927050]  __kasan_check_write+0x20/0x30
[   52.927685]  kasan_atomics_helper+0xa04/0x4858
[   52.928279]  kasan_atomics+0x198/0x2e8
[   52.928984]  kunit_try_run_case+0x14c/0x3d0
[   52.929678]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   52.930488]  kthread+0x24c/0x2d0
[   52.931038]  ret_from_fork+0x10/0x20
[   52.931607] 
[   52.932036] Allocated by task 254:
[   52.932638]  kasan_save_stack+0x3c/0x68
[   52.933141]  kasan_save_track+0x20/0x40
[   52.933799]  kasan_save_alloc_info+0x40/0x58
[   52.934320]  __kasan_kmalloc+0xd4/0xd8
[   52.934943]  __kmalloc_cache_noprof+0x15c/0x3c0
[   52.935621]  kasan_atomics+0xb8/0x2e8
[   52.936130]  kunit_try_run_case+0x14c/0x3d0
[   52.936810]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   52.937489]  kthread+0x24c/0x2d0
[   52.938073]  ret_from_fork+0x10/0x20
[   52.938593] 
[   52.939037] The buggy address belongs to the object at fff00000c616b300
[   52.939037]  which belongs to the cache kmalloc-64 of size 64
[   52.940429] The buggy address is located 0 bytes to the right of
[   52.940429]  allocated 48-byte region [fff00000c616b300, fff00000c616b330)
[   52.941789] 
[   52.942103] The buggy address belongs to the physical page:
[   52.942863] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10616b
[   52.943739] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   52.944608] page_type: f5(slab)
[   52.945169] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   52.946148] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   52.947086] page dumped because: kasan: bad access detected
[   52.947722] 
[   52.948058] Memory state around the buggy address:
[   52.948599]  fff00000c616b200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   52.949553]  fff00000c616b280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   52.950430] >fff00000c616b300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   52.951384]                                      ^
[   52.952103]  fff00000c616b380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   52.952929]  fff00000c616b400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   52.953798] ==================================================================
[   52.993375] ==================================================================
[   52.994173] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xad4/0x4858
[   52.995762] Write of size 4 at addr fff00000c616b330 by task kunit_try_catch/254
[   52.996502] 
[   52.996962] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241127 #1
[   52.998093] Tainted: [B]=BAD_PAGE, [N]=TEST
[   52.998652] Hardware name: linux,dummy-virt (DT)
[   52.999255] Call trace:
[   52.999705]  show_stack+0x20/0x38 (C)
[   53.000420]  dump_stack_lvl+0x8c/0xd0
[   53.000976]  print_report+0x118/0x5e0
[   53.001747]  kasan_report+0xc8/0x118
[   53.002354]  kasan_check_range+0x100/0x1a8
[   53.002909]  __kasan_check_write+0x20/0x30
[   53.003677]  kasan_atomics_helper+0xad4/0x4858
[   53.004334]  kasan_atomics+0x198/0x2e8
[   53.004863]  kunit_try_run_case+0x14c/0x3d0
[   53.005646]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   53.006506]  kthread+0x24c/0x2d0
[   53.007155]  ret_from_fork+0x10/0x20
[   53.007702] 
[   53.008054] Allocated by task 254:
[   53.008689]  kasan_save_stack+0x3c/0x68
[   53.009249]  kasan_save_track+0x20/0x40
[   53.009752]  kasan_save_alloc_info+0x40/0x58
[   53.010482]  __kasan_kmalloc+0xd4/0xd8
[   53.011023]  __kmalloc_cache_noprof+0x15c/0x3c0
[   53.011713]  kasan_atomics+0xb8/0x2e8
[   53.012366]  kunit_try_run_case+0x14c/0x3d0
[   53.012933]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   53.013621]  kthread+0x24c/0x2d0
[   53.014192]  ret_from_fork+0x10/0x20
[   53.014715] 
[   53.015093] The buggy address belongs to the object at fff00000c616b300
[   53.015093]  which belongs to the cache kmalloc-64 of size 64
[   53.016401] The buggy address is located 0 bytes to the right of
[   53.016401]  allocated 48-byte region [fff00000c616b300, fff00000c616b330)
[   53.017862] 
[   53.018198] The buggy address belongs to the physical page:
[   53.018769] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10616b
[   53.019810] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   53.020640] page_type: f5(slab)
[   53.021101] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   53.022062] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   53.023052] page dumped because: kasan: bad access detected
[   53.023856] 
[   53.024149] Memory state around the buggy address:
[   53.024747]  fff00000c616b200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   53.025584]  fff00000c616b280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   53.026490] >fff00000c616b300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   53.027307]                                      ^
[   53.027910]  fff00000c616b380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   53.028784]  fff00000c616b400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   53.029629] ==================================================================
[   53.677803] ==================================================================
[   53.678628] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1058/0x4858
[   53.680142] Write of size 8 at addr fff00000c616b330 by task kunit_try_catch/254
[   53.681083] 
[   53.681549] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241127 #1
[   53.683312] Tainted: [B]=BAD_PAGE, [N]=TEST
[   53.683953] Hardware name: linux,dummy-virt (DT)
[   53.684990] Call trace:
[   53.686124]  show_stack+0x20/0x38 (C)
[   53.686813]  dump_stack_lvl+0x8c/0xd0
[   53.687438]  print_report+0x118/0x5e0
[   53.688066]  kasan_report+0xc8/0x118
[   53.688751]  kasan_check_range+0x100/0x1a8
[   53.689409]  __kasan_check_write+0x20/0x30
[   53.690006]  kasan_atomics_helper+0x1058/0x4858
[   53.690575]  kasan_atomics+0x198/0x2e8
[   53.691202]  kunit_try_run_case+0x14c/0x3d0
[   53.691903]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   53.692701]  kthread+0x24c/0x2d0
[   53.693259]  ret_from_fork+0x10/0x20
[   53.693849] 
[   53.694204] Allocated by task 254:
[   53.694803]  kasan_save_stack+0x3c/0x68
[   53.695558]  kasan_save_track+0x20/0x40
[   53.696113]  kasan_save_alloc_info+0x40/0x58
[   53.696725]  __kasan_kmalloc+0xd4/0xd8
[   53.697328]  __kmalloc_cache_noprof+0x15c/0x3c0
[   53.697941]  kasan_atomics+0xb8/0x2e8
[   53.698482]  kunit_try_run_case+0x14c/0x3d0
[   53.699117]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   53.699825]  kthread+0x24c/0x2d0
[   53.700390]  ret_from_fork+0x10/0x20
[   53.700884] 
[   53.701328] The buggy address belongs to the object at fff00000c616b300
[   53.701328]  which belongs to the cache kmalloc-64 of size 64
[   53.702643] The buggy address is located 0 bytes to the right of
[   53.702643]  allocated 48-byte region [fff00000c616b300, fff00000c616b330)
[   53.704037] 
[   53.704360] The buggy address belongs to the physical page:
[   53.705114] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10616b
[   53.706170] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   53.707024] page_type: f5(slab)
[   53.707641] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   53.708549] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   53.709394] page dumped because: kasan: bad access detected
[   53.710133] 
[   53.710529] Memory state around the buggy address:
[   53.711139]  fff00000c616b200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   53.712012]  fff00000c616b280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   53.712914] >fff00000c616b300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   53.713793]                                      ^
[   53.714381]  fff00000c616b380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   53.715320]  fff00000c616b400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   53.716121] ==================================================================
[   53.216640] ==================================================================
[   53.218228] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xca0/0x4858
[   53.219396] Write of size 4 at addr fff00000c616b330 by task kunit_try_catch/254
[   53.220539] 
[   53.220882] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241127 #1
[   53.222070] Tainted: [B]=BAD_PAGE, [N]=TEST
[   53.222965] Hardware name: linux,dummy-virt (DT)
[   53.223564] Call trace:
[   53.224052]  show_stack+0x20/0x38 (C)
[   53.224734]  dump_stack_lvl+0x8c/0xd0
[   53.225418]  print_report+0x118/0x5e0
[   53.226082]  kasan_report+0xc8/0x118
[   53.226718]  kasan_check_range+0x100/0x1a8
[   53.227421]  __kasan_check_write+0x20/0x30
[   53.228119]  kasan_atomics_helper+0xca0/0x4858
[   53.228886]  kasan_atomics+0x198/0x2e8
[   53.229582]  kunit_try_run_case+0x14c/0x3d0
[   53.230260]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   53.231129]  kthread+0x24c/0x2d0
[   53.231821]  ret_from_fork+0x10/0x20
[   53.232457] 
[   53.232789] Allocated by task 254:
[   53.233365]  kasan_save_stack+0x3c/0x68
[   53.234067]  kasan_save_track+0x20/0x40
[   53.234716]  kasan_save_alloc_info+0x40/0x58
[   53.235381]  __kasan_kmalloc+0xd4/0xd8
[   53.236108]  __kmalloc_cache_noprof+0x15c/0x3c0
[   53.236816]  kasan_atomics+0xb8/0x2e8
[   53.237436]  kunit_try_run_case+0x14c/0x3d0
[   53.238110]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   53.238872]  kthread+0x24c/0x2d0
[   53.239486]  ret_from_fork+0x10/0x20
[   53.240060] 
[   53.240465] The buggy address belongs to the object at fff00000c616b300
[   53.240465]  which belongs to the cache kmalloc-64 of size 64
[   53.241910] The buggy address is located 0 bytes to the right of
[   53.241910]  allocated 48-byte region [fff00000c616b300, fff00000c616b330)
[   53.243403] 
[   53.243811] The buggy address belongs to the physical page:
[   53.244576] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10616b
[   53.245588] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   53.246382] page_type: f5(slab)
[   53.246969] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   53.248006] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   53.248949] page dumped because: kasan: bad access detected
[   53.249727] 
[   53.250123] Memory state around the buggy address:
[   53.250787]  fff00000c616b200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   53.251818]  fff00000c616b280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   53.252709] >fff00000c616b300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   53.253597]                                      ^
[   53.254266]  fff00000c616b380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   53.255169]  fff00000c616b400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   53.256024] ==================================================================
[   53.754169] ==================================================================
[   53.755578] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1128/0x4858
[   53.756382] Write of size 8 at addr fff00000c616b330 by task kunit_try_catch/254
[   53.757399] 
[   53.757722] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241127 #1
[   53.758934] Tainted: [B]=BAD_PAGE, [N]=TEST
[   53.759442] Hardware name: linux,dummy-virt (DT)
[   53.759950] Call trace:
[   53.760448]  show_stack+0x20/0x38 (C)
[   53.761101]  dump_stack_lvl+0x8c/0xd0
[   53.761646]  print_report+0x118/0x5e0
[   53.762350]  kasan_report+0xc8/0x118
[   53.763050]  kasan_check_range+0x100/0x1a8
[   53.763798]  __kasan_check_write+0x20/0x30
[   53.764486]  kasan_atomics_helper+0x1128/0x4858
[   53.765251]  kasan_atomics+0x198/0x2e8
[   53.765804]  kunit_try_run_case+0x14c/0x3d0
[   53.766536]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   53.767247]  kthread+0x24c/0x2d0
[   53.767879]  ret_from_fork+0x10/0x20
[   53.768489] 
[   53.768853] Allocated by task 254:
[   53.769373]  kasan_save_stack+0x3c/0x68
[   53.769932]  kasan_save_track+0x20/0x40
[   53.770516]  kasan_save_alloc_info+0x40/0x58
[   53.771227]  __kasan_kmalloc+0xd4/0xd8
[   53.771739]  __kmalloc_cache_noprof+0x15c/0x3c0
[   53.772485]  kasan_atomics+0xb8/0x2e8
[   53.773045]  kunit_try_run_case+0x14c/0x3d0
[   53.773658]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   53.774437]  kthread+0x24c/0x2d0
[   53.774961]  ret_from_fork+0x10/0x20
[   53.775544] 
[   53.775837] The buggy address belongs to the object at fff00000c616b300
[   53.775837]  which belongs to the cache kmalloc-64 of size 64
[   53.777195] The buggy address is located 0 bytes to the right of
[   53.777195]  allocated 48-byte region [fff00000c616b300, fff00000c616b330)
[   53.778610] 
[   53.778899] The buggy address belongs to the physical page:
[   53.779682] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10616b
[   53.780522] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   53.781422] page_type: f5(slab)
[   53.781874] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   53.782796] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   53.783779] page dumped because: kasan: bad access detected
[   53.784453] 
[   53.784759] Memory state around the buggy address:
[   53.785419]  fff00000c616b200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   53.786267]  fff00000c616b280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   53.787030] >fff00000c616b300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   53.787950]                                      ^
[   53.788642]  fff00000c616b380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   53.789655]  fff00000c616b400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   53.790768] ==================================================================
[   54.112535] ==================================================================
[   54.113769] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x14e4/0x4858
[   54.114341] Write of size 8 at addr fff00000c616b330 by task kunit_try_catch/254
[   54.115135] 
[   54.115535] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241127 #1
[   54.116588] Tainted: [B]=BAD_PAGE, [N]=TEST
[   54.117224] Hardware name: linux,dummy-virt (DT)
[   54.117778] Call trace:
[   54.118256]  show_stack+0x20/0x38 (C)
[   54.118825]  dump_stack_lvl+0x8c/0xd0
[   54.119626]  print_report+0x118/0x5e0
[   54.120155]  kasan_report+0xc8/0x118
[   54.120748]  kasan_check_range+0x100/0x1a8
[   54.121395]  __kasan_check_write+0x20/0x30
[   54.122100]  kasan_atomics_helper+0x14e4/0x4858
[   54.122779]  kasan_atomics+0x198/0x2e8
[   54.123332]  kunit_try_run_case+0x14c/0x3d0
[   54.123996]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   54.124732]  kthread+0x24c/0x2d0
[   54.125316]  ret_from_fork+0x10/0x20
[   54.125939] 
[   54.126271] Allocated by task 254:
[   54.126851]  kasan_save_stack+0x3c/0x68
[   54.127370]  kasan_save_track+0x20/0x40
[   54.127998]  kasan_save_alloc_info+0x40/0x58
[   54.128599]  __kasan_kmalloc+0xd4/0xd8
[   54.129056]  __kmalloc_cache_noprof+0x15c/0x3c0
[   54.129788]  kasan_atomics+0xb8/0x2e8
[   54.130266]  kunit_try_run_case+0x14c/0x3d0
[   54.130968]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   54.131765]  kthread+0x24c/0x2d0
[   54.132390]  ret_from_fork+0x10/0x20
[   54.132899] 
[   54.133333] The buggy address belongs to the object at fff00000c616b300
[   54.133333]  which belongs to the cache kmalloc-64 of size 64
[   54.134708] The buggy address is located 0 bytes to the right of
[   54.134708]  allocated 48-byte region [fff00000c616b300, fff00000c616b330)
[   54.136152] 
[   54.136496] The buggy address belongs to the physical page:
[   54.137283] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10616b
[   54.138205] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   54.138947] page_type: f5(slab)
[   54.139508] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   54.140413] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   54.141337] page dumped because: kasan: bad access detected
[   54.142068] 
[   54.142438] Memory state around the buggy address:
[   54.143087]  fff00000c616b200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   54.143950]  fff00000c616b280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   54.144802] >fff00000c616b300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   54.145688]                                      ^
[   54.146285]  fff00000c616b380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   54.147160]  fff00000c616b400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   54.148092] ==================================================================
[   54.224042] ==================================================================
[   54.224765] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3db0/0x4858
[   54.225778] Read of size 8 at addr fff00000c616b330 by task kunit_try_catch/254
[   54.226615] 
[   54.227064] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241127 #1
[   54.228171] Tainted: [B]=BAD_PAGE, [N]=TEST
[   54.228627] Hardware name: linux,dummy-virt (DT)
[   54.229398] Call trace:
[   54.229783]  show_stack+0x20/0x38 (C)
[   54.230469]  dump_stack_lvl+0x8c/0xd0
[   54.230982]  print_report+0x118/0x5e0
[   54.231640]  kasan_report+0xc8/0x118
[   54.232353]  __asan_report_load8_noabort+0x20/0x30
[   54.233098]  kasan_atomics_helper+0x3db0/0x4858
[   54.233773]  kasan_atomics+0x198/0x2e8
[   54.234338]  kunit_try_run_case+0x14c/0x3d0
[   54.234946]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   54.235589]  kthread+0x24c/0x2d0
[   54.236205]  ret_from_fork+0x10/0x20
[   54.236841] 
[   54.237200] Allocated by task 254:
[   54.237723]  kasan_save_stack+0x3c/0x68
[   54.238346]  kasan_save_track+0x20/0x40
[   54.238930]  kasan_save_alloc_info+0x40/0x58
[   54.239476]  __kasan_kmalloc+0xd4/0xd8
[   54.240133]  __kmalloc_cache_noprof+0x15c/0x3c0
[   54.240829]  kasan_atomics+0xb8/0x2e8
[   54.241565]  kunit_try_run_case+0x14c/0x3d0
[   54.242201]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   54.243118]  kthread+0x24c/0x2d0
[   54.243646]  ret_from_fork+0x10/0x20
[   54.244190] 
[   54.244515] The buggy address belongs to the object at fff00000c616b300
[   54.244515]  which belongs to the cache kmalloc-64 of size 64
[   54.245998] The buggy address is located 0 bytes to the right of
[   54.245998]  allocated 48-byte region [fff00000c616b300, fff00000c616b330)
[   54.247411] 
[   54.247740] The buggy address belongs to the physical page:
[   54.248348] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10616b
[   54.249353] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   54.250135] page_type: f5(slab)
[   54.250671] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   54.251554] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   54.252502] page dumped because: kasan: bad access detected
[   54.253252] 
[   54.253586] Memory state around the buggy address:
[   54.254205]  fff00000c616b200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   54.255057]  fff00000c616b280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   54.255912] >fff00000c616b300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   54.256826]                                      ^
[   54.257362]  fff00000c616b380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   54.258180]  fff00000c616b400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   54.259085] ==================================================================
[   54.335423] ==================================================================
[   54.336212] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x16d0/0x4858
[   54.337756] Write of size 8 at addr fff00000c616b330 by task kunit_try_catch/254
[   54.339284] 
[   54.339627] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241127 #1
[   54.340478] Tainted: [B]=BAD_PAGE, [N]=TEST
[   54.340833] Hardware name: linux,dummy-virt (DT)
[   54.341211] Call trace:
[   54.341494]  show_stack+0x20/0x38 (C)
[   54.341872]  dump_stack_lvl+0x8c/0xd0
[   54.342249]  print_report+0x118/0x5e0
[   54.342732]  kasan_report+0xc8/0x118
[   54.343182]  kasan_check_range+0x100/0x1a8
[   54.343786]  __kasan_check_write+0x20/0x30
[   54.344620]  kasan_atomics_helper+0x16d0/0x4858
[   54.345442]  kasan_atomics+0x198/0x2e8
[   54.345835]  kunit_try_run_case+0x14c/0x3d0
[   54.346243]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   54.346747]  kthread+0x24c/0x2d0
[   54.347133]  ret_from_fork+0x10/0x20
[   54.347560] 
[   54.347843] Allocated by task 254:
[   54.348323]  kasan_save_stack+0x3c/0x68
[   54.349175]  kasan_save_track+0x20/0x40
[   54.349811]  kasan_save_alloc_info+0x40/0x58
[   54.350715]  __kasan_kmalloc+0xd4/0xd8
[   54.351425]  __kmalloc_cache_noprof+0x15c/0x3c0
[   54.351994]  kasan_atomics+0xb8/0x2e8
[   54.352451]  kunit_try_run_case+0x14c/0x3d0
[   54.352912]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   54.353455]  kthread+0x24c/0x2d0
[   54.354124]  ret_from_fork+0x10/0x20
[   54.354877] 
[   54.355357] The buggy address belongs to the object at fff00000c616b300
[   54.355357]  which belongs to the cache kmalloc-64 of size 64
[   54.356872] The buggy address is located 0 bytes to the right of
[   54.356872]  allocated 48-byte region [fff00000c616b300, fff00000c616b330)
[   54.358030] 
[   54.358512] The buggy address belongs to the physical page:
[   54.359702] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10616b
[   54.360645] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   54.361439] page_type: f5(slab)
[   54.361991] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   54.362904] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   54.363830] page dumped because: kasan: bad access detected
[   54.364601] 
[   54.364909] Memory state around the buggy address:
[   54.365556]  fff00000c616b200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   54.366473]  fff00000c616b280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   54.367361] >fff00000c616b300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   54.368258]                                      ^
[   54.368920]  fff00000c616b380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   54.369741]  fff00000c616b400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   54.370675] ==================================================================
[   53.875913] ==================================================================
[   53.877604] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x126c/0x4858
[   53.878344] Write of size 8 at addr fff00000c616b330 by task kunit_try_catch/254
[   53.879356] 
[   53.879725] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241127 #1
[   53.880979] Tainted: [B]=BAD_PAGE, [N]=TEST
[   53.881660] Hardware name: linux,dummy-virt (DT)
[   53.882283] Call trace:
[   53.882674]  show_stack+0x20/0x38 (C)
[   53.883282]  dump_stack_lvl+0x8c/0xd0
[   53.883940]  print_report+0x118/0x5e0
[   53.884537]  kasan_report+0xc8/0x118
[   53.885077]  kasan_check_range+0x100/0x1a8
[   53.885639]  __kasan_check_write+0x20/0x30
[   53.886438]  kasan_atomics_helper+0x126c/0x4858
[   53.887083]  kasan_atomics+0x198/0x2e8
[   53.887648]  kunit_try_run_case+0x14c/0x3d0
[   53.888249]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   53.888975]  kthread+0x24c/0x2d0
[   53.889600]  ret_from_fork+0x10/0x20
[   53.890235] 
[   53.890580] Allocated by task 254:
[   53.891240]  kasan_save_stack+0x3c/0x68
[   53.891794]  kasan_save_track+0x20/0x40
[   53.892674]  kasan_save_alloc_info+0x40/0x58
[   53.893320]  __kasan_kmalloc+0xd4/0xd8
[   53.893947]  __kmalloc_cache_noprof+0x15c/0x3c0
[   53.894781]  kasan_atomics+0xb8/0x2e8
[   53.895521]  kunit_try_run_case+0x14c/0x3d0
[   53.896223]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   53.897098]  kthread+0x24c/0x2d0
[   53.897691]  ret_from_fork+0x10/0x20
[   53.898217] 
[   53.898763] The buggy address belongs to the object at fff00000c616b300
[   53.898763]  which belongs to the cache kmalloc-64 of size 64
[   53.899959] The buggy address is located 0 bytes to the right of
[   53.899959]  allocated 48-byte region [fff00000c616b300, fff00000c616b330)
[   53.901074] 
[   53.901410] The buggy address belongs to the physical page:
[   53.902064] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10616b
[   53.902872] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   53.903851] page_type: f5(slab)
[   53.904575] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   53.905532] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   53.906407] page dumped because: kasan: bad access detected
[   53.907101] 
[   53.907521] Memory state around the buggy address:
[   53.908103]  fff00000c616b200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   53.908908]  fff00000c616b280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   53.909807] >fff00000c616b300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   53.910617]                                      ^
[   53.911260]  fff00000c616b380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   53.912154]  fff00000c616b400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   53.913066] ==================================================================
[   54.449976] ==================================================================
[   54.450860] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e20/0x4858
[   54.451660] Read of size 8 at addr fff00000c616b330 by task kunit_try_catch/254
[   54.452441] 
[   54.452815] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241127 #1
[   54.453973] Tainted: [B]=BAD_PAGE, [N]=TEST
[   54.454585] Hardware name: linux,dummy-virt (DT)
[   54.455308] Call trace:
[   54.455736]  show_stack+0x20/0x38 (C)
[   54.456313]  dump_stack_lvl+0x8c/0xd0
[   54.456924]  print_report+0x118/0x5e0
[   54.457495]  kasan_report+0xc8/0x118
[   54.458022]  __asan_report_load8_noabort+0x20/0x30
[   54.458680]  kasan_atomics_helper+0x3e20/0x4858
[   54.459475]  kasan_atomics+0x198/0x2e8
[   54.460011]  kunit_try_run_case+0x14c/0x3d0
[   54.460634]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   54.461367]  kthread+0x24c/0x2d0
[   54.461971]  ret_from_fork+0x10/0x20
[   54.462495] 
[   54.462836] Allocated by task 254:
[   54.463315]  kasan_save_stack+0x3c/0x68
[   54.463938]  kasan_save_track+0x20/0x40
[   54.464545]  kasan_save_alloc_info+0x40/0x58
[   54.465154]  __kasan_kmalloc+0xd4/0xd8
[   54.465698]  __kmalloc_cache_noprof+0x15c/0x3c0
[   54.466423]  kasan_atomics+0xb8/0x2e8
[   54.466923]  kunit_try_run_case+0x14c/0x3d0
[   54.467580]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   54.468281]  kthread+0x24c/0x2d0
[   54.468912]  ret_from_fork+0x10/0x20
[   54.469398] 
[   54.469788] The buggy address belongs to the object at fff00000c616b300
[   54.469788]  which belongs to the cache kmalloc-64 of size 64
[   54.471237] The buggy address is located 0 bytes to the right of
[   54.471237]  allocated 48-byte region [fff00000c616b300, fff00000c616b330)
[   54.472581] 
[   54.472952] The buggy address belongs to the physical page:
[   54.473692] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10616b
[   54.474544] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   54.475482] page_type: f5(slab)
[   54.475968] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   54.476829] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   54.477800] page dumped because: kasan: bad access detected
[   54.478511] 
[   54.478832] Memory state around the buggy address:
[   54.479455]  fff00000c616b200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   54.480171]  fff00000c616b280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   54.481086] >fff00000c616b300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   54.481957]                                      ^
[   54.482636]  fff00000c616b380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   54.483538]  fff00000c616b400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   54.484441] ==================================================================
[   52.955000] ==================================================================
[   52.956070] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa6c/0x4858
[   52.956850] Write of size 4 at addr fff00000c616b330 by task kunit_try_catch/254
[   52.957731] 
[   52.958276] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241127 #1
[   52.959565] Tainted: [B]=BAD_PAGE, [N]=TEST
[   52.960050] Hardware name: linux,dummy-virt (DT)
[   52.960633] Call trace:
[   52.961093]  show_stack+0x20/0x38 (C)
[   52.961742]  dump_stack_lvl+0x8c/0xd0
[   52.962371]  print_report+0x118/0x5e0
[   52.962901]  kasan_report+0xc8/0x118
[   52.963641]  kasan_check_range+0x100/0x1a8
[   52.964225]  __kasan_check_write+0x20/0x30
[   52.964939]  kasan_atomics_helper+0xa6c/0x4858
[   52.965643]  kasan_atomics+0x198/0x2e8
[   52.966124]  kunit_try_run_case+0x14c/0x3d0
[   52.966918]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   52.967695]  kthread+0x24c/0x2d0
[   52.968265]  ret_from_fork+0x10/0x20
[   52.968917] 
[   52.969217] Allocated by task 254:
[   52.969865]  kasan_save_stack+0x3c/0x68
[   52.970447]  kasan_save_track+0x20/0x40
[   52.970970]  kasan_save_alloc_info+0x40/0x58
[   52.971713]  __kasan_kmalloc+0xd4/0xd8
[   52.972389]  __kmalloc_cache_noprof+0x15c/0x3c0
[   52.972960]  kasan_atomics+0xb8/0x2e8
[   52.973683]  kunit_try_run_case+0x14c/0x3d0
[   52.974346]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   52.975072]  kthread+0x24c/0x2d0
[   52.975586]  ret_from_fork+0x10/0x20
[   52.976083] 
[   52.976420] The buggy address belongs to the object at fff00000c616b300
[   52.976420]  which belongs to the cache kmalloc-64 of size 64
[   52.977876] The buggy address is located 0 bytes to the right of
[   52.977876]  allocated 48-byte region [fff00000c616b300, fff00000c616b330)
[   52.979239] 
[   52.979658] The buggy address belongs to the physical page:
[   52.980396] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10616b
[   52.981271] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   52.982041] page_type: f5(slab)
[   52.982559] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   52.983385] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   52.984383] page dumped because: kasan: bad access detected
[   52.985103] 
[   52.985449] Memory state around the buggy address:
[   52.986041]  fff00000c616b200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   52.986896]  fff00000c616b280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   52.987750] >fff00000c616b300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   52.988666]                                      ^
[   52.989227]  fff00000c616b380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   52.990047]  fff00000c616b400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   52.990952] ==================================================================
[   52.164836] ==================================================================
[   52.166203] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x2b0/0x4858
[   52.166897] Read of size 4 at addr fff00000c616b330 by task kunit_try_catch/254
[   52.167850] 
[   52.168138] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241127 #1
[   52.169570] Tainted: [B]=BAD_PAGE, [N]=TEST
[   52.170081] Hardware name: linux,dummy-virt (DT)
[   52.171513] Call trace:
[   52.172111]  show_stack+0x20/0x38 (C)
[   52.172818]  dump_stack_lvl+0x8c/0xd0
[   52.173407]  print_report+0x118/0x5e0
[   52.174252]  kasan_report+0xc8/0x118
[   52.174892]  kasan_check_range+0x100/0x1a8
[   52.175568]  __kasan_check_read+0x20/0x30
[   52.176238]  kasan_atomics_helper+0x2b0/0x4858
[   52.176948]  kasan_atomics+0x198/0x2e8
[   52.177795]  kunit_try_run_case+0x14c/0x3d0
[   52.178509]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   52.179341]  kthread+0x24c/0x2d0
[   52.179973]  ret_from_fork+0x10/0x20
[   52.180856] 
[   52.181415] Allocated by task 254:
[   52.181934]  kasan_save_stack+0x3c/0x68
[   52.182510]  kasan_save_track+0x20/0x40
[   52.183234]  kasan_save_alloc_info+0x40/0x58
[   52.183770]  __kasan_kmalloc+0xd4/0xd8
[   52.184420]  __kmalloc_cache_noprof+0x15c/0x3c0
[   52.185096]  kasan_atomics+0xb8/0x2e8
[   52.185974]  kunit_try_run_case+0x14c/0x3d0
[   52.186667]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   52.187818]  kthread+0x24c/0x2d0
[   52.189061]  ret_from_fork+0x10/0x20
[   52.189669] 
[   52.190177] The buggy address belongs to the object at fff00000c616b300
[   52.190177]  which belongs to the cache kmalloc-64 of size 64
[   52.191880] The buggy address is located 0 bytes to the right of
[   52.191880]  allocated 48-byte region [fff00000c616b300, fff00000c616b330)
[   52.193823] 
[   52.194122] The buggy address belongs to the physical page:
[   52.194968] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10616b
[   52.196045] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   52.196873] page_type: f5(slab)
[   52.197500] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   52.198539] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   52.199771] page dumped because: kasan: bad access detected
[   52.200696] 
[   52.201206] Memory state around the buggy address:
[   52.201776]  fff00000c616b200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   52.202814]  fff00000c616b280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   52.204127] >fff00000c616b300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   52.204976]                                      ^
[   52.206054]  fff00000c616b380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   52.207486]  fff00000c616b400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   52.208750] ==================================================================
[   54.073584] ==================================================================
[   54.074220] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x147c/0x4858
[   54.075146] Write of size 8 at addr fff00000c616b330 by task kunit_try_catch/254
[   54.076353] 
[   54.076799] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241127 #1
[   54.078416] Tainted: [B]=BAD_PAGE, [N]=TEST
[   54.078898] Hardware name: linux,dummy-virt (DT)
[   54.079698] Call trace:
[   54.080264]  show_stack+0x20/0x38 (C)
[   54.080923]  dump_stack_lvl+0x8c/0xd0
[   54.081558]  print_report+0x118/0x5e0
[   54.082181]  kasan_report+0xc8/0x118
[   54.082833]  kasan_check_range+0x100/0x1a8
[   54.083600]  __kasan_check_write+0x20/0x30
[   54.084346]  kasan_atomics_helper+0x147c/0x4858
[   54.085135]  kasan_atomics+0x198/0x2e8
[   54.085798]  kunit_try_run_case+0x14c/0x3d0
[   54.086513]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   54.087314]  kthread+0x24c/0x2d0
[   54.087920]  ret_from_fork+0x10/0x20
[   54.088571] 
[   54.089057] Allocated by task 254:
[   54.089603]  kasan_save_stack+0x3c/0x68
[   54.090189]  kasan_save_track+0x20/0x40
[   54.090865]  kasan_save_alloc_info+0x40/0x58
[   54.091636]  __kasan_kmalloc+0xd4/0xd8
[   54.092238]  __kmalloc_cache_noprof+0x15c/0x3c0
[   54.092910]  kasan_atomics+0xb8/0x2e8
[   54.093509]  kunit_try_run_case+0x14c/0x3d0
[   54.094221]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   54.095117]  kthread+0x24c/0x2d0
[   54.095693]  ret_from_fork+0x10/0x20
[   54.096184] 
[   54.096594] The buggy address belongs to the object at fff00000c616b300
[   54.096594]  which belongs to the cache kmalloc-64 of size 64
[   54.097824] The buggy address is located 0 bytes to the right of
[   54.097824]  allocated 48-byte region [fff00000c616b300, fff00000c616b330)
[   54.099360] 
[   54.099649] The buggy address belongs to the physical page:
[   54.100334] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10616b
[   54.101288] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   54.102017] page_type: f5(slab)
[   54.102564] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   54.103546] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   54.104443] page dumped because: kasan: bad access detected
[   54.105150] 
[   54.105507] Memory state around the buggy address:
[   54.106068]  fff00000c616b200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   54.106968]  fff00000c616b280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   54.107913] >fff00000c616b300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   54.108821]                                      ^
[   54.109384]  fff00000c616b380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   54.110258]  fff00000c616b400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   54.111153] ==================================================================
[   53.793156] ==================================================================
[   53.794733] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1190/0x4858
[   53.795641] Write of size 8 at addr fff00000c616b330 by task kunit_try_catch/254
[   53.796445] 
[   53.796868] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241127 #1
[   53.797985] Tainted: [B]=BAD_PAGE, [N]=TEST
[   53.798959] Hardware name: linux,dummy-virt (DT)
[   53.799602] Call trace:
[   53.800010]  show_stack+0x20/0x38 (C)
[   53.800886]  dump_stack_lvl+0x8c/0xd0
[   53.801487]  print_report+0x118/0x5e0
[   53.802009]  kasan_report+0xc8/0x118
[   53.802651]  kasan_check_range+0x100/0x1a8
[   53.803377]  __kasan_check_write+0x20/0x30
[   53.803970]  kasan_atomics_helper+0x1190/0x4858
[   53.804613]  kasan_atomics+0x198/0x2e8
[   53.805163]  kunit_try_run_case+0x14c/0x3d0
[   53.805819]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   53.806618]  kthread+0x24c/0x2d0
[   53.807262]  ret_from_fork+0x10/0x20
[   53.807867] 
[   53.808245] Allocated by task 254:
[   53.808703]  kasan_save_stack+0x3c/0x68
[   53.809364]  kasan_save_track+0x20/0x40
[   53.809952]  kasan_save_alloc_info+0x40/0x58
[   53.810540]  __kasan_kmalloc+0xd4/0xd8
[   53.811153]  __kmalloc_cache_noprof+0x15c/0x3c0
[   53.811760]  kasan_atomics+0xb8/0x2e8
[   53.812313]  kunit_try_run_case+0x14c/0x3d0
[   53.812961]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   53.813601]  kthread+0x24c/0x2d0
[   53.814238]  ret_from_fork+0x10/0x20
[   53.814825] 
[   53.815224] The buggy address belongs to the object at fff00000c616b300
[   53.815224]  which belongs to the cache kmalloc-64 of size 64
[   53.816574] The buggy address is located 0 bytes to the right of
[   53.816574]  allocated 48-byte region [fff00000c616b300, fff00000c616b330)
[   53.817919] 
[   53.818253] The buggy address belongs to the physical page:
[   53.818952] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10616b
[   53.819903] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   53.820633] page_type: f5(slab)
[   53.821194] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   53.822058] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   53.823050] page dumped because: kasan: bad access detected
[   53.823738] 
[   53.824088] Memory state around the buggy address:
[   53.824743]  fff00000c616b200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   53.826224]  fff00000c616b280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   53.827081] >fff00000c616b300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   53.827864]                                      ^
[   53.828800]  fff00000c616b380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   53.829388]  fff00000c616b400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   53.829943] ==================================================================
[   54.411076] ==================================================================
[   54.411988] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x175c/0x4858
[   54.414065] Write of size 8 at addr fff00000c616b330 by task kunit_try_catch/254
[   54.415842] 
[   54.416143] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241127 #1
[   54.417540] Tainted: [B]=BAD_PAGE, [N]=TEST
[   54.418136] Hardware name: linux,dummy-virt (DT)
[   54.418754] Call trace:
[   54.419233]  show_stack+0x20/0x38 (C)
[   54.420012]  dump_stack_lvl+0x8c/0xd0
[   54.420602]  print_report+0x118/0x5e0
[   54.421125]  kasan_report+0xc8/0x118
[   54.421756]  kasan_check_range+0x100/0x1a8
[   54.422365]  __kasan_check_write+0x20/0x30
[   54.423023]  kasan_atomics_helper+0x175c/0x4858
[   54.423773]  kasan_atomics+0x198/0x2e8
[   54.424355]  kunit_try_run_case+0x14c/0x3d0
[   54.424954]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   54.425739]  kthread+0x24c/0x2d0
[   54.426397]  ret_from_fork+0x10/0x20
[   54.426974] 
[   54.427356] Allocated by task 254:
[   54.427787]  kasan_save_stack+0x3c/0x68
[   54.428452]  kasan_save_track+0x20/0x40
[   54.428895]  kasan_save_alloc_info+0x40/0x58
[   54.429664]  __kasan_kmalloc+0xd4/0xd8
[   54.430213]  __kmalloc_cache_noprof+0x15c/0x3c0
[   54.430867]  kasan_atomics+0xb8/0x2e8
[   54.431420]  kunit_try_run_case+0x14c/0x3d0
[   54.431992]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   54.432697]  kthread+0x24c/0x2d0
[   54.433206]  ret_from_fork+0x10/0x20
[   54.433764] 
[   54.434080] The buggy address belongs to the object at fff00000c616b300
[   54.434080]  which belongs to the cache kmalloc-64 of size 64
[   54.435376] The buggy address is located 0 bytes to the right of
[   54.435376]  allocated 48-byte region [fff00000c616b300, fff00000c616b330)
[   54.436706] 
[   54.437091] The buggy address belongs to the physical page:
[   54.437775] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10616b
[   54.438814] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   54.439653] page_type: f5(slab)
[   54.440214] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   54.441120] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   54.441988] page dumped because: kasan: bad access detected
[   54.442721] 
[   54.443054] Memory state around the buggy address:
[   54.443644]  fff00000c616b200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   54.444557]  fff00000c616b280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   54.445478] >fff00000c616b300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   54.446321]                                      ^
[   54.446898]  fff00000c616b380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   54.447814]  fff00000c616b400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   54.448687] ==================================================================
[   52.408265] ==================================================================
[   52.409660] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x47c/0x4858
[   52.410394] Write of size 4 at addr fff00000c616b330 by task kunit_try_catch/254
[   52.411643] 
[   52.412094] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241127 #1
[   52.413537] Tainted: [B]=BAD_PAGE, [N]=TEST
[   52.414098] Hardware name: linux,dummy-virt (DT)
[   52.414786] Call trace:
[   52.415253]  show_stack+0x20/0x38 (C)
[   52.415808]  dump_stack_lvl+0x8c/0xd0
[   52.416405]  print_report+0x118/0x5e0
[   52.416938]  kasan_report+0xc8/0x118
[   52.417489]  kasan_check_range+0x100/0x1a8
[   52.418121]  __kasan_check_write+0x20/0x30
[   52.418863]  kasan_atomics_helper+0x47c/0x4858
[   52.419426]  kasan_atomics+0x198/0x2e8
[   52.420086]  kunit_try_run_case+0x14c/0x3d0
[   52.420658]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   52.421544]  kthread+0x24c/0x2d0
[   52.422104]  ret_from_fork+0x10/0x20
[   52.422764] 
[   52.423114] Allocated by task 254:
[   52.423650]  kasan_save_stack+0x3c/0x68
[   52.424215]  kasan_save_track+0x20/0x40
[   52.424777]  kasan_save_alloc_info+0x40/0x58
[   52.425558]  __kasan_kmalloc+0xd4/0xd8
[   52.426061]  __kmalloc_cache_noprof+0x15c/0x3c0
[   52.426849]  kasan_atomics+0xb8/0x2e8
[   52.427371]  kunit_try_run_case+0x14c/0x3d0
[   52.428068]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   52.428802]  kthread+0x24c/0x2d0
[   52.429396]  ret_from_fork+0x10/0x20
[   52.429941] 
[   52.430214] The buggy address belongs to the object at fff00000c616b300
[   52.430214]  which belongs to the cache kmalloc-64 of size 64
[   52.431621] The buggy address is located 0 bytes to the right of
[   52.431621]  allocated 48-byte region [fff00000c616b300, fff00000c616b330)
[   52.433022] 
[   52.433405] The buggy address belongs to the physical page:
[   52.434098] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10616b
[   52.435014] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   52.435823] page_type: f5(slab)
[   52.436423] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   52.437412] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   52.438279] page dumped because: kasan: bad access detected
[   52.438938] 
[   52.439273] Memory state around the buggy address:
[   52.439855]  fff00000c616b200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   52.440788]  fff00000c616b280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   52.441710] >fff00000c616b300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   52.442613]                                      ^
[   52.443204]  fff00000c616b380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   52.444099]  fff00000c616b400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   52.445077] ==================================================================
[   52.878602] ==================================================================
[   52.880186] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x99c/0x4858
[   52.881081] Write of size 4 at addr fff00000c616b330 by task kunit_try_catch/254
[   52.882423] 
[   52.882868] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241127 #1
[   52.884137] Tainted: [B]=BAD_PAGE, [N]=TEST
[   52.884814] Hardware name: linux,dummy-virt (DT)
[   52.885387] Call trace:
[   52.885868]  show_stack+0x20/0x38 (C)
[   52.886365]  dump_stack_lvl+0x8c/0xd0
[   52.887032]  print_report+0x118/0x5e0
[   52.887635]  kasan_report+0xc8/0x118
[   52.888163]  kasan_check_range+0x100/0x1a8
[   52.888887]  __kasan_check_write+0x20/0x30
[   52.889545]  kasan_atomics_helper+0x99c/0x4858
[   52.890328]  kasan_atomics+0x198/0x2e8
[   52.890855]  kunit_try_run_case+0x14c/0x3d0
[   52.891587]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   52.892311]  kthread+0x24c/0x2d0
[   52.892948]  ret_from_fork+0x10/0x20
[   52.893468] 
[   52.893823] Allocated by task 254:
[   52.894352]  kasan_save_stack+0x3c/0x68
[   52.894953]  kasan_save_track+0x20/0x40
[   52.895473]  kasan_save_alloc_info+0x40/0x58
[   52.896156]  __kasan_kmalloc+0xd4/0xd8
[   52.896745]  __kmalloc_cache_noprof+0x15c/0x3c0
[   52.897374]  kasan_atomics+0xb8/0x2e8
[   52.897871]  kunit_try_run_case+0x14c/0x3d0
[   52.898440]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   52.899092]  kthread+0x24c/0x2d0
[   52.899731]  ret_from_fork+0x10/0x20
[   52.900183] 
[   52.900614] The buggy address belongs to the object at fff00000c616b300
[   52.900614]  which belongs to the cache kmalloc-64 of size 64
[   52.902044] The buggy address is located 0 bytes to the right of
[   52.902044]  allocated 48-byte region [fff00000c616b300, fff00000c616b330)
[   52.903415] 
[   52.903790] The buggy address belongs to the physical page:
[   52.904484] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10616b
[   52.905500] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   52.906196] page_type: f5(slab)
[   52.906810] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   52.907850] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   52.908642] page dumped because: kasan: bad access detected
[   52.909371] 
[   52.909731] Memory state around the buggy address:
[   52.910326]  fff00000c616b200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   52.911567]  fff00000c616b280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   52.912484] >fff00000c616b300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   52.913319]                                      ^
[   52.913889]  fff00000c616b380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   52.914987]  fff00000c616b400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   52.915780] ==================================================================
[   53.411482] ==================================================================
[   53.412668] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f58/0x4858
[   53.413774] Read of size 8 at addr fff00000c616b330 by task kunit_try_catch/254
[   53.414611] 
[   53.415104] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241127 #1
[   53.416349] Tainted: [B]=BAD_PAGE, [N]=TEST
[   53.416862] Hardware name: linux,dummy-virt (DT)
[   53.417557] Call trace:
