Hay
Date
Dec. 4, 2024, 3:07 p.m.

Environment
qemu-arm64
qemu-x86_64

[   37.643395] ==================================================================
[   37.644357] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xca0/0x4858
[   37.645930] Write of size 4 at addr fff00000c67670b0 by task kunit_try_catch/253
[   37.647000] 
[   37.647292] CPU: 1 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241204 #1
[   37.648533] Tainted: [B]=BAD_PAGE, [N]=TEST
[   37.649855] Hardware name: linux,dummy-virt (DT)
[   37.650590] Call trace:
[   37.651092]  show_stack+0x20/0x38 (C)
[   37.651771]  dump_stack_lvl+0x8c/0xd0
[   37.652421]  print_report+0x118/0x5e0
[   37.653078]  kasan_report+0xc8/0x118
[   37.653717]  kasan_check_range+0x100/0x1a8
[   37.654446]  __kasan_check_write+0x20/0x30
[   37.655129]  kasan_atomics_helper+0xca0/0x4858
[   37.655854]  kasan_atomics+0x198/0x2e8
[   37.656576]  kunit_try_run_case+0x14c/0x3d0
[   37.657338]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.658184]  kthread+0x24c/0x2d0
[   37.658850]  ret_from_fork+0x10/0x20
[   37.659522] 
[   37.659891] Allocated by task 253:
[   37.660483]  kasan_save_stack+0x3c/0x68
[   37.661246]  kasan_save_track+0x20/0x40
[   37.662018]  kasan_save_alloc_info+0x40/0x58
[   37.662752]  __kasan_kmalloc+0xd4/0xd8
[   37.663372]  __kmalloc_cache_noprof+0x15c/0x3c0
[   37.664119]  kasan_atomics+0xb8/0x2e8
[   37.664784]  kunit_try_run_case+0x14c/0x3d0
[   37.665474]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.666268]  kthread+0x24c/0x2d0
[   37.666991]  ret_from_fork+0x10/0x20
[   37.667708] 
[   37.668098] The buggy address belongs to the object at fff00000c6767080
[   37.668098]  which belongs to the cache kmalloc-64 of size 64
[   37.668874] The buggy address is located 0 bytes to the right of
[   37.668874]  allocated 48-byte region [fff00000c6767080, fff00000c67670b0)
[   37.670692] 
[   37.671186] The buggy address belongs to the physical page:
[   37.671952] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106767
[   37.673065] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   37.673947] page_type: f5(slab)
[   37.674531] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   37.675562] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   37.676534] page dumped because: kasan: bad access detected
[   37.677315] 
[   37.677679] Memory state around the buggy address:
[   37.678408]  fff00000c6766f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.679453]  fff00000c6767000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   37.680406] >fff00000c6767080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   37.681287]                                      ^
[   37.682015]  fff00000c6767100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.682954]  fff00000c6767180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.683926] ==================================================================
[   37.886319] ==================================================================
[   37.887927] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xe44/0x4858
[   37.889220] Write of size 8 at addr fff00000c67670b0 by task kunit_try_catch/253
[   37.890572] 
[   37.890984] CPU: 1 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241204 #1
[   37.892061] Tainted: [B]=BAD_PAGE, [N]=TEST
[   37.892659] Hardware name: linux,dummy-virt (DT)
[   37.893439] Call trace:
[   37.893843]  show_stack+0x20/0x38 (C)
[   37.894466]  dump_stack_lvl+0x8c/0xd0
[   37.895151]  print_report+0x118/0x5e0
[   37.895804]  kasan_report+0xc8/0x118
[   37.896378]  kasan_check_range+0x100/0x1a8
[   37.897034]  __kasan_check_write+0x20/0x30
[   37.897588]  kasan_atomics_helper+0xe44/0x4858
[   37.898349]  kasan_atomics+0x198/0x2e8
[   37.898976]  kunit_try_run_case+0x14c/0x3d0
[   37.899320]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.899773]  kthread+0x24c/0x2d0
[   37.900330]  ret_from_fork+0x10/0x20
[   37.901084] 
[   37.901396] Allocated by task 253:
[   37.902141]  kasan_save_stack+0x3c/0x68
[   37.902740]  kasan_save_track+0x20/0x40
[   37.903549]  kasan_save_alloc_info+0x40/0x58
[   37.904231]  __kasan_kmalloc+0xd4/0xd8
[   37.904913]  __kmalloc_cache_noprof+0x15c/0x3c0
[   37.905528]  kasan_atomics+0xb8/0x2e8
[   37.906103]  kunit_try_run_case+0x14c/0x3d0
[   37.906789]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.907447]  kthread+0x24c/0x2d0
[   37.908093]  ret_from_fork+0x10/0x20
[   37.908586] 
[   37.908955] The buggy address belongs to the object at fff00000c6767080
[   37.908955]  which belongs to the cache kmalloc-64 of size 64
[   37.910383] The buggy address is located 0 bytes to the right of
[   37.910383]  allocated 48-byte region [fff00000c6767080, fff00000c67670b0)
[   37.911826] 
[   37.912165] The buggy address belongs to the physical page:
[   37.913069] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106767
[   37.913897] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   37.914872] page_type: f5(slab)
[   37.915356] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   37.916428] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   37.917372] page dumped because: kasan: bad access detected
[   37.918027] 
[   37.918416] Memory state around the buggy address:
[   37.919126]  fff00000c6766f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.919971]  fff00000c6767000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   37.920894] >fff00000c6767080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   37.921787]                                      ^
[   37.922388]  fff00000c6767100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.923299]  fff00000c6767180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.924224] ==================================================================
[   38.248189] ==================================================================
[   38.249018] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1190/0x4858
[   38.249913] Write of size 8 at addr fff00000c67670b0 by task kunit_try_catch/253
[   38.250797] 
[   38.251202] CPU: 1 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241204 #1
[   38.252316] Tainted: [B]=BAD_PAGE, [N]=TEST
[   38.253089] Hardware name: linux,dummy-virt (DT)
[   38.253842] Call trace:
[   38.254288]  show_stack+0x20/0x38 (C)
[   38.254847]  dump_stack_lvl+0x8c/0xd0
[   38.255524]  print_report+0x118/0x5e0
[   38.256156]  kasan_report+0xc8/0x118
[   38.256732]  kasan_check_range+0x100/0x1a8
[   38.257469]  __kasan_check_write+0x20/0x30
[   38.258147]  kasan_atomics_helper+0x1190/0x4858
[   38.258945]  kasan_atomics+0x198/0x2e8
[   38.259493]  kunit_try_run_case+0x14c/0x3d0
[   38.260086]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   38.261059]  kthread+0x24c/0x2d0
[   38.261700]  ret_from_fork+0x10/0x20
[   38.262300] 
[   38.262639] Allocated by task 253:
[   38.263142]  kasan_save_stack+0x3c/0x68
[   38.263857]  kasan_save_track+0x20/0x40
[   38.264387]  kasan_save_alloc_info+0x40/0x58
[   38.265038]  __kasan_kmalloc+0xd4/0xd8
[   38.265641]  __kmalloc_cache_noprof+0x15c/0x3c0
[   38.266216]  kasan_atomics+0xb8/0x2e8
[   38.266923]  kunit_try_run_case+0x14c/0x3d0
[   38.267524]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   38.268299]  kthread+0x24c/0x2d0
[   38.268787]  ret_from_fork+0x10/0x20
[   38.269461] 
[   38.269777] The buggy address belongs to the object at fff00000c6767080
[   38.269777]  which belongs to the cache kmalloc-64 of size 64
[   38.271190] The buggy address is located 0 bytes to the right of
[   38.271190]  allocated 48-byte region [fff00000c6767080, fff00000c67670b0)
[   38.272741] 
[   38.273141] The buggy address belongs to the physical page:
[   38.273920] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106767
[   38.274988] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   38.275794] page_type: f5(slab)
[   38.276375] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   38.277310] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   38.278243] page dumped because: kasan: bad access detected
[   38.278964] 
[   38.279290] Memory state around the buggy address:
[   38.279926]  fff00000c6766f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   38.280785]  fff00000c6767000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   38.281591] >fff00000c6767080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   38.282536]                                      ^
[   38.283297]  fff00000c6767100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   38.284229]  fff00000c6767180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   38.285095] ==================================================================
[   38.085497] ==================================================================
[   38.086397] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xff0/0x4858
[   38.087368] Write of size 8 at addr fff00000c67670b0 by task kunit_try_catch/253
[   38.088162] 
[   38.088738] CPU: 1 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241204 #1
[   38.090185] Tainted: [B]=BAD_PAGE, [N]=TEST
[   38.090863] Hardware name: linux,dummy-virt (DT)
[   38.091535] Call trace:
[   38.092056]  show_stack+0x20/0x38 (C)
[   38.092797]  dump_stack_lvl+0x8c/0xd0
[   38.093411]  print_report+0x118/0x5e0
[   38.094141]  kasan_report+0xc8/0x118
[   38.094841]  kasan_check_range+0x100/0x1a8
[   38.095526]  __kasan_check_write+0x20/0x30
[   38.096269]  kasan_atomics_helper+0xff0/0x4858
[   38.097039]  kasan_atomics+0x198/0x2e8
[   38.097708]  kunit_try_run_case+0x14c/0x3d0
[   38.098417]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   38.099353]  kthread+0x24c/0x2d0
[   38.100002]  ret_from_fork+0x10/0x20
[   38.100658] 
[   38.101020] Allocated by task 253:
[   38.101684]  kasan_save_stack+0x3c/0x68
[   38.102402]  kasan_save_track+0x20/0x40
[   38.103079]  kasan_save_alloc_info+0x40/0x58
[   38.103816]  __kasan_kmalloc+0xd4/0xd8
[   38.104461]  __kmalloc_cache_noprof+0x15c/0x3c0
[   38.105148]  kasan_atomics+0xb8/0x2e8
[   38.105788]  kunit_try_run_case+0x14c/0x3d0
[   38.106508]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   38.107375]  kthread+0x24c/0x2d0
[   38.108068]  ret_from_fork+0x10/0x20
[   38.108739] 
[   38.109087] The buggy address belongs to the object at fff00000c6767080
[   38.109087]  which belongs to the cache kmalloc-64 of size 64
[   38.110692] The buggy address is located 0 bytes to the right of
[   38.110692]  allocated 48-byte region [fff00000c6767080, fff00000c67670b0)
[   38.112205] 
[   38.112747] The buggy address belongs to the physical page:
[   38.113537] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106767
[   38.114740] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   38.115728] page_type: f5(slab)
[   38.116370] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   38.117468] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   38.118311] page dumped because: kasan: bad access detected
[   38.119165] 
[   38.119693] Memory state around the buggy address:
[   38.120405]  fff00000c6766f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   38.121434]  fff00000c6767000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   38.122489] >fff00000c6767080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   38.123439]                                      ^
[   38.124133]  fff00000c6767100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   38.125107]  fff00000c6767180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   38.126005] ==================================================================
[   37.237396] ==================================================================
[   37.238771] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x934/0x4858
[   37.239642] Write of size 4 at addr fff00000c67670b0 by task kunit_try_catch/253
[   37.240500] 
[   37.240913] CPU: 1 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241204 #1
[   37.242466] Tainted: [B]=BAD_PAGE, [N]=TEST
[   37.243168] Hardware name: linux,dummy-virt (DT)
[   37.243903] Call trace:
[   37.244411]  show_stack+0x20/0x38 (C)
[   37.245163]  dump_stack_lvl+0x8c/0xd0
[   37.245896]  print_report+0x118/0x5e0
[   37.246563]  kasan_report+0xc8/0x118
[   37.247359]  kasan_check_range+0x100/0x1a8
[   37.248094]  __kasan_check_write+0x20/0x30
[   37.248955]  kasan_atomics_helper+0x934/0x4858
[   37.249710]  kasan_atomics+0x198/0x2e8
[   37.250370]  kunit_try_run_case+0x14c/0x3d0
[   37.251098]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.251945]  kthread+0x24c/0x2d0
[   37.252536]  ret_from_fork+0x10/0x20
[   37.253173] 
[   37.253524] Allocated by task 253:
[   37.254252]  kasan_save_stack+0x3c/0x68
[   37.255017]  kasan_save_track+0x20/0x40
[   37.255657]  kasan_save_alloc_info+0x40/0x58
[   37.256306]  __kasan_kmalloc+0xd4/0xd8
[   37.256962]  __kmalloc_cache_noprof+0x15c/0x3c0
[   37.257691]  kasan_atomics+0xb8/0x2e8
[   37.258337]  kunit_try_run_case+0x14c/0x3d0
[   37.259137]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.259937]  kthread+0x24c/0x2d0
[   37.260495]  ret_from_fork+0x10/0x20
[   37.261061] 
[   37.261406] The buggy address belongs to the object at fff00000c6767080
[   37.261406]  which belongs to the cache kmalloc-64 of size 64
[   37.263031] The buggy address is located 0 bytes to the right of
[   37.263031]  allocated 48-byte region [fff00000c6767080, fff00000c67670b0)
[   37.264617] 
[   37.265146] The buggy address belongs to the physical page:
[   37.265933] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106767
[   37.267017] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   37.267900] page_type: f5(slab)
[   37.268473] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   37.269502] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   37.270450] page dumped because: kasan: bad access detected
[   37.271228] 
[   37.271581] Memory state around the buggy address:
[   37.272382]  fff00000c6766f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.273358]  fff00000c6767000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   37.274316] >fff00000c6767080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   37.275248]                                      ^
[   37.276021]  fff00000c6767100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.276965]  fff00000c6767180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.277871] ==================================================================
[   38.769796] ==================================================================
[   38.770760] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3df4/0x4858
[   38.772185] Read of size 8 at addr fff00000c67670b0 by task kunit_try_catch/253
[   38.773210] 
[   38.773684] CPU: 1 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241204 #1
[   38.774882] Tainted: [B]=BAD_PAGE, [N]=TEST
[   38.775650] Hardware name: linux,dummy-virt (DT)
[   38.776303] Call trace:
[   38.776883]  show_stack+0x20/0x38 (C)
[   38.777387]  dump_stack_lvl+0x8c/0xd0
[   38.778120]  print_report+0x118/0x5e0
[   38.778758]  kasan_report+0xc8/0x118
[   38.779520]  __asan_report_load8_noabort+0x20/0x30
[   38.780250]  kasan_atomics_helper+0x3df4/0x4858
[   38.781009]  kasan_atomics+0x198/0x2e8
[   38.781506]  kunit_try_run_case+0x14c/0x3d0
[   38.782236]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   38.783014]  kthread+0x24c/0x2d0
[   38.783716]  ret_from_fork+0x10/0x20
[   38.784357] 
[   38.784799] Allocated by task 253:
[   38.785245]  kasan_save_stack+0x3c/0x68
[   38.785873]  kasan_save_track+0x20/0x40
[   38.786612]  kasan_save_alloc_info+0x40/0x58
[   38.787262]  __kasan_kmalloc+0xd4/0xd8
[   38.787923]  __kmalloc_cache_noprof+0x15c/0x3c0
[   38.788588]  kasan_atomics+0xb8/0x2e8
[   38.789249]  kunit_try_run_case+0x14c/0x3d0
[   38.790005]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   38.790727]  kthread+0x24c/0x2d0
[   38.791203]  ret_from_fork+0x10/0x20
[   38.791869] 
[   38.792253] The buggy address belongs to the object at fff00000c6767080
[   38.792253]  which belongs to the cache kmalloc-64 of size 64
[   38.793598] The buggy address is located 0 bytes to the right of
[   38.793598]  allocated 48-byte region [fff00000c6767080, fff00000c67670b0)
[   38.795189] 
[   38.795515] The buggy address belongs to the physical page:
[   38.796186] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106767
[   38.797188] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   38.798096] page_type: f5(slab)
[   38.798618] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   38.799718] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   38.800704] page dumped because: kasan: bad access detected
[   38.801415] 
[   38.801772] Memory state around the buggy address:
[   38.802338]  fff00000c6766f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   38.803218]  fff00000c6767000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   38.804153] >fff00000c6767080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   38.805066]                                      ^
[   38.805576]  fff00000c6767100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   38.806453]  fff00000c6767180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   38.807466] ==================================================================
[   37.926261] ==================================================================
[   37.927294] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e5c/0x4858
[   37.928117] Write of size 8 at addr fff00000c67670b0 by task kunit_try_catch/253
[   37.929063] 
[   37.929404] CPU: 1 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241204 #1
[   37.930681] Tainted: [B]=BAD_PAGE, [N]=TEST
[   37.931315] Hardware name: linux,dummy-virt (DT)
[   37.931926] Call trace:
[   37.932393]  show_stack+0x20/0x38 (C)
[   37.933136]  dump_stack_lvl+0x8c/0xd0
[   37.933735]  print_report+0x118/0x5e0
[   37.934414]  kasan_report+0xc8/0x118
[   37.934938]  __asan_report_store8_noabort+0x20/0x30
[   37.935758]  kasan_atomics_helper+0x3e5c/0x4858
[   37.936442]  kasan_atomics+0x198/0x2e8
[   37.937123]  kunit_try_run_case+0x14c/0x3d0
[   37.937799]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.938465]  kthread+0x24c/0x2d0
[   37.939129]  ret_from_fork+0x10/0x20
[   37.939697] 
[   37.940062] Allocated by task 253:
[   37.940608]  kasan_save_stack+0x3c/0x68
[   37.941154]  kasan_save_track+0x20/0x40
[   37.941839]  kasan_save_alloc_info+0x40/0x58
[   37.942428]  __kasan_kmalloc+0xd4/0xd8
[   37.943137]  __kmalloc_cache_noprof+0x15c/0x3c0
[   37.943787]  kasan_atomics+0xb8/0x2e8
[   37.944343]  kunit_try_run_case+0x14c/0x3d0
[   37.945105]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.945840]  kthread+0x24c/0x2d0
[   37.946289]  ret_from_fork+0x10/0x20
[   37.947049] 
[   37.947419] The buggy address belongs to the object at fff00000c6767080
[   37.947419]  which belongs to the cache kmalloc-64 of size 64
[   37.948595] The buggy address is located 0 bytes to the right of
[   37.948595]  allocated 48-byte region [fff00000c6767080, fff00000c67670b0)
[   37.950186] 
[   37.950512] The buggy address belongs to the physical page:
[   37.951264] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106767
[   37.952362] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   37.953113] page_type: f5(slab)
[   37.953693] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   37.954657] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   37.955547] page dumped because: kasan: bad access detected
[   37.956193] 
[   37.956551] Memory state around the buggy address:
[   37.957200]  fff00000c6766f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.958065]  fff00000c6767000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   37.959024] >fff00000c6767080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   37.959902]                                      ^
[   37.960497]  fff00000c6767100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.961445]  fff00000c6767180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.962297] ==================================================================
[   38.166774] ==================================================================
[   38.167718] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x10c0/0x4858
[   38.168543] Write of size 8 at addr fff00000c67670b0 by task kunit_try_catch/253
[   38.169323] 
[   38.169783] CPU: 1 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241204 #1
[   38.171258] Tainted: [B]=BAD_PAGE, [N]=TEST
[   38.171987] Hardware name: linux,dummy-virt (DT)
[   38.172605] Call trace:
[   38.173058]  show_stack+0x20/0x38 (C)
[   38.173696]  dump_stack_lvl+0x8c/0xd0
[   38.174365]  print_report+0x118/0x5e0
[   38.174860]  kasan_report+0xc8/0x118
[   38.175527]  kasan_check_range+0x100/0x1a8
[   38.176168]  __kasan_check_write+0x20/0x30
[   38.176813]  kasan_atomics_helper+0x10c0/0x4858
[   38.177466]  kasan_atomics+0x198/0x2e8
[   38.178131]  kunit_try_run_case+0x14c/0x3d0
[   38.178778]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   38.179551]  kthread+0x24c/0x2d0
[   38.180195]  ret_from_fork+0x10/0x20
[   38.180824] 
[   38.181187] Allocated by task 253:
[   38.181721]  kasan_save_stack+0x3c/0x68
[   38.182291]  kasan_save_track+0x20/0x40
[   38.182955]  kasan_save_alloc_info+0x40/0x58
[   38.183699]  __kasan_kmalloc+0xd4/0xd8
[   38.184277]  __kmalloc_cache_noprof+0x15c/0x3c0
[   38.184907]  kasan_atomics+0xb8/0x2e8
[   38.185527]  kunit_try_run_case+0x14c/0x3d0
[   38.186121]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   38.186928]  kthread+0x24c/0x2d0
[   38.187504]  ret_from_fork+0x10/0x20
[   38.188028] 
[   38.188472] The buggy address belongs to the object at fff00000c6767080
[   38.188472]  which belongs to the cache kmalloc-64 of size 64
[   38.189884] The buggy address is located 0 bytes to the right of
[   38.189884]  allocated 48-byte region [fff00000c6767080, fff00000c67670b0)
[   38.191298] 
[   38.191648] The buggy address belongs to the physical page:
[   38.192324] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106767
[   38.193263] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   38.194003] page_type: f5(slab)
[   38.194578] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   38.195538] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   38.196423] page dumped because: kasan: bad access detected
[   38.197138] 
[   38.197458] Memory state around the buggy address:
[   38.198129]  fff00000c6766f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   38.198926]  fff00000c6767000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   38.199932] >fff00000c6767080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   38.200773]                                      ^
[   38.201435]  fff00000c6767100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   38.202361]  fff00000c6767180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   38.203304] ==================================================================
[   38.205404] ==================================================================
[   38.206960] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1128/0x4858
[   38.207739] Write of size 8 at addr fff00000c67670b0 by task kunit_try_catch/253
[   38.208190] 
[   38.208379] CPU: 1 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241204 #1
[   38.209431] Tainted: [B]=BAD_PAGE, [N]=TEST
[   38.210091] Hardware name: linux,dummy-virt (DT)
[   38.211102] Call trace:
[   38.211773]  show_stack+0x20/0x38 (C)
[   38.212533]  dump_stack_lvl+0x8c/0xd0
[   38.213315]  print_report+0x118/0x5e0
[   38.214111]  kasan_report+0xc8/0x118
[   38.214737]  kasan_check_range+0x100/0x1a8
[   38.215361]  __kasan_check_write+0x20/0x30
[   38.216063]  kasan_atomics_helper+0x1128/0x4858
[   38.216752]  kasan_atomics+0x198/0x2e8
[   38.217477]  kunit_try_run_case+0x14c/0x3d0
[   38.218152]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   38.218979]  kthread+0x24c/0x2d0
[   38.219574]  ret_from_fork+0x10/0x20
[   38.220317] 
[   38.220683] Allocated by task 253:
[   38.221392]  kasan_save_stack+0x3c/0x68
[   38.222078]  kasan_save_track+0x20/0x40
[   38.222722]  kasan_save_alloc_info+0x40/0x58
[   38.223442]  __kasan_kmalloc+0xd4/0xd8
[   38.224043]  __kmalloc_cache_noprof+0x15c/0x3c0
[   38.224809]  kasan_atomics+0xb8/0x2e8
[   38.225440]  kunit_try_run_case+0x14c/0x3d0
[   38.226108]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   38.226959]  kthread+0x24c/0x2d0
[   38.227669]  ret_from_fork+0x10/0x20
[   38.228307] 
[   38.228663] The buggy address belongs to the object at fff00000c6767080
[   38.228663]  which belongs to the cache kmalloc-64 of size 64
[   38.230278] The buggy address is located 0 bytes to the right of
[   38.230278]  allocated 48-byte region [fff00000c6767080, fff00000c67670b0)
[   38.231929] 
[   38.232383] The buggy address belongs to the physical page:
[   38.233173] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106767
[   38.234216] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   38.235092] page_type: f5(slab)
[   38.235711] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   38.236721] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   38.237682] page dumped because: kasan: bad access detected
[   38.238455] 
[   38.238860] Memory state around the buggy address:
[   38.239562]  fff00000c6766f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   38.240613]  fff00000c6767000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   38.241547] >fff00000c6767080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   38.242477]                                      ^
[   38.243230]  fff00000c6767100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   38.244280]  fff00000c6767180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   38.245195] ==================================================================
[   37.111017] ==================================================================
[   37.111783] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x7cc/0x4858
[   37.112701] Write of size 4 at addr fff00000c67670b0 by task kunit_try_catch/253
[   37.113537] 
[   37.113993] CPU: 1 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241204 #1
[   37.115379] Tainted: [B]=BAD_PAGE, [N]=TEST
[   37.115886] Hardware name: linux,dummy-virt (DT)
[   37.116699] Call trace:
[   37.117121]  show_stack+0x20/0x38 (C)
[   37.117781]  dump_stack_lvl+0x8c/0xd0
[   37.118445]  print_report+0x118/0x5e0
[   37.119055]  kasan_report+0xc8/0x118
[   37.119690]  kasan_check_range+0x100/0x1a8
[   37.120356]  __kasan_check_write+0x20/0x30
[   37.120979]  kasan_atomics_helper+0x7cc/0x4858
[   37.121760]  kasan_atomics+0x198/0x2e8
[   37.122370]  kunit_try_run_case+0x14c/0x3d0
[   37.123005]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.123731]  kthread+0x24c/0x2d0
[   37.124380]  ret_from_fork+0x10/0x20
[   37.124998] 
[   37.125366] Allocated by task 253:
[   37.125996]  kasan_save_stack+0x3c/0x68
[   37.126568]  kasan_save_track+0x20/0x40
[   37.127206]  kasan_save_alloc_info+0x40/0x58
[   37.127808]  __kasan_kmalloc+0xd4/0xd8
[   37.128564]  __kmalloc_cache_noprof+0x15c/0x3c0
[   37.129178]  kasan_atomics+0xb8/0x2e8
[   37.129918]  kunit_try_run_case+0x14c/0x3d0
[   37.130455]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.131463]  kthread+0x24c/0x2d0
[   37.132061]  ret_from_fork+0x10/0x20
[   37.132692] 
[   37.133030] The buggy address belongs to the object at fff00000c6767080
[   37.133030]  which belongs to the cache kmalloc-64 of size 64
[   37.134950] The buggy address is located 0 bytes to the right of
[   37.134950]  allocated 48-byte region [fff00000c6767080, fff00000c67670b0)
[   37.136491] 
[   37.136832] The buggy address belongs to the physical page:
[   37.137619] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106767
[   37.138722] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   37.139653] page_type: f5(slab)
[   37.140238] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   37.141183] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   37.142079] page dumped because: kasan: bad access detected
[   37.142795] 
[   37.143068] Memory state around the buggy address:
[   37.143801]  fff00000c6766f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.144899]  fff00000c6767000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   37.145908] >fff00000c6767080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   37.146755]                                      ^
[   37.147405]  fff00000c6767100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.148257]  fff00000c6767180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.149212] ==================================================================
[   37.442587] ==================================================================
[   37.443656] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3dcc/0x4858
[   37.444457] Read of size 4 at addr fff00000c67670b0 by task kunit_try_catch/253
[   37.445226] 
[   37.445804] CPU: 1 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241204 #1
[   37.447134] Tainted: [B]=BAD_PAGE, [N]=TEST
[   37.447765] Hardware name: linux,dummy-virt (DT)
[   37.448442] Call trace:
[   37.448818]  show_stack+0x20/0x38 (C)
[   37.449538]  dump_stack_lvl+0x8c/0xd0
[   37.450117]  print_report+0x118/0x5e0
[   37.450681]  kasan_report+0xc8/0x118
[   37.451333]  __asan_report_load4_noabort+0x20/0x30
[   37.452033]  kasan_atomics_helper+0x3dcc/0x4858
[   37.452740]  kasan_atomics+0x198/0x2e8
[   37.453386]  kunit_try_run_case+0x14c/0x3d0
[   37.454021]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.454728]  kthread+0x24c/0x2d0
[   37.455294]  ret_from_fork+0x10/0x20
[   37.455936] 
[   37.456290] Allocated by task 253:
[   37.456893]  kasan_save_stack+0x3c/0x68
[   37.457416]  kasan_save_track+0x20/0x40
[   37.458097]  kasan_save_alloc_info+0x40/0x58
[   37.458653]  __kasan_kmalloc+0xd4/0xd8
[   37.459309]  __kmalloc_cache_noprof+0x15c/0x3c0
[   37.459940]  kasan_atomics+0xb8/0x2e8
[   37.460453]  kunit_try_run_case+0x14c/0x3d0
[   37.461085]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.461908]  kthread+0x24c/0x2d0
[   37.462514]  ret_from_fork+0x10/0x20
[   37.463120] 
[   37.463462] The buggy address belongs to the object at fff00000c6767080
[   37.463462]  which belongs to the cache kmalloc-64 of size 64
[   37.465049] The buggy address is located 0 bytes to the right of
[   37.465049]  allocated 48-byte region [fff00000c6767080, fff00000c67670b0)
[   37.466346] 
[   37.466683] The buggy address belongs to the physical page:
[   37.467380] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106767
[   37.468432] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   37.469330] page_type: f5(slab)
[   37.470019] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   37.471025] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   37.471995] page dumped because: kasan: bad access detected
[   37.472692] 
[   37.473057] Memory state around the buggy address:
[   37.473760]  fff00000c6766f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.474698]  fff00000c6767000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   37.475613] >fff00000c6767080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   37.476469]                                      ^
[   37.477119]  fff00000c6767100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.478045]  fff00000c6767180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.479033] ==================================================================
[   37.559576] ==================================================================
[   37.560441] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xc08/0x4858
[   37.561456] Write of size 4 at addr fff00000c67670b0 by task kunit_try_catch/253
[   37.563126] 
[   37.563720] CPU: 1 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241204 #1
[   37.564989] Tainted: [B]=BAD_PAGE, [N]=TEST
[   37.565682] Hardware name: linux,dummy-virt (DT)
[   37.566412] Call trace:
[   37.566817]  show_stack+0x20/0x38 (C)
[   37.567392]  dump_stack_lvl+0x8c/0xd0
[   37.568037]  print_report+0x118/0x5e0
[   37.568671]  kasan_report+0xc8/0x118
[   37.569577]  kasan_check_range+0x100/0x1a8
[   37.570295]  __kasan_check_write+0x20/0x30
[   37.571084]  kasan_atomics_helper+0xc08/0x4858
[   37.571811]  kasan_atomics+0x198/0x2e8
[   37.572529]  kunit_try_run_case+0x14c/0x3d0
[   37.573238]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.574060]  kthread+0x24c/0x2d0
[   37.574709]  ret_from_fork+0x10/0x20
[   37.575412] 
[   37.575771] Allocated by task 253:
[   37.576478]  kasan_save_stack+0x3c/0x68
[   37.577022]  kasan_save_track+0x20/0x40
[   37.577766]  kasan_save_alloc_info+0x40/0x58
[   37.578439]  __kasan_kmalloc+0xd4/0xd8
[   37.579192]  __kmalloc_cache_noprof+0x15c/0x3c0
[   37.579857]  kasan_atomics+0xb8/0x2e8
[   37.580567]  kunit_try_run_case+0x14c/0x3d0
[   37.581204]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.582019]  kthread+0x24c/0x2d0
[   37.582693]  ret_from_fork+0x10/0x20
[   37.583327] 
[   37.583733] The buggy address belongs to the object at fff00000c6767080
[   37.583733]  which belongs to the cache kmalloc-64 of size 64
[   37.585504] The buggy address is located 0 bytes to the right of
[   37.585504]  allocated 48-byte region [fff00000c6767080, fff00000c67670b0)
[   37.587145] 
[   37.587461] The buggy address belongs to the physical page:
[   37.588235] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106767
[   37.589619] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   37.590787] page_type: f5(slab)
[   37.591698] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   37.592795] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   37.593884] page dumped because: kasan: bad access detected
[   37.594871] 
[   37.595252] Memory state around the buggy address:
[   37.596159]  fff00000c6766f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.597293]  fff00000c6767000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   37.598244] >fff00000c6767080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   37.599478]                                      ^
[   37.600151]  fff00000c6767100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.601342]  fff00000c6767180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.602445] ==================================================================
[   37.685849] ==================================================================
[   37.686889] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3dd8/0x4858
[   37.687978] Read of size 4 at addr fff00000c67670b0 by task kunit_try_catch/253
[   37.689382] 
[   37.689716] CPU: 1 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241204 #1
[   37.691387] Tainted: [B]=BAD_PAGE, [N]=TEST
[   37.692100] Hardware name: linux,dummy-virt (DT)
[   37.692721] Call trace:
[   37.693040]  show_stack+0x20/0x38 (C)
[   37.693690]  dump_stack_lvl+0x8c/0xd0
[   37.694280]  print_report+0x118/0x5e0
[   37.694899]  kasan_report+0xc8/0x118
[   37.695510]  __asan_report_load4_noabort+0x20/0x30
[   37.696182]  kasan_atomics_helper+0x3dd8/0x4858
[   37.696859]  kasan_atomics+0x198/0x2e8
[   37.697512]  kunit_try_run_case+0x14c/0x3d0
[   37.698135]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.698807]  kthread+0x24c/0x2d0
[   37.699279]  ret_from_fork+0x10/0x20
[   37.700080] 
[   37.700496] Allocated by task 253:
[   37.701089]  kasan_save_stack+0x3c/0x68
[   37.701724]  kasan_save_track+0x20/0x40
[   37.702372]  kasan_save_alloc_info+0x40/0x58
[   37.702938]  __kasan_kmalloc+0xd4/0xd8
[   37.703654]  __kmalloc_cache_noprof+0x15c/0x3c0
[   37.704292]  kasan_atomics+0xb8/0x2e8
[   37.704941]  kunit_try_run_case+0x14c/0x3d0
[   37.705533]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.706299]  kthread+0x24c/0x2d0
[   37.706809]  ret_from_fork+0x10/0x20
[   37.707603] 
[   37.707981] The buggy address belongs to the object at fff00000c6767080
[   37.707981]  which belongs to the cache kmalloc-64 of size 64
[   37.709326] The buggy address is located 0 bytes to the right of
[   37.709326]  allocated 48-byte region [fff00000c6767080, fff00000c67670b0)
[   37.710946] 
[   37.711346] The buggy address belongs to the physical page:
[   37.712119] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106767
[   37.713084] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   37.713985] page_type: f5(slab)
[   37.714473] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   37.715451] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   37.716352] page dumped because: kasan: bad access detected
[   37.717120] 
[   37.717436] Memory state around the buggy address:
[   37.718096]  fff00000c6766f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.718948]  fff00000c6767000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   37.719885] >fff00000c6767080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   37.720807]                                      ^
[   37.721465]  fff00000c6767100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.722467]  fff00000c6767180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.723355] ==================================================================
[   38.128567] ==================================================================
[   38.129992] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1058/0x4858
[   38.130876] Write of size 8 at addr fff00000c67670b0 by task kunit_try_catch/253
[   38.131348] 
[   38.131539] CPU: 1 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241204 #1
[   38.132165] Tainted: [B]=BAD_PAGE, [N]=TEST
[   38.132445] Hardware name: linux,dummy-virt (DT)
[   38.132866] Call trace:
[   38.133219]  show_stack+0x20/0x38 (C)
[   38.134328]  dump_stack_lvl+0x8c/0xd0
[   38.135498]  print_report+0x118/0x5e0
[   38.136266]  kasan_report+0xc8/0x118
[   38.136811]  kasan_check_range+0x100/0x1a8
[   38.137412]  __kasan_check_write+0x20/0x30
[   38.138094]  kasan_atomics_helper+0x1058/0x4858
[   38.138702]  kasan_atomics+0x198/0x2e8
[   38.139395]  kunit_try_run_case+0x14c/0x3d0
[   38.139985]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   38.140784]  kthread+0x24c/0x2d0
[   38.141417]  ret_from_fork+0x10/0x20
[   38.142047] 
[   38.142397] Allocated by task 253:
[   38.142988]  kasan_save_stack+0x3c/0x68
[   38.143566]  kasan_save_track+0x20/0x40
[   38.144213]  kasan_save_alloc_info+0x40/0x58
[   38.144778]  __kasan_kmalloc+0xd4/0xd8
[   38.145404]  __kmalloc_cache_noprof+0x15c/0x3c0
[   38.146032]  kasan_atomics+0xb8/0x2e8
[   38.146686]  kunit_try_run_case+0x14c/0x3d0
[   38.147334]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   38.148236]  kthread+0x24c/0x2d0
[   38.148764]  ret_from_fork+0x10/0x20
[   38.149360] 
[   38.149687] The buggy address belongs to the object at fff00000c6767080
[   38.149687]  which belongs to the cache kmalloc-64 of size 64
[   38.151250] The buggy address is located 0 bytes to the right of
[   38.151250]  allocated 48-byte region [fff00000c6767080, fff00000c67670b0)
[   38.152647] 
[   38.152998] The buggy address belongs to the physical page:
[   38.153717] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106767
[   38.154600] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   38.155500] page_type: f5(slab)
[   38.156022] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   38.156989] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   38.157920] page dumped because: kasan: bad access detected
[   38.158571] 
[   38.158975] Memory state around the buggy address:
[   38.159589]  fff00000c6766f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   38.160467]  fff00000c6767000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   38.161278] >fff00000c6767080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   38.162224]                                      ^
[   38.162853]  fff00000c6767100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   38.163827]  fff00000c6767180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   38.164683] ==================================================================
[   37.320134] ==================================================================
[   37.320998] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa04/0x4858
[   37.322747] Write of size 4 at addr fff00000c67670b0 by task kunit_try_catch/253
[   37.323866] 
[   37.324248] CPU: 1 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241204 #1
[   37.325584] Tainted: [B]=BAD_PAGE, [N]=TEST
[   37.326217] Hardware name: linux,dummy-virt (DT)
[   37.326898] Call trace:
[   37.327498]  show_stack+0x20/0x38 (C)
[   37.328138]  dump_stack_lvl+0x8c/0xd0
[   37.328897]  print_report+0x118/0x5e0
[   37.329573]  kasan_report+0xc8/0x118
[   37.330325]  kasan_check_range+0x100/0x1a8
[   37.331119]  __kasan_check_write+0x20/0x30
[   37.331878]  kasan_atomics_helper+0xa04/0x4858
[   37.332651]  kasan_atomics+0x198/0x2e8
[   37.333294]  kunit_try_run_case+0x14c/0x3d0
[   37.333990]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.334817]  kthread+0x24c/0x2d0
[   37.335496]  ret_from_fork+0x10/0x20
[   37.336132] 
[   37.336555] Allocated by task 253:
[   37.337173]  kasan_save_stack+0x3c/0x68
[   37.337910]  kasan_save_track+0x20/0x40
[   37.338456]  kasan_save_alloc_info+0x40/0x58
[   37.339280]  __kasan_kmalloc+0xd4/0xd8
[   37.339865]  __kmalloc_cache_noprof+0x15c/0x3c0
[   37.340671]  kasan_atomics+0xb8/0x2e8
[   37.341372]  kunit_try_run_case+0x14c/0x3d0
[   37.342200]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.343027]  kthread+0x24c/0x2d0
[   37.343746]  ret_from_fork+0x10/0x20
[   37.344461] 
[   37.344813] The buggy address belongs to the object at fff00000c6767080
[   37.344813]  which belongs to the cache kmalloc-64 of size 64
[   37.346485] The buggy address is located 0 bytes to the right of
[   37.346485]  allocated 48-byte region [fff00000c6767080, fff00000c67670b0)
[   37.348222] 
[   37.348708] The buggy address belongs to the physical page:
[   37.349403] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106767
[   37.350602] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   37.351436] page_type: f5(slab)
[   37.352030] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   37.353019] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   37.353827] page dumped because: kasan: bad access detected
[   37.354544] 
[   37.354988] Memory state around the buggy address:
[   37.355662]  fff00000c6766f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.356521]  fff00000c6767000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   37.357391] >fff00000c6767080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   37.358319]                                      ^
[   37.358964]  fff00000c6767100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.359898]  fff00000c6767180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.360801] ==================================================================
[   38.731006] ==================================================================
[   38.731817] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1644/0x4858
[   38.734075] Write of size 8 at addr fff00000c67670b0 by task kunit_try_catch/253
[   38.734929] 
[   38.735242] CPU: 1 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241204 #1