[   53.417911]  show_stack+0x20/0x38 (C)
[   53.418628]  dump_stack_lvl+0x8c/0xd0
[   53.419158]  print_report+0x118/0x5e0
[   53.419752]  kasan_report+0xc8/0x118
[   53.420331]  __asan_report_load8_noabort+0x20/0x30
[   53.421004]  kasan_atomics_helper+0x3f58/0x4858
[   53.421677]  kasan_atomics+0x198/0x2e8
[   53.422211]  kunit_try_run_case+0x14c/0x3d0
[   53.422851]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   53.423621]  kthread+0x24c/0x2d0
[   53.424136]  ret_from_fork+0x10/0x20
[   53.424731] 
[   53.425104] Allocated by task 254:
[   53.425664]  kasan_save_stack+0x3c/0x68
[   53.426149]  kasan_save_track+0x20/0x40
[   53.426831]  kasan_save_alloc_info+0x40/0x58
[   53.427445]  __kasan_kmalloc+0xd4/0xd8
[   53.427926]  __kmalloc_cache_noprof+0x15c/0x3c0
[   53.428657]  kasan_atomics+0xb8/0x2e8
[   53.429190]  kunit_try_run_case+0x14c/0x3d0
[   53.429805]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   53.430623]  kthread+0x24c/0x2d0
[   53.431124]  ret_from_fork+0x10/0x20
[   53.431611] 
[   53.432028] The buggy address belongs to the object at fff00000c616b300
[   53.432028]  which belongs to the cache kmalloc-64 of size 64
[   53.433332] The buggy address is located 0 bytes to the right of
[   53.433332]  allocated 48-byte region [fff00000c616b300, fff00000c616b330)
[   53.434703] 
[   53.435014] The buggy address belongs to the physical page:
[   53.435590] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10616b
[   53.436671] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   53.437427] page_type: f5(slab)
[   53.437960] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   53.438938] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   53.439871] page dumped because: kasan: bad access detected
[   53.440569] 
[   53.441080] Memory state around the buggy address:
[   53.441782]  fff00000c616b200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   53.442699]  fff00000c616b280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   53.443524] >fff00000c616b300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   53.444436]                                      ^
[   53.445209]  fff00000c616b380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   53.446164]  fff00000c616b400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   53.447048] ==================================================================
[   52.840920] ==================================================================
[   52.841731] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x934/0x4858
[   52.842703] Write of size 4 at addr fff00000c616b330 by task kunit_try_catch/254
[   52.843548] 
[   52.843968] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241127 #1
[   52.845355] Tainted: [B]=BAD_PAGE, [N]=TEST
[   52.845913] Hardware name: linux,dummy-virt (DT)
[   52.846519] Call trace:
[   52.846945]  show_stack+0x20/0x38 (C)
[   52.847611]  dump_stack_lvl+0x8c/0xd0
[   52.848128]  print_report+0x118/0x5e0
[   52.848778]  kasan_report+0xc8/0x118
[   52.849277]  kasan_check_range+0x100/0x1a8
[   52.849978]  __kasan_check_write+0x20/0x30
[   52.850647]  kasan_atomics_helper+0x934/0x4858
[   52.851353]  kasan_atomics+0x198/0x2e8
[   52.851915]  kunit_try_run_case+0x14c/0x3d0
[   52.852581]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   52.853250]  kthread+0x24c/0x2d0
[   52.853883]  ret_from_fork+0x10/0x20
[   52.854506] 
[   52.854845] Allocated by task 254:
[   52.855390]  kasan_save_stack+0x3c/0x68
[   52.855918]  kasan_save_track+0x20/0x40
[   52.856493]  kasan_save_alloc_info+0x40/0x58
[   52.857159]  __kasan_kmalloc+0xd4/0xd8
[   52.857693]  __kmalloc_cache_noprof+0x15c/0x3c0
[   52.858371]  kasan_atomics+0xb8/0x2e8
[   52.858916]  kunit_try_run_case+0x14c/0x3d0
[   52.859459]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   52.860232]  kthread+0x24c/0x2d0
[   52.860885]  ret_from_fork+0x10/0x20
[   52.861458] 
[   52.861790] The buggy address belongs to the object at fff00000c616b300
[   52.861790]  which belongs to the cache kmalloc-64 of size 64
[   52.863172] The buggy address is located 0 bytes to the right of
[   52.863172]  allocated 48-byte region [fff00000c616b300, fff00000c616b330)
[   52.864537] 
[   52.864860] The buggy address belongs to the physical page:
[   52.865557] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10616b
[   52.866585] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   52.867488] page_type: f5(slab)
[   52.867934] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   52.869119] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   52.869892] page dumped because: kasan: bad access detected
[   52.870565] 
[   52.871003] Memory state around the buggy address:
[   52.871730]  fff00000c616b200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   52.872773]  fff00000c616b280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   52.873648] >fff00000c616b300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   52.874489]                                      ^
[   52.875167]  fff00000c616b380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   52.876058]  fff00000c616b400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   52.876894] ==================================================================
[   52.255354] ==================================================================
[   52.256117] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x32c/0x4858
[   52.257493] Write of size 4 at addr fff00000c616b330 by task kunit_try_catch/254
[   52.258245] 
[   52.258753] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241127 #1
[   52.259994] Tainted: [B]=BAD_PAGE, [N]=TEST
[   52.260567] Hardware name: linux,dummy-virt (DT)
[   52.261238] Call trace:
[   52.261622]  show_stack+0x20/0x38 (C)
[   52.262278]  dump_stack_lvl+0x8c/0xd0
[   52.262881]  print_report+0x118/0x5e0
[   52.263643]  kasan_report+0xc8/0x118
[   52.264218]  kasan_check_range+0x100/0x1a8
[   52.264933]  __kasan_check_write+0x20/0x30
[   52.265594]  kasan_atomics_helper+0x32c/0x4858
[   52.266113]  kasan_atomics+0x198/0x2e8
[   52.266856]  kunit_try_run_case+0x14c/0x3d0
[   52.267546]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   52.268355]  kthread+0x24c/0x2d0
[   52.268931]  ret_from_fork+0x10/0x20
[   52.269509] 
[   52.269841] Allocated by task 254:
[   52.270385]  kasan_save_stack+0x3c/0x68
[   52.270853]  kasan_save_track+0x20/0x40
[   52.271519]  kasan_save_alloc_info+0x40/0x58
[   52.272036]  __kasan_kmalloc+0xd4/0xd8
[   52.272757]  __kmalloc_cache_noprof+0x15c/0x3c0
[   52.273422]  kasan_atomics+0xb8/0x2e8
[   52.274013]  kunit_try_run_case+0x14c/0x3d0
[   52.274602]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   52.275413]  kthread+0x24c/0x2d0
[   52.275915]  ret_from_fork+0x10/0x20
[   52.276535] 
[   52.276851] The buggy address belongs to the object at fff00000c616b300
[   52.276851]  which belongs to the cache kmalloc-64 of size 64
[   52.278224] The buggy address is located 0 bytes to the right of
[   52.278224]  allocated 48-byte region [fff00000c616b300, fff00000c616b330)
[   52.279750] 
[   52.280045] The buggy address belongs to the physical page:
[   52.280838] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10616b
[   52.281815] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   52.282586] page_type: f5(slab)
[   52.283188] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   52.284029] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   52.285012] page dumped because: kasan: bad access detected
[   52.285696] 
[   52.286050] Memory state around the buggy address:
[   52.286654]  fff00000c616b200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   52.287646]  fff00000c616b280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   52.288500] >fff00000c616b300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   52.289345]                                      ^
[   52.290074]  fff00000c616b380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   52.290891]  fff00000c616b400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   52.291721] ==================================================================
[   53.179959] ==================================================================
[   53.180653] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3de4/0x4858
[   53.181824] Read of size 4 at addr fff00000c616b330 by task kunit_try_catch/254
[   53.182718] 
[   53.183023] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241127 #1
[   53.184158] Tainted: [B]=BAD_PAGE, [N]=TEST
[   53.184768] Hardware name: linux,dummy-virt (DT)
[   53.185505] Call trace:
[   53.185994]  show_stack+0x20/0x38 (C)
[   53.186597]  dump_stack_lvl+0x8c/0xd0
[   53.187240]  print_report+0x118/0x5e0
[   53.187776]  kasan_report+0xc8/0x118
[   53.188310]  __asan_report_load4_noabort+0x20/0x30
[   53.188894]  kasan_atomics_helper+0x3de4/0x4858
[   53.189652]  kasan_atomics+0x198/0x2e8
[   53.190187]  kunit_try_run_case+0x14c/0x3d0
[   53.191121]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   53.191818]  kthread+0x24c/0x2d0
[   53.192360]  ret_from_fork+0x10/0x20
[   53.192975] 
[   53.193356] Allocated by task 254:
[   53.193758]  kasan_save_stack+0x3c/0x68
[   53.194468]  kasan_save_track+0x20/0x40
[   53.195020]  kasan_save_alloc_info+0x40/0x58
[   53.195658]  __kasan_kmalloc+0xd4/0xd8
[   53.196147]  __kmalloc_cache_noprof+0x15c/0x3c0
[   53.196868]  kasan_atomics+0xb8/0x2e8
[   53.197367]  kunit_try_run_case+0x14c/0x3d0
[   53.198099]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   53.198707]  kthread+0x24c/0x2d0
[   53.199340]  ret_from_fork+0x10/0x20
[   53.199891] 
[   53.200322] The buggy address belongs to the object at fff00000c616b300
[   53.200322]  which belongs to the cache kmalloc-64 of size 64
[   53.201715] The buggy address is located 0 bytes to the right of
[   53.201715]  allocated 48-byte region [fff00000c616b300, fff00000c616b330)
[   53.203135] 
[   53.203490] The buggy address belongs to the physical page:
[   53.204215] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10616b
[   53.205129] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   53.205855] page_type: f5(slab)
[   53.206410] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   53.207368] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   53.208283] page dumped because: kasan: bad access detected
[   53.209051] 
[   53.209348] Memory state around the buggy address:
[   53.210015]  fff00000c616b200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   53.210836]  fff00000c616b280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   53.211648] >fff00000c616b300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   53.212573]                                      ^
[   53.213165]  fff00000c616b380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   53.214111]  fff00000c616b400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   53.214966] ==================================================================
[   52.760897] ==================================================================
[   52.761800] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x894/0x4858
[   52.763094] Write of size 4 at addr fff00000c616b330 by task kunit_try_catch/254
[   52.764183] 
[   52.764633] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241127 #1
[   52.766269] Tainted: [B]=BAD_PAGE, [N]=TEST
[   52.766861] Hardware name: linux,dummy-virt (DT)
[   52.767518] Call trace:
[   52.768035]  show_stack+0x20/0x38 (C)
[   52.768677]  dump_stack_lvl+0x8c/0xd0
[   52.769349]  print_report+0x118/0x5e0
[   52.769994]  kasan_report+0xc8/0x118
[   52.770622]  kasan_check_range+0x100/0x1a8
[   52.771309]  __kasan_check_write+0x20/0x30
[   52.771969]  kasan_atomics_helper+0x894/0x4858
[   52.772655]  kasan_atomics+0x198/0x2e8
[   52.773255]  kunit_try_run_case+0x14c/0x3d0
[   52.773956]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   52.774777]  kthread+0x24c/0x2d0
[   52.775481]  ret_from_fork+0x10/0x20
[   52.776117] 
[   52.776444] Allocated by task 254:
[   52.777065]  kasan_save_stack+0x3c/0x68
[   52.777664]  kasan_save_track+0x20/0x40
[   52.778402]  kasan_save_alloc_info+0x40/0x58
[   52.779078]  __kasan_kmalloc+0xd4/0xd8
[   52.779908]  __kmalloc_cache_noprof+0x15c/0x3c0
[   52.780330]  kasan_atomics+0xb8/0x2e8
[   52.780680]  kunit_try_run_case+0x14c/0x3d0
[   52.781062]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   52.781528]  kthread+0x24c/0x2d0
[   52.781895]  ret_from_fork+0x10/0x20
[   52.782249] 
[   52.783339] The buggy address belongs to the object at fff00000c616b300
[   52.783339]  which belongs to the cache kmalloc-64 of size 64
[   52.786337] The buggy address is located 0 bytes to the right of
[   52.786337]  allocated 48-byte region [fff00000c616b300, fff00000c616b330)
[   52.787911] 
[   52.788239] The buggy address belongs to the physical page:
[   52.788980] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10616b
[   52.789831] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   52.790657] page_type: f5(slab)
[   52.791117] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   52.792101] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   52.793089] page dumped because: kasan: bad access detected
[   52.793775] 
[   52.794085] Memory state around the buggy address:
[   52.794711]  fff00000c616b200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   52.795619]  fff00000c616b280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   52.796547] >fff00000c616b300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   52.797333]                                      ^
[   52.797995]  fff00000c616b380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   52.798838]  fff00000c616b400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   52.799713] ==================================================================
[   53.914681] ==================================================================
[   53.915772] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x12d8/0x4858
[   53.916771] Write of size 8 at addr fff00000c616b330 by task kunit_try_catch/254
[   53.917528] 
[   53.917903] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241127 #1
[   53.919138] Tainted: [B]=BAD_PAGE, [N]=TEST
[   53.919710] Hardware name: linux,dummy-virt (DT)
[   53.920275] Call trace:
[   53.921171]  show_stack+0x20/0x38 (C)
[   53.921736]  dump_stack_lvl+0x8c/0xd0
[   53.922429]  print_report+0x118/0x5e0
[   53.922971]  kasan_report+0xc8/0x118
[   53.923542]  kasan_check_range+0x100/0x1a8
[   53.924216]  __kasan_check_write+0x20/0x30
[   53.924863]  kasan_atomics_helper+0x12d8/0x4858
[   53.925529]  kasan_atomics+0x198/0x2e8
[   53.926111]  kunit_try_run_case+0x14c/0x3d0
[   53.926748]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   53.927547]  kthread+0x24c/0x2d0
[   53.928117]  ret_from_fork+0x10/0x20
[   53.928618] 
[   53.928975] Allocated by task 254:
[   53.929630]  kasan_save_stack+0x3c/0x68
[   53.930164]  kasan_save_track+0x20/0x40
[   53.930727]  kasan_save_alloc_info+0x40/0x58
[   53.931425]  __kasan_kmalloc+0xd4/0xd8
[   53.931967]  __kmalloc_cache_noprof+0x15c/0x3c0
[   53.932593]  kasan_atomics+0xb8/0x2e8
[   53.933105]  kunit_try_run_case+0x14c/0x3d0
[   53.933772]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   53.934475]  kthread+0x24c/0x2d0
[   53.934954]  ret_from_fork+0x10/0x20
[   53.935628] 
[   53.935986] The buggy address belongs to the object at fff00000c616b300
[   53.935986]  which belongs to the cache kmalloc-64 of size 64
[   53.937371] The buggy address is located 0 bytes to the right of
[   53.937371]  allocated 48-byte region [fff00000c616b300, fff00000c616b330)
[   53.938841] 
[   53.939177] The buggy address belongs to the physical page:
[   53.939883] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10616b
[   53.940792] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   53.941703] page_type: f5(slab)
[   53.942170] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   53.943200] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   53.944182] page dumped because: kasan: bad access detected
[   53.944844] 
[   53.945163] Memory state around the buggy address:
[   53.945761]  fff00000c616b200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   53.946662]  fff00000c616b280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   53.947549] >fff00000c616b300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   53.948496]                                      ^
[   53.949073]  fff00000c616b380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   53.949951]  fff00000c616b400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   53.950840] ==================================================================
[   54.149963] ==================================================================
[   54.150741] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x154c/0x4858
[   54.151714] Write of size 8 at addr fff00000c616b330 by task kunit_try_catch/254
[   54.152777] 
[   54.153105] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241127 #1
[   54.154282] Tainted: [B]=BAD_PAGE, [N]=TEST
[   54.154913] Hardware name: linux,dummy-virt (DT)
[   54.155543] Call trace:
[   54.155970]  show_stack+0x20/0x38 (C)
[   54.156493]  dump_stack_lvl+0x8c/0xd0
[   54.157154]  print_report+0x118/0x5e0
[   54.157728]  kasan_report+0xc8/0x118
[   54.158428]  kasan_check_range+0x100/0x1a8
[   54.159061]  __kasan_check_write+0x20/0x30
[   54.159763]  kasan_atomics_helper+0x154c/0x4858
[   54.160502]  kasan_atomics+0x198/0x2e8
[   54.161187]  kunit_try_run_case+0x14c/0x3d0
[   54.161760]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   54.162567]  kthread+0x24c/0x2d0
[   54.163129]  ret_from_fork+0x10/0x20
[   54.163668] 
[   54.164054] Allocated by task 254:
[   54.164587]  kasan_save_stack+0x3c/0x68
[   54.165110]  kasan_save_track+0x20/0x40
[   54.165697]  kasan_save_alloc_info+0x40/0x58
[   54.166419]  __kasan_kmalloc+0xd4/0xd8
[   54.166972]  __kmalloc_cache_noprof+0x15c/0x3c0
[   54.167748]  kasan_atomics+0xb8/0x2e8
[   54.168268]  kunit_try_run_case+0x14c/0x3d0
[   54.168950]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   54.169648]  kthread+0x24c/0x2d0
[   54.170166]  ret_from_fork+0x10/0x20
[   54.170702] 
[   54.171021] The buggy address belongs to the object at fff00000c616b300
[   54.171021]  which belongs to the cache kmalloc-64 of size 64
[   54.172390] The buggy address is located 0 bytes to the right of
[   54.172390]  allocated 48-byte region [fff00000c616b300, fff00000c616b330)
[   54.173668] 
[   54.174105] The buggy address belongs to the physical page:
[   54.174908] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10616b
[   54.175826] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   54.176648] page_type: f5(slab)
[   54.177213] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   54.178126] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   54.179030] page dumped because: kasan: bad access detected
[   54.179694] 
[   54.180028] Memory state around the buggy address:
[   54.180651]  fff00000c616b200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   54.181500]  fff00000c616b280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   54.182420] >fff00000c616b300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   54.183231]                                      ^
[   54.183813]  fff00000c616b380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   54.184678]  fff00000c616b400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   54.185609] ==================================================================
[   52.446565] ==================================================================
[   52.447283] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4e4/0x4858
[   52.448609] Write of size 4 at addr fff00000c616b330 by task kunit_try_catch/254
[   52.449876] 
[   52.450215] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241127 #1
[   52.451388] Tainted: [B]=BAD_PAGE, [N]=TEST
[   52.452019] Hardware name: linux,dummy-virt (DT)
[   52.452590] Call trace:
[   52.453038]  show_stack+0x20/0x38 (C)
[   52.453621]  dump_stack_lvl+0x8c/0xd0
[   52.454176]  print_report+0x118/0x5e0
[   52.454816]  kasan_report+0xc8/0x118
[   52.455373]  kasan_check_range+0x100/0x1a8
[   52.456077]  __kasan_check_write+0x20/0x30
[   52.456714]  kasan_atomics_helper+0x4e4/0x4858
[   52.457539]  kasan_atomics+0x198/0x2e8
[   52.458204]  kunit_try_run_case+0x14c/0x3d0
[   52.458912]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   52.459632]  kthread+0x24c/0x2d0
[   52.460186]  ret_from_fork+0x10/0x20
[   52.460896] 
[   52.461204] Allocated by task 254:
[   52.461898]  kasan_save_stack+0x3c/0x68
[   52.462544]  kasan_save_track+0x20/0x40
[   52.463138]  kasan_save_alloc_info+0x40/0x58
[   52.463746]  __kasan_kmalloc+0xd4/0xd8
[   52.464445]  __kmalloc_cache_noprof+0x15c/0x3c0
[   52.465029]  kasan_atomics+0xb8/0x2e8
[   52.465704]  kunit_try_run_case+0x14c/0x3d0
[   52.466252]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   52.467088]  kthread+0x24c/0x2d0
[   52.467650]  ret_from_fork+0x10/0x20
[   52.468151] 
[   52.468547] The buggy address belongs to the object at fff00000c616b300
[   52.468547]  which belongs to the cache kmalloc-64 of size 64
[   52.469835] The buggy address is located 0 bytes to the right of
[   52.469835]  allocated 48-byte region [fff00000c616b300, fff00000c616b330)
[   52.471316] 
[   52.471610] The buggy address belongs to the physical page:
[   52.472309] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10616b
[   52.473238] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   52.474051] page_type: f5(slab)
[   52.474621] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   52.475492] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   52.476541] page dumped because: kasan: bad access detected
[   52.477209] 
[   52.477578] Memory state around the buggy address:
[   52.478208]  fff00000c616b200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   52.479114]  fff00000c616b280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   52.480080] >fff00000c616b300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   52.480968]                                      ^
[   52.481614]  fff00000c616b380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   52.482521]  fff00000c616b400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   52.483428] ==================================================================
[   53.298429] ==================================================================
[   53.299208] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xd3c/0x4858
[   53.300162] Write of size 4 at addr fff00000c616b330 by task kunit_try_catch/254
[   53.300886] 
[   53.301594] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241127 #1
[   53.302958] Tainted: [B]=BAD_PAGE, [N]=TEST
[   53.303470] Hardware name: linux,dummy-virt (DT)
[   53.304189] Call trace:
[   53.304589]  show_stack+0x20/0x38 (C)
[   53.305112]  dump_stack_lvl+0x8c/0xd0
[   53.305839]  print_report+0x118/0x5e0
[   53.306406]  kasan_report+0xc8/0x118
[   53.306983]  kasan_check_range+0x100/0x1a8
[   53.307604]  __kasan_check_write+0x20/0x30
[   53.308223]  kasan_atomics_helper+0xd3c/0x4858
[   53.308935]  kasan_atomics+0x198/0x2e8
[   53.309557]  kunit_try_run_case+0x14c/0x3d0
[   53.310143]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   53.311003]  kthread+0x24c/0x2d0
[   53.311567]  ret_from_fork+0x10/0x20
[   53.312127] 
[   53.312438] Allocated by task 254:
[   53.312992]  kasan_save_stack+0x3c/0x68
[   53.313647]  kasan_save_track+0x20/0x40
[   53.314228]  kasan_save_alloc_info+0x40/0x58
[   53.314845]  __kasan_kmalloc+0xd4/0xd8
[   53.315427]  __kmalloc_cache_noprof+0x15c/0x3c0
[   53.316039]  kasan_atomics+0xb8/0x2e8
[   53.316792]  kunit_try_run_case+0x14c/0x3d0
[   53.317457]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   53.318213]  kthread+0x24c/0x2d0
[   53.318796]  ret_from_fork+0x10/0x20
[   53.319520] 
[   53.319815] The buggy address belongs to the object at fff00000c616b300
[   53.319815]  which belongs to the cache kmalloc-64 of size 64
[   53.320939] The buggy address is located 0 bytes to the right of
[   53.320939]  allocated 48-byte region [fff00000c616b300, fff00000c616b330)
[   53.322143] 
[   53.322582] The buggy address belongs to the physical page:
[   53.323069] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10616b
[   53.324276] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   53.324851] page_type: f5(slab)
[   53.325218] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   53.326013] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   53.326962] page dumped because: kasan: bad access detected
[   53.328030] 
[   53.328375] Memory state around the buggy address:
[   53.329335]  fff00000c616b200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   53.330169]  fff00000c616b280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   53.330989] >fff00000c616b300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   53.332202]                                      ^
[   53.333141]  fff00000c616b380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   53.334083]  fff00000c616b400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   53.334967] ==================================================================
[   52.370633] ==================================================================
[   52.371357] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x414/0x4858
[   52.372480] Write of size 4 at addr fff00000c616b330 by task kunit_try_catch/254
[   52.373489] 
[   52.373826] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241127 #1
[   52.375181] Tainted: [B]=BAD_PAGE, [N]=TEST
[   52.375852] Hardware name: linux,dummy-virt (DT)
[   52.376469] Call trace:
[   52.376968]  show_stack+0x20/0x38 (C)
[   52.377540]  dump_stack_lvl+0x8c/0xd0
[   52.378268]  print_report+0x118/0x5e0
[   52.378871]  kasan_report+0xc8/0x118
[   52.379521]  kasan_check_range+0x100/0x1a8
[   52.380276]  __kasan_check_write+0x20/0x30
[   52.380904]  kasan_atomics_helper+0x414/0x4858
[   52.381592]  kasan_atomics+0x198/0x2e8
[   52.382235]  kunit_try_run_case+0x14c/0x3d0
[   52.382883]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   52.383584]  kthread+0x24c/0x2d0
[   52.384211]  ret_from_fork+0x10/0x20
[   52.384781] 
[   52.385083] Allocated by task 254:
[   52.385667]  kasan_save_stack+0x3c/0x68
[   52.386277]  kasan_save_track+0x20/0x40
[   52.386798]  kasan_save_alloc_info+0x40/0x58
[   52.387501]  __kasan_kmalloc+0xd4/0xd8
[   52.388038]  __kmalloc_cache_noprof+0x15c/0x3c0
[   52.388643]  kasan_atomics+0xb8/0x2e8
[   52.389239]  kunit_try_run_case+0x14c/0x3d0
[   52.389853]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   52.390499]  kthread+0x24c/0x2d0
[   52.391135]  ret_from_fork+0x10/0x20
[   52.391673] 
[   52.391996] The buggy address belongs to the object at fff00000c616b300
[   52.391996]  which belongs to the cache kmalloc-64 of size 64
[   52.393287] The buggy address is located 0 bytes to the right of
[   52.393287]  allocated 48-byte region [fff00000c616b300, fff00000c616b330)
[   52.394792] 
[   52.395110] The buggy address belongs to the physical page:
[   52.395806] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10616b
[   52.396707] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   52.397608] page_type: f5(slab)
[   52.398094] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   52.399154] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   52.400021] page dumped because: kasan: bad access detected
[   52.400686] 
[   52.400995] Memory state around the buggy address:
[   52.401629]  fff00000c616b200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   52.402448]  fff00000c616b280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   52.403349] >fff00000c616b300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   52.404174]                                      ^
[   52.404772]  fff00000c616b380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   52.405677]  fff00000c616b400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   52.406521] ==================================================================
[   53.448829] ==================================================================
[   53.449743] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xe44/0x4858
[   53.451547] Write of size 8 at addr fff00000c616b330 by task kunit_try_catch/254
[   53.453257] 
[   53.453680] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241127 #1
[   53.454943] Tainted: [B]=BAD_PAGE, [N]=TEST
[   53.455556] Hardware name: linux,dummy-virt (DT)
[   53.456199] Call trace:
[   53.456881]  show_stack+0x20/0x38 (C)
[   53.457502]  dump_stack_lvl+0x8c/0xd0
[   53.458216]  print_report+0x118/0x5e0
[   53.458910]  kasan_report+0xc8/0x118
[   53.459609]  kasan_check_range+0x100/0x1a8
[   53.460261]  __kasan_check_write+0x20/0x30
[   53.460928]  kasan_atomics_helper+0xe44/0x4858
[   53.461635]  kasan_atomics+0x198/0x2e8
[   53.462248]  kunit_try_run_case+0x14c/0x3d0
[   53.462945]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   53.463751]  kthread+0x24c/0x2d0
[   53.464379]  ret_from_fork+0x10/0x20
[   53.465043] 
[   53.465444] Allocated by task 254:
[   53.465977]  kasan_save_stack+0x3c/0x68
[   53.466720]  kasan_save_track+0x20/0x40
[   53.467344]  kasan_save_alloc_info+0x40/0x58
[   53.467980]  __kasan_kmalloc+0xd4/0xd8
[   53.468702]  __kmalloc_cache_noprof+0x15c/0x3c0
[   53.469425]  kasan_atomics+0xb8/0x2e8
[   53.470034]  kunit_try_run_case+0x14c/0x3d0
[   53.470735]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   53.471597]  kthread+0x24c/0x2d0
[   53.472175]  ret_from_fork+0x10/0x20
[   53.472761] 
[   53.473145] The buggy address belongs to the object at fff00000c616b300
[   53.473145]  which belongs to the cache kmalloc-64 of size 64
[   53.474645] The buggy address is located 0 bytes to the right of
[   53.474645]  allocated 48-byte region [fff00000c616b300, fff00000c616b330)
[   53.476155] 
[   53.476596] The buggy address belongs to the physical page:
[   53.477384] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10616b
[   53.478395] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   53.479360] page_type: f5(slab)
[   53.479968] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   53.480957] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   53.481854] page dumped because: kasan: bad access detected
[   53.482607] 
[   53.482947] Memory state around the buggy address:
[   53.483678]  fff00000c616b200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   53.484698]  fff00000c616b280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   53.485685] >fff00000c616b300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   53.486718]                                      ^
[   53.487500]  fff00000c616b380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   53.488289]  fff00000c616b400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   53.489331] ==================================================================
[   53.602719] ==================================================================
[   53.603691] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf88/0x4858
[   53.604645] Write of size 8 at addr fff00000c616b330 by task kunit_try_catch/254
[   53.605446] 
[   53.605841] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241127 #1
[   53.607123] Tainted: [B]=BAD_PAGE, [N]=TEST
[   53.607710] Hardware name: linux,dummy-virt (DT)
[   53.608366] Call trace:
[   53.608715]  show_stack+0x20/0x38 (C)
[   53.609318]  dump_stack_lvl+0x8c/0xd0
[   53.610021]  print_report+0x118/0x5e0
[   53.610661]  kasan_report+0xc8/0x118
[   53.611165]  kasan_check_range+0x100/0x1a8
[   53.611931]  __kasan_check_write+0x20/0x30
[   53.612482]  kasan_atomics_helper+0xf88/0x4858
[   53.613346]  kasan_atomics+0x198/0x2e8
[   53.613821]  kunit_try_run_case+0x14c/0x3d0
[   53.614629]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   53.615394]  kthread+0x24c/0x2d0
[   53.616029]  ret_from_fork+0x10/0x20
[   53.616567] 
[   53.616949] Allocated by task 254:
[   53.617527]  kasan_save_stack+0x3c/0x68
[   53.618132]  kasan_save_track+0x20/0x40
[   53.618712]  kasan_save_alloc_info+0x40/0x58
[   53.619196]  __kasan_kmalloc+0xd4/0xd8
[   53.619846]  __kmalloc_cache_noprof+0x15c/0x3c0
[   53.620410]  kasan_atomics+0xb8/0x2e8
[   53.621024]  kunit_try_run_case+0x14c/0x3d0
[   53.621578]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   53.622374]  kthread+0x24c/0x2d0
[   53.622935]  ret_from_fork+0x10/0x20
[   53.623408] 
[   53.623856] The buggy address belongs to the object at fff00000c616b300
[   53.623856]  which belongs to the cache kmalloc-64 of size 64
[   53.625376] The buggy address is located 0 bytes to the right of
[   53.625376]  allocated 48-byte region [fff00000c616b300, fff00000c616b330)
[   53.626786] 
[   53.627064] The buggy address belongs to the physical page:
[   53.627703] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10616b
[   53.628645] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   53.629549] page_type: f5(slab)
[   53.630026] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   53.630954] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   53.631845] page dumped because: kasan: bad access detected
[   53.632604] 
[   53.632954] Memory state around the buggy address:
[   53.633621]  fff00000c616b200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   53.634463]  fff00000c616b280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   53.635364] >fff00000c616b300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   53.636198]                                      ^
[   53.636776]  fff00000c616b380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   53.637675]  fff00000c616b400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   53.638634] ==================================================================
[   52.522426] ==================================================================
[   52.523536] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x5b4/0x4858
[   52.524533] Write of size 4 at addr fff00000c616b330 by task kunit_try_catch/254
[   52.525542] 
[   52.525955] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241127 #1
[   52.527046] Tainted: [B]=BAD_PAGE, [N]=TEST
[   52.527373] Hardware name: linux,dummy-virt (DT)
[   52.528061] Call trace:
[   52.528660]  show_stack+0x20/0x38 (C)
[   52.529205]  dump_stack_lvl+0x8c/0xd0
[   52.529842]  print_report+0x118/0x5e0
[   52.530480]  kasan_report+0xc8/0x118
[   52.531121]  kasan_check_range+0x100/0x1a8
[   52.531771]  __kasan_check_write+0x20/0x30
[   52.532520]  kasan_atomics_helper+0x5b4/0x4858
[   52.533262]  kasan_atomics+0x198/0x2e8
[   52.533914]  kunit_try_run_case+0x14c/0x3d0
[   52.534625]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   52.535505]  kthread+0x24c/0x2d0
[   52.536136]  ret_from_fork+0x10/0x20
[   52.536760] 
[   52.537088] Allocated by task 254:
[   52.537715]  kasan_save_stack+0x3c/0x68
[   52.538434]  kasan_save_track+0x20/0x40
[   52.539057]  kasan_save_alloc_info+0x40/0x58
[   52.539735]  __kasan_kmalloc+0xd4/0xd8
[   52.540360]  __kmalloc_cache_noprof+0x15c/0x3c0
[   52.541030]  kasan_atomics+0xb8/0x2e8
[   52.541657]  kunit_try_run_case+0x14c/0x3d0
[   52.542384]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   52.543157]  kthread+0x24c/0x2d0
[   52.543743]  ret_from_fork+0x10/0x20
[   52.544379] 
[   52.544856] The buggy address belongs to the object at fff00000c616b300
[   52.544856]  which belongs to the cache kmalloc-64 of size 64
[   52.546264] The buggy address is located 0 bytes to the right of
[   52.546264]  allocated 48-byte region [fff00000c616b300, fff00000c616b330)
[   52.547896] 
[   52.548185] The buggy address belongs to the physical page:
[   52.548954] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10616b
[   52.550020] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   52.550882] page_type: f5(slab)
[   52.551430] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   52.552470] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   52.553435] page dumped because: kasan: bad access detected
[   52.554153] 
[   52.554488] Memory state around the buggy address:
[   52.555205]  fff00000c616b200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   52.556165]  fff00000c616b280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   52.557051] >fff00000c616b300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   52.557905]                                      ^
[   52.558570]  fff00000c616b380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   52.559492]  fff00000c616b400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   52.560424] ==================================================================
[   53.834230] ==================================================================
[   53.836904] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x11f8/0x4858
[   53.839170] Write of size 8 at addr fff00000c616b330 by task kunit_try_catch/254
[   53.841667] 
[   53.841979] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241127 #1
[   53.843130] Tainted: [B]=BAD_PAGE, [N]=TEST
[   53.843710] Hardware name: linux,dummy-virt (DT)
[   53.844289] Call trace:
[   53.844690]  show_stack+0x20/0x38 (C)
[   53.845336]  dump_stack_lvl+0x8c/0xd0
[   53.845906]  print_report+0x118/0x5e0
[   53.846481]  kasan_report+0xc8/0x118
[   53.847019]  kasan_check_range+0x100/0x1a8
[   53.847582]  __kasan_check_write+0x20/0x30
[   53.848352]  kasan_atomics_helper+0x11f8/0x4858
[   53.849004]  kasan_atomics+0x198/0x2e8
[   53.849704]  kunit_try_run_case+0x14c/0x3d0
[   53.850338]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   53.851241]  kthread+0x24c/0x2d0
[   53.851926]  ret_from_fork+0x10/0x20
[   53.852480] 
[   53.852776] Allocated by task 254:
[   53.853236]  kasan_save_stack+0x3c/0x68
[   53.853853]  kasan_save_track+0x20/0x40
[   53.854343]  kasan_save_alloc_info+0x40/0x58
[   53.854983]  __kasan_kmalloc+0xd4/0xd8
[   53.855689]  __kmalloc_cache_noprof+0x15c/0x3c0
[   53.856195]  kasan_atomics+0xb8/0x2e8
[   53.856834]  kunit_try_run_case+0x14c/0x3d0
[   53.857503]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   53.858181]  kthread+0x24c/0x2d0
[   53.858744]  ret_from_fork+0x10/0x20
[   53.859263] 
[   53.859579] The buggy address belongs to the object at fff00000c616b300
[   53.859579]  which belongs to the cache kmalloc-64 of size 64
[   53.861061] The buggy address is located 0 bytes to the right of
[   53.861061]  allocated 48-byte region [fff00000c616b300, fff00000c616b330)
[   53.862476] 
[   53.862792] The buggy address belongs to the physical page:
[   53.863485] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10616b
[   53.864371] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   53.865225] page_type: f5(slab)
[   53.865666] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   53.866604] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   53.867536] page dumped because: kasan: bad access detected
[   53.868220] 
[   53.868601] Memory state around the buggy address:
[   53.869265]  fff00000c616b200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   53.870099]  fff00000c616b280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   53.870920] >fff00000c616b300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   53.871840]                                      ^
[   53.872593]  fff00000c616b380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   53.873392]  fff00000c616b400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   53.874279] ==================================================================
[   53.952560] ==================================================================
[   53.953249] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1384/0x4858
[   53.954003] Write of size 8 at addr fff00000c616b330 by task kunit_try_catch/254
[   53.955075] 
[   53.955472] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241127 #1
[   53.956565] Tainted: [B]=BAD_PAGE, [N]=TEST
[   53.957337] Hardware name: linux,dummy-virt (DT)
[   53.957929] Call trace:
[   53.958357]  show_stack+0x20/0x38 (C)
[   53.959031]  dump_stack_lvl+0x8c/0xd0
[   53.959687]  print_report+0x118/0x5e0
[   53.960401]  kasan_report+0xc8/0x118
[   53.961120]  kasan_check_range+0x100/0x1a8
[   53.961857]  __kasan_check_write+0x20/0x30
[   53.962619]  kasan_atomics_helper+0x1384/0x4858
[   53.963504]  kasan_atomics+0x198/0x2e8
[   53.964114]  kunit_try_run_case+0x14c/0x3d0
[   53.964772]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   53.965553]  kthread+0x24c/0x2d0
[   53.966233]  ret_from_fork+0x10/0x20
[   53.966958] 
[   53.967320] Allocated by task 254:
[   53.967929]  kasan_save_stack+0x3c/0x68
[   53.968656]  kasan_save_track+0x20/0x40
[   53.969353]  kasan_save_alloc_info+0x40/0x58
[   53.970004]  __kasan_kmalloc+0xd4/0xd8
[   53.970646]  __kmalloc_cache_noprof+0x15c/0x3c0
[   53.971309]  kasan_atomics+0xb8/0x2e8
[   53.971994]  kunit_try_run_case+0x14c/0x3d0
[   53.972690]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   53.973468]  kthread+0x24c/0x2d0
[   53.974051]  ret_from_fork+0x10/0x20
[   53.974681] 
[   53.975024] The buggy address belongs to the object at fff00000c616b300
[   53.975024]  which belongs to the cache kmalloc-64 of size 64
[   53.976538] The buggy address is located 0 bytes to the right of
[   53.976538]  allocated 48-byte region [fff00000c616b300, fff00000c616b330)
[   53.978100] 
[   53.978508] The buggy address belongs to the physical page:
[   53.979362] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10616b
[   53.980368] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   53.981321] page_type: f5(slab)
[   53.981877] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   53.982879] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   53.983891] page dumped because: kasan: bad access detected
[   53.984631] 
[   53.984969] Memory state around the buggy address:
[   53.985692]  fff00000c616b200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   53.986711]  fff00000c616b280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   53.987618] >fff00000c616b300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   53.988523]                                      ^
[   53.989323]  fff00000c616b380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   53.990255]  fff00000c616b400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   53.991238] ==================================================================
[   52.721398] ==================================================================
[   52.722012] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x7cc/0x4858
[   52.722971] Write of size 4 at addr fff00000c616b330 by task kunit_try_catch/254
[   52.723807] 
[   52.724142] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241127 #1
[   52.725574] Tainted: [B]=BAD_PAGE, [N]=TEST
[   52.726179] Hardware name: linux,dummy-virt (DT)
[   52.726857] Call trace:
[   52.727248]  show_stack+0x20/0x38 (C)
[   52.727941]  dump_stack_lvl+0x8c/0xd0
[   52.728591]  print_report+0x118/0x5e0
[   52.729251]  kasan_report+0xc8/0x118
[   52.729893]  kasan_check_range+0x100/0x1a8
[   52.730598]  __kasan_check_write+0x20/0x30
[   52.731251]  kasan_atomics_helper+0x7cc/0x4858
[   52.731950]  kasan_atomics+0x198/0x2e8
[   52.732589]  kunit_try_run_case+0x14c/0x3d0
[   52.733272]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   52.734145]  kthread+0x24c/0x2d0
[   52.734827]  ret_from_fork+0x10/0x20
[   52.735522] 
[   52.735932] Allocated by task 254:
[   52.736540]  kasan_save_stack+0x3c/0x68
[   52.737239]  kasan_save_track+0x20/0x40
[   52.737857]  kasan_save_alloc_info+0x40/0x58
[   52.738620]  __kasan_kmalloc+0xd4/0xd8
[   52.739210]  __kmalloc_cache_noprof+0x15c/0x3c0
[   52.739903]  kasan_atomics+0xb8/0x2e8
[   52.740495]  kunit_try_run_case+0x14c/0x3d0
[   52.741083]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   52.741822]  kthread+0x24c/0x2d0
[   52.742487]  ret_from_fork+0x10/0x20
[   52.743272] 
[   52.743664] The buggy address belongs to the object at fff00000c616b300
[   52.743664]  which belongs to the cache kmalloc-64 of size 64
[   52.745066] The buggy address is located 0 bytes to the right of
[   52.745066]  allocated 48-byte region [fff00000c616b300, fff00000c616b330)
[   52.746548] 
[   52.747006] The buggy address belongs to the physical page:
[   52.747783] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10616b
[   52.748771] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   52.749608] page_type: f5(slab)
[   52.750263] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   52.751236] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   52.752165] page dumped because: kasan: bad access detected
[   52.752888] 
[   52.753245] Memory state around the buggy address:
[   52.753998]  fff00000c616b200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   52.754890]  fff00000c616b280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   52.755810] >fff00000c616b300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   52.756680]                                      ^
[   52.757409]  fff00000c616b380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   52.758280]  fff00000c616b400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   52.759143] ==================================================================
[   52.562092] ==================================================================
[   52.562737] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x61c/0x4858
[   52.563803] Write of size 4 at addr fff00000c616b330 by task kunit_try_catch/254
[   52.564611] 
[   52.564994] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241127 #1
[   52.566207] Tainted: [B]=BAD_PAGE, [N]=TEST
[   52.566839] Hardware name: linux,dummy-virt (DT)
[   52.567520] Call trace:
[   52.568029]  show_stack+0x20/0x38 (C)
[   52.568539]  dump_stack_lvl+0x8c/0xd0
[   52.569184]  print_report+0x118/0x5e0
[   52.569827]  kasan_report+0xc8/0x118
[   52.570355]  kasan_check_range+0x100/0x1a8
[   52.571002]  __kasan_check_write+0x20/0x30
[   52.571664]  kasan_atomics_helper+0x61c/0x4858
[   52.572218]  kasan_atomics+0x198/0x2e8
[   52.572924]  kunit_try_run_case+0x14c/0x3d0
[   52.573557]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   52.574241]  kthread+0x24c/0x2d0
[   52.574886]  ret_from_fork+0x10/0x20
[   52.575522] 
[   52.575869] Allocated by task 254:
[   52.576288]  kasan_save_stack+0x3c/0x68
[   52.576973]  kasan_save_track+0x20/0x40
[   52.577509]  kasan_save_alloc_info+0x40/0x58
[   52.578079]  __kasan_kmalloc+0xd4/0xd8
[   52.578702]  __kmalloc_cache_noprof+0x15c/0x3c0
[   52.579273]  kasan_atomics+0xb8/0x2e8
[   52.579887]  kunit_try_run_case+0x14c/0x3d0
[   52.580396]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   52.581145]  kthread+0x24c/0x2d0
[   52.581678]  ret_from_fork+0x10/0x20
[   52.582313] 
[   52.582651] The buggy address belongs to the object at fff00000c616b300
[   52.582651]  which belongs to the cache kmalloc-64 of size 64
[   52.583990] The buggy address is located 0 bytes to the right of
[   52.583990]  allocated 48-byte region [fff00000c616b300, fff00000c616b330)
[   52.585657] 
[   52.586377] The buggy address belongs to the physical page:
[   52.587103] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10616b
[   52.588218] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   52.589215] page_type: f5(slab)
[   52.589677] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   52.590716] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   52.591749] page dumped because: kasan: bad access detected
[   52.592516] 
[   52.592855] Memory state around the buggy address:
[   52.593626]  fff00000c616b200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   52.594569]  fff00000c616b280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   52.595522] >fff00000c616b300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   52.596397]                                      ^
[   52.597086]  fff00000c616b380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   52.597979]  fff00000c616b400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   52.598993] ==================================================================
[   54.486040] ==================================================================
[   54.486779] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x17ec/0x4858
[   54.487802] Write of size 8 at addr fff00000c616b330 by task kunit_try_catch/254
[   54.488932] 
[   54.489712] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241127 #1
[   54.490879] Tainted: [B]=BAD_PAGE, [N]=TEST
[   54.491813] Hardware name: linux,dummy-virt (DT)
[   54.492573] Call trace:
[   54.493055]  show_stack+0x20/0x38 (C)
[   54.493647]  dump_stack_lvl+0x8c/0xd0
[   54.494208]  print_report+0x118/0x5e0
[   54.494853]  kasan_report+0xc8/0x118
[   54.495449]  kasan_check_range+0x100/0x1a8
[   54.496136]  __kasan_check_write+0x20/0x30
[   54.496713]  kasan_atomics_helper+0x17ec/0x4858
[   54.497460]  kasan_atomics+0x198/0x2e8
[   54.497991]  kunit_try_run_case+0x14c/0x3d0
[   54.498694]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   54.499526]  kthread+0x24c/0x2d0
[   54.500031]  ret_from_fork+0x10/0x20
[   54.500631] 
[   54.501100] Allocated by task 254:
[   54.501659]  kasan_save_stack+0x3c/0x68
[   54.502174]  kasan_save_track+0x20/0x40
[   54.502956]  kasan_save_alloc_info+0x40/0x58
[   54.503606]  __kasan_kmalloc+0xd4/0xd8
[   54.504121]  __kmalloc_cache_noprof+0x15c/0x3c0
[   54.504920]  kasan_atomics+0xb8/0x2e8
[   54.505488]  kunit_try_run_case+0x14c/0x3d0
[   54.506053]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   54.506705]  kthread+0x24c/0x2d0
[   54.507288]  ret_from_fork+0x10/0x20
[   54.507798] 
[   54.508174] The buggy address belongs to the object at fff00000c616b300
[   54.508174]  which belongs to the cache kmalloc-64 of size 64
[   54.509628] The buggy address is located 0 bytes to the right of
[   54.509628]  allocated 48-byte region [fff00000c616b300, fff00000c616b330)
[   54.511003] 
[   54.511396] The buggy address belongs to the physical page:
[   54.512099] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10616b
[   54.512996] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   54.514013] page_type: f5(slab)
[   54.514595] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   54.515605] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   54.516507] page dumped because: kasan: bad access detected
[   54.517264] 
[   54.517610] Memory state around the buggy address:
[   54.518268]  fff00000c616b200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   54.519110]  fff00000c616b280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   54.519931] >fff00000c616b300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   54.520797]                                      ^
[   54.521430]  fff00000c616b380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   54.522316]  fff00000c616b400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   54.523224] ==================================================================
[   54.260663] ==================================================================
[   54.262468] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1644/0x4858
[   54.263247] Write of size 8 at addr fff00000c616b330 by task kunit_try_catch/254
[   54.264253] 
[   54.264589] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241127 #1
[   54.265788] Tainted: [B]=BAD_PAGE, [N]=TEST
[   54.266372] Hardware name: linux,dummy-virt (DT)
[   54.266972] Call trace:
[   54.267405]  show_stack+0x20/0x38 (C)
[   54.268069]  dump_stack_lvl+0x8c/0xd0
[   54.268682]  print_report+0x118/0x5e0
[   54.269227]  kasan_report+0xc8/0x118
[   54.269782]  kasan_check_range+0x100/0x1a8
[   54.270419]  __kasan_check_write+0x20/0x30
[   54.271056]  kasan_atomics_helper+0x1644/0x4858
[   54.271732]  kasan_atomics+0x198/0x2e8
[   54.272345]  kunit_try_run_case+0x14c/0x3d0
[   54.272841]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   54.273616]  kthread+0x24c/0x2d0
[   54.274209]  ret_from_fork+0x10/0x20
[   54.274832] 
[   54.275200] Allocated by task 254:
[   54.275656]  kasan_save_stack+0x3c/0x68
[   54.276315]  kasan_save_track+0x20/0x40
[   54.276881]  kasan_save_alloc_info+0x40/0x58
[   54.277384]  __kasan_kmalloc+0xd4/0xd8
[   54.277998]  __kmalloc_cache_noprof+0x15c/0x3c0
[   54.278623]  kasan_atomics+0xb8/0x2e8
[   54.279269]  kunit_try_run_case+0x14c/0x3d0
[   54.279923]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   54.280570]  kthread+0x24c/0x2d0
[   54.281168]  ret_from_fork+0x10/0x20
[   54.281714] 
[   54.281986] The buggy address belongs to the object at fff00000c616b300
[   54.281986]  which belongs to the cache kmalloc-64 of size 64
[   54.283384] The buggy address is located 0 bytes to the right of
[   54.283384]  allocated 48-byte region [fff00000c616b300, fff00000c616b330)
[   54.284892] 
[   54.285202] The buggy address belongs to the physical page:
[   54.286001] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10616b
[   54.286895] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   54.287753] page_type: f5(slab)
[   54.288218] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   54.289207] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   54.290053] page dumped because: kasan: bad access detected
[   54.290624] 
[   54.290984] Memory state around the buggy address:
[   54.291615]  fff00000c616b200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   54.292569]  fff00000c616b280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   54.293541] >fff00000c616b300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   54.294437]                                      ^
[   54.295065]  fff00000c616b380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   54.295925]  fff00000c616b400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   54.296834] ==================================================================
[   52.295279] ==================================================================
[   52.296061] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f94/0x4858
[   52.296850] Write of size 4 at addr fff00000c616b330 by task kunit_try_catch/254
[   52.297714] 
[   52.298172] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241127 #1
[   52.299244] Tainted: [B]=BAD_PAGE, [N]=TEST
[   52.300106] Hardware name: linux,dummy-virt (DT)
[   52.300654] Call trace:
[   52.301108]  show_stack+0x20/0x38 (C)
[   52.301673]  dump_stack_lvl+0x8c/0xd0
[   52.302339]  print_report+0x118/0x5e0
[   52.302898]  kasan_report+0xc8/0x118
[   52.303461]  __asan_report_store4_noabort+0x20/0x30
[   52.304168]  kasan_atomics_helper+0x3f94/0x4858
[   52.305159]  kasan_atomics+0x198/0x2e8
[   52.305831]  kunit_try_run_case+0x14c/0x3d0
[   52.306616]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   52.307468]  kthread+0x24c/0x2d0
[   52.308063]  ret_from_fork+0x10/0x20
[   52.308635] 
[   52.309044] Allocated by task 254:
[   52.309607]  kasan_save_stack+0x3c/0x68
[   52.310365]  kasan_save_track+0x20/0x40
[   52.311021]  kasan_save_alloc_info+0x40/0x58
[   52.311808]  __kasan_kmalloc+0xd4/0xd8
[   52.312398]  __kmalloc_cache_noprof+0x15c/0x3c0
[   52.313099]  kasan_atomics+0xb8/0x2e8
[   52.313819]  kunit_try_run_case+0x14c/0x3d0
[   52.314481]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   52.315214]  kthread+0x24c/0x2d0
[   52.315843]  ret_from_fork+0x10/0x20
[   52.316462] 
[   52.316794] The buggy address belongs to the object at fff00000c616b300
[   52.316794]  which belongs to the cache kmalloc-64 of size 64
[   52.318314] The buggy address is located 0 bytes to the right of
[   52.318314]  allocated 48-byte region [fff00000c616b300, fff00000c616b330)
[   52.319726] 
[   52.320076] The buggy address belongs to the physical page:
[   52.320813] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10616b
[   52.321860] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   52.322734] page_type: f5(slab)
[   52.323271] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   52.324264] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   52.325195] page dumped because: kasan: bad access detected
[   52.325959] 
[   52.326532] Memory state around the buggy address:
[   52.327102]  fff00000c616b200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   52.328001]  fff00000c616b280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   52.328915] >fff00000c616b300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   52.329719]                                      ^
[   52.330361]  fff00000c616b380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   52.331110]  fff00000c616b400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   52.332134] ==================================================================
[   52.600490] ==================================================================
[   52.602128] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x684/0x4858
[   52.603170] Write of size 4 at addr fff00000c616b330 by task kunit_try_catch/254
[   52.604274] 
[   52.604694] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241127 #1
[   52.605826] Tainted: [B]=BAD_PAGE, [N]=TEST
[   52.606613] Hardware name: linux,dummy-virt (DT)
[   52.607280] Call trace:
[   52.607768]  show_stack+0x20/0x38 (C)
[   52.608458]  dump_stack_lvl+0x8c/0xd0
[   52.609112]  print_report+0x118/0x5e0
[   52.609781]  kasan_report+0xc8/0x118
[   52.610365]  kasan_check_range+0x100/0x1a8
[   52.610997]  __kasan_check_write+0x20/0x30
[   52.611713]  kasan_atomics_helper+0x684/0x4858
[   52.612431]  kasan_atomics+0x198/0x2e8
[   52.613073]  kunit_try_run_case+0x14c/0x3d0
[   52.613835]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   52.614733]  kthread+0x24c/0x2d0
[   52.615358]  ret_from_fork+0x10/0x20
[   52.615981] 
[   52.616347] Allocated by task 254:
[   52.617039]  kasan_save_stack+0x3c/0x68
[   52.617695]  kasan_save_track+0x20/0x40
[   52.618347]  kasan_save_alloc_info+0x40/0x58
[   52.619026]  __kasan_kmalloc+0xd4/0xd8
[   52.619666]  __kmalloc_cache_noprof+0x15c/0x3c0
[   52.620346]  kasan_atomics+0xb8/0x2e8
[   52.620930]  kunit_try_run_case+0x14c/0x3d0
[   52.621587]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   52.622373]  kthread+0x24c/0x2d0
[   52.623040]  ret_from_fork+0x10/0x20
[   52.623771] 
[   52.624146] The buggy address belongs to the object at fff00000c616b300
[   52.624146]  which belongs to the cache kmalloc-64 of size 64
[   52.625585] The buggy address is located 0 bytes to the right of
[   52.625585]  allocated 48-byte region [fff00000c616b300, fff00000c616b330)
[   52.627110] 
[   52.627547] The buggy address belongs to the physical page:
[   52.628282] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10616b
[   52.629470] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   52.630358] page_type: f5(slab)
[   52.630929] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   52.631967] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   52.632885] page dumped because: kasan: bad access detected
[   52.633668] 
[   52.634000] Memory state around the buggy address:
[   52.634811]  fff00000c616b200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   52.635639]  fff00000c616b280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   52.636708] >fff00000c616b300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   52.637624]                                      ^
[   52.638358]  fff00000c616b380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   52.639251]  fff00000c616b400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   52.640137] ==================================================================
[   52.642691] ==================================================================
[   52.643499] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x6ec/0x4858
[   52.644259] Write of size 4 at addr fff00000c616b330 by task kunit_try_catch/254
[   52.645238] 
[   52.645595] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241127 #1
[   52.646759] Tainted: [B]=BAD_PAGE, [N]=TEST
[   52.647287] Hardware name: linux,dummy-virt (DT)
[   52.647947] Call trace:
[   52.648475]  show_stack+0x20/0x38 (C)
[   52.649018]  dump_stack_lvl+0x8c/0xd0
[   52.649830]  print_report+0x118/0x5e0
[   52.650521]  kasan_report+0xc8/0x118
[   52.651210]  kasan_check_range+0x100/0x1a8
[   52.651884]  __kasan_check_write+0x20/0x30
[   52.652588]  kasan_atomics_helper+0x6ec/0x4858
[   52.653218]  kasan_atomics+0x198/0x2e8
[   52.653865]  kunit_try_run_case+0x14c/0x3d0
[   52.654572]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   52.655350]  kthread+0x24c/0x2d0
[   52.655993]  ret_from_fork+0x10/0x20
[   52.656597] 
[   52.656956] Allocated by task 254:
[   52.657610]  kasan_save_stack+0x3c/0x68
[   52.658287]  kasan_save_track+0x20/0x40
[   52.658892]  kasan_save_alloc_info+0x40/0x58
[   52.659656]  __kasan_kmalloc+0xd4/0xd8
[   52.660321]  __kmalloc_cache_noprof+0x15c/0x3c0
[   52.660992]  kasan_atomics+0xb8/0x2e8
[   52.661643]  kunit_try_run_case+0x14c/0x3d0
[   52.662283]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   52.663103]  kthread+0x24c/0x2d0
[   52.663664]  ret_from_fork+0x10/0x20
[   52.664184] 
[   52.664496] The buggy address belongs to the object at fff00000c616b300
[   52.664496]  which belongs to the cache kmalloc-64 of size 64
[   52.665935] The buggy address is located 0 bytes to the right of
[   52.665935]  allocated 48-byte region [fff00000c616b300, fff00000c616b330)
[   52.667509] 
[   52.668000] The buggy address belongs to the physical page:
[   52.668736] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10616b
[   52.669803] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   52.670735] page_type: f5(slab)
[   52.671271] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   52.672289] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   52.673252] page dumped because: kasan: bad access detected
[   52.674051] 
[   52.674469] Memory state around the buggy address:
[   52.675196]  fff00000c616b200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   52.676124]  fff00000c616b280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   52.677011] >fff00000c616b300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   52.677926]                                      ^
[   52.678641]  fff00000c616b380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   52.679636]  fff00000c616b400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   52.680544] ==================================================================
[   52.484854] ==================================================================
[   52.485604] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x54c/0x4858
[   52.486590] Write of size 4 at addr fff00000c616b330 by task kunit_try_catch/254
[   52.487504] 
[   52.487882] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241127 #1
[   52.488977] Tainted: [B]=BAD_PAGE, [N]=TEST
[   52.489568] Hardware name: linux,dummy-virt (DT)
[   52.490100] Call trace:
[   52.490599]  show_stack+0x20/0x38 (C)
[   52.491117]  dump_stack_lvl+0x8c/0xd0
[   52.491780]  print_report+0x118/0x5e0
[   52.492361]  kasan_report+0xc8/0x118
[   52.492910]  kasan_check_range+0x100/0x1a8
[   52.493507]  __kasan_check_write+0x20/0x30
[   52.494082]  kasan_atomics_helper+0x54c/0x4858
[   52.494820]  kasan_atomics+0x198/0x2e8
[   52.495416]  kunit_try_run_case+0x14c/0x3d0
[   52.496089]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   52.496779]  kthread+0x24c/0x2d0
[   52.497417]  ret_from_fork+0x10/0x20
[   52.498005] 
[   52.498314] Allocated by task 254:
[   52.498842]  kasan_save_stack+0x3c/0x68
[   52.499440]  kasan_save_track+0x20/0x40
[   52.500114]  kasan_save_alloc_info+0x40/0x58
[   52.500743]  __kasan_kmalloc+0xd4/0xd8
[   52.501284]  __kmalloc_cache_noprof+0x15c/0x3c0
[   52.501828]  kasan_atomics+0xb8/0x2e8
[   52.502444]  kunit_try_run_case+0x14c/0x3d0
[   52.503025]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   52.503760]  kthread+0x24c/0x2d0
[   52.504379]  ret_from_fork+0x10/0x20
[   52.504931] 
[   52.505219] The buggy address belongs to the object at fff00000c616b300
[   52.505219]  which belongs to the cache kmalloc-64 of size 64
[   52.506692] The buggy address is located 0 bytes to the right of
[   52.506692]  allocated 48-byte region [fff00000c616b300, fff00000c616b330)
[   52.507984] 
[   52.508400] The buggy address belongs to the physical page:
[   52.509121] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10616b
[   52.509928] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   52.510798] page_type: f5(slab)
[   52.511273] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   52.512458] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   52.513358] page dumped because: kasan: bad access detected
[   52.514016] 
[   52.514320] Memory state around the buggy address:
[   52.514925]  fff00000c616b200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   52.515808]  fff00000c616b280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   52.516564] >fff00000c616b300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   52.517497]                                      ^
[   52.518045]  fff00000c616b380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   52.518948]  fff00000c616b400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   52.519794] ==================================================================
[   52.036811] ==================================================================
[   52.038179] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f7c/0x4858
[   52.038838] Write of size 4 at addr fff00000c616b330 by task kunit_try_catch/254
[   52.040352] 
[   52.040648] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241127 #1
[   52.042447] Tainted: [B]=BAD_PAGE, [N]=TEST
[   52.042856] Hardware name: linux,dummy-virt (DT)
[   52.043456] Call trace:
[   52.043928]  show_stack+0x20/0x38 (C)
[   52.044532]  dump_stack_lvl+0x8c/0xd0
[   52.045377]  print_report+0x118/0x5e0
[   52.045910]  kasan_report+0xc8/0x118
[   52.046582]  __asan_report_store4_noabort+0x20/0x30
[   52.047242]  kasan_atomics_helper+0x3f7c/0x4858
[   52.047890]  kasan_atomics+0x198/0x2e8
[   52.048385]  kunit_try_run_case+0x14c/0x3d0
[   52.049288]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   52.050034]  kthread+0x24c/0x2d0
[   52.050649]  ret_from_fork+0x10/0x20
[   52.051284] 
[   52.051674] Allocated by task 254:
[   52.052287]  kasan_save_stack+0x3c/0x68
[   52.052846]  kasan_save_track+0x20/0x40
[   52.053792]  kasan_save_alloc_info+0x40/0x58
[   52.054360]  __kasan_kmalloc+0xd4/0xd8
[   52.054987]  __kmalloc_cache_noprof+0x15c/0x3c0
[   52.055662]  kasan_atomics+0xb8/0x2e8
[   52.056176]  kunit_try_run_case+0x14c/0x3d0
[   52.056838]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   52.058132]  kthread+0x24c/0x2d0
[   52.058592]  ret_from_fork+0x10/0x20
[   52.059047] 
[   52.059510] The buggy address belongs to the object at fff00000c616b300
[   52.059510]  which belongs to the cache kmalloc-64 of size 64
[   52.060840] The buggy address is located 0 bytes to the right of
[   52.060840]  allocated 48-byte region [fff00000c616b300, fff00000c616b330)
[   52.062437] 
[   52.062922] The buggy address belongs to the physical page:
[   52.063642] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10616b
[   52.065327] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   52.066126] page_type: f5(slab)
[   52.066590] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   52.067593] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   52.068529] page dumped because: kasan: bad access detected
[   52.069199] 
[   52.069900] Memory state around the buggy address:
[   52.070600]  fff00000c616b200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   52.071603]  fff00000c616b280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   52.072556] >fff00000c616b300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   52.073597]                                      ^
[   52.074143]  fff00000c616b380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   52.074997]  fff00000c616b400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   52.075851] ==================================================================
[   53.336673] ==================================================================
[   53.338288] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e04/0x4858
[   53.339564] Read of size 4 at addr fff00000c616b330 by task kunit_try_catch/254
[   53.340755] 
[   53.341178] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241127 #1
[   53.342366] Tainted: [B]=BAD_PAGE, [N]=TEST
[   53.342899] Hardware name: linux,dummy-virt (DT)
[   53.343570] Call trace:
[   53.343938]  show_stack+0x20/0x38 (C)
[   53.344584]  dump_stack_lvl+0x8c/0xd0
[   53.345235]  print_report+0x118/0x5e0
[   53.345831]  kasan_report+0xc8/0x118
[   53.346388]  __asan_report_load4_noabort+0x20/0x30
[   53.347032]  kasan_atomics_helper+0x3e04/0x4858
[   53.347762]  kasan_atomics+0x198/0x2e8
[   53.348569]  kunit_try_run_case+0x14c/0x3d0
[   53.349158]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   53.349778]  kthread+0x24c/0x2d0
[   53.350501]  ret_from_fork+0x10/0x20
[   53.351069] 
[   53.351466] Allocated by task 254:
[   53.351957]  kasan_save_stack+0x3c/0x68
[   53.352524]  kasan_save_track+0x20/0x40
[   53.353154]  kasan_save_alloc_info+0x40/0x58
[   53.353781]  __kasan_kmalloc+0xd4/0xd8
[   53.354271]  __kmalloc_cache_noprof+0x15c/0x3c0
[   53.355055]  kasan_atomics+0xb8/0x2e8
[   53.355618]  kunit_try_run_case+0x14c/0x3d0
[   53.356279]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   53.356992]  kthread+0x24c/0x2d0
[   53.357573]  ret_from_fork+0x10/0x20
[   53.358167] 
[   53.358506] The buggy address belongs to the object at fff00000c616b300
[   53.358506]  which belongs to the cache kmalloc-64 of size 64
[   53.359830] The buggy address is located 0 bytes to the right of
[   53.359830]  allocated 48-byte region [fff00000c616b300, fff00000c616b330)
[   53.361212] 
[   53.361686] The buggy address belongs to the physical page:
[   53.362428] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10616b
[   53.363386] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   53.364194] page_type: f5(slab)
[   53.364683] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   53.365571] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   53.366495] page dumped because: kasan: bad access detected
[   53.367080] 
[   53.367452] Memory state around the buggy address:
[   53.368144]  fff00000c616b200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   53.369000]  fff00000c616b280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   53.369902] >fff00000c616b300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   53.370764]                                      ^
[   53.371375]  fff00000c616b380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   53.372245]  fff00000c616b400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   53.373047] ==================================================================
[   54.298245] ==================================================================
[   54.299095] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3df4/0x4858
[   54.299913] Read of size 8 at addr fff00000c616b330 by task kunit_try_catch/254
[   54.300827] 
[   54.301255] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241127 #1
[   54.302463] Tainted: [B]=BAD_PAGE, [N]=TEST
[   54.303109] Hardware name: linux,dummy-virt (DT)
[   54.303776] Call trace:
[   54.304165]  show_stack+0x20/0x38 (C)
[   54.304693]  dump_stack_lvl+0x8c/0xd0
[   54.305364]  print_report+0x118/0x5e0
[   54.305884]  kasan_report+0xc8/0x118
[   54.306607]  __asan_report_load8_noabort+0x20/0x30
[   54.307338]  kasan_atomics_helper+0x3df4/0x4858
[   54.308017]  kasan_atomics+0x198/0x2e8
[   54.308738]  kunit_try_run_case+0x14c/0x3d0
[   54.309315]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   54.310229]  kthread+0x24c/0x2d0
[   54.310733]  ret_from_fork+0x10/0x20
[   54.311360] 
[   54.311645] Allocated by task 254:
[   54.312080]  kasan_save_stack+0x3c/0x68
[   54.312762]  kasan_save_track+0x20/0x40
[   54.313363]  kasan_save_alloc_info+0x40/0x58
[   54.313996]  __kasan_kmalloc+0xd4/0xd8
[   54.314589]  __kmalloc_cache_noprof+0x15c/0x3c0
[   54.315127]  kasan_atomics+0xb8/0x2e8
[   54.315762]  kunit_try_run_case+0x14c/0x3d0
[   54.316473]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   54.317119]  kthread+0x24c/0x2d0
[   54.317716]  ret_from_fork+0x10/0x20
[   54.318252] 
[   54.318569] The buggy address belongs to the object at fff00000c616b300
[   54.318569]  which belongs to the cache kmalloc-64 of size 64
[   54.319956] The buggy address is located 0 bytes to the right of
[   54.319956]  allocated 48-byte region [fff00000c616b300, fff00000c616b330)
[   54.321398] 
[   54.321690] The buggy address belongs to the physical page:
[   54.322446] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10616b
[   54.323516] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   54.324286] page_type: f5(slab)
[   54.324870] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   54.325783] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   54.326668] page dumped because: kasan: bad access detected
[   54.327470] 
[   54.327978] Memory state around the buggy address:
[   54.328773]  fff00000c616b200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   54.329613]  fff00000c616b280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   54.330500] >fff00000c616b300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   54.331494]                                      ^
[   54.332067]  fff00000c616b380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   54.332885]  fff00000c616b400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   54.333826] ==================================================================
[   54.372193] ==================================================================
[   54.373132] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e10/0x4858
[   54.374265] Read of size 8 at addr fff00000c616b330 by task kunit_try_catch/254
[   54.375392] 
[   54.375776] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241127 #1
[   54.377307] Tainted: [B]=BAD_PAGE, [N]=TEST
[   54.377800] Hardware name: linux,dummy-virt (DT)
[   54.378717] Call trace:
[   54.379534]  show_stack+0x20/0x38 (C)
[   54.380060]  dump_stack_lvl+0x8c/0xd0
[   54.380809]  print_report+0x118/0x5e0
[   54.381633]  kasan_report+0xc8/0x118
[   54.382240]  __asan_report_load8_noabort+0x20/0x30
[   54.383205]  kasan_atomics_helper+0x3e10/0x4858
[   54.383927]  kasan_atomics+0x198/0x2e8
[   54.384533]  kunit_try_run_case+0x14c/0x3d0
[   54.385361]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   54.386196]  kthread+0x24c/0x2d0
[   54.386781]  ret_from_fork+0x10/0x20
[   54.387405] 
[   54.387852] Allocated by task 254:
[   54.388354]  kasan_save_stack+0x3c/0x68
[   54.389057]  kasan_save_track+0x20/0x40
[   54.389660]  kasan_save_alloc_info+0x40/0x58
[   54.390176]  __kasan_kmalloc+0xd4/0xd8
[   54.390910]  __kmalloc_cache_noprof+0x15c/0x3c0
[   54.391590]  kasan_atomics+0xb8/0x2e8
[   54.392139]  kunit_try_run_case+0x14c/0x3d0
[   54.392637]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   54.393445]  kthread+0x24c/0x2d0
[   54.393977]  ret_from_fork+0x10/0x20
[   54.394544] 
[   54.394875] The buggy address belongs to the object at fff00000c616b300
[   54.394875]  which belongs to the cache kmalloc-64 of size 64
[   54.396131] The buggy address is located 0 bytes to the right of
[   54.396131]  allocated 48-byte region [fff00000c616b300, fff00000c616b330)
[   54.397552] 
[   54.397923] The buggy address belongs to the physical page:
[   54.398688] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10616b
[   54.399612] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   54.400425] page_type: f5(slab)
[   54.400977] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   54.401817] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   54.402800] page dumped because: kasan: bad access detected
[   54.403512] 
[   54.403857] Memory state around the buggy address:
[   54.404544]  fff00000c616b200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   54.405390]  fff00000c616b280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   54.406176] >fff00000c616b300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   54.407013]                                      ^
[   54.407736]  fff00000c616b380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   54.408611]  fff00000c616b400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   54.409433] ==================================================================
[   53.067869] ==================================================================
[   53.068725] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xb70/0x4858
[   53.069670] Write of size 4 at addr fff00000c616b330 by task kunit_try_catch/254
[   53.070660] 
[   53.071041] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241127 #1
[   53.071954] Tainted: [B]=BAD_PAGE, [N]=TEST
[   53.072656] Hardware name: linux,dummy-virt (DT)
[   53.073334] Call trace:
[   53.073760]  show_stack+0x20/0x38 (C)
[   53.074250]  dump_stack_lvl+0x8c/0xd0
[   53.074807]  print_report+0x118/0x5e0
[   53.075584]  kasan_report+0xc8/0x118
[   53.076217]  kasan_check_range+0x100/0x1a8
[   53.076899]  __kasan_check_write+0x20/0x30
[   53.077427]  kasan_atomics_helper+0xb70/0x4858
[   53.078229]  kasan_atomics+0x198/0x2e8
[   53.078919]  kunit_try_run_case+0x14c/0x3d0
[   53.079578]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   53.080485]  kthread+0x24c/0x2d0
[   53.081077]  ret_from_fork+0x10/0x20
[   53.081761] 
[   53.082143] Allocated by task 254:
[   53.082761]  kasan_save_stack+0x3c/0x68
[   53.083446]  kasan_save_track+0x20/0x40
[   53.083950]  kasan_save_alloc_info+0x40/0x58
[   53.084489]  __kasan_kmalloc+0xd4/0xd8
[   53.084893]  __kmalloc_cache_noprof+0x15c/0x3c0
[   53.085463]  kasan_atomics+0xb8/0x2e8
[   53.086120]  kunit_try_run_case+0x14c/0x3d0
[   53.086601]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   53.087125]  kthread+0x24c/0x2d0
[   53.087580]  ret_from_fork+0x10/0x20
[   53.088016] 
[   53.088458] The buggy address belongs to the object at fff00000c616b300
[   53.088458]  which belongs to the cache kmalloc-64 of size 64
[   53.090216] The buggy address is located 0 bytes to the right of
[   53.090216]  allocated 48-byte region [fff00000c616b300, fff00000c616b330)
[   53.091620] 
[   53.091901] The buggy address belongs to the physical page:
[   53.092932] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10616b
[   53.093933] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   53.094810] page_type: f5(slab)
[   53.095318] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   53.096185] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   53.097049] page dumped because: kasan: bad access detected
[   53.097839] 
[   53.098083] Memory state around the buggy address:
[   53.098700]  fff00000c616b200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   53.099842]  fff00000c616b280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   53.100696] >fff00000c616b300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   53.101558]                                      ^
[   53.102250]  fff00000c616b380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   53.103107]  fff00000c616b400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   53.104052] ==================================================================

[   30.742459] ==================================================================
[   30.743595] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xfaa/0x5450
[   30.744434] Write of size 4 at addr ffff888101aba7b0 by task kunit_try_catch/273
[   30.745319] 
[   30.745558] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241127 #1
[   30.746650] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.747183] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   30.748157] Call Trace:
[   30.748505]  <TASK>
[   30.748894]  dump_stack_lvl+0x73/0xb0
[   30.749371]  print_report+0xd1/0x640
[   30.749966]  ? __virt_addr_valid+0x1db/0x2d0
[   30.750696]  ? kasan_complete_mode_report_info+0x2a/0x200
[   30.751346]  kasan_report+0x102/0x140
[   30.751960]  ? kasan_atomics_helper+0xfaa/0x5450
[   30.752430]  ? kasan_atomics_helper+0xfaa/0x5450
[   30.753087]  kasan_check_range+0x10c/0x1c0
[   30.753660]  __kasan_check_write+0x18/0x20
[   30.754165]  kasan_atomics_helper+0xfaa/0x5450
[   30.754746]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   30.755354]  ? __kmalloc_cache_noprof+0x184/0x410
[   30.756071]  ? kasan_atomics+0x153/0x310
[   30.756585]  kasan_atomics+0x1dd/0x310
[   30.757226]  ? __pfx_kasan_atomics+0x10/0x10
[   30.757677]  ? __pfx_read_tsc+0x10/0x10
[   30.758409]  ? ktime_get_ts64+0x84/0x230
[   30.758813]  kunit_try_run_case+0x1b3/0x490
[   30.759417]  ? __pfx_kunit_try_run_case+0x10/0x10
[   30.759834]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   30.760522]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   30.761095]  ? __kthread_parkme+0x82/0x160
[   30.761510]  ? preempt_count_sub+0x50/0x80
[   30.762111]  ? __pfx_kunit_try_run_case+0x10/0x10
[   30.762739]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   30.763621]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   30.764379]  kthread+0x257/0x310
[   30.764741]  ? __pfx_kthread+0x10/0x10
[   30.765299]  ret_from_fork+0x41/0x80
[   30.765863]  ? __pfx_kthread+0x10/0x10
[   30.766471]  ret_from_fork_asm+0x1a/0x30
[   30.766950]  </TASK>
[   30.767391] 
[   30.767644] Allocated by task 273:
[   30.768016]  kasan_save_stack+0x3d/0x60
[   30.768597]  kasan_save_track+0x18/0x40
[   30.769278]  kasan_save_alloc_info+0x3b/0x50
[   30.769818]  __kasan_kmalloc+0xb7/0xc0
[   30.770292]  __kmalloc_cache_noprof+0x184/0x410
[   30.770937]  kasan_atomics+0x96/0x310
[   30.771289]  kunit_try_run_case+0x1b3/0x490
[   30.771820]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   30.772617]  kthread+0x257/0x310
[   30.773013]  ret_from_fork+0x41/0x80
[   30.773757]  ret_from_fork_asm+0x1a/0x30
[   30.774362] 
[   30.774607] The buggy address belongs to the object at ffff888101aba780
[   30.774607]  which belongs to the cache kmalloc-64 of size 64
[   30.776707] The buggy address is located 0 bytes to the right of
[   30.776707]  allocated 48-byte region [ffff888101aba780, ffff888101aba7b0)
[   30.778506] 
[   30.778676] The buggy address belongs to the physical page:
[   30.779080] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101aba
[   30.780432] flags: 0x200000000000000(node=0|zone=2)
[   30.780847] page_type: f5(slab)
[   30.781650] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   30.782567] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   30.783285] page dumped because: kasan: bad access detected
[   30.784131] 
[   30.784557] Memory state around the buggy address:
[   30.785285]  ffff888101aba680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   30.786572]  ffff888101aba700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   30.787237] >ffff888101aba780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   30.788252]                                      ^
[   30.788756]  ffff888101aba800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.789127]  ffff888101aba880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.789792] ==================================================================
[   31.837116] ==================================================================
[   31.837873] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1b23/0x5450
[   31.839215] Write of size 8 at addr ffff888101aba7b0 by task kunit_try_catch/273
[   31.839755] 
[   31.839930] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241127 #1
[   31.841444] Tainted: [B]=BAD_PAGE, [N]=TEST
[   31.842044] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   31.843095] Call Trace:
[   31.843575]  <TASK>
[   31.843828]  dump_stack_lvl+0x73/0xb0
[   31.844603]  print_report+0xd1/0x640
[   31.844975]  ? __virt_addr_valid+0x1db/0x2d0
[   31.845655]  ? kasan_complete_mode_report_info+0x2a/0x200
[   31.846312]  kasan_report+0x102/0x140
[   31.846686]  ? kasan_atomics_helper+0x1b23/0x5450
[   31.847148]  ? kasan_atomics_helper+0x1b23/0x5450
[   31.847959]  kasan_check_range+0x10c/0x1c0
[   31.848553]  __kasan_check_write+0x18/0x20
[   31.849155]  kasan_atomics_helper+0x1b23/0x5450
[   31.849733]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   31.850439]  ? __kmalloc_cache_noprof+0x184/0x410
[   31.850862]  ? kasan_atomics+0x153/0x310
[   31.851722]  kasan_atomics+0x1dd/0x310
[   31.852219]  ? __pfx_kasan_atomics+0x10/0x10
[   31.852850]  ? __pfx_read_tsc+0x10/0x10
[   31.853427]  ? ktime_get_ts64+0x84/0x230
[   31.853967]  kunit_try_run_case+0x1b3/0x490
[   31.854582]  ? __pfx_kunit_try_run_case+0x10/0x10
[   31.855052]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   31.855879]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   31.856549]  ? __kthread_parkme+0x82/0x160
[   31.857175]  ? preempt_count_sub+0x50/0x80
[   31.857797]  ? __pfx_kunit_try_run_case+0x10/0x10
[   31.858503]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   31.859270]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   31.859916]  kthread+0x257/0x310
[   31.860383]  ? __pfx_kthread+0x10/0x10
[   31.860760]  ret_from_fork+0x41/0x80
[   31.861645]  ? __pfx_kthread+0x10/0x10
[   31.862027]  ret_from_fork_asm+0x1a/0x30
[   31.862551]  </TASK>
[   31.863075] 
[   31.863364] Allocated by task 273:
[   31.863727]  kasan_save_stack+0x3d/0x60
[   31.864682]  kasan_save_track+0x18/0x40
[   31.865079]  kasan_save_alloc_info+0x3b/0x50
[   31.865537]  __kasan_kmalloc+0xb7/0xc0
[   31.865915]  __kmalloc_cache_noprof+0x184/0x410
[   31.866753]  kasan_atomics+0x96/0x310
[   31.867359]  kunit_try_run_case+0x1b3/0x490
[   31.867904]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   31.868522]  kthread+0x257/0x310
[   31.868816]  ret_from_fork+0x41/0x80
[   31.869651]  ret_from_fork_asm+0x1a/0x30
[   31.870080] 
[   31.870291] The buggy address belongs to the object at ffff888101aba780
[   31.870291]  which belongs to the cache kmalloc-64 of size 64
[   31.871628] The buggy address is located 0 bytes to the right of
[   31.871628]  allocated 48-byte region [ffff888101aba780, ffff888101aba7b0)
[   31.873031] 
[   31.873242] The buggy address belongs to the physical page:
[   31.873759] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101aba
[   31.874812] flags: 0x200000000000000(node=0|zone=2)
[   31.875376] page_type: f5(slab)
[   31.875956] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   31.876766] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   31.877633] page dumped because: kasan: bad access detected
[   31.878211] 
[   31.878409] Memory state around the buggy address:
[   31.879275]  ffff888101aba680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   31.879886]  ffff888101aba700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   31.880749] >ffff888101aba780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   31.881548]                                      ^
[   31.882107]  ffff888101aba800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.882935]  ffff888101aba880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.883540] ==================================================================
[   30.924233] ==================================================================
[   30.924650] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1149/0x5450
[   30.925881] Write of size 4 at addr ffff888101aba7b0 by task kunit_try_catch/273
[   30.926591] 
[   30.926783] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241127 #1
[   30.927886] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.928489] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   30.929248] Call Trace:
[   30.929613]  <TASK>
[   30.929942]  dump_stack_lvl+0x73/0xb0
[   30.930363]  print_report+0xd1/0x640
[   30.930904]  ? __virt_addr_valid+0x1db/0x2d0
[   30.931536]  ? kasan_complete_mode_report_info+0x2a/0x200
[   30.932192]  kasan_report+0x102/0x140
[   30.932720]  ? kasan_atomics_helper+0x1149/0x5450
[   30.933304]  ? kasan_atomics_helper+0x1149/0x5450
[   30.933773]  kasan_check_range+0x10c/0x1c0
[   30.935078]  __kasan_check_write+0x18/0x20
[   30.935601]  kasan_atomics_helper+0x1149/0x5450
[   30.936405]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   30.936634]  ? __kmalloc_cache_noprof+0x184/0x410
[   30.936842]  ? kasan_atomics+0x153/0x310
[   30.937150]  kasan_atomics+0x1dd/0x310
[   30.937855]  ? __pfx_kasan_atomics+0x10/0x10
[   30.938336]  ? __pfx_read_tsc+0x10/0x10
[   30.938779]  ? ktime_get_ts64+0x84/0x230
[   30.939704]  kunit_try_run_case+0x1b3/0x490
[   30.940256]  ? __pfx_kunit_try_run_case+0x10/0x10
[   30.940617]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   30.941192]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   30.941614]  ? __kthread_parkme+0x82/0x160
[   30.942092]  ? preempt_count_sub+0x50/0x80
[   30.942863]  ? __pfx_kunit_try_run_case+0x10/0x10
[   30.943556]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   30.944487]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   30.945384]  kthread+0x257/0x310
[   30.945803]  ? __pfx_kthread+0x10/0x10
[   30.946126]  ret_from_fork+0x41/0x80
[   30.946634]  ? __pfx_kthread+0x10/0x10
[   30.947022]  ret_from_fork_asm+0x1a/0x30
[   30.947378]  </TASK>
[   30.947716] 
[   30.947949] Allocated by task 273:
[   30.948371]  kasan_save_stack+0x3d/0x60
[   30.948825]  kasan_save_track+0x18/0x40
[   30.949274]  kasan_save_alloc_info+0x3b/0x50
[   30.949582]  __kasan_kmalloc+0xb7/0xc0
[   30.950084]  __kmalloc_cache_noprof+0x184/0x410
[   30.950637]  kasan_atomics+0x96/0x310
[   30.950912]  kunit_try_run_case+0x1b3/0x490
[   30.951509]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   30.952087]  kthread+0x257/0x310
[   30.952428]  ret_from_fork+0x41/0x80
[   30.952778]  ret_from_fork_asm+0x1a/0x30
[   30.953269] 
[   30.953469] The buggy address belongs to the object at ffff888101aba780
[   30.953469]  which belongs to the cache kmalloc-64 of size 64
[   30.954255] The buggy address is located 0 bytes to the right of
[   30.954255]  allocated 48-byte region [ffff888101aba780, ffff888101aba7b0)
[   30.955425] 
[   30.955587] The buggy address belongs to the physical page:
[   30.955998] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101aba
[   30.956944] flags: 0x200000000000000(node=0|zone=2)
[   30.957277] page_type: f5(slab)
[   30.957523] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   30.959081] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   30.959633] page dumped because: kasan: bad access detected
[   30.959977] 
[   30.960279] Memory state around the buggy address:
[   30.960870]  ffff888101aba680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   30.961815]  ffff888101aba700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   30.962500] >ffff888101aba780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   30.963162]                                      ^
[   30.963577]  ffff888101aba800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.964203]  ffff888101aba880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.964615] ==================================================================
[   31.184647] ==================================================================
[   31.185376] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x13b6/0x5450
[   31.185916] Read of size 8 at addr ffff888101aba7b0 by task kunit_try_catch/273
[   31.186844] 
[   31.187034] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241127 #1
[   31.188519] Tainted: [B]=BAD_PAGE, [N]=TEST
[   31.189010] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   31.189919] Call Trace:
[   31.190400]  <TASK>
[   31.190836]  dump_stack_lvl+0x73/0xb0
[   31.191234]  print_report+0xd1/0x640
[   31.191907]  ? __virt_addr_valid+0x1db/0x2d0
[   31.192315]  ? kasan_complete_mode_report_info+0x2a/0x200
[   31.192933]  kasan_report+0x102/0x140
[   31.193566]  ? kasan_atomics_helper+0x13b6/0x5450
[   31.194146]  ? kasan_atomics_helper+0x13b6/0x5450
[   31.194726]  kasan_check_range+0x10c/0x1c0
[   31.195410]  __kasan_check_read+0x15/0x20
[   31.195873]  kasan_atomics_helper+0x13b6/0x5450
[   31.196574]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   31.197438]  ? __kmalloc_cache_noprof+0x184/0x410
[   31.197884]  ? kasan_atomics+0x153/0x310
[   31.198443]  kasan_atomics+0x1dd/0x310
[   31.198952]  ? __pfx_kasan_atomics+0x10/0x10
[   31.199519]  ? __pfx_read_tsc+0x10/0x10
[   31.199818]  ? ktime_get_ts64+0x84/0x230
[   31.200247]  kunit_try_run_case+0x1b3/0x490
[   31.200833]  ? __pfx_kunit_try_run_case+0x10/0x10
[   31.201534]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   31.201948]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   31.202762]  ? __kthread_parkme+0x82/0x160
[   31.203391]  ? preempt_count_sub+0x50/0x80
[   31.203769]  ? __pfx_kunit_try_run_case+0x10/0x10
[   31.204637]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   31.205440]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   31.205957]  kthread+0x257/0x310
[   31.206430]  ? __pfx_kthread+0x10/0x10
[   31.206942]  ret_from_fork+0x41/0x80
[   31.207459]  ? __pfx_kthread+0x10/0x10
[   31.207959]  ret_from_fork_asm+0x1a/0x30
[   31.208304]  </TASK>
[   31.208611] 
[   31.208965] Allocated by task 273:
[   31.209724]  kasan_save_stack+0x3d/0x60
[   31.210089]  kasan_save_track+0x18/0x40
[   31.210786]  kasan_save_alloc_info+0x3b/0x50
[   31.211268]  __kasan_kmalloc+0xb7/0xc0
[   31.211651]  __kmalloc_cache_noprof+0x184/0x410
[   31.212110]  kasan_atomics+0x96/0x310
[   31.212494]  kunit_try_run_case+0x1b3/0x490
[   31.213103]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   31.213524]  kthread+0x257/0x310
[   31.213967]  ret_from_fork+0x41/0x80
[   31.214502]  ret_from_fork_asm+0x1a/0x30
[   31.214896] 
[   31.215245] The buggy address belongs to the object at ffff888101aba780
[   31.215245]  which belongs to the cache kmalloc-64 of size 64
[   31.216270] The buggy address is located 0 bytes to the right of
[   31.216270]  allocated 48-byte region [ffff888101aba780, ffff888101aba7b0)
[   31.217261] 
[   31.217621] The buggy address belongs to the physical page:
[   31.218506] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101aba
[   31.219305] flags: 0x200000000000000(node=0|zone=2)
[   31.219808] page_type: f5(slab)
[   31.220392] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   31.221262] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   31.221778] page dumped because: kasan: bad access detected
[   31.222541] 
[   31.222782] Memory state around the buggy address:
[   31.223220]  ffff888101aba680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   31.224099]  ffff888101aba700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   31.224952] >ffff888101aba780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   31.225753]                                      ^
[   31.226372]  ffff888101aba800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.227199]  ffff888101aba880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.227809] ==================================================================
[   31.740189] ==================================================================
[   31.740812] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x19e4/0x5450
[   31.741718] Write of size 8 at addr ffff888101aba7b0 by task kunit_try_catch/273
[   31.742512] 
[   31.742833] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241127 #1
[   31.743714] Tainted: [B]=BAD_PAGE, [N]=TEST
[   31.744202] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   31.744862] Call Trace:
[   31.745379]  <TASK>
[   31.745730]  dump_stack_lvl+0x73/0xb0
[   31.746205]  print_report+0xd1/0x640
[   31.746718]  ? __virt_addr_valid+0x1db/0x2d0
[   31.747494]  ? kasan_complete_mode_report_info+0x2a/0x200
[   31.748079]  kasan_report+0x102/0x140
[   31.748497]  ? kasan_atomics_helper+0x19e4/0x5450
[   31.748968]  ? kasan_atomics_helper+0x19e4/0x5450
[   31.749699]  kasan_check_range+0x10c/0x1c0
[   31.750096]  __kasan_check_write+0x18/0x20
[   31.750713]  kasan_atomics_helper+0x19e4/0x5450
[   31.751312]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   31.751836]  ? __kmalloc_cache_noprof+0x184/0x410
[   31.752398]  ? kasan_atomics+0x153/0x310
[   31.752960]  kasan_atomics+0x1dd/0x310
[   31.753326]  ? __pfx_kasan_atomics+0x10/0x10
[   31.753767]  ? __pfx_read_tsc+0x10/0x10
[   31.754533]  ? ktime_get_ts64+0x84/0x230
[   31.754929]  kunit_try_run_case+0x1b3/0x490
[   31.755447]  ? __pfx_kunit_try_run_case+0x10/0x10
[   31.756078]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   31.756511]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   31.757082]  ? __kthread_parkme+0x82/0x160