[   38.736318] Tainted: [B]=BAD_PAGE, [N]=TEST
[   38.736808] Hardware name: linux,dummy-virt (DT)
[   38.737546] Call trace:
[   38.737990]  show_stack+0x20/0x38 (C)
[   38.738496]  dump_stack_lvl+0x8c/0xd0
[   38.739234]  print_report+0x118/0x5e0
[   38.739961]  kasan_report+0xc8/0x118
[   38.740646]  kasan_check_range+0x100/0x1a8
[   38.741350]  __kasan_check_write+0x20/0x30
[   38.742021]  kasan_atomics_helper+0x1644/0x4858
[   38.742667]  kasan_atomics+0x198/0x2e8
[   38.743298]  kunit_try_run_case+0x14c/0x3d0
[   38.744033]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   38.744746]  kthread+0x24c/0x2d0
[   38.745359]  ret_from_fork+0x10/0x20
[   38.745936] 
[   38.746318] Allocated by task 253:
[   38.746970]  kasan_save_stack+0x3c/0x68
[   38.747689]  kasan_save_track+0x20/0x40
[   38.748273]  kasan_save_alloc_info+0x40/0x58
[   38.748842]  __kasan_kmalloc+0xd4/0xd8
[   38.749487]  __kmalloc_cache_noprof+0x15c/0x3c0
[   38.750100]  kasan_atomics+0xb8/0x2e8
[   38.750789]  kunit_try_run_case+0x14c/0x3d0
[   38.751416]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   38.752176]  kthread+0x24c/0x2d0
[   38.752678]  ret_from_fork+0x10/0x20
[   38.753176] 
[   38.753577] The buggy address belongs to the object at fff00000c6767080
[   38.753577]  which belongs to the cache kmalloc-64 of size 64
[   38.754964] The buggy address is located 0 bytes to the right of
[   38.754964]  allocated 48-byte region [fff00000c6767080, fff00000c67670b0)
[   38.756402] 
[   38.756779] The buggy address belongs to the physical page:
[   38.757499] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106767
[   38.758452] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   38.759161] page_type: f5(slab)
[   38.759680] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   38.760642] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   38.761558] page dumped because: kasan: bad access detected
[   38.762315] 
[   38.762683] Memory state around the buggy address:
[   38.763187]  fff00000c6766f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   38.764171]  fff00000c6767000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   38.765007] >fff00000c6767080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   38.765957]                                      ^
[   38.766520]  fff00000c6767100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   38.767475]  fff00000c6767180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   38.768379] ==================================================================
[   37.604575] ==================================================================
[   37.605472] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3de4/0x4858
[   37.606782] Read of size 4 at addr fff00000c67670b0 by task kunit_try_catch/253
[   37.607700] 
[   37.608054] CPU: 1 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241204 #1
[   37.609244] Tainted: [B]=BAD_PAGE, [N]=TEST
[   37.609777] Hardware name: linux,dummy-virt (DT)
[   37.610587] Call trace:
[   37.611261]  show_stack+0x20/0x38 (C)
[   37.611982]  dump_stack_lvl+0x8c/0xd0
[   37.612567]  print_report+0x118/0x5e0
[   37.613146]  kasan_report+0xc8/0x118
[   37.613802]  __asan_report_load4_noabort+0x20/0x30
[   37.614557]  kasan_atomics_helper+0x3de4/0x4858
[   37.615259]  kasan_atomics+0x198/0x2e8
[   37.615889]  kunit_try_run_case+0x14c/0x3d0
[   37.616458]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.617260]  kthread+0x24c/0x2d0
[   37.617899]  ret_from_fork+0x10/0x20
[   37.618453] 
[   37.618834] Allocated by task 253:
[   37.619409]  kasan_save_stack+0x3c/0x68
[   37.619973]  kasan_save_track+0x20/0x40
[   37.620648]  kasan_save_alloc_info+0x40/0x58
[   37.621292]  __kasan_kmalloc+0xd4/0xd8
[   37.621832]  __kmalloc_cache_noprof+0x15c/0x3c0
[   37.622614]  kasan_atomics+0xb8/0x2e8
[   37.623129]  kunit_try_run_case+0x14c/0x3d0
[   37.623840]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.624571]  kthread+0x24c/0x2d0
[   37.625240]  ret_from_fork+0x10/0x20
[   37.625819] 
[   37.626197] The buggy address belongs to the object at fff00000c6767080
[   37.626197]  which belongs to the cache kmalloc-64 of size 64
[   37.627671] The buggy address is located 0 bytes to the right of
[   37.627671]  allocated 48-byte region [fff00000c6767080, fff00000c67670b0)
[   37.629177] 
[   37.629500] The buggy address belongs to the physical page:
[   37.630131] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106767
[   37.631103] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   37.632098] page_type: f5(slab)
[   37.632563] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   37.633605] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   37.634536] page dumped because: kasan: bad access detected
[   37.635233] 
[   37.635577] Memory state around the buggy address:
[   37.636216]  fff00000c6766f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.637035]  fff00000c6767000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   37.637920] >fff00000c6767080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   37.638927]                                      ^
[   37.639582]  fff00000c6767100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.640503]  fff00000c6767180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.641395] ==================================================================
[   37.024815] ==================================================================
[   37.025586] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x6ec/0x4858
[   37.026506] Write of size 4 at addr fff00000c67670b0 by task kunit_try_catch/253
[   37.027817] 
[   37.029157] CPU: 1 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241204 #1
[   37.030550] Tainted: [B]=BAD_PAGE, [N]=TEST
[   37.031136] Hardware name: linux,dummy-virt (DT)
[   37.031983] Call trace:
[   37.032315]  show_stack+0x20/0x38 (C)
[   37.033119]  dump_stack_lvl+0x8c/0xd0
[   37.033710]  print_report+0x118/0x5e0
[   37.034321]  kasan_report+0xc8/0x118
[   37.035102]  kasan_check_range+0x100/0x1a8
[   37.035894]  __kasan_check_write+0x20/0x30
[   37.036573]  kasan_atomics_helper+0x6ec/0x4858
[   37.037305]  kasan_atomics+0x198/0x2e8
[   37.037969]  kunit_try_run_case+0x14c/0x3d0
[   37.038728]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.039547]  kthread+0x24c/0x2d0
[   37.040241]  ret_from_fork+0x10/0x20
[   37.040887] 
[   37.041229] Allocated by task 253:
[   37.041952]  kasan_save_stack+0x3c/0x68
[   37.042663]  kasan_save_track+0x20/0x40
[   37.043385]  kasan_save_alloc_info+0x40/0x58
[   37.044066]  __kasan_kmalloc+0xd4/0xd8
[   37.044718]  __kmalloc_cache_noprof+0x15c/0x3c0
[   37.045535]  kasan_atomics+0xb8/0x2e8
[   37.046155]  kunit_try_run_case+0x14c/0x3d0
[   37.046844]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.047708]  kthread+0x24c/0x2d0
[   37.048317]  ret_from_fork+0x10/0x20
[   37.048981] 
[   37.049325] The buggy address belongs to the object at fff00000c6767080
[   37.049325]  which belongs to the cache kmalloc-64 of size 64
[   37.050887] The buggy address is located 0 bytes to the right of
[   37.050887]  allocated 48-byte region [fff00000c6767080, fff00000c67670b0)
[   37.052594] 
[   37.053055] The buggy address belongs to the physical page:
[   37.053860] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106767
[   37.054961] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   37.055871] page_type: f5(slab)
[   37.056565] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   37.057600] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   37.058597] page dumped because: kasan: bad access detected
[   37.059491] 
[   37.059984] Memory state around the buggy address:
[   37.060756]  fff00000c6766f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.061753]  fff00000c6767000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   37.062751] >fff00000c6767080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   37.063698]                                      ^
[   37.064483]  fff00000c6767100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.065513]  fff00000c6767180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.066407] ==================================================================
[   37.193381] ==================================================================
[   37.195175] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x42d8/0x4858
[   37.196713] Read of size 4 at addr fff00000c67670b0 by task kunit_try_catch/253
[   37.197914] 
[   37.198375] CPU: 1 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241204 #1
[   37.199917] Tainted: [B]=BAD_PAGE, [N]=TEST
[   37.200698] Hardware name: linux,dummy-virt (DT)
[   37.201459] Call trace:
[   37.201907]  show_stack+0x20/0x38 (C)
[   37.202514]  dump_stack_lvl+0x8c/0xd0
[   37.203339]  print_report+0x118/0x5e0
[   37.204007]  kasan_report+0xc8/0x118
[   37.204697]  __asan_report_load4_noabort+0x20/0x30
[   37.205425]  kasan_atomics_helper+0x42d8/0x4858
[   37.206136]  kasan_atomics+0x198/0x2e8
[   37.206744]  kunit_try_run_case+0x14c/0x3d0
[   37.207534]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.208438]  kthread+0x24c/0x2d0
[   37.209009]  ret_from_fork+0x10/0x20
[   37.209683] 
[   37.210040] Allocated by task 253:
[   37.210620]  kasan_save_stack+0x3c/0x68
[   37.211325]  kasan_save_track+0x20/0x40
[   37.211885]  kasan_save_alloc_info+0x40/0x58
[   37.212722]  __kasan_kmalloc+0xd4/0xd8
[   37.213353]  __kmalloc_cache_noprof+0x15c/0x3c0
[   37.214066]  kasan_atomics+0xb8/0x2e8
[   37.214721]  kunit_try_run_case+0x14c/0x3d0
[   37.215418]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.216198]  kthread+0x24c/0x2d0
[   37.216817]  ret_from_fork+0x10/0x20
[   37.217459] 
[   37.217907] The buggy address belongs to the object at fff00000c6767080
[   37.217907]  which belongs to the cache kmalloc-64 of size 64
[   37.219435] The buggy address is located 0 bytes to the right of
[   37.219435]  allocated 48-byte region [fff00000c6767080, fff00000c67670b0)
[   37.221041] 
[   37.221532] The buggy address belongs to the physical page:
[   37.222350] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106767
[   37.223436] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   37.224297] page_type: f5(slab)
[   37.224871] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   37.225972] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   37.227071] page dumped because: kasan: bad access detected
[   37.227866] 
[   37.228299] Memory state around the buggy address:
[   37.229013]  fff00000c6766f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.230065]  fff00000c6767000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   37.231042] >fff00000c6767080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   37.232010]                                      ^
[   37.232734]  fff00000c6767100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.233692]  fff00000c6767180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.234566] ==================================================================
[   36.328983] ==================================================================
[   36.330523] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f7c/0x4858
[   36.333554] Write of size 4 at addr fff00000c67670b0 by task kunit_try_catch/253
[   36.334856] 
[   36.335409] CPU: 1 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241204 #1
[   36.336676] Tainted: [B]=BAD_PAGE, [N]=TEST
[   36.337441] Hardware name: linux,dummy-virt (DT)
[   36.338953] Call trace:
[   36.339679]  show_stack+0x20/0x38 (C)
[   36.340268]  dump_stack_lvl+0x8c/0xd0
[   36.340946]  print_report+0x118/0x5e0
[   36.341566]  kasan_report+0xc8/0x118
[   36.342159]  __asan_report_store4_noabort+0x20/0x30
[   36.342969]  kasan_atomics_helper+0x3f7c/0x4858
[   36.343712]  kasan_atomics+0x198/0x2e8
[   36.344661]  kunit_try_run_case+0x14c/0x3d0
[   36.345325]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.346116]  kthread+0x24c/0x2d0
[   36.347234]  ret_from_fork+0x10/0x20
[   36.347831] 
[   36.348129] Allocated by task 253:
[   36.348669]  kasan_save_stack+0x3c/0x68
[   36.349359]  kasan_save_track+0x20/0x40
[   36.349904]  kasan_save_alloc_info+0x40/0x58
[   36.350798]  __kasan_kmalloc+0xd4/0xd8
[   36.352144]  __kmalloc_cache_noprof+0x15c/0x3c0
[   36.352674]  kasan_atomics+0xb8/0x2e8
[   36.354012]  kunit_try_run_case+0x14c/0x3d0
[   36.354641]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.355364]  kthread+0x24c/0x2d0
[   36.356353]  ret_from_fork+0x10/0x20
[   36.357117] 
[   36.357610] The buggy address belongs to the object at fff00000c6767080
[   36.357610]  which belongs to the cache kmalloc-64 of size 64
[   36.359508] The buggy address is located 0 bytes to the right of
[   36.359508]  allocated 48-byte region [fff00000c6767080, fff00000c67670b0)
[   36.361261] 
[   36.361553] The buggy address belongs to the physical page:
[   36.362321] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106767
[   36.363358] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   36.364197] page_type: f5(slab)
[   36.364766] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   36.365926] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   36.366958] page dumped because: kasan: bad access detected
[   36.367550] 
[   36.367908] Memory state around the buggy address:
[   36.368475]  fff00000c6766f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.369421]  fff00000c6767000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   36.371297] >fff00000c6767080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   36.372445]                                      ^
[   36.373084]  fff00000c6767100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.374709]  fff00000c6767180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.375375] ==================================================================
[   36.983383] ==================================================================
[   36.984413] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x684/0x4858
[   36.985512] Write of size 4 at addr fff00000c67670b0 by task kunit_try_catch/253
[   36.987422] 
[   36.987797] CPU: 1 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241204 #1
[   36.989863] Tainted: [B]=BAD_PAGE, [N]=TEST
[   36.990834] Hardware name: linux,dummy-virt (DT)
[   36.991579] Call trace:
[   36.991985]  show_stack+0x20/0x38 (C)
[   36.992654]  dump_stack_lvl+0x8c/0xd0
[   36.993339]  print_report+0x118/0x5e0
[   36.993880]  kasan_report+0xc8/0x118
[   36.994532]  kasan_check_range+0x100/0x1a8
[   36.995198]  __kasan_check_write+0x20/0x30
[   36.995852]  kasan_atomics_helper+0x684/0x4858
[   36.996520]  kasan_atomics+0x198/0x2e8
[   36.997122]  kunit_try_run_case+0x14c/0x3d0
[   36.997701]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.998544]  kthread+0x24c/0x2d0
[   36.999100]  ret_from_fork+0x10/0x20
[   36.999679] 
[   36.999963] Allocated by task 253:
[   37.000515]  kasan_save_stack+0x3c/0x68
[   37.001168]  kasan_save_track+0x20/0x40
[   37.001769]  kasan_save_alloc_info+0x40/0x58
[   37.002315]  __kasan_kmalloc+0xd4/0xd8
[   37.003016]  __kmalloc_cache_noprof+0x15c/0x3c0
[   37.003519]  kasan_atomics+0xb8/0x2e8
[   37.004201]  kunit_try_run_case+0x14c/0x3d0
[   37.004774]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.005527]  kthread+0x24c/0x2d0
[   37.006007]  ret_from_fork+0x10/0x20
[   37.006735] 
[   37.007126] The buggy address belongs to the object at fff00000c6767080
[   37.007126]  which belongs to the cache kmalloc-64 of size 64
[   37.008617] The buggy address is located 0 bytes to the right of
[   37.008617]  allocated 48-byte region [fff00000c6767080, fff00000c67670b0)
[   37.010200] 
[   37.010499] The buggy address belongs to the physical page:
[   37.011412] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106767
[   37.012278] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   37.013153] page_type: f5(slab)
[   37.013814] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   37.014756] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   37.015768] page dumped because: kasan: bad access detected
[   37.016397] 
[   37.016732] Memory state around the buggy address:
[   37.017366]  fff00000c6766f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.018493]  fff00000c6767000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   37.019374] >fff00000c6767080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   37.020294]                                      ^
[   37.020943]  fff00000c6767100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.021869]  fff00000c6767180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.022719] ==================================================================
[   37.804578] ==================================================================
[   37.805518] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xdd4/0x4858
[   37.806923] Read of size 8 at addr fff00000c67670b0 by task kunit_try_catch/253
[   37.808216] 
[   37.808970] CPU: 1 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241204 #1
[   37.810235] Tainted: [B]=BAD_PAGE, [N]=TEST
[   37.810780] Hardware name: linux,dummy-virt (DT)
[   37.811547] Call trace:
[   37.812093]  show_stack+0x20/0x38 (C)
[   37.812737]  dump_stack_lvl+0x8c/0xd0
[   37.813365]  print_report+0x118/0x5e0
[   37.813999]  kasan_report+0xc8/0x118
[   37.814655]  kasan_check_range+0x100/0x1a8
[   37.815239]  __kasan_check_read+0x20/0x30
[   37.815927]  kasan_atomics_helper+0xdd4/0x4858
[   37.816598]  kasan_atomics+0x198/0x2e8
[   37.817208]  kunit_try_run_case+0x14c/0x3d0
[   37.817861]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.818606]  kthread+0x24c/0x2d0
[   37.819297]  ret_from_fork+0x10/0x20
[   37.819901] 
[   37.820214] Allocated by task 253:
[   37.820726]  kasan_save_stack+0x3c/0x68
[   37.821414]  kasan_save_track+0x20/0x40
[   37.821968]  kasan_save_alloc_info+0x40/0x58
[   37.822608]  __kasan_kmalloc+0xd4/0xd8
[   37.823447]  __kmalloc_cache_noprof+0x15c/0x3c0
[   37.824121]  kasan_atomics+0xb8/0x2e8
[   37.824773]  kunit_try_run_case+0x14c/0x3d0
[   37.825364]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.826148]  kthread+0x24c/0x2d0
[   37.826662]  ret_from_fork+0x10/0x20
[   37.827266] 
[   37.827574] The buggy address belongs to the object at fff00000c6767080
[   37.827574]  which belongs to the cache kmalloc-64 of size 64
[   37.829120] The buggy address is located 0 bytes to the right of
[   37.829120]  allocated 48-byte region [fff00000c6767080, fff00000c67670b0)
[   37.830564] 
[   37.830925] The buggy address belongs to the physical page:
[   37.831760] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106767
[   37.832733] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   37.833657] page_type: f5(slab)
[   37.834272] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   37.835351] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   37.836268] page dumped because: kasan: bad access detected
[   37.836944] 
[   37.837302] Memory state around the buggy address:
[   37.837939]  fff00000c6766f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.838895]  fff00000c6767000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   37.839718] >fff00000c6767080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   37.840579]                                      ^
[   37.841277]  fff00000c6767100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.842080]  fff00000c6767180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.843101] ==================================================================
[   36.704679] ==================================================================
[   36.705462] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x414/0x4858
[   36.706877] Write of size 4 at addr fff00000c67670b0 by task kunit_try_catch/253
[   36.708406] 
[   36.708983] CPU: 1 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241204 #1
[   36.711426] Tainted: [B]=BAD_PAGE, [N]=TEST
[   36.712705] Hardware name: linux,dummy-virt (DT)
[   36.713040] Call trace:
[   36.713252]  show_stack+0x20/0x38 (C)
[   36.713566]  dump_stack_lvl+0x8c/0xd0
[   36.715066]  print_report+0x118/0x5e0
[   36.715996]  kasan_report+0xc8/0x118
[   36.716785]  kasan_check_range+0x100/0x1a8
[   36.717447]  __kasan_check_write+0x20/0x30
[   36.718374]  kasan_atomics_helper+0x414/0x4858
[   36.719316]  kasan_atomics+0x198/0x2e8
[   36.719998]  kunit_try_run_case+0x14c/0x3d0
[   36.720661]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.721445]  kthread+0x24c/0x2d0
[   36.722040]  ret_from_fork+0x10/0x20
[   36.722746] 
[   36.723040] Allocated by task 253:
[   36.724079]  kasan_save_stack+0x3c/0x68
[   36.724699]  kasan_save_track+0x20/0x40
[   36.725273]  kasan_save_alloc_info+0x40/0x58
[   36.726524]  __kasan_kmalloc+0xd4/0xd8
[   36.727020]  __kmalloc_cache_noprof+0x15c/0x3c0
[   36.727484]  kasan_atomics+0xb8/0x2e8
[   36.728490]  kunit_try_run_case+0x14c/0x3d0
[   36.729184]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.730784]  kthread+0x24c/0x2d0
[   36.731211]  ret_from_fork+0x10/0x20
[   36.731784] 
[   36.732105] The buggy address belongs to the object at fff00000c6767080
[   36.732105]  which belongs to the cache kmalloc-64 of size 64
[   36.733389] The buggy address is located 0 bytes to the right of
[   36.733389]  allocated 48-byte region [fff00000c6767080, fff00000c67670b0)
[   36.735719] 
[   36.736100] The buggy address belongs to the physical page:
[   36.736927] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106767
[   36.738513] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   36.739542] page_type: f5(slab)
[   36.740076] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   36.741244] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   36.742662] page dumped because: kasan: bad access detected
[   36.743439] 
[   36.743763] Memory state around the buggy address:
[   36.744399]  fff00000c6766f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.745330]  fff00000c6767000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   36.746643] >fff00000c6767080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   36.748263]                                      ^
[   36.749396]  fff00000c6767100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.751085]  fff00000c6767180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.752731] ==================================================================
[   37.481012] ==================================================================
[   37.481899] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xb70/0x4858
[   37.482781] Write of size 4 at addr fff00000c67670b0 by task kunit_try_catch/253
[   37.483786] 
[   37.484245] CPU: 1 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241204 #1
[   37.485426] Tainted: [B]=BAD_PAGE, [N]=TEST
[   37.486123] Hardware name: linux,dummy-virt (DT)
[   37.486710] Call trace:
[   37.487259]  show_stack+0x20/0x38 (C)
[   37.487989]  dump_stack_lvl+0x8c/0xd0
[   37.488693]  print_report+0x118/0x5e0
[   37.489338]  kasan_report+0xc8/0x118
[   37.489919]  kasan_check_range+0x100/0x1a8
[   37.490533]  __kasan_check_write+0x20/0x30
[   37.491240]  kasan_atomics_helper+0xb70/0x4858
[   37.492007]  kasan_atomics+0x198/0x2e8
[   37.492671]  kunit_try_run_case+0x14c/0x3d0
[   37.493342]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.494162]  kthread+0x24c/0x2d0
[   37.494824]  ret_from_fork+0x10/0x20
[   37.495403] 
[   37.495752] Allocated by task 253:
[   37.496301]  kasan_save_stack+0x3c/0x68
[   37.496984]  kasan_save_track+0x20/0x40
[   37.497546]  kasan_save_alloc_info+0x40/0x58
[   37.498234]  __kasan_kmalloc+0xd4/0xd8
[   37.498891]  __kmalloc_cache_noprof+0x15c/0x3c0
[   37.499552]  kasan_atomics+0xb8/0x2e8
[   37.500091]  kunit_try_run_case+0x14c/0x3d0
[   37.500703]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.501384]  kthread+0x24c/0x2d0
[   37.501936]  ret_from_fork+0x10/0x20
[   37.502504] 
[   37.502970] The buggy address belongs to the object at fff00000c6767080
[   37.502970]  which belongs to the cache kmalloc-64 of size 64
[   37.504280] The buggy address is located 0 bytes to the right of
[   37.504280]  allocated 48-byte region [fff00000c6767080, fff00000c67670b0)
[   37.505839] 
[   37.506307] The buggy address belongs to the physical page:
[   37.507068] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106767
[   37.508043] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   37.508981] page_type: f5(slab)
[   37.509357] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   37.510340] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   37.511370] page dumped because: kasan: bad access detected
[   37.512079] 
[   37.512385] Memory state around the buggy address:
[   37.513049]  fff00000c6766f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.513886]  fff00000c6767000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   37.514826] >fff00000c6767080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   37.515690]                                      ^
[   37.516324]  fff00000c6767100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.517152]  fff00000c6767180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.518065] ==================================================================
[   36.427002] ==================================================================
[   36.427787] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x24c/0x4858
[   36.428541] Write of size 4 at addr fff00000c67670b0 by task kunit_try_catch/253
[   36.429678] 
[   36.430151] CPU: 1 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241204 #1
[   36.431461] Tainted: [B]=BAD_PAGE, [N]=TEST
[   36.432427] Hardware name: linux,dummy-virt (DT)
[   36.433378] Call trace:
[   36.434115]  show_stack+0x20/0x38 (C)
[   36.434607]  dump_stack_lvl+0x8c/0xd0
[   36.435234]  print_report+0x118/0x5e0
[   36.436037]  kasan_report+0xc8/0x118
[   36.436692]  kasan_check_range+0x100/0x1a8
[   36.437446]  __kasan_check_write+0x20/0x30
[   36.438394]  kasan_atomics_helper+0x24c/0x4858
[   36.439070]  kasan_atomics+0x198/0x2e8
[   36.439683]  kunit_try_run_case+0x14c/0x3d0
[   36.440271]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.441056]  kthread+0x24c/0x2d0
[   36.441692]  ret_from_fork+0x10/0x20
[   36.442458] 
[   36.443382] Allocated by task 253:
[   36.444056]  kasan_save_stack+0x3c/0x68
[   36.444876]  kasan_save_track+0x20/0x40
[   36.445410]  kasan_save_alloc_info+0x40/0x58
[   36.446051]  __kasan_kmalloc+0xd4/0xd8
[   36.446480]  __kmalloc_cache_noprof+0x15c/0x3c0
[   36.447019]  kasan_atomics+0xb8/0x2e8
[   36.447681]  kunit_try_run_case+0x14c/0x3d0
[   36.448265]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.449235]  kthread+0x24c/0x2d0
[   36.449794]  ret_from_fork+0x10/0x20
[   36.451106] 
[   36.451572] The buggy address belongs to the object at fff00000c6767080
[   36.451572]  which belongs to the cache kmalloc-64 of size 64
[   36.453415] The buggy address is located 0 bytes to the right of
[   36.453415]  allocated 48-byte region [fff00000c6767080, fff00000c67670b0)
[   36.455120] 
[   36.455310] The buggy address belongs to the physical page:
[   36.455687] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106767
[   36.456971] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   36.457705] page_type: f5(slab)
[   36.458602] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   36.459714] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   36.461189] page dumped because: kasan: bad access detected
[   36.462052] 
[   36.462699] Memory state around the buggy address:
[   36.463961]  fff00000c6766f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.465198]  fff00000c6767000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   36.466057] >fff00000c6767080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   36.466877]                                      ^
[   36.467504]  fff00000c6767100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.468993]  fff00000c6767180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.470114] ==================================================================
[   38.531693] ==================================================================
[   38.532333] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x147c/0x4858
[   38.533868] Write of size 8 at addr fff00000c67670b0 by task kunit_try_catch/253
[   38.534837] 
[   38.535191] CPU: 1 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241204 #1
[   38.536453] Tainted: [B]=BAD_PAGE, [N]=TEST
[   38.536968] Hardware name: linux,dummy-virt (DT)
[   38.537726] Call trace:
[   38.538118]  show_stack+0x20/0x38 (C)
[   38.538890]  dump_stack_lvl+0x8c/0xd0
[   38.539554]  print_report+0x118/0x5e0
[   38.540074]  kasan_report+0xc8/0x118
[   38.540768]  kasan_check_range+0x100/0x1a8
[   38.541351]  __kasan_check_write+0x20/0x30
[   38.542129]  kasan_atomics_helper+0x147c/0x4858
[   38.542812]  kasan_atomics+0x198/0x2e8
[   38.543469]  kunit_try_run_case+0x14c/0x3d0
[   38.544173]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   38.544996]  kthread+0x24c/0x2d0
[   38.545607]  ret_from_fork+0x10/0x20
[   38.546316] 
[   38.546794] Allocated by task 253:
[   38.547376]  kasan_save_stack+0x3c/0x68
[   38.547932]  kasan_save_track+0x20/0x40
[   38.548588]  kasan_save_alloc_info+0x40/0x58
[   38.549203]  __kasan_kmalloc+0xd4/0xd8
[   38.549967]  __kmalloc_cache_noprof+0x15c/0x3c0
[   38.550647]  kasan_atomics+0xb8/0x2e8
[   38.551322]  kunit_try_run_case+0x14c/0x3d0
[   38.551868]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   38.552830]  kthread+0x24c/0x2d0
[   38.553352]  ret_from_fork+0x10/0x20
[   38.554019] 
[   38.554324] The buggy address belongs to the object at fff00000c6767080
[   38.554324]  which belongs to the cache kmalloc-64 of size 64
[   38.555920] The buggy address is located 0 bytes to the right of
[   38.555920]  allocated 48-byte region [fff00000c6767080, fff00000c67670b0)
[   38.557376] 
[   38.557764] The buggy address belongs to the physical page:
[   38.558457] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106767
[   38.559442] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   38.560270] page_type: f5(slab)
[   38.560884] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   38.561867] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   38.562772] page dumped because: kasan: bad access detected
[   38.563465] 
[   38.563802] Memory state around the buggy address:
[   38.564483]  fff00000c6766f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   38.565256]  fff00000c6767000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   38.566257] >fff00000c6767080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   38.567156]                                      ^
[   38.567730]  fff00000c6767100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   38.568614]  fff00000c6767180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   38.569519] ==================================================================
[   36.851178] ==================================================================
[   36.852067] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x54c/0x4858
[   36.852798] Write of size 4 at addr fff00000c67670b0 by task kunit_try_catch/253
[   36.853680] 
[   36.854611] CPU: 1 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241204 #1
[   36.856884] Tainted: [B]=BAD_PAGE, [N]=TEST
[   36.857642] Hardware name: linux,dummy-virt (DT)
[   36.858613] Call trace:
[   36.859006]  show_stack+0x20/0x38 (C)
[   36.859811]  dump_stack_lvl+0x8c/0xd0
[   36.860373]  print_report+0x118/0x5e0
[   36.861054]  kasan_report+0xc8/0x118
[   36.861645]  kasan_check_range+0x100/0x1a8
[   36.862674]  __kasan_check_write+0x20/0x30
[   36.863516]  kasan_atomics_helper+0x54c/0x4858
[   36.864249]  kasan_atomics+0x198/0x2e8
[   36.864904]  kunit_try_run_case+0x14c/0x3d0
[   36.865922]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.866752]  kthread+0x24c/0x2d0
[   36.867284]  ret_from_fork+0x10/0x20
[   36.867704] 
[   36.868097] Allocated by task 253:
[   36.868581]  kasan_save_stack+0x3c/0x68
[   36.869088]  kasan_save_track+0x20/0x40
[   36.869946]  kasan_save_alloc_info+0x40/0x58
[   36.870890]  __kasan_kmalloc+0xd4/0xd8
[   36.871646]  __kmalloc_cache_noprof+0x15c/0x3c0
[   36.872257]  kasan_atomics+0xb8/0x2e8
[   36.872861]  kunit_try_run_case+0x14c/0x3d0
[   36.873571]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.874712]  kthread+0x24c/0x2d0
[   36.875983]  ret_from_fork+0x10/0x20
[   36.876582] 
[   36.877078] The buggy address belongs to the object at fff00000c6767080
[   36.877078]  which belongs to the cache kmalloc-64 of size 64
[   36.879076] The buggy address is located 0 bytes to the right of
[   36.879076]  allocated 48-byte region [fff00000c6767080, fff00000c67670b0)
[   36.881124] 
[   36.881325] The buggy address belongs to the physical page:
[   36.882157] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106767
[   36.883306] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   36.884185] page_type: f5(slab)
[   36.884694] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   36.885580] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   36.886882] page dumped because: kasan: bad access detected
[   36.887744] 
[   36.888095] Memory state around the buggy address:
[   36.889003]  fff00000c6766f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.890072]  fff00000c6767000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   36.891290] >fff00000c6767080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   36.892255]                                      ^
[   36.892959]  fff00000c6767100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.894042]  fff00000c6767180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.895992] ==================================================================
[   38.688940] ==================================================================
[   38.690648] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3db0/0x4858
[   38.691838] Read of size 8 at addr fff00000c67670b0 by task kunit_try_catch/253
[   38.692943] 
[   38.693808] CPU: 1 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241204 #1
[   38.695071] Tainted: [B]=BAD_PAGE, [N]=TEST
[   38.695592] Hardware name: linux,dummy-virt (DT)
[   38.696303] Call trace:
[   38.696759]  show_stack+0x20/0x38 (C)
[   38.697434]  dump_stack_lvl+0x8c/0xd0
[   38.698148]  print_report+0x118/0x5e0
[   38.698880]  kasan_report+0xc8/0x118
[   38.699585]  __asan_report_load8_noabort+0x20/0x30
[   38.700367]  kasan_atomics_helper+0x3db0/0x4858
[   38.701077]  kasan_atomics+0x198/0x2e8
[   38.701728]  kunit_try_run_case+0x14c/0x3d0
[   38.702472]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   38.703336]  kthread+0x24c/0x2d0
[   38.703963]  ret_from_fork+0x10/0x20
[   38.704595] 
[   38.705015] Allocated by task 253:
[   38.705605]  kasan_save_stack+0x3c/0x68
[   38.706356]  kasan_save_track+0x20/0x40
[   38.707081]  kasan_save_alloc_info+0x40/0x58
[   38.707828]  __kasan_kmalloc+0xd4/0xd8
[   38.708489]  __kmalloc_cache_noprof+0x15c/0x3c0
[   38.709201]  kasan_atomics+0xb8/0x2e8
[   38.709846]  kunit_try_run_case+0x14c/0x3d0
[   38.710593]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   38.711439]  kthread+0x24c/0x2d0
[   38.711974]  ret_from_fork+0x10/0x20
[   38.712679] 
[   38.713021] The buggy address belongs to the object at fff00000c6767080
[   38.713021]  which belongs to the cache kmalloc-64 of size 64
[   38.714464] The buggy address is located 0 bytes to the right of
[   38.714464]  allocated 48-byte region [fff00000c6767080, fff00000c67670b0)
[   38.716062] 
[   38.716557] The buggy address belongs to the physical page:
[   38.717355] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106767
[   38.718396] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   38.719326] page_type: f5(slab)
[   38.719829] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   38.720948] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   38.721941] page dumped because: kasan: bad access detected
[   38.722780] 
[   38.723235] Memory state around the buggy address:
[   38.723875]  fff00000c6766f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   38.724712]  fff00000c6767000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   38.725587] >fff00000c6767080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   38.726453]                                      ^
[   38.727077]  fff00000c6767100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   38.728005]  fff00000c6767180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   38.728888] ==================================================================
[   38.932121] ==================================================================
[   38.932872] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e20/0x4858
[   38.934268] Read of size 8 at addr fff00000c67670b0 by task kunit_try_catch/253
[   38.935393] 
[   38.935757] CPU: 1 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241204 #1
[   38.937195] Tainted: [B]=BAD_PAGE, [N]=TEST
[   38.937718] Hardware name: linux,dummy-virt (DT)
[   38.938408] Call trace:
[   38.938958]  show_stack+0x20/0x38 (C)
[   38.939493]  dump_stack_lvl+0x8c/0xd0
[   38.940171]  print_report+0x118/0x5e0
[   38.940754]  kasan_report+0xc8/0x118
[   38.941396]  __asan_report_load8_noabort+0x20/0x30
[   38.942006]  kasan_atomics_helper+0x3e20/0x4858
[   38.942763]  kasan_atomics+0x198/0x2e8
[   38.943472]  kunit_try_run_case+0x14c/0x3d0
[   38.944077]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   38.944960]  kthread+0x24c/0x2d0
[   38.945527]  ret_from_fork+0x10/0x20
[   38.946100] 
[   38.946440] Allocated by task 253:
[   38.946938]  kasan_save_stack+0x3c/0x68
[   38.947526]  kasan_save_track+0x20/0x40
[   38.948185]  kasan_save_alloc_info+0x40/0x58
[   38.948700]  __kasan_kmalloc+0xd4/0xd8
[   38.949438]  __kmalloc_cache_noprof+0x15c/0x3c0
[   38.950126]  kasan_atomics+0xb8/0x2e8
[   38.950690]  kunit_try_run_case+0x14c/0x3d0
[   38.951299]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   38.952105]  kthread+0x24c/0x2d0
[   38.952737]  ret_from_fork+0x10/0x20
[   38.953270] 
[   38.953662] The buggy address belongs to the object at fff00000c6767080
[   38.953662]  which belongs to the cache kmalloc-64 of size 64
[   38.955097] The buggy address is located 0 bytes to the right of
[   38.955097]  allocated 48-byte region [fff00000c6767080, fff00000c67670b0)
[   38.956524] 
[   38.956902] The buggy address belongs to the physical page:
[   38.957686] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106767
[   38.958804] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   38.959684] page_type: f5(slab)
[   38.960156] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   38.961182] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   38.962163] page dumped because: kasan: bad access detected
[   38.962876] 
[   38.963228] Memory state around the buggy address:
[   38.963967]  fff00000c6766f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   38.964826]  fff00000c6767000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   38.965711] >fff00000c6767080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   38.966648]                                      ^
[   38.967267]  fff00000c6767100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   38.968184]  fff00000c6767180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   38.969077] ==================================================================
[   36.518173] ==================================================================
[   36.519841] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x40fc/0x4858
[   36.520925] Read of size 4 at addr fff00000c67670b0 by task kunit_try_catch/253
[   36.522840] 
[   36.523346] CPU: 1 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241204 #1
[   36.524494] Tainted: [B]=BAD_PAGE, [N]=TEST
[   36.525125] Hardware name: linux,dummy-virt (DT)
[   36.525444] Call trace:
[   36.525733]  show_stack+0x20/0x38 (C)
[   36.527076]  dump_stack_lvl+0x8c/0xd0
[   36.527694]  print_report+0x118/0x5e0
[   36.528396]  kasan_report+0xc8/0x118
[   36.529021]  __asan_report_load4_noabort+0x20/0x30
[   36.529936]  kasan_atomics_helper+0x40fc/0x4858
[   36.530692]  kasan_atomics+0x198/0x2e8
[   36.531177]  kunit_try_run_case+0x14c/0x3d0
[   36.531909]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.532583]  kthread+0x24c/0x2d0
[   36.533255]  ret_from_fork+0x10/0x20
[   36.533969] 
[   36.534251] Allocated by task 253:
[   36.534995]  kasan_save_stack+0x3c/0x68
[   36.535667]  kasan_save_track+0x20/0x40
[   36.536437]  kasan_save_alloc_info+0x40/0x58
[   36.537386]  __kasan_kmalloc+0xd4/0xd8
[   36.538230]  __kmalloc_cache_noprof+0x15c/0x3c0
[   36.539230]  kasan_atomics+0xb8/0x2e8
[   36.539991]  kunit_try_run_case+0x14c/0x3d0
[   36.540794]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.541556]  kthread+0x24c/0x2d0
[   36.542379]  ret_from_fork+0x10/0x20
[   36.542927] 
[   36.543319] The buggy address belongs to the object at fff00000c6767080
[   36.543319]  which belongs to the cache kmalloc-64 of size 64
[   36.545283] The buggy address is located 0 bytes to the right of
[   36.545283]  allocated 48-byte region [fff00000c6767080, fff00000c67670b0)
[   36.547183] 
[   36.547505] The buggy address belongs to the physical page:
[   36.548121] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106767
[   36.549365] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   36.550674] page_type: f5(slab)
[   36.551097] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   36.552986] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   36.554057] page dumped because: kasan: bad access detected
[   36.556100] 
[   36.556354] Memory state around the buggy address:
[   36.556732]  fff00000c6766f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.557581]  fff00000c6767000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   36.558415] >fff00000c6767080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   36.559407]                                      ^
[   36.560302]  fff00000c6767100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.561726]  fff00000c6767180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.562823] ==================================================================
[   38.889974] ==================================================================
[   38.890946] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x175c/0x4858
[   38.891854] Write of size 8 at addr fff00000c67670b0 by task kunit_try_catch/253
[   38.892690] 
[   38.893177] CPU: 1 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241204 #1
[   38.894758] Tainted: [B]=BAD_PAGE, [N]=TEST
[   38.895397] Hardware name: linux,dummy-virt (DT)
[   38.896055] Call trace:
[   38.896595]  show_stack+0x20/0x38 (C)
[   38.897316]  dump_stack_lvl+0x8c/0xd0
[   38.898002]  print_report+0x118/0x5e0
[   38.898658]  kasan_report+0xc8/0x118
[   38.899340]  kasan_check_range+0x100/0x1a8
[   38.900080]  __kasan_check_write+0x20/0x30
[   38.900775]  kasan_atomics_helper+0x175c/0x4858
[   38.901541]  kasan_atomics+0x198/0x2e8
[   38.902201]  kunit_try_run_case+0x14c/0x3d0
[   38.902937]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   38.903734]  kthread+0x24c/0x2d0
[   38.904372]  ret_from_fork+0x10/0x20
[   38.905014] 
[   38.905349] Allocated by task 253:
[   38.905958]  kasan_save_stack+0x3c/0x68
[   38.906612]  kasan_save_track+0x20/0x40
[   38.907319]  kasan_save_alloc_info+0x40/0x58
[   38.908058]  __kasan_kmalloc+0xd4/0xd8
[   38.908794]  __kmalloc_cache_noprof+0x15c/0x3c0
[   38.909509]  kasan_atomics+0xb8/0x2e8
[   38.910156]  kunit_try_run_case+0x14c/0x3d0
[   38.910846]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   38.911684]  kthread+0x24c/0x2d0
[   38.912259]  ret_from_fork+0x10/0x20
[   38.912992] 
[   38.913409] The buggy address belongs to the object at fff00000c6767080
[   38.913409]  which belongs to the cache kmalloc-64 of size 64
[   38.915104] The buggy address is located 0 bytes to the right of
[   38.915104]  allocated 48-byte region [fff00000c6767080, fff00000c67670b0)
[   38.916726] 
[   38.917241] The buggy address belongs to the physical page:
[   38.917977] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106767
[   38.919150] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   38.920075] page_type: f5(slab)
[   38.920763] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   38.921827] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   38.922829] page dumped because: kasan: bad access detected
[   38.923647] 
[   38.923986] Memory state around the buggy address:
[   38.924748]  fff00000c6766f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   38.925845]  fff00000c6767000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   38.926844] >fff00000c6767080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   38.927981]                                      ^
[   38.928715]  fff00000c6767100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   38.929715]  fff00000c6767180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   38.930597] ==================================================================
[   36.754855] ==================================================================
[   36.756019] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x47c/0x4858
[   36.757391] Write of size 4 at addr fff00000c67670b0 by task kunit_try_catch/253
[   36.759060] 
[   36.759704] CPU: 1 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241204 #1
[   36.761013] Tainted: [B]=BAD_PAGE, [N]=TEST
[   36.761547] Hardware name: linux,dummy-virt (DT)
[   36.762182] Call trace:
[   36.762566]  show_stack+0x20/0x38 (C)
[   36.763546]  dump_stack_lvl+0x8c/0xd0
[   36.764143]  print_report+0x118/0x5e0
[   36.764853]  kasan_report+0xc8/0x118
[   36.765417]  kasan_check_range+0x100/0x1a8
[   36.766473]  __kasan_check_write+0x20/0x30
[   36.767152]  kasan_atomics_helper+0x47c/0x4858
[   36.767775]  kasan_atomics+0x198/0x2e8
[   36.768330]  kunit_try_run_case+0x14c/0x3d0
[   36.769311]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.770466]  kthread+0x24c/0x2d0
[   36.771386]  ret_from_fork+0x10/0x20
[   36.772105] 
[   36.772430] Allocated by task 253:
[   36.772919]  kasan_save_stack+0x3c/0x68
[   36.773450]  kasan_save_track+0x20/0x40
[   36.774765]  kasan_save_alloc_info+0x40/0x58
[   36.775234]  __kasan_kmalloc+0xd4/0xd8
[   36.776093]  __kmalloc_cache_noprof+0x15c/0x3c0
[   36.776911]  kasan_atomics+0xb8/0x2e8
[   36.777580]  kunit_try_run_case+0x14c/0x3d0
[   36.778731]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.779471]  kthread+0x24c/0x2d0
[   36.780094]  ret_from_fork+0x10/0x20
[   36.780770] 
[   36.781117] The buggy address belongs to the object at fff00000c6767080
[   36.781117]  which belongs to the cache kmalloc-64 of size 64
[   36.783180] The buggy address is located 0 bytes to the right of
[   36.783180]  allocated 48-byte region [fff00000c6767080, fff00000c67670b0)
[   36.784573] 
[   36.785060] The buggy address belongs to the physical page:
[   36.786213] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106767
[   36.787439] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   36.788332] page_type: f5(slab)
[   36.788880] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   36.790001] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   36.791031] page dumped because: kasan: bad access detected
[   36.791882] 
[   36.792187] Memory state around the buggy address:
[   36.793193]  fff00000c6766f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.794863]  fff00000c6767000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   36.796439] >fff00000c6767080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   36.797216]                                      ^
[   36.798150]  fff00000c6767100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.799104]  fff00000c6767180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.800024] ==================================================================
[   36.659327] ==================================================================
[   36.660275] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3ac/0x4858
[   36.661119] Write of size 4 at addr fff00000c67670b0 by task kunit_try_catch/253
[   36.662463] 
[   36.663134] CPU: 1 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241204 #1
[   36.664393] Tainted: [B]=BAD_PAGE, [N]=TEST
[   36.665460] Hardware name: linux,dummy-virt (DT)
[   36.666253] Call trace:
[   36.666949]  show_stack+0x20/0x38 (C)
[   36.667367]  dump_stack_lvl+0x8c/0xd0
[   36.668043]  print_report+0x118/0x5e0
[   36.668829]  kasan_report+0xc8/0x118
[   36.669475]  kasan_check_range+0x100/0x1a8
[   36.670425]  __kasan_check_write+0x20/0x30
[   36.671472]  kasan_atomics_helper+0x3ac/0x4858
[   36.672087]  kasan_atomics+0x198/0x2e8
[   36.672723]  kunit_try_run_case+0x14c/0x3d0
[   36.673361]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.674157]  kthread+0x24c/0x2d0
[   36.674802]  ret_from_fork+0x10/0x20
[   36.675502] 
[   36.675836] Allocated by task 253:
[   36.676434]  kasan_save_stack+0x3c/0x68
[   36.677114]  kasan_save_track+0x20/0x40
[   36.677769]  kasan_save_alloc_info+0x40/0x58
[   36.679029]  __kasan_kmalloc+0xd4/0xd8
[   36.680708]  __kmalloc_cache_noprof+0x15c/0x3c0
[   36.681343]  kasan_atomics+0xb8/0x2e8
[   36.681933]  kunit_try_run_case+0x14c/0x3d0
[   36.682537]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.683290]  kthread+0x24c/0x2d0
[   36.684023]  ret_from_fork+0x10/0x20
[   36.684569] 
[   36.685068] The buggy address belongs to the object at fff00000c6767080
[   36.685068]  which belongs to the cache kmalloc-64 of size 64
[   36.687328] The buggy address is located 0 bytes to the right of
[   36.687328]  allocated 48-byte region [fff00000c6767080, fff00000c67670b0)
[   36.688812] 
[   36.689125] The buggy address belongs to the physical page:
[   36.690114] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106767
[   36.691192] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   36.692022] page_type: f5(slab)
[   36.692677] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   36.693684] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   36.695196] page dumped because: kasan: bad access detected
[   36.695943] 
[   36.696381] Memory state around the buggy address:
[   36.697137]  fff00000c6766f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.697935]  fff00000c6767000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   36.699182] >fff00000c6767080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   36.700185]                                      ^
[   36.701075]  fff00000c6767100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.702018]  fff00000c6767180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.703307] ==================================================================
[   36.281290] ==================================================================
[   36.283456] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x40a8/0x4858
[   36.284435] Read of size 4 at addr fff00000c67670b0 by task kunit_try_catch/253
[   36.285130] 
[   36.285479] CPU: 1 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241204 #1
[   36.287566] Tainted: [B]=BAD_PAGE, [N]=TEST
[   36.288281] Hardware name: linux,dummy-virt (DT)
[   36.288918] Call trace:
[   36.289309]  show_stack+0x20/0x38 (C)
[   36.290250]  dump_stack_lvl+0x8c/0xd0
[   36.290925]  print_report+0x118/0x5e0
[   36.291447]  kasan_report+0xc8/0x118
[   36.292143]  __asan_report_load4_noabort+0x20/0x30
[   36.292981]  kasan_atomics_helper+0x40a8/0x4858
[   36.293846]  kasan_atomics+0x198/0x2e8
[   36.294802]  kunit_try_run_case+0x14c/0x3d0
[   36.295581]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.296500]  kthread+0x24c/0x2d0
[   36.297050]  ret_from_fork+0x10/0x20
[   36.297381] 
[   36.297558] Allocated by task 253:
[   36.298764]  kasan_save_stack+0x3c/0x68
[   36.299840]  kasan_save_track+0x20/0x40
[   36.300824]  kasan_save_alloc_info+0x40/0x58
[   36.301657]  __kasan_kmalloc+0xd4/0xd8
[   36.302481]  __kmalloc_cache_noprof+0x15c/0x3c0
[   36.302977]  kasan_atomics+0xb8/0x2e8
[   36.304061]  kunit_try_run_case+0x14c/0x3d0
[   36.304931]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.305701]  kthread+0x24c/0x2d0
[   36.306770]  ret_from_fork+0x10/0x20
[   36.307354] 
[   36.307841] The buggy address belongs to the object at fff00000c6767080
[   36.307841]  which belongs to the cache kmalloc-64 of size 64
[   36.309230] The buggy address is located 0 bytes to the right of
[   36.309230]  allocated 48-byte region [fff00000c6767080, fff00000c67670b0)
[   36.311414] 
[   36.311761] The buggy address belongs to the physical page:
[   36.312462] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106767
[   36.313568] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   36.315208] page_type: f5(slab)
[   36.315853] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   36.316808] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   36.317720] page dumped because: kasan: bad access detected
[   36.318401] 
[   36.319206] Memory state around the buggy address:
[   36.319969]  fff00000c6766f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.320959]  fff00000c6767000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   36.322451] >fff00000c6767080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   36.323175]                                      ^
[   36.323808]  fff00000c6767100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.324895]  fff00000c6767180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.326501] ==================================================================
[   37.068472] ==================================================================
[   37.069382] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x760/0x4858
[   37.070690] Write of size 4 at addr fff00000c67670b0 by task kunit_try_catch/253
[   37.072235] 
[   37.072837] CPU: 1 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241204 #1
[   37.074224] Tainted: [B]=BAD_PAGE, [N]=TEST
[   37.075006] Hardware name: linux,dummy-virt (DT)
[   37.075809] Call trace:
[   37.076406]  show_stack+0x20/0x38 (C)
[   37.077104]  dump_stack_lvl+0x8c/0xd0
[   37.077838]  print_report+0x118/0x5e0
[   37.078583]  kasan_report+0xc8/0x118
[   37.079283]  kasan_check_range+0x100/0x1a8
[   37.079893]  __kasan_check_write+0x20/0x30
[   37.080487]  kasan_atomics_helper+0x760/0x4858
[   37.081257]  kasan_atomics+0x198/0x2e8
[   37.082034]  kunit_try_run_case+0x14c/0x3d0
[   37.082693]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.083662]  kthread+0x24c/0x2d0
[   37.084340]  ret_from_fork+0x10/0x20
[   37.085033] 
[   37.085386] Allocated by task 253:
[   37.086059]  kasan_save_stack+0x3c/0x68
[   37.086732]  kasan_save_track+0x20/0x40
[   37.087352]  kasan_save_alloc_info+0x40/0x58
[   37.087999]  __kasan_kmalloc+0xd4/0xd8
[   37.088719]  __kmalloc_cache_noprof+0x15c/0x3c0
[   37.089430]  kasan_atomics+0xb8/0x2e8
[   37.090134]  kunit_try_run_case+0x14c/0x3d0
[   37.090922]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.091729]  kthread+0x24c/0x2d0
[   37.092409]  ret_from_fork+0x10/0x20
[   37.093014] 
[   37.093431] The buggy address belongs to the object at fff00000c6767080
[   37.093431]  which belongs to the cache kmalloc-64 of size 64
[   37.094940] The buggy address is located 0 bytes to the right of
[   37.094940]  allocated 48-byte region [fff00000c6767080, fff00000c67670b0)
[   37.096590] 
[   37.097060] The buggy address belongs to the physical page:
[   37.097839] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106767
[   37.098864] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   37.099906] page_type: f5(slab)
[   37.100360] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   37.101181] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   37.102279] page dumped because: kasan: bad access detected
[   37.103051] 
[   37.103360] Memory state around the buggy address:
[   37.103991]  fff00000c6766f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.104888]  fff00000c6767000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   37.105814] >fff00000c6767080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   37.106813]                                      ^
[   37.107587]  fff00000c6767100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.108413]  fff00000c6767180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.109347] ==================================================================
[   36.898753] ==================================================================
[   36.899545] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x5b4/0x4858
[   36.900996] Write of size 4 at addr fff00000c67670b0 by task kunit_try_catch/253
[   36.902497] 
[   36.903004] CPU: 1 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241204 #1
[   36.905016] Tainted: [B]=BAD_PAGE, [N]=TEST
[   36.905712] Hardware name: linux,dummy-virt (DT)
[   36.906430] Call trace:
[   36.906945]  show_stack+0x20/0x38 (C)
[   36.907710]  dump_stack_lvl+0x8c/0xd0
[   36.908379]  print_report+0x118/0x5e0
[   36.909044]  kasan_report+0xc8/0x118
[   36.909766]  kasan_check_range+0x100/0x1a8
[   36.910486]  __kasan_check_write+0x20/0x30
[   36.911285]  kasan_atomics_helper+0x5b4/0x4858
[   36.912040]  kasan_atomics+0x198/0x2e8
[   36.912717]  kunit_try_run_case+0x14c/0x3d0
[   36.913500]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.914309]  kthread+0x24c/0x2d0
[   36.914953]  ret_from_fork+0x10/0x20
[   36.915590] 
[   36.915906] Allocated by task 253:
[   36.916432]  kasan_save_stack+0x3c/0x68
[   36.917123]  kasan_save_track+0x20/0x40
[   36.917749]  kasan_save_alloc_info+0x40/0x58
[   36.918488]  __kasan_kmalloc+0xd4/0xd8
[   36.919133]  __kmalloc_cache_noprof+0x15c/0x3c0
[   36.919834]  kasan_atomics+0xb8/0x2e8
[   36.920442]  kunit_try_run_case+0x14c/0x3d0
[   36.921069]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.921929]  kthread+0x24c/0x2d0
[   36.922606]  ret_from_fork+0x10/0x20
[   36.923251] 
[   36.923688] The buggy address belongs to the object at fff00000c6767080
[   36.923688]  which belongs to the cache kmalloc-64 of size 64
[   36.925164] The buggy address is located 0 bytes to the right of
[   36.925164]  allocated 48-byte region [fff00000c6767080, fff00000c67670b0)
[   36.927235] 
[   36.927565] The buggy address belongs to the physical page:
[   36.928485] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106767
[   36.929557] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   36.930445] page_type: f5(slab)
[   36.931069] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   36.932142] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   36.933093] page dumped because: kasan: bad access detected
[   36.933878] 
[   36.934281] Memory state around the buggy address:
[   36.934967]  fff00000c6766f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.936008]  fff00000c6767000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   36.936956] >fff00000c6767080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   36.937967]                                      ^
[   36.938707]  fff00000c6767100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.939803]  fff00000c6767180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.940701] ==================================================================
[   37.401654] ==================================================================
[   37.402499] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xad4/0x4858
[   37.403378] Write of size 4 at addr fff00000c67670b0 by task kunit_try_catch/253
[   37.405740] 
[   37.406113] CPU: 1 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241204 #1
[   37.407562] Tainted: [B]=BAD_PAGE, [N]=TEST
[   37.408179] Hardware name: linux,dummy-virt (DT)
[   37.408719] Call trace:
[   37.409139]  show_stack+0x20/0x38 (C)
[   37.409830]  dump_stack_lvl+0x8c/0xd0
[   37.410479]  print_report+0x118/0x5e0
[   37.411096]  kasan_report+0xc8/0x118
[   37.411770]  kasan_check_range+0x100/0x1a8
[   37.412488]  __kasan_check_write+0x20/0x30
[   37.413115]  kasan_atomics_helper+0xad4/0x4858
[   37.413775]  kasan_atomics+0x198/0x2e8
[   37.414386]  kunit_try_run_case+0x14c/0x3d0
[   37.415059]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.415746]  kthread+0x24c/0x2d0
[   37.416365]  ret_from_fork+0x10/0x20
[   37.417032] 
[   37.417339] Allocated by task 253:
[   37.417937]  kasan_save_stack+0x3c/0x68
[   37.418466]  kasan_save_track+0x20/0x40
[   37.419189]  kasan_save_alloc_info+0x40/0x58
[   37.419785]  __kasan_kmalloc+0xd4/0xd8
[   37.420454]  __kmalloc_cache_noprof+0x15c/0x3c0
[   37.421114]  kasan_atomics+0xb8/0x2e8
[   37.421609]  kunit_try_run_case+0x14c/0x3d0
[   37.422313]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.422989]  kthread+0x24c/0x2d0
[   37.423606]  ret_from_fork+0x10/0x20
[   37.424251] 
[   37.424532] The buggy address belongs to the object at fff00000c6767080
[   37.424532]  which belongs to the cache kmalloc-64 of size 64
[   37.426482] The buggy address is located 0 bytes to the right of
[   37.426482]  allocated 48-byte region [fff00000c6767080, fff00000c67670b0)
[   37.427945] 
[   37.428275] The buggy address belongs to the physical page:
[   37.429145] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106767
[   37.430104] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   37.431054] page_type: f5(slab)
[   37.431647] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   37.432570] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   37.433517] page dumped because: kasan: bad access detected
[   37.434228] 
[   37.434571] Memory state around the buggy address:
[   37.435237]  fff00000c6766f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.436095]  fff00000c6767000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   37.437247] >fff00000c6767080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   37.438113]                                      ^
[   37.438841]  fff00000c6767100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.439714]  fff00000c6767180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.440530] ==================================================================
[   36.564748] ==================================================================
[   36.565754] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x32c/0x4858
[   36.567809] Write of size 4 at addr fff00000c67670b0 by task kunit_try_catch/253
[   36.568758] 
[   36.569201] CPU: 1 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241204 #1
[   36.570505] Tainted: [B]=BAD_PAGE, [N]=TEST
[   36.571067] Hardware name: linux,dummy-virt (DT)
[   36.572177] Call trace:
[   36.572539]  show_stack+0x20/0x38 (C)
[   36.573308]  dump_stack_lvl+0x8c/0xd0
[   36.574210]  print_report+0x118/0x5e0
[   36.575100]  kasan_report+0xc8/0x118
[   36.575893]  kasan_check_range+0x100/0x1a8
[   36.576568]  __kasan_check_write+0x20/0x30
[   36.577161]  kasan_atomics_helper+0x32c/0x4858
[   36.578315]  kasan_atomics+0x198/0x2e8
[   36.579129]  kunit_try_run_case+0x14c/0x3d0
[   36.579857]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.580552]  kthread+0x24c/0x2d0
[   36.581149]  ret_from_fork+0x10/0x20
[   36.582193] 
[   36.582488] Allocated by task 253:
[   36.583017]  kasan_save_stack+0x3c/0x68
[   36.583714]  kasan_save_track+0x20/0x40
[   36.584264]  kasan_save_alloc_info+0x40/0x58
[   36.585033]  __kasan_kmalloc+0xd4/0xd8
[   36.585526]  __kmalloc_cache_noprof+0x15c/0x3c0
[   36.586863]  kasan_atomics+0xb8/0x2e8
[   36.587872]  kunit_try_run_case+0x14c/0x3d0
[   36.588834]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.589437]  kthread+0x24c/0x2d0
[   36.590252]  ret_from_fork+0x10/0x20
[   36.591237] 
[   36.591545] The buggy address belongs to the object at fff00000c6767080
[   36.591545]  which belongs to the cache kmalloc-64 of size 64
[   36.593084] The buggy address is located 0 bytes to the right of
[   36.593084]  allocated 48-byte region [fff00000c6767080, fff00000c67670b0)
[   36.595025] 
[   36.595398] The buggy address belongs to the physical page:
[   36.596240] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106767
[   36.597300] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   36.598509] page_type: f5(slab)
[   36.599341] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   36.600466] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   36.601496] page dumped because: kasan: bad access detected
[   36.602271] 
[   36.602835] Memory state around the buggy address:
[   36.603926]  fff00000c6766f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.605066]  fff00000c6767000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   36.606151] >fff00000c6767080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   36.607262]                                      ^
[   36.607920]  fff00000c6767100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.609109]  fff00000c6767180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.610261] ==================================================================
[   38.407953] ==================================================================
[   38.408839] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1384/0x4858
[   38.409740] Write of size 8 at addr fff00000c67670b0 by task kunit_try_catch/253
[   38.410584] 
[   38.410955] CPU: 1 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241204 #1
[   38.412382] Tainted: [B]=BAD_PAGE, [N]=TEST
[   38.412936] Hardware name: linux,dummy-virt (DT)
[   38.413512] Call trace:
[   38.414243]  show_stack+0x20/0x38 (C)
[   38.414877]  dump_stack_lvl+0x8c/0xd0
[   38.415470]  print_report+0x118/0x5e0
[   38.416393]  kasan_report+0xc8/0x118
[   38.417171]  kasan_check_range+0x100/0x1a8
[   38.417926]  __kasan_check_write+0x20/0x30
[   38.418662]  kasan_atomics_helper+0x1384/0x4858
[   38.419408]  kasan_atomics+0x198/0x2e8
[   38.420117]  kunit_try_run_case+0x14c/0x3d0
[   38.420957]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   38.421726]  kthread+0x24c/0x2d0
[   38.422255]  ret_from_fork+0x10/0x20
[   38.423151] 
[   38.423488] Allocated by task 253:
[   38.424017]  kasan_save_stack+0x3c/0x68
[   38.424526]  kasan_save_track+0x20/0x40
[   38.425336]  kasan_save_alloc_info+0x40/0x58
[   38.426155]  __kasan_kmalloc+0xd4/0xd8
[   38.426802]  __kmalloc_cache_noprof+0x15c/0x3c0
[   38.427606]  kasan_atomics+0xb8/0x2e8
[   38.428235]  kunit_try_run_case+0x14c/0x3d0
[   38.428907]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   38.429699]  kthread+0x24c/0x2d0
[   38.430260]  ret_from_fork+0x10/0x20
[   38.430965] 
[   38.431314] The buggy address belongs to the object at fff00000c6767080
[   38.431314]  which belongs to the cache kmalloc-64 of size 64
[   38.432945] The buggy address is located 0 bytes to the right of
[   38.432945]  allocated 48-byte region [fff00000c6767080, fff00000c67670b0)
[   38.434533] 
[   38.435057] The buggy address belongs to the physical page:
[   38.435872] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106767
[   38.436950] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   38.437866] page_type: f5(slab)
[   38.438440] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   38.439505] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   38.440441] page dumped because: kasan: bad access detected
[   38.441246] 
[   38.441529] Memory state around the buggy address:
[   38.442290]  fff00000c6766f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   38.443386]  fff00000c6767000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   38.444308] >fff00000c6767080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   38.445227]                                      ^
[   38.445939]  fff00000c6767100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   38.446859]  fff00000c6767180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   38.447384] ==================================================================
[   37.844585] ==================================================================
[   37.845658] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f58/0x4858
[   37.846835] Read of size 8 at addr fff00000c67670b0 by task kunit_try_catch/253
[   37.848510] 
[   37.849106] CPU: 1 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241204 #1
[   37.850245] Tainted: [B]=BAD_PAGE, [N]=TEST
[   37.850830] Hardware name: linux,dummy-virt (DT)
[   37.851765] Call trace:
[   37.852199]  show_stack+0x20/0x38 (C)
[   37.852846]  dump_stack_lvl+0x8c/0xd0
[   37.853519]  print_report+0x118/0x5e0
[   37.854237]  kasan_report+0xc8/0x118
[   37.854937]  __asan_report_load8_noabort+0x20/0x30
[   37.855704]  kasan_atomics_helper+0x3f58/0x4858
[   37.856412]  kasan_atomics+0x198/0x2e8
[   37.857039]  kunit_try_run_case+0x14c/0x3d0
[   37.857697]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.858509]  kthread+0x24c/0x2d0
[   37.859145]  ret_from_fork+0x10/0x20
[   37.859875] 
[   37.860214] Allocated by task 253:
[   37.860863]  kasan_save_stack+0x3c/0x68
[   37.861471]  kasan_save_track+0x20/0x40
[   37.862216]  kasan_save_alloc_info+0x40/0x58
[   37.863012]  __kasan_kmalloc+0xd4/0xd8
[   37.863682]  __kmalloc_cache_noprof+0x15c/0x3c0
[   37.864369]  kasan_atomics+0xb8/0x2e8
[   37.865029]  kunit_try_run_case+0x14c/0x3d0
[   37.865729]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.866547]  kthread+0x24c/0x2d0
[   37.867169]  ret_from_fork+0x10/0x20
[   37.867789] 
[   37.868194] The buggy address belongs to the object at fff00000c6767080
[   37.868194]  which belongs to the cache kmalloc-64 of size 64
[   37.869580] The buggy address is located 0 bytes to the right of
[   37.869580]  allocated 48-byte region [fff00000c6767080, fff00000c67670b0)
[   37.871183] 
[   37.871683] The buggy address belongs to the physical page:
[   37.872445] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106767
[   37.873485] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   37.874439] page_type: f5(slab)
[   37.875059] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   37.876012] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   37.876938] page dumped because: kasan: bad access detected
[   37.877696] 
[   37.878084] Memory state around the buggy address:
[   37.878805]  fff00000c6766f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.879892]  fff00000c6767000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   37.880854] >fff00000c6767080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   37.881785]                                      ^
[   37.882497]  fff00000c6767100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.883393]  fff00000c6767180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.884290] ==================================================================
[   36.472505] ==================================================================
[   36.473409] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x2b0/0x4858
[   36.474278] Read of size 4 at addr fff00000c67670b0 by task kunit_try_catch/253
[   36.475699] 
[   36.476023] CPU: 1 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241204 #1
[   36.477539] Tainted: [B]=BAD_PAGE, [N]=TEST
[   36.478782] Hardware name: linux,dummy-virt (DT)
[   36.479582] Call trace:
[   36.479959]  show_stack+0x20/0x38 (C)
[   36.480798]  dump_stack_lvl+0x8c/0xd0
[   36.481596]  print_report+0x118/0x5e0
[   36.482253]  kasan_report+0xc8/0x118
[   36.483286]  kasan_check_range+0x100/0x1a8
[   36.483923]  __kasan_check_read+0x20/0x30
[   36.484563]  kasan_atomics_helper+0x2b0/0x4858
[   36.485196]  kasan_atomics+0x198/0x2e8
[   36.485948]  kunit_try_run_case+0x14c/0x3d0
[   36.486295]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.486750]  kthread+0x24c/0x2d0
[   36.487579]  ret_from_fork+0x10/0x20
[   36.488738] 
[   36.489266] Allocated by task 253:
[   36.490186]  kasan_save_stack+0x3c/0x68
[   36.490852]  kasan_save_track+0x20/0x40
[   36.491551]  kasan_save_alloc_info+0x40/0x58
[   36.492253]  __kasan_kmalloc+0xd4/0xd8
[   36.492897]  __kmalloc_cache_noprof+0x15c/0x3c0
[   36.493588]  kasan_atomics+0xb8/0x2e8
[   36.494597]  kunit_try_run_case+0x14c/0x3d0
[   36.495976]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.496770]  kthread+0x24c/0x2d0
[   36.497464]  ret_from_fork+0x10/0x20
[   36.498535] 
[   36.499029] The buggy address belongs to the object at fff00000c6767080
[   36.499029]  which belongs to the cache kmalloc-64 of size 64
[   36.500536] The buggy address is located 0 bytes to the right of
[   36.500536]  allocated 48-byte region [fff00000c6767080, fff00000c67670b0)
[   36.502150] 
[   36.502618] The buggy address belongs to the physical page:
[   36.503837] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106767
[   36.504894] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   36.506080] page_type: f5(slab)
[   36.506594] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   36.507791] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   36.508774] page dumped because: kasan: bad access detected
[   36.509532] 
[   36.510380] Memory state around the buggy address:
[   36.511146]  fff00000c6766f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.512208]  fff00000c6767000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   36.513158] >fff00000c6767080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   36.514589]                                      ^
[   36.515103]  fff00000c6767100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.515576]  fff00000c6767180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.516176] ==================================================================
[   38.326168] ==================================================================
[   38.326999] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x126c/0x4858
[   38.328155] Write of size 8 at addr fff00000c67670b0 by task kunit_try_catch/253
[   38.329259] 
[   38.329704] CPU: 1 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241204 #1
[   38.330988] Tainted: [B]=BAD_PAGE, [N]=TEST
[   38.331844] Hardware name: linux,dummy-virt (DT)
[   38.332465] Call trace:
[   38.332929]  show_stack+0x20/0x38 (C)
[   38.333687]  dump_stack_lvl+0x8c/0xd0
[   38.334206]  print_report+0x118/0x5e0
[   38.334925]  kasan_report+0xc8/0x118
[   38.335607]  kasan_check_range+0x100/0x1a8
[   38.336283]  __kasan_check_write+0x20/0x30
[   38.337057]  kasan_atomics_helper+0x126c/0x4858
[   38.337713]  kasan_atomics+0x198/0x2e8
[   38.338379]  kunit_try_run_case+0x14c/0x3d0
[   38.339133]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   38.340000]  kthread+0x24c/0x2d0
[   38.340659]  ret_from_fork+0x10/0x20
[   38.341218] 
[   38.341609] Allocated by task 253:
[   38.342169]  kasan_save_stack+0x3c/0x68
[   38.342898]  kasan_save_track+0x20/0x40
[   38.343474]  kasan_save_alloc_info+0x40/0x58
[   38.344126]  __kasan_kmalloc+0xd4/0xd8
[   38.344649]  __kmalloc_cache_noprof+0x15c/0x3c0
[   38.345340]  kasan_atomics+0xb8/0x2e8
[   38.345941]  kunit_try_run_case+0x14c/0x3d0
[   38.346568]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   38.347208]  kthread+0x24c/0x2d0
[   38.347810]  ret_from_fork+0x10/0x20
[   38.348302] 
[   38.348781] The buggy address belongs to the object at fff00000c6767080
[   38.348781]  which belongs to the cache kmalloc-64 of size 64
[   38.350215] The buggy address is located 0 bytes to the right of
[   38.350215]  allocated 48-byte region [fff00000c6767080, fff00000c67670b0)
[   38.351678] 
[   38.352014] The buggy address belongs to the physical page:
[   38.352776] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106767
[   38.353769] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   38.354592] page_type: f5(slab)
[   38.355161] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   38.356188] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   38.357093] page dumped because: kasan: bad access detected
[   38.357834] 
[   38.358149] Memory state around the buggy address:
[   38.358760]  fff00000c6766f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   38.359578]  fff00000c6767000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   38.360570] >fff00000c6767080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   38.361512]                                      ^
[   38.362118]  fff00000c6767100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   38.363051]  fff00000c6767180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   38.363898] ==================================================================
[   38.003779] ==================================================================
[   38.004592] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf20/0x4858
[   38.005398] Write of size 8 at addr fff00000c67670b0 by task kunit_try_catch/253
[   38.006794] 
[   38.007277] CPU: 1 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241204 #1
[   38.008578] Tainted: [B]=BAD_PAGE, [N]=TEST
[   38.009137] Hardware name: linux,dummy-virt (DT)
[   38.009775] Call trace:
[   38.010240]  show_stack+0x20/0x38 (C)
[   38.010845]  dump_stack_lvl+0x8c/0xd0
[   38.011425]  print_report+0x118/0x5e0
[   38.011991]  kasan_report+0xc8/0x118
[   38.012578]  kasan_check_range+0x100/0x1a8
[   38.013224]  __kasan_check_write+0x20/0x30
[   38.013904]  kasan_atomics_helper+0xf20/0x4858
[   38.014591]  kasan_atomics+0x198/0x2e8
[   38.015188]  kunit_try_run_case+0x14c/0x3d0
[   38.015853]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   38.016716]  kthread+0x24c/0x2d0
[   38.017245]  ret_from_fork+0x10/0x20
[   38.017845] 
[   38.018214] Allocated by task 253:
[   38.018784]  kasan_save_stack+0x3c/0x68
[   38.019355]  kasan_save_track+0x20/0x40
[   38.019950]  kasan_save_alloc_info+0x40/0x58
[   38.020694]  __kasan_kmalloc+0xd4/0xd8
[   38.021243]  __kmalloc_cache_noprof+0x15c/0x3c0
[   38.021946]  kasan_atomics+0xb8/0x2e8
[   38.022479]  kunit_try_run_case+0x14c/0x3d0
[   38.023271]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   38.024015]  kthread+0x24c/0x2d0
[   38.024543]  ret_from_fork+0x10/0x20
[   38.025293] 
[   38.025607] The buggy address belongs to the object at fff00000c6767080
[   38.025607]  which belongs to the cache kmalloc-64 of size 64
[   38.027273] The buggy address is located 0 bytes to the right of
[   38.027273]  allocated 48-byte region [fff00000c6767080, fff00000c67670b0)
[   38.029303] 
[   38.029695] The buggy address belongs to the physical page:
[   38.030409] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106767
[   38.031270] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   38.032199] page_type: f5(slab)
[   38.032683] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   38.033662] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   38.034282] page dumped because: kasan: bad access detected
[   38.034660] 
[   38.034987] Memory state around the buggy address:
[   38.035667]  fff00000c6766f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   38.036673]  fff00000c6767000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   38.037558] >fff00000c6767080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   38.038412]                                      ^
[   38.039154]  fff00000c6767100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   38.040028]  fff00000c6767180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   38.040988] ==================================================================
[   38.366547] ==================================================================
[   38.367497] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x12d8/0x4858
[   38.368515] Write of size 8 at addr fff00000c67670b0 by task kunit_try_catch/253
[   38.369666] 
[   38.370143] CPU: 1 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241204 #1
[   38.371490] Tainted: [B]=BAD_PAGE, [N]=TEST
[   38.372073] Hardware name: linux,dummy-virt (DT)
[   38.372841] Call trace:
[   38.373558]  show_stack+0x20/0x38 (C)
[   38.374393]  dump_stack_lvl+0x8c/0xd0
[   38.374795]  print_report+0x118/0x5e0
[   38.375511]  kasan_report+0xc8/0x118
[   38.376334]  kasan_check_range+0x100/0x1a8
[   38.377062]  __kasan_check_write+0x20/0x30
[   38.377764]  kasan_atomics_helper+0x12d8/0x4858
[   38.378484]  kasan_atomics+0x198/0x2e8
[   38.379138]  kunit_try_run_case+0x14c/0x3d0
[   38.379910]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   38.380721]  kthread+0x24c/0x2d0
[   38.381332]  ret_from_fork+0x10/0x20
[   38.382011] 
[   38.382342] Allocated by task 253:
[   38.382948]  kasan_save_stack+0x3c/0x68
[   38.383738]  kasan_save_track+0x20/0x40
[   38.384380]  kasan_save_alloc_info+0x40/0x58
[   38.385072]  __kasan_kmalloc+0xd4/0xd8
[   38.385707]  __kmalloc_cache_noprof+0x15c/0x3c0
[   38.386526]  kasan_atomics+0xb8/0x2e8
[   38.387171]  kunit_try_run_case+0x14c/0x3d0
[   38.387885]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   38.388926]  kthread+0x24c/0x2d0
[   38.389400]  ret_from_fork+0x10/0x20
[   38.389906] 
[   38.390294] The buggy address belongs to the object at fff00000c6767080
[   38.390294]  which belongs to the cache kmalloc-64 of size 64
[   38.391751] The buggy address is located 0 bytes to the right of
[   38.391751]  allocated 48-byte region [fff00000c6767080, fff00000c67670b0)
[   38.393241] 
[   38.393560] The buggy address belongs to the physical page:
[   38.394255] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106767
[   38.395249] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   38.396171] page_type: f5(slab)
[   38.396613] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   38.397568] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   38.398497] page dumped because: kasan: bad access detected
[   38.399272] 
[   38.399598] Memory state around the buggy address:
[   38.400236]  fff00000c6766f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   38.401175]  fff00000c6767000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   38.402082] >fff00000c6767080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   38.403075]                                      ^
[   38.403714]  fff00000c6767100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   38.404579]  fff00000c6767180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   38.405511] ==================================================================
[   38.492054] ==================================================================
[   38.493051] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1414/0x4858
[   38.495072] Write of size 8 at addr fff00000c67670b0 by task kunit_try_catch/253
[   38.496156] 
[   38.496566] CPU: 1 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241204 #1
[   38.497760] Tainted: [B]=BAD_PAGE, [N]=TEST
[   38.498335] Hardware name: linux,dummy-virt (DT)
[   38.498969] Call trace:
[   38.499420]  show_stack+0x20/0x38 (C)
[   38.500000]  dump_stack_lvl+0x8c/0xd0
[   38.500604]  print_report+0x118/0x5e0
[   38.501228]  kasan_report+0xc8/0x118
[   38.501843]  kasan_check_range+0x100/0x1a8
[   38.502559]  __kasan_check_write+0x20/0x30
[   38.503104]  kasan_atomics_helper+0x1414/0x4858
[   38.503919]  kasan_atomics+0x198/0x2e8
[   38.504509]  kunit_try_run_case+0x14c/0x3d0
[   38.505232]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   38.506061]  kthread+0x24c/0x2d0
[   38.506703]  ret_from_fork+0x10/0x20
[   38.507256] 
[   38.507743] Allocated by task 253:
[   38.508307]  kasan_save_stack+0x3c/0x68
[   38.508943]  kasan_save_track+0x20/0x40
[   38.509503]  kasan_save_alloc_info+0x40/0x58
[   38.510275]  __kasan_kmalloc+0xd4/0xd8
[   38.510856]  __kmalloc_cache_noprof+0x15c/0x3c0
[   38.511648]  kasan_atomics+0xb8/0x2e8
[   38.512210]  kunit_try_run_case+0x14c/0x3d0
[   38.512802]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   38.513459]  kthread+0x24c/0x2d0
[   38.514080]  ret_from_fork+0x10/0x20
[   38.514572] 
[   38.515047] The buggy address belongs to the object at fff00000c6767080
[   38.515047]  which belongs to the cache kmalloc-64 of size 64
[   38.516513] The buggy address is located 0 bytes to the right of
[   38.516513]  allocated 48-byte region [fff00000c6767080, fff00000c67670b0)
[   38.518063] 
[   38.518377] The buggy address belongs to the physical page:
[   38.519070] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106767
[   38.520078] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   38.520920] page_type: f5(slab)
[   38.521404] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   38.522343] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   38.523369] page dumped because: kasan: bad access detected
[   38.524075] 
[   38.524386] Memory state around the buggy address:
[   38.525040]  fff00000c6766f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   38.525919]  fff00000c6767000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   38.526837] >fff00000c6767080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   38.527782]                                      ^
[   38.528410]  fff00000c6767100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   38.529274]  fff00000c6767180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   38.530190] ==================================================================
[   37.963832] ==================================================================
[   37.964529] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xeb8/0x4858
[   37.965620] Write of size 8 at addr fff00000c67670b0 by task kunit_try_catch/253
[   37.966933] 
[   37.967312] CPU: 1 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241204 #1
[   37.968520] Tainted: [B]=BAD_PAGE, [N]=TEST
[   37.969088] Hardware name: linux,dummy-virt (DT)
[   37.969838] Call trace:
[   37.970297]  show_stack+0x20/0x38 (C)
[   37.971119]  dump_stack_lvl+0x8c/0xd0
[   37.971756]  print_report+0x118/0x5e0
[   37.972339]  kasan_report+0xc8/0x118
[   37.972888]  kasan_check_range+0x100/0x1a8
[   37.973589]  __kasan_check_write+0x20/0x30
[   37.974236]  kasan_atomics_helper+0xeb8/0x4858
[   37.974885]  kasan_atomics+0x198/0x2e8
[   37.975490]  kunit_try_run_case+0x14c/0x3d0
[   37.976170]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.976962]  kthread+0x24c/0x2d0
[   37.977494]  ret_from_fork+0x10/0x20
[   37.977988] 
[   37.978386] Allocated by task 253:
[   37.978970]  kasan_save_stack+0x3c/0x68
[   37.979662]  kasan_save_track+0x20/0x40
[   37.980215]  kasan_save_alloc_info+0x40/0x58
[   37.980897]  __kasan_kmalloc+0xd4/0xd8