[   31.757634]  ? preempt_count_sub+0x50/0x80
[   31.757945]  ? __pfx_kunit_try_run_case+0x10/0x10
[   31.758691]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   31.759160]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   31.759882]  kthread+0x257/0x310
[   31.760515]  ? __pfx_kthread+0x10/0x10
[   31.760950]  ret_from_fork+0x41/0x80
[   31.761446]  ? __pfx_kthread+0x10/0x10
[   31.761728]  ret_from_fork_asm+0x1a/0x30
[   31.762358]  </TASK>
[   31.762699] 
[   31.763095] Allocated by task 273:
[   31.763398]  kasan_save_stack+0x3d/0x60
[   31.763880]  kasan_save_track+0x18/0x40
[   31.764464]  kasan_save_alloc_info+0x3b/0x50
[   31.764945]  __kasan_kmalloc+0xb7/0xc0
[   31.765475]  __kmalloc_cache_noprof+0x184/0x410
[   31.766009]  kasan_atomics+0x96/0x310
[   31.766561]  kunit_try_run_case+0x1b3/0x490
[   31.766908]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   31.768476]  kthread+0x257/0x310
[   31.768763]  ret_from_fork+0x41/0x80
[   31.769437]  ret_from_fork_asm+0x1a/0x30
[   31.769924] 
[   31.770243] The buggy address belongs to the object at ffff888101aba780
[   31.770243]  which belongs to the cache kmalloc-64 of size 64
[   31.771452] The buggy address is located 0 bytes to the right of
[   31.771452]  allocated 48-byte region [ffff888101aba780, ffff888101aba7b0)
[   31.772806] 
[   31.773192] The buggy address belongs to the physical page:
[   31.773901] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101aba
[   31.775166] flags: 0x200000000000000(node=0|zone=2)
[   31.775694] page_type: f5(slab)
[   31.776088] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   31.776787] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   31.777373] page dumped because: kasan: bad access detected
[   31.778164] 
[   31.778524] Memory state around the buggy address:
[   31.779467]  ffff888101aba680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   31.780296]  ffff888101aba700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   31.782120] >ffff888101aba780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   31.782921]                                      ^
[   31.783421]  ffff888101aba800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.784172]  ffff888101aba880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.784446] ==================================================================
[   30.643111] ==================================================================
[   30.643703] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xe79/0x5450
[   30.645474] Write of size 4 at addr ffff888101aba7b0 by task kunit_try_catch/273
[   30.646396] 
[   30.646616] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241127 #1
[   30.647681] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.648241] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   30.648805] Call Trace:
[   30.648945]  <TASK>
[   30.649182]  dump_stack_lvl+0x73/0xb0
[   30.649688]  print_report+0xd1/0x640
[   30.650430]  ? __virt_addr_valid+0x1db/0x2d0
[   30.650864]  ? kasan_complete_mode_report_info+0x2a/0x200
[   30.651485]  kasan_report+0x102/0x140
[   30.651800]  ? kasan_atomics_helper+0xe79/0x5450
[   30.652551]  ? kasan_atomics_helper+0xe79/0x5450
[   30.653440]  kasan_check_range+0x10c/0x1c0
[   30.653973]  __kasan_check_write+0x18/0x20
[   30.654429]  kasan_atomics_helper+0xe79/0x5450
[   30.654849]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   30.655536]  ? __kmalloc_cache_noprof+0x184/0x410
[   30.656140]  ? kasan_atomics+0x153/0x310
[   30.656642]  kasan_atomics+0x1dd/0x310
[   30.657145]  ? __pfx_kasan_atomics+0x10/0x10
[   30.657731]  ? __pfx_read_tsc+0x10/0x10
[   30.658325]  ? ktime_get_ts64+0x84/0x230
[   30.658783]  kunit_try_run_case+0x1b3/0x490
[   30.659742]  ? __pfx_kunit_try_run_case+0x10/0x10
[   30.660693]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   30.661358]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   30.661784]  ? __kthread_parkme+0x82/0x160
[   30.662409]  ? preempt_count_sub+0x50/0x80
[   30.663492]  ? __pfx_kunit_try_run_case+0x10/0x10
[   30.663928]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   30.664605]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   30.665653]  kthread+0x257/0x310
[   30.666638]  ? __pfx_kthread+0x10/0x10
[   30.667055]  ret_from_fork+0x41/0x80
[   30.667735]  ? __pfx_kthread+0x10/0x10
[   30.668434]  ret_from_fork_asm+0x1a/0x30
[   30.668792]  </TASK>
[   30.669092] 
[   30.669678] Allocated by task 273:
[   30.670035]  kasan_save_stack+0x3d/0x60
[   30.670427]  kasan_save_track+0x18/0x40
[   30.670800]  kasan_save_alloc_info+0x3b/0x50
[   30.671660]  __kasan_kmalloc+0xb7/0xc0
[   30.672040]  __kmalloc_cache_noprof+0x184/0x410
[   30.672800]  kasan_atomics+0x96/0x310
[   30.673473]  kunit_try_run_case+0x1b3/0x490
[   30.673947]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   30.674834]  kthread+0x257/0x310
[   30.675307]  ret_from_fork+0x41/0x80
[   30.675733]  ret_from_fork_asm+0x1a/0x30
[   30.676491] 
[   30.676812] The buggy address belongs to the object at ffff888101aba780
[   30.676812]  which belongs to the cache kmalloc-64 of size 64
[   30.678150] The buggy address is located 0 bytes to the right of
[   30.678150]  allocated 48-byte region [ffff888101aba780, ffff888101aba7b0)
[   30.680006] 
[   30.680630] The buggy address belongs to the physical page:
[   30.681378] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101aba
[   30.682020] flags: 0x200000000000000(node=0|zone=2)
[   30.682603] page_type: f5(slab)
[   30.682898] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   30.683810] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   30.684657] page dumped because: kasan: bad access detected
[   30.685306] 
[   30.685553] Memory state around the buggy address:
[   30.686652]  ffff888101aba680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   30.687339]  ffff888101aba700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   30.688028] >ffff888101aba780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   30.689284]                                      ^
[   30.689864]  ffff888101aba800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.690793]  ffff888101aba880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.691669] ==================================================================
[   30.388178] ==================================================================
[   30.388575] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xac8/0x5450
[   30.390431] Write of size 4 at addr ffff888101aba7b0 by task kunit_try_catch/273
[   30.391250] 
[   30.391362] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241127 #1
[   30.391732] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.391909] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   30.393235] Call Trace:
[   30.393523]  <TASK>
[   30.393809]  dump_stack_lvl+0x73/0xb0
[   30.394358]  print_report+0xd1/0x640
[   30.394647]  ? __virt_addr_valid+0x1db/0x2d0
[   30.395265]  ? kasan_complete_mode_report_info+0x2a/0x200
[   30.395856]  kasan_report+0x102/0x140
[   30.396337]  ? kasan_atomics_helper+0xac8/0x5450
[   30.396877]  ? kasan_atomics_helper+0xac8/0x5450
[   30.397467]  kasan_check_range+0x10c/0x1c0
[   30.397783]  __kasan_check_write+0x18/0x20
[   30.398437]  kasan_atomics_helper+0xac8/0x5450
[   30.398748]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   30.399266]  ? __kmalloc_cache_noprof+0x184/0x410
[   30.399781]  ? kasan_atomics+0x153/0x310
[   30.400255]  kasan_atomics+0x1dd/0x310
[   30.400668]  ? __pfx_kasan_atomics+0x10/0x10
[   30.401151]  ? __pfx_read_tsc+0x10/0x10
[   30.401618]  ? ktime_get_ts64+0x84/0x230
[   30.401952]  kunit_try_run_case+0x1b3/0x490
[   30.402503]  ? __pfx_kunit_try_run_case+0x10/0x10
[   30.402974]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   30.403426]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   30.403950]  ? __kthread_parkme+0x82/0x160
[   30.404486]  ? preempt_count_sub+0x50/0x80
[   30.405071]  ? __pfx_kunit_try_run_case+0x10/0x10
[   30.405556]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   30.406195]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   30.406811]  kthread+0x257/0x310
[   30.407153]  ? __pfx_kthread+0x10/0x10
[   30.407697]  ret_from_fork+0x41/0x80
[   30.408327]  ? __pfx_kthread+0x10/0x10
[   30.408732]  ret_from_fork_asm+0x1a/0x30
[   30.409148]  </TASK>
[   30.409476] 
[   30.409760] Allocated by task 273:
[   30.410253]  kasan_save_stack+0x3d/0x60
[   30.410688]  kasan_save_track+0x18/0x40
[   30.411420]  kasan_save_alloc_info+0x3b/0x50
[   30.412266]  __kasan_kmalloc+0xb7/0xc0
[   30.413050]  __kmalloc_cache_noprof+0x184/0x410
[   30.413493]  kasan_atomics+0x96/0x310
[   30.413921]  kunit_try_run_case+0x1b3/0x490
[   30.414605]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   30.415083]  kthread+0x257/0x310
[   30.415467]  ret_from_fork+0x41/0x80
[   30.415888]  ret_from_fork_asm+0x1a/0x30
[   30.416368] 
[   30.416622] The buggy address belongs to the object at ffff888101aba780
[   30.416622]  which belongs to the cache kmalloc-64 of size 64
[   30.417674] The buggy address is located 0 bytes to the right of
[   30.417674]  allocated 48-byte region [ffff888101aba780, ffff888101aba7b0)
[   30.418957] 
[   30.419299] The buggy address belongs to the physical page:
[   30.419806] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101aba
[   30.420647] flags: 0x200000000000000(node=0|zone=2)
[   30.421209] page_type: f5(slab)
[   30.421662] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   30.422490] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   30.423257] page dumped because: kasan: bad access detected
[   30.423813] 
[   30.424066] Memory state around the buggy address:
[   30.424626]  ffff888101aba680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   30.425458]  ffff888101aba700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   30.426186] >ffff888101aba780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   30.426834]                                      ^
[   30.427436]  ffff888101aba800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.427976]  ffff888101aba880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.428576] ==================================================================
[   31.364354] ==================================================================
[   31.365337] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x151e/0x5450
[   31.366586] Write of size 8 at addr ffff888101aba7b0 by task kunit_try_catch/273
[   31.367407] 
[   31.367645] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241127 #1
[   31.368595] Tainted: [B]=BAD_PAGE, [N]=TEST
[   31.369153] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   31.369835] Call Trace:
[   31.370301]  <TASK>
[   31.370743]  dump_stack_lvl+0x73/0xb0
[   31.371243]  print_report+0xd1/0x640
[   31.371552]  ? __virt_addr_valid+0x1db/0x2d0
[   31.372187]  ? kasan_complete_mode_report_info+0x2a/0x200
[   31.372761]  kasan_report+0x102/0x140
[   31.373266]  ? kasan_atomics_helper+0x151e/0x5450
[   31.373785]  ? kasan_atomics_helper+0x151e/0x5450
[   31.374498]  kasan_check_range+0x10c/0x1c0
[   31.374911]  __kasan_check_write+0x18/0x20
[   31.375595]  kasan_atomics_helper+0x151e/0x5450
[   31.376119]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   31.376622]  ? __kmalloc_cache_noprof+0x184/0x410
[   31.377230]  ? kasan_atomics+0x153/0x310
[   31.377740]  kasan_atomics+0x1dd/0x310
[   31.378294]  ? __pfx_kasan_atomics+0x10/0x10
[   31.378900]  ? __pfx_read_tsc+0x10/0x10
[   31.379445]  ? ktime_get_ts64+0x84/0x230
[   31.379913]  kunit_try_run_case+0x1b3/0x490
[   31.380431]  ? __pfx_kunit_try_run_case+0x10/0x10
[   31.380926]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   31.381376]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   31.381975]  ? __kthread_parkme+0x82/0x160
[   31.382488]  ? preempt_count_sub+0x50/0x80
[   31.383101]  ? __pfx_kunit_try_run_case+0x10/0x10
[   31.383536]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   31.384180]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   31.385101]  kthread+0x257/0x310
[   31.385577]  ? __pfx_kthread+0x10/0x10
[   31.385947]  ret_from_fork+0x41/0x80
[   31.386627]  ? __pfx_kthread+0x10/0x10
[   31.387116]  ret_from_fork_asm+0x1a/0x30
[   31.387537]  </TASK>
[   31.388032] 
[   31.388331] Allocated by task 273:
[   31.388579]  kasan_save_stack+0x3d/0x60
[   31.389108]  kasan_save_track+0x18/0x40
[   31.389574]  kasan_save_alloc_info+0x3b/0x50
[   31.389933]  __kasan_kmalloc+0xb7/0xc0
[   31.390688]  __kmalloc_cache_noprof+0x184/0x410
[   31.391308]  kasan_atomics+0x96/0x310
[   31.391730]  kunit_try_run_case+0x1b3/0x490
[   31.392146]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   31.392621]  kthread+0x257/0x310
[   31.393110]  ret_from_fork+0x41/0x80
[   31.393722]  ret_from_fork_asm+0x1a/0x30
[   31.394303] 
[   31.394545] The buggy address belongs to the object at ffff888101aba780
[   31.394545]  which belongs to the cache kmalloc-64 of size 64
[   31.395471] The buggy address is located 0 bytes to the right of
[   31.395471]  allocated 48-byte region [ffff888101aba780, ffff888101aba7b0)
[   31.396504] 
[   31.396707] The buggy address belongs to the physical page:
[   31.397267] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101aba
[   31.398761] flags: 0x200000000000000(node=0|zone=2)
[   31.399607] page_type: f5(slab)
[   31.400468] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   31.401101] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   31.401794] page dumped because: kasan: bad access detected
[   31.402401] 
[   31.402641] Memory state around the buggy address:
[   31.403225]  ffff888101aba680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   31.403842]  ffff888101aba700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   31.404566] >ffff888101aba780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   31.405310]                                      ^
[   31.405701]  ffff888101aba800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.406482]  ffff888101aba880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.407017] ==================================================================
[   29.601623] ==================================================================
[   29.603205] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4ba4/0x5450
[   29.603923] Write of size 4 at addr ffff888101aba7b0 by task kunit_try_catch/273
[   29.604658] 
[   29.605751] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241127 #1
[   29.607174] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.607740] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   29.608781] Call Trace:
[   29.609002]  <TASK>
[   29.609555]  dump_stack_lvl+0x73/0xb0
[   29.610000]  print_report+0xd1/0x640
[   29.610872]  ? __virt_addr_valid+0x1db/0x2d0
[   29.611859]  ? kasan_complete_mode_report_info+0x2a/0x200
[   29.612500]  kasan_report+0x102/0x140
[   29.613224]  ? kasan_atomics_helper+0x4ba4/0x5450
[   29.613850]  ? kasan_atomics_helper+0x4ba4/0x5450
[   29.614507]  __asan_report_store4_noabort+0x1b/0x30
[   29.615641]  kasan_atomics_helper+0x4ba4/0x5450
[   29.616182]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   29.616866]  ? __kmalloc_cache_noprof+0x184/0x410
[   29.617667]  ? kasan_atomics+0x153/0x310
[   29.618092]  kasan_atomics+0x1dd/0x310
[   29.618870]  ? __pfx_kasan_atomics+0x10/0x10
[   29.619741]  ? __pfx_read_tsc+0x10/0x10
[   29.620403]  ? ktime_get_ts64+0x84/0x230
[   29.620872]  kunit_try_run_case+0x1b3/0x490
[   29.621866]  ? __pfx_kunit_try_run_case+0x10/0x10
[   29.622502]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   29.623156]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   29.624293]  ? __kthread_parkme+0x82/0x160
[   29.625192]  ? preempt_count_sub+0x50/0x80
[   29.625664]  ? __pfx_kunit_try_run_case+0x10/0x10
[   29.626511]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   29.626956]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   29.627692]  kthread+0x257/0x310
[   29.628190]  ? __pfx_kthread+0x10/0x10
[   29.628796]  ret_from_fork+0x41/0x80
[   29.629171]  ? __pfx_kthread+0x10/0x10
[   29.629929]  ret_from_fork_asm+0x1a/0x30
[   29.630667]  </TASK>
[   29.630965] 
[   29.631293] Allocated by task 273:
[   29.631710]  kasan_save_stack+0x3d/0x60
[   29.632267]  kasan_save_track+0x18/0x40
[   29.632716]  kasan_save_alloc_info+0x3b/0x50
[   29.633574]  __kasan_kmalloc+0xb7/0xc0
[   29.633963]  __kmalloc_cache_noprof+0x184/0x410
[   29.634627]  kasan_atomics+0x96/0x310
[   29.635305]  kunit_try_run_case+0x1b3/0x490
[   29.635885]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   29.636475]  kthread+0x257/0x310
[   29.637215]  ret_from_fork+0x41/0x80
[   29.637581]  ret_from_fork_asm+0x1a/0x30
[   29.638130] 
[   29.638330] The buggy address belongs to the object at ffff888101aba780
[   29.638330]  which belongs to the cache kmalloc-64 of size 64
[   29.639352] The buggy address is located 0 bytes to the right of
[   29.639352]  allocated 48-byte region [ffff888101aba780, ffff888101aba7b0)
[   29.640657] 
[   29.640886] The buggy address belongs to the physical page:
[   29.641603] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101aba
[   29.642528] flags: 0x200000000000000(node=0|zone=2)
[   29.643045] page_type: f5(slab)
[   29.643693] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   29.644573] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   29.645506] page dumped because: kasan: bad access detected
[   29.646061] 
[   29.646551] Memory state around the buggy address:
[   29.647057]  ffff888101aba680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.648241]  ffff888101aba700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.648803] >ffff888101aba780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   29.649663]                                      ^
[   29.650302]  ffff888101aba800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.651047]  ffff888101aba880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.651928] ==================================================================
[   32.108340] ==================================================================
[   32.109227] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1eab/0x5450
[   32.109938] Write of size 8 at addr ffff888101aba7b0 by task kunit_try_catch/273
[   32.110626] 
[   32.110906] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241127 #1
[   32.111727] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.112058] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   32.112904] Call Trace:
[   32.113297]  <TASK>
[   32.113637]  dump_stack_lvl+0x73/0xb0
[   32.114115]  print_report+0xd1/0x640
[   32.114537]  ? __virt_addr_valid+0x1db/0x2d0
[   32.115058]  ? kasan_complete_mode_report_info+0x2a/0x200
[   32.115544]  kasan_report+0x102/0x140
[   32.116092]  ? kasan_atomics_helper+0x1eab/0x5450
[   32.116449]  ? kasan_atomics_helper+0x1eab/0x5450
[   32.117113]  kasan_check_range+0x10c/0x1c0
[   32.117497]  __kasan_check_write+0x18/0x20
[   32.117797]  kasan_atomics_helper+0x1eab/0x5450
[   32.118385]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   32.118726]  ? __kmalloc_cache_noprof+0x184/0x410
[   32.119499]  ? kasan_atomics+0x153/0x310
[   32.120240]  kasan_atomics+0x1dd/0x310
[   32.120932]  ? __pfx_kasan_atomics+0x10/0x10
[   32.121768]  ? __pfx_read_tsc+0x10/0x10
[   32.122295]  ? ktime_get_ts64+0x84/0x230
[   32.122776]  kunit_try_run_case+0x1b3/0x490
[   32.123371]  ? __pfx_kunit_try_run_case+0x10/0x10
[   32.123859]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   32.124390]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   32.124919]  ? __kthread_parkme+0x82/0x160
[   32.125437]  ? preempt_count_sub+0x50/0x80
[   32.126003]  ? __pfx_kunit_try_run_case+0x10/0x10
[   32.126630]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   32.127200]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   32.127822]  kthread+0x257/0x310
[   32.128386]  ? __pfx_kthread+0x10/0x10
[   32.128790]  ret_from_fork+0x41/0x80
[   32.129391]  ? __pfx_kthread+0x10/0x10
[   32.129775]  ret_from_fork_asm+0x1a/0x30
[   32.130314]  </TASK>
[   32.130676] 
[   32.130921] Allocated by task 273:
[   32.131418]  kasan_save_stack+0x3d/0x60
[   32.131846]  kasan_save_track+0x18/0x40
[   32.132358]  kasan_save_alloc_info+0x3b/0x50
[   32.132778]  __kasan_kmalloc+0xb7/0xc0
[   32.133309]  __kmalloc_cache_noprof+0x184/0x410
[   32.133901]  kasan_atomics+0x96/0x310
[   32.134455]  kunit_try_run_case+0x1b3/0x490
[   32.134921]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   32.135569]  kthread+0x257/0x310
[   32.135958]  ret_from_fork+0x41/0x80
[   32.136369]  ret_from_fork_asm+0x1a/0x30
[   32.136831] 
[   32.137199] The buggy address belongs to the object at ffff888101aba780
[   32.137199]  which belongs to the cache kmalloc-64 of size 64
[   32.138242] The buggy address is located 0 bytes to the right of
[   32.138242]  allocated 48-byte region [ffff888101aba780, ffff888101aba7b0)
[   32.139418] 
[   32.139671] The buggy address belongs to the physical page:
[   32.140096] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101aba
[   32.140894] flags: 0x200000000000000(node=0|zone=2)
[   32.141443] page_type: f5(slab)
[   32.141697] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   32.142649] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   32.143331] page dumped because: kasan: bad access detected
[   32.143845] 
[   32.144142] Memory state around the buggy address:
[   32.144648]  ffff888101aba680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.145409]  ffff888101aba700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.146134] >ffff888101aba780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   32.146869]                                      ^
[   32.147382]  ffff888101aba800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.148056]  ffff888101aba880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.148707] ==================================================================
[   32.353925] ==================================================================
[   32.354454] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4fb4/0x5450
[   32.355069] Read of size 8 at addr ffff888101aba7b0 by task kunit_try_catch/273
[   32.355853] 
[   32.356198] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241127 #1
[   32.357001] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.357372] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   32.358207] Call Trace:
[   32.358440]  <TASK>
[   32.358636]  dump_stack_lvl+0x73/0xb0
[   32.359159]  print_report+0xd1/0x640
[   32.359565]  ? __virt_addr_valid+0x1db/0x2d0
[   32.359947]  ? kasan_complete_mode_report_info+0x2a/0x200
[   32.360626]  kasan_report+0x102/0x140
[   32.361003]  ? kasan_atomics_helper+0x4fb4/0x5450
[   32.361455]  ? kasan_atomics_helper+0x4fb4/0x5450
[   32.361886]  __asan_report_load8_noabort+0x18/0x20
[   32.362399]  kasan_atomics_helper+0x4fb4/0x5450
[   32.362965]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   32.363608]  ? __kmalloc_cache_noprof+0x184/0x410
[   32.364101]  ? kasan_atomics+0x153/0x310
[   32.364595]  kasan_atomics+0x1dd/0x310
[   32.364927]  ? __pfx_kasan_atomics+0x10/0x10
[   32.365411]  ? __pfx_read_tsc+0x10/0x10
[   32.365805]  ? ktime_get_ts64+0x84/0x230
[   32.366274]  kunit_try_run_case+0x1b3/0x490
[   32.366786]  ? __pfx_kunit_try_run_case+0x10/0x10
[   32.367263]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   32.367747]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   32.368218]  ? __kthread_parkme+0x82/0x160
[   32.368665]  ? preempt_count_sub+0x50/0x80
[   32.368974]  ? __pfx_kunit_try_run_case+0x10/0x10
[   32.369585]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   32.370327]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   32.370762]  kthread+0x257/0x310
[   32.371190]  ? __pfx_kthread+0x10/0x10
[   32.371565]  ret_from_fork+0x41/0x80
[   32.372072]  ? __pfx_kthread+0x10/0x10
[   32.372418]  ret_from_fork_asm+0x1a/0x30
[   32.372874]  </TASK>
[   32.373153] 
[   32.373312] Allocated by task 273:
[   32.373552]  kasan_save_stack+0x3d/0x60
[   32.373836]  kasan_save_track+0x18/0x40
[   32.374311]  kasan_save_alloc_info+0x3b/0x50
[   32.374859]  __kasan_kmalloc+0xb7/0xc0
[   32.375442]  __kmalloc_cache_noprof+0x184/0x410
[   32.375959]  kasan_atomics+0x96/0x310
[   32.376260]  kunit_try_run_case+0x1b3/0x490
[   32.376700]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   32.377404]  kthread+0x257/0x310
[   32.377895]  ret_from_fork+0x41/0x80
[   32.378500]  ret_from_fork_asm+0x1a/0x30
[   32.378970] 
[   32.379251] The buggy address belongs to the object at ffff888101aba780
[   32.379251]  which belongs to the cache kmalloc-64 of size 64
[   32.380308] The buggy address is located 0 bytes to the right of
[   32.380308]  allocated 48-byte region [ffff888101aba780, ffff888101aba7b0)
[   32.381585] 
[   32.382003] The buggy address belongs to the physical page:
[   32.382487] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101aba
[   32.383418] flags: 0x200000000000000(node=0|zone=2)
[   32.383967] page_type: f5(slab)
[   32.384458] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   32.385275] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   32.385908] page dumped because: kasan: bad access detected
[   32.386653] 
[   32.386909] Memory state around the buggy address:
[   32.387516]  ffff888101aba680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.388284]  ffff888101aba700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.389009] >ffff888101aba780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   32.389535]                                      ^
[   32.389965]  ffff888101aba800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.390708]  ffff888101aba880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.391135] ==================================================================
[   32.437516] ==================================================================
[   32.438275] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4fa7/0x5450
[   32.438832] Read of size 8 at addr ffff888101aba7b0 by task kunit_try_catch/273
[   32.439526] 
[   32.439727] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241127 #1
[   32.440479] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.440756] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   32.441802] Call Trace:
[   32.442257]  <TASK>
[   32.442465]  dump_stack_lvl+0x73/0xb0
[   32.442759]  print_report+0xd1/0x640
[   32.443404]  ? __virt_addr_valid+0x1db/0x2d0
[   32.444331]  ? kasan_complete_mode_report_info+0x2a/0x200
[   32.445180]  kasan_report+0x102/0x140
[   32.445578]  ? kasan_atomics_helper+0x4fa7/0x5450
[   32.445914]  ? kasan_atomics_helper+0x4fa7/0x5450
[   32.446587]  __asan_report_load8_noabort+0x18/0x20
[   32.447315]  kasan_atomics_helper+0x4fa7/0x5450
[   32.447900]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   32.448661]  ? __kmalloc_cache_noprof+0x184/0x410
[   32.449336]  ? kasan_atomics+0x153/0x310
[   32.449671]  kasan_atomics+0x1dd/0x310
[   32.450384]  ? __pfx_kasan_atomics+0x10/0x10
[   32.450836]  ? __pfx_read_tsc+0x10/0x10
[   32.451490]  ? ktime_get_ts64+0x84/0x230
[   32.452045]  kunit_try_run_case+0x1b3/0x490
[   32.452519]  ? __pfx_kunit_try_run_case+0x10/0x10
[   32.453344]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   32.453895]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   32.454474]  ? __kthread_parkme+0x82/0x160
[   32.454883]  ? preempt_count_sub+0x50/0x80
[   32.455345]  ? __pfx_kunit_try_run_case+0x10/0x10
[   32.455937]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   32.456579]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   32.457223]  kthread+0x257/0x310
[   32.457717]  ? __pfx_kthread+0x10/0x10
[   32.458208]  ret_from_fork+0x41/0x80
[   32.458628]  ? __pfx_kthread+0x10/0x10
[   32.459156]  ret_from_fork_asm+0x1a/0x30
[   32.459748]  </TASK>
[   32.459954] 
[   32.460268] Allocated by task 273:
[   32.460841]  kasan_save_stack+0x3d/0x60
[   32.461224]  kasan_save_track+0x18/0x40
[   32.461670]  kasan_save_alloc_info+0x3b/0x50
[   32.462166]  __kasan_kmalloc+0xb7/0xc0
[   32.462471]  __kmalloc_cache_noprof+0x184/0x410
[   32.462838]  kasan_atomics+0x96/0x310
[   32.463414]  kunit_try_run_case+0x1b3/0x490
[   32.463886]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   32.464357]  kthread+0x257/0x310
[   32.464745]  ret_from_fork+0x41/0x80
[   32.465319]  ret_from_fork_asm+0x1a/0x30
[   32.465804] 
[   32.466086] The buggy address belongs to the object at ffff888101aba780
[   32.466086]  which belongs to the cache kmalloc-64 of size 64
[   32.467232] The buggy address is located 0 bytes to the right of
[   32.467232]  allocated 48-byte region [ffff888101aba780, ffff888101aba7b0)
[   32.468294] 
[   32.468539] The buggy address belongs to the physical page:
[   32.469197] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101aba
[   32.469793] flags: 0x200000000000000(node=0|zone=2)
[   32.470459] page_type: f5(slab)
[   32.470811] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   32.471904] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   32.473148] page dumped because: kasan: bad access detected
[   32.473739] 
[   32.474023] Memory state around the buggy address:
[   32.474740]  ffff888101aba680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.475845]  ffff888101aba700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.477065] >ffff888101aba780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   32.477680]                                      ^
[   32.478624]  ffff888101aba800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.479582]  ffff888101aba880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.480167] ==================================================================
[   32.533735] ==================================================================
[   32.535016] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x5117/0x5450
[   32.536229] Read of size 8 at addr ffff888101aba7b0 by task kunit_try_catch/273
[   32.537387] 
[   32.537603] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241127 #1
[   32.539036] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.539729] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   32.540698] Call Trace:
[   32.541003]  <TASK>
[   32.541354]  dump_stack_lvl+0x73/0xb0
[   32.542281]  print_report+0xd1/0x640
[   32.542702]  ? __virt_addr_valid+0x1db/0x2d0
[   32.543787]  ? kasan_complete_mode_report_info+0x2a/0x200
[   32.544633]  kasan_report+0x102/0x140
[   32.545024]  ? kasan_atomics_helper+0x5117/0x5450
[   32.545851]  ? kasan_atomics_helper+0x5117/0x5450
[   32.546595]  __asan_report_load8_noabort+0x18/0x20
[   32.547018]  kasan_atomics_helper+0x5117/0x5450
[   32.547825]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   32.548351]  ? __kmalloc_cache_noprof+0x184/0x410
[   32.549143]  ? kasan_atomics+0x153/0x310
[   32.549589]  kasan_atomics+0x1dd/0x310
[   32.549969]  ? __pfx_kasan_atomics+0x10/0x10
[   32.550825]  ? __pfx_read_tsc+0x10/0x10
[   32.551452]  ? ktime_get_ts64+0x84/0x230
[   32.551820]  kunit_try_run_case+0x1b3/0x490
[   32.552682]  ? __pfx_kunit_try_run_case+0x10/0x10
[   32.553382]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   32.553857]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   32.554953]  ? __kthread_parkme+0x82/0x160
[   32.555563]  ? preempt_count_sub+0x50/0x80
[   32.556029]  ? __pfx_kunit_try_run_case+0x10/0x10
[   32.556565]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   32.557736]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   32.558646]  kthread+0x257/0x310
[   32.559319]  ? __pfx_kthread+0x10/0x10
[   32.559769]  ret_from_fork+0x41/0x80
[   32.560332]  ? __pfx_kthread+0x10/0x10
[   32.560769]  ret_from_fork_asm+0x1a/0x30
[   32.561163]  </TASK>
[   32.561384] 
[   32.561769] Allocated by task 273:
[   32.562252]  kasan_save_stack+0x3d/0x60
[   32.562755]  kasan_save_track+0x18/0x40
[   32.563568]  kasan_save_alloc_info+0x3b/0x50
[   32.564527]  __kasan_kmalloc+0xb7/0xc0
[   32.565419]  __kmalloc_cache_noprof+0x184/0x410
[   32.565880]  kasan_atomics+0x96/0x310
[   32.566915]  kunit_try_run_case+0x1b3/0x490
[   32.567714]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   32.568329]  kthread+0x257/0x310
[   32.568827]  ret_from_fork+0x41/0x80
[   32.569146]  ret_from_fork_asm+0x1a/0x30
[   32.569776] 
[   32.570003] The buggy address belongs to the object at ffff888101aba780
[   32.570003]  which belongs to the cache kmalloc-64 of size 64
[   32.570935] The buggy address is located 0 bytes to the right of
[   32.570935]  allocated 48-byte region [ffff888101aba780, ffff888101aba7b0)
[   32.572192] 
[   32.572478] The buggy address belongs to the physical page:
[   32.573049] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101aba
[   32.573568] flags: 0x200000000000000(node=0|zone=2)
[   32.574248] page_type: f5(slab)
[   32.574671] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   32.575453] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   32.576227] page dumped because: kasan: bad access detected
[   32.576700] 
[   32.576858] Memory state around the buggy address:
[   32.577518]  ffff888101aba680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.578194]  ffff888101aba700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.578928] >ffff888101aba780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   32.579658]                                      ^
[   32.580145]  ffff888101aba800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.580692]  ffff888101aba880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.581655] ==================================================================
[   30.595638] ==================================================================
[   30.596648] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xde1/0x5450
[   30.597675] Write of size 4 at addr ffff888101aba7b0 by task kunit_try_catch/273
[   30.598555] 
[   30.598833] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241127 #1
[   30.599688] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.600342] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   30.600974] Call Trace:
[   30.601451]  <TASK>
[   30.601784]  dump_stack_lvl+0x73/0xb0
[   30.602460]  print_report+0xd1/0x640
[   30.602957]  ? __virt_addr_valid+0x1db/0x2d0
[   30.603493]  ? kasan_complete_mode_report_info+0x2a/0x200
[   30.604203]  kasan_report+0x102/0x140
[   30.604684]  ? kasan_atomics_helper+0xde1/0x5450
[   30.605391]  ? kasan_atomics_helper+0xde1/0x5450
[   30.606075]  kasan_check_range+0x10c/0x1c0
[   30.606517]  __kasan_check_write+0x18/0x20
[   30.607145]  kasan_atomics_helper+0xde1/0x5450
[   30.607609]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   30.608095]  ? __kmalloc_cache_noprof+0x184/0x410
[   30.608619]  ? kasan_atomics+0x153/0x310
[   30.609138]  kasan_atomics+0x1dd/0x310
[   30.609458]  ? __pfx_kasan_atomics+0x10/0x10
[   30.609780]  ? __pfx_read_tsc+0x10/0x10
[   30.610405]  ? ktime_get_ts64+0x84/0x230
[   30.611183]  kunit_try_run_case+0x1b3/0x490
[   30.611634]  ? __pfx_kunit_try_run_case+0x10/0x10
[   30.612333]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   30.612778]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   30.613256]  ? __kthread_parkme+0x82/0x160
[   30.613867]  ? preempt_count_sub+0x50/0x80
[   30.614511]  ? __pfx_kunit_try_run_case+0x10/0x10
[   30.614843]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   30.615901]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   30.616410]  kthread+0x257/0x310
[   30.616884]  ? __pfx_kthread+0x10/0x10
[   30.617368]  ret_from_fork+0x41/0x80
[   30.618003]  ? __pfx_kthread+0x10/0x10
[   30.618519]  ret_from_fork_asm+0x1a/0x30
[   30.618891]  </TASK>
[   30.619450] 
[   30.619655] Allocated by task 273:
[   30.620202]  kasan_save_stack+0x3d/0x60
[   30.620517]  kasan_save_track+0x18/0x40
[   30.621022]  kasan_save_alloc_info+0x3b/0x50
[   30.621376]  __kasan_kmalloc+0xb7/0xc0
[   30.621867]  __kmalloc_cache_noprof+0x184/0x410
[   30.622682]  kasan_atomics+0x96/0x310
[   30.622962]  kunit_try_run_case+0x1b3/0x490
[   30.623284]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   30.623669]  kthread+0x257/0x310
[   30.624138]  ret_from_fork+0x41/0x80
[   30.624739]  ret_from_fork_asm+0x1a/0x30
[   30.625503] 
[   30.625883] The buggy address belongs to the object at ffff888101aba780
[   30.625883]  which belongs to the cache kmalloc-64 of size 64
[   30.626819] The buggy address is located 0 bytes to the right of
[   30.626819]  allocated 48-byte region [ffff888101aba780, ffff888101aba7b0)
[   30.628519] 
[   30.629369] The buggy address belongs to the physical page:
[   30.630675] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101aba
[   30.631593] flags: 0x200000000000000(node=0|zone=2)
[   30.632237] page_type: f5(slab)
[   30.632767] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   30.633556] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   30.634693] page dumped because: kasan: bad access detected
[   30.635416] 
[   30.635866] Memory state around the buggy address:
[   30.636495]  ffff888101aba680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   30.637582]  ffff888101aba700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   30.638226] >ffff888101aba780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   30.639500]                                      ^
[   30.640005]  ffff888101aba800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.640882]  ffff888101aba880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.641796] ==================================================================
[   29.549392] ==================================================================
[   29.550762] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4bbe/0x5450
[   29.551739] Read of size 4 at addr ffff888101aba7b0 by task kunit_try_catch/273
[   29.552532] 
[   29.553321] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241127 #1
[   29.554531] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.555164] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   29.556170] Call Trace:
[   29.556809]  <TASK>
[   29.557181]  dump_stack_lvl+0x73/0xb0
[   29.557518]  print_report+0xd1/0x640
[   29.558016]  ? __virt_addr_valid+0x1db/0x2d0
[   29.558810]  ? kasan_complete_mode_report_info+0x2a/0x200
[   29.559707]  kasan_report+0x102/0x140
[   29.560408]  ? kasan_atomics_helper+0x4bbe/0x5450
[   29.560863]  ? kasan_atomics_helper+0x4bbe/0x5450
[   29.561576]  __asan_report_load4_noabort+0x18/0x20
[   29.562299]  kasan_atomics_helper+0x4bbe/0x5450
[   29.562880]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   29.563805]  ? __kmalloc_cache_noprof+0x184/0x410
[   29.564478]  ? kasan_atomics+0x153/0x310
[   29.564952]  kasan_atomics+0x1dd/0x310
[   29.565617]  ? __pfx_kasan_atomics+0x10/0x10
[   29.566266]  ? __pfx_read_tsc+0x10/0x10
[   29.566822]  ? ktime_get_ts64+0x84/0x230
[   29.567632]  kunit_try_run_case+0x1b3/0x490
[   29.568236]  ? __pfx_kunit_try_run_case+0x10/0x10
[   29.568774]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   29.569540]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   29.570132]  ? __kthread_parkme+0x82/0x160
[   29.570674]  ? preempt_count_sub+0x50/0x80
[   29.571468]  ? __pfx_kunit_try_run_case+0x10/0x10
[   29.571848]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   29.572607]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   29.573251]  kthread+0x257/0x310
[   29.573776]  ? __pfx_kthread+0x10/0x10
[   29.574455]  ret_from_fork+0x41/0x80
[   29.574948]  ? __pfx_kthread+0x10/0x10
[   29.575832]  ret_from_fork_asm+0x1a/0x30
[   29.576483]  </TASK>
[   29.576747] 
[   29.577159] Allocated by task 273:
[   29.577466]  kasan_save_stack+0x3d/0x60
[   29.577900]  kasan_save_track+0x18/0x40
[   29.578434]  kasan_save_alloc_info+0x3b/0x50
[   29.578957]  __kasan_kmalloc+0xb7/0xc0
[   29.579251]  __kmalloc_cache_noprof+0x184/0x410
[   29.580183]  kasan_atomics+0x96/0x310
[   29.580756]  kunit_try_run_case+0x1b3/0x490
[   29.581266]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   29.581957]  kthread+0x257/0x310
[   29.582395]  ret_from_fork+0x41/0x80
[   29.583575]  ret_from_fork_asm+0x1a/0x30
[   29.584072] 
[   29.584302] The buggy address belongs to the object at ffff888101aba780
[   29.584302]  which belongs to the cache kmalloc-64 of size 64
[   29.585657] The buggy address is located 0 bytes to the right of
[   29.585657]  allocated 48-byte region [ffff888101aba780, ffff888101aba7b0)
[   29.587427] 
[   29.587702] The buggy address belongs to the physical page:
[   29.588402] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101aba
[   29.589329] flags: 0x200000000000000(node=0|zone=2)
[   29.589948] page_type: f5(slab)
[   29.590583] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   29.591326] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   29.592232] page dumped because: kasan: bad access detected
[   29.592964] 
[   29.593559] Memory state around the buggy address:
[   29.594090]  ffff888101aba680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.594901]  ffff888101aba700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.596055] >ffff888101aba780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   29.597352]                                      ^
[   29.597854]  ffff888101aba800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.598895]  ffff888101aba880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.599712] ==================================================================
[   29.802635] ==================================================================
[   29.803171] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b56/0x5450
[   29.804087] Read of size 4 at addr ffff888101aba7b0 by task kunit_try_catch/273
[   29.804517] 
[   29.804682] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241127 #1
[   29.806745] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.807168] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   29.808060] Call Trace:
[   29.808259]  <TASK>
[   29.808771]  dump_stack_lvl+0x73/0xb0
[   29.809294]  print_report+0xd1/0x640
[   29.809648]  ? __virt_addr_valid+0x1db/0x2d0
[   29.810874]  ? kasan_complete_mode_report_info+0x2a/0x200
[   29.811258]  kasan_report+0x102/0x140
[   29.811906]  ? kasan_atomics_helper+0x4b56/0x5450
[   29.812751]  ? kasan_atomics_helper+0x4b56/0x5450
[   29.813391]  __asan_report_load4_noabort+0x18/0x20
[   29.814078]  kasan_atomics_helper+0x4b56/0x5450
[   29.814610]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   29.814941]  ? __kmalloc_cache_noprof+0x184/0x410
[   29.815678]  ? kasan_atomics+0x153/0x310
[   29.816245]  kasan_atomics+0x1dd/0x310
[   29.816782]  ? __pfx_kasan_atomics+0x10/0x10
[   29.817570]  ? __pfx_read_tsc+0x10/0x10
[   29.818255]  ? ktime_get_ts64+0x84/0x230
[   29.818703]  kunit_try_run_case+0x1b3/0x490
[   29.819310]  ? __pfx_kunit_try_run_case+0x10/0x10
[   29.819757]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   29.820416]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   29.820874]  ? __kthread_parkme+0x82/0x160
[   29.821639]  ? preempt_count_sub+0x50/0x80
[   29.822210]  ? __pfx_kunit_try_run_case+0x10/0x10
[   29.822664]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   29.823529]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   29.823955]  kthread+0x257/0x310
[   29.824777]  ? __pfx_kthread+0x10/0x10
[   29.825541]  ret_from_fork+0x41/0x80
[   29.825881]  ? __pfx_kthread+0x10/0x10
[   29.826446]  ret_from_fork_asm+0x1a/0x30
[   29.826891]  </TASK>
[   29.827408] 
[   29.827577] Allocated by task 273:
[   29.827917]  kasan_save_stack+0x3d/0x60
[   29.828433]  kasan_save_track+0x18/0x40
[   29.828795]  kasan_save_alloc_info+0x3b/0x50
[   29.829232]  __kasan_kmalloc+0xb7/0xc0
[   29.829840]  __kmalloc_cache_noprof+0x184/0x410
[   29.830802]  kasan_atomics+0x96/0x310
[   29.831284]  kunit_try_run_case+0x1b3/0x490
[   29.832026]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   29.832905]  kthread+0x257/0x310
[   29.833340]  ret_from_fork+0x41/0x80
[   29.834151]  ret_from_fork_asm+0x1a/0x30
[   29.834558] 
[   29.835046] The buggy address belongs to the object at ffff888101aba780
[   29.835046]  which belongs to the cache kmalloc-64 of size 64
[   29.836441] The buggy address is located 0 bytes to the right of
[   29.836441]  allocated 48-byte region [ffff888101aba780, ffff888101aba7b0)
[   29.837872] 
[   29.838094] The buggy address belongs to the physical page:
[   29.839101] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101aba
[   29.839762] flags: 0x200000000000000(node=0|zone=2)
[   29.840405] page_type: f5(slab)
[   29.840944] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   29.842165] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   29.842788] page dumped because: kasan: bad access detected
[   29.843454] 
[   29.843790] Memory state around the buggy address:
[   29.844531]  ffff888101aba680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.845687]  ffff888101aba700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.846649] >ffff888101aba780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   29.847140]                                      ^
[   29.847730]  ffff888101aba800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.848458]  ffff888101aba880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.849578] ==================================================================
[   31.322225] ==================================================================
[   31.323303] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x50d6/0x5450
[   31.323855] Write of size 8 at addr ffff888101aba7b0 by task kunit_try_catch/273
[   31.324297] 
[   31.324555] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241127 #1
[   31.325761] Tainted: [B]=BAD_PAGE, [N]=TEST
[   31.326086] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   31.327122] Call Trace:
[   31.327469]  <TASK>
[   31.327685]  dump_stack_lvl+0x73/0xb0
[   31.327975]  print_report+0xd1/0x640
[   31.328540]  ? __virt_addr_valid+0x1db/0x2d0
[   31.329113]  ? kasan_complete_mode_report_info+0x2a/0x200
[   31.329580]  kasan_report+0x102/0x140
[   31.330120]  ? kasan_atomics_helper+0x50d6/0x5450
[   31.330654]  ? kasan_atomics_helper+0x50d6/0x5450
[   31.331254]  __asan_report_store8_noabort+0x1b/0x30
[   31.331781]  kasan_atomics_helper+0x50d6/0x5450
[   31.332344]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   31.332893]  ? __kmalloc_cache_noprof+0x184/0x410
[   31.333469]  ? kasan_atomics+0x153/0x310
[   31.333947]  kasan_atomics+0x1dd/0x310
[   31.334515]  ? __pfx_kasan_atomics+0x10/0x10
[   31.334946]  ? __pfx_read_tsc+0x10/0x10
[   31.336178]  ? ktime_get_ts64+0x84/0x230
[   31.336650]  kunit_try_run_case+0x1b3/0x490
[   31.337084]  ? __pfx_kunit_try_run_case+0x10/0x10
[   31.338539]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   31.338977]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   31.339501]  ? __kthread_parkme+0x82/0x160
[   31.339898]  ? preempt_count_sub+0x50/0x80
[   31.340314]  ? __pfx_kunit_try_run_case+0x10/0x10
[   31.340768]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   31.341374]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   31.341773]  kthread+0x257/0x310
[   31.342433]  ? __pfx_kthread+0x10/0x10
[   31.343052]  ret_from_fork+0x41/0x80
[   31.343663]  ? __pfx_kthread+0x10/0x10
[   31.344194]  ret_from_fork_asm+0x1a/0x30
[   31.344693]  </TASK>
[   31.345155] 
[   31.345328] Allocated by task 273:
[   31.345570]  kasan_save_stack+0x3d/0x60
[   31.346286]  kasan_save_track+0x18/0x40
[   31.346790]  kasan_save_alloc_info+0x3b/0x50
[   31.347380]  __kasan_kmalloc+0xb7/0xc0
[   31.347777]  __kmalloc_cache_noprof+0x184/0x410
[   31.348255]  kasan_atomics+0x96/0x310
[   31.348641]  kunit_try_run_case+0x1b3/0x490
[   31.349234]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   31.349781]  kthread+0x257/0x310
[   31.350272]  ret_from_fork+0x41/0x80
[   31.350633]  ret_from_fork_asm+0x1a/0x30
[   31.350964] 
[   31.351304] The buggy address belongs to the object at ffff888101aba780
[   31.351304]  which belongs to the cache kmalloc-64 of size 64
[   31.352502] The buggy address is located 0 bytes to the right of
[   31.352502]  allocated 48-byte region [ffff888101aba780, ffff888101aba7b0)
[   31.353743] 