[   37.981412]  __kmalloc_cache_noprof+0x15c/0x3c0
[   37.982213]  kasan_atomics+0xb8/0x2e8
[   37.982796]  kunit_try_run_case+0x14c/0x3d0
[   37.983380]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.984131]  kthread+0x24c/0x2d0
[   37.984760]  ret_from_fork+0x10/0x20
[   37.985303] 
[   37.985618] The buggy address belongs to the object at fff00000c6767080
[   37.985618]  which belongs to the cache kmalloc-64 of size 64
[   37.987122] The buggy address is located 0 bytes to the right of
[   37.987122]  allocated 48-byte region [fff00000c6767080, fff00000c67670b0)
[   37.988497] 
[   37.988890] The buggy address belongs to the physical page:
[   37.989575] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106767
[   37.990519] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   37.991471] page_type: f5(slab)
[   37.991986] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   37.992899] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   37.993806] page dumped because: kasan: bad access detected
[   37.994456] 
[   37.994793] Memory state around the buggy address:
[   37.995457]  fff00000c6766f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.996422]  fff00000c6767000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   37.997388] >fff00000c6767080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   37.998253]                                      ^
[   37.998942]  fff00000c6767100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.999802]  fff00000c6767180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   38.000697] ==================================================================
[   37.363065] ==================================================================
[   37.363877] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa6c/0x4858
[   37.364732] Write of size 4 at addr fff00000c67670b0 by task kunit_try_catch/253
[   37.365515] 
[   37.365993] CPU: 1 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241204 #1
[   37.367122] Tainted: [B]=BAD_PAGE, [N]=TEST
[   37.367930] Hardware name: linux,dummy-virt (DT)
[   37.368509] Call trace:
[   37.369012]  show_stack+0x20/0x38 (C)
[   37.369585]  dump_stack_lvl+0x8c/0xd0
[   37.370277]  print_report+0x118/0x5e0
[   37.370893]  kasan_report+0xc8/0x118
[   37.371458]  kasan_check_range+0x100/0x1a8
[   37.372127]  __kasan_check_write+0x20/0x30
[   37.372870]  kasan_atomics_helper+0xa6c/0x4858
[   37.373482]  kasan_atomics+0x198/0x2e8
[   37.374119]  kunit_try_run_case+0x14c/0x3d0
[   37.374724]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.375530]  kthread+0x24c/0x2d0
[   37.376130]  ret_from_fork+0x10/0x20
[   37.376718] 
[   37.377099] Allocated by task 253:
[   37.377672]  kasan_save_stack+0x3c/0x68
[   37.378157]  kasan_save_track+0x20/0x40
[   37.378837]  kasan_save_alloc_info+0x40/0x58
[   37.379539]  __kasan_kmalloc+0xd4/0xd8
[   37.380111]  __kmalloc_cache_noprof+0x15c/0x3c0
[   37.380727]  kasan_atomics+0xb8/0x2e8
[   37.381342]  kunit_try_run_case+0x14c/0x3d0
[   37.381965]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.382663]  kthread+0x24c/0x2d0
[   37.383264]  ret_from_fork+0x10/0x20
[   37.383831] 
[   37.384138] The buggy address belongs to the object at fff00000c6767080
[   37.384138]  which belongs to the cache kmalloc-64 of size 64
[   37.385477] The buggy address is located 0 bytes to the right of
[   37.385477]  allocated 48-byte region [fff00000c6767080, fff00000c67670b0)
[   37.386967] 
[   37.387373] The buggy address belongs to the physical page:
[   37.388051] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106767
[   37.389023] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   37.389934] page_type: f5(slab)
[   37.390481] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   37.391444] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   37.392362] page dumped because: kasan: bad access detected
[   37.393038] 
[   37.393402] Memory state around the buggy address:
[   37.394110]  fff00000c6766f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.394923]  fff00000c6767000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   37.395910] >fff00000c6767080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   37.396787]                                      ^
[   37.397436]  fff00000c6767100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.398318]  fff00000c6767180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.399243] ==================================================================
[   36.801363] ==================================================================
[   36.802742] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4e4/0x4858
[   36.805138] Write of size 4 at addr fff00000c67670b0 by task kunit_try_catch/253
[   36.805937] 
[   36.806694] CPU: 1 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241204 #1
[   36.808062] Tainted: [B]=BAD_PAGE, [N]=TEST
[   36.808804] Hardware name: linux,dummy-virt (DT)
[   36.809588] Call trace:
[   36.810177]  show_stack+0x20/0x38 (C)
[   36.811050]  dump_stack_lvl+0x8c/0xd0
[   36.811756]  print_report+0x118/0x5e0
[   36.812671]  kasan_report+0xc8/0x118
[   36.813227]  kasan_check_range+0x100/0x1a8
[   36.814091]  __kasan_check_write+0x20/0x30
[   36.814995]  kasan_atomics_helper+0x4e4/0x4858
[   36.815909]  kasan_atomics+0x198/0x2e8
[   36.816521]  kunit_try_run_case+0x14c/0x3d0
[   36.817293]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.818458]  kthread+0x24c/0x2d0
[   36.818923]  ret_from_fork+0x10/0x20
[   36.819702] 
[   36.819984] Allocated by task 253:
[   36.820786]  kasan_save_stack+0x3c/0x68
[   36.821549]  kasan_save_track+0x20/0x40
[   36.822369]  kasan_save_alloc_info+0x40/0x58
[   36.823210]  __kasan_kmalloc+0xd4/0xd8
[   36.824183]  __kmalloc_cache_noprof+0x15c/0x3c0
[   36.825215]  kasan_atomics+0xb8/0x2e8
[   36.825924]  kunit_try_run_case+0x14c/0x3d0
[   36.826657]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.828020]  kthread+0x24c/0x2d0
[   36.828604]  ret_from_fork+0x10/0x20
[   36.829289] 
[   36.829721] The buggy address belongs to the object at fff00000c6767080
[   36.829721]  which belongs to the cache kmalloc-64 of size 64
[   36.831572] The buggy address is located 0 bytes to the right of
[   36.831572]  allocated 48-byte region [fff00000c6767080, fff00000c67670b0)
[   36.832894] 
[   36.833202] The buggy address belongs to the physical page:
[   36.833968] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106767
[   36.835416] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   36.836408] page_type: f5(slab)
[   36.837097] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   36.838550] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   36.839385] page dumped because: kasan: bad access detected
[   36.840328] 
[   36.840705] Memory state around the buggy address:
[   36.841479]  fff00000c6766f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.843091]  fff00000c6767000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   36.844270] >fff00000c6767080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   36.845158]                                      ^
[   36.845884]  fff00000c6767100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.847394]  fff00000c6767180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.848395] ==================================================================
[   38.847797] ==================================================================
[   38.848653] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e10/0x4858
[   38.849822] Read of size 8 at addr fff00000c67670b0 by task kunit_try_catch/253
[   38.850560] 
[   38.851116] CPU: 1 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241204 #1
[   38.853107] Tainted: [B]=BAD_PAGE, [N]=TEST
[   38.853840] Hardware name: linux,dummy-virt (DT)
[   38.854542] Call trace:
[   38.855141]  show_stack+0x20/0x38 (C)
[   38.855783]  dump_stack_lvl+0x8c/0xd0
[   38.856469]  print_report+0x118/0x5e0
[   38.857102]  kasan_report+0xc8/0x118
[   38.857824]  __asan_report_load8_noabort+0x20/0x30
[   38.858577]  kasan_atomics_helper+0x3e10/0x4858
[   38.859402]  kasan_atomics+0x198/0x2e8
[   38.860100]  kunit_try_run_case+0x14c/0x3d0
[   38.860845]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   38.861751]  kthread+0x24c/0x2d0
[   38.862361]  ret_from_fork+0x10/0x20
[   38.863076] 
[   38.863428] Allocated by task 253:
[   38.864061]  kasan_save_stack+0x3c/0x68
[   38.864690]  kasan_save_track+0x20/0x40
[   38.865411]  kasan_save_alloc_info+0x40/0x58
[   38.866083]  __kasan_kmalloc+0xd4/0xd8
[   38.866729]  __kmalloc_cache_noprof+0x15c/0x3c0
[   38.867392]  kasan_atomics+0xb8/0x2e8
[   38.868053]  kunit_try_run_case+0x14c/0x3d0
[   38.868767]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   38.869542]  kthread+0x24c/0x2d0
[   38.870145]  ret_from_fork+0x10/0x20
[   38.870790] 
[   38.871155] The buggy address belongs to the object at fff00000c6767080
[   38.871155]  which belongs to the cache kmalloc-64 of size 64
[   38.872807] The buggy address is located 0 bytes to the right of
[   38.872807]  allocated 48-byte region [fff00000c6767080, fff00000c67670b0)
[   38.874361] 
[   38.874814] The buggy address belongs to the physical page:
[   38.875586] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106767
[   38.876599] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   38.877665] page_type: f5(slab)
[   38.878233] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   38.879284] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   38.880242] page dumped because: kasan: bad access detected
[   38.881062] 
[   38.881395] Memory state around the buggy address:
[   38.882147]  fff00000c6766f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   38.883103]  fff00000c6767000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   38.884091] >fff00000c6767080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   38.885011]                                      ^
[   38.885756]  fff00000c6767100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   38.886689]  fff00000c6767180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   38.887641] ==================================================================
[   37.280898] ==================================================================
[   37.281805] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x99c/0x4858
[   37.283052] Write of size 4 at addr fff00000c67670b0 by task kunit_try_catch/253
[   37.284229] 
[   37.284770] CPU: 1 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241204 #1
[   37.286125] Tainted: [B]=BAD_PAGE, [N]=TEST
[   37.286714] Hardware name: linux,dummy-virt (DT)
[   37.287414] Call trace:
[   37.287831]  show_stack+0x20/0x38 (C)
[   37.288350]  dump_stack_lvl+0x8c/0xd0
[   37.289003]  print_report+0x118/0x5e0
[   37.289724]  kasan_report+0xc8/0x118
[   37.290416]  kasan_check_range+0x100/0x1a8
[   37.290973]  __kasan_check_write+0x20/0x30
[   37.291707]  kasan_atomics_helper+0x99c/0x4858
[   37.292456]  kasan_atomics+0x198/0x2e8
[   37.293154]  kunit_try_run_case+0x14c/0x3d0
[   37.293824]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.294575]  kthread+0x24c/0x2d0
[   37.295113]  ret_from_fork+0x10/0x20
[   37.295794] 
[   37.296201] Allocated by task 253:
[   37.296653]  kasan_save_stack+0x3c/0x68
[   37.297359]  kasan_save_track+0x20/0x40
[   37.297946]  kasan_save_alloc_info+0x40/0x58
[   37.298614]  __kasan_kmalloc+0xd4/0xd8
[   37.299218]  __kmalloc_cache_noprof+0x15c/0x3c0
[   37.299866]  kasan_atomics+0xb8/0x2e8
[   37.300614]  kunit_try_run_case+0x14c/0x3d0
[   37.301182]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.302031]  kthread+0x24c/0x2d0
[   37.302528]  ret_from_fork+0x10/0x20
[   37.303061] 
[   37.303528] The buggy address belongs to the object at fff00000c6767080
[   37.303528]  which belongs to the cache kmalloc-64 of size 64
[   37.304936] The buggy address is located 0 bytes to the right of
[   37.304936]  allocated 48-byte region [fff00000c6767080, fff00000c67670b0)
[   37.306364] 
[   37.306797] The buggy address belongs to the physical page:
[   37.307508] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106767
[   37.308523] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   37.309324] page_type: f5(slab)
[   37.309894] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   37.310822] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   37.311845] page dumped because: kasan: bad access detected
[   37.312522] 
[   37.312958] Memory state around the buggy address:
[   37.313660]  fff00000c6766f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.314503]  fff00000c6767000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   37.315429] >fff00000c6767080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   37.316310]                                      ^
[   37.316958]  fff00000c6767100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.317838]  fff00000c6767180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.318688] ==================================================================
[   37.766706] ==================================================================
[   37.767662] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e04/0x4858
[   37.768413] Read of size 4 at addr fff00000c67670b0 by task kunit_try_catch/253
[   37.769258] 
[   37.769716] CPU: 1 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241204 #1
[   37.771422] Tainted: [B]=BAD_PAGE, [N]=TEST
[   37.771960] Hardware name: linux,dummy-virt (DT)
[   37.772618] Call trace:
[   37.773036]  show_stack+0x20/0x38 (C)
[   37.773678]  dump_stack_lvl+0x8c/0xd0
[   37.774242]  print_report+0x118/0x5e0
[   37.774852]  kasan_report+0xc8/0x118
[   37.775487]  __asan_report_load4_noabort+0x20/0x30
[   37.776204]  kasan_atomics_helper+0x3e04/0x4858
[   37.776850]  kasan_atomics+0x198/0x2e8
[   37.777509]  kunit_try_run_case+0x14c/0x3d0
[   37.778083]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.778942]  kthread+0x24c/0x2d0
[   37.779575]  ret_from_fork+0x10/0x20
[   37.780214] 
[   37.780504] Allocated by task 253:
[   37.781015]  kasan_save_stack+0x3c/0x68
[   37.781745]  kasan_save_track+0x20/0x40
[   37.782397]  kasan_save_alloc_info+0x40/0x58
[   37.783034]  __kasan_kmalloc+0xd4/0xd8
[   37.783700]  __kmalloc_cache_noprof+0x15c/0x3c0
[   37.784431]  kasan_atomics+0xb8/0x2e8
[   37.784989]  kunit_try_run_case+0x14c/0x3d0
[   37.785498]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.786286]  kthread+0x24c/0x2d0
[   37.786774]  ret_from_fork+0x10/0x20
[   37.787427] 
[   37.787808] The buggy address belongs to the object at fff00000c6767080
[   37.787808]  which belongs to the cache kmalloc-64 of size 64
[   37.789168] The buggy address is located 0 bytes to the right of
[   37.789168]  allocated 48-byte region [fff00000c6767080, fff00000c67670b0)
[   37.790705] 
[   37.791087] The buggy address belongs to the physical page:
[   37.791920] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106767
[   37.792780] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   37.793679] page_type: f5(slab)
[   37.794229] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   37.795236] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   37.796262] page dumped because: kasan: bad access detected
[   37.796953] 
[   37.797288] Memory state around the buggy address:
[   37.797893]  fff00000c6766f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.798699]  fff00000c6767000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   37.799653] >fff00000c6767080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   37.800533]                                      ^
[   37.801250]  fff00000c6767100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.802186]  fff00000c6767180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.803080] ==================================================================
[   37.151220] ==================================================================
[   37.152095] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x894/0x4858
[   37.152982] Write of size 4 at addr fff00000c67670b0 by task kunit_try_catch/253
[   37.154131] 
[   37.154702] CPU: 1 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241204 #1
[   37.155884] Tainted: [B]=BAD_PAGE, [N]=TEST
[   37.156697] Hardware name: linux,dummy-virt (DT)
[   37.157267] Call trace:
[   37.157834]  show_stack+0x20/0x38 (C)
[   37.158385]  dump_stack_lvl+0x8c/0xd0
[   37.159077]  print_report+0x118/0x5e0
[   37.159734]  kasan_report+0xc8/0x118
[   37.160341]  kasan_check_range+0x100/0x1a8
[   37.161052]  __kasan_check_write+0x20/0x30
[   37.161824]  kasan_atomics_helper+0x894/0x4858
[   37.162539]  kasan_atomics+0x198/0x2e8
[   37.163103]  kunit_try_run_case+0x14c/0x3d0
[   37.163793]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.164686]  kthread+0x24c/0x2d0
[   37.165357]  ret_from_fork+0x10/0x20
[   37.166149] 
[   37.166527] Allocated by task 253:
[   37.167133]  kasan_save_stack+0x3c/0x68
[   37.167778]  kasan_save_track+0x20/0x40
[   37.168373]  kasan_save_alloc_info+0x40/0x58
[   37.168993]  __kasan_kmalloc+0xd4/0xd8
[   37.169617]  __kmalloc_cache_noprof+0x15c/0x3c0
[   37.170356]  kasan_atomics+0xb8/0x2e8
[   37.171064]  kunit_try_run_case+0x14c/0x3d0
[   37.171659]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.172495]  kthread+0x24c/0x2d0
[   37.173068]  ret_from_fork+0x10/0x20
[   37.173756] 
[   37.174107] The buggy address belongs to the object at fff00000c6767080
[   37.174107]  which belongs to the cache kmalloc-64 of size 64
[   37.175866] The buggy address is located 0 bytes to the right of
[   37.175866]  allocated 48-byte region [fff00000c6767080, fff00000c67670b0)
[   37.177693] 
[   37.178243] The buggy address belongs to the physical page:
[   37.178932] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106767
[   37.180121] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   37.181071] page_type: f5(slab)
[   37.181610] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   37.182804] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   37.183953] page dumped because: kasan: bad access detected
[   37.184870] 
[   37.185414] Memory state around the buggy address:
[   37.186191]  fff00000c6766f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.187209]  fff00000c6767000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   37.188055] >fff00000c6767080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   37.189158]                                      ^
[   37.189493]  fff00000c6767100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.190679]  fff00000c6767180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.191745] ==================================================================
[   38.286568] ==================================================================
[   38.287748] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x11f8/0x4858
[   38.288741] Write of size 8 at addr fff00000c67670b0 by task kunit_try_catch/253
[   38.290290] 
[   38.290610] CPU: 1 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241204 #1
[   38.291809] Tainted: [B]=BAD_PAGE, [N]=TEST
[   38.292438] Hardware name: linux,dummy-virt (DT)
[   38.293047] Call trace:
[   38.293428]  show_stack+0x20/0x38 (C)
[   38.294135]  dump_stack_lvl+0x8c/0xd0
[   38.294848]  print_report+0x118/0x5e0
[   38.295551]  kasan_report+0xc8/0x118
[   38.296105]  kasan_check_range+0x100/0x1a8
[   38.296825]  __kasan_check_write+0x20/0x30
[   38.297447]  kasan_atomics_helper+0x11f8/0x4858
[   38.298095]  kasan_atomics+0x198/0x2e8
[   38.298594]  kunit_try_run_case+0x14c/0x3d0
[   38.299398]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   38.300168]  kthread+0x24c/0x2d0
[   38.300716]  ret_from_fork+0x10/0x20
[   38.301343] 
[   38.301757] Allocated by task 253:
[   38.302247]  kasan_save_stack+0x3c/0x68
[   38.302992]  kasan_save_track+0x20/0x40
[   38.303642]  kasan_save_alloc_info+0x40/0x58
[   38.304352]  __kasan_kmalloc+0xd4/0xd8
[   38.304850]  __kmalloc_cache_noprof+0x15c/0x3c0
[   38.305564]  kasan_atomics+0xb8/0x2e8
[   38.306096]  kunit_try_run_case+0x14c/0x3d0
[   38.306791]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   38.307526]  kthread+0x24c/0x2d0
[   38.308219]  ret_from_fork+0x10/0x20
[   38.308807] 
[   38.309182] The buggy address belongs to the object at fff00000c6767080
[   38.309182]  which belongs to the cache kmalloc-64 of size 64
[   38.310727] The buggy address is located 0 bytes to the right of
[   38.310727]  allocated 48-byte region [fff00000c6767080, fff00000c67670b0)
[   38.312168] 
[   38.312512] The buggy address belongs to the physical page:
[   38.313212] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106767
[   38.314144] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   38.315043] page_type: f5(slab)
[   38.315543] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   38.316566] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   38.317492] page dumped because: kasan: bad access detected
[   38.318316] 
[   38.318672] Memory state around the buggy address:
[   38.319229]  fff00000c6766f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   38.320185]  fff00000c6767000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   38.320983] >fff00000c6767080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   38.321969]                                      ^
[   38.322608]  fff00000c6767100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   38.323572]  fff00000c6767180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   38.324409] ==================================================================
[   36.942425] ==================================================================
[   36.943420] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x61c/0x4858
[   36.944433] Write of size 4 at addr fff00000c67670b0 by task kunit_try_catch/253
[   36.945350] 
[   36.945803] CPU: 1 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241204 #1
[   36.947570] Tainted: [B]=BAD_PAGE, [N]=TEST
[   36.948283] Hardware name: linux,dummy-virt (DT)
[   36.949075] Call trace:
[   36.949603]  show_stack+0x20/0x38 (C)
[   36.950207]  dump_stack_lvl+0x8c/0xd0
[   36.950767]  print_report+0x118/0x5e0
[   36.951325]  kasan_report+0xc8/0x118
[   36.952199]  kasan_check_range+0x100/0x1a8
[   36.952841]  __kasan_check_write+0x20/0x30
[   36.953438]  kasan_atomics_helper+0x61c/0x4858
[   36.954069]  kasan_atomics+0x198/0x2e8
[   36.954734]  kunit_try_run_case+0x14c/0x3d0
[   36.955503]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.956534]  kthread+0x24c/0x2d0
[   36.957272]  ret_from_fork+0x10/0x20
[   36.957726] 
[   36.958070] Allocated by task 253:
[   36.958517]  kasan_save_stack+0x3c/0x68
[   36.959042]  kasan_save_track+0x20/0x40
[   36.959692]  kasan_save_alloc_info+0x40/0x58
[   36.960332]  __kasan_kmalloc+0xd4/0xd8
[   36.960899]  __kmalloc_cache_noprof+0x15c/0x3c0
[   36.961746]  kasan_atomics+0xb8/0x2e8
[   36.962224]  kunit_try_run_case+0x14c/0x3d0
[   36.962996]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.963781]  kthread+0x24c/0x2d0
[   36.964377]  ret_from_fork+0x10/0x20
[   36.964994] 
[   36.965288] The buggy address belongs to the object at fff00000c6767080
[   36.965288]  which belongs to the cache kmalloc-64 of size 64
[   36.966805] The buggy address is located 0 bytes to the right of
[   36.966805]  allocated 48-byte region [fff00000c6767080, fff00000c67670b0)
[   36.968281] 
[   36.968602] The buggy address belongs to the physical page:
[   36.969340] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106767
[   36.970271] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   36.971115] page_type: f5(slab)
[   36.971728] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   36.972695] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   36.973595] page dumped because: kasan: bad access detected
[   36.974286] 
[   36.974517] Memory state around the buggy address:
[   36.975356]  fff00000c6766f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.976236]  fff00000c6767000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   36.977059] >fff00000c6767080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   36.978059]                                      ^
[   36.978980]  fff00000c6767100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.980168]  fff00000c6767180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.981291] ==================================================================
[   38.610706] ==================================================================
[   38.611366] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x154c/0x4858
[   38.612414] Write of size 8 at addr fff00000c67670b0 by task kunit_try_catch/253
[   38.613077] 
[   38.613380] CPU: 1 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241204 #1
[   38.615165] Tainted: [B]=BAD_PAGE, [N]=TEST
[   38.615956] Hardware name: linux,dummy-virt (DT)
[   38.616862] Call trace:
[   38.617855]  show_stack+0x20/0x38 (C)
[   38.618510]  dump_stack_lvl+0x8c/0xd0
[   38.619130]  print_report+0x118/0x5e0
[   38.619918]  kasan_report+0xc8/0x118
[   38.620397]  kasan_check_range+0x100/0x1a8
[   38.621044]  __kasan_check_write+0x20/0x30
[   38.621648]  kasan_atomics_helper+0x154c/0x4858
[   38.622287]  kasan_atomics+0x198/0x2e8
[   38.623082]  kunit_try_run_case+0x14c/0x3d0
[   38.623717]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   38.624433]  kthread+0x24c/0x2d0
[   38.625172]  ret_from_fork+0x10/0x20
[   38.625871] 
[   38.626241] Allocated by task 253:
[   38.626941]  kasan_save_stack+0x3c/0x68
[   38.627584]  kasan_save_track+0x20/0x40
[   38.628091]  kasan_save_alloc_info+0x40/0x58
[   38.628800]  __kasan_kmalloc+0xd4/0xd8
[   38.629400]  __kmalloc_cache_noprof+0x15c/0x3c0
[   38.630059]  kasan_atomics+0xb8/0x2e8
[   38.630661]  kunit_try_run_case+0x14c/0x3d0
[   38.631391]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   38.632012]  kthread+0x24c/0x2d0
[   38.632612]  ret_from_fork+0x10/0x20
[   38.633142] 
[   38.633510] The buggy address belongs to the object at fff00000c6767080
[   38.633510]  which belongs to the cache kmalloc-64 of size 64
[   38.635056] The buggy address is located 0 bytes to the right of
[   38.635056]  allocated 48-byte region [fff00000c6767080, fff00000c67670b0)
[   38.636570] 
[   38.636898] The buggy address belongs to the physical page:
[   38.637616] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106767
[   38.638692] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   38.639548] page_type: f5(slab)
[   38.640020] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   38.641059] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   38.642002] page dumped because: kasan: bad access detected
[   38.642646] 
[   38.643031] Memory state around the buggy address:
[   38.643652]  fff00000c6766f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   38.644489]  fff00000c6767000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   38.645398] >fff00000c6767080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   38.646289]                                      ^
[   38.646860]  fff00000c6767100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   38.647855]  fff00000c6767180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   38.648761] ==================================================================
[   36.377333] ==================================================================
[   36.378708] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1ec/0x4858
[   36.379454] Read of size 4 at addr fff00000c67670b0 by task kunit_try_catch/253
[   36.380422] 
[   36.380773] CPU: 1 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241204 #1
[   36.382421] Tainted: [B]=BAD_PAGE, [N]=TEST
[   36.383219] Hardware name: linux,dummy-virt (DT)
[   36.383945] Call trace:
[   36.384302]  show_stack+0x20/0x38 (C)
[   36.385095]  dump_stack_lvl+0x8c/0xd0
[   36.385751]  print_report+0x118/0x5e0
[   36.387018]  kasan_report+0xc8/0x118
[   36.387663]  kasan_check_range+0x100/0x1a8
[   36.388583]  __kasan_check_read+0x20/0x30
[   36.389269]  kasan_atomics_helper+0x1ec/0x4858
[   36.390702]  kasan_atomics+0x198/0x2e8
[   36.391412]  kunit_try_run_case+0x14c/0x3d0
[   36.392081]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.392469]  kthread+0x24c/0x2d0
[   36.393058]  ret_from_fork+0x10/0x20
[   36.394126] 
[   36.394847] Allocated by task 253:
[   36.395558]  kasan_save_stack+0x3c/0x68
[   36.396148]  kasan_save_track+0x20/0x40
[   36.396722]  kasan_save_alloc_info+0x40/0x58
[   36.397372]  __kasan_kmalloc+0xd4/0xd8
[   36.397906]  __kmalloc_cache_noprof+0x15c/0x3c0
[   36.399470]  kasan_atomics+0xb8/0x2e8
[   36.400872]  kunit_try_run_case+0x14c/0x3d0
[   36.401507]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.402761]  kthread+0x24c/0x2d0
[   36.403432]  ret_from_fork+0x10/0x20
[   36.404300] 
[   36.404749] The buggy address belongs to the object at fff00000c6767080
[   36.404749]  which belongs to the cache kmalloc-64 of size 64
[   36.406671] The buggy address is located 0 bytes to the right of
[   36.406671]  allocated 48-byte region [fff00000c6767080, fff00000c67670b0)
[   36.408576] 
[   36.409215] The buggy address belongs to the physical page:
[   36.410619] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106767
[   36.412074] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   36.412522] page_type: f5(slab)
[   36.412978] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   36.414436] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   36.415619] page dumped because: kasan: bad access detected
[   36.416556] 
[   36.416992] Memory state around the buggy address:
[   36.417901]  fff00000c6766f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.418827]  fff00000c6767000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   36.420124] >fff00000c6767080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   36.421324]                                      ^
[   36.422160]  fff00000c6767100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.423805]  fff00000c6767180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.424818] ==================================================================
[   38.971127] ==================================================================
[   38.972418] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x17ec/0x4858
[   38.973213] Write of size 8 at addr fff00000c67670b0 by task kunit_try_catch/253
[   38.974747] 
[   38.975403] CPU: 1 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241204 #1
[   38.976686] Tainted: [B]=BAD_PAGE, [N]=TEST
[   38.977247] Hardware name: linux,dummy-virt (DT)
[   38.978030] Call trace:
[   38.978679]  show_stack+0x20/0x38 (C)
[   38.979461]  dump_stack_lvl+0x8c/0xd0
[   38.980044]  print_report+0x118/0x5e0
[   38.980775]  kasan_report+0xc8/0x118
[   38.981480]  kasan_check_range+0x100/0x1a8
[   38.982150]  __kasan_check_write+0x20/0x30
[   38.982943]  kasan_atomics_helper+0x17ec/0x4858
[   38.983561]  kasan_atomics+0x198/0x2e8
[   38.984303]  kunit_try_run_case+0x14c/0x3d0
[   38.985131]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   38.985935]  kthread+0x24c/0x2d0
[   38.986652]  ret_from_fork+0x10/0x20
[   38.987286] 
[   38.987718] Allocated by task 253:
[   38.988362]  kasan_save_stack+0x3c/0x68
[   38.989062]  kasan_save_track+0x20/0x40
[   38.989688]  kasan_save_alloc_info+0x40/0x58
[   38.990405]  __kasan_kmalloc+0xd4/0xd8
[   38.990960]  __kmalloc_cache_noprof+0x15c/0x3c0
[   38.991504]  kasan_atomics+0xb8/0x2e8
[   38.992078]  kunit_try_run_case+0x14c/0x3d0
[   38.992862]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   38.993545]  kthread+0x24c/0x2d0
[   38.994095]  ret_from_fork+0x10/0x20
[   38.994922] 
[   38.995286] The buggy address belongs to the object at fff00000c6767080
[   38.995286]  which belongs to the cache kmalloc-64 of size 64
[   38.996849] The buggy address is located 0 bytes to the right of
[   38.996849]  allocated 48-byte region [fff00000c6767080, fff00000c67670b0)
[   38.998433] 
[   38.998720] The buggy address belongs to the physical page:
[   38.999407] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106767
[   39.000506] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   39.001609] page_type: f5(slab)
[   39.002112] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   39.003217] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   39.004299] page dumped because: kasan: bad access detected
[   39.004951] 
[   39.005270] Memory state around the buggy address:
[   39.005915]  fff00000c6766f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   39.006663]  fff00000c6767000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   39.007850] >fff00000c6767080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   39.008742]                                      ^
[   39.009505]  fff00000c6767100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   39.010365]  fff00000c6767180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   39.011337] ==================================================================
[   38.809186] ==================================================================
[   38.810011] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x16d0/0x4858
[   38.810843] Write of size 8 at addr fff00000c67670b0 by task kunit_try_catch/253
[   38.811938] 
[   38.812293] CPU: 1 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241204 #1
[   38.813470] Tainted: [B]=BAD_PAGE, [N]=TEST
[   38.814080] Hardware name: linux,dummy-virt (DT)
[   38.814841] Call trace:
[   38.815218]  show_stack+0x20/0x38 (C)
[   38.815873]  dump_stack_lvl+0x8c/0xd0
[   38.816423]  print_report+0x118/0x5e0
[   38.817086]  kasan_report+0xc8/0x118
[   38.817721]  kasan_check_range+0x100/0x1a8
[   38.818481]  __kasan_check_write+0x20/0x30
[   38.819043]  kasan_atomics_helper+0x16d0/0x4858
[   38.819827]  kasan_atomics+0x198/0x2e8
[   38.820547]  kunit_try_run_case+0x14c/0x3d0
[   38.821226]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   38.822013]  kthread+0x24c/0x2d0
[   38.822733]  ret_from_fork+0x10/0x20
[   38.823249] 
[   38.823591] Allocated by task 253:
[   38.824200]  kasan_save_stack+0x3c/0x68
[   38.824772]  kasan_save_track+0x20/0x40
[   38.825395]  kasan_save_alloc_info+0x40/0x58
[   38.826072]  __kasan_kmalloc+0xd4/0xd8
[   38.826647]  __kmalloc_cache_noprof+0x15c/0x3c0
[   38.827320]  kasan_atomics+0xb8/0x2e8
[   38.827854]  kunit_try_run_case+0x14c/0x3d0
[   38.828458]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   38.829339]  kthread+0x24c/0x2d0
[   38.829887]  ret_from_fork+0x10/0x20
[   38.830416] 
[   38.830778] The buggy address belongs to the object at fff00000c6767080
[   38.830778]  which belongs to the cache kmalloc-64 of size 64
[   38.832082] The buggy address is located 0 bytes to the right of
[   38.832082]  allocated 48-byte region [fff00000c6767080, fff00000c67670b0)
[   38.833532] 
[   38.833865] The buggy address belongs to the physical page:
[   38.834640] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106767
[   38.835584] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   38.836538] page_type: f5(slab)
[   38.837127] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   38.838025] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   38.839090] page dumped because: kasan: bad access detected
[   38.839913] 
[   38.840260] Memory state around the buggy address:
[   38.840919]  fff00000c6766f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   38.841836]  fff00000c6767000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   38.842822] >fff00000c6767080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   38.843671]                                      ^
[   38.844284]  fff00000c6767100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   38.845229]  fff00000c6767180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   38.846086] ==================================================================
[   38.650766] ==================================================================
[   38.651557] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x15b4/0x4858
[   38.652384] Write of size 8 at addr fff00000c67670b0 by task kunit_try_catch/253
[   38.653204] 
[   38.653718] CPU: 1 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241204 #1
[   38.654979] Tainted: [B]=BAD_PAGE, [N]=TEST
[   38.655538] Hardware name: linux,dummy-virt (DT)
[   38.656247] Call trace:
[   38.656655]  show_stack+0x20/0x38 (C)
[   38.657339]  dump_stack_lvl+0x8c/0xd0
[   38.658036]  print_report+0x118/0x5e0
[   38.658560]  kasan_report+0xc8/0x118
[   38.659214]  kasan_check_range+0x100/0x1a8
[   38.659925]  __kasan_check_write+0x20/0x30
[   38.660579]  kasan_atomics_helper+0x15b4/0x4858
[   38.661266]  kasan_atomics+0x198/0x2e8
[   38.661827]  kunit_try_run_case+0x14c/0x3d0
[   38.662416]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   38.663256]  kthread+0x24c/0x2d0
[   38.663876]  ret_from_fork+0x10/0x20
[   38.664564] 
[   38.664886] Allocated by task 253:
[   38.665467]  kasan_save_stack+0x3c/0x68
[   38.666145]  kasan_save_track+0x20/0x40
[   38.666836]  kasan_save_alloc_info+0x40/0x58
[   38.667451]  __kasan_kmalloc+0xd4/0xd8
[   38.668066]  __kmalloc_cache_noprof+0x15c/0x3c0
[   38.668895]  kasan_atomics+0xb8/0x2e8
[   38.669400]  kunit_try_run_case+0x14c/0x3d0
[   38.670106]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   38.670725]  kthread+0x24c/0x2d0
[   38.671322]  ret_from_fork+0x10/0x20
[   38.671928] 
[   38.672246] The buggy address belongs to the object at fff00000c6767080
[   38.672246]  which belongs to the cache kmalloc-64 of size 64
[   38.673569] The buggy address is located 0 bytes to the right of
[   38.673569]  allocated 48-byte region [fff00000c6767080, fff00000c67670b0)
[   38.675111] 
[   38.675419] The buggy address belongs to the physical page:
[   38.676270] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106767
[   38.677256] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   38.678090] page_type: f5(slab)
[   38.678581] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   38.679524] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   38.680499] page dumped because: kasan: bad access detected
[   38.681248] 
[   38.681590] Memory state around the buggy address:
[   38.682245]  fff00000c6766f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   38.683215]  fff00000c6767000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   38.684152] >fff00000c6767080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   38.685040]                                      ^
[   38.685764]  fff00000c6767100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   38.686699]  fff00000c6767180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   38.687547] ==================================================================
[   38.043549] ==================================================================
[   38.044297] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf88/0x4858
[   38.045607] Write of size 8 at addr fff00000c67670b0 by task kunit_try_catch/253
[   38.046848] 
[   38.047373] CPU: 1 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241204 #1
[   38.048565] Tainted: [B]=BAD_PAGE, [N]=TEST
[   38.049240] Hardware name: linux,dummy-virt (DT)
[   38.050092] Call trace:
[   38.050438]  show_stack+0x20/0x38 (C)
[   38.051201]  dump_stack_lvl+0x8c/0xd0
[   38.051917]  print_report+0x118/0x5e0
[   38.052445]  kasan_report+0xc8/0x118
[   38.053084]  kasan_check_range+0x100/0x1a8
[   38.053834]  __kasan_check_write+0x20/0x30
[   38.054588]  kasan_atomics_helper+0xf88/0x4858
[   38.055364]  kasan_atomics+0x198/0x2e8
[   38.056001]  kunit_try_run_case+0x14c/0x3d0
[   38.056580]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   38.057428]  kthread+0x24c/0x2d0
[   38.058168]  ret_from_fork+0x10/0x20
[   38.058849] 
[   38.059260] Allocated by task 253:
[   38.059941]  kasan_save_stack+0x3c/0x68
[   38.060560]  kasan_save_track+0x20/0x40
[   38.061278]  kasan_save_alloc_info+0x40/0x58
[   38.062027]  __kasan_kmalloc+0xd4/0xd8
[   38.062691]  __kmalloc_cache_noprof+0x15c/0x3c0
[   38.063417]  kasan_atomics+0xb8/0x2e8
[   38.064023]  kunit_try_run_case+0x14c/0x3d0
[   38.064723]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   38.065460]  kthread+0x24c/0x2d0
[   38.066050]  ret_from_fork+0x10/0x20
[   38.066762] 
[   38.067157] The buggy address belongs to the object at fff00000c6767080
[   38.067157]  which belongs to the cache kmalloc-64 of size 64
[   38.068768] The buggy address is located 0 bytes to the right of
[   38.068768]  allocated 48-byte region [fff00000c6767080, fff00000c67670b0)
[   38.070417] 
[   38.070853] The buggy address belongs to the physical page:
[   38.071586] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106767
[   38.072695] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   38.073555] page_type: f5(slab)
[   38.074156] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   38.075207] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   38.076183] page dumped because: kasan: bad access detected
[   38.076971] 
[   38.077382] Memory state around the buggy address:
[   38.078162]  fff00000c6766f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   38.079165]  fff00000c6767000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   38.080187] >fff00000c6767080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   38.081079]                                      ^
[   38.081773]  fff00000c6767100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   38.082783]  fff00000c6767180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   38.083712] ==================================================================
[   38.449350] ==================================================================
[   38.450575] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f04/0x4858
[   38.451562] Read of size 8 at addr fff00000c67670b0 by task kunit_try_catch/253
[   38.452507] 
[   38.452890] CPU: 1 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241204 #1
[   38.454404] Tainted: [B]=BAD_PAGE, [N]=TEST
[   38.455122] Hardware name: linux,dummy-virt (DT)
[   38.455926] Call trace:
[   38.456358]  show_stack+0x20/0x38 (C)
[   38.457097]  dump_stack_lvl+0x8c/0xd0
[   38.457835]  print_report+0x118/0x5e0
[   38.458494]  kasan_report+0xc8/0x118
[   38.459151]  __asan_report_load8_noabort+0x20/0x30
[   38.459912]  kasan_atomics_helper+0x3f04/0x4858
[   38.460602]  kasan_atomics+0x198/0x2e8
[   38.461221]  kunit_try_run_case+0x14c/0x3d0
[   38.461979]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   38.462834]  kthread+0x24c/0x2d0
[   38.463457]  ret_from_fork+0x10/0x20
[   38.464087] 
[   38.464499] Allocated by task 253:
[   38.465086]  kasan_save_stack+0x3c/0x68
[   38.465830]  kasan_save_track+0x20/0x40
[   38.466528]  kasan_save_alloc_info+0x40/0x58
[   38.467257]  __kasan_kmalloc+0xd4/0xd8
[   38.467965]  __kmalloc_cache_noprof+0x15c/0x3c0
[   38.468707]  kasan_atomics+0xb8/0x2e8
[   38.469322]  kunit_try_run_case+0x14c/0x3d0
[   38.470019]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   38.470820]  kthread+0x24c/0x2d0
[   38.471509]  ret_from_fork+0x10/0x20
[   38.472167] 
[   38.472544] The buggy address belongs to the object at fff00000c6767080