[   31.354064] The buggy address belongs to the physical page:
[   31.354650] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101aba
[   31.355325] flags: 0x200000000000000(node=0|zone=2)
[   31.355915] page_type: f5(slab)
[   31.356395] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   31.357191] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   31.357913] page dumped because: kasan: bad access detected
[   31.358413] 
[   31.358571] Memory state around the buggy address:
[   31.359231]  ffff888101aba680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   31.359901]  ffff888101aba700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   31.360741] >ffff888101aba780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   31.361365]                                      ^
[   31.361844]  ffff888101aba800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.362586]  ffff888101aba880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.363312] ==================================================================
[   29.956578] ==================================================================
[   29.957307] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x566/0x5450
[   29.958237] Write of size 4 at addr ffff888101aba7b0 by task kunit_try_catch/273
[   29.959020] 
[   29.959191] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241127 #1
[   29.960883] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.961197] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   29.962251] Call Trace:
[   29.962792]  <TASK>
[   29.963437]  dump_stack_lvl+0x73/0xb0
[   29.963798]  print_report+0xd1/0x640
[   29.964458]  ? __virt_addr_valid+0x1db/0x2d0
[   29.965051]  ? kasan_complete_mode_report_info+0x2a/0x200
[   29.965659]  kasan_report+0x102/0x140
[   29.966236]  ? kasan_atomics_helper+0x566/0x5450
[   29.967337]  ? kasan_atomics_helper+0x566/0x5450
[   29.967952]  kasan_check_range+0x10c/0x1c0
[   29.968565]  __kasan_check_write+0x18/0x20
[   29.969065]  kasan_atomics_helper+0x566/0x5450
[   29.969834]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   29.970527]  ? __kmalloc_cache_noprof+0x184/0x410
[   29.971189]  ? kasan_atomics+0x153/0x310
[   29.971705]  kasan_atomics+0x1dd/0x310
[   29.972473]  ? __pfx_kasan_atomics+0x10/0x10
[   29.973372]  ? __pfx_read_tsc+0x10/0x10
[   29.973935]  ? ktime_get_ts64+0x84/0x230
[   29.974609]  kunit_try_run_case+0x1b3/0x490
[   29.975293]  ? __pfx_kunit_try_run_case+0x10/0x10
[   29.976006]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   29.976682]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   29.977579]  ? __kthread_parkme+0x82/0x160
[   29.978068]  ? preempt_count_sub+0x50/0x80
[   29.978527]  ? __pfx_kunit_try_run_case+0x10/0x10
[   29.979248]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   29.979853]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   29.981079]  kthread+0x257/0x310
[   29.981395]  ? __pfx_kthread+0x10/0x10
[   29.981605]  ret_from_fork+0x41/0x80
[   29.981785]  ? __pfx_kthread+0x10/0x10
[   29.983099]  ret_from_fork_asm+0x1a/0x30
[   29.983804]  </TASK>
[   29.984083] 
[   29.984423] Allocated by task 273:
[   29.985147]  kasan_save_stack+0x3d/0x60
[   29.986292]  kasan_save_track+0x18/0x40
[   29.987302]  kasan_save_alloc_info+0x3b/0x50
[   29.987740]  __kasan_kmalloc+0xb7/0xc0
[   29.988774]  __kmalloc_cache_noprof+0x184/0x410
[   29.989531]  kasan_atomics+0x96/0x310
[   29.989932]  kunit_try_run_case+0x1b3/0x490
[   29.991268]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   29.991899]  kthread+0x257/0x310
[   29.992646]  ret_from_fork+0x41/0x80
[   29.993483]  ret_from_fork_asm+0x1a/0x30
[   29.993869] 
[   29.994590] The buggy address belongs to the object at ffff888101aba780
[   29.994590]  which belongs to the cache kmalloc-64 of size 64
[   29.996036] The buggy address is located 0 bytes to the right of
[   29.996036]  allocated 48-byte region [ffff888101aba780, ffff888101aba7b0)
[   29.997259] 
[   29.997789] The buggy address belongs to the physical page:
[   29.998463] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101aba
[   29.999465] flags: 0x200000000000000(node=0|zone=2)
[   29.999965] page_type: f5(slab)
[   30.000259] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   30.001189] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   30.002649] page dumped because: kasan: bad access detected
[   30.003219] 
[   30.003589] Memory state around the buggy address:
[   30.004104]  ffff888101aba680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   30.005301]  ffff888101aba700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   30.005908] >ffff888101aba780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   30.006598]                                      ^
[   30.007443]  ffff888101aba800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.008283]  ffff888101aba880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.008853] ==================================================================
[   30.469849] ==================================================================
[   30.470605] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xc71/0x5450
[   30.471345] Write of size 4 at addr ffff888101aba7b0 by task kunit_try_catch/273
[   30.471943] 
[   30.472251] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241127 #1
[   30.472864] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.473352] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   30.473959] Call Trace:
[   30.474223]  <TASK>
[   30.474540]  dump_stack_lvl+0x73/0xb0
[   30.475052]  print_report+0xd1/0x640
[   30.475516]  ? __virt_addr_valid+0x1db/0x2d0
[   30.476084]  ? kasan_complete_mode_report_info+0x2a/0x200
[   30.476463]  kasan_report+0x102/0x140
[   30.476936]  ? kasan_atomics_helper+0xc71/0x5450
[   30.477526]  ? kasan_atomics_helper+0xc71/0x5450
[   30.477979]  kasan_check_range+0x10c/0x1c0
[   30.478481]  __kasan_check_write+0x18/0x20
[   30.478911]  kasan_atomics_helper+0xc71/0x5450
[   30.479297]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   30.479897]  ? __kmalloc_cache_noprof+0x184/0x410
[   30.480407]  ? kasan_atomics+0x153/0x310
[   30.480742]  kasan_atomics+0x1dd/0x310
[   30.481290]  ? __pfx_kasan_atomics+0x10/0x10
[   30.481752]  ? __pfx_read_tsc+0x10/0x10
[   30.482161]  ? ktime_get_ts64+0x84/0x230
[   30.482480]  kunit_try_run_case+0x1b3/0x490
[   30.483067]  ? __pfx_kunit_try_run_case+0x10/0x10
[   30.483613]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   30.484195]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   30.484555]  ? __kthread_parkme+0x82/0x160
[   30.484852]  ? preempt_count_sub+0x50/0x80
[   30.485395]  ? __pfx_kunit_try_run_case+0x10/0x10
[   30.485953]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   30.486685]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   30.487329]  kthread+0x257/0x310
[   30.487623]  ? __pfx_kthread+0x10/0x10
[   30.488122]  ret_from_fork+0x41/0x80
[   30.488405]  ? __pfx_kthread+0x10/0x10
[   30.488687]  ret_from_fork_asm+0x1a/0x30
[   30.489265]  </TASK>
[   30.489559] 
[   30.489804] Allocated by task 273:
[   30.490117]  kasan_save_stack+0x3d/0x60
[   30.490409]  kasan_save_track+0x18/0x40
[   30.490883]  kasan_save_alloc_info+0x3b/0x50
[   30.491506]  __kasan_kmalloc+0xb7/0xc0
[   30.491934]  __kmalloc_cache_noprof+0x184/0x410
[   30.492331]  kasan_atomics+0x96/0x310
[   30.492613]  kunit_try_run_case+0x1b3/0x490
[   30.493180]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   30.493780]  kthread+0x257/0x310
[   30.494273]  ret_from_fork+0x41/0x80
[   30.494582]  ret_from_fork_asm+0x1a/0x30
[   30.494873] 
[   30.495099] The buggy address belongs to the object at ffff888101aba780
[   30.495099]  which belongs to the cache kmalloc-64 of size 64
[   30.496470] The buggy address is located 0 bytes to the right of
[   30.496470]  allocated 48-byte region [ffff888101aba780, ffff888101aba7b0)
[   30.497520] 
[   30.497693] The buggy address belongs to the physical page:
[   30.498228] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101aba
[   30.498901] flags: 0x200000000000000(node=0|zone=2)
[   30.499415] page_type: f5(slab)
[   30.499747] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   30.500449] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   30.500978] page dumped because: kasan: bad access detected
[   30.501376] 
[   30.501641] Memory state around the buggy address:
[   30.502261]  ffff888101aba680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   30.502793]  ffff888101aba700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   30.503584] >ffff888101aba780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   30.504337]                                      ^
[   30.504801]  ffff888101aba800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.505442]  ffff888101aba880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.506259] ==================================================================
[   30.507044] ==================================================================
[   30.507784] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a86/0x5450
[   30.509705] Read of size 4 at addr ffff888101aba7b0 by task kunit_try_catch/273
[   30.511088] 
[   30.511344] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241127 #1
[   30.512136] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.512512] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   30.513299] Call Trace:
[   30.513548]  <TASK>
[   30.513880]  dump_stack_lvl+0x73/0xb0
[   30.514409]  print_report+0xd1/0x640
[   30.514771]  ? __virt_addr_valid+0x1db/0x2d0
[   30.515251]  ? kasan_complete_mode_report_info+0x2a/0x200
[   30.515759]  kasan_report+0x102/0x140
[   30.516410]  ? kasan_atomics_helper+0x4a86/0x5450
[   30.516767]  ? kasan_atomics_helper+0x4a86/0x5450
[   30.517313]  __asan_report_load4_noabort+0x18/0x20
[   30.518127]  kasan_atomics_helper+0x4a86/0x5450
[   30.518610]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   30.519081]  ? __kmalloc_cache_noprof+0x184/0x410
[   30.519479]  ? kasan_atomics+0x153/0x310
[   30.520085]  kasan_atomics+0x1dd/0x310
[   30.520630]  ? __pfx_kasan_atomics+0x10/0x10
[   30.521303]  ? __pfx_read_tsc+0x10/0x10
[   30.521672]  ? ktime_get_ts64+0x84/0x230
[   30.522350]  kunit_try_run_case+0x1b3/0x490
[   30.522937]  ? __pfx_kunit_try_run_case+0x10/0x10
[   30.523517]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   30.524061]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   30.524742]  ? __kthread_parkme+0x82/0x160
[   30.525482]  ? preempt_count_sub+0x50/0x80
[   30.525946]  ? __pfx_kunit_try_run_case+0x10/0x10
[   30.526659]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   30.527573]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   30.528140]  kthread+0x257/0x310
[   30.528585]  ? __pfx_kthread+0x10/0x10
[   30.529014]  ret_from_fork+0x41/0x80
[   30.529528]  ? __pfx_kthread+0x10/0x10
[   30.529924]  ret_from_fork_asm+0x1a/0x30
[   30.530615]  </TASK>
[   30.530912] 
[   30.531321] Allocated by task 273:
[   30.531636]  kasan_save_stack+0x3d/0x60
[   30.532403]  kasan_save_track+0x18/0x40
[   30.532799]  kasan_save_alloc_info+0x3b/0x50
[   30.533655]  __kasan_kmalloc+0xb7/0xc0
[   30.534263]  __kmalloc_cache_noprof+0x184/0x410
[   30.534796]  kasan_atomics+0x96/0x310
[   30.535177]  kunit_try_run_case+0x1b3/0x490
[   30.535625]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   30.536295]  kthread+0x257/0x310
[   30.536813]  ret_from_fork+0x41/0x80
[   30.537471]  ret_from_fork_asm+0x1a/0x30
[   30.537960] 
[   30.538327] The buggy address belongs to the object at ffff888101aba780
[   30.538327]  which belongs to the cache kmalloc-64 of size 64
[   30.539589] The buggy address is located 0 bytes to the right of
[   30.539589]  allocated 48-byte region [ffff888101aba780, ffff888101aba7b0)
[   30.540854] 
[   30.541227] The buggy address belongs to the physical page:
[   30.541855] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101aba
[   30.542839] flags: 0x200000000000000(node=0|zone=2)
[   30.543488] page_type: f5(slab)
[   30.543911] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   30.544842] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   30.545706] page dumped because: kasan: bad access detected
[   30.546364] 
[   30.546686] Memory state around the buggy address:
[   30.547289]  ffff888101aba680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   30.548016]  ffff888101aba700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   30.548845] >ffff888101aba780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   30.549639]                                      ^
[   30.550268]  ffff888101aba800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.550924]  ffff888101aba880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.551771] ==================================================================
[   31.696467] ==================================================================
[   31.697508] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x194b/0x5450
[   31.698118] Write of size 8 at addr ffff888101aba7b0 by task kunit_try_catch/273
[   31.698936] 
[   31.699216] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241127 #1
[   31.700202] Tainted: [B]=BAD_PAGE, [N]=TEST
[   31.700618] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   31.701670] Call Trace:
[   31.701967]  <TASK>
[   31.702365]  dump_stack_lvl+0x73/0xb0
[   31.702814]  print_report+0xd1/0x640
[   31.703370]  ? __virt_addr_valid+0x1db/0x2d0
[   31.703825]  ? kasan_complete_mode_report_info+0x2a/0x200
[   31.704464]  kasan_report+0x102/0x140
[   31.704902]  ? kasan_atomics_helper+0x194b/0x5450
[   31.705785]  ? kasan_atomics_helper+0x194b/0x5450
[   31.706571]  kasan_check_range+0x10c/0x1c0
[   31.707097]  __kasan_check_write+0x18/0x20
[   31.707643]  kasan_atomics_helper+0x194b/0x5450
[   31.708320]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   31.708691]  ? __kmalloc_cache_noprof+0x184/0x410
[   31.709392]  ? kasan_atomics+0x153/0x310
[   31.709884]  kasan_atomics+0x1dd/0x310
[   31.710402]  ? __pfx_kasan_atomics+0x10/0x10
[   31.711208]  ? __pfx_read_tsc+0x10/0x10
[   31.711763]  ? ktime_get_ts64+0x84/0x230
[   31.712236]  kunit_try_run_case+0x1b3/0x490
[   31.712838]  ? __pfx_kunit_try_run_case+0x10/0x10
[   31.713630]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   31.714106]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   31.714655]  ? __kthread_parkme+0x82/0x160
[   31.715236]  ? preempt_count_sub+0x50/0x80
[   31.715558]  ? __pfx_kunit_try_run_case+0x10/0x10
[   31.715889]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   31.716677]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   31.717296]  kthread+0x257/0x310
[   31.717563]  ? __pfx_kthread+0x10/0x10
[   31.718190]  ret_from_fork+0x41/0x80
[   31.718779]  ? __pfx_kthread+0x10/0x10
[   31.719335]  ret_from_fork_asm+0x1a/0x30
[   31.719797]  </TASK>
[   31.720122] 
[   31.720367] Allocated by task 273:
[   31.720660]  kasan_save_stack+0x3d/0x60
[   31.720945]  kasan_save_track+0x18/0x40
[   31.721252]  kasan_save_alloc_info+0x3b/0x50
[   31.722080]  __kasan_kmalloc+0xb7/0xc0
[   31.722593]  __kmalloc_cache_noprof+0x184/0x410
[   31.723144]  kasan_atomics+0x96/0x310
[   31.723426]  kunit_try_run_case+0x1b3/0x490
[   31.724031]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   31.724624]  kthread+0x257/0x310
[   31.725092]  ret_from_fork+0x41/0x80
[   31.725482]  ret_from_fork_asm+0x1a/0x30
[   31.725921] 
[   31.726359] The buggy address belongs to the object at ffff888101aba780
[   31.726359]  which belongs to the cache kmalloc-64 of size 64
[   31.727538] The buggy address is located 0 bytes to the right of
[   31.727538]  allocated 48-byte region [ffff888101aba780, ffff888101aba7b0)
[   31.728808] 
[   31.729077] The buggy address belongs to the physical page:
[   31.729571] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101aba
[   31.730058] flags: 0x200000000000000(node=0|zone=2)
[   31.730717] page_type: f5(slab)
[   31.731286] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   31.731791] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   31.732851] page dumped because: kasan: bad access detected
[   31.733464] 
[   31.733740] Memory state around the buggy address:
[   31.734382]  ffff888101aba680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   31.735070]  ffff888101aba700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   31.735784] >ffff888101aba780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   31.736716]                                      ^
[   31.737124]  ffff888101aba800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.738404]  ffff888101aba880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.739121] ==================================================================
[   31.273294] ==================================================================
[   31.274577] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1468/0x5450
[   31.275695] Write of size 8 at addr ffff888101aba7b0 by task kunit_try_catch/273
[   31.276939] 
[   31.277596] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241127 #1
[   31.278739] Tainted: [B]=BAD_PAGE, [N]=TEST
[   31.279863] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   31.281085] Call Trace:
[   31.281368]  <TASK>
[   31.281626]  dump_stack_lvl+0x73/0xb0
[   31.282730]  print_report+0xd1/0x640
[   31.283477]  ? __virt_addr_valid+0x1db/0x2d0
[   31.283899]  ? kasan_complete_mode_report_info+0x2a/0x200
[   31.284704]  kasan_report+0x102/0x140
[   31.285557]  ? kasan_atomics_helper+0x1468/0x5450
[   31.286296]  ? kasan_atomics_helper+0x1468/0x5450
[   31.286814]  kasan_check_range+0x10c/0x1c0
[   31.287718]  __kasan_check_write+0x18/0x20
[   31.288127]  kasan_atomics_helper+0x1468/0x5450
[   31.288841]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   31.289528]  ? __kmalloc_cache_noprof+0x184/0x410
[   31.290263]  ? kasan_atomics+0x153/0x310
[   31.290701]  kasan_atomics+0x1dd/0x310
[   31.291102]  ? __pfx_kasan_atomics+0x10/0x10
[   31.292324]  ? __pfx_read_tsc+0x10/0x10
[   31.292934]  ? ktime_get_ts64+0x84/0x230
[   31.293599]  kunit_try_run_case+0x1b3/0x490
[   31.294393]  ? __pfx_kunit_try_run_case+0x10/0x10
[   31.294889]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   31.295744]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   31.296561]  ? __kthread_parkme+0x82/0x160
[   31.296976]  ? preempt_count_sub+0x50/0x80
[   31.297729]  ? __pfx_kunit_try_run_case+0x10/0x10
[   31.298621]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   31.299535]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   31.300041]  kthread+0x257/0x310
[   31.300555]  ? __pfx_kthread+0x10/0x10
[   31.301310]  ret_from_fork+0x41/0x80
[   31.301781]  ? __pfx_kthread+0x10/0x10
[   31.302442]  ret_from_fork_asm+0x1a/0x30
[   31.303171]  </TASK>
[   31.303370] 
[   31.303598] Allocated by task 273:
[   31.304378]  kasan_save_stack+0x3d/0x60
[   31.304788]  kasan_save_track+0x18/0x40
[   31.305754]  kasan_save_alloc_info+0x3b/0x50
[   31.306250]  __kasan_kmalloc+0xb7/0xc0
[   31.306551]  __kmalloc_cache_noprof+0x184/0x410
[   31.307133]  kasan_atomics+0x96/0x310
[   31.307447]  kunit_try_run_case+0x1b3/0x490
[   31.307921]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   31.308596]  kthread+0x257/0x310
[   31.308961]  ret_from_fork+0x41/0x80
[   31.309320]  ret_from_fork_asm+0x1a/0x30
[   31.309750] 
[   31.310092] The buggy address belongs to the object at ffff888101aba780
[   31.310092]  which belongs to the cache kmalloc-64 of size 64
[   31.311282] The buggy address is located 0 bytes to the right of
[   31.311282]  allocated 48-byte region [ffff888101aba780, ffff888101aba7b0)
[   31.312246] 
[   31.312407] The buggy address belongs to the physical page:
[   31.313077] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101aba
[   31.313960] flags: 0x200000000000000(node=0|zone=2)
[   31.314453] page_type: f5(slab)
[   31.314804] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   31.315566] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   31.316230] page dumped because: kasan: bad access detected
[   31.316776] 
[   31.317105] Memory state around the buggy address:
[   31.317497]  ffff888101aba680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   31.318131]  ffff888101aba700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   31.319076] >ffff888101aba780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   31.319608]                                      ^
[   31.320057]  ffff888101aba800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.320716]  ffff888101aba880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.321446] ==================================================================
[   31.228876] ==================================================================
[   31.229760] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4eb0/0x5450
[   31.230637] Read of size 8 at addr ffff888101aba7b0 by task kunit_try_catch/273
[   31.231135] 
[   31.231308] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241127 #1
[   31.232727] Tainted: [B]=BAD_PAGE, [N]=TEST
[   31.233019] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   31.234397] Call Trace:
[   31.234697]  <TASK>
[   31.235140]  dump_stack_lvl+0x73/0xb0
[   31.235483]  print_report+0xd1/0x640
[   31.236094]  ? __virt_addr_valid+0x1db/0x2d0
[   31.236488]  ? kasan_complete_mode_report_info+0x2a/0x200
[   31.237156]  kasan_report+0x102/0x140
[   31.237560]  ? kasan_atomics_helper+0x4eb0/0x5450
[   31.237897]  ? kasan_atomics_helper+0x4eb0/0x5450
[   31.238791]  __asan_report_load8_noabort+0x18/0x20
[   31.239304]  kasan_atomics_helper+0x4eb0/0x5450
[   31.239858]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   31.240606]  ? __kmalloc_cache_noprof+0x184/0x410
[   31.241139]  ? kasan_atomics+0x153/0x310
[   31.241629]  kasan_atomics+0x1dd/0x310
[   31.242196]  ? __pfx_kasan_atomics+0x10/0x10
[   31.242529]  ? __pfx_read_tsc+0x10/0x10
[   31.243284]  ? ktime_get_ts64+0x84/0x230
[   31.243902]  kunit_try_run_case+0x1b3/0x490
[   31.244440]  ? __pfx_kunit_try_run_case+0x10/0x10
[   31.244970]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   31.245613]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   31.246138]  ? __kthread_parkme+0x82/0x160
[   31.246756]  ? preempt_count_sub+0x50/0x80
[   31.247207]  ? __pfx_kunit_try_run_case+0x10/0x10
[   31.247794]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   31.248562]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   31.249430]  kthread+0x257/0x310
[   31.249855]  ? __pfx_kthread+0x10/0x10
[   31.250319]  ret_from_fork+0x41/0x80
[   31.250658]  ? __pfx_kthread+0x10/0x10
[   31.251430]  ret_from_fork_asm+0x1a/0x30
[   31.251776]  </TASK>
[   31.252103] 
[   31.252455] Allocated by task 273:
[   31.252868]  kasan_save_stack+0x3d/0x60
[   31.253381]  kasan_save_track+0x18/0x40
[   31.253744]  kasan_save_alloc_info+0x3b/0x50
[   31.254398]  __kasan_kmalloc+0xb7/0xc0
[   31.254875]  __kmalloc_cache_noprof+0x184/0x410
[   31.255204]  kasan_atomics+0x96/0x310
[   31.255882]  kunit_try_run_case+0x1b3/0x490
[   31.256422]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   31.256888]  kthread+0x257/0x310
[   31.257583]  ret_from_fork+0x41/0x80
[   31.257974]  ret_from_fork_asm+0x1a/0x30
[   31.258534] 
[   31.258768] The buggy address belongs to the object at ffff888101aba780
[   31.258768]  which belongs to the cache kmalloc-64 of size 64
[   31.259891] The buggy address is located 0 bytes to the right of
[   31.259891]  allocated 48-byte region [ffff888101aba780, ffff888101aba7b0)
[   31.260934] 
[   31.261360] The buggy address belongs to the physical page:
[   31.262086] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101aba
[   31.262807] flags: 0x200000000000000(node=0|zone=2)
[   31.263565] page_type: f5(slab)
[   31.263940] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   31.264662] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   31.265647] page dumped because: kasan: bad access detected
[   31.266243] 
[   31.266603] Memory state around the buggy address:
[   31.267084]  ffff888101aba680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   31.267640]  ffff888101aba700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   31.268518] >ffff888101aba780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   31.269220]                                      ^
[   31.269651]  ffff888101aba800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.270380]  ffff888101aba880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.271068] ==================================================================
[   30.831413] ==================================================================
[   30.833331] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x107a/0x5450
[   30.834029] Write of size 4 at addr ffff888101aba7b0 by task kunit_try_catch/273
[   30.834460] 
[   30.834716] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241127 #1
[   30.836500] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.836954] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   30.838249] Call Trace:
[   30.838472]  <TASK>
[   30.838822]  dump_stack_lvl+0x73/0xb0
[   30.839643]  print_report+0xd1/0x640
[   30.839959]  ? __virt_addr_valid+0x1db/0x2d0
[   30.840722]  ? kasan_complete_mode_report_info+0x2a/0x200
[   30.841216]  kasan_report+0x102/0x140
[   30.842019]  ? kasan_atomics_helper+0x107a/0x5450
[   30.842424]  ? kasan_atomics_helper+0x107a/0x5450
[   30.843052]  kasan_check_range+0x10c/0x1c0
[   30.843538]  __kasan_check_write+0x18/0x20
[   30.844041]  kasan_atomics_helper+0x107a/0x5450
[   30.844496]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   30.845159]  ? __kmalloc_cache_noprof+0x184/0x410
[   30.845947]  ? kasan_atomics+0x153/0x310
[   30.846670]  kasan_atomics+0x1dd/0x310
[   30.847400]  ? __pfx_kasan_atomics+0x10/0x10
[   30.847893]  ? __pfx_read_tsc+0x10/0x10
[   30.848237]  ? ktime_get_ts64+0x84/0x230
[   30.848771]  kunit_try_run_case+0x1b3/0x490
[   30.849263]  ? __pfx_kunit_try_run_case+0x10/0x10
[   30.850433]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   30.851025]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   30.851948]  ? __kthread_parkme+0x82/0x160
[   30.852575]  ? preempt_count_sub+0x50/0x80
[   30.853263]  ? __pfx_kunit_try_run_case+0x10/0x10
[   30.853924]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   30.855201]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   30.855694]  kthread+0x257/0x310
[   30.856443]  ? __pfx_kthread+0x10/0x10
[   30.857020]  ret_from_fork+0x41/0x80
[   30.857697]  ? __pfx_kthread+0x10/0x10
[   30.858371]  ret_from_fork_asm+0x1a/0x30
[   30.859011]  </TASK>
[   30.859740] 
[   30.859933] Allocated by task 273:
[   30.860207]  kasan_save_stack+0x3d/0x60
[   30.861028]  kasan_save_track+0x18/0x40
[   30.861653]  kasan_save_alloc_info+0x3b/0x50
[   30.862541]  __kasan_kmalloc+0xb7/0xc0
[   30.863141]  __kmalloc_cache_noprof+0x184/0x410
[   30.863857]  kasan_atomics+0x96/0x310
[   30.864439]  kunit_try_run_case+0x1b3/0x490
[   30.864777]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   30.865587]  kthread+0x257/0x310
[   30.865858]  ret_from_fork+0x41/0x80
[   30.866758]  ret_from_fork_asm+0x1a/0x30
[   30.867336] 
[   30.867554] The buggy address belongs to the object at ffff888101aba780
[   30.867554]  which belongs to the cache kmalloc-64 of size 64
[   30.869416] The buggy address is located 0 bytes to the right of
[   30.869416]  allocated 48-byte region [ffff888101aba780, ffff888101aba7b0)
[   30.870657] 
[   30.871251] The buggy address belongs to the physical page:
[   30.871801] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101aba
[   30.872938] flags: 0x200000000000000(node=0|zone=2)
[   30.873399] page_type: f5(slab)
[   30.873860] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   30.874482] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   30.875318] page dumped because: kasan: bad access detected
[   30.875817] 
[   30.876135] Memory state around the buggy address:
[   30.876637]  ffff888101aba680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   30.877557]  ffff888101aba700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   30.878242] >ffff888101aba780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   30.879078]                                      ^
[   30.879471]  ffff888101aba800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.880109]  ffff888101aba880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.880772] ==================================================================
[   31.008757] ==================================================================
[   31.009623] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1218/0x5450
[   31.010600] Write of size 4 at addr ffff888101aba7b0 by task kunit_try_catch/273
[   31.011597] 
[   31.011770] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241127 #1
[   31.013123] Tainted: [B]=BAD_PAGE, [N]=TEST
[   31.013626] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   31.014494] Call Trace:
[   31.015013]  <TASK>
[   31.015295]  dump_stack_lvl+0x73/0xb0
[   31.015591]  print_report+0xd1/0x640
[   31.015875]  ? __virt_addr_valid+0x1db/0x2d0
[   31.016524]  ? kasan_complete_mode_report_info+0x2a/0x200
[   31.017212]  kasan_report+0x102/0x140
[   31.017862]  ? kasan_atomics_helper+0x1218/0x5450
[   31.018625]  ? kasan_atomics_helper+0x1218/0x5450
[   31.018973]  kasan_check_range+0x10c/0x1c0
[   31.019310]  __kasan_check_write+0x18/0x20
[   31.019820]  kasan_atomics_helper+0x1218/0x5450
[   31.020517]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   31.021081]  ? __kmalloc_cache_noprof+0x184/0x410
[   31.021849]  ? kasan_atomics+0x153/0x310
[   31.022555]  kasan_atomics+0x1dd/0x310
[   31.023106]  ? __pfx_kasan_atomics+0x10/0x10
[   31.023479]  ? __pfx_read_tsc+0x10/0x10
[   31.023768]  ? ktime_get_ts64+0x84/0x230
[   31.024095]  kunit_try_run_case+0x1b3/0x490
[   31.024701]  ? __pfx_kunit_try_run_case+0x10/0x10
[   31.025370]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   31.025970]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   31.026693]  ? __kthread_parkme+0x82/0x160
[   31.027271]  ? preempt_count_sub+0x50/0x80
[   31.027631]  ? __pfx_kunit_try_run_case+0x10/0x10
[   31.027961]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   31.028824]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   31.029714]  kthread+0x257/0x310
[   31.030089]  ? __pfx_kthread+0x10/0x10
[   31.030741]  ret_from_fork+0x41/0x80
[   31.031122]  ? __pfx_kthread+0x10/0x10
[   31.031625]  ret_from_fork_asm+0x1a/0x30
[   31.032822]  </TASK>
[   31.033098] 
[   31.033250] Allocated by task 273:
[   31.033935]  kasan_save_stack+0x3d/0x60
[   31.034290]  kasan_save_track+0x18/0x40
[   31.034941]  kasan_save_alloc_info+0x3b/0x50
[   31.035717]  __kasan_kmalloc+0xb7/0xc0
[   31.035974]  __kmalloc_cache_noprof+0x184/0x410
[   31.036740]  kasan_atomics+0x96/0x310
[   31.037268]  kunit_try_run_case+0x1b3/0x490
[   31.037648]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   31.038315]  kthread+0x257/0x310
[   31.038581]  ret_from_fork+0x41/0x80
[   31.039263]  ret_from_fork_asm+0x1a/0x30
[   31.039859] 
[   31.040163] The buggy address belongs to the object at ffff888101aba780
[   31.040163]  which belongs to the cache kmalloc-64 of size 64
[   31.041595] The buggy address is located 0 bytes to the right of
[   31.041595]  allocated 48-byte region [ffff888101aba780, ffff888101aba7b0)
[   31.042917] 
[   31.043357] The buggy address belongs to the physical page:
[   31.043908] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101aba
[   31.044740] flags: 0x200000000000000(node=0|zone=2)
[   31.045388] page_type: f5(slab)
[   31.045553] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   31.045843] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   31.046480] page dumped because: kasan: bad access detected
[   31.046924] 
[   31.047216] Memory state around the buggy address:
[   31.047671]  ffff888101aba680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   31.048275]  ffff888101aba700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   31.048786] >ffff888101aba780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   31.049667]                                      ^
[   31.050221]  ffff888101aba800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.050924]  ffff888101aba880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.051499] ==================================================================
[   30.010201] ==================================================================
[   30.011199] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x5ff/0x5450
[   30.012395] Write of size 4 at addr ffff888101aba7b0 by task kunit_try_catch/273
[   30.013143] 
[   30.013318] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241127 #1
[   30.014836] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.015537] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   30.016619] Call Trace:
[   30.016832]  <TASK>
[   30.017047]  dump_stack_lvl+0x73/0xb0
[   30.017616]  print_report+0xd1/0x640
[   30.018270]  ? __virt_addr_valid+0x1db/0x2d0
[   30.019255]  ? kasan_complete_mode_report_info+0x2a/0x200
[   30.019726]  kasan_report+0x102/0x140
[   30.020247]  ? kasan_atomics_helper+0x5ff/0x5450
[   30.020751]  ? kasan_atomics_helper+0x5ff/0x5450
[   30.021476]  kasan_check_range+0x10c/0x1c0
[   30.022422]  __kasan_check_write+0x18/0x20
[   30.023371]  kasan_atomics_helper+0x5ff/0x5450
[   30.023914]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   30.024580]  ? __kmalloc_cache_noprof+0x184/0x410
[   30.025285]  ? kasan_atomics+0x153/0x310
[   30.026197]  kasan_atomics+0x1dd/0x310
[   30.026614]  ? __pfx_kasan_atomics+0x10/0x10
[   30.027419]  ? __pfx_read_tsc+0x10/0x10
[   30.027765]  ? ktime_get_ts64+0x84/0x230
[   30.028427]  kunit_try_run_case+0x1b3/0x490
[   30.029094]  ? __pfx_kunit_try_run_case+0x10/0x10
[   30.029848]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   30.030596]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   30.031466]  ? __kthread_parkme+0x82/0x160
[   30.031897]  ? preempt_count_sub+0x50/0x80
[   30.032624]  ? __pfx_kunit_try_run_case+0x10/0x10
[   30.033049]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   30.033635]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   30.034553]  kthread+0x257/0x310
[   30.035336]  ? __pfx_kthread+0x10/0x10
[   30.036126]  ret_from_fork+0x41/0x80
[   30.036563]  ? __pfx_kthread+0x10/0x10
[   30.037169]  ret_from_fork_asm+0x1a/0x30
[   30.037604]  </TASK>
[   30.038075] 
[   30.038259] Allocated by task 273:
[   30.038877]  kasan_save_stack+0x3d/0x60
[   30.039240]  kasan_save_track+0x18/0x40
[   30.040195]  kasan_save_alloc_info+0x3b/0x50
[   30.040528]  __kasan_kmalloc+0xb7/0xc0
[   30.041115]  __kmalloc_cache_noprof+0x184/0x410
[   30.041583]  kasan_atomics+0x96/0x310
[   30.042296]  kunit_try_run_case+0x1b3/0x490
[   30.042735]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   30.043440]  kthread+0x257/0x310
[   30.043741]  ret_from_fork+0x41/0x80
[   30.044312]  ret_from_fork_asm+0x1a/0x30
[   30.045009] 
[   30.045522] The buggy address belongs to the object at ffff888101aba780
[   30.045522]  which belongs to the cache kmalloc-64 of size 64
[   30.046790] The buggy address is located 0 bytes to the right of
[   30.046790]  allocated 48-byte region [ffff888101aba780, ffff888101aba7b0)
[   30.047908] 
[   30.048178] The buggy address belongs to the physical page:
[   30.049332] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101aba
[   30.050156] flags: 0x200000000000000(node=0|zone=2)
[   30.050663] page_type: f5(slab)
[   30.050910] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   30.051822] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   30.052825] page dumped because: kasan: bad access detected
[   30.053467] 
[   30.053644] Memory state around the buggy address:
[   30.054289]  ffff888101aba680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   30.055148]  ffff888101aba700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   30.055858] >ffff888101aba780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   30.056946]                                      ^
[   30.057528]  ffff888101aba800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.058562]  ffff888101aba880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.059236] ==================================================================
[   30.881819] ==================================================================
[   30.882331] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a1e/0x5450
[   30.883105] Read of size 4 at addr ffff888101aba7b0 by task kunit_try_catch/273
[   30.883842] 
[   30.884039] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241127 #1
[   30.885207] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.886048] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   30.886852] Call Trace:
[   30.887113]  <TASK>
[   30.887469]  dump_stack_lvl+0x73/0xb0
[   30.887969]  print_report+0xd1/0x640
[   30.888549]  ? __virt_addr_valid+0x1db/0x2d0
[   30.888906]  ? kasan_complete_mode_report_info+0x2a/0x200
[   30.889719]  kasan_report+0x102/0x140
[   30.890264]  ? kasan_atomics_helper+0x4a1e/0x5450
[   30.890643]  ? kasan_atomics_helper+0x4a1e/0x5450
[   30.891010]  __asan_report_load4_noabort+0x18/0x20
[   30.891713]  kasan_atomics_helper+0x4a1e/0x5450
[   30.892368]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   30.892961]  ? __kmalloc_cache_noprof+0x184/0x410
[   30.893443]  ? kasan_atomics+0x153/0x310
[   30.893965]  kasan_atomics+0x1dd/0x310
[   30.894323]  ? __pfx_kasan_atomics+0x10/0x10
[   30.894779]  ? __pfx_read_tsc+0x10/0x10
[   30.895453]  ? ktime_get_ts64+0x84/0x230
[   30.895844]  kunit_try_run_case+0x1b3/0x490
[   30.896350]  ? __pfx_kunit_try_run_case+0x10/0x10
[   30.896953]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   30.897572]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   30.898146]  ? __kthread_parkme+0x82/0x160
[   30.898500]  ? preempt_count_sub+0x50/0x80
[   30.899001]  ? __pfx_kunit_try_run_case+0x10/0x10
[   30.899449]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   30.900306]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   30.900846]  kthread+0x257/0x310
[   30.901134]  ? __pfx_kthread+0x10/0x10
[   30.901699]  ret_from_fork+0x41/0x80
[   30.902286]  ? __pfx_kthread+0x10/0x10
[   30.902639]  ret_from_fork_asm+0x1a/0x30
[   30.904470]  </TASK>
[   30.904787] 
[   30.905066] Allocated by task 273:
[   30.905424]  kasan_save_stack+0x3d/0x60
[   30.905797]  kasan_save_track+0x18/0x40
[   30.906200]  kasan_save_alloc_info+0x3b/0x50
[   30.906583]  __kasan_kmalloc+0xb7/0xc0
[   30.907270]  __kmalloc_cache_noprof+0x184/0x410
[   30.907978]  kasan_atomics+0x96/0x310
[   30.908755]  kunit_try_run_case+0x1b3/0x490
[   30.909522]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   30.909888]  kthread+0x257/0x310
[   30.910415]  ret_from_fork+0x41/0x80
[   30.910874]  ret_from_fork_asm+0x1a/0x30
[   30.911394] 
[   30.911621] The buggy address belongs to the object at ffff888101aba780
[   30.911621]  which belongs to the cache kmalloc-64 of size 64
[   30.912654] The buggy address is located 0 bytes to the right of
[   30.912654]  allocated 48-byte region [ffff888101aba780, ffff888101aba7b0)
[   30.913764] 
[   30.914121] The buggy address belongs to the physical page:
[   30.914580] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101aba
[   30.915524] flags: 0x200000000000000(node=0|zone=2)
[   30.916120] page_type: f5(slab)
[   30.916410] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   30.917210] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   30.917775] page dumped because: kasan: bad access detected
[   30.918385] 
[   30.918677] Memory state around the buggy address:
[   30.919201]  ffff888101aba680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   30.919872]  ffff888101aba700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   30.920525] >ffff888101aba780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   30.921197]                                      ^
[   30.921798]  ffff888101aba800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.922463]  ffff888101aba880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.923269] ==================================================================
[   31.454289] ==================================================================
[   31.455292] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1650/0x5450
[   31.456182] Write of size 8 at addr ffff888101aba7b0 by task kunit_try_catch/273
[   31.457482] 
[   31.457795] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241127 #1
[   31.459639] Tainted: [B]=BAD_PAGE, [N]=TEST
[   31.460437] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   31.461378] Call Trace:
[   31.461631]  <TASK>
[   31.461896]  dump_stack_lvl+0x73/0xb0
[   31.462779]  print_report+0xd1/0x640
[   31.463556]  ? __virt_addr_valid+0x1db/0x2d0
[   31.464015]  ? kasan_complete_mode_report_info+0x2a/0x200
[   31.464650]  kasan_report+0x102/0x140
[   31.465671]  ? kasan_atomics_helper+0x1650/0x5450
[   31.466429]  ? kasan_atomics_helper+0x1650/0x5450
[   31.466945]  kasan_check_range+0x10c/0x1c0
[   31.467525]  __kasan_check_write+0x18/0x20
[   31.468016]  kasan_atomics_helper+0x1650/0x5450
[   31.468858]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   31.469456]  ? __kmalloc_cache_noprof+0x184/0x410
[   31.470605]  ? kasan_atomics+0x153/0x310
[   31.471017]  kasan_atomics+0x1dd/0x310
[   31.471902]  ? __pfx_kasan_atomics+0x10/0x10
[   31.472535]  ? __pfx_read_tsc+0x10/0x10
[   31.473007]  ? ktime_get_ts64+0x84/0x230
[   31.473842]  kunit_try_run_case+0x1b3/0x490
[   31.474538]  ? __pfx_kunit_try_run_case+0x10/0x10
[   31.474934]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   31.476125]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   31.476602]  ? __kthread_parkme+0x82/0x160
[   31.477568]  ? preempt_count_sub+0x50/0x80
[   31.478005]  ? __pfx_kunit_try_run_case+0x10/0x10
[   31.478904]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   31.479761]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   31.480884]  kthread+0x257/0x310
[   31.481272]  ? __pfx_kthread+0x10/0x10
[   31.481891]  ret_from_fork+0x41/0x80
[   31.482370]  ? __pfx_kthread+0x10/0x10
[   31.482736]  ret_from_fork_asm+0x1a/0x30
[   31.483735]  </TASK>
[   31.483975] 
[   31.484182] Allocated by task 273:
[   31.484933]  kasan_save_stack+0x3d/0x60
[   31.485596]  kasan_save_track+0x18/0x40
[   31.486592]  kasan_save_alloc_info+0x3b/0x50
[   31.487032]  __kasan_kmalloc+0xb7/0xc0
[   31.487830]  __kmalloc_cache_noprof+0x184/0x410
[   31.488649]  kasan_atomics+0x96/0x310
[   31.489052]  kunit_try_run_case+0x1b3/0x490
[   31.489799]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   31.490311]  kthread+0x257/0x310
[   31.490667]  ret_from_fork+0x41/0x80
[   31.491024]  ret_from_fork_asm+0x1a/0x30
[   31.491832] 
[   31.492015] The buggy address belongs to the object at ffff888101aba780
[   31.492015]  which belongs to the cache kmalloc-64 of size 64
[   31.494282] The buggy address is located 0 bytes to the right of
[   31.494282]  allocated 48-byte region [ffff888101aba780, ffff888101aba7b0)
[   31.495742] 
[   31.495855] The buggy address belongs to the physical page:
[   31.496151] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101aba
[   31.497720] flags: 0x200000000000000(node=0|zone=2)
[   31.498115] page_type: f5(slab)
[   31.498554] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   31.499693] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   31.500685] page dumped because: kasan: bad access detected
[   31.501140] 
[   31.501430] Memory state around the buggy address:
[   31.502414]  ffff888101aba680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   31.503309]  ffff888101aba700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   31.504256] >ffff888101aba780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   31.504904]                                      ^
[   31.505647]  ffff888101aba800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.506741]  ffff888101aba880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.507511] ==================================================================
[   31.785010] ==================================================================
[   31.785532] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1a80/0x5450
[   31.786703] Write of size 8 at addr ffff888101aba7b0 by task kunit_try_catch/273
[   31.789137] 
[   31.789483] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241127 #1
[   31.791423] Tainted: [B]=BAD_PAGE, [N]=TEST
[   31.792090] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   31.793287] Call Trace:
[   31.793634]  <TASK>
[   31.794276]  dump_stack_lvl+0x73/0xb0
[   31.794734]  print_report+0xd1/0x640
[   31.795188]  ? __virt_addr_valid+0x1db/0x2d0
[   31.795651]  ? kasan_complete_mode_report_info+0x2a/0x200
[   31.796632]  kasan_report+0x102/0x140
[   31.797218]  ? kasan_atomics_helper+0x1a80/0x5450
[   31.797837]  ? kasan_atomics_helper+0x1a80/0x5450
[   31.798561]  kasan_check_range+0x10c/0x1c0
[   31.799348]  __kasan_check_write+0x18/0x20
[   31.799974]  kasan_atomics_helper+0x1a80/0x5450
[   31.800828]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   31.801413]  ? __kmalloc_cache_noprof+0x184/0x410
[   31.801966]  ? kasan_atomics+0x153/0x310
[   31.802855]  kasan_atomics+0x1dd/0x310
[   31.803645]  ? __pfx_kasan_atomics+0x10/0x10
[   31.804017]  ? __pfx_read_tsc+0x10/0x10
[   31.804592]  ? ktime_get_ts64+0x84/0x230
[   31.805294]  kunit_try_run_case+0x1b3/0x490
[   31.805925]  ? __pfx_kunit_try_run_case+0x10/0x10
[   31.806510]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   31.806951]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   31.807842]  ? __kthread_parkme+0x82/0x160
[   31.808758]  ? preempt_count_sub+0x50/0x80
[   31.809482]  ? __pfx_kunit_try_run_case+0x10/0x10
[   31.809916]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   31.810734]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   31.811584]  kthread+0x257/0x310
[   31.811958]  ? __pfx_kthread+0x10/0x10
[   31.812810]  ret_from_fork+0x41/0x80
[   31.813412]  ? __pfx_kthread+0x10/0x10
[   31.813815]  ret_from_fork_asm+0x1a/0x30
[   31.814551]  </TASK>
[   31.814820] 
[   31.815014] Allocated by task 273:
[   31.815475]  kasan_save_stack+0x3d/0x60
[   31.816408]  kasan_save_track+0x18/0x40
[   31.816767]  kasan_save_alloc_info+0x3b/0x50
[   31.817527]  __kasan_kmalloc+0xb7/0xc0
[   31.817849]  __kmalloc_cache_noprof+0x184/0x410
[   31.818602]  kasan_atomics+0x96/0x310
[   31.819289]  kunit_try_run_case+0x1b3/0x490
[   31.819697]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   31.820542]  kthread+0x257/0x310
[   31.820898]  ret_from_fork+0x41/0x80
[   31.821476]  ret_from_fork_asm+0x1a/0x30
[   31.821933] 
[   31.822473] The buggy address belongs to the object at ffff888101aba780
[   31.822473]  which belongs to the cache kmalloc-64 of size 64
[   31.823767] The buggy address is located 0 bytes to the right of
[   31.823767]  allocated 48-byte region [ffff888101aba780, ffff888101aba7b0)
[   31.824907] 
[   31.825450] The buggy address belongs to the physical page:
[   31.826079] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101aba
[   31.826812] flags: 0x200000000000000(node=0|zone=2)
[   31.827532] page_type: f5(slab)
[   31.828115] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   31.828925] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   31.829921] page dumped because: kasan: bad access detected
[   31.830482] 
[   31.830651] Memory state around the buggy address:
[   31.831130]  ffff888101aba680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   31.832203]  ffff888101aba700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   31.832916] >ffff888101aba780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   31.833902]                                      ^
[   31.834592]  ffff888101aba800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.835388]  ffff888101aba880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.835952] ==================================================================
[   30.110874] ==================================================================
[   30.112040] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x730/0x5450
[   30.113166] Write of size 4 at addr ffff888101aba7b0 by task kunit_try_catch/273
[   30.113519] 
[   30.113632] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241127 #1
[   30.114034] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.114902] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   30.115701] Call Trace:
[   30.115912]  <TASK>
[   30.116138]  dump_stack_lvl+0x73/0xb0
[   30.116642]  print_report+0xd1/0x640
[   30.117101]  ? __virt_addr_valid+0x1db/0x2d0
[   30.117422]  ? kasan_complete_mode_report_info+0x2a/0x200
[   30.118133]  kasan_report+0x102/0x140
[   30.118823]  ? kasan_atomics_helper+0x730/0x5450
[   30.119561]  ? kasan_atomics_helper+0x730/0x5450
[   30.120348]  kasan_check_range+0x10c/0x1c0
[   30.120969]  __kasan_check_write+0x18/0x20
[   30.121572]  kasan_atomics_helper+0x730/0x5450
[   30.121929]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   30.122428]  ? __kmalloc_cache_noprof+0x184/0x410
[   30.123259]  ? kasan_atomics+0x153/0x310
[   30.123858]  kasan_atomics+0x1dd/0x310
[   30.124474]  ? __pfx_kasan_atomics+0x10/0x10
[   30.125017]  ? __pfx_read_tsc+0x10/0x10
[   30.125449]  ? ktime_get_ts64+0x84/0x230
[   30.125932]  kunit_try_run_case+0x1b3/0x490
[   30.126823]  ? __pfx_kunit_try_run_case+0x10/0x10
[   30.128081]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   30.128679]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   30.129419]  ? __kthread_parkme+0x82/0x160
[   30.129848]  ? preempt_count_sub+0x50/0x80
[   30.130763]  ? __pfx_kunit_try_run_case+0x10/0x10
[   30.131559]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   30.132505]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   30.133008]  kthread+0x257/0x310
[   30.133417]  ? __pfx_kthread+0x10/0x10
[   30.133845]  ret_from_fork+0x41/0x80
[   30.134532]  ? __pfx_kthread+0x10/0x10
[   30.135498]  ret_from_fork_asm+0x1a/0x30
[   30.135810]  </TASK>
[   30.136132] 
[   30.136374] Allocated by task 273:
[   30.136752]  kasan_save_stack+0x3d/0x60
[   30.137584]  kasan_save_track+0x18/0x40
[   30.138022]  kasan_save_alloc_info+0x3b/0x50
[   30.138612]  __kasan_kmalloc+0xb7/0xc0
[   30.139375]  __kmalloc_cache_noprof+0x184/0x410
[   30.140444]  kasan_atomics+0x96/0x310
[   30.140763]  kunit_try_run_case+0x1b3/0x490
[   30.141256]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   30.141826]  kthread+0x257/0x310
[   30.142178]  ret_from_fork+0x41/0x80
[   30.142595]  ret_from_fork_asm+0x1a/0x30
[   30.143101] 
[   30.143292] The buggy address belongs to the object at ffff888101aba780
[   30.143292]  which belongs to the cache kmalloc-64 of size 64
[   30.144624] The buggy address is located 0 bytes to the right of
[   30.144624]  allocated 48-byte region [ffff888101aba780, ffff888101aba7b0)
[   30.145460] 
[   30.145766] The buggy address belongs to the physical page:
[   30.146276] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101aba
[   30.147089] flags: 0x200000000000000(node=0|zone=2)
[   30.147530] page_type: f5(slab)
[   30.147858] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   30.148464] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   30.149381] page dumped because: kasan: bad access detected
[   30.149782] 
[   30.150036] Memory state around the buggy address:
[   30.150504]  ffff888101aba680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   30.151143]  ffff888101aba700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   30.151715] >ffff888101aba780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   30.152463]                                      ^
[   30.152923]  ffff888101aba800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.153574]  ffff888101aba880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.154169] ==================================================================
[   32.149482] ==================================================================
[   32.149901] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1f44/0x5450
[   32.150721] Write of size 8 at addr ffff888101aba7b0 by task kunit_try_catch/273
[   32.151408] 
[   32.151678] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241127 #1
[   32.152671] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.153088] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   32.154054] Call Trace:
[   32.154375]  <TASK>
[   32.154740]  dump_stack_lvl+0x73/0xb0
[   32.155301]  print_report+0xd1/0x640
[   32.155631]  ? __virt_addr_valid+0x1db/0x2d0
[   32.156245]  ? kasan_complete_mode_report_info+0x2a/0x200
[   32.156771]  kasan_report+0x102/0x140
[   32.157343]  ? kasan_atomics_helper+0x1f44/0x5450
[   32.157860]  ? kasan_atomics_helper+0x1f44/0x5450
[   32.158438]  kasan_check_range+0x10c/0x1c0
[   32.158786]  __kasan_check_write+0x18/0x20
[   32.159392]  kasan_atomics_helper+0x1f44/0x5450
[   32.159841]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   32.160450]  ? __kmalloc_cache_noprof+0x184/0x410
[   32.160912]  ? kasan_atomics+0x153/0x310
[   32.161521]  kasan_atomics+0x1dd/0x310
[   32.162128]  ? __pfx_kasan_atomics+0x10/0x10
[   32.162540]  ? __pfx_read_tsc+0x10/0x10
[   32.162911]  ? ktime_get_ts64+0x84/0x230
[   32.163467]  kunit_try_run_case+0x1b3/0x490
[   32.163881]  ? __pfx_kunit_try_run_case+0x10/0x10
[   32.164495]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   32.165061]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   32.165664]  ? __kthread_parkme+0x82/0x160
[   32.166182]  ? preempt_count_sub+0x50/0x80
[   32.166728]  ? __pfx_kunit_try_run_case+0x10/0x10
[   32.167278]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   32.167861]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   32.168377]  kthread+0x257/0x310
[   32.168865]  ? __pfx_kthread+0x10/0x10
[   32.169393]  ret_from_fork+0x41/0x80
[   32.169744]  ? __pfx_kthread+0x10/0x10
[   32.170339]  ret_from_fork_asm+0x1a/0x30
[   32.170809]  </TASK>
[   32.171220] 
[   32.171439] Allocated by task 273:
[   32.171844]  kasan_save_stack+0x3d/0x60
[   32.172419]  kasan_save_track+0x18/0x40
[   32.172814]  kasan_save_alloc_info+0x3b/0x50
[   32.173427]  __kasan_kmalloc+0xb7/0xc0
[   32.173871]  __kmalloc_cache_noprof+0x184/0x410
[   32.174539]  kasan_atomics+0x96/0x310
[   32.174941]  kunit_try_run_case+0x1b3/0x490
[   32.175404]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   32.175950]  kthread+0x257/0x310
[   32.176437]  ret_from_fork+0x41/0x80
[   32.176907]  ret_from_fork_asm+0x1a/0x30
[   32.177383] 
[   32.177580] The buggy address belongs to the object at ffff888101aba780
[   32.177580]  which belongs to the cache kmalloc-64 of size 64
[   32.178439] The buggy address is located 0 bytes to the right of
[   32.178439]  allocated 48-byte region [ffff888101aba780, ffff888101aba7b0)
[   32.179882] 
[   32.180818] The buggy address belongs to the physical page:
[   32.181487] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101aba
[   32.182039] flags: 0x200000000000000(node=0|zone=2)
[   32.182573] page_type: f5(slab)
[   32.182851] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   32.183973] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   32.184451] page dumped because: kasan: bad access detected
[   32.184894] 
[   32.185094] Memory state around the buggy address:
[   32.185541]  ffff888101aba680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.186072]  ffff888101aba700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.186629] >ffff888101aba780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   32.187321]                                      ^
[   32.187717]  ffff888101aba800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.188423]  ffff888101aba880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.188887] ==================================================================
[   31.607765] ==================================================================
[   31.608587] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1819/0x5450
[   31.609301] Write of size 8 at addr ffff888101aba7b0 by task kunit_try_catch/273
[   31.610337] 
[   31.610760] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241127 #1
[   31.613225] Tainted: [B]=BAD_PAGE, [N]=TEST
[   31.613677] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   31.615595] Call Trace:
[   31.615972]  <TASK>
[   31.616240]  dump_stack_lvl+0x73/0xb0
[   31.616744]  print_report+0xd1/0x640
[   31.617197]  ? __virt_addr_valid+0x1db/0x2d0
[   31.617789]  ? kasan_complete_mode_report_info+0x2a/0x200
[   31.618427]  kasan_report+0x102/0x140
[   31.619067]  ? kasan_atomics_helper+0x1819/0x5450
[   31.619451]  ? kasan_atomics_helper+0x1819/0x5450
[   31.620023]  kasan_check_range+0x10c/0x1c0
[   31.620632]  __kasan_check_write+0x18/0x20
[   31.621288]  kasan_atomics_helper+0x1819/0x5450
[   31.621861]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   31.622510]  ? __kmalloc_cache_noprof+0x184/0x410
[   31.623182]  ? kasan_atomics+0x153/0x310
[   31.623624]  kasan_atomics+0x1dd/0x310
[   31.624186]  ? __pfx_kasan_atomics+0x10/0x10
[   31.624505]  ? __pfx_read_tsc+0x10/0x10
[   31.625200]  ? ktime_get_ts64+0x84/0x230
[   31.625716]  kunit_try_run_case+0x1b3/0x490
[   31.626220]  ? __pfx_kunit_try_run_case+0x10/0x10
[   31.626664]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   31.627617]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   31.628103]  ? __kthread_parkme+0x82/0x160
[   31.628738]  ? preempt_count_sub+0x50/0x80
[   31.629298]  ? __pfx_kunit_try_run_case+0x10/0x10
[   31.629838]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   31.630452]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   31.631178]  kthread+0x257/0x310
[   31.631672]  ? __pfx_kthread+0x10/0x10
[   31.632075]  ret_from_fork+0x41/0x80
[   31.632731]  ? __pfx_kthread+0x10/0x10
[   31.633130]  ret_from_fork_asm+0x1a/0x30
[   31.633507]  </TASK>
[   31.633836] 
[   31.634033] Allocated by task 273:
[   31.634444]  kasan_save_stack+0x3d/0x60
[   31.634893]  kasan_save_track+0x18/0x40
[   31.635434]  kasan_save_alloc_info+0x3b/0x50
[   31.635879]  __kasan_kmalloc+0xb7/0xc0
[   31.636543]  __kmalloc_cache_noprof+0x184/0x410
[   31.636886]  kasan_atomics+0x96/0x310
[   31.637420]  kunit_try_run_case+0x1b3/0x490
[   31.637937]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   31.638409]  kthread+0x257/0x310
[   31.638906]  ret_from_fork+0x41/0x80
[   31.639462]  ret_from_fork_asm+0x1a/0x30
[   31.640021] 
[   31.640292] The buggy address belongs to the object at ffff888101aba780
[   31.640292]  which belongs to the cache kmalloc-64 of size 64
[   31.641403] The buggy address is located 0 bytes to the right of
[   31.641403]  allocated 48-byte region [ffff888101aba780, ffff888101aba7b0)
[   31.643130] 
[   31.644146] The buggy address belongs to the physical page:
[   31.644728] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101aba
[   31.645578] flags: 0x200000000000000(node=0|zone=2)
[   31.646068] page_type: f5(slab)
[   31.646506] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   31.647174] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   31.648102] page dumped because: kasan: bad access detected
[   31.648532] 
[   31.648783] Memory state around the buggy address:
[   31.649492]  ffff888101aba680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   31.650168]  ffff888101aba700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   31.650963] >ffff888101aba780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   31.651704]                                      ^
[   31.652222]  ffff888101aba800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.652906]  ffff888101aba880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.653558] ==================================================================
[   30.194092] ==================================================================
[   30.194906] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x861/0x5450
[   30.195594] Write of size 4 at addr ffff888101aba7b0 by task kunit_try_catch/273
[   30.196224] 
[   30.196456] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241127 #1
[   30.197050] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.197542] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   30.198500] Call Trace:
[   30.198834]  <TASK>
[   30.199052]  dump_stack_lvl+0x73/0xb0
[   30.199346]  print_report+0xd1/0x640
[   30.199627]  ? __virt_addr_valid+0x1db/0x2d0
[   30.199944]  ? kasan_complete_mode_report_info+0x2a/0x200
[   30.200624]  kasan_report+0x102/0x140
[   30.201132]  ? kasan_atomics_helper+0x861/0x5450
[   30.201839]  ? kasan_atomics_helper+0x861/0x5450
[   30.202537]  kasan_check_range+0x10c/0x1c0
[   30.202959]  __kasan_check_write+0x18/0x20
[   30.203365]  kasan_atomics_helper+0x861/0x5450
[   30.203810]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   30.204476]  ? __kmalloc_cache_noprof+0x184/0x410
[   30.204907]  ? kasan_atomics+0x153/0x310
[   30.205481]  kasan_atomics+0x1dd/0x310
[   30.205782]  ? __pfx_kasan_atomics+0x10/0x10
[   30.206211]  ? __pfx_read_tsc+0x10/0x10
[   30.206930]  ? ktime_get_ts64+0x84/0x230
[   30.207468]  kunit_try_run_case+0x1b3/0x490
[   30.207861]  ? __pfx_kunit_try_run_case+0x10/0x10
[   30.208354]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   30.208691]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   30.209049]  ? __kthread_parkme+0x82/0x160
[   30.209588]  ? preempt_count_sub+0x50/0x80
[   30.210221]  ? __pfx_kunit_try_run_case+0x10/0x10
[   30.210810]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   30.211399]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   30.211865]  kthread+0x257/0x310
[   30.212281]  ? __pfx_kthread+0x10/0x10
[   30.212706]  ret_from_fork+0x41/0x80
[   30.213030]  ? __pfx_kthread+0x10/0x10
[   30.213496]  ret_from_fork_asm+0x1a/0x30
[   30.213886]  </TASK>
[   30.214231] 
[   30.214402] Allocated by task 273:
[   30.214648]  kasan_save_stack+0x3d/0x60
[   30.214927]  kasan_save_track+0x18/0x40
[   30.215400]  kasan_save_alloc_info+0x3b/0x50
[   30.215952]  __kasan_kmalloc+0xb7/0xc0
[   30.216472]  __kmalloc_cache_noprof+0x184/0x410
[   30.216855]  kasan_atomics+0x96/0x310
[   30.217158]  kunit_try_run_case+0x1b3/0x490
[   30.217654]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   30.219932]  kthread+0x257/0x310
[   30.220925]  ret_from_fork+0x41/0x80
[   30.221747]  ret_from_fork_asm+0x1a/0x30
[   30.222581] 
[   30.222744] The buggy address belongs to the object at ffff888101aba780
[   30.222744]  which belongs to the cache kmalloc-64 of size 64
[   30.224434] The buggy address is located 0 bytes to the right of
[   30.224434]  allocated 48-byte region [ffff888101aba780, ffff888101aba7b0)
[   30.225756] 
[   30.226409] The buggy address belongs to the physical page:
[   30.227101] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101aba
[   30.227955] flags: 0x200000000000000(node=0|zone=2)
[   30.228573] page_type: f5(slab)
[   30.229002] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   30.230122] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   30.230799] page dumped because: kasan: bad access detected
[   30.231706] 
[   30.231877] Memory state around the buggy address:
[   30.232194]  ffff888101aba680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   30.233502]  ffff888101aba700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   30.234380] >ffff888101aba780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   30.235277]                                      ^
[   30.235660]  ffff888101aba800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.236320]  ffff888101aba880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.236891] ==================================================================
[   32.025237] ==================================================================
[   32.025754] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1d7b/0x5450
[   32.027428] Write of size 8 at addr ffff888101aba7b0 by task kunit_try_catch/273
[   32.028693] 
[   32.029505] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241127 #1
[   32.029900] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.030175] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   32.031710] Call Trace:
[   32.032069]  <TASK>
[   32.032478]  dump_stack_lvl+0x73/0xb0
[   32.032852]  print_report+0xd1/0x640
[   32.033253]  ? __virt_addr_valid+0x1db/0x2d0
[   32.033547]  ? kasan_complete_mode_report_info+0x2a/0x200
[   32.033895]  kasan_report+0x102/0x140
[   32.034216]  ? kasan_atomics_helper+0x1d7b/0x5450
[   32.034563]  ? kasan_atomics_helper+0x1d7b/0x5450
[   32.034918]  kasan_check_range+0x10c/0x1c0
[   32.035291]  __kasan_check_write+0x18/0x20
[   32.035768]  kasan_atomics_helper+0x1d7b/0x5450
[   32.036336]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   32.036667]  ? __kmalloc_cache_noprof+0x184/0x410
[   32.036971]  ? kasan_atomics+0x153/0x310
[   32.037283]  kasan_atomics+0x1dd/0x310
[   32.037555]  ? __pfx_kasan_atomics+0x10/0x10
[   32.037872]  ? __pfx_read_tsc+0x10/0x10
[   32.038216]  ? ktime_get_ts64+0x84/0x230
[   32.038539]  kunit_try_run_case+0x1b3/0x490
[   32.038977]  ? __pfx_kunit_try_run_case+0x10/0x10
[   32.039647]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   32.039976]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   32.040655]  ? __kthread_parkme+0x82/0x160
[   32.040950]  ? preempt_count_sub+0x50/0x80
[   32.041371]  ? __pfx_kunit_try_run_case+0x10/0x10
[   32.041903]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   32.042583]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   32.043251]  kthread+0x257/0x310
[   32.043578]  ? __pfx_kthread+0x10/0x10
[   32.044254]  ret_from_fork+0x41/0x80
[   32.044689]  ? __pfx_kthread+0x10/0x10
[   32.044978]  ret_from_fork_asm+0x1a/0x30
[   32.045640]  </TASK>
[   32.045960] 
[   32.046312] Allocated by task 273:
[   32.046631]  kasan_save_stack+0x3d/0x60
[   32.046915]  kasan_save_track+0x18/0x40
[   32.047254]  kasan_save_alloc_info+0x3b/0x50
[   32.047559]  __kasan_kmalloc+0xb7/0xc0
[   32.048161]  __kmalloc_cache_noprof+0x184/0x410
[   32.048744]  kasan_atomics+0x96/0x310
[   32.049321]  kunit_try_run_case+0x1b3/0x490
[   32.049874]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   32.050674]  kthread+0x257/0x310
[   32.051231]  ret_from_fork+0x41/0x80
[   32.051603]  ret_from_fork_asm+0x1a/0x30
[   32.052045] 
[   32.052337] The buggy address belongs to the object at ffff888101aba780
[   32.052337]  which belongs to the cache kmalloc-64 of size 64
[   32.053570] The buggy address is located 0 bytes to the right of
[   32.053570]  allocated 48-byte region [ffff888101aba780, ffff888101aba7b0)
[   32.054724] 
[   32.054963] The buggy address belongs to the physical page:
[   32.055586] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101aba
[   32.056382] flags: 0x200000000000000(node=0|zone=2)
[   32.056881] page_type: f5(slab)
[   32.057349] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   32.057790] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   32.058633] page dumped because: kasan: bad access detected
[   32.059336] 
[   32.059514] Memory state around the buggy address:
[   32.059821]  ffff888101aba680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.060719]  ffff888101aba700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.062514] >ffff888101aba780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   32.063115]                                      ^
[   32.063541]  ffff888101aba800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.064592]  ffff888101aba880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.065154] ==================================================================
[   31.559488] ==================================================================
[   31.561462] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1780/0x5450
[   31.562105] Write of size 8 at addr ffff888101aba7b0 by task kunit_try_catch/273
[   31.562878] 
[   31.563773] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241127 #1
[   31.564630] Tainted: [B]=BAD_PAGE, [N]=TEST
[   31.564811] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   31.565264] Call Trace:
[   31.565720]  <TASK>
[   31.566094]  dump_stack_lvl+0x73/0xb0
[   31.566601]  print_report+0xd1/0x640
[   31.567130]  ? __virt_addr_valid+0x1db/0x2d0
[   31.567566]  ? kasan_complete_mode_report_info+0x2a/0x200
[   31.568207]  kasan_report+0x102/0x140
[   31.568874]  ? kasan_atomics_helper+0x1780/0x5450
[   31.569550]  ? kasan_atomics_helper+0x1780/0x5450
[   31.570266]  kasan_check_range+0x10c/0x1c0
[   31.570843]  __kasan_check_write+0x18/0x20
[   31.571323]  kasan_atomics_helper+0x1780/0x5450
[   31.571751]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   31.572820]  ? __kmalloc_cache_noprof+0x184/0x410
[   31.573471]  ? kasan_atomics+0x153/0x310
[   31.574082]  kasan_atomics+0x1dd/0x310
[   31.574639]  ? __pfx_kasan_atomics+0x10/0x10
[   31.575261]  ? __pfx_read_tsc+0x10/0x10
[   31.575607]  ? ktime_get_ts64+0x84/0x230
[   31.576014]  kunit_try_run_case+0x1b3/0x490
[   31.576871]  ? __pfx_kunit_try_run_case+0x10/0x10
[   31.577654]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   31.578418]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   31.578775]  ? __kthread_parkme+0x82/0x160
[   31.580054]  ? preempt_count_sub+0x50/0x80
[   31.580592]  ? __pfx_kunit_try_run_case+0x10/0x10
[   31.580907]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   31.581655]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   31.582342]  kthread+0x257/0x310
[   31.582775]  ? __pfx_kthread+0x10/0x10
[   31.583324]  ret_from_fork+0x41/0x80
[   31.583879]  ? __pfx_kthread+0x10/0x10
[   31.584595]  ret_from_fork_asm+0x1a/0x30
[   31.585281]  </TASK>
[   31.585622] 
[   31.585908] Allocated by task 273:
[   31.586529]  kasan_save_stack+0x3d/0x60
[   31.587057]  kasan_save_track+0x18/0x40
[   31.587503]  kasan_save_alloc_info+0x3b/0x50
[   31.588177]  __kasan_kmalloc+0xb7/0xc0
[   31.588634]  __kmalloc_cache_noprof+0x184/0x410
[   31.589229]  kasan_atomics+0x96/0x310
[   31.589645]  kunit_try_run_case+0x1b3/0x490
[   31.590247]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   31.591068]  kthread+0x257/0x310
[   31.591341]  ret_from_fork+0x41/0x80
[   31.592033]  ret_from_fork_asm+0x1a/0x30
[   31.592356] 
[   31.592605] The buggy address belongs to the object at ffff888101aba780
[   31.592605]  which belongs to the cache kmalloc-64 of size 64
[   31.593818] The buggy address is located 0 bytes to the right of
[   31.593818]  allocated 48-byte region [ffff888101aba780, ffff888101aba7b0)
[   31.595299] 
[   31.595467] The buggy address belongs to the physical page:
[   31.596394] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101aba
[   31.597215] flags: 0x200000000000000(node=0|zone=2)
[   31.597918] page_type: f5(slab)
[   31.598381] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   31.599462] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   31.600359] page dumped because: kasan: bad access detected
[   31.601057] 
[   31.601423] Memory state around the buggy address:
[   31.602000]  ffff888101aba680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   31.602850]  ffff888101aba700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   31.603662] >ffff888101aba780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   31.604612]                                      ^
[   31.605133]  ffff888101aba800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.605915]  ffff888101aba880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.606891] ==================================================================
[   32.316871] ==================================================================
[   32.317398] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x20c9/0x5450
[   32.318190] Write of size 8 at addr ffff888101aba7b0 by task kunit_try_catch/273
[   32.318812] 
[   32.319096] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241127 #1
[   32.319934] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.320271] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   32.321242] Call Trace:
[   32.321521]  <TASK>
[   32.321718]  dump_stack_lvl+0x73/0xb0
[   32.322242]  print_report+0xd1/0x640
[   32.322724]  ? __virt_addr_valid+0x1db/0x2d0
[   32.323180]  ? kasan_complete_mode_report_info+0x2a/0x200
[   32.323694]  kasan_report+0x102/0x140
[   32.324092]  ? kasan_atomics_helper+0x20c9/0x5450
[   32.324581]  ? kasan_atomics_helper+0x20c9/0x5450
[   32.325097]  kasan_check_range+0x10c/0x1c0
[   32.325611]  __kasan_check_write+0x18/0x20
[   32.325931]  kasan_atomics_helper+0x20c9/0x5450
[   32.326314]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   32.326918]  ? __kmalloc_cache_noprof+0x184/0x410
[   32.327512]  ? kasan_atomics+0x153/0x310
[   32.327847]  kasan_atomics+0x1dd/0x310
[   32.328396]  ? __pfx_kasan_atomics+0x10/0x10
[   32.328925]  ? __pfx_read_tsc+0x10/0x10
[   32.329398]  ? ktime_get_ts64+0x84/0x230
[   32.329810]  kunit_try_run_case+0x1b3/0x490
[   32.330266]  ? __pfx_kunit_try_run_case+0x10/0x10
[   32.330677]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   32.331063]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   32.331653]  ? __kthread_parkme+0x82/0x160
[   32.332199]  ? preempt_count_sub+0x50/0x80
[   32.332543]  ? __pfx_kunit_try_run_case+0x10/0x10
[   32.333181]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   32.333717]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   32.334307]  kthread+0x257/0x310
[   32.334757]  ? __pfx_kthread+0x10/0x10
[   32.335192]  ret_from_fork+0x41/0x80
[   32.335579]  ? __pfx_kthread+0x10/0x10
[   32.336067]  ret_from_fork_asm+0x1a/0x30
[   32.336412]  </TASK>
[   32.336721] 
[   32.336893] Allocated by task 273:
[   32.337350]  kasan_save_stack+0x3d/0x60
[   32.337625]  kasan_save_track+0x18/0x40
[   32.337911]  kasan_save_alloc_info+0x3b/0x50
[   32.338513]  __kasan_kmalloc+0xb7/0xc0
[   32.339060]  __kmalloc_cache_noprof+0x184/0x410
[   32.339505]  kasan_atomics+0x96/0x310
[   32.339899]  kunit_try_run_case+0x1b3/0x490
[   32.340349]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   32.340735]  kthread+0x257/0x310
[   32.341006]  ret_from_fork+0x41/0x80
[   32.341527]  ret_from_fork_asm+0x1a/0x30
[   32.342063] 
[   32.342313] The buggy address belongs to the object at ffff888101aba780
[   32.342313]  which belongs to the cache kmalloc-64 of size 64
[   32.343207] The buggy address is located 0 bytes to the right of
[   32.343207]  allocated 48-byte region [ffff888101aba780, ffff888101aba7b0)
[   32.344329] 
[   32.344571] The buggy address belongs to the physical page:
[   32.345199] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101aba
[   32.345767] flags: 0x200000000000000(node=0|zone=2)
[   32.346152] page_type: f5(slab)
[   32.346555] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   32.347489] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   32.348151] page dumped because: kasan: bad access detected
[   32.348480] 
[   32.348726] Memory state around the buggy address:
[   32.349358]  ffff888101aba680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.350190]  ffff888101aba700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.350787] >ffff888101aba780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   32.351396]                                      ^
[   32.351768]  ffff888101aba800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.352405]  ffff888101aba880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.353063] ==================================================================
[   30.553036] ==================================================================
[   30.553696] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xd48/0x5450
[   30.556000] Write of size 4 at addr ffff888101aba7b0 by task kunit_try_catch/273
[   30.557005] 
[   30.557312] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241127 #1
[   30.558447] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.558863] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   30.559832] Call Trace:
[   30.560075]  <TASK>
[   30.560447]  dump_stack_lvl+0x73/0xb0
[   30.560904]  print_report+0xd1/0x640
[   30.561277]  ? __virt_addr_valid+0x1db/0x2d0
[   30.561772]  ? kasan_complete_mode_report_info+0x2a/0x200
[   30.562491]  kasan_report+0x102/0x140
[   30.562844]  ? kasan_atomics_helper+0xd48/0x5450
[   30.563484]  ? kasan_atomics_helper+0xd48/0x5450
[   30.563927]  kasan_check_range+0x10c/0x1c0
[   30.564262]  __kasan_check_write+0x18/0x20
[   30.564765]  kasan_atomics_helper+0xd48/0x5450
[   30.565390]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   30.566070]  ? __kmalloc_cache_noprof+0x184/0x410
[   30.566523]  ? kasan_atomics+0x153/0x310
[   30.566943]  kasan_atomics+0x1dd/0x310
[   30.567311]  ? __pfx_kasan_atomics+0x10/0x10
[   30.567788]  ? __pfx_read_tsc+0x10/0x10
[   30.568411]  ? ktime_get_ts64+0x84/0x230
[   30.568762]  kunit_try_run_case+0x1b3/0x490
[   30.569534]  ? __pfx_kunit_try_run_case+0x10/0x10
[   30.569916]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   30.570650]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   30.571313]  ? __kthread_parkme+0x82/0x160
[   30.571763]  ? preempt_count_sub+0x50/0x80
[   30.572271]  ? __pfx_kunit_try_run_case+0x10/0x10
[   30.572713]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   30.573534]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   30.574183]  kthread+0x257/0x310
[   30.574574]  ? __pfx_kthread+0x10/0x10
[   30.575003]  ret_from_fork+0x41/0x80
[   30.575512]  ? __pfx_kthread+0x10/0x10
[   30.575909]  ret_from_fork_asm+0x1a/0x30
[   30.576478]  </TASK>
[   30.576673] 
[   30.576961] Allocated by task 273:
[   30.577351]  kasan_save_stack+0x3d/0x60
[   30.577765]  kasan_save_track+0x18/0x40
[   30.578107]  kasan_save_alloc_info+0x3b/0x50
[   30.578674]  __kasan_kmalloc+0xb7/0xc0
[   30.579020]  __kmalloc_cache_noprof+0x184/0x410
[   30.579705]  kasan_atomics+0x96/0x310
[   30.580001]  kunit_try_run_case+0x1b3/0x490
[   30.580535]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   30.581019]  kthread+0x257/0x310
[   30.581276]  ret_from_fork+0x41/0x80
[   30.582068]  ret_from_fork_asm+0x1a/0x30
[   30.582494] 
[   30.582751] The buggy address belongs to the object at ffff888101aba780
[   30.582751]  which belongs to the cache kmalloc-64 of size 64
[   30.583746] The buggy address is located 0 bytes to the right of
[   30.583746]  allocated 48-byte region [ffff888101aba780, ffff888101aba7b0)
[   30.585076] 
[   30.585282] The buggy address belongs to the physical page:
[   30.585739] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101aba
[   30.586429] flags: 0x200000000000000(node=0|zone=2)
[   30.587143] page_type: f5(slab)
[   30.587580] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   30.588042] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   30.588469] page dumped because: kasan: bad access detected
[   30.589163] 
[   30.589506] Memory state around the buggy address:
[   30.590139]  ffff888101aba680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   30.590767]  ffff888101aba700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   30.591918] >ffff888101aba780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   30.592606]                                      ^
[   30.592922]  ffff888101aba800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.593457]  ffff888101aba880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.594477] ==================================================================
[   31.931635] ==================================================================
[   31.932214] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4f32/0x5450
[   31.932818] Read of size 8 at addr ffff888101aba7b0 by task kunit_try_catch/273
[   31.933964] 
[   31.934375] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241127 #1
[   31.935047] Tainted: [B]=BAD_PAGE, [N]=TEST
[   31.935626] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   31.936696] Call Trace:
[   31.937149]  <TASK>
[   31.937398]  dump_stack_lvl+0x73/0xb0
[   31.937848]  print_report+0xd1/0x640
[   31.938375]  ? __virt_addr_valid+0x1db/0x2d0
[   31.938952]  ? kasan_complete_mode_report_info+0x2a/0x200
[   31.939498]  kasan_report+0x102/0x140
[   31.939797]  ? kasan_atomics_helper+0x4f32/0x5450
[   31.940711]  ? kasan_atomics_helper+0x4f32/0x5450
[   31.941424]  __asan_report_load8_noabort+0x18/0x20
[   31.942209]  kasan_atomics_helper+0x4f32/0x5450
[   31.942610]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   31.943101]  ? __kmalloc_cache_noprof+0x184/0x410
[   31.943803]  ? kasan_atomics+0x153/0x310
[   31.944504]  kasan_atomics+0x1dd/0x310
[   31.944973]  ? __pfx_kasan_atomics+0x10/0x10
[   31.945453]  ? __pfx_read_tsc+0x10/0x10
[   31.946124]  ? ktime_get_ts64+0x84/0x230
[   31.946538]  kunit_try_run_case+0x1b3/0x490
[   31.947170]  ? __pfx_kunit_try_run_case+0x10/0x10
[   31.947639]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   31.948233]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   31.948703]  ? __kthread_parkme+0x82/0x160
[   31.949260]  ? preempt_count_sub+0x50/0x80
[   31.949698]  ? __pfx_kunit_try_run_case+0x10/0x10
[   31.950341]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   31.950944]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   31.951783]  kthread+0x257/0x310
[   31.952603]  ? __pfx_kthread+0x10/0x10
[   31.953371]  ret_from_fork+0x41/0x80
[   31.953923]  ? __pfx_kthread+0x10/0x10
[   31.954438]  ret_from_fork_asm+0x1a/0x30
[   31.954894]  </TASK>
[   31.955316] 
[   31.955566] Allocated by task 273:
[   31.956005]  kasan_save_stack+0x3d/0x60
[   31.956418]  kasan_save_track+0x18/0x40
[   31.956805]  kasan_save_alloc_info+0x3b/0x50
[   31.957370]  __kasan_kmalloc+0xb7/0xc0
[   31.957723]  __kmalloc_cache_noprof+0x184/0x410
[   31.958335]  kasan_atomics+0x96/0x310
[   31.958891]  kunit_try_run_case+0x1b3/0x490
[   31.959433]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   31.960005]  kthread+0x257/0x310
[   31.960295]  ret_from_fork+0x41/0x80
[   31.960836]  ret_from_fork_asm+0x1a/0x30
[   31.961445] 
[   31.961689] The buggy address belongs to the object at ffff888101aba780
[   31.961689]  which belongs to the cache kmalloc-64 of size 64
[   31.962536] The buggy address is located 0 bytes to the right of
[   31.962536]  allocated 48-byte region [ffff888101aba780, ffff888101aba7b0)
[   31.964146] 
[   31.964379] The buggy address belongs to the physical page:
[   31.964890] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101aba
[   31.965776] flags: 0x200000000000000(node=0|zone=2)
[   31.966387] page_type: f5(slab)
[   31.966846] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   31.967781] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   31.968229] page dumped because: kasan: bad access detected
[   31.969009] 
[   31.969268] Memory state around the buggy address:
[   31.969769]  ffff888101aba680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   31.970504]  ffff888101aba700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   31.971038] >ffff888101aba780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   31.971935]                                      ^
[   31.972533]  ffff888101aba800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.973541]  ffff888101aba880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.974024] ==================================================================
[   30.965829] ==================================================================
[   30.966395] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a04/0x5450
[   30.967501] Read of size 4 at addr ffff888101aba7b0 by task kunit_try_catch/273
[   30.967921] 
[   30.968255] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241127 #1
[   30.969766] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.970148] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   30.971199] Call Trace:
[   30.971564]  <TASK>
[   30.971920]  dump_stack_lvl+0x73/0xb0
[   30.972320]  print_report+0xd1/0x640
[   30.972807]  ? __virt_addr_valid+0x1db/0x2d0
[   30.973517]  ? kasan_complete_mode_report_info+0x2a/0x200
[   30.974213]  kasan_report+0x102/0x140
[   30.974615]  ? kasan_atomics_helper+0x4a04/0x5450
[   30.975327]  ? kasan_atomics_helper+0x4a04/0x5450
[   30.975693]  __asan_report_load4_noabort+0x18/0x20
[   30.976371]  kasan_atomics_helper+0x4a04/0x5450
[   30.976768]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   30.977450]  ? __kmalloc_cache_noprof+0x184/0x410
[   30.978068]  ? kasan_atomics+0x153/0x310
[   30.978730]  kasan_atomics+0x1dd/0x310
[   30.979260]  ? __pfx_kasan_atomics+0x10/0x10
[   30.979820]  ? __pfx_read_tsc+0x10/0x10
[   30.980360]  ? ktime_get_ts64+0x84/0x230
[   30.980886]  kunit_try_run_case+0x1b3/0x490
[   30.981303]  ? __pfx_kunit_try_run_case+0x10/0x10
[   30.982056]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   30.982536]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   30.983212]  ? __kthread_parkme+0x82/0x160
[   30.983640]  ? preempt_count_sub+0x50/0x80
[   30.984213]  ? __pfx_kunit_try_run_case+0x10/0x10
[   30.984543]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   30.984929]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   30.985872]  kthread+0x257/0x310
[   30.986434]  ? __pfx_kthread+0x10/0x10
[   30.986725]  ret_from_fork+0x41/0x80
[   30.987078]  ? __pfx_kthread+0x10/0x10
[   30.987664]  ret_from_fork_asm+0x1a/0x30
[   30.988330]  </TASK>
[   30.988705] 
[   30.988880] Allocated by task 273:
[   30.989388]  kasan_save_stack+0x3d/0x60
[   30.989677]  kasan_save_track+0x18/0x40
[   30.990176]  kasan_save_alloc_info+0x3b/0x50
[   30.990782]  __kasan_kmalloc+0xb7/0xc0
[   30.991452]  __kmalloc_cache_noprof+0x184/0x410
[   30.991975]  kasan_atomics+0x96/0x310
[   30.992466]  kunit_try_run_case+0x1b3/0x490
[   30.992954]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   30.993544]  kthread+0x257/0x310
[   30.994017]  ret_from_fork+0x41/0x80
[   30.994514]  ret_from_fork_asm+0x1a/0x30
[   30.995051] 
[   30.995395] The buggy address belongs to the object at ffff888101aba780
[   30.995395]  which belongs to the cache kmalloc-64 of size 64
[   30.996292] The buggy address is located 0 bytes to the right of
[   30.996292]  allocated 48-byte region [ffff888101aba780, ffff888101aba7b0)
[   30.997738] 
[   30.998080] The buggy address belongs to the physical page:
[   30.998431] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101aba
[   30.998879] flags: 0x200000000000000(node=0|zone=2)
[   30.999746] page_type: f5(slab)
[   31.000364] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   31.001241] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   31.001665] page dumped because: kasan: bad access detected
[   31.002631] 
[   31.002846] Memory state around the buggy address:
[   31.003502]  ffff888101aba680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   31.004344]  ffff888101aba700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   31.005032] >ffff888101aba780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   31.005628]                                      ^
[   31.006174]  ffff888101aba800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.006776]  ffff888101aba880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.007440] ==================================================================
[   31.139414] ==================================================================
[   31.140072] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x49d0/0x5450
[   31.140884] Read of size 4 at addr ffff888101aba7b0 by task kunit_try_catch/273
[   31.141840] 
[   31.142236] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241127 #1
[   31.143053] Tainted: [B]=BAD_PAGE, [N]=TEST
[   31.143572] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   31.144176] Call Trace:
[   31.144420]  <TASK>
[   31.144778]  dump_stack_lvl+0x73/0xb0
[   31.145366]  print_report+0xd1/0x640
[   31.145810]  ? __virt_addr_valid+0x1db/0x2d0
[   31.146586]  ? kasan_complete_mode_report_info+0x2a/0x200
[   31.147213]  kasan_report+0x102/0x140
[   31.148843]  ? kasan_atomics_helper+0x49d0/0x5450
[   31.149688]  ? kasan_atomics_helper+0x49d0/0x5450
[   31.150607]  __asan_report_load4_noabort+0x18/0x20
[   31.151357]  kasan_atomics_helper+0x49d0/0x5450
[   31.151827]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   31.152683]  ? __kmalloc_cache_noprof+0x184/0x410
[   31.153520]  ? kasan_atomics+0x153/0x310
[   31.154169]  kasan_atomics+0x1dd/0x310
[   31.154647]  ? __pfx_kasan_atomics+0x10/0x10
[   31.155595]  ? __pfx_read_tsc+0x10/0x10
[   31.156019]  ? ktime_get_ts64+0x84/0x230
[   31.156584]  kunit_try_run_case+0x1b3/0x490
[   31.157096]  ? __pfx_kunit_try_run_case+0x10/0x10
[   31.157649]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   31.158402]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   31.158851]  ? __kthread_parkme+0x82/0x160
[   31.159418]  ? preempt_count_sub+0x50/0x80
[   31.159776]  ? __pfx_kunit_try_run_case+0x10/0x10
[   31.160648]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   31.161186]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   31.161785]  kthread+0x257/0x310
[   31.162326]  ? __pfx_kthread+0x10/0x10
[   31.162836]  ret_from_fork+0x41/0x80
[   31.163342]  ? __pfx_kthread+0x10/0x10
[   31.163944]  ret_from_fork_asm+0x1a/0x30
[   31.164669]  </TASK>
[   31.164977] 
[   31.165244] Allocated by task 273:
[   31.165518]  kasan_save_stack+0x3d/0x60
[   31.166092]  kasan_save_track+0x18/0x40
[   31.166738]  kasan_save_alloc_info+0x3b/0x50
[   31.167071]  __kasan_kmalloc+0xb7/0xc0
[   31.167551]  __kmalloc_cache_noprof+0x184/0x410
[   31.168210]  kasan_atomics+0x96/0x310
[   31.168694]  kunit_try_run_case+0x1b3/0x490
[   31.169310]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   31.169702]  kthread+0x257/0x310
[   31.169959]  ret_from_fork+0x41/0x80
[   31.170534]  ret_from_fork_asm+0x1a/0x30
[   31.171199] 
[   31.171494] The buggy address belongs to the object at ffff888101aba780
[   31.171494]  which belongs to the cache kmalloc-64 of size 64
[   31.172363] The buggy address is located 0 bytes to the right of
[   31.172363]  allocated 48-byte region [ffff888101aba780, ffff888101aba7b0)
[   31.173706] 
[   31.173930] The buggy address belongs to the physical page:
[   31.174525] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101aba
[   31.175009] flags: 0x200000000000000(node=0|zone=2)
[   31.175589] page_type: f5(slab)
[   31.176076] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   31.177013] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   31.177608] page dumped because: kasan: bad access detected
[   31.178095] 
[   31.178461] Memory state around the buggy address:
[   31.179161]  ffff888101aba680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   31.179771]  ffff888101aba700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   31.180668] >ffff888101aba780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   31.181413]                                      ^
[   31.182099]  ffff888101aba800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.182777]  ffff888101aba880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.183593] ==================================================================
[   30.790718] ==================================================================
[   30.791849] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a38/0x5450
[   30.792716] Read of size 4 at addr ffff888101aba7b0 by task kunit_try_catch/273
[   30.793500] 
[   30.793677] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241127 #1
[   30.794821] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.795412] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   30.795920] Call Trace:
[   30.796299]  <TASK>
[   30.796605]  dump_stack_lvl+0x73/0xb0
[   30.797237]  print_report+0xd1/0x640
[   30.797728]  ? __virt_addr_valid+0x1db/0x2d0
[   30.798144]  ? kasan_complete_mode_report_info+0x2a/0x200
[   30.799160]  kasan_report+0x102/0x140
[   30.799427]  ? kasan_atomics_helper+0x4a38/0x5450
[   30.800007]  ? kasan_atomics_helper+0x4a38/0x5450
[   30.800674]  __asan_report_load4_noabort+0x18/0x20
[   30.801241]  kasan_atomics_helper+0x4a38/0x5450
[   30.801805]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   30.802424]  ? __kmalloc_cache_noprof+0x184/0x410
[   30.802783]  ? kasan_atomics+0x153/0x310
[   30.803134]  kasan_atomics+0x1dd/0x310
[   30.803410]  ? __pfx_kasan_atomics+0x10/0x10
[   30.803702]  ? __pfx_read_tsc+0x10/0x10
[   30.803968]  ? ktime_get_ts64+0x84/0x230
[   30.804322]  kunit_try_run_case+0x1b3/0x490
[   30.804646]  ? __pfx_kunit_try_run_case+0x10/0x10
[   30.805226]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   30.805696]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   30.806099]  ? __kthread_parkme+0x82/0x160
[   30.806677]  ? preempt_count_sub+0x50/0x80
[   30.807306]  ? __pfx_kunit_try_run_case+0x10/0x10
[   30.807689]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   30.808558]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   30.809177]  kthread+0x257/0x310
[   30.809482]  ? __pfx_kthread+0x10/0x10
[   30.810071]  ret_from_fork+0x41/0x80
[   30.810507]  ? __pfx_kthread+0x10/0x10
[   30.810976]  ret_from_fork_asm+0x1a/0x30
[   30.811369]  </TASK>
[   30.811730] 
[   30.812050] Allocated by task 273:
[   30.812497]  kasan_save_stack+0x3d/0x60
[   30.812932]  kasan_save_track+0x18/0x40
[   30.813410]  kasan_save_alloc_info+0x3b/0x50
[   30.813845]  __kasan_kmalloc+0xb7/0xc0
[   30.814417]  __kmalloc_cache_noprof+0x184/0x410
[   30.814829]  kasan_atomics+0x96/0x310
[   30.815414]  kunit_try_run_case+0x1b3/0x490
[   30.815868]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   30.816512]  kthread+0x257/0x310
[   30.816959]  ret_from_fork+0x41/0x80
[   30.817430]  ret_from_fork_asm+0x1a/0x30
[   30.817733] 
[   30.817937] The buggy address belongs to the object at ffff888101aba780
[   30.817937]  which belongs to the cache kmalloc-64 of size 64
[   30.819581] The buggy address is located 0 bytes to the right of
[   30.819581]  allocated 48-byte region [ffff888101aba780, ffff888101aba7b0)
[   30.820652] 
[   30.820812] The buggy address belongs to the physical page:
[   30.821532] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101aba
[   30.822150] flags: 0x200000000000000(node=0|zone=2)
[   30.822664] page_type: f5(slab)
[   30.823173] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   30.823783] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   30.824668] page dumped because: kasan: bad access detected
[   30.825198] 
[   30.825359] Memory state around the buggy address:
[   30.825962]  ffff888101aba680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   30.826759]  ffff888101aba700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   30.827552] >ffff888101aba780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   30.828256]                                      ^
[   30.828749]  ffff888101aba800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.829526]  ffff888101aba880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.830226] ==================================================================
[   32.190063] ==================================================================
[   32.191856] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4f73/0x5450
[   32.192426] Read of size 8 at addr ffff888101aba7b0 by task kunit_try_catch/273
[   32.193413] 
[   32.194271] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241127 #1
[   32.195426] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.195710] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   32.196747] Call Trace:
[   32.197659]  <TASK>
[   32.197873]  dump_stack_lvl+0x73/0xb0
[   32.198210]  print_report+0xd1/0x640
[   32.198670]  ? __virt_addr_valid+0x1db/0x2d0
[   32.199523]  ? kasan_complete_mode_report_info+0x2a/0x200
[   32.200165]  kasan_report+0x102/0x140
[   32.200797]  ? kasan_atomics_helper+0x4f73/0x5450
[   32.201613]  ? kasan_atomics_helper+0x4f73/0x5450
[   32.202298]  __asan_report_load8_noabort+0x18/0x20
[   32.202966]  kasan_atomics_helper+0x4f73/0x5450
[   32.203834]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   32.204196]  ? __kmalloc_cache_noprof+0x184/0x410
[   32.204787]  ? kasan_atomics+0x153/0x310
[   32.205730]  kasan_atomics+0x1dd/0x310
[   32.206127]  ? __pfx_kasan_atomics+0x10/0x10
[   32.206829]  ? __pfx_read_tsc+0x10/0x10
[   32.207517]  ? ktime_get_ts64+0x84/0x230
[   32.207932]  kunit_try_run_case+0x1b3/0x490
[   32.208693]  ? __pfx_kunit_try_run_case+0x10/0x10