[   38.472544]  which belongs to the cache kmalloc-64 of size 64
[   38.474110] The buggy address is located 0 bytes to the right of
[   38.474110]  allocated 48-byte region [fff00000c6767080, fff00000c67670b0)
[   38.475675] 
[   38.476064] The buggy address belongs to the physical page:
[   38.476687] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106767
[   38.477949] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   38.478860] page_type: f5(slab)
[   38.479459] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   38.480522] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   38.481493] page dumped because: kasan: bad access detected
[   38.482320] 
[   38.482693] Memory state around the buggy address:
[   38.483495]  fff00000c6766f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   38.484491]  fff00000c6767000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   38.485462] >fff00000c6767080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   38.486394]                                      ^
[   38.487174]  fff00000c6767100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   38.488106]  fff00000c6767180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   38.489018] ==================================================================
[   38.572332] ==================================================================
[   38.573080] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x14e4/0x4858
[   38.573509] Write of size 8 at addr fff00000c67670b0 by task kunit_try_catch/253
[   38.574166] 
[   38.574644] CPU: 1 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241204 #1
[   38.575904] Tainted: [B]=BAD_PAGE, [N]=TEST
[   38.576690] Hardware name: linux,dummy-virt (DT)
[   38.577328] Call trace:
[   38.577710]  show_stack+0x20/0x38 (C)
[   38.578451]  dump_stack_lvl+0x8c/0xd0
[   38.579000]  print_report+0x118/0x5e0
[   38.579798]  kasan_report+0xc8/0x118
[   38.580390]  kasan_check_range+0x100/0x1a8
[   38.581254]  __kasan_check_write+0x20/0x30
[   38.581875]  kasan_atomics_helper+0x14e4/0x4858
[   38.582745]  kasan_atomics+0x198/0x2e8
[   38.583360]  kunit_try_run_case+0x14c/0x3d0
[   38.583936]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   38.584834]  kthread+0x24c/0x2d0
[   38.585383]  ret_from_fork+0x10/0x20
[   38.586054] 
[   38.586427] Allocated by task 253:
[   38.586933]  kasan_save_stack+0x3c/0x68
[   38.587595]  kasan_save_track+0x20/0x40
[   38.588216]  kasan_save_alloc_info+0x40/0x58
[   38.588847]  __kasan_kmalloc+0xd4/0xd8
[   38.589410]  __kmalloc_cache_noprof+0x15c/0x3c0
[   38.590104]  kasan_atomics+0xb8/0x2e8
[   38.590682]  kunit_try_run_case+0x14c/0x3d0
[   38.591348]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   38.592237]  kthread+0x24c/0x2d0
[   38.592876]  ret_from_fork+0x10/0x20
[   38.593390] 
[   38.593809] The buggy address belongs to the object at fff00000c6767080
[   38.593809]  which belongs to the cache kmalloc-64 of size 64
[   38.595126] The buggy address is located 0 bytes to the right of
[   38.595126]  allocated 48-byte region [fff00000c6767080, fff00000c67670b0)
[   38.596488] 
[   38.596827] The buggy address belongs to the physical page:
[   38.597439] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106767
[   38.598471] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   38.599369] page_type: f5(slab)
[   38.600110] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   38.601015] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   38.601973] page dumped because: kasan: bad access detected
[   38.602572] 
[   38.602977] Memory state around the buggy address:
[   38.603678]  fff00000c6766f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   38.604515]  fff00000c6767000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   38.605445] >fff00000c6767080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   38.606418]                                      ^
[   38.607029]  fff00000c6767100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   38.607998]  fff00000c6767180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   38.608871] ==================================================================
[   37.520103] ==================================================================
[   37.520963] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3dbc/0x4858
[   37.522106] Read of size 4 at addr fff00000c67670b0 by task kunit_try_catch/253
[   37.523050] 
[   37.523422] CPU: 1 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241204 #1
[   37.525150] Tainted: [B]=BAD_PAGE, [N]=TEST
[   37.525875] Hardware name: linux,dummy-virt (DT)
[   37.526472] Call trace:
[   37.527182]  show_stack+0x20/0x38 (C)
[   37.527803]  dump_stack_lvl+0x8c/0xd0
[   37.528616]  print_report+0x118/0x5e0
[   37.529110]  kasan_report+0xc8/0x118
[   37.529610]  __asan_report_load4_noabort+0x20/0x30
[   37.530512]  kasan_atomics_helper+0x3dbc/0x4858
[   37.531077]  kasan_atomics+0x198/0x2e8
[   37.532005]  kunit_try_run_case+0x14c/0x3d0
[   37.532815]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.533691]  kthread+0x24c/0x2d0
[   37.534229]  ret_from_fork+0x10/0x20
[   37.534896] 
[   37.535254] Allocated by task 253:
[   37.535841]  kasan_save_stack+0x3c/0x68
[   37.536463]  kasan_save_track+0x20/0x40
[   37.537111]  kasan_save_alloc_info+0x40/0x58
[   37.537776]  __kasan_kmalloc+0xd4/0xd8
[   37.538403]  __kmalloc_cache_noprof+0x15c/0x3c0
[   37.539058]  kasan_atomics+0xb8/0x2e8
[   37.539669]  kunit_try_run_case+0x14c/0x3d0
[   37.540326]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.541031]  kthread+0x24c/0x2d0
[   37.541604]  ret_from_fork+0x10/0x20
[   37.542149] 
[   37.542507] The buggy address belongs to the object at fff00000c6767080
[   37.542507]  which belongs to the cache kmalloc-64 of size 64
[   37.544072] The buggy address is located 0 bytes to the right of
[   37.544072]  allocated 48-byte region [fff00000c6767080, fff00000c67670b0)
[   37.545689] 
[   37.546005] The buggy address belongs to the physical page:
[   37.546721] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106767
[   37.547683] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   37.548570] page_type: f5(slab)
[   37.549166] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   37.550170] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   37.551057] page dumped because: kasan: bad access detected
[   37.551726] 
[   37.552094] Memory state around the buggy address:
[   37.552823]  fff00000c6766f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.553554]  fff00000c6767000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   37.554471] >fff00000c6767080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   37.555350]                                      ^
[   37.556046]  fff00000c6767100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.557031]  fff00000c6767180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.557926] ==================================================================
[   36.612316] ==================================================================
[   36.613094] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f94/0x4858
[   36.614953] Write of size 4 at addr fff00000c67670b0 by task kunit_try_catch/253
[   36.616471] 
[   36.617125] CPU: 1 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241204 #1
[   36.618570] Tainted: [B]=BAD_PAGE, [N]=TEST
[   36.619420] Hardware name: linux,dummy-virt (DT)
[   36.620187] Call trace:
[   36.620591]  show_stack+0x20/0x38 (C)
[   36.621198]  dump_stack_lvl+0x8c/0xd0
[   36.622313]  print_report+0x118/0x5e0
[   36.622863]  kasan_report+0xc8/0x118
[   36.623257]  __asan_report_store4_noabort+0x20/0x30
[   36.623934]  kasan_atomics_helper+0x3f94/0x4858
[   36.624577]  kasan_atomics+0x198/0x2e8
[   36.625107]  kunit_try_run_case+0x14c/0x3d0
[   36.625665]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.626504]  kthread+0x24c/0x2d0
[   36.627291]  ret_from_fork+0x10/0x20
[   36.628056] 
[   36.628461] Allocated by task 253:
[   36.628976]  kasan_save_stack+0x3c/0x68
[   36.629713]  kasan_save_track+0x20/0x40
[   36.630538]  kasan_save_alloc_info+0x40/0x58
[   36.631576]  __kasan_kmalloc+0xd4/0xd8
[   36.632543]  __kmalloc_cache_noprof+0x15c/0x3c0
[   36.633315]  kasan_atomics+0xb8/0x2e8
[   36.633944]  kunit_try_run_case+0x14c/0x3d0
[   36.634768]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.635888]  kthread+0x24c/0x2d0
[   36.636288]  ret_from_fork+0x10/0x20
[   36.636759] 
[   36.637351] The buggy address belongs to the object at fff00000c6767080
[   36.637351]  which belongs to the cache kmalloc-64 of size 64
[   36.639855] The buggy address is located 0 bytes to the right of
[   36.639855]  allocated 48-byte region [fff00000c6767080, fff00000c67670b0)
[   36.641355] 
[   36.642158] The buggy address belongs to the physical page:
[   36.642950] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106767
[   36.643881] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   36.644851] page_type: f5(slab)
[   36.645334] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   36.646971] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   36.647744] page dumped because: kasan: bad access detected
[   36.648942] 
[   36.649252] Memory state around the buggy address:
[   36.650493]  fff00000c6766f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.651552]  fff00000c6767000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   36.652522] >fff00000c6767080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   36.653560]                                      ^
[   36.654563]  fff00000c6767100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.656036]  fff00000c6767180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.656991] ==================================================================
[   37.725066] ==================================================================
[   37.725743] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xd3c/0x4858
[   37.726799] Write of size 4 at addr fff00000c67670b0 by task kunit_try_catch/253
[   37.728042] 
[   37.728494] CPU: 1 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241204 #1
[   37.729741] Tainted: [B]=BAD_PAGE, [N]=TEST
[   37.731092] Hardware name: linux,dummy-virt (DT)
[   37.731659] Call trace:
[   37.732116]  show_stack+0x20/0x38 (C)
[   37.733403]  dump_stack_lvl+0x8c/0xd0
[   37.734165]  print_report+0x118/0x5e0
[   37.734832]  kasan_report+0xc8/0x118
[   37.735517]  kasan_check_range+0x100/0x1a8
[   37.736152]  __kasan_check_write+0x20/0x30
[   37.737012]  kasan_atomics_helper+0xd3c/0x4858
[   37.737688]  kasan_atomics+0x198/0x2e8
[   37.738290]  kunit_try_run_case+0x14c/0x3d0
[   37.738670]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.739440]  kthread+0x24c/0x2d0
[   37.740151]  ret_from_fork+0x10/0x20
[   37.740854] 
[   37.741219] Allocated by task 253:
[   37.741792]  kasan_save_stack+0x3c/0x68
[   37.742389]  kasan_save_track+0x20/0x40
[   37.743122]  kasan_save_alloc_info+0x40/0x58
[   37.743659]  __kasan_kmalloc+0xd4/0xd8
[   37.744317]  __kmalloc_cache_noprof+0x15c/0x3c0
[   37.745000]  kasan_atomics+0xb8/0x2e8
[   37.745650]  kunit_try_run_case+0x14c/0x3d0
[   37.746248]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.747196]  kthread+0x24c/0x2d0
[   37.747648]  ret_from_fork+0x10/0x20
[   37.748327] 
[   37.748683] The buggy address belongs to the object at fff00000c6767080
[   37.748683]  which belongs to the cache kmalloc-64 of size 64
[   37.750107] The buggy address is located 0 bytes to the right of
[   37.750107]  allocated 48-byte region [fff00000c6767080, fff00000c67670b0)
[   37.751526] 
[   37.751855] The buggy address belongs to the physical page:
[   37.752439] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106767
[   37.753546] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   37.754329] page_type: f5(slab)
[   37.755004] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   37.755955] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   37.756952] page dumped because: kasan: bad access detected
[   37.757648] 
[   37.757996] Memory state around the buggy address:
[   37.758696]  fff00000c6766f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.759601]  fff00000c6767000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   37.760409] >fff00000c6767080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   37.761404]                                      ^
[   37.761950]  fff00000c6767100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.762895]  fff00000c6767180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.763826] ==================================================================

[   29.100851] ==================================================================
[   29.102484] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x50d6/0x5450
[   29.103202] Write of size 8 at addr ffff888101afb730 by task kunit_try_catch/273
[   29.104713] 
[   29.104991] CPU: 0 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241204 #1
[   29.105962] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.106403] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   29.107216] Call Trace:
[   29.107454]  <TASK>
[   29.107942]  dump_stack_lvl+0x73/0xb0
[   29.108506]  print_report+0xd1/0x640
[   29.108840]  ? __virt_addr_valid+0x1db/0x2d0
[   29.109612]  ? kasan_complete_mode_report_info+0x2a/0x200
[   29.110422]  kasan_report+0x102/0x140
[   29.110931]  ? kasan_atomics_helper+0x50d6/0x5450
[   29.111525]  ? kasan_atomics_helper+0x50d6/0x5450
[   29.112184]  __asan_report_store8_noabort+0x1b/0x30
[   29.112738]  kasan_atomics_helper+0x50d6/0x5450
[   29.113053]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   29.113702]  ? __kmalloc_cache_noprof+0x184/0x410
[   29.114273]  ? __schedule+0xc3e/0x2790
[   29.115074]  ? finish_task_switch.isra.0+0x153/0x700
[   29.115798]  ? kasan_atomics+0x153/0x310
[   29.116323]  kasan_atomics+0x1dd/0x310
[   29.116842]  ? __pfx_kasan_atomics+0x10/0x10
[   29.117683]  ? __pfx_read_tsc+0x10/0x10
[   29.118350]  ? ktime_get_ts64+0x86/0x230
[   29.118710]  kunit_try_run_case+0x1b3/0x490
[   29.119754]  ? __pfx_kunit_try_run_case+0x10/0x10
[   29.120357]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   29.120816]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   29.122162]  ? __kthread_parkme+0x82/0x160
[   29.122592]  ? preempt_count_sub+0x50/0x80
[   29.122957]  ? __pfx_kunit_try_run_case+0x10/0x10
[   29.123440]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   29.124553]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   29.125080]  kthread+0x257/0x310
[   29.125320]  ? __pfx_kthread+0x10/0x10
[   29.125584]  ret_from_fork+0x41/0x80
[   29.125770]  ? __pfx_kthread+0x10/0x10
[   29.126200]  ret_from_fork_asm+0x1a/0x30
[   29.126943]  </TASK>
[   29.127319] 
[   29.127893] Allocated by task 273:
[   29.128586]  kasan_save_stack+0x3d/0x60
[   29.129510]  kasan_save_track+0x18/0x40
[   29.129794]  kasan_save_alloc_info+0x3b/0x50
[   29.130150]  __kasan_kmalloc+0xb7/0xc0
[   29.130590]  __kmalloc_cache_noprof+0x184/0x410
[   29.131024]  kasan_atomics+0x96/0x310
[   29.131389]  kunit_try_run_case+0x1b3/0x490
[   29.131890]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   29.132444]  kthread+0x257/0x310
[   29.132776]  ret_from_fork+0x41/0x80
[   29.133137]  ret_from_fork_asm+0x1a/0x30
[   29.133653] 
[   29.133818] The buggy address belongs to the object at ffff888101afb700
[   29.133818]  which belongs to the cache kmalloc-64 of size 64
[   29.134972] The buggy address is located 0 bytes to the right of
[   29.134972]  allocated 48-byte region [ffff888101afb700, ffff888101afb730)
[   29.136054] 
[   29.136292] The buggy address belongs to the physical page:
[   29.136968] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101afb
[   29.137614] flags: 0x200000000000000(node=0|zone=2)
[   29.138086] page_type: f5(slab)
[   29.138349] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   29.139176] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   29.139811] page dumped because: kasan: bad access detected
[   29.140415] 
[   29.140629] Memory state around the buggy address:
[   29.141105]  ffff888101afb600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.141764]  ffff888101afb680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.142320] >ffff888101afb700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   29.143116]                                      ^
[   29.143516]  ffff888101afb780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.144266]  ffff888101afb800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.144869] ==================================================================
[   27.561417] ==================================================================
[   27.563139] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x566/0x5450
[   27.564015] Write of size 4 at addr ffff888101afb730 by task kunit_try_catch/273
[   27.565862] 
[   27.566059] CPU: 0 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241204 #1
[   27.567520] Tainted: [B]=BAD_PAGE, [N]=TEST
[   27.568203] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   27.569533] Call Trace:
[   27.569813]  <TASK>
[   27.570837]  dump_stack_lvl+0x73/0xb0
[   27.571543]  print_report+0xd1/0x640
[   27.572085]  ? __virt_addr_valid+0x1db/0x2d0
[   27.573073]  ? kasan_complete_mode_report_info+0x2a/0x200
[   27.573900]  kasan_report+0x102/0x140
[   27.574093]  ? kasan_atomics_helper+0x566/0x5450
[   27.574474]  ? kasan_atomics_helper+0x566/0x5450
[   27.575157]  kasan_check_range+0x10c/0x1c0
[   27.576286]  __kasan_check_write+0x18/0x20
[   27.577289]  kasan_atomics_helper+0x566/0x5450
[   27.578279]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   27.578766]  ? __kmalloc_cache_noprof+0x184/0x410
[   27.579580]  ? __schedule+0xc3e/0x2790
[   27.580173]  ? finish_task_switch.isra.0+0x153/0x700
[   27.581059]  ? kasan_atomics+0x153/0x310
[   27.582277]  kasan_atomics+0x1dd/0x310
[   27.582989]  ? __pfx_kasan_atomics+0x10/0x10
[   27.583633]  ? __pfx_read_tsc+0x10/0x10
[   27.584093]  ? ktime_get_ts64+0x86/0x230
[   27.584636]  kunit_try_run_case+0x1b3/0x490
[   27.585567]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.586196]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   27.586622]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   27.587405]  ? __kthread_parkme+0x82/0x160
[   27.587992]  ? preempt_count_sub+0x50/0x80
[   27.588964]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.589269]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   27.589652]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.590296]  kthread+0x257/0x310
[   27.590650]  ? __pfx_kthread+0x10/0x10
[   27.591419]  ret_from_fork+0x41/0x80
[   27.591809]  ? __pfx_kthread+0x10/0x10
[   27.592236]  ret_from_fork_asm+0x1a/0x30
[   27.592835]  </TASK>
[   27.593081] 
[   27.593239] Allocated by task 273:
[   27.593770]  kasan_save_stack+0x3d/0x60
[   27.594147]  kasan_save_track+0x18/0x40
[   27.594572]  kasan_save_alloc_info+0x3b/0x50
[   27.595609]  __kasan_kmalloc+0xb7/0xc0
[   27.596093]  __kmalloc_cache_noprof+0x184/0x410
[   27.596636]  kasan_atomics+0x96/0x310
[   27.597402]  kunit_try_run_case+0x1b3/0x490
[   27.598138]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.598626]  kthread+0x257/0x310
[   27.599214]  ret_from_fork+0x41/0x80
[   27.599764]  ret_from_fork_asm+0x1a/0x30
[   27.600256] 
[   27.600649] The buggy address belongs to the object at ffff888101afb700
[   27.600649]  which belongs to the cache kmalloc-64 of size 64
[   27.602112] The buggy address is located 0 bytes to the right of
[   27.602112]  allocated 48-byte region [ffff888101afb700, ffff888101afb730)
[   27.605530] 
[   27.605863] The buggy address belongs to the physical page:
[   27.606192] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101afb
[   27.607680] flags: 0x200000000000000(node=0|zone=2)
[   27.609267] page_type: f5(slab)
[   27.609861] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   27.611380] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   27.611850] page dumped because: kasan: bad access detected
[   27.612766] 
[   27.613379] Memory state around the buggy address:
[   27.613666]  ffff888101afb600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.614086]  ffff888101afb680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.614903] >ffff888101afb700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   27.616416]                                      ^
[   27.616917]  ffff888101afb780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.618233]  ffff888101afb800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.618707] ==================================================================
[   28.520702] ==================================================================
[   28.521434] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a38/0x5450
[   28.522305] Read of size 4 at addr ffff888101afb730 by task kunit_try_catch/273
[   28.523078] 
[   28.523253] CPU: 0 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241204 #1
[   28.524382] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.524685] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   28.526619] Call Trace:
[   28.526998]  <TASK>
[   28.527610]  dump_stack_lvl+0x73/0xb0
[   28.528439]  print_report+0xd1/0x640
[   28.529077]  ? __virt_addr_valid+0x1db/0x2d0
[   28.529833]  ? kasan_complete_mode_report_info+0x2a/0x200
[   28.530620]  kasan_report+0x102/0x140
[   28.531444]  ? kasan_atomics_helper+0x4a38/0x5450
[   28.532381]  ? kasan_atomics_helper+0x4a38/0x5450
[   28.532969]  __asan_report_load4_noabort+0x18/0x20
[   28.533756]  kasan_atomics_helper+0x4a38/0x5450
[   28.534363]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   28.534828]  ? __kmalloc_cache_noprof+0x184/0x410
[   28.535681]  ? __schedule+0xc3e/0x2790
[   28.536462]  ? finish_task_switch.isra.0+0x153/0x700
[   28.537107]  ? kasan_atomics+0x153/0x310
[   28.537528]  kasan_atomics+0x1dd/0x310
[   28.538331]  ? __pfx_kasan_atomics+0x10/0x10
[   28.538737]  ? __pfx_read_tsc+0x10/0x10
[   28.539332]  ? ktime_get_ts64+0x86/0x230
[   28.539744]  kunit_try_run_case+0x1b3/0x490
[   28.540585]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.541145]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   28.541810]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   28.542375]  ? __kthread_parkme+0x82/0x160
[   28.542824]  ? preempt_count_sub+0x50/0x80
[   28.543878]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.544666]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   28.545682]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.546040]  kthread+0x257/0x310
[   28.546477]  ? __pfx_kthread+0x10/0x10
[   28.546849]  ret_from_fork+0x41/0x80
[   28.547749]  ? __pfx_kthread+0x10/0x10
[   28.548450]  ret_from_fork_asm+0x1a/0x30
[   28.549522]  </TASK>
[   28.549760] 
[   28.549907] Allocated by task 273:
[   28.550462]  kasan_save_stack+0x3d/0x60
[   28.551674]  kasan_save_track+0x18/0x40
[   28.552077]  kasan_save_alloc_info+0x3b/0x50
[   28.552610]  __kasan_kmalloc+0xb7/0xc0
[   28.553318]  __kmalloc_cache_noprof+0x184/0x410
[   28.554077]  kasan_atomics+0x96/0x310
[   28.554444]  kunit_try_run_case+0x1b3/0x490
[   28.554811]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.555662]  kthread+0x257/0x310
[   28.556406]  ret_from_fork+0x41/0x80
[   28.556787]  ret_from_fork_asm+0x1a/0x30
[   28.557458] 
[   28.557624] The buggy address belongs to the object at ffff888101afb700
[   28.557624]  which belongs to the cache kmalloc-64 of size 64
[   28.559220] The buggy address is located 0 bytes to the right of
[   28.559220]  allocated 48-byte region [ffff888101afb700, ffff888101afb730)
[   28.560087] 
[   28.560636] The buggy address belongs to the physical page:
[   28.561616] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101afb
[   28.562353] flags: 0x200000000000000(node=0|zone=2)
[   28.562672] page_type: f5(slab)
[   28.563097] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   28.564229] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   28.565163] page dumped because: kasan: bad access detected
[   28.565642] 
[   28.565861] Memory state around the buggy address:
[   28.566711]  ffff888101afb600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.567451]  ffff888101afb680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.568050] >ffff888101afb700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   28.568915]                                      ^
[   28.569654]  ffff888101afb780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.570464]  ffff888101afb800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.571402] ==================================================================
[   28.710473] ==================================================================
[   28.711290] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a04/0x5450
[   28.711945] Read of size 4 at addr ffff888101afb730 by task kunit_try_catch/273
[   28.712771] 
[   28.713149] CPU: 0 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241204 #1
[   28.714113] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.714676] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   28.715376] Call Trace:
[   28.715810]  <TASK>
[   28.716164]  dump_stack_lvl+0x73/0xb0
[   28.716597]  print_report+0xd1/0x640
[   28.717119]  ? __virt_addr_valid+0x1db/0x2d0
[   28.717724]  ? kasan_complete_mode_report_info+0x2a/0x200
[   28.718452]  kasan_report+0x102/0x140
[   28.718839]  ? kasan_atomics_helper+0x4a04/0x5450
[   28.719465]  ? kasan_atomics_helper+0x4a04/0x5450
[   28.719999]  __asan_report_load4_noabort+0x18/0x20
[   28.720500]  kasan_atomics_helper+0x4a04/0x5450
[   28.721018]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   28.721666]  ? __kmalloc_cache_noprof+0x184/0x410
[   28.722120]  ? __schedule+0xc3e/0x2790
[   28.722668]  ? finish_task_switch.isra.0+0x153/0x700
[   28.723239]  ? kasan_atomics+0x153/0x310
[   28.723761]  kasan_atomics+0x1dd/0x310
[   28.724254]  ? __pfx_kasan_atomics+0x10/0x10
[   28.724630]  ? __pfx_read_tsc+0x10/0x10
[   28.725232]  ? ktime_get_ts64+0x86/0x230
[   28.725660]  kunit_try_run_case+0x1b3/0x490
[   28.726100]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.726626]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   28.727025]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   28.727610]  ? __kthread_parkme+0x82/0x160
[   28.728105]  ? preempt_count_sub+0x50/0x80
[   28.728694]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.729358]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   28.730009]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.730562]  kthread+0x257/0x310
[   28.731105]  ? __pfx_kthread+0x10/0x10
[   28.731429]  ret_from_fork+0x41/0x80
[   28.731845]  ? __pfx_kthread+0x10/0x10
[   28.732353]  ret_from_fork_asm+0x1a/0x30
[   28.732923]  </TASK>
[   28.733310] 
[   28.733539] Allocated by task 273:
[   28.734019]  kasan_save_stack+0x3d/0x60
[   28.734347]  kasan_save_track+0x18/0x40
[   28.734944]  kasan_save_alloc_info+0x3b/0x50
[   28.735288]  __kasan_kmalloc+0xb7/0xc0
[   28.735837]  __kmalloc_cache_noprof+0x184/0x410
[   28.736372]  kasan_atomics+0x96/0x310
[   28.736769]  kunit_try_run_case+0x1b3/0x490
[   28.737354]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.737932]  kthread+0x257/0x310
[   28.738361]  ret_from_fork+0x41/0x80
[   28.738770]  ret_from_fork_asm+0x1a/0x30
[   28.739256] 
[   28.739595] The buggy address belongs to the object at ffff888101afb700
[   28.739595]  which belongs to the cache kmalloc-64 of size 64
[   28.740671] The buggy address is located 0 bytes to the right of
[   28.740671]  allocated 48-byte region [ffff888101afb700, ffff888101afb730)
[   28.741777] 
[   28.742285] The buggy address belongs to the physical page:
[   28.742560] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101afb
[   28.742867] flags: 0x200000000000000(node=0|zone=2)
[   28.743704] page_type: f5(slab)
[   28.743969] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   28.744551] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   28.745214] page dumped because: kasan: bad access detected
[   28.745816] 
[   28.746032] Memory state around the buggy address:
[   28.746529]  ffff888101afb600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.747187]  ffff888101afb680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.747739] >ffff888101afb700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   28.748369]                                      ^
[   28.748746]  ffff888101afb780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.749496]  ffff888101afb800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.750214] ==================================================================
[   29.322640] ==================================================================
[   29.323233] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1780/0x5450
[   29.324303] Write of size 8 at addr ffff888101afb730 by task kunit_try_catch/273
[   29.325124] 
[   29.325338] CPU: 0 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241204 #1
[   29.326370] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.326881] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   29.328770] Call Trace:
[   29.329333]  <TASK>
[   29.329583]  dump_stack_lvl+0x73/0xb0
[   29.330208]  print_report+0xd1/0x640
[   29.330672]  ? __virt_addr_valid+0x1db/0x2d0
[   29.331211]  ? kasan_complete_mode_report_info+0x2a/0x200
[   29.331794]  kasan_report+0x102/0x140
[   29.332395]  ? kasan_atomics_helper+0x1780/0x5450
[   29.332847]  ? kasan_atomics_helper+0x1780/0x5450
[   29.333544]  kasan_check_range+0x10c/0x1c0
[   29.333879]  __kasan_check_write+0x18/0x20
[   29.334458]  kasan_atomics_helper+0x1780/0x5450
[   29.334895]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   29.335545]  ? __kmalloc_cache_noprof+0x184/0x410
[   29.336073]  ? __schedule+0xc3e/0x2790
[   29.336643]  ? finish_task_switch.isra.0+0x153/0x700
[   29.337263]  ? kasan_atomics+0x153/0x310
[   29.337692]  kasan_atomics+0x1dd/0x310
[   29.338286]  ? __pfx_kasan_atomics+0x10/0x10
[   29.338911]  ? __pfx_read_tsc+0x10/0x10
[   29.339536]  ? ktime_get_ts64+0x86/0x230
[   29.340014]  kunit_try_run_case+0x1b3/0x490
[   29.340589]  ? __pfx_kunit_try_run_case+0x10/0x10
[   29.341128]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   29.341665]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   29.342278]  ? __kthread_parkme+0x82/0x160
[   29.342830]  ? preempt_count_sub+0x50/0x80
[   29.343447]  ? __pfx_kunit_try_run_case+0x10/0x10
[   29.343822]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   29.344643]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   29.345295]  kthread+0x257/0x310
[   29.345647]  ? __pfx_kthread+0x10/0x10
[   29.346186]  ret_from_fork+0x41/0x80
[   29.346684]  ? __pfx_kthread+0x10/0x10
[   29.347230]  ret_from_fork_asm+0x1a/0x30
[   29.347810]  </TASK>
[   29.348257] 
[   29.348538] Allocated by task 273:
[   29.348795]  kasan_save_stack+0x3d/0x60
[   29.349360]  kasan_save_track+0x18/0x40
[   29.349753]  kasan_save_alloc_info+0x3b/0x50
[   29.350352]  __kasan_kmalloc+0xb7/0xc0
[   29.350708]  __kmalloc_cache_noprof+0x184/0x410
[   29.351292]  kasan_atomics+0x96/0x310
[   29.351721]  kunit_try_run_case+0x1b3/0x490
[   29.352149]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   29.352886]  kthread+0x257/0x310
[   29.353238]  ret_from_fork+0x41/0x80
[   29.353786]  ret_from_fork_asm+0x1a/0x30
[   29.354261] 
[   29.354573] The buggy address belongs to the object at ffff888101afb700
[   29.354573]  which belongs to the cache kmalloc-64 of size 64
[   29.355777] The buggy address is located 0 bytes to the right of
[   29.355777]  allocated 48-byte region [ffff888101afb700, ffff888101afb730)
[   29.356885] 
[   29.357166] The buggy address belongs to the physical page:
[   29.357783] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101afb
[   29.358516] flags: 0x200000000000000(node=0|zone=2)
[   29.359033] page_type: f5(slab)
[   29.359477] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   29.360301] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   29.361165] page dumped because: kasan: bad access detected
[   29.361697] 
[   29.361978] Memory state around the buggy address:
[   29.363127]  ffff888101afb600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.363820]  ffff888101afb680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.364717] >ffff888101afb700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   29.365241]                                      ^
[   29.365801]  ffff888101afb780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.366428]  ffff888101afb800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.367095] ==================================================================
[   29.184869] ==================================================================
[   29.185543] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x15b7/0x5450
[   29.186058] Write of size 8 at addr ffff888101afb730 by task kunit_try_catch/273
[   29.187216] 
[   29.187500] CPU: 0 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241204 #1
[   29.188585] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.188860] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   29.189832] Call Trace:
[   29.190221]  <TASK>
[   29.190683]  dump_stack_lvl+0x73/0xb0
[   29.191181]  print_report+0xd1/0x640
[   29.193334]  ? __virt_addr_valid+0x1db/0x2d0
[   29.194181]  ? kasan_complete_mode_report_info+0x2a/0x200
[   29.194713]  kasan_report+0x102/0x140
[   29.195386]  ? kasan_atomics_helper+0x15b7/0x5450
[   29.195776]  ? kasan_atomics_helper+0x15b7/0x5450
[   29.196302]  kasan_check_range+0x10c/0x1c0
[   29.196664]  __kasan_check_write+0x18/0x20
[   29.197219]  kasan_atomics_helper+0x15b7/0x5450
[   29.197708]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   29.198211]  ? __kmalloc_cache_noprof+0x184/0x410
[   29.198672]  ? __schedule+0xc3e/0x2790
[   29.199026]  ? finish_task_switch.isra.0+0x153/0x700
[   29.199533]  ? kasan_atomics+0x153/0x310
[   29.199881]  kasan_atomics+0x1dd/0x310
[   29.200416]  ? __pfx_kasan_atomics+0x10/0x10
[   29.200887]  ? __pfx_read_tsc+0x10/0x10
[   29.201416]  ? ktime_get_ts64+0x86/0x230
[   29.201766]  kunit_try_run_case+0x1b3/0x490
[   29.202365]  ? __pfx_kunit_try_run_case+0x10/0x10
[   29.202826]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   29.203407]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   29.203901]  ? __kthread_parkme+0x82/0x160
[   29.204289]  ? preempt_count_sub+0x50/0x80
[   29.204742]  ? __pfx_kunit_try_run_case+0x10/0x10
[   29.205297]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   29.205793]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   29.206463]  kthread+0x257/0x310
[   29.206887]  ? __pfx_kthread+0x10/0x10
[   29.207344]  ret_from_fork+0x41/0x80
[   29.207734]  ? __pfx_kthread+0x10/0x10
[   29.208114]  ret_from_fork_asm+0x1a/0x30
[   29.208647]  </TASK>
[   29.209023] 
[   29.209202] Allocated by task 273:
[   29.209640]  kasan_save_stack+0x3d/0x60
[   29.210101]  kasan_save_track+0x18/0x40
[   29.210400]  kasan_save_alloc_info+0x3b/0x50
[   29.210976]  __kasan_kmalloc+0xb7/0xc0
[   29.211434]  __kmalloc_cache_noprof+0x184/0x410
[   29.211897]  kasan_atomics+0x96/0x310
[   29.212321]  kunit_try_run_case+0x1b3/0x490
[   29.212644]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   29.213335]  kthread+0x257/0x310
[   29.213823]  ret_from_fork+0x41/0x80
[   29.214215]  ret_from_fork_asm+0x1a/0x30
[   29.214722] 
[   29.214949] The buggy address belongs to the object at ffff888101afb700
[   29.214949]  which belongs to the cache kmalloc-64 of size 64
[   29.215982] The buggy address is located 0 bytes to the right of
[   29.215982]  allocated 48-byte region [ffff888101afb700, ffff888101afb730)
[   29.216745] 
[   29.217077] The buggy address belongs to the physical page:
[   29.217550] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101afb
[   29.218200] flags: 0x200000000000000(node=0|zone=2)
[   29.218814] page_type: f5(slab)
[   29.219275] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   29.219884] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   29.220519] page dumped because: kasan: bad access detected
[   29.221103] 
[   29.221330] Memory state around the buggy address:
[   29.221708]  ffff888101afb600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.222397]  ffff888101afb680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.223157] >ffff888101afb700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   29.223739]                                      ^
[   29.224226]  ffff888101afb780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.225559]  ffff888101afb800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.226536] ==================================================================
[   27.846308] ==================================================================
[   27.848172] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x861/0x5450
[   27.849045] Write of size 4 at addr ffff888101afb730 by task kunit_try_catch/273
[   27.850415] 
[   27.850803] CPU: 0 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241204 #1
[   27.851683] Tainted: [B]=BAD_PAGE, [N]=TEST
[   27.852104] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   27.852937] Call Trace:
[   27.853228]  <TASK>
[   27.854505]  dump_stack_lvl+0x73/0xb0
[   27.854789]  print_report+0xd1/0x640
[   27.855558]  ? __virt_addr_valid+0x1db/0x2d0
[   27.856162]  ? kasan_complete_mode_report_info+0x2a/0x200
[   27.857055]  kasan_report+0x102/0x140
[   27.857577]  ? kasan_atomics_helper+0x861/0x5450
[   27.859037]  ? kasan_atomics_helper+0x861/0x5450
[   27.859612]  kasan_check_range+0x10c/0x1c0
[   27.860000]  __kasan_check_write+0x18/0x20
[   27.860459]  kasan_atomics_helper+0x861/0x5450
[   27.860976]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   27.861539]  ? __kmalloc_cache_noprof+0x184/0x410
[   27.862206]  ? __schedule+0xc3e/0x2790
[   27.862998]  ? finish_task_switch.isra.0+0x153/0x700
[   27.863654]  ? kasan_atomics+0x153/0x310
[   27.864096]  kasan_atomics+0x1dd/0x310
[   27.864449]  ? __pfx_kasan_atomics+0x10/0x10
[   27.865150]  ? __pfx_read_tsc+0x10/0x10
[   27.866274]  ? ktime_get_ts64+0x86/0x230
[   27.866856]  kunit_try_run_case+0x1b3/0x490
[   27.867564]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.868194]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   27.868751]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   27.869475]  ? __kthread_parkme+0x82/0x160
[   27.870010]  ? preempt_count_sub+0x50/0x80
[   27.870409]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.870986]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   27.872148]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.872832]  kthread+0x257/0x310
[   27.873239]  ? __pfx_kthread+0x10/0x10
[   27.873704]  ret_from_fork+0x41/0x80
[   27.874200]  ? __pfx_kthread+0x10/0x10
[   27.874696]  ret_from_fork_asm+0x1a/0x30
[   27.875176]  </TASK>
[   27.875962] 
[   27.876173] Allocated by task 273:
[   27.876574]  kasan_save_stack+0x3d/0x60
[   27.877072]  kasan_save_track+0x18/0x40
[   27.877523]  kasan_save_alloc_info+0x3b/0x50
[   27.878096]  __kasan_kmalloc+0xb7/0xc0
[   27.878652]  __kmalloc_cache_noprof+0x184/0x410
[   27.879057]  kasan_atomics+0x96/0x310
[   27.879667]  kunit_try_run_case+0x1b3/0x490
[   27.880127]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.880718]  kthread+0x257/0x310
[   27.881201]  ret_from_fork+0x41/0x80
[   27.882595]  ret_from_fork_asm+0x1a/0x30
[   27.883188] 
[   27.883690] The buggy address belongs to the object at ffff888101afb700
[   27.883690]  which belongs to the cache kmalloc-64 of size 64
[   27.885100] The buggy address is located 0 bytes to the right of
[   27.885100]  allocated 48-byte region [ffff888101afb700, ffff888101afb730)
[   27.886308] 
[   27.886799] The buggy address belongs to the physical page:
[   27.887430] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101afb
[   27.888563] flags: 0x200000000000000(node=0|zone=2)
[   27.889749] page_type: f5(slab)
[   27.890770] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   27.891600] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   27.892435] page dumped because: kasan: bad access detected
[   27.893095] 
[   27.893374] Memory state around the buggy address:
[   27.894634]  ffff888101afb600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.895348]  ffff888101afb680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.896196] >ffff888101afb700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   27.896902]                                      ^
[   27.897483]  ffff888101afb780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.898243]  ffff888101afb800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.899089] ==================================================================
[   29.614854] ==================================================================
[   29.616135] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1b23/0x5450
[   29.617141] Write of size 8 at addr ffff888101afb730 by task kunit_try_catch/273
[   29.617782] 
[   29.618083] CPU: 0 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241204 #1
[   29.619460] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.619805] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   29.621125] Call Trace:
[   29.621545]  <TASK>
[   29.621799]  dump_stack_lvl+0x73/0xb0
[   29.622149]  print_report+0xd1/0x640
[   29.622695]  ? __virt_addr_valid+0x1db/0x2d0
[   29.623468]  ? kasan_complete_mode_report_info+0x2a/0x200
[   29.623953]  kasan_report+0x102/0x140
[   29.624744]  ? kasan_atomics_helper+0x1b23/0x5450
[   29.625366]  ? kasan_atomics_helper+0x1b23/0x5450
[   29.625920]  kasan_check_range+0x10c/0x1c0
[   29.626744]  __kasan_check_write+0x18/0x20
[   29.627481]  kasan_atomics_helper+0x1b23/0x5450
[   29.628428]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   29.628896]  ? __kmalloc_cache_noprof+0x184/0x410
[   29.629971]  ? __schedule+0xc3e/0x2790
[   29.630397]  ? finish_task_switch.isra.0+0x153/0x700
[   29.630919]  ? kasan_atomics+0x153/0x310
[   29.631701]  kasan_atomics+0x1dd/0x310
[   29.632580]  ? __pfx_kasan_atomics+0x10/0x10
[   29.633412]  ? __pfx_read_tsc+0x10/0x10
[   29.633943]  ? ktime_get_ts64+0x86/0x230
[   29.634770]  kunit_try_run_case+0x1b3/0x490
[   29.635644]  ? __pfx_kunit_try_run_case+0x10/0x10
[   29.636218]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   29.636810]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   29.637442]  ? __kthread_parkme+0x82/0x160
[   29.637856]  ? preempt_count_sub+0x50/0x80
[   29.638739]  ? __pfx_kunit_try_run_case+0x10/0x10
[   29.639319]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   29.640388]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   29.640947]  kthread+0x257/0x310
[   29.641661]  ? __pfx_kthread+0x10/0x10
[   29.642088]  ret_from_fork+0x41/0x80
[   29.642645]  ? __pfx_kthread+0x10/0x10
[   29.642996]  ret_from_fork_asm+0x1a/0x30
[   29.643890]  </TASK>
[   29.644407] 
[   29.644691] Allocated by task 273:
[   29.644984]  kasan_save_stack+0x3d/0x60