[   32.209256]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   32.210001]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   32.210735]  ? __kthread_parkme+0x82/0x160
[   32.211485]  ? preempt_count_sub+0x50/0x80
[   32.211901]  ? __pfx_kunit_try_run_case+0x10/0x10
[   32.212953]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   32.213494]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   32.214272]  kthread+0x257/0x310
[   32.214655]  ? __pfx_kthread+0x10/0x10
[   32.215500]  ret_from_fork+0x41/0x80
[   32.215946]  ? __pfx_kthread+0x10/0x10
[   32.216901]  ret_from_fork_asm+0x1a/0x30
[   32.217733]  </TASK>
[   32.218236] 
[   32.218416] Allocated by task 273:
[   32.219308]  kasan_save_stack+0x3d/0x60
[   32.219747]  kasan_save_track+0x18/0x40
[   32.220256]  kasan_save_alloc_info+0x3b/0x50
[   32.220463]  __kasan_kmalloc+0xb7/0xc0
[   32.220640]  __kmalloc_cache_noprof+0x184/0x410
[   32.220835]  kasan_atomics+0x96/0x310
[   32.221048]  kunit_try_run_case+0x1b3/0x490
[   32.221627]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   32.222998]  kthread+0x257/0x310
[   32.223442]  ret_from_fork+0x41/0x80
[   32.223654]  ret_from_fork_asm+0x1a/0x30
[   32.223840] 
[   32.223936] The buggy address belongs to the object at ffff888101aba780
[   32.223936]  which belongs to the cache kmalloc-64 of size 64
[   32.225935] The buggy address is located 0 bytes to the right of
[   32.225935]  allocated 48-byte region [ffff888101aba780, ffff888101aba7b0)
[   32.226793] 
[   32.226896] The buggy address belongs to the physical page:
[   32.227304] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101aba
[   32.228713] flags: 0x200000000000000(node=0|zone=2)
[   32.229075] page_type: f5(slab)
[   32.229611] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   32.230577] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   32.231290] page dumped because: kasan: bad access detected
[   32.231812] 
[   32.232471] Memory state around the buggy address:
[   32.233356]  ffff888101aba680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.234070]  ffff888101aba700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.234605] >ffff888101aba780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   32.235208]                                      ^
[   32.235661]  ffff888101aba800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.236343]  ffff888101aba880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.236956] ==================================================================
[   30.285112] ==================================================================
[   30.286959] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x993/0x5450
[   30.287645] Write of size 4 at addr ffff888101aba7b0 by task kunit_try_catch/273
[   30.288600] 
[   30.288788] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241127 #1
[   30.290019] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.290717] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   30.291870] Call Trace:
[   30.292608]  <TASK>
[   30.292842]  dump_stack_lvl+0x73/0xb0
[   30.293747]  print_report+0xd1/0x640
[   30.294496]  ? __virt_addr_valid+0x1db/0x2d0
[   30.294926]  ? kasan_complete_mode_report_info+0x2a/0x200
[   30.295815]  kasan_report+0x102/0x140
[   30.296599]  ? kasan_atomics_helper+0x993/0x5450
[   30.297276]  ? kasan_atomics_helper+0x993/0x5450
[   30.297912]  kasan_check_range+0x10c/0x1c0
[   30.298669]  __kasan_check_write+0x18/0x20
[   30.299094]  kasan_atomics_helper+0x993/0x5450
[   30.300151]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   30.300586]  ? __kmalloc_cache_noprof+0x184/0x410
[   30.301038]  ? kasan_atomics+0x153/0x310
[   30.301921]  kasan_atomics+0x1dd/0x310
[   30.302654]  ? __pfx_kasan_atomics+0x10/0x10
[   30.303345]  ? __pfx_read_tsc+0x10/0x10
[   30.303821]  ? ktime_get_ts64+0x84/0x230
[   30.304630]  kunit_try_run_case+0x1b3/0x490
[   30.305450]  ? __pfx_kunit_try_run_case+0x10/0x10
[   30.305957]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   30.306455]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   30.307863]  ? __kthread_parkme+0x82/0x160
[   30.308380]  ? preempt_count_sub+0x50/0x80
[   30.308858]  ? __pfx_kunit_try_run_case+0x10/0x10
[   30.309705]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   30.310597]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   30.311766]  kthread+0x257/0x310
[   30.312104]  ? __pfx_kthread+0x10/0x10
[   30.313014]  ret_from_fork+0x41/0x80
[   30.313517]  ? __pfx_kthread+0x10/0x10
[   30.313924]  ret_from_fork_asm+0x1a/0x30
[   30.314938]  </TASK>
[   30.315154] 
[   30.315595] Allocated by task 273:
[   30.315864]  kasan_save_stack+0x3d/0x60
[   30.316666]  kasan_save_track+0x18/0x40
[   30.317605]  kasan_save_alloc_info+0x3b/0x50
[   30.318050]  __kasan_kmalloc+0xb7/0xc0
[   30.318844]  __kmalloc_cache_noprof+0x184/0x410
[   30.319658]  kasan_atomics+0x96/0x310
[   30.320577]  kunit_try_run_case+0x1b3/0x490
[   30.320963]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   30.321908]  kthread+0x257/0x310
[   30.322402]  ret_from_fork+0x41/0x80
[   30.322654]  ret_from_fork_asm+0x1a/0x30
[   30.323546] 
[   30.323767] The buggy address belongs to the object at ffff888101aba780
[   30.323767]  which belongs to the cache kmalloc-64 of size 64
[   30.325615] The buggy address is located 0 bytes to the right of
[   30.325615]  allocated 48-byte region [ffff888101aba780, ffff888101aba7b0)
[   30.327408] 
[   30.327588] The buggy address belongs to the physical page:
[   30.328503] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101aba
[   30.329367] flags: 0x200000000000000(node=0|zone=2)
[   30.329950] page_type: f5(slab)
[   30.330401] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   30.331541] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   30.332447] page dumped because: kasan: bad access detected
[   30.332776] 
[   30.333430] Memory state around the buggy address:
[   30.333950]  ffff888101aba680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   30.334595]  ffff888101aba700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   30.335636] >ffff888101aba780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   30.336401]                                      ^
[   30.337317]  ffff888101aba800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.338006]  ffff888101aba880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.339453] ==================================================================
[   32.237859] ==================================================================
[   32.238546] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x2007/0x5450
[   32.239299] Write of size 8 at addr ffff888101aba7b0 by task kunit_try_catch/273
[   32.239877] 
[   32.240119] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241127 #1
[   32.240930] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.241325] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   32.242077] Call Trace:
[   32.242406]  <TASK>
[   32.242712]  dump_stack_lvl+0x73/0xb0
[   32.243138]  print_report+0xd1/0x640
[   32.243440]  ? __virt_addr_valid+0x1db/0x2d0
[   32.243862]  ? kasan_complete_mode_report_info+0x2a/0x200
[   32.244519]  kasan_report+0x102/0x140
[   32.244839]  ? kasan_atomics_helper+0x2007/0x5450
[   32.245387]  ? kasan_atomics_helper+0x2007/0x5450
[   32.245979]  kasan_check_range+0x10c/0x1c0
[   32.246496]  __kasan_check_write+0x18/0x20
[   32.246957]  kasan_atomics_helper+0x2007/0x5450
[   32.247368]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   32.247925]  ? __kmalloc_cache_noprof+0x184/0x410
[   32.248429]  ? kasan_atomics+0x153/0x310
[   32.248819]  kasan_atomics+0x1dd/0x310
[   32.249250]  ? __pfx_kasan_atomics+0x10/0x10
[   32.249743]  ? __pfx_read_tsc+0x10/0x10
[   32.250159]  ? ktime_get_ts64+0x84/0x230
[   32.250662]  kunit_try_run_case+0x1b3/0x490
[   32.251211]  ? __pfx_kunit_try_run_case+0x10/0x10
[   32.251548]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   32.252184]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   32.252557]  ? __kthread_parkme+0x82/0x160
[   32.252861]  ? preempt_count_sub+0x50/0x80
[   32.253242]  ? __pfx_kunit_try_run_case+0x10/0x10
[   32.253844]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   32.254610]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   32.255077]  kthread+0x257/0x310
[   32.255351]  ? __pfx_kthread+0x10/0x10
[   32.255838]  ret_from_fork+0x41/0x80
[   32.256377]  ? __pfx_kthread+0x10/0x10
[   32.256856]  ret_from_fork_asm+0x1a/0x30
[   32.258267]  </TASK>
[   32.258614] 
[   32.258857] Allocated by task 273:
[   32.259229]  kasan_save_stack+0x3d/0x60
[   32.259646]  kasan_save_track+0x18/0x40
[   32.260650]  kasan_save_alloc_info+0x3b/0x50
[   32.261529]  __kasan_kmalloc+0xb7/0xc0
[   32.262065]  __kmalloc_cache_noprof+0x184/0x410
[   32.262536]  kasan_atomics+0x96/0x310
[   32.262844]  kunit_try_run_case+0x1b3/0x490
[   32.263359]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   32.263750]  kthread+0x257/0x310
[   32.264228]  ret_from_fork+0x41/0x80
[   32.264525]  ret_from_fork_asm+0x1a/0x30
[   32.264960] 
[   32.265193] The buggy address belongs to the object at ffff888101aba780
[   32.265193]  which belongs to the cache kmalloc-64 of size 64
[   32.266254] The buggy address is located 0 bytes to the right of
[   32.266254]  allocated 48-byte region [ffff888101aba780, ffff888101aba7b0)
[   32.267235] 
[   32.267471] The buggy address belongs to the physical page:
[   32.267892] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101aba
[   32.268674] flags: 0x200000000000000(node=0|zone=2)
[   32.269118] page_type: f5(slab)
[   32.269550] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   32.270211] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   32.270979] page dumped because: kasan: bad access detected
[   32.271404] 
[   32.271643] Memory state around the buggy address:
[   32.272226]  ffff888101aba680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.272662]  ffff888101aba700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.273434] >ffff888101aba780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   32.274084]                                      ^
[   32.274565]  ffff888101aba800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.275154]  ffff888101aba880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.275828] ==================================================================
[   31.508621] ==================================================================
[   31.510020] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x16e8/0x5450
[   31.511373] Write of size 8 at addr ffff888101aba7b0 by task kunit_try_catch/273
[   31.512491] 
[   31.512673] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241127 #1
[   31.513705] Tainted: [B]=BAD_PAGE, [N]=TEST
[   31.514074] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   31.515214] Call Trace:
[   31.515689]  <TASK>
[   31.516582]  dump_stack_lvl+0x73/0xb0
[   31.516963]  print_report+0xd1/0x640
[   31.517729]  ? __virt_addr_valid+0x1db/0x2d0
[   31.518721]  ? kasan_complete_mode_report_info+0x2a/0x200
[   31.519616]  kasan_report+0x102/0x140
[   31.520016]  ? kasan_atomics_helper+0x16e8/0x5450
[   31.521123]  ? kasan_atomics_helper+0x16e8/0x5450
[   31.521579]  kasan_check_range+0x10c/0x1c0
[   31.521999]  __kasan_check_write+0x18/0x20
[   31.522863]  kasan_atomics_helper+0x16e8/0x5450
[   31.523921]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   31.524827]  ? __kmalloc_cache_noprof+0x184/0x410
[   31.525399]  ? kasan_atomics+0x153/0x310
[   31.525825]  kasan_atomics+0x1dd/0x310
[   31.526743]  ? __pfx_kasan_atomics+0x10/0x10
[   31.527283]  ? __pfx_read_tsc+0x10/0x10
[   31.527855]  ? ktime_get_ts64+0x84/0x230
[   31.528541]  kunit_try_run_case+0x1b3/0x490
[   31.528969]  ? __pfx_kunit_try_run_case+0x10/0x10
[   31.529718]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   31.530435]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   31.531090]  ? __kthread_parkme+0x82/0x160
[   31.531731]  ? preempt_count_sub+0x50/0x80
[   31.532461]  ? __pfx_kunit_try_run_case+0x10/0x10
[   31.532889]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   31.533783]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   31.534332]  kthread+0x257/0x310
[   31.534521]  ? __pfx_kthread+0x10/0x10
[   31.534704]  ret_from_fork+0x41/0x80
[   31.534881]  ? __pfx_kthread+0x10/0x10
[   31.535141]  ret_from_fork_asm+0x1a/0x30
[   31.535460]  </TASK>
[   31.535908] 
[   31.536319] Allocated by task 273:
[   31.536566]  kasan_save_stack+0x3d/0x60
[   31.536848]  kasan_save_track+0x18/0x40
[   31.537313]  kasan_save_alloc_info+0x3b/0x50
[   31.538001]  __kasan_kmalloc+0xb7/0xc0
[   31.538323]  __kmalloc_cache_noprof+0x184/0x410
[   31.539167]  kasan_atomics+0x96/0x310
[   31.539769]  kunit_try_run_case+0x1b3/0x490
[   31.540374]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   31.541090]  kthread+0x257/0x310
[   31.541634]  ret_from_fork+0x41/0x80
[   31.542086]  ret_from_fork_asm+0x1a/0x30
[   31.542713] 
[   31.542947] The buggy address belongs to the object at ffff888101aba780
[   31.542947]  which belongs to the cache kmalloc-64 of size 64
[   31.544250] The buggy address is located 0 bytes to the right of
[   31.544250]  allocated 48-byte region [ffff888101aba780, ffff888101aba7b0)
[   31.545702] 
[   31.545807] The buggy address belongs to the physical page:
[   31.546072] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101aba
[   31.547565] flags: 0x200000000000000(node=0|zone=2)
[   31.548025] page_type: f5(slab)
[   31.548905] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   31.549708] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   31.551134] page dumped because: kasan: bad access detected
[   31.551648] 
[   31.551903] Memory state around the buggy address:
[   31.553089]  ffff888101aba680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   31.553765]  ffff888101aba700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   31.554587] >ffff888101aba780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   31.555782]                                      ^
[   31.556180]  ffff888101aba800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.557620]  ffff888101aba880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.558504] ==================================================================
[   30.693305] ==================================================================
[   30.694706] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf11/0x5450
[   30.695520] Write of size 4 at addr ffff888101aba7b0 by task kunit_try_catch/273
[   30.696571] 
[   30.696804] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241127 #1
[   30.697938] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.698459] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   30.699671] Call Trace:
[   30.699915]  <TASK>
[   30.700116]  dump_stack_lvl+0x73/0xb0
[   30.701009]  print_report+0xd1/0x640
[   30.701427]  ? __virt_addr_valid+0x1db/0x2d0
[   30.702172]  ? kasan_complete_mode_report_info+0x2a/0x200
[   30.702738]  kasan_report+0x102/0x140
[   30.703433]  ? kasan_atomics_helper+0xf11/0x5450
[   30.704121]  ? kasan_atomics_helper+0xf11/0x5450
[   30.704622]  kasan_check_range+0x10c/0x1c0
[   30.705381]  __kasan_check_write+0x18/0x20
[   30.706031]  kasan_atomics_helper+0xf11/0x5450
[   30.706800]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   30.707761]  ? __kmalloc_cache_noprof+0x184/0x410
[   30.708205]  ? kasan_atomics+0x153/0x310
[   30.708691]  kasan_atomics+0x1dd/0x310
[   30.709095]  ? __pfx_kasan_atomics+0x10/0x10
[   30.710098]  ? __pfx_read_tsc+0x10/0x10
[   30.710738]  ? ktime_get_ts64+0x84/0x230
[   30.711440]  kunit_try_run_case+0x1b3/0x490
[   30.711867]  ? __pfx_kunit_try_run_case+0x10/0x10
[   30.712650]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   30.713389]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   30.714082]  ? __kthread_parkme+0x82/0x160
[   30.714723]  ? preempt_count_sub+0x50/0x80
[   30.715400]  ? __pfx_kunit_try_run_case+0x10/0x10
[   30.715857]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   30.716356]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   30.717266]  kthread+0x257/0x310
[   30.717611]  ? __pfx_kthread+0x10/0x10
[   30.718200]  ret_from_fork+0x41/0x80
[   30.718796]  ? __pfx_kthread+0x10/0x10
[   30.719311]  ret_from_fork_asm+0x1a/0x30
[   30.719904]  </TASK>
[   30.720191] 
[   30.720572] Allocated by task 273:
[   30.721016]  kasan_save_stack+0x3d/0x60
[   30.721568]  kasan_save_track+0x18/0x40
[   30.722190]  kasan_save_alloc_info+0x3b/0x50
[   30.722681]  __kasan_kmalloc+0xb7/0xc0
[   30.723136]  __kmalloc_cache_noprof+0x184/0x410
[   30.723706]  kasan_atomics+0x96/0x310
[   30.724381]  kunit_try_run_case+0x1b3/0x490
[   30.724953]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   30.725622]  kthread+0x257/0x310
[   30.726357]  ret_from_fork+0x41/0x80
[   30.726748]  ret_from_fork_asm+0x1a/0x30
[   30.727500] 
[   30.727722] The buggy address belongs to the object at ffff888101aba780
[   30.727722]  which belongs to the cache kmalloc-64 of size 64
[   30.729093] The buggy address is located 0 bytes to the right of
[   30.729093]  allocated 48-byte region [ffff888101aba780, ffff888101aba7b0)
[   30.730302] 
[   30.730630] The buggy address belongs to the physical page:
[   30.731219] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101aba
[   30.732233] flags: 0x200000000000000(node=0|zone=2)
[   30.732617] page_type: f5(slab)
[   30.733029] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   30.733802] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   30.734798] page dumped because: kasan: bad access detected
[   30.735470] 
[   30.735711] Memory state around the buggy address:
[   30.736228]  ffff888101aba680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   30.737182]  ffff888101aba700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   30.737941] >ffff888101aba780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   30.738785]                                      ^
[   30.739397]  ffff888101aba800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.740184]  ffff888101aba880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.740837] ==================================================================
[   31.094269] ==================================================================
[   31.094697] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x12e7/0x5450
[   31.095255] Write of size 4 at addr ffff888101aba7b0 by task kunit_try_catch/273
[   31.096325] 
[   31.096502] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241127 #1
[   31.097312] Tainted: [B]=BAD_PAGE, [N]=TEST
[   31.098312] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   31.099657] Call Trace:
[   31.099795]  <TASK>
[   31.099916]  dump_stack_lvl+0x73/0xb0
[   31.100205]  print_report+0xd1/0x640
[   31.100796]  ? __virt_addr_valid+0x1db/0x2d0
[   31.101694]  ? kasan_complete_mode_report_info+0x2a/0x200
[   31.102191]  kasan_report+0x102/0x140
[   31.102949]  ? kasan_atomics_helper+0x12e7/0x5450
[   31.103598]  ? kasan_atomics_helper+0x12e7/0x5450
[   31.104168]  kasan_check_range+0x10c/0x1c0
[   31.104603]  __kasan_check_write+0x18/0x20
[   31.105554]  kasan_atomics_helper+0x12e7/0x5450
[   31.106074]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   31.106761]  ? __kmalloc_cache_noprof+0x184/0x410
[   31.107561]  ? kasan_atomics+0x153/0x310
[   31.107971]  kasan_atomics+0x1dd/0x310
[   31.108650]  ? __pfx_kasan_atomics+0x10/0x10
[   31.109570]  ? __pfx_read_tsc+0x10/0x10
[   31.109974]  ? ktime_get_ts64+0x84/0x230
[   31.110673]  kunit_try_run_case+0x1b3/0x490
[   31.111385]  ? __pfx_kunit_try_run_case+0x10/0x10
[   31.111853]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   31.112698]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   31.113560]  ? __kthread_parkme+0x82/0x160
[   31.114233]  ? preempt_count_sub+0x50/0x80
[   31.114660]  ? __pfx_kunit_try_run_case+0x10/0x10
[   31.115494]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   31.116128]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   31.116664]  kthread+0x257/0x310
[   31.117695]  ? __pfx_kthread+0x10/0x10
[   31.118536]  ret_from_fork+0x41/0x80
[   31.118949]  ? __pfx_kthread+0x10/0x10
[   31.119444]  ret_from_fork_asm+0x1a/0x30
[   31.120025]  </TASK>
[   31.120398] 
[   31.120650] Allocated by task 273:
[   31.121048]  kasan_save_stack+0x3d/0x60
[   31.121489]  kasan_save_track+0x18/0x40
[   31.121879]  kasan_save_alloc_info+0x3b/0x50
[   31.122318]  __kasan_kmalloc+0xb7/0xc0
[   31.123032]  __kmalloc_cache_noprof+0x184/0x410
[   31.123347]  kasan_atomics+0x96/0x310
[   31.123893]  kunit_try_run_case+0x1b3/0x490
[   31.124391]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   31.124855]  kthread+0x257/0x310
[   31.125522]  ret_from_fork+0x41/0x80
[   31.125977]  ret_from_fork_asm+0x1a/0x30
[   31.126312] 
[   31.126551] The buggy address belongs to the object at ffff888101aba780
[   31.126551]  which belongs to the cache kmalloc-64 of size 64
[   31.127624] The buggy address is located 0 bytes to the right of
[   31.127624]  allocated 48-byte region [ffff888101aba780, ffff888101aba7b0)
[   31.128963] 
[   31.129144] The buggy address belongs to the physical page:
[   31.129803] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101aba
[   31.130377] flags: 0x200000000000000(node=0|zone=2)
[   31.130934] page_type: f5(slab)
[   31.131200] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   31.132033] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   31.133201] page dumped because: kasan: bad access detected
[   31.133758] 
[   31.133925] Memory state around the buggy address:
[   31.134540]  ffff888101aba680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   31.135149]  ffff888101aba700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   31.135959] >ffff888101aba780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   31.136605]                                      ^
[   31.137171]  ffff888101aba800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.137695]  ffff888101aba880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.138661] ==================================================================
[   31.654734] ==================================================================
[   31.655206] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x18b2/0x5450
[   31.656049] Write of size 8 at addr ffff888101aba7b0 by task kunit_try_catch/273
[   31.656831] 
[   31.657020] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241127 #1
[   31.658678] Tainted: [B]=BAD_PAGE, [N]=TEST
[   31.659024] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   31.659801] Call Trace:
[   31.660277]  <TASK>
[   31.660626]  dump_stack_lvl+0x73/0xb0
[   31.661109]  print_report+0xd1/0x640
[   31.661465]  ? __virt_addr_valid+0x1db/0x2d0
[   31.661962]  ? kasan_complete_mode_report_info+0x2a/0x200
[   31.662716]  kasan_report+0x102/0x140
[   31.663255]  ? kasan_atomics_helper+0x18b2/0x5450
[   31.663870]  ? kasan_atomics_helper+0x18b2/0x5450
[   31.664391]  kasan_check_range+0x10c/0x1c0
[   31.664917]  __kasan_check_write+0x18/0x20
[   31.665359]  kasan_atomics_helper+0x18b2/0x5450
[   31.666011]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   31.666576]  ? __kmalloc_cache_noprof+0x184/0x410
[   31.667266]  ? kasan_atomics+0x153/0x310
[   31.667598]  kasan_atomics+0x1dd/0x310
[   31.668144]  ? __pfx_kasan_atomics+0x10/0x10
[   31.668687]  ? __pfx_read_tsc+0x10/0x10
[   31.669243]  ? ktime_get_ts64+0x84/0x230
[   31.669686]  kunit_try_run_case+0x1b3/0x490
[   31.670295]  ? __pfx_kunit_try_run_case+0x10/0x10
[   31.670852]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   31.671479]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   31.672083]  ? __kthread_parkme+0x82/0x160
[   31.672530]  ? preempt_count_sub+0x50/0x80
[   31.672960]  ? __pfx_kunit_try_run_case+0x10/0x10
[   31.673543]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   31.674211]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   31.674836]  kthread+0x257/0x310
[   31.675279]  ? __pfx_kthread+0x10/0x10
[   31.675710]  ret_from_fork+0x41/0x80
[   31.676005]  ? __pfx_kthread+0x10/0x10
[   31.676453]  ret_from_fork_asm+0x1a/0x30
[   31.677065]  </TASK>
[   31.677377] 
[   31.677638] Allocated by task 273:
[   31.678074]  kasan_save_stack+0x3d/0x60
[   31.678471]  kasan_save_track+0x18/0x40
[   31.678999]  kasan_save_alloc_info+0x3b/0x50
[   31.679512]  __kasan_kmalloc+0xb7/0xc0
[   31.680026]  __kmalloc_cache_noprof+0x184/0x410
[   31.680537]  kasan_atomics+0x96/0x310
[   31.680882]  kunit_try_run_case+0x1b3/0x490
[   31.681207]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   31.682146]  kthread+0x257/0x310
[   31.682668]  ret_from_fork+0x41/0x80
[   31.683027]  ret_from_fork_asm+0x1a/0x30
[   31.683463] 
[   31.683741] The buggy address belongs to the object at ffff888101aba780
[   31.683741]  which belongs to the cache kmalloc-64 of size 64
[   31.684926] The buggy address is located 0 bytes to the right of
[   31.684926]  allocated 48-byte region [ffff888101aba780, ffff888101aba7b0)
[   31.686216] 
[   31.686436] The buggy address belongs to the physical page:
[   31.686778] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101aba
[   31.687640] flags: 0x200000000000000(node=0|zone=2)
[   31.688096] page_type: f5(slab)
[   31.688336] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   31.689401] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   31.690102] page dumped because: kasan: bad access detected
[   31.690538] 
[   31.690697] Memory state around the buggy address:
[   31.691307]  ffff888101aba680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   31.691976]  ffff888101aba700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   31.692686] >ffff888101aba780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   31.693447]                                      ^
[   31.694023]  ffff888101aba800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.694587]  ffff888101aba880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.695523] ==================================================================
[   30.429584] ==================================================================
[   30.430209] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xb6b/0x5450
[   30.430924] Write of size 4 at addr ffff888101aba7b0 by task kunit_try_catch/273
[   30.431718] 
[   30.431905] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241127 #1
[   30.432832] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.433367] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   30.434172] Call Trace:
[   30.434520]  <TASK>
[   30.434743]  dump_stack_lvl+0x73/0xb0
[   30.435275]  print_report+0xd1/0x640
[   30.435572]  ? __virt_addr_valid+0x1db/0x2d0
[   30.436123]  ? kasan_complete_mode_report_info+0x2a/0x200
[   30.436683]  kasan_report+0x102/0x140
[   30.437049]  ? kasan_atomics_helper+0xb6b/0x5450
[   30.437590]  ? kasan_atomics_helper+0xb6b/0x5450
[   30.438205]  kasan_check_range+0x10c/0x1c0
[   30.438664]  __kasan_check_write+0x18/0x20
[   30.439242]  kasan_atomics_helper+0xb6b/0x5450
[   30.439615]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   30.440214]  ? __kmalloc_cache_noprof+0x184/0x410
[   30.440732]  ? kasan_atomics+0x153/0x310
[   30.441138]  kasan_atomics+0x1dd/0x310
[   30.441662]  ? __pfx_kasan_atomics+0x10/0x10
[   30.442187]  ? __pfx_read_tsc+0x10/0x10
[   30.442564]  ? ktime_get_ts64+0x84/0x230
[   30.443747]  kunit_try_run_case+0x1b3/0x490
[   30.444337]  ? __pfx_kunit_try_run_case+0x10/0x10
[   30.444771]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   30.445247]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   30.445690]  ? __kthread_parkme+0x82/0x160
[   30.446557]  ? preempt_count_sub+0x50/0x80
[   30.447023]  ? __pfx_kunit_try_run_case+0x10/0x10
[   30.447557]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   30.448164]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   30.448700]  kthread+0x257/0x310
[   30.449225]  ? __pfx_kthread+0x10/0x10
[   30.449617]  ret_from_fork+0x41/0x80
[   30.450295]  ? __pfx_kthread+0x10/0x10
[   30.450699]  ret_from_fork_asm+0x1a/0x30
[   30.451451]  </TASK>
[   30.451636] 
[   30.451793] Allocated by task 273:
[   30.452174]  kasan_save_stack+0x3d/0x60
[   30.452647]  kasan_save_track+0x18/0x40
[   30.453642]  kasan_save_alloc_info+0x3b/0x50
[   30.454213]  __kasan_kmalloc+0xb7/0xc0
[   30.454689]  __kmalloc_cache_noprof+0x184/0x410
[   30.455210]  kasan_atomics+0x96/0x310
[   30.455487]  kunit_try_run_case+0x1b3/0x490
[   30.456003]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   30.456619]  kthread+0x257/0x310
[   30.456965]  ret_from_fork+0x41/0x80
[   30.457304]  ret_from_fork_asm+0x1a/0x30
[   30.457794] 
[   30.458097] The buggy address belongs to the object at ffff888101aba780
[   30.458097]  which belongs to the cache kmalloc-64 of size 64
[   30.459124] The buggy address is located 0 bytes to the right of
[   30.459124]  allocated 48-byte region [ffff888101aba780, ffff888101aba7b0)
[   30.459941] 
[   30.460248] The buggy address belongs to the physical page:
[   30.460796] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101aba
[   30.461589] flags: 0x200000000000000(node=0|zone=2)
[   30.462062] page_type: f5(slab)
[   30.462318] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   30.463170] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   30.463776] page dumped because: kasan: bad access detected
[   30.464337] 
[   30.464567] Memory state around the buggy address:
[   30.464869]  ffff888101aba680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   30.465664]  ffff888101aba700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   30.466394] >ffff888101aba780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   30.466820]                                      ^
[   30.467402]  ffff888101aba800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.467954]  ffff888101aba880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.468585] ==================================================================
[   29.905596] ==================================================================
[   29.906448] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b3c/0x5450
[   29.907831] Write of size 4 at addr ffff888101aba7b0 by task kunit_try_catch/273
[   29.908369] 
[   29.908640] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241127 #1
[   29.910182] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.910941] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   29.912284] Call Trace:
[   29.912615]  <TASK>
[   29.913056]  dump_stack_lvl+0x73/0xb0
[   29.913839]  print_report+0xd1/0x640
[   29.914434]  ? __virt_addr_valid+0x1db/0x2d0
[   29.914910]  ? kasan_complete_mode_report_info+0x2a/0x200
[   29.915773]  kasan_report+0x102/0x140
[   29.916479]  ? kasan_atomics_helper+0x4b3c/0x5450
[   29.917070]  ? kasan_atomics_helper+0x4b3c/0x5450
[   29.918002]  __asan_report_store4_noabort+0x1b/0x30
[   29.918815]  kasan_atomics_helper+0x4b3c/0x5450
[   29.919525]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   29.920210]  ? __kmalloc_cache_noprof+0x184/0x410
[   29.920779]  ? kasan_atomics+0x153/0x310
[   29.921433]  kasan_atomics+0x1dd/0x310
[   29.922336]  ? __pfx_kasan_atomics+0x10/0x10
[   29.922840]  ? __pfx_read_tsc+0x10/0x10
[   29.923466]  ? ktime_get_ts64+0x84/0x230
[   29.924593]  kunit_try_run_case+0x1b3/0x490
[   29.925585]  ? __pfx_kunit_try_run_case+0x10/0x10
[   29.926091]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   29.926804]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   29.927375]  ? __kthread_parkme+0x82/0x160
[   29.927828]  ? preempt_count_sub+0x50/0x80
[   29.928445]  ? __pfx_kunit_try_run_case+0x10/0x10
[   29.928836]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   29.929576]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   29.930333]  kthread+0x257/0x310
[   29.930865]  ? __pfx_kthread+0x10/0x10
[   29.931584]  ret_from_fork+0x41/0x80
[   29.931920]  ? __pfx_kthread+0x10/0x10
[   29.932500]  ret_from_fork_asm+0x1a/0x30
[   29.933250]  </TASK>
[   29.933463] 
[   29.933769] Allocated by task 273:
[   29.934152]  kasan_save_stack+0x3d/0x60
[   29.934745]  kasan_save_track+0x18/0x40
[   29.935237]  kasan_save_alloc_info+0x3b/0x50
[   29.935853]  __kasan_kmalloc+0xb7/0xc0
[   29.936662]  __kmalloc_cache_noprof+0x184/0x410
[   29.937126]  kasan_atomics+0x96/0x310
[   29.937411]  kunit_try_run_case+0x1b3/0x490
[   29.938131]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   29.938941]  kthread+0x257/0x310
[   29.939520]  ret_from_fork+0x41/0x80
[   29.940201]  ret_from_fork_asm+0x1a/0x30
[   29.940638] 
[   29.941024] The buggy address belongs to the object at ffff888101aba780
[   29.941024]  which belongs to the cache kmalloc-64 of size 64
[   29.942314] The buggy address is located 0 bytes to the right of
[   29.942314]  allocated 48-byte region [ffff888101aba780, ffff888101aba7b0)
[   29.943844] 
[   29.944291] The buggy address belongs to the physical page:
[   29.944811] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101aba
[   29.945555] flags: 0x200000000000000(node=0|zone=2)
[   29.946210] page_type: f5(slab)
[   29.946806] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   29.947919] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   29.948675] page dumped because: kasan: bad access detected
[   29.949080] 
[   29.949309] Memory state around the buggy address:
[   29.949832]  ffff888101aba680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.950516]  ffff888101aba700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.951674] >ffff888101aba780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   29.953077]                                      ^
[   29.953583]  ffff888101aba800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.954273]  ffff888101aba880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.955590] ==================================================================
[   32.276713] ==================================================================
[   32.277629] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4f9a/0x5450
[   32.280121] Read of size 8 at addr ffff888101aba7b0 by task kunit_try_catch/273
[   32.280562] 
[   32.280782] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241127 #1
[   32.281739] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.282220] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   32.282939] Call Trace:
[   32.283389]  <TASK>
[   32.283732]  dump_stack_lvl+0x73/0xb0
[   32.284212]  print_report+0xd1/0x640
[   32.284498]  ? __virt_addr_valid+0x1db/0x2d0
[   32.285142]  ? kasan_complete_mode_report_info+0x2a/0x200
[   32.285815]  kasan_report+0x102/0x140
[   32.286269]  ? kasan_atomics_helper+0x4f9a/0x5450
[   32.286833]  ? kasan_atomics_helper+0x4f9a/0x5450
[   32.287306]  __asan_report_load8_noabort+0x18/0x20
[   32.287860]  kasan_atomics_helper+0x4f9a/0x5450
[   32.288358]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   32.288741]  ? __kmalloc_cache_noprof+0x184/0x410
[   32.289396]  ? kasan_atomics+0x153/0x310
[   32.289803]  kasan_atomics+0x1dd/0x310
[   32.290283]  ? __pfx_kasan_atomics+0x10/0x10
[   32.290645]  ? __pfx_read_tsc+0x10/0x10
[   32.291204]  ? ktime_get_ts64+0x84/0x230
[   32.291564]  kunit_try_run_case+0x1b3/0x490
[   32.292143]  ? __pfx_kunit_try_run_case+0x10/0x10
[   32.292541]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   32.293007]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   32.293432]  ? __kthread_parkme+0x82/0x160
[   32.293958]  ? preempt_count_sub+0x50/0x80
[   32.294404]  ? __pfx_kunit_try_run_case+0x10/0x10
[   32.294855]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   32.295519]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   32.296160]  kthread+0x257/0x310
[   32.296516]  ? __pfx_kthread+0x10/0x10
[   32.296971]  ret_from_fork+0x41/0x80
[   32.297361]  ? __pfx_kthread+0x10/0x10
[   32.297818]  ret_from_fork_asm+0x1a/0x30
[   32.298394]  </TASK>
[   32.298652] 
[   32.298810] Allocated by task 273:
[   32.299219]  kasan_save_stack+0x3d/0x60
[   32.299726]  kasan_save_track+0x18/0x40
[   32.300149]  kasan_save_alloc_info+0x3b/0x50
[   32.300549]  __kasan_kmalloc+0xb7/0xc0
[   32.300957]  __kmalloc_cache_noprof+0x184/0x410
[   32.301463]  kasan_atomics+0x96/0x310
[   32.301865]  kunit_try_run_case+0x1b3/0x490
[   32.302411]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   32.302932]  kthread+0x257/0x310
[   32.303247]  ret_from_fork+0x41/0x80
[   32.303710]  ret_from_fork_asm+0x1a/0x30
[   32.304271] 
[   32.304429] The buggy address belongs to the object at ffff888101aba780
[   32.304429]  which belongs to the cache kmalloc-64 of size 64
[   32.305583] The buggy address is located 0 bytes to the right of
[   32.305583]  allocated 48-byte region [ffff888101aba780, ffff888101aba7b0)
[   32.306627] 
[   32.306871] The buggy address belongs to the physical page:
[   32.307439] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101aba
[   32.308086] flags: 0x200000000000000(node=0|zone=2)
[   32.308401] page_type: f5(slab)
[   32.308728] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   32.309658] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   32.310425] page dumped because: kasan: bad access detected
[   32.310869] 
[   32.311135] Memory state around the buggy address:
[   32.311530]  ffff888101aba680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.312228]  ffff888101aba700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.312793] >ffff888101aba780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   32.313456]                                      ^
[   32.313875]  ffff888101aba800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.314497]  ffff888101aba880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.315160] ==================================================================
[   31.976078] ==================================================================
[   31.976566] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1ce2/0x5450
[   31.977502] Write of size 8 at addr ffff888101aba7b0 by task kunit_try_catch/273
[   31.978012] 
[   31.978336] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241127 #1
[   31.979540] Tainted: [B]=BAD_PAGE, [N]=TEST
[   31.979950] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   31.980810] Call Trace:
[   31.981305]  <TASK>
[   31.981654]  dump_stack_lvl+0x73/0xb0
[   31.982115]  print_report+0xd1/0x640
[   31.982611]  ? __virt_addr_valid+0x1db/0x2d0
[   31.983650]  ? kasan_complete_mode_report_info+0x2a/0x200
[   31.984907]  kasan_report+0x102/0x140
[   31.985533]  ? kasan_atomics_helper+0x1ce2/0x5450
[   31.986248]  ? kasan_atomics_helper+0x1ce2/0x5450
[   31.986747]  kasan_check_range+0x10c/0x1c0
[   31.987215]  __kasan_check_write+0x18/0x20
[   31.987647]  kasan_atomics_helper+0x1ce2/0x5450
[   31.988606]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   31.989338]  ? __kmalloc_cache_noprof+0x184/0x410
[   31.989754]  ? kasan_atomics+0x153/0x310
[   31.990554]  kasan_atomics+0x1dd/0x310
[   31.991017]  ? __pfx_kasan_atomics+0x10/0x10
[   31.991766]  ? __pfx_read_tsc+0x10/0x10
[   31.992540]  ? ktime_get_ts64+0x84/0x230
[   31.993012]  kunit_try_run_case+0x1b3/0x490
[   31.993704]  ? __pfx_kunit_try_run_case+0x10/0x10
[   31.994457]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   31.994917]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   31.995800]  ? __kthread_parkme+0x82/0x160
[   31.996218]  ? preempt_count_sub+0x50/0x80
[   31.996423]  ? __pfx_kunit_try_run_case+0x10/0x10
[   31.996638]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   31.996887]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   31.997338]  kthread+0x257/0x310
[   31.998011]  ? __pfx_kthread+0x10/0x10
[   31.998664]  ret_from_fork+0x41/0x80
[   31.999458]  ? __pfx_kthread+0x10/0x10
[   32.000309]  ret_from_fork_asm+0x1a/0x30
[   32.001234]  </TASK>
[   32.001438] 
[   32.001797] Allocated by task 273:
[   32.002649]  kasan_save_stack+0x3d/0x60
[   32.003137]  kasan_save_track+0x18/0x40
[   32.003955]  kasan_save_alloc_info+0x3b/0x50
[   32.004858]  __kasan_kmalloc+0xb7/0xc0
[   32.005174]  __kmalloc_cache_noprof+0x184/0x410
[   32.005939]  kasan_atomics+0x96/0x310
[   32.006431]  kunit_try_run_case+0x1b3/0x490
[   32.006795]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   32.007736]  kthread+0x257/0x310
[   32.008447]  ret_from_fork+0x41/0x80
[   32.008815]  ret_from_fork_asm+0x1a/0x30
[   32.009410] 
[   32.009614] The buggy address belongs to the object at ffff888101aba780
[   32.009614]  which belongs to the cache kmalloc-64 of size 64
[   32.011498] The buggy address is located 0 bytes to the right of
[   32.011498]  allocated 48-byte region [ffff888101aba780, ffff888101aba7b0)
[   32.012034] 
[   32.012348] The buggy address belongs to the physical page:
[   32.013656] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101aba
[   32.014407] flags: 0x200000000000000(node=0|zone=2)
[   32.014849] page_type: f5(slab)
[   32.015183] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   32.015820] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   32.017071] page dumped because: kasan: bad access detected
[   32.017928] 
[   32.018308] Memory state around the buggy address:
[   32.018809]  ffff888101aba680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.019816]  ffff888101aba700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.020969] >ffff888101aba780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   32.021925]                                      ^
[   32.022570]  ffff888101aba800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.023442]  ffff888101aba880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.024186] ==================================================================
[   31.884652] ==================================================================
[   31.886241] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1c19/0x5450
[   31.886867] Write of size 8 at addr ffff888101aba7b0 by task kunit_try_catch/273
[   31.887791] 
[   31.888066] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241127 #1
[   31.889937] Tainted: [B]=BAD_PAGE, [N]=TEST
[   31.890468] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   31.892143] Call Trace:
[   31.892376]  <TASK>
[   31.892802]  dump_stack_lvl+0x73/0xb0
[   31.893348]  print_report+0xd1/0x640
[   31.893842]  ? __virt_addr_valid+0x1db/0x2d0
[   31.894309]  ? kasan_complete_mode_report_info+0x2a/0x200
[   31.895172]  kasan_report+0x102/0x140
[   31.896260]  ? kasan_atomics_helper+0x1c19/0x5450
[   31.896776]  ? kasan_atomics_helper+0x1c19/0x5450
[   31.897500]  kasan_check_range+0x10c/0x1c0
[   31.898030]  __kasan_check_write+0x18/0x20
[   31.898808]  kasan_atomics_helper+0x1c19/0x5450
[   31.899228]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   31.899804]  ? __kmalloc_cache_noprof+0x184/0x410
[   31.900343]  ? kasan_atomics+0x153/0x310
[   31.900660]  kasan_atomics+0x1dd/0x310
[   31.901209]  ? __pfx_kasan_atomics+0x10/0x10
[   31.901864]  ? __pfx_read_tsc+0x10/0x10
[   31.902360]  ? ktime_get_ts64+0x84/0x230
[   31.902665]  kunit_try_run_case+0x1b3/0x490
[   31.903382]  ? __pfx_kunit_try_run_case+0x10/0x10
[   31.903927]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   31.904454]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   31.904809]  ? __kthread_parkme+0x82/0x160
[   31.905550]  ? preempt_count_sub+0x50/0x80
[   31.906080]  ? __pfx_kunit_try_run_case+0x10/0x10
[   31.906640]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   31.907524]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   31.907909]  kthread+0x257/0x310
[   31.908432]  ? __pfx_kthread+0x10/0x10
[   31.908813]  ret_from_fork+0x41/0x80
[   31.909371]  ? __pfx_kthread+0x10/0x10
[   31.909851]  ret_from_fork_asm+0x1a/0x30
[   31.910448]  </TASK>
[   31.910832] 
[   31.911239] Allocated by task 273:
[   31.911795]  kasan_save_stack+0x3d/0x60
[   31.912225]  kasan_save_track+0x18/0x40
[   31.912814]  kasan_save_alloc_info+0x3b/0x50
[   31.913262]  __kasan_kmalloc+0xb7/0xc0
[   31.913657]  __kmalloc_cache_noprof+0x184/0x410
[   31.914189]  kasan_atomics+0x96/0x310
[   31.914692]  kunit_try_run_case+0x1b3/0x490
[   31.915258]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   31.915853]  kthread+0x257/0x310
[   31.916394]  ret_from_fork+0x41/0x80
[   31.916673]  ret_from_fork_asm+0x1a/0x30
[   31.917254] 
[   31.917675] The buggy address belongs to the object at ffff888101aba780
[   31.917675]  which belongs to the cache kmalloc-64 of size 64
[   31.918575] The buggy address is located 0 bytes to the right of
[   31.918575]  allocated 48-byte region [ffff888101aba780, ffff888101aba7b0)
[   31.919927] 
[   31.920534] The buggy address belongs to the physical page:
[   31.920873] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101aba
[   31.921828] flags: 0x200000000000000(node=0|zone=2)
[   31.922370] page_type: f5(slab)
[   31.922854] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   31.923663] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   31.924606] page dumped because: kasan: bad access detected
[   31.925146] 
[   31.925462] Memory state around the buggy address:
[   31.926099]  ffff888101aba680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   31.926759]  ffff888101aba700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   31.927707] >ffff888101aba780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   31.928405]                                      ^
[   31.929001]  ffff888101aba800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.929636]  ffff888101aba880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.930319] ==================================================================
[   32.066773] ==================================================================
[   32.067469] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1e13/0x5450
[   32.068267] Write of size 8 at addr ffff888101aba7b0 by task kunit_try_catch/273
[   32.068876] 
[   32.069372] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241127 #1
[   32.070072] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.070514] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   32.072254] Call Trace:
[   32.072617]  <TASK>
[   32.072942]  dump_stack_lvl+0x73/0xb0
[   32.073613]  print_report+0xd1/0x640
[   32.073804]  ? __virt_addr_valid+0x1db/0x2d0
[   32.074078]  ? kasan_complete_mode_report_info+0x2a/0x200
[   32.075210]  kasan_report+0x102/0x140
[   32.076096]  ? kasan_atomics_helper+0x1e13/0x5450
[   32.077064]  ? kasan_atomics_helper+0x1e13/0x5450
[   32.077406]  kasan_check_range+0x10c/0x1c0
[   32.077710]  __kasan_check_write+0x18/0x20
[   32.078082]  kasan_atomics_helper+0x1e13/0x5450
[   32.078804]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   32.079632]  ? __kmalloc_cache_noprof+0x184/0x410
[   32.080430]  ? kasan_atomics+0x153/0x310
[   32.080811]  kasan_atomics+0x1dd/0x310
[   32.081737]  ? __pfx_kasan_atomics+0x10/0x10
[   32.082925]  ? __pfx_read_tsc+0x10/0x10
[   32.083382]  ? ktime_get_ts64+0x84/0x230
[   32.083834]  kunit_try_run_case+0x1b3/0x490
[   32.084267]  ? __pfx_kunit_try_run_case+0x10/0x10
[   32.084604]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   32.085154]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   32.085626]  ? __kthread_parkme+0x82/0x160
[   32.086014]  ? preempt_count_sub+0x50/0x80
[   32.086428]  ? __pfx_kunit_try_run_case+0x10/0x10
[   32.086875]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   32.087485]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   32.088134]  kthread+0x257/0x310
[   32.088553]  ? __pfx_kthread+0x10/0x10
[   32.088977]  ret_from_fork+0x41/0x80
[   32.089499]  ? __pfx_kthread+0x10/0x10
[   32.089808]  ret_from_fork_asm+0x1a/0x30
[   32.090376]  </TASK>
[   32.090678] 
[   32.090921] Allocated by task 273:
[   32.091314]  kasan_save_stack+0x3d/0x60
[   32.091694]  kasan_save_track+0x18/0x40
[   32.092061]  kasan_save_alloc_info+0x3b/0x50
[   32.092597]  __kasan_kmalloc+0xb7/0xc0
[   32.093072]  __kmalloc_cache_noprof+0x184/0x410
[   32.093379]  kasan_atomics+0x96/0x310
[   32.093845]  kunit_try_run_case+0x1b3/0x490
[   32.094301]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   32.094775]  kthread+0x257/0x310
[   32.095261]  ret_from_fork+0x41/0x80
[   32.095745]  ret_from_fork_asm+0x1a/0x30
[   32.096224] 
[   32.096459] The buggy address belongs to the object at ffff888101aba780