[   29.645538]  kasan_save_track+0x18/0x40
[   29.645937]  kasan_save_alloc_info+0x3b/0x50
[   29.647057]  __kasan_kmalloc+0xb7/0xc0
[   29.647588]  __kmalloc_cache_noprof+0x184/0x410
[   29.648276]  kasan_atomics+0x96/0x310
[   29.648916]  kunit_try_run_case+0x1b3/0x490
[   29.649696]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   29.650481]  kthread+0x257/0x310
[   29.651134]  ret_from_fork+0x41/0x80
[   29.651655]  ret_from_fork_asm+0x1a/0x30
[   29.652120] 
[   29.652333] The buggy address belongs to the object at ffff888101afb700
[   29.652333]  which belongs to the cache kmalloc-64 of size 64
[   29.653961] The buggy address is located 0 bytes to the right of
[   29.653961]  allocated 48-byte region [ffff888101afb700, ffff888101afb730)
[   29.655238] 
[   29.655508] The buggy address belongs to the physical page:
[   29.656376] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101afb
[   29.656883] flags: 0x200000000000000(node=0|zone=2)
[   29.657813] page_type: f5(slab)
[   29.658475] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   29.659285] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   29.659978] page dumped because: kasan: bad access detected
[   29.660469] 
[   29.661476] Memory state around the buggy address:
[   29.661813]  ffff888101afb600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.662824]  ffff888101afb680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.663645] >ffff888101afb700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   29.664654]                                      ^
[   29.665992]  ffff888101afb780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.666516]  ffff888101afb800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.667573] ==================================================================
[   28.801661] ==================================================================
[   28.802362] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x49ea/0x5450
[   28.803357] Read of size 4 at addr ffff888101afb730 by task kunit_try_catch/273
[   28.803982] 
[   28.804288] CPU: 0 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241204 #1
[   28.805459] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.805847] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   28.806714] Call Trace:
[   28.807145]  <TASK>
[   28.807460]  dump_stack_lvl+0x73/0xb0
[   28.807948]  print_report+0xd1/0x640
[   28.808824]  ? __virt_addr_valid+0x1db/0x2d0
[   28.809379]  ? kasan_complete_mode_report_info+0x2a/0x200
[   28.810517]  kasan_report+0x102/0x140
[   28.811030]  ? kasan_atomics_helper+0x49ea/0x5450
[   28.811413]  ? kasan_atomics_helper+0x49ea/0x5450
[   28.811988]  __asan_report_load4_noabort+0x18/0x20
[   28.812673]  kasan_atomics_helper+0x49ea/0x5450
[   28.813343]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   28.813888]  ? __kmalloc_cache_noprof+0x184/0x410
[   28.814692]  ? __schedule+0xc3e/0x2790
[   28.815020]  ? finish_task_switch.isra.0+0x153/0x700
[   28.815663]  ? kasan_atomics+0x153/0x310
[   28.816099]  kasan_atomics+0x1dd/0x310
[   28.816705]  ? __pfx_kasan_atomics+0x10/0x10
[   28.817149]  ? __pfx_read_tsc+0x10/0x10
[   28.817844]  ? ktime_get_ts64+0x86/0x230
[   28.818370]  kunit_try_run_case+0x1b3/0x490
[   28.818905]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.819309]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   28.819749]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   28.820363]  ? __kthread_parkme+0x82/0x160
[   28.820797]  ? preempt_count_sub+0x50/0x80
[   28.821101]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.821814]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   28.822389]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.822885]  kthread+0x257/0x310
[   28.823421]  ? __pfx_kthread+0x10/0x10
[   28.824008]  ret_from_fork+0x41/0x80
[   28.824644]  ? __pfx_kthread+0x10/0x10
[   28.824996]  ret_from_fork_asm+0x1a/0x30
[   28.825641]  </TASK>
[   28.826063] 
[   28.826260] Allocated by task 273:
[   28.826743]  kasan_save_stack+0x3d/0x60
[   28.827183]  kasan_save_track+0x18/0x40
[   28.827618]  kasan_save_alloc_info+0x3b/0x50
[   28.828204]  __kasan_kmalloc+0xb7/0xc0
[   28.828732]  __kmalloc_cache_noprof+0x184/0x410
[   28.829239]  kasan_atomics+0x96/0x310
[   28.829710]  kunit_try_run_case+0x1b3/0x490
[   28.830334]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.830712]  kthread+0x257/0x310
[   28.831340]  ret_from_fork+0x41/0x80
[   28.831942]  ret_from_fork_asm+0x1a/0x30
[   28.832402] 
[   28.832666] The buggy address belongs to the object at ffff888101afb700
[   28.832666]  which belongs to the cache kmalloc-64 of size 64
[   28.833755] The buggy address is located 0 bytes to the right of
[   28.833755]  allocated 48-byte region [ffff888101afb700, ffff888101afb730)
[   28.835013] 
[   28.835236] The buggy address belongs to the physical page:
[   28.835844] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101afb
[   28.836657] flags: 0x200000000000000(node=0|zone=2)
[   28.837219] page_type: f5(slab)
[   28.837662] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   28.838347] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   28.838940] page dumped because: kasan: bad access detected
[   28.839684] 
[   28.840175] Memory state around the buggy address:
[   28.840757]  ffff888101afb600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.841747]  ffff888101afb680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.842571] >ffff888101afb700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   28.843142]                                      ^
[   28.843740]  ffff888101afb780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.844574]  ffff888101afb800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.845406] ==================================================================
[   28.898752] ==================================================================
[   28.899346] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x49d0/0x5450
[   28.900791] Read of size 4 at addr ffff888101afb730 by task kunit_try_catch/273
[   28.902200] 
[   28.902999] CPU: 0 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241204 #1
[   28.905480] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.906273] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   28.907262] Call Trace:
[   28.907527]  <TASK>
[   28.907877]  dump_stack_lvl+0x73/0xb0
[   28.908318]  print_report+0xd1/0x640
[   28.909019]  ? __virt_addr_valid+0x1db/0x2d0
[   28.909528]  ? kasan_complete_mode_report_info+0x2a/0x200
[   28.910955]  kasan_report+0x102/0x140
[   28.911713]  ? kasan_atomics_helper+0x49d0/0x5450
[   28.912212]  ? kasan_atomics_helper+0x49d0/0x5450
[   28.912735]  __asan_report_load4_noabort+0x18/0x20
[   28.913545]  kasan_atomics_helper+0x49d0/0x5450
[   28.914150]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   28.914673]  ? __kmalloc_cache_noprof+0x184/0x410
[   28.915735]  ? __schedule+0xc3e/0x2790
[   28.916885]  ? finish_task_switch.isra.0+0x153/0x700
[   28.917559]  ? kasan_atomics+0x153/0x310
[   28.917774]  kasan_atomics+0x1dd/0x310
[   28.918210]  ? __pfx_kasan_atomics+0x10/0x10
[   28.919161]  ? __pfx_read_tsc+0x10/0x10
[   28.919661]  ? ktime_get_ts64+0x86/0x230
[   28.920119]  kunit_try_run_case+0x1b3/0x490
[   28.920917]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.921528]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   28.922260]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   28.922910]  ? __kthread_parkme+0x82/0x160
[   28.923504]  ? preempt_count_sub+0x50/0x80
[   28.924178]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.924607]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   28.925588]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.926349]  kthread+0x257/0x310
[   28.926830]  ? __pfx_kthread+0x10/0x10
[   28.927224]  ret_from_fork+0x41/0x80
[   28.927889]  ? __pfx_kthread+0x10/0x10
[   28.928298]  ret_from_fork_asm+0x1a/0x30
[   28.929105]  </TASK>
[   28.929332] 
[   28.929629] Allocated by task 273:
[   28.930092]  kasan_save_stack+0x3d/0x60
[   28.930628]  kasan_save_track+0x18/0x40
[   28.931061]  kasan_save_alloc_info+0x3b/0x50
[   28.931797]  __kasan_kmalloc+0xb7/0xc0
[   28.932247]  __kmalloc_cache_noprof+0x184/0x410
[   28.932858]  kasan_atomics+0x96/0x310
[   28.933471]  kunit_try_run_case+0x1b3/0x490
[   28.933844]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.934657]  kthread+0x257/0x310
[   28.934997]  ret_from_fork+0x41/0x80
[   28.935663]  ret_from_fork_asm+0x1a/0x30
[   28.936062] 
[   28.936284] The buggy address belongs to the object at ffff888101afb700
[   28.936284]  which belongs to the cache kmalloc-64 of size 64
[   28.937896] The buggy address is located 0 bytes to the right of
[   28.937896]  allocated 48-byte region [ffff888101afb700, ffff888101afb730)
[   28.939820] 
[   28.940036] The buggy address belongs to the physical page:
[   28.940596] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101afb
[   28.941635] flags: 0x200000000000000(node=0|zone=2)
[   28.942170] page_type: f5(slab)
[   28.942786] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   28.943410] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   28.944482] page dumped because: kasan: bad access detected
[   28.945110] 
[   28.945413] Memory state around the buggy address:
[   28.945960]  ffff888101afb600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.946899]  ffff888101afb680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.947635] >ffff888101afb700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   28.948433]                                      ^
[   28.948883]  ffff888101afb780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.949693]  ffff888101afb800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.950651] ==================================================================
[   28.665883] ==================================================================
[   28.667099] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1149/0x5450
[   28.667406] Write of size 4 at addr ffff888101afb730 by task kunit_try_catch/273
[   28.667721] 
[   28.667840] CPU: 0 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241204 #1
[   28.669416] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.670229] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   28.671396] Call Trace:
[   28.671807]  <TASK>
[   28.672097]  dump_stack_lvl+0x73/0xb0
[   28.672604]  print_report+0xd1/0x640
[   28.673063]  ? __virt_addr_valid+0x1db/0x2d0
[   28.673667]  ? kasan_complete_mode_report_info+0x2a/0x200
[   28.674192]  kasan_report+0x102/0x140
[   28.674695]  ? kasan_atomics_helper+0x1149/0x5450
[   28.675258]  ? kasan_atomics_helper+0x1149/0x5450
[   28.675708]  kasan_check_range+0x10c/0x1c0
[   28.676248]  __kasan_check_write+0x18/0x20
[   28.676703]  kasan_atomics_helper+0x1149/0x5450
[   28.677273]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   28.677901]  ? __kmalloc_cache_noprof+0x184/0x410
[   28.678319]  ? __schedule+0xc3e/0x2790
[   28.678896]  ? finish_task_switch.isra.0+0x153/0x700
[   28.679325]  ? kasan_atomics+0x153/0x310
[   28.679807]  kasan_atomics+0x1dd/0x310
[   28.680334]  ? __pfx_kasan_atomics+0x10/0x10
[   28.680768]  ? __pfx_read_tsc+0x10/0x10
[   28.681332]  ? ktime_get_ts64+0x86/0x230
[   28.681732]  kunit_try_run_case+0x1b3/0x490
[   28.682308]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.682945]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   28.683315]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   28.683917]  ? __kthread_parkme+0x82/0x160
[   28.684463]  ? preempt_count_sub+0x50/0x80
[   28.684996]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.685624]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   28.686197]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.686837]  kthread+0x257/0x310
[   28.687301]  ? __pfx_kthread+0x10/0x10
[   28.687644]  ret_from_fork+0x41/0x80
[   28.688127]  ? __pfx_kthread+0x10/0x10
[   28.688623]  ret_from_fork_asm+0x1a/0x30
[   28.689175]  </TASK>
[   28.689454] 
[   28.689711] Allocated by task 273:
[   28.690172]  kasan_save_stack+0x3d/0x60
[   28.690568]  kasan_save_track+0x18/0x40
[   28.691098]  kasan_save_alloc_info+0x3b/0x50
[   28.691577]  __kasan_kmalloc+0xb7/0xc0
[   28.692028]  __kmalloc_cache_noprof+0x184/0x410
[   28.692612]  kasan_atomics+0x96/0x310
[   28.693100]  kunit_try_run_case+0x1b3/0x490
[   28.693647]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.694321]  kthread+0x257/0x310
[   28.694705]  ret_from_fork+0x41/0x80
[   28.695251]  ret_from_fork_asm+0x1a/0x30
[   28.695995] 
[   28.696342] The buggy address belongs to the object at ffff888101afb700
[   28.696342]  which belongs to the cache kmalloc-64 of size 64
[   28.697587] The buggy address is located 0 bytes to the right of
[   28.697587]  allocated 48-byte region [ffff888101afb700, ffff888101afb730)
[   28.698984] 
[   28.699236] The buggy address belongs to the physical page:
[   28.699973] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101afb
[   28.700916] flags: 0x200000000000000(node=0|zone=2)
[   28.701656] page_type: f5(slab)
[   28.702559] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   28.703296] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   28.703881] page dumped because: kasan: bad access detected
[   28.704243] 
[   28.704598] Memory state around the buggy address:
[   28.705193]  ffff888101afb600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.705907]  ffff888101afb680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.706620] >ffff888101afb700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   28.707281]                                      ^
[   28.707728]  ffff888101afb780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.708453]  ffff888101afb800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.709086] ==================================================================
[   27.145239] ==================================================================
[   27.146654] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4ba4/0x5450
[   27.148185] Write of size 4 at addr ffff888101afb730 by task kunit_try_catch/273
[   27.149741] 
[   27.150051] CPU: 0 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241204 #1
[   27.151547] Tainted: [B]=BAD_PAGE, [N]=TEST
[   27.152139] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   27.154115] Call Trace:
[   27.154926]  <TASK>
[   27.155475]  dump_stack_lvl+0x73/0xb0
[   27.156240]  print_report+0xd1/0x640
[   27.156682]  ? __virt_addr_valid+0x1db/0x2d0
[   27.157135]  ? kasan_complete_mode_report_info+0x2a/0x200
[   27.157665]  kasan_report+0x102/0x140
[   27.158082]  ? kasan_atomics_helper+0x4ba4/0x5450
[   27.159595]  ? kasan_atomics_helper+0x4ba4/0x5450
[   27.160436]  __asan_report_store4_noabort+0x1b/0x30
[   27.161358]  kasan_atomics_helper+0x4ba4/0x5450
[   27.162225]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   27.163124]  ? __kmalloc_cache_noprof+0x184/0x410
[   27.164201]  ? __schedule+0xc3e/0x2790
[   27.165062]  ? finish_task_switch.isra.0+0x153/0x700
[   27.166245]  ? kasan_atomics+0x153/0x310
[   27.166699]  kasan_atomics+0x1dd/0x310
[   27.167275]  ? __pfx_kasan_atomics+0x10/0x10
[   27.168018]  ? __pfx_read_tsc+0x10/0x10
[   27.168815]  ? ktime_get_ts64+0x86/0x230
[   27.169135]  kunit_try_run_case+0x1b3/0x490
[   27.169449]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.170885]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   27.171792]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   27.172779]  ? __kthread_parkme+0x82/0x160
[   27.173166]  ? preempt_count_sub+0x50/0x80
[   27.173796]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.175378]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   27.176630]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.177679]  kthread+0x257/0x310
[   27.178424]  ? __pfx_kthread+0x10/0x10
[   27.179201]  ret_from_fork+0x41/0x80
[   27.179633]  ? __pfx_kthread+0x10/0x10
[   27.180035]  ret_from_fork_asm+0x1a/0x30
[   27.180484]  </TASK>
[   27.180752] 
[   27.180968] Allocated by task 273:
[   27.182622]  kasan_save_stack+0x3d/0x60
[   27.183663]  kasan_save_track+0x18/0x40
[   27.184325]  kasan_save_alloc_info+0x3b/0x50
[   27.185618]  __kasan_kmalloc+0xb7/0xc0
[   27.186536]  __kmalloc_cache_noprof+0x184/0x410
[   27.187697]  kasan_atomics+0x96/0x310
[   27.188730]  kunit_try_run_case+0x1b3/0x490
[   27.189844]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.191365]  kthread+0x257/0x310
[   27.192098]  ret_from_fork+0x41/0x80
[   27.192879]  ret_from_fork_asm+0x1a/0x30
[   27.193484] 
[   27.193622] The buggy address belongs to the object at ffff888101afb700
[   27.193622]  which belongs to the cache kmalloc-64 of size 64
[   27.194590] The buggy address is located 0 bytes to the right of
[   27.194590]  allocated 48-byte region [ffff888101afb700, ffff888101afb730)
[   27.197171] 
[   27.197714] The buggy address belongs to the physical page:
[   27.198954] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101afb
[   27.200652] flags: 0x200000000000000(node=0|zone=2)
[   27.201702] page_type: f5(slab)
[   27.202372] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   27.203070] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   27.204781] page dumped because: kasan: bad access detected
[   27.205819] 
[   27.205966] Memory state around the buggy address:
[   27.206561]  ffff888101afb600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.207265]  ffff888101afb680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.208214] >ffff888101afb700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   27.208912]                                      ^
[   27.209252]  ffff888101afb780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.209934]  ffff888101afb800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.210608] ==================================================================
[   27.788644] ==================================================================
[   27.789234] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x7c8/0x5450
[   27.790456] Write of size 4 at addr ffff888101afb730 by task kunit_try_catch/273
[   27.791224] 
[   27.791587] CPU: 0 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241204 #1
[   27.793014] Tainted: [B]=BAD_PAGE, [N]=TEST
[   27.793328] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   27.794371] Call Trace:
[   27.794753]  <TASK>
[   27.795122]  dump_stack_lvl+0x73/0xb0
[   27.796607]  print_report+0xd1/0x640
[   27.797059]  ? __virt_addr_valid+0x1db/0x2d0
[   27.797614]  ? kasan_complete_mode_report_info+0x2a/0x200
[   27.798524]  kasan_report+0x102/0x140
[   27.799031]  ? kasan_atomics_helper+0x7c8/0x5450
[   27.799653]  ? kasan_atomics_helper+0x7c8/0x5450
[   27.800683]  kasan_check_range+0x10c/0x1c0
[   27.801736]  __kasan_check_write+0x18/0x20
[   27.802139]  kasan_atomics_helper+0x7c8/0x5450
[   27.802885]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   27.804090]  ? __kmalloc_cache_noprof+0x184/0x410
[   27.804756]  ? __schedule+0xc3e/0x2790
[   27.805250]  ? finish_task_switch.isra.0+0x153/0x700
[   27.806484]  ? kasan_atomics+0x153/0x310
[   27.807272]  kasan_atomics+0x1dd/0x310
[   27.807890]  ? __pfx_kasan_atomics+0x10/0x10
[   27.808413]  ? __pfx_read_tsc+0x10/0x10
[   27.809209]  ? ktime_get_ts64+0x86/0x230
[   27.809753]  kunit_try_run_case+0x1b3/0x490
[   27.810465]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.811078]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   27.812052]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   27.812618]  ? __kthread_parkme+0x82/0x160
[   27.813257]  ? preempt_count_sub+0x50/0x80
[   27.814038]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.814872]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   27.815502]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.816264]  kthread+0x257/0x310
[   27.816748]  ? __pfx_kthread+0x10/0x10
[   27.817394]  ret_from_fork+0x41/0x80
[   27.818363]  ? __pfx_kthread+0x10/0x10
[   27.819028]  ret_from_fork_asm+0x1a/0x30
[   27.819664]  </TASK>
[   27.820045] 
[   27.820531] Allocated by task 273:
[   27.820887]  kasan_save_stack+0x3d/0x60
[   27.821659]  kasan_save_track+0x18/0x40
[   27.822124]  kasan_save_alloc_info+0x3b/0x50
[   27.822942]  __kasan_kmalloc+0xb7/0xc0
[   27.823468]  __kmalloc_cache_noprof+0x184/0x410
[   27.824662]  kasan_atomics+0x96/0x310
[   27.825145]  kunit_try_run_case+0x1b3/0x490
[   27.825830]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.826667]  kthread+0x257/0x310
[   27.827326]  ret_from_fork+0x41/0x80
[   27.827721]  ret_from_fork_asm+0x1a/0x30
[   27.828567] 
[   27.828843] The buggy address belongs to the object at ffff888101afb700
[   27.828843]  which belongs to the cache kmalloc-64 of size 64
[   27.830538] The buggy address is located 0 bytes to the right of
[   27.830538]  allocated 48-byte region [ffff888101afb700, ffff888101afb730)
[   27.831900] 
[   27.832135] The buggy address belongs to the physical page:
[   27.832818] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101afb
[   27.833559] flags: 0x200000000000000(node=0|zone=2)
[   27.834611] page_type: f5(slab)
[   27.835390] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   27.836865] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   27.837576] page dumped because: kasan: bad access detected
[   27.838099] 
[   27.838305] Memory state around the buggy address:
[   27.838691]  ffff888101afb600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.840162]  ffff888101afb680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.841551] >ffff888101afb700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   27.841968]                                      ^
[   27.842459]  ffff888101afb780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.843125]  ffff888101afb800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.844138] ==================================================================
[   27.677180] ==================================================================
[   27.678877] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x698/0x5450
[   27.680403] Write of size 4 at addr ffff888101afb730 by task kunit_try_catch/273
[   27.681012] 
[   27.681683] CPU: 0 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241204 #1
[   27.683066] Tainted: [B]=BAD_PAGE, [N]=TEST
[   27.683313] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   27.684175] Call Trace:
[   27.684818]  <TASK>
[   27.685208]  dump_stack_lvl+0x73/0xb0
[   27.685747]  print_report+0xd1/0x640
[   27.686148]  ? __virt_addr_valid+0x1db/0x2d0
[   27.686612]  ? kasan_complete_mode_report_info+0x2a/0x200
[   27.687147]  kasan_report+0x102/0x140
[   27.687736]  ? kasan_atomics_helper+0x698/0x5450
[   27.688106]  ? kasan_atomics_helper+0x698/0x5450
[   27.689579]  kasan_check_range+0x10c/0x1c0
[   27.690505]  __kasan_check_write+0x18/0x20
[   27.691538]  kasan_atomics_helper+0x698/0x5450
[   27.691938]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   27.692722]  ? __kmalloc_cache_noprof+0x184/0x410
[   27.693867]  ? __schedule+0xc3e/0x2790
[   27.694243]  ? finish_task_switch.isra.0+0x153/0x700
[   27.695241]  ? kasan_atomics+0x153/0x310
[   27.696248]  kasan_atomics+0x1dd/0x310
[   27.696760]  ? __pfx_kasan_atomics+0x10/0x10
[   27.697322]  ? __pfx_read_tsc+0x10/0x10
[   27.697790]  ? ktime_get_ts64+0x86/0x230
[   27.698232]  kunit_try_run_case+0x1b3/0x490
[   27.698699]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.700731]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   27.701369]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   27.702036]  ? __kthread_parkme+0x82/0x160
[   27.702712]  ? preempt_count_sub+0x50/0x80
[   27.703532]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.703979]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   27.704866]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.705737]  kthread+0x257/0x310
[   27.706200]  ? __pfx_kthread+0x10/0x10
[   27.707044]  ret_from_fork+0x41/0x80
[   27.707628]  ? __pfx_kthread+0x10/0x10
[   27.708520]  ret_from_fork_asm+0x1a/0x30
[   27.709034]  </TASK>
[   27.709503] 
[   27.710277] Allocated by task 273:
[   27.710729]  kasan_save_stack+0x3d/0x60
[   27.711290]  kasan_save_track+0x18/0x40
[   27.712429]  kasan_save_alloc_info+0x3b/0x50
[   27.713008]  __kasan_kmalloc+0xb7/0xc0
[   27.713442]  __kmalloc_cache_noprof+0x184/0x410
[   27.713969]  kasan_atomics+0x96/0x310
[   27.714696]  kunit_try_run_case+0x1b3/0x490
[   27.715003]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.716322]  kthread+0x257/0x310
[   27.717207]  ret_from_fork+0x41/0x80
[   27.717522]  ret_from_fork_asm+0x1a/0x30
[   27.718578] 
[   27.718824] The buggy address belongs to the object at ffff888101afb700
[   27.718824]  which belongs to the cache kmalloc-64 of size 64
[   27.720881] The buggy address is located 0 bytes to the right of
[   27.720881]  allocated 48-byte region [ffff888101afb700, ffff888101afb730)
[   27.722116] 
[   27.722608] The buggy address belongs to the physical page:
[   27.723442] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101afb
[   27.724072] flags: 0x200000000000000(node=0|zone=2)
[   27.724789] page_type: f5(slab)
[   27.725728] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   27.727068] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   27.727746] page dumped because: kasan: bad access detected
[   27.728213] 
[   27.728635] Memory state around the buggy address:
[   27.729003]  ffff888101afb600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.729796]  ffff888101afb680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.730712] >ffff888101afb700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   27.731728]                                      ^
[   27.732363]  ffff888101afb780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.732878]  ffff888101afb800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.734090] ==================================================================
[   29.227726] ==================================================================
[   29.228252] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1650/0x5450
[   29.228708] Write of size 8 at addr ffff888101afb730 by task kunit_try_catch/273
[   29.230031] 
[   29.230865] CPU: 0 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241204 #1
[   29.232128] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.232564] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   29.233556] Call Trace:
[   29.234037]  <TASK>
[   29.234533]  dump_stack_lvl+0x73/0xb0
[   29.234939]  print_report+0xd1/0x640
[   29.235720]  ? __virt_addr_valid+0x1db/0x2d0
[   29.236385]  ? kasan_complete_mode_report_info+0x2a/0x200
[   29.237070]  kasan_report+0x102/0x140
[   29.237328]  ? kasan_atomics_helper+0x1650/0x5450
[   29.237651]  ? kasan_atomics_helper+0x1650/0x5450
[   29.238114]  kasan_check_range+0x10c/0x1c0
[   29.238541]  __kasan_check_write+0x18/0x20
[   29.238925]  kasan_atomics_helper+0x1650/0x5450
[   29.240148]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   29.240684]  ? __kmalloc_cache_noprof+0x184/0x410
[   29.241618]  ? __schedule+0xc3e/0x2790
[   29.241953]  ? finish_task_switch.isra.0+0x153/0x700
[   29.242844]  ? kasan_atomics+0x153/0x310
[   29.243862]  kasan_atomics+0x1dd/0x310
[   29.244526]  ? __pfx_kasan_atomics+0x10/0x10
[   29.244897]  ? __pfx_read_tsc+0x10/0x10
[   29.245860]  ? ktime_get_ts64+0x86/0x230
[   29.246561]  kunit_try_run_case+0x1b3/0x490
[   29.247199]  ? __pfx_kunit_try_run_case+0x10/0x10
[   29.247606]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   29.248545]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   29.249297]  ? __kthread_parkme+0x82/0x160
[   29.249695]  ? preempt_count_sub+0x50/0x80
[   29.250372]  ? __pfx_kunit_try_run_case+0x10/0x10
[   29.250829]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   29.251617]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   29.252419]  kthread+0x257/0x310
[   29.253165]  ? __pfx_kthread+0x10/0x10
[   29.253743]  ret_from_fork+0x41/0x80
[   29.253944]  ? __pfx_kthread+0x10/0x10
[   29.254751]  ret_from_fork_asm+0x1a/0x30
[   29.255683]  </TASK>
[   29.256205] 
[   29.256409] Allocated by task 273:
[   29.256761]  kasan_save_stack+0x3d/0x60
[   29.257940]  kasan_save_track+0x18/0x40
[   29.258322]  kasan_save_alloc_info+0x3b/0x50
[   29.258697]  __kasan_kmalloc+0xb7/0xc0
[   29.259107]  __kmalloc_cache_noprof+0x184/0x410
[   29.259631]  kasan_atomics+0x96/0x310
[   29.260346]  kunit_try_run_case+0x1b3/0x490
[   29.261109]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   29.261822]  kthread+0x257/0x310
[   29.262352]  ret_from_fork+0x41/0x80
[   29.263033]  ret_from_fork_asm+0x1a/0x30
[   29.263537] 
[   29.264022] The buggy address belongs to the object at ffff888101afb700
[   29.264022]  which belongs to the cache kmalloc-64 of size 64
[   29.265464] The buggy address is located 0 bytes to the right of
[   29.265464]  allocated 48-byte region [ffff888101afb700, ffff888101afb730)
[   29.266772] 
[   29.267163] The buggy address belongs to the physical page:
[   29.267978] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101afb
[   29.268916] flags: 0x200000000000000(node=0|zone=2)
[   29.269523] page_type: f5(slab)
[   29.270004] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   29.270586] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   29.271526] page dumped because: kasan: bad access detected
[   29.271966] 
[   29.272336] Memory state around the buggy address:
[   29.272792]  ffff888101afb600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.273575]  ffff888101afb680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.274627] >ffff888101afb700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   29.275206]                                      ^
[   29.275896]  ffff888101afb780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.276642]  ffff888101afb800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.277248] ==================================================================
[   28.418032] ==================================================================
[   28.418843] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf11/0x5450
[   28.420010] Write of size 4 at addr ffff888101afb730 by task kunit_try_catch/273
[   28.420645] 
[   28.420855] CPU: 0 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241204 #1
[   28.422628] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.423028] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   28.423845] Call Trace:
[   28.424707]  <TASK>
[   28.424963]  dump_stack_lvl+0x73/0xb0
[   28.425357]  print_report+0xd1/0x640
[   28.426066]  ? __virt_addr_valid+0x1db/0x2d0
[   28.426657]  ? kasan_complete_mode_report_info+0x2a/0x200
[   28.427385]  kasan_report+0x102/0x140
[   28.427791]  ? kasan_atomics_helper+0xf11/0x5450
[   28.428540]  ? kasan_atomics_helper+0xf11/0x5450
[   28.429043]  kasan_check_range+0x10c/0x1c0
[   28.429486]  __kasan_check_write+0x18/0x20
[   28.429867]  kasan_atomics_helper+0xf11/0x5450
[   28.430785]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   28.431186]  ? __kmalloc_cache_noprof+0x184/0x410
[   28.431893]  ? __schedule+0xc3e/0x2790
[   28.432492]  ? finish_task_switch.isra.0+0x153/0x700
[   28.433178]  ? kasan_atomics+0x153/0x310
[   28.433781]  kasan_atomics+0x1dd/0x310
[   28.434342]  ? __pfx_kasan_atomics+0x10/0x10
[   28.434779]  ? __pfx_read_tsc+0x10/0x10
[   28.435480]  ? ktime_get_ts64+0x86/0x230
[   28.436107]  kunit_try_run_case+0x1b3/0x490
[   28.436907]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.437304]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   28.437842]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   28.438597]  ? __kthread_parkme+0x82/0x160
[   28.439179]  ? preempt_count_sub+0x50/0x80
[   28.439588]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.440401]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   28.440926]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.441709]  kthread+0x257/0x310
[   28.442309]  ? __pfx_kthread+0x10/0x10
[   28.442665]  ret_from_fork+0x41/0x80
[   28.443507]  ? __pfx_kthread+0x10/0x10
[   28.443879]  ret_from_fork_asm+0x1a/0x30
[   28.444588]  </TASK>
[   28.444834] 
[   28.445368] Allocated by task 273:
[   28.445793]  kasan_save_stack+0x3d/0x60
[   28.446489]  kasan_save_track+0x18/0x40
[   28.446921]  kasan_save_alloc_info+0x3b/0x50
[   28.447335]  __kasan_kmalloc+0xb7/0xc0
[   28.447705]  __kmalloc_cache_noprof+0x184/0x410
[   28.448800]  kasan_atomics+0x96/0x310
[   28.449180]  kunit_try_run_case+0x1b3/0x490
[   28.449676]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.450588]  kthread+0x257/0x310
[   28.451128]  ret_from_fork+0x41/0x80
[   28.451696]  ret_from_fork_asm+0x1a/0x30
[   28.452364] 
[   28.452585] The buggy address belongs to the object at ffff888101afb700
[   28.452585]  which belongs to the cache kmalloc-64 of size 64
[   28.454130] The buggy address is located 0 bytes to the right of
[   28.454130]  allocated 48-byte region [ffff888101afb700, ffff888101afb730)
[   28.455153] 
[   28.455809] The buggy address belongs to the physical page:
[   28.456400] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101afb
[   28.457233] flags: 0x200000000000000(node=0|zone=2)
[   28.457790] page_type: f5(slab)
[   28.458339] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   28.459520] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   28.459816] page dumped because: kasan: bad access detected
[   28.460793] 
[   28.461011] Memory state around the buggy address:
[   28.461516]  ffff888101afb600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.462165]  ffff888101afb680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.464029] >ffff888101afb700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   28.464700]                                      ^
[   28.465530]  ffff888101afb780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.466874]  ffff888101afb800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.467511] ==================================================================
[   29.278361] ==================================================================
[   29.279336] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x16e8/0x5450
[   29.279948] Write of size 8 at addr ffff888101afb730 by task kunit_try_catch/273
[   29.280774] 
[   29.281100] CPU: 0 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241204 #1
[   29.281542] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.282282] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   29.283117] Call Trace:
[   29.283633]  <TASK>
[   29.284117]  dump_stack_lvl+0x73/0xb0
[   29.284679]  print_report+0xd1/0x640
[   29.285312]  ? __virt_addr_valid+0x1db/0x2d0
[   29.285994]  ? kasan_complete_mode_report_info+0x2a/0x200
[   29.286715]  kasan_report+0x102/0x140
[   29.287366]  ? kasan_atomics_helper+0x16e8/0x5450
[   29.287819]  ? kasan_atomics_helper+0x16e8/0x5450
[   29.288438]  kasan_check_range+0x10c/0x1c0
[   29.288991]  __kasan_check_write+0x18/0x20
[   29.289551]  kasan_atomics_helper+0x16e8/0x5450
[   29.290010]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   29.290714]  ? __kmalloc_cache_noprof+0x184/0x410
[   29.291175]  ? __schedule+0xc3e/0x2790
[   29.291740]  ? finish_task_switch.isra.0+0x153/0x700
[   29.292334]  ? kasan_atomics+0x153/0x310
[   29.292907]  kasan_atomics+0x1dd/0x310
[   29.293523]  ? __pfx_kasan_atomics+0x10/0x10
[   29.294158]  ? __pfx_read_tsc+0x10/0x10
[   29.294454]  ? ktime_get_ts64+0x86/0x230
[   29.295041]  kunit_try_run_case+0x1b3/0x490
[   29.295520]  ? __pfx_kunit_try_run_case+0x10/0x10
[   29.296169]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   29.296647]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   29.297189]  ? __kthread_parkme+0x82/0x160
[   29.297761]  ? preempt_count_sub+0x50/0x80
[   29.298189]  ? __pfx_kunit_try_run_case+0x10/0x10
[   29.298813]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   29.299381]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   29.300120]  kthread+0x257/0x310
[   29.300455]  ? __pfx_kthread+0x10/0x10
[   29.300937]  ret_from_fork+0x41/0x80
[   29.301342]  ? __pfx_kthread+0x10/0x10
[   29.301901]  ret_from_fork_asm+0x1a/0x30
[   29.302452]  </TASK>
[   29.302840] 
[   29.303077] Allocated by task 273:
[   29.303470]  kasan_save_stack+0x3d/0x60
[   29.303991]  kasan_save_track+0x18/0x40
[   29.304524]  kasan_save_alloc_info+0x3b/0x50
[   29.304855]  __kasan_kmalloc+0xb7/0xc0
[   29.305403]  __kmalloc_cache_noprof+0x184/0x410
[   29.305898]  kasan_atomics+0x96/0x310
[   29.306516]  kunit_try_run_case+0x1b3/0x490
[   29.306908]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   29.307562]  kthread+0x257/0x310
[   29.308099]  ret_from_fork+0x41/0x80
[   29.308432]  ret_from_fork_asm+0x1a/0x30
[   29.309070] 
[   29.309294] The buggy address belongs to the object at ffff888101afb700
[   29.309294]  which belongs to the cache kmalloc-64 of size 64
[   29.310548] The buggy address is located 0 bytes to the right of
[   29.310548]  allocated 48-byte region [ffff888101afb700, ffff888101afb730)
[   29.311664] 
[   29.311981] The buggy address belongs to the physical page:
[   29.312449] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101afb
[   29.313386] flags: 0x200000000000000(node=0|zone=2)
[   29.313996] page_type: f5(slab)
[   29.314445] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   29.315244] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   29.315755] page dumped because: kasan: bad access detected
[   29.316291] 
[   29.316655] Memory state around the buggy address:
[   29.317169]  ffff888101afb600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.317850]  ffff888101afb680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.318598] >ffff888101afb700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   29.319267]                                      ^
[   29.319737]  ffff888101afb780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.320430]  ffff888101afb800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.321134] ==================================================================
[   29.561907] ==================================================================
[   29.562699] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1a80/0x5450
[   29.563266] Write of size 8 at addr ffff888101afb730 by task kunit_try_catch/273
[   29.563917] 
[   29.564144] CPU: 0 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241204 #1
[   29.565197] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.566272] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   29.567794] Call Trace:
[   29.567945]  <TASK>
[   29.568326]  dump_stack_lvl+0x73/0xb0
[   29.568847]  print_report+0xd1/0x640
[   29.569328]  ? __virt_addr_valid+0x1db/0x2d0
[   29.569840]  ? kasan_complete_mode_report_info+0x2a/0x200
[   29.570302]  kasan_report+0x102/0x140
[   29.571331]  ? kasan_atomics_helper+0x1a80/0x5450
[   29.571790]  ? kasan_atomics_helper+0x1a80/0x5450
[   29.572768]  kasan_check_range+0x10c/0x1c0
[   29.573196]  __kasan_check_write+0x18/0x20
[   29.573619]  kasan_atomics_helper+0x1a80/0x5450
[   29.574580]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   29.574983]  ? __kmalloc_cache_noprof+0x184/0x410
[   29.576103]  ? __schedule+0xc3e/0x2790
[   29.576533]  ? finish_task_switch.isra.0+0x153/0x700
[   29.577212]  ? kasan_atomics+0x153/0x310
[   29.578072]  kasan_atomics+0x1dd/0x310
[   29.578461]  ? __pfx_kasan_atomics+0x10/0x10
[   29.578878]  ? __pfx_read_tsc+0x10/0x10
[   29.579258]  ? ktime_get_ts64+0x86/0x230
[   29.580428]  kunit_try_run_case+0x1b3/0x490
[   29.581247]  ? __pfx_kunit_try_run_case+0x10/0x10
[   29.581799]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   29.582104]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   29.582739]  ? __kthread_parkme+0x82/0x160
[   29.583253]  ? preempt_count_sub+0x50/0x80
[   29.583638]  ? __pfx_kunit_try_run_case+0x10/0x10
[   29.584228]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   29.584710]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   29.585477]  kthread+0x257/0x310
[   29.585793]  ? __pfx_kthread+0x10/0x10
[   29.586391]  ret_from_fork+0x41/0x80
[   29.586973]  ? __pfx_kthread+0x10/0x10
[   29.587864]  ret_from_fork_asm+0x1a/0x30
[   29.588263]  </TASK>
[   29.588746] 
[   29.589129] Allocated by task 273:
[   29.589658]  kasan_save_stack+0x3d/0x60
[   29.590049]  kasan_save_track+0x18/0x40
[   29.590572]  kasan_save_alloc_info+0x3b/0x50
[   29.591139]  __kasan_kmalloc+0xb7/0xc0
[   29.591819]  __kmalloc_cache_noprof+0x184/0x410
[   29.592482]  kasan_atomics+0x96/0x310
[   29.593235]  kunit_try_run_case+0x1b3/0x490
[   29.593875]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   29.594815]  kthread+0x257/0x310
[   29.595511]  ret_from_fork+0x41/0x80
[   29.596420]  ret_from_fork_asm+0x1a/0x30
[   29.596801] 
[   29.597037] The buggy address belongs to the object at ffff888101afb700
[   29.597037]  which belongs to the cache kmalloc-64 of size 64
[   29.598739] The buggy address is located 0 bytes to the right of
[   29.598739]  allocated 48-byte region [ffff888101afb700, ffff888101afb730)
[   29.600359] 
[   29.600632] The buggy address belongs to the physical page:
[   29.601602] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101afb
[   29.602982] flags: 0x200000000000000(node=0|zone=2)
[   29.603458] page_type: f5(slab)
[   29.604124] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   29.604789] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   29.605483] page dumped because: kasan: bad access detected
[   29.606535] 
[   29.606876] Memory state around the buggy address:
[   29.607691]  ffff888101afb600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.608770]  ffff888101afb680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.610173] >ffff888101afb700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   29.611219]                                      ^
[   29.611759]  ffff888101afb780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.612728]  ffff888101afb800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.613500] ==================================================================
[   29.852926] ==================================================================
[   29.854076] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1e13/0x5450
[   29.855170] Write of size 8 at addr ffff888101afb730 by task kunit_try_catch/273
[   29.856819] 
[   29.857346] CPU: 0 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241204 #1
[   29.859413] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.860303] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   29.861622] Call Trace:
[   29.862105]  <TASK>
[   29.862502]  dump_stack_lvl+0x73/0xb0
[   29.863170]  print_report+0xd1/0x640
[   29.863682]  ? __virt_addr_valid+0x1db/0x2d0
[   29.864097]  ? kasan_complete_mode_report_info+0x2a/0x200
[   29.864668]  kasan_report+0x102/0x140
[   29.864980]  ? kasan_atomics_helper+0x1e13/0x5450
[   29.865479]  ? kasan_atomics_helper+0x1e13/0x5450
[   29.865901]  kasan_check_range+0x10c/0x1c0
[   29.866513]  __kasan_check_write+0x18/0x20
[   29.866955]  kasan_atomics_helper+0x1e13/0x5450
[   29.867384]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   29.867893]  ? __kmalloc_cache_noprof+0x184/0x410
[   29.868394]  ? __schedule+0xc3e/0x2790
[   29.868853]  ? finish_task_switch.isra.0+0x153/0x700
[   29.869321]  ? kasan_atomics+0x153/0x310
[   29.869823]  kasan_atomics+0x1dd/0x310
[   29.870136]  ? __pfx_kasan_atomics+0x10/0x10
[   29.870703]  ? __pfx_read_tsc+0x10/0x10
[   29.871219]  ? ktime_get_ts64+0x86/0x230
[   29.871916]  kunit_try_run_case+0x1b3/0x490
[   29.872313]  ? __pfx_kunit_try_run_case+0x10/0x10
[   29.872717]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   29.873210]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   29.873598]  ? __kthread_parkme+0x82/0x160
[   29.873906]  ? preempt_count_sub+0x50/0x80
[   29.874834]  ? __pfx_kunit_try_run_case+0x10/0x10
[   29.875368]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   29.875786]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   29.876396]  kthread+0x257/0x310
[   29.876936]  ? __pfx_kthread+0x10/0x10
[   29.877394]  ret_from_fork+0x41/0x80
[   29.877727]  ? __pfx_kthread+0x10/0x10
[   29.878014]  ret_from_fork_asm+0x1a/0x30
[   29.878326]  </TASK>
[   29.878670] 
[   29.878932] Allocated by task 273:
[   29.879344]  kasan_save_stack+0x3d/0x60
[   29.879878]  kasan_save_track+0x18/0x40
[   29.880353]  kasan_save_alloc_info+0x3b/0x50
[   29.881050]  __kasan_kmalloc+0xb7/0xc0
[   29.881418]  __kmalloc_cache_noprof+0x184/0x410
[   29.881795]  kasan_atomics+0x96/0x310
[   29.882187]  kunit_try_run_case+0x1b3/0x490
[   29.882883]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   29.883313]  kthread+0x257/0x310
[   29.883596]  ret_from_fork+0x41/0x80
[   29.884054]  ret_from_fork_asm+0x1a/0x30
[   29.884662] 
[   29.884857] The buggy address belongs to the object at ffff888101afb700
[   29.884857]  which belongs to the cache kmalloc-64 of size 64
[   29.886153] The buggy address is located 0 bytes to the right of
[   29.886153]  allocated 48-byte region [ffff888101afb700, ffff888101afb730)
[   29.886895] 
[   29.887095] The buggy address belongs to the physical page:
[   29.887755] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101afb
[   29.888486] flags: 0x200000000000000(node=0|zone=2)
[   29.888962] page_type: f5(slab)
[   29.889368] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   29.889847] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   29.890668] page dumped because: kasan: bad access detected
[   29.891310] 
[   29.891586] Memory state around the buggy address:
[   29.892006]  ffff888101afb600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.892713]  ffff888101afb680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.893211] >ffff888101afb700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   29.893885]                                      ^
[   29.894337]  ffff888101afb780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.894771]  ffff888101afb800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.895233] ==================================================================
[   29.896521] ==================================================================
[   29.897497] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1eab/0x5450
[   29.898394] Write of size 8 at addr ffff888101afb730 by task kunit_try_catch/273
[   29.899257] 
[   29.899524] CPU: 0 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241204 #1
[   29.900292] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.900589] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   29.901638] Call Trace:
[   29.902028]  <TASK>
[   29.902322]  dump_stack_lvl+0x73/0xb0
[   29.902829]  print_report+0xd1/0x640
[   29.903301]  ? __virt_addr_valid+0x1db/0x2d0
[   29.903667]  ? kasan_complete_mode_report_info+0x2a/0x200
[   29.904246]  kasan_report+0x102/0x140
[   29.904678]  ? kasan_atomics_helper+0x1eab/0x5450
[   29.905188]  ? kasan_atomics_helper+0x1eab/0x5450
[   29.905536]  kasan_check_range+0x10c/0x1c0
[   29.905869]  __kasan_check_write+0x18/0x20
[   29.906223]  kasan_atomics_helper+0x1eab/0x5450
[   29.906569]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   29.907248]  ? __kmalloc_cache_noprof+0x184/0x410
[   29.907880]  ? __schedule+0xc3e/0x2790
[   29.908445]  ? finish_task_switch.isra.0+0x153/0x700
[   29.909055]  ? kasan_atomics+0x153/0x310
[   29.909599]  kasan_atomics+0x1dd/0x310
[   29.910132]  ? __pfx_kasan_atomics+0x10/0x10
[   29.910663]  ? __pfx_read_tsc+0x10/0x10
[   29.911154]  ? ktime_get_ts64+0x86/0x230
[   29.911516]  kunit_try_run_case+0x1b3/0x490
[   29.911860]  ? __pfx_kunit_try_run_case+0x10/0x10
[   29.912241]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   29.912595]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   29.913257]  ? __kthread_parkme+0x82/0x160
[   29.913809]  ? preempt_count_sub+0x50/0x80
[   29.914353]  ? __pfx_kunit_try_run_case+0x10/0x10
[   29.914937]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   29.915564]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   29.916159]  kthread+0x257/0x310
[   29.916468]  ? __pfx_kthread+0x10/0x10
[   29.916847]  ret_from_fork+0x41/0x80
[   29.917180]  ? __pfx_kthread+0x10/0x10
[   29.917465]  ret_from_fork_asm+0x1a/0x30
[   29.917820]  </TASK>
[   29.918064] 
[   29.918226] Allocated by task 273:
[   29.918474]  kasan_save_stack+0x3d/0x60
[   29.919031]  kasan_save_track+0x18/0x40
[   29.919533]  kasan_save_alloc_info+0x3b/0x50
[   29.920157]  __kasan_kmalloc+0xb7/0xc0
[   29.920666]  __kmalloc_cache_noprof+0x184/0x410
[   29.921264]  kasan_atomics+0x96/0x310
[   29.921740]  kunit_try_run_case+0x1b3/0x490
[   29.922303]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   29.922932]  kthread+0x257/0x310
[   29.923364]  ret_from_fork+0x41/0x80
[   29.924225]  ret_from_fork_asm+0x1a/0x30
[   29.925375] 
[   29.926025] The buggy address belongs to the object at ffff888101afb700
[   29.926025]  which belongs to the cache kmalloc-64 of size 64
[   29.927577] The buggy address is located 0 bytes to the right of
[   29.927577]  allocated 48-byte region [ffff888101afb700, ffff888101afb730)
[   29.929229] 
[   29.929413] The buggy address belongs to the physical page:
[   29.930329] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101afb
[   29.931990] flags: 0x200000000000000(node=0|zone=2)
[   29.932616] page_type: f5(slab)
[   29.932974] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   29.933726] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   29.934828] page dumped because: kasan: bad access detected
[   29.935910] 
[   29.936128] Memory state around the buggy address:
[   29.936594]  ffff888101afb600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.937369]  ffff888101afb680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.938362] >ffff888101afb700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   29.939121]                                      ^
[   29.939602]  ffff888101afb780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.940627]  ffff888101afb800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.940942] ==================================================================
[   28.368617] ==================================================================
[   28.369394] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xe79/0x5450
[   28.370101] Write of size 4 at addr ffff888101afb730 by task kunit_try_catch/273
[   28.370692] 
[   28.370962] CPU: 0 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241204 #1
[   28.371743] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.372295] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   28.373093] Call Trace:
[   28.373490]  <TASK>
[   28.373747]  dump_stack_lvl+0x73/0xb0
[   28.374269]  print_report+0xd1/0x640
[   28.374709]  ? __virt_addr_valid+0x1db/0x2d0
[   28.375189]  ? kasan_complete_mode_report_info+0x2a/0x200
[   28.375751]  kasan_report+0x102/0x140
[   28.376266]  ? kasan_atomics_helper+0xe79/0x5450
[   28.376747]  ? kasan_atomics_helper+0xe79/0x5450
[   28.377229]  kasan_check_range+0x10c/0x1c0
[   28.377684]  __kasan_check_write+0x18/0x20
[   28.378081]  kasan_atomics_helper+0xe79/0x5450
[   28.378596]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   28.379091]  ? __kmalloc_cache_noprof+0x184/0x410
[   28.379672]  ? __schedule+0xc3e/0x2790
[   28.380167]  ? finish_task_switch.isra.0+0x153/0x700
[   28.380550]  ? kasan_atomics+0x153/0x310
[   28.381124]  kasan_atomics+0x1dd/0x310
[   28.381583]  ? __pfx_kasan_atomics+0x10/0x10
[   28.383324]  ? __pfx_read_tsc+0x10/0x10
[   28.383731]  ? ktime_get_ts64+0x86/0x230
[   28.384257]  kunit_try_run_case+0x1b3/0x490
[   28.384710]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.385661]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   28.386081]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   28.386717]  ? __kthread_parkme+0x82/0x160
[   28.387208]  ? preempt_count_sub+0x50/0x80
[   28.388106]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.388655]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   28.389844]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.390428]  kthread+0x257/0x310
[   28.390720]  ? __pfx_kthread+0x10/0x10
[   28.391148]  ret_from_fork+0x41/0x80
[   28.391649]  ? __pfx_kthread+0x10/0x10
[   28.392064]  ret_from_fork_asm+0x1a/0x30
[   28.392572]  </TASK>
[   28.392838] 
[   28.393116] Allocated by task 273:
[   28.393385]  kasan_save_stack+0x3d/0x60
[   28.393970]  kasan_save_track+0x18/0x40
[   28.394642]  kasan_save_alloc_info+0x3b/0x50
[   28.395191]  __kasan_kmalloc+0xb7/0xc0
[   28.395747]  __kmalloc_cache_noprof+0x184/0x410
[   28.396069]  kasan_atomics+0x96/0x310
[   28.396891]  kunit_try_run_case+0x1b3/0x490
[   28.397368]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.397745]  kthread+0x257/0x310
[   28.398482]  ret_from_fork+0x41/0x80
[   28.399277]  ret_from_fork_asm+0x1a/0x30
[   28.399612] 
[   28.399795] The buggy address belongs to the object at ffff888101afb700
[   28.399795]  which belongs to the cache kmalloc-64 of size 64
[   28.401779] The buggy address is located 0 bytes to the right of
[   28.401779]  allocated 48-byte region [ffff888101afb700, ffff888101afb730)
[   28.403567] 
[   28.404032] The buggy address belongs to the physical page:
[   28.404576] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101afb
[   28.405292] flags: 0x200000000000000(node=0|zone=2)
[   28.406100] page_type: f5(slab)
[   28.406609] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   28.407562] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   28.408730] page dumped because: kasan: bad access detected
[   28.409426] 
[   28.410053] Memory state around the buggy address:
[   28.410661]  ffff888101afb600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.411936]  ffff888101afb680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.412700] >ffff888101afb700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   28.413799]                                      ^
[   28.414621]  ffff888101afb780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.415508]  ffff888101afb800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.416329] ==================================================================
[   27.502512] ==================================================================
[   27.503135] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b3c/0x5450
[   27.504182] Write of size 4 at addr ffff888101afb730 by task kunit_try_catch/273
[   27.505214] 
[   27.505671] CPU: 0 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241204 #1
[   27.506255] Tainted: [B]=BAD_PAGE, [N]=TEST
[   27.506789] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   27.508062] Call Trace:
[   27.508645]  <TASK>
[   27.509207]  dump_stack_lvl+0x73/0xb0
[   27.510039]  print_report+0xd1/0x640
[   27.511173]  ? __virt_addr_valid+0x1db/0x2d0
[   27.511827]  ? kasan_complete_mode_report_info+0x2a/0x200
[   27.512676]  kasan_report+0x102/0x140
[   27.513100]  ? kasan_atomics_helper+0x4b3c/0x5450
[   27.513684]  ? kasan_atomics_helper+0x4b3c/0x5450
[   27.514442]  __asan_report_store4_noabort+0x1b/0x30
[   27.514851]  kasan_atomics_helper+0x4b3c/0x5450
[   27.516013]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   27.516573]  ? __kmalloc_cache_noprof+0x184/0x410
[   27.517208]  ? __schedule+0xc3e/0x2790
[   27.517739]  ? finish_task_switch.isra.0+0x153/0x700
[   27.518513]  ? kasan_atomics+0x153/0x310
[   27.519022]  kasan_atomics+0x1dd/0x310
[   27.519630]  ? __pfx_kasan_atomics+0x10/0x10
[   27.520226]  ? __pfx_read_tsc+0x10/0x10
[   27.521266]  ? ktime_get_ts64+0x86/0x230
[   27.521695]  kunit_try_run_case+0x1b3/0x490
[   27.522426]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.523525]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   27.524556]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   27.525344]  ? __kthread_parkme+0x82/0x160
[   27.526090]  ? preempt_count_sub+0x50/0x80
[   27.526613]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.527056]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   27.528643]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.530197]  kthread+0x257/0x310
[   27.531085]  ? __pfx_kthread+0x10/0x10
[   27.532043]  ret_from_fork+0x41/0x80
[   27.533474]  ? __pfx_kthread+0x10/0x10
[   27.534060]  ret_from_fork_asm+0x1a/0x30
[   27.535179]  </TASK>
[   27.535388] 
[   27.535875] Allocated by task 273:
[   27.536179]  kasan_save_stack+0x3d/0x60
[   27.536497]  kasan_save_track+0x18/0x40
[   27.536782]  kasan_save_alloc_info+0x3b/0x50
[   27.538547]  __kasan_kmalloc+0xb7/0xc0
[   27.539205]  __kmalloc_cache_noprof+0x184/0x410
[   27.540387]  kasan_atomics+0x96/0x310
[   27.540734]  kunit_try_run_case+0x1b3/0x490
[   27.541575]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.542008]  kthread+0x257/0x310
[   27.542177]  ret_from_fork+0x41/0x80
[   27.542451]  ret_from_fork_asm+0x1a/0x30
[   27.543303] 
[   27.543578] The buggy address belongs to the object at ffff888101afb700
[   27.543578]  which belongs to the cache kmalloc-64 of size 64
[   27.545674] The buggy address is located 0 bytes to the right of
[   27.545674]  allocated 48-byte region [ffff888101afb700, ffff888101afb730)
[   27.547046] 
[   27.547150] The buggy address belongs to the physical page:
[   27.547468] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101afb
[   27.548778] flags: 0x200000000000000(node=0|zone=2)
[   27.549919] page_type: f5(slab)
[   27.550548] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   27.551804] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   27.552531] page dumped because: kasan: bad access detected
[   27.552752] 
[   27.553369] Memory state around the buggy address:
[   27.554246]  ffff888101afb600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.555468]  ffff888101afb680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.556270] >ffff888101afb700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   27.557186]                                      ^
[   27.557889]  ffff888101afb780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.559602]  ffff888101afb800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.560719] ==================================================================
[   28.131734] ==================================================================
[   28.132484] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xb6b/0x5450
[   28.133185] Write of size 4 at addr ffff888101afb730 by task kunit_try_catch/273
[   28.133743] 
[   28.134070] CPU: 0 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241204 #1
[   28.136216] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.136640] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   28.137720] Call Trace:
[   28.138425]  <TASK>
[   28.138680]  dump_stack_lvl+0x73/0xb0
[   28.139677]  print_report+0xd1/0x640
[   28.140302]  ? __virt_addr_valid+0x1db/0x2d0
[   28.140653]  ? kasan_complete_mode_report_info+0x2a/0x200
[   28.141372]  kasan_report+0x102/0x140
[   28.141708]  ? kasan_atomics_helper+0xb6b/0x5450
[   28.142336]  ? kasan_atomics_helper+0xb6b/0x5450
[   28.143336]  kasan_check_range+0x10c/0x1c0
[   28.144425]  __kasan_check_write+0x18/0x20
[   28.145002]  kasan_atomics_helper+0xb6b/0x5450
[   28.145668]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   28.146532]  ? __kmalloc_cache_noprof+0x184/0x410
[   28.146855]  ? __schedule+0xc3e/0x2790
[   28.147451]  ? finish_task_switch.isra.0+0x153/0x700
[   28.148427]  ? kasan_atomics+0x153/0x310
[   28.149139]  kasan_atomics+0x1dd/0x310
[   28.149344]  ? __pfx_kasan_atomics+0x10/0x10
[   28.149842]  ? __pfx_read_tsc+0x10/0x10
[   28.150370]  ? ktime_get_ts64+0x86/0x230
[   28.151097]  kunit_try_run_case+0x1b3/0x490
[   28.151483]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.152198]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   28.153032]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   28.153979]  ? __kthread_parkme+0x82/0x160
[   28.154307]  ? preempt_count_sub+0x50/0x80
[   28.155022]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.155372]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   28.156121]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.156775]  kthread+0x257/0x310
[   28.157122]  ? __pfx_kthread+0x10/0x10
[   28.157697]  ret_from_fork+0x41/0x80
[   28.158050]  ? __pfx_kthread+0x10/0x10
[   28.158436]  ret_from_fork_asm+0x1a/0x30
[   28.159111]  </TASK>
[   28.159348] 
[   28.159650] Allocated by task 273:
[   28.160044]  kasan_save_stack+0x3d/0x60
[   28.160491]  kasan_save_track+0x18/0x40
[   28.161078]  kasan_save_alloc_info+0x3b/0x50
[   28.161592]  __kasan_kmalloc+0xb7/0xc0
[   28.162121]  __kmalloc_cache_noprof+0x184/0x410
[   28.162597]  kasan_atomics+0x96/0x310
[   28.162989]  kunit_try_run_case+0x1b3/0x490
[   28.163569]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.164179]  kthread+0x257/0x310
[   28.164673]  ret_from_fork+0x41/0x80
[   28.165095]  ret_from_fork_asm+0x1a/0x30
[   28.165618] 
[   28.165845] The buggy address belongs to the object at ffff888101afb700
[   28.165845]  which belongs to the cache kmalloc-64 of size 64
[   28.166714] The buggy address is located 0 bytes to the right of
[   28.166714]  allocated 48-byte region [ffff888101afb700, ffff888101afb730)
[   28.167800] 
[   28.168021] The buggy address belongs to the physical page:
[   28.168559] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101afb
[   28.169560] flags: 0x200000000000000(node=0|zone=2)
[   28.170047] page_type: f5(slab)
[   28.170307] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   28.171292] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   28.172102] page dumped because: kasan: bad access detected
[   28.172572] 
[   28.172925] Memory state around the buggy address:
[   28.173310]  ffff888101afb600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.174065]  ffff888101afb680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.174702] >ffff888101afb700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   28.175358]                                      ^
[   28.175915]  ffff888101afb780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.176784]  ffff888101afb800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.177560] ==================================================================
[   30.037893] ==================================================================
[   30.038975] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x2007/0x5450
[   30.039891] Write of size 8 at addr ffff888101afb730 by task kunit_try_catch/273
[   30.040699] 
[   30.041030] CPU: 0 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241204 #1
[   30.041787] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.042381] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   30.043144] Call Trace:
[   30.043505]  <TASK>
[   30.043810]  dump_stack_lvl+0x73/0xb0
[   30.044111]  print_report+0xd1/0x640
[   30.044645]  ? __virt_addr_valid+0x1db/0x2d0
[   30.045321]  ? kasan_complete_mode_report_info+0x2a/0x200
[   30.045832]  kasan_report+0x102/0x140
[   30.046360]  ? kasan_atomics_helper+0x2007/0x5450
[   30.046983]  ? kasan_atomics_helper+0x2007/0x5450
[   30.047586]  kasan_check_range+0x10c/0x1c0
[   30.048064]  __kasan_check_write+0x18/0x20
[   30.048520]  kasan_atomics_helper+0x2007/0x5450
[   30.049095]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   30.049748]  ? __kmalloc_cache_noprof+0x184/0x410
[   30.050301]  ? __schedule+0xc3e/0x2790
[   30.050732]  ? finish_task_switch.isra.0+0x153/0x700
[   30.051119]  ? kasan_atomics+0x153/0x310
[   30.051429]  kasan_atomics+0x1dd/0x310
[   30.052031]  ? __pfx_kasan_atomics+0x10/0x10
[   30.052780]  ? __pfx_read_tsc+0x10/0x10
[   30.053363]  ? ktime_get_ts64+0x86/0x230
[   30.053948]  kunit_try_run_case+0x1b3/0x490
[   30.054473]  ? __pfx_kunit_try_run_case+0x10/0x10
[   30.054959]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   30.055499]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   30.057117]  ? __kthread_parkme+0x82/0x160
[   30.057492]  ? preempt_count_sub+0x50/0x80
[   30.058022]  ? __pfx_kunit_try_run_case+0x10/0x10
[   30.058574]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   30.059544]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   30.060203]  kthread+0x257/0x310
[   30.060860]  ? __pfx_kthread+0x10/0x10
[   30.061584]  ret_from_fork+0x41/0x80
[   30.062069]  ? __pfx_kthread+0x10/0x10
[   30.062816]  ret_from_fork_asm+0x1a/0x30
[   30.063646]  </TASK>
[   30.064264] 
[   30.064717] Allocated by task 273:
[   30.065102]  kasan_save_stack+0x3d/0x60
[   30.065309]  kasan_save_track+0x18/0x40
[   30.065491]  kasan_save_alloc_info+0x3b/0x50
[   30.065936]  __kasan_kmalloc+0xb7/0xc0
[   30.066599]  __kmalloc_cache_noprof+0x184/0x410
[   30.067362]  kasan_atomics+0x96/0x310
[   30.067934]  kunit_try_run_case+0x1b3/0x490
[   30.068535]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   30.070090]  kthread+0x257/0x310
[   30.070438]  ret_from_fork+0x41/0x80
[   30.071197]  ret_from_fork_asm+0x1a/0x30
[   30.071615] 
[   30.071784] The buggy address belongs to the object at ffff888101afb700
[   30.071784]  which belongs to the cache kmalloc-64 of size 64
[   30.073781] The buggy address is located 0 bytes to the right of
[   30.073781]  allocated 48-byte region [ffff888101afb700, ffff888101afb730)
[   30.076205] 
[   30.076437] The buggy address belongs to the physical page:
[   30.076984] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101afb
[   30.077748] flags: 0x200000000000000(node=0|zone=2)
[   30.079232] page_type: f5(slab)
[   30.079641] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   30.080181] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   30.081074] page dumped because: kasan: bad access detected
[   30.081649] 
[   30.081928] Memory state around the buggy address:
[   30.082386]  ffff888101afb600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   30.083191]  ffff888101afb680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   30.083793] >ffff888101afb700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   30.084509]                                      ^
[   30.085047]  ffff888101afb780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.085741]  ffff888101afb800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.086500] ==================================================================
[   27.272857] ==================================================================
[   27.273577] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b70/0x5450
[   27.274465] Write of size 4 at addr ffff888101afb730 by task kunit_try_catch/273
[   27.275215] 
[   27.275507] CPU: 0 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241204 #1
[   27.276428] Tainted: [B]=BAD_PAGE, [N]=TEST
[   27.277638] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   27.278812] Call Trace:
[   27.279088]  <TASK>
[   27.279493]  dump_stack_lvl+0x73/0xb0
[   27.279986]  print_report+0xd1/0x640
[   27.280485]  ? __virt_addr_valid+0x1db/0x2d0
[   27.281553]  ? kasan_complete_mode_report_info+0x2a/0x200
[   27.282153]  kasan_report+0x102/0x140
[   27.282778]  ? kasan_atomics_helper+0x4b70/0x5450
[   27.283106]  ? kasan_atomics_helper+0x4b70/0x5450
[   27.284005]  __asan_report_store4_noabort+0x1b/0x30
[   27.284565]  kasan_atomics_helper+0x4b70/0x5450
[   27.285177]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   27.285563]  ? __kmalloc_cache_noprof+0x184/0x410
[   27.286488]  ? __schedule+0xc3e/0x2790
[   27.286985]  ? finish_task_switch.isra.0+0x153/0x700
[   27.287563]  ? kasan_atomics+0x153/0x310
[   27.288270]  kasan_atomics+0x1dd/0x310
[   27.288675]  ? __pfx_kasan_atomics+0x10/0x10
[   27.288994]  ? __pfx_read_tsc+0x10/0x10
[   27.290365]  ? ktime_get_ts64+0x86/0x230
[   27.290903]  kunit_try_run_case+0x1b3/0x490
[   27.291629]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.291964]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   27.292510]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   27.293162]  ? __kthread_parkme+0x82/0x160
[   27.293698]  ? preempt_count_sub+0x50/0x80
[   27.293991]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.294716]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   27.295403]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.297089]  kthread+0x257/0x310
[   27.297810]  ? __pfx_kthread+0x10/0x10
[   27.298379]  ret_from_fork+0x41/0x80
[   27.298791]  ? __pfx_kthread+0x10/0x10
[   27.299876]  ret_from_fork_asm+0x1a/0x30
[   27.300476]  </TASK>
[   27.300693] 
[   27.300922] Allocated by task 273:
[   27.301258]  kasan_save_stack+0x3d/0x60
[   27.301921]  kasan_save_track+0x18/0x40
[   27.302553]  kasan_save_alloc_info+0x3b/0x50
[   27.302939]  __kasan_kmalloc+0xb7/0xc0
[   27.303219]  __kmalloc_cache_noprof+0x184/0x410
[   27.303900]  kasan_atomics+0x96/0x310
[   27.304440]  kunit_try_run_case+0x1b3/0x490
[   27.305505]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.305894]  kthread+0x257/0x310
[   27.306147]  ret_from_fork+0x41/0x80
[   27.306737]  ret_from_fork_asm+0x1a/0x30
[   27.307247] 
[   27.307505] The buggy address belongs to the object at ffff888101afb700
[   27.307505]  which belongs to the cache kmalloc-64 of size 64
[   27.308391] The buggy address is located 0 bytes to the right of
[   27.308391]  allocated 48-byte region [ffff888101afb700, ffff888101afb730)
[   27.309958] 
[   27.310166] The buggy address belongs to the physical page:
[   27.311275] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101afb
[   27.312111] flags: 0x200000000000000(node=0|zone=2)
[   27.312648] page_type: f5(slab)
[   27.312996] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   27.313483] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   27.314557] page dumped because: kasan: bad access detected
[   27.314902] 
[   27.315154] Memory state around the buggy address:
[   27.315702]  ffff888101afb600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.316348]  ffff888101afb680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.316837] >ffff888101afb700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   27.318425]                                      ^
[   27.318953]  ffff888101afb780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.319876]  ffff888101afb800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.320591] ==================================================================
[   30.179906] ==================================================================
[   30.180598] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4fb4/0x5450
[   30.181779] Read of size 8 at addr ffff888101afb730 by task kunit_try_catch/273
[   30.182503] 
[   30.182887] CPU: 0 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241204 #1
[   30.183834] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.184406] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   30.185176] Call Trace:
[   30.185601]  <TASK>
[   30.185861]  dump_stack_lvl+0x73/0xb0
[   30.186321]  print_report+0xd1/0x640
[   30.186867]  ? __virt_addr_valid+0x1db/0x2d0
[   30.187410]  ? kasan_complete_mode_report_info+0x2a/0x200
[   30.188055]  kasan_report+0x102/0x140
[   30.188517]  ? kasan_atomics_helper+0x4fb4/0x5450
[   30.188997]  ? kasan_atomics_helper+0x4fb4/0x5450
[   30.189623]  __asan_report_load8_noabort+0x18/0x20
[   30.190274]  kasan_atomics_helper+0x4fb4/0x5450
[   30.190688]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   30.191384]  ? __kmalloc_cache_noprof+0x184/0x410
[   30.191880]  ? __schedule+0xc3e/0x2790
[   30.192450]  ? finish_task_switch.isra.0+0x153/0x700
[   30.192897]  ? kasan_atomics+0x153/0x310
[   30.193400]  kasan_atomics+0x1dd/0x310
[   30.193965]  ? __pfx_kasan_atomics+0x10/0x10
[   30.194380]  ? __pfx_read_tsc+0x10/0x10
[   30.194959]  ? ktime_get_ts64+0x86/0x230
[   30.195392]  kunit_try_run_case+0x1b3/0x490
[   30.195989]  ? __pfx_kunit_try_run_case+0x10/0x10
[   30.196501]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   30.197063]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   30.197631]  ? __kthread_parkme+0x82/0x160
[   30.198230]  ? preempt_count_sub+0x50/0x80
[   30.198757]  ? __pfx_kunit_try_run_case+0x10/0x10
[   30.199281]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   30.199938]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   30.200490]  kthread+0x257/0x310
[   30.200953]  ? __pfx_kthread+0x10/0x10
[   30.201371]  ret_from_fork+0x41/0x80
[   30.201857]  ? __pfx_kthread+0x10/0x10
[   30.202327]  ret_from_fork_asm+0x1a/0x30
[   30.202895]  </TASK>
[   30.203310] 
[   30.203525] Allocated by task 273:
[   30.203966]  kasan_save_stack+0x3d/0x60
[   30.204500]  kasan_save_track+0x18/0x40
[   30.204871]  kasan_save_alloc_info+0x3b/0x50
[   30.205330]  __kasan_kmalloc+0xb7/0xc0
[   30.205901]  __kmalloc_cache_noprof+0x184/0x410
[   30.206342]  kasan_atomics+0x96/0x310
[   30.206902]  kunit_try_run_case+0x1b3/0x490
[   30.207472]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   30.208108]  kthread+0x257/0x310
[   30.208560]  ret_from_fork+0x41/0x80
[   30.209099]  ret_from_fork_asm+0x1a/0x30
[   30.209635] 
[   30.209905] The buggy address belongs to the object at ffff888101afb700
[   30.209905]  which belongs to the cache kmalloc-64 of size 64
[   30.210962] The buggy address is located 0 bytes to the right of
[   30.210962]  allocated 48-byte region [ffff888101afb700, ffff888101afb730)
[   30.212223] 
[   30.212517] The buggy address belongs to the physical page:
[   30.213078] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101afb
[   30.213819] flags: 0x200000000000000(node=0|zone=2)
[   30.214458] page_type: f5(slab)
[   30.214845] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   30.215635] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   30.216303] page dumped because: kasan: bad access detected
[   30.216878] 
[   30.217085] Memory state around the buggy address:
[   30.217522]  ffff888101afb600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   30.218255]  ffff888101afb680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   30.218933] >ffff888101afb700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   30.219513]                                      ^
[   30.220177]  ffff888101afb780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.220779]  ffff888101afb800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.221511] ==================================================================
[   29.512603] ==================================================================
[   29.513403] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x19e4/0x5450
[   29.514484] Write of size 8 at addr ffff888101afb730 by task kunit_try_catch/273
[   29.516182] 
[   29.516419] CPU: 0 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241204 #1
[   29.517800] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.518404] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   29.519346] Call Trace:
[   29.519874]  <TASK>
[   29.520582]  dump_stack_lvl+0x73/0xb0
[   29.520937]  print_report+0xd1/0x640
[   29.521404]  ? __virt_addr_valid+0x1db/0x2d0
[   29.521870]  ? kasan_complete_mode_report_info+0x2a/0x200
[   29.523199]  kasan_report+0x102/0x140
[   29.523761]  ? kasan_atomics_helper+0x19e4/0x5450
[   29.524534]  ? kasan_atomics_helper+0x19e4/0x5450
[   29.524965]  kasan_check_range+0x10c/0x1c0
[   29.525378]  __kasan_check_write+0x18/0x20
[   29.525781]  kasan_atomics_helper+0x19e4/0x5450
[   29.526908]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   29.527361]  ? __kmalloc_cache_noprof+0x184/0x410
[   29.528073]  ? __schedule+0xc3e/0x2790
[   29.528476]  ? finish_task_switch.isra.0+0x153/0x700
[   29.529008]  ? kasan_atomics+0x153/0x310
[   29.529436]  kasan_atomics+0x1dd/0x310
[   29.530585]  ? __pfx_kasan_atomics+0x10/0x10
[   29.531265]  ? __pfx_read_tsc+0x10/0x10
[   29.531805]  ? ktime_get_ts64+0x86/0x230
[   29.532506]  kunit_try_run_case+0x1b3/0x490
[   29.533179]  ? __pfx_kunit_try_run_case+0x10/0x10
[   29.533883]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   29.534435]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   29.535591]  ? __kthread_parkme+0x82/0x160
[   29.535997]  ? preempt_count_sub+0x50/0x80
[   29.536567]  ? __pfx_kunit_try_run_case+0x10/0x10
[   29.537010]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   29.538260]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   29.538891]  kthread+0x257/0x310
[   29.539630]  ? __pfx_kthread+0x10/0x10
[   29.539825]  ret_from_fork+0x41/0x80
[   29.540170]  ? __pfx_kthread+0x10/0x10
[   29.540548]  ret_from_fork_asm+0x1a/0x30
[   29.541016]  </TASK>
[   29.541352] 
[   29.541594] Allocated by task 273:
[   29.542047]  kasan_save_stack+0x3d/0x60
[   29.542472]  kasan_save_track+0x18/0x40
[   29.543162]  kasan_save_alloc_info+0x3b/0x50
[   29.543751]  __kasan_kmalloc+0xb7/0xc0
[   29.544252]  __kmalloc_cache_noprof+0x184/0x410
[   29.544788]  kasan_atomics+0x96/0x310
[   29.545235]  kunit_try_run_case+0x1b3/0x490
[   29.545780]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   29.546369]  kthread+0x257/0x310
[   29.546787]  ret_from_fork+0x41/0x80
[   29.547236]  ret_from_fork_asm+0x1a/0x30
[   29.547725] 
[   29.548078] The buggy address belongs to the object at ffff888101afb700
[   29.548078]  which belongs to the cache kmalloc-64 of size 64
[   29.549135] The buggy address is located 0 bytes to the right of
[   29.549135]  allocated 48-byte region [ffff888101afb700, ffff888101afb730)
[   29.550345] 
[   29.550597] The buggy address belongs to the physical page:
[   29.551270] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101afb
[   29.552160] flags: 0x200000000000000(node=0|zone=2)
[   29.552652] page_type: f5(slab)
[   29.553152] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   29.553816] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   29.554604] page dumped because: kasan: bad access detected
[   29.555135] 
[   29.555415] Memory state around the buggy address:
[   29.555985]  ffff888101afb600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.556617]  ffff888101afb680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.557383] >ffff888101afb700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   29.558147]                                      ^
[   29.558614]  ffff888101afb780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.559407]  ffff888101afb800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.559925] ==================================================================
[   28.469826] ==================================================================
[   28.471468] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xfaa/0x5450
[   28.472281] Write of size 4 at addr ffff888101afb730 by task kunit_try_catch/273
[   28.472960] 
[   28.473252] CPU: 0 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241204 #1
[   28.474121] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.474635] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   28.475555] Call Trace:
[   28.475781]  <TASK>
[   28.476226]  dump_stack_lvl+0x73/0xb0
[   28.476900]  print_report+0xd1/0x640
[   28.477478]  ? __virt_addr_valid+0x1db/0x2d0
[   28.477996]  ? kasan_complete_mode_report_info+0x2a/0x200
[   28.478785]  kasan_report+0x102/0x140
[   28.479321]  ? kasan_atomics_helper+0xfaa/0x5450
[   28.479997]  ? kasan_atomics_helper+0xfaa/0x5450
[   28.480556]  kasan_check_range+0x10c/0x1c0
[   28.481111]  __kasan_check_write+0x18/0x20
[   28.481581]  kasan_atomics_helper+0xfaa/0x5450
[   28.482228]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   28.482728]  ? __kmalloc_cache_noprof+0x184/0x410
[   28.483383]  ? __schedule+0xc3e/0x2790
[   28.483919]  ? finish_task_switch.isra.0+0x153/0x700
[   28.484476]  ? kasan_atomics+0x153/0x310
[   28.485177]  kasan_atomics+0x1dd/0x310
[   28.485731]  ? __pfx_kasan_atomics+0x10/0x10
[   28.486372]  ? __pfx_read_tsc+0x10/0x10
[   28.486986]  ? ktime_get_ts64+0x86/0x230
[   28.487539]  kunit_try_run_case+0x1b3/0x490
[   28.488112]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.488596]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   28.489299]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   28.490024]  ? __kthread_parkme+0x82/0x160
[   28.490593]  ? preempt_count_sub+0x50/0x80
[   28.491158]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.491698]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   28.492438]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.493015]  kthread+0x257/0x310
[   28.493337]  ? __pfx_kthread+0x10/0x10
[   28.494006]  ret_from_fork+0x41/0x80
[   28.494571]  ? __pfx_kthread+0x10/0x10
[   28.495072]  ret_from_fork_asm+0x1a/0x30
[   28.495493]  </TASK>
[   28.495985] 
[   28.496177] Allocated by task 273:
[   28.496733]  kasan_save_stack+0x3d/0x60
[   28.497293]  kasan_save_track+0x18/0x40
[   28.497655]  kasan_save_alloc_info+0x3b/0x50
[   28.498186]  __kasan_kmalloc+0xb7/0xc0
[   28.498623]  __kmalloc_cache_noprof+0x184/0x410
[   28.499060]  kasan_atomics+0x96/0x310
[   28.499816]  kunit_try_run_case+0x1b3/0x490
[   28.500398]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.501351]  kthread+0x257/0x310
[   28.501745]  ret_from_fork+0x41/0x80
[   28.502263]  ret_from_fork_asm+0x1a/0x30
[   28.503509] 
[   28.503712] The buggy address belongs to the object at ffff888101afb700
[   28.503712]  which belongs to the cache kmalloc-64 of size 64
[   28.505211] The buggy address is located 0 bytes to the right of
[   28.505211]  allocated 48-byte region [ffff888101afb700, ffff888101afb730)
[   28.506614] 
[   28.506861] The buggy address belongs to the physical page:
[   28.507448] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101afb
[   28.508575] flags: 0x200000000000000(node=0|zone=2)
[   28.509252] page_type: f5(slab)
[   28.509678] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   28.511249] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   28.511893] page dumped because: kasan: bad access detected
[   28.512679] 
[   28.513285] Memory state around the buggy address:
[   28.513943]  ffff888101afb600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.515318]  ffff888101afb680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.516339] >ffff888101afb700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   28.517148]                                      ^
[   28.517475]  ffff888101afb780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.518485]  ffff888101afb800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.519218] ==================================================================
[   30.134790] ==================================================================
[   30.136372] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x20c9/0x5450
[   30.137398] Write of size 8 at addr ffff888101afb730 by task kunit_try_catch/273
[   30.138933] 
[   30.139438] CPU: 0 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241204 #1
[   30.140693] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.140883] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   30.141795] Call Trace:
[   30.142118]  <TASK>
[   30.142392]  dump_stack_lvl+0x73/0xb0
[   30.142826]  print_report+0xd1/0x640
[   30.143302]  ? __virt_addr_valid+0x1db/0x2d0
[   30.143902]  ? kasan_complete_mode_report_info+0x2a/0x200
[   30.144504]  kasan_report+0x102/0x140
[   30.145169]  ? kasan_atomics_helper+0x20c9/0x5450
[   30.145647]  ? kasan_atomics_helper+0x20c9/0x5450
[   30.146305]  kasan_check_range+0x10c/0x1c0
[   30.146845]  __kasan_check_write+0x18/0x20
[   30.147326]  kasan_atomics_helper+0x20c9/0x5450
[   30.147854]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   30.148489]  ? __kmalloc_cache_noprof+0x184/0x410
[   30.149151]  ? __schedule+0xc3e/0x2790
[   30.149672]  ? finish_task_switch.isra.0+0x153/0x700
[   30.150182]  ? kasan_atomics+0x153/0x310
[   30.150620]  kasan_atomics+0x1dd/0x310
[   30.151245]  ? __pfx_kasan_atomics+0x10/0x10
[   30.151629]  ? __pfx_read_tsc+0x10/0x10
[   30.152235]  ? ktime_get_ts64+0x86/0x230
[   30.152651]  kunit_try_run_case+0x1b3/0x490
[   30.153334]  ? __pfx_kunit_try_run_case+0x10/0x10
[   30.153778]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   30.154477]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   30.154913]  ? __kthread_parkme+0x82/0x160
[   30.155390]  ? preempt_count_sub+0x50/0x80
[   30.155866]  ? __pfx_kunit_try_run_case+0x10/0x10
[   30.156502]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   30.156979]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   30.157715]  kthread+0x257/0x310
[   30.158188]  ? __pfx_kthread+0x10/0x10
[   30.158707]  ret_from_fork+0x41/0x80
[   30.159085]  ? __pfx_kthread+0x10/0x10
[   30.159508]  ret_from_fork_asm+0x1a/0x30
[   30.159971]  </TASK>
[   30.160390] 
[   30.160671] Allocated by task 273:
[   30.161085]  kasan_save_stack+0x3d/0x60
[   30.161660]  kasan_save_track+0x18/0x40
[   30.162203]  kasan_save_alloc_info+0x3b/0x50
[   30.162679]  __kasan_kmalloc+0xb7/0xc0
[   30.163208]  __kmalloc_cache_noprof+0x184/0x410
[   30.163702]  kasan_atomics+0x96/0x310
[   30.164277]  kunit_try_run_case+0x1b3/0x490
[   30.164717]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   30.165100]  kthread+0x257/0x310
[   30.165515]  ret_from_fork+0x41/0x80
[   30.166152]  ret_from_fork_asm+0x1a/0x30
[   30.166555] 
[   30.166846] The buggy address belongs to the object at ffff888101afb700
[   30.166846]  which belongs to the cache kmalloc-64 of size 64
[   30.167892] The buggy address is located 0 bytes to the right of
[   30.167892]  allocated 48-byte region [ffff888101afb700, ffff888101afb730)
[   30.169246] 
[   30.169439] The buggy address belongs to the physical page:
[   30.170236] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101afb
[   30.170927] flags: 0x200000000000000(node=0|zone=2)
[   30.171647] page_type: f5(slab)
[   30.172038] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   30.172650] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   30.173293] page dumped because: kasan: bad access detected
[   30.173929] 
[   30.174237] Memory state around the buggy address:
[   30.174758]  ffff888101afb600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   30.175497]  ffff888101afb680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   30.176207] >ffff888101afb700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   30.176782]                                      ^