[   32.096459]  which belongs to the cache kmalloc-64 of size 64
[   32.097178] The buggy address is located 0 bytes to the right of
[   32.097178]  allocated 48-byte region [ffff888101aba780, ffff888101aba7b0)
[   32.098427] 
[   32.098587] The buggy address belongs to the physical page:
[   32.099196] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101aba
[   32.100046] flags: 0x200000000000000(node=0|zone=2)
[   32.100453] page_type: f5(slab)
[   32.100799] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   32.101353] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   32.102266] page dumped because: kasan: bad access detected
[   32.102784] 
[   32.103046] Memory state around the buggy address:
[   32.103459]  ffff888101aba680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.104077]  ffff888101aba700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.104592] >ffff888101aba780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   32.105276]                                      ^
[   32.105793]  ffff888101aba800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.106455]  ffff888101aba880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.106979] ==================================================================
[   32.481874] ==================================================================
[   32.482864] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x224d/0x5450
[   32.483625] Write of size 8 at addr ffff888101aba7b0 by task kunit_try_catch/273
[   32.484571] 
[   32.484796] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241127 #1
[   32.486501] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.486855] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   32.487864] Call Trace:
[   32.488278]  <TASK>
[   32.488514]  dump_stack_lvl+0x73/0xb0
[   32.488943]  print_report+0xd1/0x640
[   32.489523]  ? __virt_addr_valid+0x1db/0x2d0
[   32.490524]  ? kasan_complete_mode_report_info+0x2a/0x200
[   32.491357]  kasan_report+0x102/0x140
[   32.491964]  ? kasan_atomics_helper+0x224d/0x5450
[   32.492529]  ? kasan_atomics_helper+0x224d/0x5450
[   32.493371]  kasan_check_range+0x10c/0x1c0
[   32.493881]  __kasan_check_write+0x18/0x20
[   32.494865]  kasan_atomics_helper+0x224d/0x5450
[   32.495928]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   32.496526]  ? __kmalloc_cache_noprof+0x184/0x410
[   32.496965]  ? kasan_atomics+0x153/0x310
[   32.497872]  kasan_atomics+0x1dd/0x310
[   32.498623]  ? __pfx_kasan_atomics+0x10/0x10
[   32.499039]  ? __pfx_read_tsc+0x10/0x10
[   32.499658]  ? ktime_get_ts64+0x84/0x230
[   32.500608]  kunit_try_run_case+0x1b3/0x490
[   32.501036]  ? __pfx_kunit_try_run_case+0x10/0x10
[   32.501782]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   32.502550]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   32.503020]  ? __kthread_parkme+0x82/0x160
[   32.503722]  ? preempt_count_sub+0x50/0x80
[   32.504526]  ? __pfx_kunit_try_run_case+0x10/0x10
[   32.505594]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   32.506266]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   32.506522]  kthread+0x257/0x310
[   32.506690]  ? __pfx_kthread+0x10/0x10
[   32.506873]  ret_from_fork+0x41/0x80
[   32.507122]  ? __pfx_kthread+0x10/0x10
[   32.507409]  ret_from_fork_asm+0x1a/0x30
[   32.508003]  </TASK>
[   32.508814] 
[   32.509223] Allocated by task 273:
[   32.509483]  kasan_save_stack+0x3d/0x60
[   32.509869]  kasan_save_track+0x18/0x40
[   32.510564]  kasan_save_alloc_info+0x3b/0x50
[   32.511282]  __kasan_kmalloc+0xb7/0xc0
[   32.511679]  __kmalloc_cache_noprof+0x184/0x410
[   32.512952]  kasan_atomics+0x96/0x310
[   32.513372]  kunit_try_run_case+0x1b3/0x490
[   32.514029]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   32.514858]  kthread+0x257/0x310
[   32.515788]  ret_from_fork+0x41/0x80
[   32.516244]  ret_from_fork_asm+0x1a/0x30
[   32.516525] 
[   32.517036] The buggy address belongs to the object at ffff888101aba780
[   32.517036]  which belongs to the cache kmalloc-64 of size 64
[   32.518202] The buggy address is located 0 bytes to the right of
[   32.518202]  allocated 48-byte region [ffff888101aba780, ffff888101aba7b0)
[   32.519275] 
[   32.519558] The buggy address belongs to the physical page:
[   32.520135] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101aba
[   32.521001] flags: 0x200000000000000(node=0|zone=2)
[   32.521943] page_type: f5(slab)
[   32.522649] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   32.523889] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   32.524923] page dumped because: kasan: bad access detected
[   32.525474] 
[   32.525709] Memory state around the buggy address:
[   32.526921]  ffff888101aba680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.527760]  ffff888101aba700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.528824] >ffff888101aba780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   32.529810]                                      ^
[   32.530127]  ffff888101aba800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.530953]  ffff888101aba880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.531875] ==================================================================
[   31.052697] ==================================================================
[   31.053461] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x49ea/0x5450
[   31.054209] Read of size 4 at addr ffff888101aba7b0 by task kunit_try_catch/273
[   31.054747] 
[   31.054915] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241127 #1
[   31.056203] Tainted: [B]=BAD_PAGE, [N]=TEST
[   31.056617] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   31.057459] Call Trace:
[   31.057669]  <TASK>
[   31.057956]  dump_stack_lvl+0x73/0xb0
[   31.058627]  print_report+0xd1/0x640
[   31.059180]  ? __virt_addr_valid+0x1db/0x2d0
[   31.059582]  ? kasan_complete_mode_report_info+0x2a/0x200
[   31.060387]  kasan_report+0x102/0x140
[   31.060833]  ? kasan_atomics_helper+0x49ea/0x5450
[   31.061748]  ? kasan_atomics_helper+0x49ea/0x5450
[   31.062478]  __asan_report_load4_noabort+0x18/0x20
[   31.063088]  kasan_atomics_helper+0x49ea/0x5450
[   31.063605]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   31.064240]  ? __kmalloc_cache_noprof+0x184/0x410
[   31.064658]  ? kasan_atomics+0x153/0x310
[   31.065308]  kasan_atomics+0x1dd/0x310
[   31.065691]  ? __pfx_kasan_atomics+0x10/0x10
[   31.066327]  ? __pfx_read_tsc+0x10/0x10
[   31.066903]  ? ktime_get_ts64+0x84/0x230
[   31.067498]  kunit_try_run_case+0x1b3/0x490
[   31.067996]  ? __pfx_kunit_try_run_case+0x10/0x10
[   31.068665]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   31.069141]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   31.069806]  ? __kthread_parkme+0x82/0x160
[   31.070206]  ? preempt_count_sub+0x50/0x80
[   31.070820]  ? __pfx_kunit_try_run_case+0x10/0x10
[   31.071266]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   31.071850]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   31.072461]  kthread+0x257/0x310
[   31.072835]  ? __pfx_kthread+0x10/0x10
[   31.073415]  ret_from_fork+0x41/0x80
[   31.073887]  ? __pfx_kthread+0x10/0x10
[   31.074357]  ret_from_fork_asm+0x1a/0x30
[   31.074915]  </TASK>
[   31.075319] 
[   31.075481] Allocated by task 273:
[   31.075894]  kasan_save_stack+0x3d/0x60
[   31.076380]  kasan_save_track+0x18/0x40
[   31.076733]  kasan_save_alloc_info+0x3b/0x50
[   31.077365]  __kasan_kmalloc+0xb7/0xc0
[   31.077701]  __kmalloc_cache_noprof+0x184/0x410
[   31.078437]  kasan_atomics+0x96/0x310
[   31.078761]  kunit_try_run_case+0x1b3/0x490
[   31.079265]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   31.079801]  kthread+0x257/0x310
[   31.080338]  ret_from_fork+0x41/0x80
[   31.080673]  ret_from_fork_asm+0x1a/0x30
[   31.081227] 
[   31.081507] The buggy address belongs to the object at ffff888101aba780
[   31.081507]  which belongs to the cache kmalloc-64 of size 64
[   31.082589] The buggy address is located 0 bytes to the right of
[   31.082589]  allocated 48-byte region [ffff888101aba780, ffff888101aba7b0)
[   31.083778] 
[   31.084094] The buggy address belongs to the physical page:
[   31.084649] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101aba
[   31.085437] flags: 0x200000000000000(node=0|zone=2)
[   31.085976] page_type: f5(slab)
[   31.086437] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   31.087186] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   31.087958] page dumped because: kasan: bad access detected
[   31.088548] 
[   31.088814] Memory state around the buggy address:
[   31.089301]  ffff888101aba680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   31.090073]  ffff888101aba700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   31.090771] >ffff888101aba780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   31.091577]                                      ^
[   31.092235]  ffff888101aba800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.092769]  ffff888101aba880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.093426] ==================================================================
[   29.750913] ==================================================================
[   29.751515] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e0/0x5450
[   29.752594] Read of size 4 at addr ffff888101aba7b0 by task kunit_try_catch/273
[   29.754011] 
[   29.754288] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241127 #1
[   29.756225] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.757363] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   29.758111] Call Trace:
[   29.759244]  <TASK>
[   29.759461]  dump_stack_lvl+0x73/0xb0
[   29.759873]  print_report+0xd1/0x640
[   29.760310]  ? __virt_addr_valid+0x1db/0x2d0
[   29.760719]  ? kasan_complete_mode_report_info+0x2a/0x200
[   29.761507]  kasan_report+0x102/0x140
[   29.762513]  ? kasan_atomics_helper+0x3e0/0x5450
[   29.763617]  ? kasan_atomics_helper+0x3e0/0x5450
[   29.764466]  kasan_check_range+0x10c/0x1c0
[   29.765006]  __kasan_check_read+0x15/0x20
[   29.765808]  kasan_atomics_helper+0x3e0/0x5450
[   29.766584]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   29.767529]  ? __kmalloc_cache_noprof+0x184/0x410
[   29.768545]  ? kasan_atomics+0x153/0x310
[   29.769223]  kasan_atomics+0x1dd/0x310
[   29.770262]  ? __pfx_kasan_atomics+0x10/0x10
[   29.770928]  ? __pfx_read_tsc+0x10/0x10
[   29.771485]  ? ktime_get_ts64+0x84/0x230
[   29.771885]  kunit_try_run_case+0x1b3/0x490
[   29.772263]  ? __pfx_kunit_try_run_case+0x10/0x10
[   29.772796]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   29.773352]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   29.774406]  ? __kthread_parkme+0x82/0x160
[   29.774686]  ? preempt_count_sub+0x50/0x80
[   29.775488]  ? __pfx_kunit_try_run_case+0x10/0x10
[   29.776104]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   29.776722]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   29.777481]  kthread+0x257/0x310
[   29.777812]  ? __pfx_kthread+0x10/0x10
[   29.778623]  ret_from_fork+0x41/0x80
[   29.779103]  ? __pfx_kthread+0x10/0x10
[   29.779647]  ret_from_fork_asm+0x1a/0x30
[   29.780281]  </TASK>
[   29.780666] 
[   29.780845] Allocated by task 273:
[   29.781430]  kasan_save_stack+0x3d/0x60
[   29.781846]  kasan_save_track+0x18/0x40
[   29.782466]  kasan_save_alloc_info+0x3b/0x50
[   29.783356]  __kasan_kmalloc+0xb7/0xc0
[   29.783854]  __kmalloc_cache_noprof+0x184/0x410
[   29.784550]  kasan_atomics+0x96/0x310
[   29.785217]  kunit_try_run_case+0x1b3/0x490
[   29.785611]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   29.786439]  kthread+0x257/0x310
[   29.786805]  ret_from_fork+0x41/0x80
[   29.787545]  ret_from_fork_asm+0x1a/0x30
[   29.788121] 
[   29.788301] The buggy address belongs to the object at ffff888101aba780
[   29.788301]  which belongs to the cache kmalloc-64 of size 64
[   29.789462] The buggy address is located 0 bytes to the right of
[   29.789462]  allocated 48-byte region [ffff888101aba780, ffff888101aba7b0)
[   29.790819] 
[   29.791279] The buggy address belongs to the physical page:
[   29.791770] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101aba
[   29.792772] flags: 0x200000000000000(node=0|zone=2)
[   29.793508] page_type: f5(slab)
[   29.793879] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   29.795107] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   29.795759] page dumped because: kasan: bad access detected
[   29.796550] 
[   29.796769] Memory state around the buggy address:
[   29.797457]  ffff888101aba680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.798115]  ffff888101aba700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.798751] >ffff888101aba780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   29.799357]                                      ^
[   29.799879]  ffff888101aba800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.800937]  ffff888101aba880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.801669] ==================================================================
[   31.408243] ==================================================================
[   31.409380] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x15b7/0x5450
[   31.410227] Write of size 8 at addr ffff888101aba7b0 by task kunit_try_catch/273
[   31.410855] 
[   31.411215] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241127 #1
[   31.412077] Tainted: [B]=BAD_PAGE, [N]=TEST
[   31.412436] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   31.413462] Call Trace:
[   31.413753]  <TASK>
[   31.413962]  dump_stack_lvl+0x73/0xb0
[   31.414542]  print_report+0xd1/0x640
[   31.414956]  ? __virt_addr_valid+0x1db/0x2d0
[   31.415432]  ? kasan_complete_mode_report_info+0x2a/0x200
[   31.416100]  kasan_report+0x102/0x140
[   31.416514]  ? kasan_atomics_helper+0x15b7/0x5450
[   31.417145]  ? kasan_atomics_helper+0x15b7/0x5450
[   31.417658]  kasan_check_range+0x10c/0x1c0
[   31.418083]  __kasan_check_write+0x18/0x20
[   31.418827]  kasan_atomics_helper+0x15b7/0x5450
[   31.419460]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   31.419924]  ? __kmalloc_cache_noprof+0x184/0x410
[   31.420522]  ? kasan_atomics+0x153/0x310
[   31.421102]  kasan_atomics+0x1dd/0x310
[   31.421444]  ? __pfx_kasan_atomics+0x10/0x10
[   31.421905]  ? __pfx_read_tsc+0x10/0x10
[   31.422444]  ? ktime_get_ts64+0x84/0x230
[   31.422895]  kunit_try_run_case+0x1b3/0x490
[   31.423631]  ? __pfx_kunit_try_run_case+0x10/0x10
[   31.424312]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   31.424657]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   31.425501]  ? __kthread_parkme+0x82/0x160
[   31.425807]  ? preempt_count_sub+0x50/0x80
[   31.426467]  ? __pfx_kunit_try_run_case+0x10/0x10
[   31.426967]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   31.427668]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   31.428765]  kthread+0x257/0x310
[   31.429656]  ? __pfx_kthread+0x10/0x10
[   31.430087]  ret_from_fork+0x41/0x80
[   31.430570]  ? __pfx_kthread+0x10/0x10
[   31.431212]  ret_from_fork_asm+0x1a/0x30
[   31.432177]  </TASK>
[   31.432401] 
[   31.432597] Allocated by task 273:
[   31.433283]  kasan_save_stack+0x3d/0x60
[   31.433718]  kasan_save_track+0x18/0x40
[   31.434648]  kasan_save_alloc_info+0x3b/0x50
[   31.435259]  __kasan_kmalloc+0xb7/0xc0
[   31.435755]  __kmalloc_cache_noprof+0x184/0x410
[   31.436586]  kasan_atomics+0x96/0x310
[   31.437292]  kunit_try_run_case+0x1b3/0x490
[   31.437707]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   31.438529]  kthread+0x257/0x310
[   31.439147]  ret_from_fork+0x41/0x80
[   31.439717]  ret_from_fork_asm+0x1a/0x30
[   31.440124] 
[   31.440689] The buggy address belongs to the object at ffff888101aba780
[   31.440689]  which belongs to the cache kmalloc-64 of size 64
[   31.441758] The buggy address is located 0 bytes to the right of
[   31.441758]  allocated 48-byte region [ffff888101aba780, ffff888101aba7b0)
[   31.443633] 
[   31.443852] The buggy address belongs to the physical page:
[   31.444893] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101aba
[   31.445801] flags: 0x200000000000000(node=0|zone=2)
[   31.446591] page_type: f5(slab)
[   31.446963] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   31.447816] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   31.448896] page dumped because: kasan: bad access detected
[   31.449315] 
[   31.449419] Memory state around the buggy address:
[   31.449617]  ffff888101aba680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   31.449888]  ffff888101aba700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   31.450216] >ffff888101aba780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   31.450498]                                      ^
[   31.450701]  ffff888101aba800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.450968]  ffff888101aba880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.452382] ==================================================================
[   29.702687] ==================================================================
[   29.703235] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b70/0x5450
[   29.704112] Write of size 4 at addr ffff888101aba7b0 by task kunit_try_catch/273
[   29.705084] 
[   29.705299] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241127 #1
[   29.706688] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.707056] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   29.708406] Call Trace:
[   29.708755]  <TASK>
[   29.709125]  dump_stack_lvl+0x73/0xb0
[   29.709738]  print_report+0xd1/0x640
[   29.710197]  ? __virt_addr_valid+0x1db/0x2d0
[   29.710821]  ? kasan_complete_mode_report_info+0x2a/0x200
[   29.711484]  kasan_report+0x102/0x140
[   29.712356]  ? kasan_atomics_helper+0x4b70/0x5450
[   29.712843]  ? kasan_atomics_helper+0x4b70/0x5450
[   29.713401]  __asan_report_store4_noabort+0x1b/0x30
[   29.714112]  kasan_atomics_helper+0x4b70/0x5450
[   29.714672]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   29.715159]  ? __kmalloc_cache_noprof+0x184/0x410
[   29.715818]  ? kasan_atomics+0x153/0x310
[   29.716944]  kasan_atomics+0x1dd/0x310
[   29.717374]  ? __pfx_kasan_atomics+0x10/0x10
[   29.717790]  ? __pfx_read_tsc+0x10/0x10
[   29.719089]  ? ktime_get_ts64+0x84/0x230
[   29.719743]  kunit_try_run_case+0x1b3/0x490
[   29.720760]  ? __pfx_kunit_try_run_case+0x10/0x10
[   29.721448]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   29.722061]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   29.722543]  ? __kthread_parkme+0x82/0x160
[   29.722956]  ? preempt_count_sub+0x50/0x80
[   29.723469]  ? __pfx_kunit_try_run_case+0x10/0x10
[   29.724246]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   29.725048]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   29.725624]  kthread+0x257/0x310
[   29.726107]  ? __pfx_kthread+0x10/0x10
[   29.726538]  ret_from_fork+0x41/0x80
[   29.727054]  ? __pfx_kthread+0x10/0x10
[   29.727748]  ret_from_fork_asm+0x1a/0x30
[   29.728305]  </TASK>
[   29.728706] 
[   29.728937] Allocated by task 273:
[   29.729655]  kasan_save_stack+0x3d/0x60
[   29.729932]  kasan_save_track+0x18/0x40
[   29.730489]  kasan_save_alloc_info+0x3b/0x50
[   29.731347]  __kasan_kmalloc+0xb7/0xc0
[   29.731620]  __kmalloc_cache_noprof+0x184/0x410
[   29.732474]  kasan_atomics+0x96/0x310
[   29.733344]  kunit_try_run_case+0x1b3/0x490
[   29.733698]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   29.734500]  kthread+0x257/0x310
[   29.734760]  ret_from_fork+0x41/0x80
[   29.735440]  ret_from_fork_asm+0x1a/0x30
[   29.735883] 
[   29.736060] The buggy address belongs to the object at ffff888101aba780
[   29.736060]  which belongs to the cache kmalloc-64 of size 64
[   29.737553] The buggy address is located 0 bytes to the right of
[   29.737553]  allocated 48-byte region [ffff888101aba780, ffff888101aba7b0)
[   29.738637] 
[   29.738890] The buggy address belongs to the physical page:
[   29.739280] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101aba
[   29.740550] flags: 0x200000000000000(node=0|zone=2)
[   29.740865] page_type: f5(slab)
[   29.741607] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   29.742463] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   29.743179] page dumped because: kasan: bad access detected
[   29.743976] 
[   29.744179] Memory state around the buggy address:
[   29.744830]  ffff888101aba680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.745850]  ffff888101aba700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.746840] >ffff888101aba780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   29.747557]                                      ^
[   29.748136]  ffff888101aba800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.748923]  ffff888101aba880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.749906] ==================================================================
[   30.155229] ==================================================================
[   30.155783] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x7c8/0x5450
[   30.156616] Write of size 4 at addr ffff888101aba7b0 by task kunit_try_catch/273
[   30.157779] 
[   30.157955] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241127 #1
[   30.158804] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.159318] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   30.160021] Call Trace:
[   30.160364]  <TASK>
[   30.160581]  dump_stack_lvl+0x73/0xb0
[   30.160917]  print_report+0xd1/0x640
[   30.161646]  ? __virt_addr_valid+0x1db/0x2d0
[   30.162018]  ? kasan_complete_mode_report_info+0x2a/0x200
[   30.162400]  kasan_report+0x102/0x140
[   30.162693]  ? kasan_atomics_helper+0x7c8/0x5450
[   30.163229]  ? kasan_atomics_helper+0x7c8/0x5450
[   30.163834]  kasan_check_range+0x10c/0x1c0
[   30.164575]  __kasan_check_write+0x18/0x20
[   30.164876]  kasan_atomics_helper+0x7c8/0x5450
[   30.165223]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   30.165784]  ? __kmalloc_cache_noprof+0x184/0x410
[   30.166558]  ? kasan_atomics+0x153/0x310
[   30.167120]  kasan_atomics+0x1dd/0x310
[   30.167586]  ? __pfx_kasan_atomics+0x10/0x10
[   30.168016]  ? __pfx_read_tsc+0x10/0x10
[   30.168482]  ? ktime_get_ts64+0x84/0x230
[   30.168781]  kunit_try_run_case+0x1b3/0x490
[   30.169532]  ? __pfx_kunit_try_run_case+0x10/0x10
[   30.169910]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   30.170504]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   30.171088]  ? __kthread_parkme+0x82/0x160
[   30.171551]  ? preempt_count_sub+0x50/0x80
[   30.171862]  ? __pfx_kunit_try_run_case+0x10/0x10
[   30.172521]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   30.173227]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   30.173591]  kthread+0x257/0x310
[   30.174196]  ? __pfx_kthread+0x10/0x10
[   30.174670]  ret_from_fork+0x41/0x80
[   30.175241]  ? __pfx_kthread+0x10/0x10
[   30.175553]  ret_from_fork_asm+0x1a/0x30
[   30.176014]  </TASK>
[   30.176305] 
[   30.176618] Allocated by task 273:
[   30.176968]  kasan_save_stack+0x3d/0x60
[   30.177300]  kasan_save_track+0x18/0x40
[   30.177582]  kasan_save_alloc_info+0x3b/0x50
[   30.178116]  __kasan_kmalloc+0xb7/0xc0
[   30.178652]  __kmalloc_cache_noprof+0x184/0x410
[   30.178965]  kasan_atomics+0x96/0x310
[   30.179263]  kunit_try_run_case+0x1b3/0x490
[   30.179943]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   30.180578]  kthread+0x257/0x310
[   30.181015]  ret_from_fork+0x41/0x80
[   30.181292]  ret_from_fork_asm+0x1a/0x30
[   30.181576] 
[   30.181737] The buggy address belongs to the object at ffff888101aba780
[   30.181737]  which belongs to the cache kmalloc-64 of size 64
[   30.183328] The buggy address is located 0 bytes to the right of
[   30.183328]  allocated 48-byte region [ffff888101aba780, ffff888101aba7b0)
[   30.184229] 
[   30.184488] The buggy address belongs to the physical page:
[   30.185108] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101aba
[   30.185713] flags: 0x200000000000000(node=0|zone=2)
[   30.186337] page_type: f5(slab)
[   30.186638] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   30.187136] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   30.187961] page dumped because: kasan: bad access detected
[   30.188620] 
[   30.188857] Memory state around the buggy address:
[   30.189290]  ffff888101aba680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   30.189711]  ffff888101aba700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   30.190146] >ffff888101aba780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   30.190934]                                      ^
[   30.191538]  ffff888101aba800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.192563]  ffff888101aba880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.193178] ==================================================================
[   29.851620] ==================================================================
[   29.852338] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a1/0x5450
[   29.853327] Write of size 4 at addr ffff888101aba7b0 by task kunit_try_catch/273
[   29.854016] 
[   29.854677] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241127 #1
[   29.855892] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.856782] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   29.857783] Call Trace:
[   29.858553]  <TASK>
[   29.858874]  dump_stack_lvl+0x73/0xb0
[   29.859473]  print_report+0xd1/0x640
[   29.860113]  ? __virt_addr_valid+0x1db/0x2d0
[   29.860522]  ? kasan_complete_mode_report_info+0x2a/0x200
[   29.861339]  kasan_report+0x102/0x140
[   29.862040]  ? kasan_atomics_helper+0x4a1/0x5450
[   29.862713]  ? kasan_atomics_helper+0x4a1/0x5450
[   29.863537]  kasan_check_range+0x10c/0x1c0
[   29.864199]  __kasan_check_write+0x18/0x20
[   29.865142]  kasan_atomics_helper+0x4a1/0x5450
[   29.865716]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   29.866583]  ? __kmalloc_cache_noprof+0x184/0x410
[   29.867242]  ? kasan_atomics+0x153/0x310
[   29.868088]  kasan_atomics+0x1dd/0x310
[   29.868568]  ? __pfx_kasan_atomics+0x10/0x10
[   29.869306]  ? __pfx_read_tsc+0x10/0x10
[   29.869767]  ? ktime_get_ts64+0x84/0x230
[   29.870380]  kunit_try_run_case+0x1b3/0x490
[   29.870946]  ? __pfx_kunit_try_run_case+0x10/0x10
[   29.871764]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   29.872316]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   29.872906]  ? __kthread_parkme+0x82/0x160
[   29.873603]  ? preempt_count_sub+0x50/0x80
[   29.874138]  ? __pfx_kunit_try_run_case+0x10/0x10
[   29.875286]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   29.876114]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   29.876721]  kthread+0x257/0x310
[   29.877216]  ? __pfx_kthread+0x10/0x10
[   29.877738]  ret_from_fork+0x41/0x80
[   29.878269]  ? __pfx_kthread+0x10/0x10
[   29.878980]  ret_from_fork_asm+0x1a/0x30
[   29.880014]  </TASK>
[   29.880251] 
[   29.880691] Allocated by task 273:
[   29.881119]  kasan_save_stack+0x3d/0x60
[   29.881810]  kasan_save_track+0x18/0x40
[   29.882306]  kasan_save_alloc_info+0x3b/0x50
[   29.883567]  __kasan_kmalloc+0xb7/0xc0
[   29.884066]  __kmalloc_cache_noprof+0x184/0x410
[   29.884920]  kasan_atomics+0x96/0x310
[   29.885471]  kunit_try_run_case+0x1b3/0x490
[   29.886194]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   29.886740]  kthread+0x257/0x310
[   29.887217]  ret_from_fork+0x41/0x80
[   29.887669]  ret_from_fork_asm+0x1a/0x30
[   29.888646] 
[   29.888804] The buggy address belongs to the object at ffff888101aba780
[   29.888804]  which belongs to the cache kmalloc-64 of size 64
[   29.890262] The buggy address is located 0 bytes to the right of
[   29.890262]  allocated 48-byte region [ffff888101aba780, ffff888101aba7b0)
[   29.891904] 
[   29.892480] The buggy address belongs to the physical page:
[   29.893481] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101aba
[   29.894179] flags: 0x200000000000000(node=0|zone=2)
[   29.894906] page_type: f5(slab)
[   29.895410] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   29.896372] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   29.897709] page dumped because: kasan: bad access detected
[   29.898311] 
[   29.898584] Memory state around the buggy address:
[   29.899134]  ffff888101aba680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.900009]  ffff888101aba700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.900939] >ffff888101aba780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   29.902073]                                      ^
[   29.902814]  ffff888101aba800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.903695]  ffff888101aba880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.904604] ==================================================================
[   29.652953] ==================================================================
[   29.654250] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b8a/0x5450
[   29.654952] Read of size 4 at addr ffff888101aba7b0 by task kunit_try_catch/273
[   29.655998] 
[   29.656301] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241127 #1
[   29.657372] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.657907] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   29.658855] Call Trace:
[   29.659321]  <TASK>
[   29.659725]  dump_stack_lvl+0x73/0xb0
[   29.660469]  print_report+0xd1/0x640
[   29.660951]  ? __virt_addr_valid+0x1db/0x2d0
[   29.661400]  ? kasan_complete_mode_report_info+0x2a/0x200
[   29.662394]  kasan_report+0x102/0x140
[   29.662779]  ? kasan_atomics_helper+0x4b8a/0x5450
[   29.663404]  ? kasan_atomics_helper+0x4b8a/0x5450
[   29.664458]  __asan_report_load4_noabort+0x18/0x20
[   29.665081]  kasan_atomics_helper+0x4b8a/0x5450
[   29.665626]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   29.666302]  ? __kmalloc_cache_noprof+0x184/0x410
[   29.666764]  ? kasan_atomics+0x153/0x310
[   29.667613]  kasan_atomics+0x1dd/0x310
[   29.667909]  ? __pfx_kasan_atomics+0x10/0x10
[   29.668411]  ? __pfx_read_tsc+0x10/0x10
[   29.669314]  ? ktime_get_ts64+0x84/0x230
[   29.669829]  kunit_try_run_case+0x1b3/0x490
[   29.670285]  ? __pfx_kunit_try_run_case+0x10/0x10
[   29.670779]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   29.671310]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   29.672194]  ? __kthread_parkme+0x82/0x160
[   29.672568]  ? preempt_count_sub+0x50/0x80
[   29.673193]  ? __pfx_kunit_try_run_case+0x10/0x10
[   29.673698]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   29.674715]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   29.675593]  kthread+0x257/0x310
[   29.676093]  ? __pfx_kthread+0x10/0x10
[   29.676776]  ret_from_fork+0x41/0x80
[   29.677476]  ? __pfx_kthread+0x10/0x10
[   29.677881]  ret_from_fork_asm+0x1a/0x30
[   29.679274]  </TASK>
[   29.679503] 
[   29.679646] Allocated by task 273:
[   29.680092]  kasan_save_stack+0x3d/0x60
[   29.680638]  kasan_save_track+0x18/0x40
[   29.681204]  kasan_save_alloc_info+0x3b/0x50
[   29.681882]  __kasan_kmalloc+0xb7/0xc0
[   29.682396]  __kmalloc_cache_noprof+0x184/0x410
[   29.683351]  kasan_atomics+0x96/0x310
[   29.683812]  kunit_try_run_case+0x1b3/0x490
[   29.684287]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   29.685195]  kthread+0x257/0x310
[   29.685559]  ret_from_fork+0x41/0x80
[   29.686296]  ret_from_fork_asm+0x1a/0x30
[   29.686657] 
[   29.687196] The buggy address belongs to the object at ffff888101aba780
[   29.687196]  which belongs to the cache kmalloc-64 of size 64
[   29.688331] The buggy address is located 0 bytes to the right of
[   29.688331]  allocated 48-byte region [ffff888101aba780, ffff888101aba7b0)
[   29.689602] 
[   29.690139] The buggy address belongs to the physical page:
[   29.690510] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101aba
[   29.691569] flags: 0x200000000000000(node=0|zone=2)
[   29.692510] page_type: f5(slab)
[   29.692891] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   29.693703] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   29.694766] page dumped because: kasan: bad access detected
[   29.695485] 
[   29.695661] Memory state around the buggy address:
[   29.696524]  ffff888101aba680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.697556]  ffff888101aba700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.698430] >ffff888101aba780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   29.699117]                                      ^
[   29.699799]  ffff888101aba800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.700790]  ffff888101aba880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.701777] ==================================================================
[   30.238560] ==================================================================
[   30.240272] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x8fa/0x5450
[   30.240865] Write of size 4 at addr ffff888101aba7b0 by task kunit_try_catch/273
[   30.241450] 
[   30.241656] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241127 #1
[   30.242285] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.242978] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   30.243910] Call Trace:
[   30.244399]  <TASK>
[   30.244783]  dump_stack_lvl+0x73/0xb0
[   30.245322]  print_report+0xd1/0x640
[   30.245692]  ? __virt_addr_valid+0x1db/0x2d0
[   30.246250]  ? kasan_complete_mode_report_info+0x2a/0x200
[   30.246942]  kasan_report+0x102/0x140
[   30.247331]  ? kasan_atomics_helper+0x8fa/0x5450
[   30.247894]  ? kasan_atomics_helper+0x8fa/0x5450
[   30.248597]  kasan_check_range+0x10c/0x1c0
[   30.249084]  __kasan_check_write+0x18/0x20
[   30.249441]  kasan_atomics_helper+0x8fa/0x5450
[   30.249869]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   30.250865]  ? __kmalloc_cache_noprof+0x184/0x410
[   30.251619]  ? kasan_atomics+0x153/0x310
[   30.252607]  kasan_atomics+0x1dd/0x310
[   30.252810]  ? __pfx_kasan_atomics+0x10/0x10
[   30.253120]  ? __pfx_read_tsc+0x10/0x10
[   30.254004]  ? ktime_get_ts64+0x84/0x230
[   30.254358]  kunit_try_run_case+0x1b3/0x490
[   30.254570]  ? __pfx_kunit_try_run_case+0x10/0x10
[   30.254783]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   30.255230]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   30.255884]  ? __kthread_parkme+0x82/0x160
[   30.256935]  ? preempt_count_sub+0x50/0x80
[   30.257353]  ? __pfx_kunit_try_run_case+0x10/0x10
[   30.258165]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   30.258896]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   30.259667]  kthread+0x257/0x310
[   30.259931]  ? __pfx_kthread+0x10/0x10
[   30.260496]  ret_from_fork+0x41/0x80
[   30.261192]  ? __pfx_kthread+0x10/0x10
[   30.261806]  ret_from_fork_asm+0x1a/0x30
[   30.262481]  </TASK>
[   30.262792] 
[   30.263196] Allocated by task 273:
[   30.263613]  kasan_save_stack+0x3d/0x60
[   30.264002]  kasan_save_track+0x18/0x40
[   30.264660]  kasan_save_alloc_info+0x3b/0x50
[   30.265161]  __kasan_kmalloc+0xb7/0xc0
[   30.265673]  __kmalloc_cache_noprof+0x184/0x410
[   30.266568]  kasan_atomics+0x96/0x310
[   30.267198]  kunit_try_run_case+0x1b3/0x490
[   30.267752]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   30.268216]  kthread+0x257/0x310
[   30.268752]  ret_from_fork+0x41/0x80
[   30.269361]  ret_from_fork_asm+0x1a/0x30
[   30.269888] 
[   30.270363] The buggy address belongs to the object at ffff888101aba780
[   30.270363]  which belongs to the cache kmalloc-64 of size 64
[   30.271739] The buggy address is located 0 bytes to the right of
[   30.271739]  allocated 48-byte region [ffff888101aba780, ffff888101aba7b0)
[   30.273283] 
[   30.273507] The buggy address belongs to the physical page:
[   30.274078] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101aba
[   30.275637] flags: 0x200000000000000(node=0|zone=2)
[   30.276061] page_type: f5(slab)
[   30.276478] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   30.277538] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   30.278486] page dumped because: kasan: bad access detected
[   30.279355] 
[   30.279564] Memory state around the buggy address:
[   30.279860]  ffff888101aba680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   30.280751]  ffff888101aba700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   30.281377] >ffff888101aba780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   30.281651]                                      ^
[   30.281850]  ffff888101aba800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.282223]  ffff888101aba880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.283372] ==================================================================
[   32.392309] ==================================================================
[   32.393053] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x218b/0x5450
[   32.393725] Write of size 8 at addr ffff888101aba7b0 by task kunit_try_catch/273
[   32.396635] 
[   32.396835] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241127 #1
[   32.398338] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.398649] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   32.399556] Call Trace:
[   32.399899]  <TASK>
[   32.400325]  dump_stack_lvl+0x73/0xb0
[   32.400872]  print_report+0xd1/0x640
[   32.401306]  ? __virt_addr_valid+0x1db/0x2d0
[   32.401795]  ? kasan_complete_mode_report_info+0x2a/0x200
[   32.402227]  kasan_report+0x102/0x140
[   32.403042]  ? kasan_atomics_helper+0x218b/0x5450
[   32.403693]  ? kasan_atomics_helper+0x218b/0x5450
[   32.404218]  kasan_check_range+0x10c/0x1c0
[   32.404834]  __kasan_check_write+0x18/0x20
[   32.405297]  kasan_atomics_helper+0x218b/0x5450
[   32.406024]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   32.406636]  ? __kmalloc_cache_noprof+0x184/0x410
[   32.407171]  ? kasan_atomics+0x153/0x310
[   32.407378]  kasan_atomics+0x1dd/0x310
[   32.407567]  ? __pfx_kasan_atomics+0x10/0x10
[   32.407771]  ? __pfx_read_tsc+0x10/0x10
[   32.407950]  ? ktime_get_ts64+0x84/0x230
[   32.408422]  kunit_try_run_case+0x1b3/0x490
[   32.409191]  ? __pfx_kunit_try_run_case+0x10/0x10
[   32.410015]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   32.410624]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   32.411147]  ? __kthread_parkme+0x82/0x160
[   32.411778]  ? preempt_count_sub+0x50/0x80
[   32.412376]  ? __pfx_kunit_try_run_case+0x10/0x10
[   32.412945]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   32.413559]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   32.414319]  kthread+0x257/0x310
[   32.414636]  ? __pfx_kthread+0x10/0x10
[   32.415078]  ret_from_fork+0x41/0x80
[   32.415473]  ? __pfx_kthread+0x10/0x10
[   32.415845]  ret_from_fork_asm+0x1a/0x30
[   32.416387]  </TASK>
[   32.416580] 
[   32.416737] Allocated by task 273:
[   32.417312]  kasan_save_stack+0x3d/0x60
[   32.417874]  kasan_save_track+0x18/0x40
[   32.418398]  kasan_save_alloc_info+0x3b/0x50
[   32.418855]  __kasan_kmalloc+0xb7/0xc0
[   32.419203]  __kmalloc_cache_noprof+0x184/0x410
[   32.419856]  kasan_atomics+0x96/0x310
[   32.420457]  kunit_try_run_case+0x1b3/0x490
[   32.421119]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   32.421811]  kthread+0x257/0x310
[   32.422262]  ret_from_fork+0x41/0x80
[   32.422767]  ret_from_fork_asm+0x1a/0x30
[   32.423386] 
[   32.423564] The buggy address belongs to the object at ffff888101aba780
[   32.423564]  which belongs to the cache kmalloc-64 of size 64
[   32.424870] The buggy address is located 0 bytes to the right of
[   32.424870]  allocated 48-byte region [ffff888101aba780, ffff888101aba7b0)
[   32.426175] 
[   32.426340] The buggy address belongs to the physical page:
[   32.427162] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101aba
[   32.428079] flags: 0x200000000000000(node=0|zone=2)
[   32.428633] page_type: f5(slab)
[   32.429138] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   32.429839] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   32.430653] page dumped because: kasan: bad access detected
[   32.431297] 
[   32.431636] Memory state around the buggy address:
[   32.432201]  ffff888101aba680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.432906]  ffff888101aba700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.433718] >ffff888101aba780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   32.434499]                                      ^
[   32.434975]  ffff888101aba800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.435661]  ffff888101aba880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.436449] ==================================================================
[   30.340905] ==================================================================
[   30.341582] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa2c/0x5450
[   30.343377] Write of size 4 at addr ffff888101aba7b0 by task kunit_try_catch/273
[   30.343938] 
[   30.344279] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241127 #1
[   30.345547] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.345902] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   30.347423] Call Trace:
[   30.347577]  <TASK>
[   30.347702]  dump_stack_lvl+0x73/0xb0
[   30.347891]  print_report+0xd1/0x640
[   30.348263]  ? __virt_addr_valid+0x1db/0x2d0
[   30.349316]  ? kasan_complete_mode_report_info+0x2a/0x200
[   30.350005]  kasan_report+0x102/0x140
[   30.350887]  ? kasan_atomics_helper+0xa2c/0x5450
[   30.351585]  ? kasan_atomics_helper+0xa2c/0x5450
[   30.352239]  kasan_check_range+0x10c/0x1c0
[   30.352680]  __kasan_check_write+0x18/0x20
[   30.353110]  kasan_atomics_helper+0xa2c/0x5450
[   30.354014]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   30.354768]  ? __kmalloc_cache_noprof+0x184/0x410
[   30.355578]  ? kasan_atomics+0x153/0x310
[   30.356199]  kasan_atomics+0x1dd/0x310
[   30.356640]  ? __pfx_kasan_atomics+0x10/0x10
[   30.357422]  ? __pfx_read_tsc+0x10/0x10
[   30.357822]  ? ktime_get_ts64+0x84/0x230
[   30.358286]  kunit_try_run_case+0x1b3/0x490
[   30.358728]  ? __pfx_kunit_try_run_case+0x10/0x10
[   30.359273]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   30.359634]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   30.360462]  ? __kthread_parkme+0x82/0x160
[   30.360865]  ? preempt_count_sub+0x50/0x80
[   30.361570]  ? __pfx_kunit_try_run_case+0x10/0x10
[   30.361974]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   30.362676]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   30.363343]  kthread+0x257/0x310
[   30.363808]  ? __pfx_kthread+0x10/0x10
[   30.364382]  ret_from_fork+0x41/0x80
[   30.364866]  ? __pfx_kthread+0x10/0x10
[   30.365353]  ret_from_fork_asm+0x1a/0x30
[   30.365952]  </TASK>
[   30.366443] 
[   30.366644] Allocated by task 273:
[   30.367191]  kasan_save_stack+0x3d/0x60
[   30.367668]  kasan_save_track+0x18/0x40
[   30.368255]  kasan_save_alloc_info+0x3b/0x50
[   30.368763]  __kasan_kmalloc+0xb7/0xc0
[   30.369123]  __kmalloc_cache_noprof+0x184/0x410
[   30.369719]  kasan_atomics+0x96/0x310
[   30.370285]  kunit_try_run_case+0x1b3/0x490
[   30.370682]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   30.371314]  kthread+0x257/0x310
[   30.371745]  ret_from_fork+0x41/0x80
[   30.372300]  ret_from_fork_asm+0x1a/0x30
[   30.372596] 
[   30.372951] The buggy address belongs to the object at ffff888101aba780
[   30.372951]  which belongs to the cache kmalloc-64 of size 64
[   30.374196] The buggy address is located 0 bytes to the right of
[   30.374196]  allocated 48-byte region [ffff888101aba780, ffff888101aba7b0)
[   30.375542] 
[   30.375741] The buggy address belongs to the physical page:
[   30.376408] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101aba
[   30.377206] flags: 0x200000000000000(node=0|zone=2)
[   30.377638] page_type: f5(slab)
[   30.378099] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   30.379184] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   30.379766] page dumped because: kasan: bad access detected
[   30.380050] 
[   30.380233] Memory state around the buggy address:
[   30.380588]  ffff888101aba680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   30.381936]  ffff888101aba700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   30.382735] >ffff888101aba780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   30.383951]                                      ^
[   30.384654]  ffff888101aba800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.385891]  ffff888101aba880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.387247] ==================================================================
[   30.060826] ==================================================================
[   30.062411] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x698/0x5450
[   30.063916] Write of size 4 at addr ffff888101aba7b0 by task kunit_try_catch/273
[   30.064887] 
[   30.065234] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241127 #1
[   30.066232] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.066711] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   30.067607] Call Trace:
[   30.067939]  <TASK>
[   30.068227]  dump_stack_lvl+0x73/0xb0
[   30.068768]  print_report+0xd1/0x640
[   30.069187]  ? __virt_addr_valid+0x1db/0x2d0
[   30.069760]  ? kasan_complete_mode_report_info+0x2a/0x200
[   30.070464]  kasan_report+0x102/0x140
[   30.070789]  ? kasan_atomics_helper+0x698/0x5450
[   30.071567]  ? kasan_atomics_helper+0x698/0x5450
[   30.072319]  kasan_check_range+0x10c/0x1c0
[   30.072844]  __kasan_check_write+0x18/0x20
[   30.073394]  kasan_atomics_helper+0x698/0x5450
[   30.073945]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   30.074669]  ? __kmalloc_cache_noprof+0x184/0x410
[   30.075196]  ? kasan_atomics+0x153/0x310
[   30.075779]  kasan_atomics+0x1dd/0x310
[   30.076231]  ? __pfx_kasan_atomics+0x10/0x10
[   30.076765]  ? __pfx_read_tsc+0x10/0x10
[   30.077381]  ? ktime_get_ts64+0x84/0x230
[   30.077903]  kunit_try_run_case+0x1b3/0x490
[   30.078572]  ? __pfx_kunit_try_run_case+0x10/0x10
[   30.079136]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   30.079634]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   30.080312]  ? __kthread_parkme+0x82/0x160
[   30.080873]  ? preempt_count_sub+0x50/0x80
[   30.081412]  ? __pfx_kunit_try_run_case+0x10/0x10
[   30.082085]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   30.082747]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   30.083459]  kthread+0x257/0x310
[   30.083823]  ? __pfx_kthread+0x10/0x10
[   30.084266]  ret_from_fork+0x41/0x80
[   30.084643]  ? __pfx_kthread+0x10/0x10
[   30.085130]  ret_from_fork_asm+0x1a/0x30
[   30.085743]  </TASK>
[   30.086275] 
[   30.086505] Allocated by task 273:
[   30.087027]  kasan_save_stack+0x3d/0x60
[   30.087526]  kasan_save_track+0x18/0x40
[   30.088061]  kasan_save_alloc_info+0x3b/0x50
[   30.088592]  __kasan_kmalloc+0xb7/0xc0
[   30.089410]  __kmalloc_cache_noprof+0x184/0x410
[   30.089861]  kasan_atomics+0x96/0x310
[   30.090885]  kunit_try_run_case+0x1b3/0x490
[   30.091429]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   30.092326]  kthread+0x257/0x310
[   30.092903]  ret_from_fork+0x41/0x80
[   30.093480]  ret_from_fork_asm+0x1a/0x30
[   30.094088] 
[   30.094531] The buggy address belongs to the object at ffff888101aba780
[   30.094531]  which belongs to the cache kmalloc-64 of size 64
[   30.095633] The buggy address is located 0 bytes to the right of
[   30.095633]  allocated 48-byte region [ffff888101aba780, ffff888101aba7b0)
[   30.096662] 
[   30.096851] The buggy address belongs to the physical page:
[   30.097823] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101aba
[   30.099055] flags: 0x200000000000000(node=0|zone=2)
[   30.099659] page_type: f5(slab)
[   30.100272] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   30.100972] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   30.102182] page dumped because: kasan: bad access detected
[   30.102639] 
[   30.102893] Memory state around the buggy address:
[   30.103719]  ffff888101aba680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   30.104962]  ffff888101aba700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   30.105736] >ffff888101aba780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   30.106827]                                      ^
[   30.107494]  ffff888101aba800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.108445]  ffff888101aba880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.109721] ==================================================================