[   30.177486]  ffff888101afb780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.178206]  ffff888101afb800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.178927] ==================================================================
[   30.265932] ==================================================================
[   30.266462] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4fa7/0x5450
[   30.267223] Read of size 8 at addr ffff888101afb730 by task kunit_try_catch/273
[   30.267798] 
[   30.268107] CPU: 0 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241204 #1
[   30.268936] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.269269] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   30.270248] Call Trace:
[   30.270472]  <TASK>
[   30.270698]  dump_stack_lvl+0x73/0xb0
[   30.271063]  print_report+0xd1/0x640
[   30.271530]  ? __virt_addr_valid+0x1db/0x2d0
[   30.272132]  ? kasan_complete_mode_report_info+0x2a/0x200
[   30.272799]  kasan_report+0x102/0x140
[   30.273178]  ? kasan_atomics_helper+0x4fa7/0x5450
[   30.273654]  ? kasan_atomics_helper+0x4fa7/0x5450
[   30.274258]  __asan_report_load8_noabort+0x18/0x20
[   30.274857]  kasan_atomics_helper+0x4fa7/0x5450
[   30.275353]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   30.275823]  ? __kmalloc_cache_noprof+0x184/0x410
[   30.276306]  ? __schedule+0xc3e/0x2790
[   30.276651]  ? finish_task_switch.isra.0+0x153/0x700
[   30.277248]  ? kasan_atomics+0x153/0x310
[   30.277569]  kasan_atomics+0x1dd/0x310
[   30.278120]  ? __pfx_kasan_atomics+0x10/0x10
[   30.278680]  ? __pfx_read_tsc+0x10/0x10
[   30.279134]  ? ktime_get_ts64+0x86/0x230
[   30.279509]  kunit_try_run_case+0x1b3/0x490
[   30.280051]  ? __pfx_kunit_try_run_case+0x10/0x10
[   30.280636]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   30.281076]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   30.281438]  ? __kthread_parkme+0x82/0x160
[   30.282054]  ? preempt_count_sub+0x50/0x80
[   30.282577]  ? __pfx_kunit_try_run_case+0x10/0x10
[   30.282982]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   30.283636]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   30.284253]  kthread+0x257/0x310
[   30.284615]  ? __pfx_kthread+0x10/0x10
[   30.285136]  ret_from_fork+0x41/0x80
[   30.285571]  ? __pfx_kthread+0x10/0x10
[   30.285901]  ret_from_fork_asm+0x1a/0x30
[   30.286471]  </TASK>
[   30.286799] 
[   30.286953] Allocated by task 273:
[   30.287256]  kasan_save_stack+0x3d/0x60
[   30.287567]  kasan_save_track+0x18/0x40
[   30.288127]  kasan_save_alloc_info+0x3b/0x50
[   30.288704]  __kasan_kmalloc+0xb7/0xc0
[   30.289225]  __kmalloc_cache_noprof+0x184/0x410
[   30.289670]  kasan_atomics+0x96/0x310
[   30.290190]  kunit_try_run_case+0x1b3/0x490
[   30.290674]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   30.291184]  kthread+0x257/0x310
[   30.291550]  ret_from_fork+0x41/0x80
[   30.291960]  ret_from_fork_asm+0x1a/0x30
[   30.292295] 
[   30.292462] The buggy address belongs to the object at ffff888101afb700
[   30.292462]  which belongs to the cache kmalloc-64 of size 64
[   30.293742] The buggy address is located 0 bytes to the right of
[   30.293742]  allocated 48-byte region [ffff888101afb700, ffff888101afb730)
[   30.294703] 
[   30.294950] The buggy address belongs to the physical page:
[   30.295542] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101afb
[   30.296294] flags: 0x200000000000000(node=0|zone=2)
[   30.296786] page_type: f5(slab)
[   30.297138] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   30.297885] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   30.298512] page dumped because: kasan: bad access detected
[   30.298911] 
[   30.299212] Memory state around the buggy address:
[   30.299678]  ffff888101afb600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   30.300303]  ffff888101afb680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   30.300831] >ffff888101afb700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   30.301576]                                      ^
[   30.302005]  ffff888101afb780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.302469]  ffff888101afb800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.303287] ==================================================================
[   28.952242] ==================================================================
[   28.953444] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x13b6/0x5450
[   28.954487] Read of size 8 at addr ffff888101afb730 by task kunit_try_catch/273
[   28.955815] 
[   28.956888] CPU: 0 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241204 #1
[   28.957759] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.958380] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   28.959311] Call Trace:
[   28.959869]  <TASK>
[   28.960291]  dump_stack_lvl+0x73/0xb0
[   28.960754]  print_report+0xd1/0x640
[   28.961239]  ? __virt_addr_valid+0x1db/0x2d0
[   28.961988]  ? kasan_complete_mode_report_info+0x2a/0x200
[   28.962779]  kasan_report+0x102/0x140
[   28.963307]  ? kasan_atomics_helper+0x13b6/0x5450
[   28.963802]  ? kasan_atomics_helper+0x13b6/0x5450
[   28.964397]  kasan_check_range+0x10c/0x1c0
[   28.964987]  __kasan_check_read+0x15/0x20
[   28.965374]  kasan_atomics_helper+0x13b6/0x5450
[   28.965933]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   28.966589]  ? __kmalloc_cache_noprof+0x184/0x410
[   28.967102]  ? __schedule+0xc3e/0x2790
[   28.967528]  ? finish_task_switch.isra.0+0x153/0x700
[   28.968089]  ? kasan_atomics+0x153/0x310
[   28.968640]  kasan_atomics+0x1dd/0x310
[   28.969284]  ? __pfx_kasan_atomics+0x10/0x10
[   28.969824]  ? __pfx_read_tsc+0x10/0x10
[   28.970337]  ? ktime_get_ts64+0x86/0x230
[   28.970934]  kunit_try_run_case+0x1b3/0x490
[   28.971493]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.971880]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   28.972506]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   28.973051]  ? __kthread_parkme+0x82/0x160
[   28.973410]  ? preempt_count_sub+0x50/0x80
[   28.973945]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.974424]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   28.975132]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.975640]  kthread+0x257/0x310
[   28.976083]  ? __pfx_kthread+0x10/0x10
[   28.976447]  ret_from_fork+0x41/0x80
[   28.977067]  ? __pfx_kthread+0x10/0x10
[   28.977475]  ret_from_fork_asm+0x1a/0x30
[   28.978160]  </TASK>
[   28.978373] 
[   28.978655] Allocated by task 273:
[   28.979197]  kasan_save_stack+0x3d/0x60
[   28.979577]  kasan_save_track+0x18/0x40
[   28.980215]  kasan_save_alloc_info+0x3b/0x50
[   28.980583]  __kasan_kmalloc+0xb7/0xc0
[   28.981158]  __kmalloc_cache_noprof+0x184/0x410
[   28.981674]  kasan_atomics+0x96/0x310
[   28.982167]  kunit_try_run_case+0x1b3/0x490
[   28.982626]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.983223]  kthread+0x257/0x310
[   28.983727]  ret_from_fork+0x41/0x80
[   28.984259]  ret_from_fork_asm+0x1a/0x30
[   28.984815] 
[   28.985141] The buggy address belongs to the object at ffff888101afb700
[   28.985141]  which belongs to the cache kmalloc-64 of size 64
[   28.986186] The buggy address is located 0 bytes to the right of
[   28.986186]  allocated 48-byte region [ffff888101afb700, ffff888101afb730)
[   28.987411] 
[   28.987718] The buggy address belongs to the physical page:
[   28.988280] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101afb
[   28.989162] flags: 0x200000000000000(node=0|zone=2)
[   28.989784] page_type: f5(slab)
[   28.990193] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   28.991058] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   28.991699] page dumped because: kasan: bad access detected
[   28.992300] 
[   28.992548] Memory state around the buggy address:
[   28.993007]  ffff888101afb600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.993569]  ffff888101afb680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.994193] >ffff888101afb700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   28.994883]                                      ^
[   28.995395]  ffff888101afb780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.995874]  ffff888101afb800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.996681] ==================================================================
[   28.846808] ==================================================================
[   28.847713] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x12e7/0x5450
[   28.848714] Write of size 4 at addr ffff888101afb730 by task kunit_try_catch/273
[   28.849298] 
[   28.849619] CPU: 0 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241204 #1
[   28.850780] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.851399] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   28.852322] Call Trace:
[   28.852711]  <TASK>
[   28.853168]  dump_stack_lvl+0x73/0xb0
[   28.853732]  print_report+0xd1/0x640
[   28.854244]  ? __virt_addr_valid+0x1db/0x2d0
[   28.854857]  ? kasan_complete_mode_report_info+0x2a/0x200
[   28.855561]  kasan_report+0x102/0x140
[   28.856202]  ? kasan_atomics_helper+0x12e7/0x5450
[   28.856668]  ? kasan_atomics_helper+0x12e7/0x5450
[   28.857341]  kasan_check_range+0x10c/0x1c0
[   28.857957]  __kasan_check_write+0x18/0x20
[   28.858490]  kasan_atomics_helper+0x12e7/0x5450
[   28.859046]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   28.859632]  ? __kmalloc_cache_noprof+0x184/0x410
[   28.860221]  ? __schedule+0xc3e/0x2790
[   28.860694]  ? finish_task_switch.isra.0+0x153/0x700
[   28.861315]  ? kasan_atomics+0x153/0x310
[   28.862001]  kasan_atomics+0x1dd/0x310
[   28.862483]  ? __pfx_kasan_atomics+0x10/0x10
[   28.863163]  ? __pfx_read_tsc+0x10/0x10
[   28.863645]  ? ktime_get_ts64+0x86/0x230
[   28.864122]  kunit_try_run_case+0x1b3/0x490
[   28.864640]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.865129]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   28.865718]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   28.866209]  ? __kthread_parkme+0x82/0x160
[   28.866703]  ? preempt_count_sub+0x50/0x80
[   28.867332]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.868042]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   28.868716]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.869310]  kthread+0x257/0x310
[   28.869938]  ? __pfx_kthread+0x10/0x10
[   28.870409]  ret_from_fork+0x41/0x80
[   28.871357]  ? __pfx_kthread+0x10/0x10
[   28.871655]  ret_from_fork_asm+0x1a/0x30
[   28.872217]  </TASK>
[   28.872574] 
[   28.872844] Allocated by task 273:
[   28.873166]  kasan_save_stack+0x3d/0x60
[   28.874312]  kasan_save_track+0x18/0x40
[   28.874889]  kasan_save_alloc_info+0x3b/0x50
[   28.875573]  __kasan_kmalloc+0xb7/0xc0
[   28.876222]  __kmalloc_cache_noprof+0x184/0x410
[   28.877152]  kasan_atomics+0x96/0x310
[   28.877772]  kunit_try_run_case+0x1b3/0x490
[   28.878543]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.879054]  kthread+0x257/0x310
[   28.879393]  ret_from_fork+0x41/0x80
[   28.879820]  ret_from_fork_asm+0x1a/0x30
[   28.880400] 
[   28.880687] The buggy address belongs to the object at ffff888101afb700
[   28.880687]  which belongs to the cache kmalloc-64 of size 64
[   28.882519] The buggy address is located 0 bytes to the right of
[   28.882519]  allocated 48-byte region [ffff888101afb700, ffff888101afb730)
[   28.884004] 
[   28.884427] The buggy address belongs to the physical page:
[   28.885638] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101afb
[   28.886491] flags: 0x200000000000000(node=0|zone=2)
[   28.887596] page_type: f5(slab)
[   28.887925] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   28.888939] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   28.889651] page dumped because: kasan: bad access detected
[   28.890670] 
[   28.890844] Memory state around the buggy address:
[   28.891157]  ffff888101afb600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.892667]  ffff888101afb680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.893126] >ffff888101afb700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   28.894533]                                      ^
[   28.895307]  ffff888101afb780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.896251]  ffff888101afb800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.897440] ==================================================================
[   29.414006] ==================================================================
[   29.415412] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x18b2/0x5450
[   29.416810] Write of size 8 at addr ffff888101afb730 by task kunit_try_catch/273
[   29.418054] 
[   29.418249] CPU: 0 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241204 #1
[   29.419294] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.419692] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   29.420636] Call Trace:
[   29.421052]  <TASK>
[   29.421527]  dump_stack_lvl+0x73/0xb0
[   29.421905]  print_report+0xd1/0x640
[   29.422345]  ? __virt_addr_valid+0x1db/0x2d0
[   29.422993]  ? kasan_complete_mode_report_info+0x2a/0x200
[   29.423542]  kasan_report+0x102/0x140
[   29.424561]  ? kasan_atomics_helper+0x18b2/0x5450
[   29.425286]  ? kasan_atomics_helper+0x18b2/0x5450
[   29.426110]  kasan_check_range+0x10c/0x1c0
[   29.426842]  __kasan_check_write+0x18/0x20
[   29.427775]  kasan_atomics_helper+0x18b2/0x5450
[   29.428791]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   29.429720]  ? __kmalloc_cache_noprof+0x184/0x410
[   29.430560]  ? __schedule+0xc3e/0x2790
[   29.431171]  ? finish_task_switch.isra.0+0x153/0x700
[   29.431858]  ? kasan_atomics+0x153/0x310
[   29.432672]  kasan_atomics+0x1dd/0x310
[   29.433048]  ? __pfx_kasan_atomics+0x10/0x10
[   29.433264]  ? __pfx_read_tsc+0x10/0x10
[   29.433455]  ? ktime_get_ts64+0x86/0x230
[   29.434340]  kunit_try_run_case+0x1b3/0x490
[   29.435234]  ? __pfx_kunit_try_run_case+0x10/0x10
[   29.435935]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   29.436561]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   29.437028]  ? __kthread_parkme+0x82/0x160
[   29.437748]  ? preempt_count_sub+0x50/0x80
[   29.438337]  ? __pfx_kunit_try_run_case+0x10/0x10
[   29.438845]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   29.439688]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   29.440192]  kthread+0x257/0x310
[   29.440879]  ? __pfx_kthread+0x10/0x10
[   29.441592]  ret_from_fork+0x41/0x80
[   29.442074]  ? __pfx_kthread+0x10/0x10
[   29.443061]  ret_from_fork_asm+0x1a/0x30
[   29.443408]  </TASK>
[   29.443783] 
[   29.444307] Allocated by task 273:
[   29.444721]  kasan_save_stack+0x3d/0x60
[   29.445532]  kasan_save_track+0x18/0x40
[   29.446216]  kasan_save_alloc_info+0x3b/0x50
[   29.446746]  __kasan_kmalloc+0xb7/0xc0
[   29.447143]  __kmalloc_cache_noprof+0x184/0x410
[   29.447770]  kasan_atomics+0x96/0x310
[   29.448137]  kunit_try_run_case+0x1b3/0x490
[   29.449381]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   29.449884]  kthread+0x257/0x310
[   29.450386]  ret_from_fork+0x41/0x80
[   29.450709]  ret_from_fork_asm+0x1a/0x30
[   29.451290] 
[   29.451547] The buggy address belongs to the object at ffff888101afb700
[   29.451547]  which belongs to the cache kmalloc-64 of size 64
[   29.452579] The buggy address is located 0 bytes to the right of
[   29.452579]  allocated 48-byte region [ffff888101afb700, ffff888101afb730)
[   29.453713] 
[   29.453989] The buggy address belongs to the physical page:
[   29.454556] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101afb
[   29.455265] flags: 0x200000000000000(node=0|zone=2)
[   29.455707] page_type: f5(slab)
[   29.456027] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   29.456858] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   29.457607] page dumped because: kasan: bad access detected
[   29.458192] 
[   29.458417] Memory state around the buggy address:
[   29.459033]  ffff888101afb600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.459766]  ffff888101afb680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.460546] >ffff888101afb700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   29.461090]                                      ^
[   29.461524]  ffff888101afb780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.462215]  ffff888101afb800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.462880] ==================================================================
[   29.762213] ==================================================================
[   29.763122] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1ce2/0x5450
[   29.763865] Write of size 8 at addr ffff888101afb730 by task kunit_try_catch/273
[   29.764630] 
[   29.764912] CPU: 0 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241204 #1
[   29.765874] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.766350] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   29.767156] Call Trace:
[   29.767526]  <TASK>
[   29.767838]  dump_stack_lvl+0x73/0xb0
[   29.768518]  print_report+0xd1/0x640
[   29.768984]  ? __virt_addr_valid+0x1db/0x2d0
[   29.769519]  ? kasan_complete_mode_report_info+0x2a/0x200
[   29.769977]  kasan_report+0x102/0x140
[   29.770524]  ? kasan_atomics_helper+0x1ce2/0x5450
[   29.771202]  ? kasan_atomics_helper+0x1ce2/0x5450
[   29.771798]  kasan_check_range+0x10c/0x1c0
[   29.772109]  __kasan_check_write+0x18/0x20
[   29.772459]  kasan_atomics_helper+0x1ce2/0x5450
[   29.773605]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   29.774387]  ? __kmalloc_cache_noprof+0x184/0x410
[   29.775065]  ? __schedule+0xc3e/0x2790
[   29.775589]  ? finish_task_switch.isra.0+0x153/0x700
[   29.776390]  ? kasan_atomics+0x153/0x310
[   29.777265]  kasan_atomics+0x1dd/0x310
[   29.777633]  ? __pfx_kasan_atomics+0x10/0x10
[   29.778435]  ? __pfx_read_tsc+0x10/0x10
[   29.778859]  ? ktime_get_ts64+0x86/0x230
[   29.779302]  kunit_try_run_case+0x1b3/0x490
[   29.780196]  ? __pfx_kunit_try_run_case+0x10/0x10
[   29.780862]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   29.781482]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   29.782000]  ? __kthread_parkme+0x82/0x160
[   29.782693]  ? preempt_count_sub+0x50/0x80
[   29.783385]  ? __pfx_kunit_try_run_case+0x10/0x10
[   29.783908]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   29.784499]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   29.785240]  kthread+0x257/0x310
[   29.785662]  ? __pfx_kthread+0x10/0x10
[   29.786211]  ret_from_fork+0x41/0x80
[   29.786511]  ? __pfx_kthread+0x10/0x10
[   29.787100]  ret_from_fork_asm+0x1a/0x30
[   29.787623]  </TASK>
[   29.787841] 
[   29.788249] Allocated by task 273:
[   29.788605]  kasan_save_stack+0x3d/0x60
[   29.789248]  kasan_save_track+0x18/0x40
[   29.790260]  kasan_save_alloc_info+0x3b/0x50
[   29.790749]  __kasan_kmalloc+0xb7/0xc0
[   29.791607]  __kmalloc_cache_noprof+0x184/0x410
[   29.792332]  kasan_atomics+0x96/0x310
[   29.792747]  kunit_try_run_case+0x1b3/0x490
[   29.793087]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   29.793697]  kthread+0x257/0x310
[   29.794284]  ret_from_fork+0x41/0x80
[   29.794684]  ret_from_fork_asm+0x1a/0x30
[   29.795969] 
[   29.796182] The buggy address belongs to the object at ffff888101afb700
[   29.796182]  which belongs to the cache kmalloc-64 of size 64
[   29.797397] The buggy address is located 0 bytes to the right of
[   29.797397]  allocated 48-byte region [ffff888101afb700, ffff888101afb730)
[   29.798658] 
[   29.798808] The buggy address belongs to the physical page:
[   29.799357] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101afb
[   29.800045] flags: 0x200000000000000(node=0|zone=2)
[   29.800429] page_type: f5(slab)
[   29.800901] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   29.801492] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   29.802437] page dumped because: kasan: bad access detected
[   29.803055] 
[   29.803278] Memory state around the buggy address:
[   29.803667]  ffff888101afb600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.804382]  ffff888101afb680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.805248] >ffff888101afb700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   29.805730]                                      ^
[   29.806386]  ffff888101afb780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.807204]  ffff888101afb800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.807840] ==================================================================
[   29.942880] ==================================================================
[   29.943341] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1f44/0x5450
[   29.944821] Write of size 8 at addr ffff888101afb730 by task kunit_try_catch/273
[   29.946378] 
[   29.946606] CPU: 0 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241204 #1
[   29.947727] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.948051] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   29.948781] Call Trace:
[   29.949205]  <TASK>
[   29.949578]  dump_stack_lvl+0x73/0xb0
[   29.950161]  print_report+0xd1/0x640
[   29.950500]  ? __virt_addr_valid+0x1db/0x2d0
[   29.951012]  ? kasan_complete_mode_report_info+0x2a/0x200
[   29.951520]  kasan_report+0x102/0x140
[   29.952001]  ? kasan_atomics_helper+0x1f44/0x5450
[   29.952464]  ? kasan_atomics_helper+0x1f44/0x5450
[   29.952949]  kasan_check_range+0x10c/0x1c0
[   29.953490]  __kasan_check_write+0x18/0x20
[   29.953836]  kasan_atomics_helper+0x1f44/0x5450
[   29.954505]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   29.954991]  ? __kmalloc_cache_noprof+0x184/0x410
[   29.955619]  ? __schedule+0xc3e/0x2790
[   29.955942]  ? finish_task_switch.isra.0+0x153/0x700
[   29.956577]  ? kasan_atomics+0x153/0x310
[   29.957138]  kasan_atomics+0x1dd/0x310
[   29.957591]  ? __pfx_kasan_atomics+0x10/0x10
[   29.957933]  ? __pfx_read_tsc+0x10/0x10
[   29.958523]  ? ktime_get_ts64+0x86/0x230
[   29.959065]  kunit_try_run_case+0x1b3/0x490
[   29.959410]  ? __pfx_kunit_try_run_case+0x10/0x10
[   29.959995]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   29.960605]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   29.961104]  ? __kthread_parkme+0x82/0x160
[   29.961489]  ? preempt_count_sub+0x50/0x80
[   29.962127]  ? __pfx_kunit_try_run_case+0x10/0x10
[   29.962611]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   29.963000]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   29.963766]  kthread+0x257/0x310
[   29.964159]  ? __pfx_kthread+0x10/0x10
[   29.964727]  ret_from_fork+0x41/0x80
[   29.965215]  ? __pfx_kthread+0x10/0x10
[   29.965598]  ret_from_fork_asm+0x1a/0x30
[   29.965924]  </TASK>
[   29.966393] 
[   29.966707] Allocated by task 273:
[   29.967263]  kasan_save_stack+0x3d/0x60
[   29.967801]  kasan_save_track+0x18/0x40
[   29.968224]  kasan_save_alloc_info+0x3b/0x50
[   29.968766]  __kasan_kmalloc+0xb7/0xc0
[   29.969168]  __kmalloc_cache_noprof+0x184/0x410
[   29.969668]  kasan_atomics+0x96/0x310
[   29.969948]  kunit_try_run_case+0x1b3/0x490
[   29.970517]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   29.971212]  kthread+0x257/0x310
[   29.971577]  ret_from_fork+0x41/0x80
[   29.971913]  ret_from_fork_asm+0x1a/0x30
[   29.972526] 
[   29.972709] The buggy address belongs to the object at ffff888101afb700
[   29.972709]  which belongs to the cache kmalloc-64 of size 64
[   29.974144] The buggy address is located 0 bytes to the right of
[   29.974144]  allocated 48-byte region [ffff888101afb700, ffff888101afb730)
[   29.975219] 
[   29.975424] The buggy address belongs to the physical page:
[   29.976055] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101afb
[   29.976529] flags: 0x200000000000000(node=0|zone=2)
[   29.977610] page_type: f5(slab)
[   29.978604] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   29.979239] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   29.979948] page dumped because: kasan: bad access detected
[   29.980449] 
[   29.981099] Memory state around the buggy address:
[   29.981431]  ffff888101afb600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.982843]  ffff888101afb680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.983696] >ffff888101afb700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   29.984528]                                      ^
[   29.984976]  ffff888101afb780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.985911]  ffff888101afb800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.986653] ==================================================================
[   27.620883] ==================================================================
[   27.621502] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x5ff/0x5450
[   27.622677] Write of size 4 at addr ffff888101afb730 by task kunit_try_catch/273
[   27.623686] 
[   27.623808] CPU: 0 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241204 #1
[   27.624188] Tainted: [B]=BAD_PAGE, [N]=TEST
[   27.624473] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   27.626279] Call Trace:
[   27.626630]  <TASK>
[   27.627000]  dump_stack_lvl+0x73/0xb0
[   27.627431]  print_report+0xd1/0x640
[   27.627808]  ? __virt_addr_valid+0x1db/0x2d0
[   27.628169]  ? kasan_complete_mode_report_info+0x2a/0x200
[   27.629616]  kasan_report+0x102/0x140
[   27.629860]  ? kasan_atomics_helper+0x5ff/0x5450
[   27.630205]  ? kasan_atomics_helper+0x5ff/0x5450
[   27.631131]  kasan_check_range+0x10c/0x1c0
[   27.631710]  __kasan_check_write+0x18/0x20
[   27.632225]  kasan_atomics_helper+0x5ff/0x5450
[   27.632705]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   27.633379]  ? __kmalloc_cache_noprof+0x184/0x410
[   27.634063]  ? __schedule+0xc3e/0x2790
[   27.634476]  ? finish_task_switch.isra.0+0x153/0x700
[   27.636012]  ? kasan_atomics+0x153/0x310
[   27.636747]  kasan_atomics+0x1dd/0x310
[   27.637379]  ? __pfx_kasan_atomics+0x10/0x10
[   27.637840]  ? __pfx_read_tsc+0x10/0x10
[   27.638264]  ? ktime_get_ts64+0x86/0x230
[   27.639145]  kunit_try_run_case+0x1b3/0x490
[   27.639697]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.641550]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   27.642220]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   27.642922]  ? __kthread_parkme+0x82/0x160
[   27.643754]  ? preempt_count_sub+0x50/0x80
[   27.644129]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.644829]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   27.645342]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.646116]  kthread+0x257/0x310
[   27.646500]  ? __pfx_kthread+0x10/0x10
[   27.647414]  ret_from_fork+0x41/0x80
[   27.648731]  ? __pfx_kthread+0x10/0x10
[   27.649156]  ret_from_fork_asm+0x1a/0x30
[   27.649707]  </TASK>
[   27.650261] 
[   27.650585] Allocated by task 273:
[   27.651051]  kasan_save_stack+0x3d/0x60
[   27.651808]  kasan_save_track+0x18/0x40
[   27.652125]  kasan_save_alloc_info+0x3b/0x50
[   27.652945]  __kasan_kmalloc+0xb7/0xc0
[   27.653388]  __kmalloc_cache_noprof+0x184/0x410
[   27.653798]  kasan_atomics+0x96/0x310
[   27.654149]  kunit_try_run_case+0x1b3/0x490
[   27.654973]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.655919]  kthread+0x257/0x310
[   27.656166]  ret_from_fork+0x41/0x80
[   27.657327]  ret_from_fork_asm+0x1a/0x30
[   27.657744] 
[   27.658123] The buggy address belongs to the object at ffff888101afb700
[   27.658123]  which belongs to the cache kmalloc-64 of size 64
[   27.658787] The buggy address is located 0 bytes to the right of
[   27.658787]  allocated 48-byte region [ffff888101afb700, ffff888101afb730)
[   27.661032] 
[   27.661269] The buggy address belongs to the physical page:
[   27.662595] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101afb
[   27.663898] flags: 0x200000000000000(node=0|zone=2)
[   27.665158] page_type: f5(slab)
[   27.665863] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   27.666669] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   27.667859] page dumped because: kasan: bad access detected
[   27.668191] 
[   27.668702] Memory state around the buggy address:
[   27.669772]  ffff888101afb600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.671631]  ffff888101afb680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.672857] >ffff888101afb700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   27.673791]                                      ^
[   27.674212]  ffff888101afb780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.675366]  ffff888101afb800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.676073] ==================================================================
[   27.382670] ==================================================================
[   27.384358] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b56/0x5450
[   27.385487] Read of size 4 at addr ffff888101afb730 by task kunit_try_catch/273
[   27.385937] 
[   27.386333] CPU: 0 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241204 #1
[   27.388016] Tainted: [B]=BAD_PAGE, [N]=TEST
[   27.388463] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   27.389293] Call Trace:
[   27.389537]  <TASK>
[   27.390942]  dump_stack_lvl+0x73/0xb0
[   27.391892]  print_report+0xd1/0x640
[   27.392525]  ? __virt_addr_valid+0x1db/0x2d0
[   27.392766]  ? kasan_complete_mode_report_info+0x2a/0x200
[   27.393790]  kasan_report+0x102/0x140
[   27.394195]  ? kasan_atomics_helper+0x4b56/0x5450
[   27.395120]  ? kasan_atomics_helper+0x4b56/0x5450
[   27.395946]  __asan_report_load4_noabort+0x18/0x20
[   27.396958]  kasan_atomics_helper+0x4b56/0x5450
[   27.397816]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   27.398274]  ? __kmalloc_cache_noprof+0x184/0x410
[   27.399922]  ? __schedule+0xc3e/0x2790
[   27.400295]  ? finish_task_switch.isra.0+0x153/0x700
[   27.401329]  ? kasan_atomics+0x153/0x310
[   27.401822]  kasan_atomics+0x1dd/0x310
[   27.402228]  ? __pfx_kasan_atomics+0x10/0x10
[   27.402573]  ? __pfx_read_tsc+0x10/0x10
[   27.403501]  ? ktime_get_ts64+0x86/0x230
[   27.403887]  kunit_try_run_case+0x1b3/0x490
[   27.404895]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.405879]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   27.406700]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   27.407745]  ? __kthread_parkme+0x82/0x160
[   27.408575]  ? preempt_count_sub+0x50/0x80
[   27.409353]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.410052]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   27.411191]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.411996]  kthread+0x257/0x310
[   27.412251]  ? __pfx_kthread+0x10/0x10
[   27.412694]  ret_from_fork+0x41/0x80
[   27.413120]  ? __pfx_kthread+0x10/0x10
[   27.413687]  ret_from_fork_asm+0x1a/0x30
[   27.414705]  </TASK>
[   27.415190] 
[   27.415363] Allocated by task 273:
[   27.416865]  kasan_save_stack+0x3d/0x60
[   27.417374]  kasan_save_track+0x18/0x40
[   27.417794]  kasan_save_alloc_info+0x3b/0x50
[   27.418238]  __kasan_kmalloc+0xb7/0xc0
[   27.419210]  __kmalloc_cache_noprof+0x184/0x410
[   27.419938]  kasan_atomics+0x96/0x310
[   27.421036]  kunit_try_run_case+0x1b3/0x490
[   27.421466]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.421724]  kthread+0x257/0x310
[   27.421996]  ret_from_fork+0x41/0x80
[   27.423085]  ret_from_fork_asm+0x1a/0x30
[   27.423912] 
[   27.424061] The buggy address belongs to the object at ffff888101afb700
[   27.424061]  which belongs to the cache kmalloc-64 of size 64
[   27.425160] The buggy address is located 0 bytes to the right of
[   27.425160]  allocated 48-byte region [ffff888101afb700, ffff888101afb730)
[   27.426544] 
[   27.426869] The buggy address belongs to the physical page:
[   27.427600] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101afb
[   27.429306] flags: 0x200000000000000(node=0|zone=2)
[   27.430209] page_type: f5(slab)
[   27.431265] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   27.431996] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   27.432759] page dumped because: kasan: bad access detected
[   27.433438] 
[   27.433618] Memory state around the buggy address:
[   27.434098]  ffff888101afb600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.435246]  ffff888101afb680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.436830] >ffff888101afb700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   27.437545]                                      ^
[   27.438089]  ffff888101afb780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.439641]  ffff888101afb800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.440575] ==================================================================
[   30.343384] ==================================================================
[   30.344074] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x5117/0x5450
[   30.344768] Read of size 8 at addr ffff888101afb730 by task kunit_try_catch/273
[   30.345381] 
[   30.345654] CPU: 0 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241204 #1
[   30.346685] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.347085] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   30.347936] Call Trace:
[   30.348343]  <TASK>
[   30.348676]  dump_stack_lvl+0x73/0xb0
[   30.349198]  print_report+0xd1/0x640
[   30.349514]  ? __virt_addr_valid+0x1db/0x2d0
[   30.350324]  ? kasan_complete_mode_report_info+0x2a/0x200
[   30.350833]  kasan_report+0x102/0x140
[   30.351295]  ? kasan_atomics_helper+0x5117/0x5450
[   30.351791]  ? kasan_atomics_helper+0x5117/0x5450
[   30.352255]  __asan_report_load8_noabort+0x18/0x20
[   30.352831]  kasan_atomics_helper+0x5117/0x5450
[   30.353346]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   30.353777]  ? __kmalloc_cache_noprof+0x184/0x410
[   30.354228]  ? __schedule+0xc3e/0x2790
[   30.354716]  ? finish_task_switch.isra.0+0x153/0x700
[   30.355329]  ? kasan_atomics+0x153/0x310
[   30.355829]  kasan_atomics+0x1dd/0x310
[   30.356340]  ? __pfx_kasan_atomics+0x10/0x10
[   30.356679]  ? __pfx_read_tsc+0x10/0x10
[   30.357209]  ? ktime_get_ts64+0x86/0x230
[   30.357906]  kunit_try_run_case+0x1b3/0x490
[   30.359282]  ? __pfx_kunit_try_run_case+0x10/0x10
[   30.360537]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   30.360897]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   30.361289]  ? __kthread_parkme+0x82/0x160
[   30.361627]  ? preempt_count_sub+0x50/0x80
[   30.361930]  ? __pfx_kunit_try_run_case+0x10/0x10
[   30.362783]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   30.363713]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   30.364472]  kthread+0x257/0x310
[   30.365080]  ? __pfx_kthread+0x10/0x10
[   30.365668]  ret_from_fork+0x41/0x80
[   30.366193]  ? __pfx_kthread+0x10/0x10
[   30.366753]  ret_from_fork_asm+0x1a/0x30
[   30.367187]  </TASK>
[   30.367632] 
[   30.367923] Allocated by task 273:
[   30.368550]  kasan_save_stack+0x3d/0x60
[   30.369092]  kasan_save_track+0x18/0x40
[   30.369653]  kasan_save_alloc_info+0x3b/0x50
[   30.370512]  __kasan_kmalloc+0xb7/0xc0
[   30.370938]  __kmalloc_cache_noprof+0x184/0x410
[   30.371452]  kasan_atomics+0x96/0x310
[   30.371813]  kunit_try_run_case+0x1b3/0x490
[   30.372352]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   30.372827]  kthread+0x257/0x310
[   30.373347]  ret_from_fork+0x41/0x80
[   30.373729]  ret_from_fork_asm+0x1a/0x30
[   30.374254] 
[   30.374495] The buggy address belongs to the object at ffff888101afb700
[   30.374495]  which belongs to the cache kmalloc-64 of size 64
[   30.375738] The buggy address is located 0 bytes to the right of
[   30.375738]  allocated 48-byte region [ffff888101afb700, ffff888101afb730)
[   30.376885] 
[   30.377156] The buggy address belongs to the physical page:
[   30.377806] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101afb
[   30.378652] flags: 0x200000000000000(node=0|zone=2)
[   30.379112] page_type: f5(slab)
[   30.379575] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   30.380182] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   30.381003] page dumped because: kasan: bad access detected
[   30.381533] 
[   30.381798] Memory state around the buggy address:
[   30.382356]  ffff888101afb600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   30.383114]  ffff888101afb680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   30.383781] >ffff888101afb700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   30.384532]                                      ^
[   30.385147]  ffff888101afb780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.385785]  ffff888101afb800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.386441] ==================================================================
[   27.085973] ==================================================================
[   27.087431] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4bbe/0x5450
[   27.088655] Read of size 4 at addr ffff888101afb730 by task kunit_try_catch/273
[   27.089189] 
[   27.089676] CPU: 0 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241204 #1
[   27.090889] Tainted: [B]=BAD_PAGE, [N]=TEST
[   27.091570] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   27.092714] Call Trace:
[   27.093140]  <TASK>
[   27.093442]  dump_stack_lvl+0x73/0xb0
[   27.093838]  print_report+0xd1/0x640
[   27.094239]  ? __virt_addr_valid+0x1db/0x2d0
[   27.094768]  ? kasan_complete_mode_report_info+0x2a/0x200
[   27.095386]  kasan_report+0x102/0x140
[   27.095777]  ? kasan_atomics_helper+0x4bbe/0x5450
[   27.096879]  ? kasan_atomics_helper+0x4bbe/0x5450
[   27.097269]  __asan_report_load4_noabort+0x18/0x20
[   27.098155]  kasan_atomics_helper+0x4bbe/0x5450
[   27.099012]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   27.099540]  ? __kmalloc_cache_noprof+0x184/0x410
[   27.100334]  ? __schedule+0xc3e/0x2790
[   27.101315]  ? finish_task_switch.isra.0+0x153/0x700
[   27.101789]  ? kasan_atomics+0x153/0x310
[   27.102104]  kasan_atomics+0x1dd/0x310
[   27.102489]  ? __pfx_kasan_atomics+0x10/0x10
[   27.102914]  ? __pfx_read_tsc+0x10/0x10
[   27.103407]  ? ktime_get_ts64+0x86/0x230
[   27.103970]  kunit_try_run_case+0x1b3/0x490
[   27.105263]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.105763]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   27.106593]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   27.107511]  ? __kthread_parkme+0x82/0x160
[   27.108171]  ? preempt_count_sub+0x50/0x80
[   27.108716]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.109687]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   27.110606]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.111331]  kthread+0x257/0x310
[   27.112146]  ? __pfx_kthread+0x10/0x10
[   27.113143]  ret_from_fork+0x41/0x80
[   27.113683]  ? __pfx_kthread+0x10/0x10
[   27.114136]  ret_from_fork_asm+0x1a/0x30
[   27.115080]  </TASK>
[   27.115424] 
[   27.116141] Allocated by task 273:
[   27.116803]  kasan_save_stack+0x3d/0x60
[   27.117202]  kasan_save_track+0x18/0x40
[   27.118130]  kasan_save_alloc_info+0x3b/0x50
[   27.118587]  __kasan_kmalloc+0xb7/0xc0
[   27.119126]  __kmalloc_cache_noprof+0x184/0x410
[   27.119763]  kasan_atomics+0x96/0x310
[   27.120980]  kunit_try_run_case+0x1b3/0x490
[   27.121785]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.122764]  kthread+0x257/0x310
[   27.123265]  ret_from_fork+0x41/0x80
[   27.123807]  ret_from_fork_asm+0x1a/0x30
[   27.124660] 
[   27.124896] The buggy address belongs to the object at ffff888101afb700
[   27.124896]  which belongs to the cache kmalloc-64 of size 64
[   27.127469] The buggy address is located 0 bytes to the right of
[   27.127469]  allocated 48-byte region [ffff888101afb700, ffff888101afb730)
[   27.129457] 
[   27.129661] The buggy address belongs to the physical page:
[   27.130615] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101afb
[   27.131242] flags: 0x200000000000000(node=0|zone=2)
[   27.132080] page_type: f5(slab)
[   27.132987] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   27.134027] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   27.135070] page dumped because: kasan: bad access detected
[   27.136026] 
[   27.136257] Memory state around the buggy address:
[   27.136926]  ffff888101afb600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.138457]  ffff888101afb680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.139535] >ffff888101afb700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   27.140542]                                      ^
[   27.141512]  ffff888101afb780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.142108]  ffff888101afb800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.142897] ==================================================================
[   28.230600] ==================================================================
[   28.231544] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a86/0x5450
[   28.232288] Read of size 4 at addr ffff888101afb730 by task kunit_try_catch/273
[   28.233089] 
[   28.233326] CPU: 0 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241204 #1
[   28.234315] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.234806] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   28.235778] Call Trace:
[   28.236048]  <TASK>
[   28.236469]  dump_stack_lvl+0x73/0xb0
[   28.236959]  print_report+0xd1/0x640
[   28.237468]  ? __virt_addr_valid+0x1db/0x2d0
[   28.238228]  ? kasan_complete_mode_report_info+0x2a/0x200
[   28.238797]  kasan_report+0x102/0x140
[   28.239298]  ? kasan_atomics_helper+0x4a86/0x5450
[   28.240032]  ? kasan_atomics_helper+0x4a86/0x5450
[   28.240420]  __asan_report_load4_noabort+0x18/0x20
[   28.240901]  kasan_atomics_helper+0x4a86/0x5450
[   28.241352]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   28.242126]  ? __kmalloc_cache_noprof+0x184/0x410
[   28.242650]  ? __schedule+0xc3e/0x2790
[   28.243151]  ? finish_task_switch.isra.0+0x153/0x700
[   28.243632]  ? kasan_atomics+0x153/0x310
[   28.244283]  kasan_atomics+0x1dd/0x310
[   28.244642]  ? __pfx_kasan_atomics+0x10/0x10
[   28.245280]  ? __pfx_read_tsc+0x10/0x10
[   28.245846]  ? ktime_get_ts64+0x86/0x230
[   28.246225]  kunit_try_run_case+0x1b3/0x490
[   28.246743]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.247435]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   28.248091]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   28.248518]  ? __kthread_parkme+0x82/0x160
[   28.249194]  ? preempt_count_sub+0x50/0x80
[   28.249778]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.250345]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   28.251369]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.251955]  kthread+0x257/0x310
[   28.252337]  ? __pfx_kthread+0x10/0x10
[   28.252894]  ret_from_fork+0x41/0x80
[   28.253346]  ? __pfx_kthread+0x10/0x10
[   28.253882]  ret_from_fork_asm+0x1a/0x30
[   28.254294]  </TASK>
[   28.254642] 
[   28.254934] Allocated by task 273:
[   28.255273]  kasan_save_stack+0x3d/0x60
[   28.255804]  kasan_save_track+0x18/0x40
[   28.256431]  kasan_save_alloc_info+0x3b/0x50
[   28.257019]  __kasan_kmalloc+0xb7/0xc0
[   28.257351]  __kmalloc_cache_noprof+0x184/0x410
[   28.257886]  kasan_atomics+0x96/0x310
[   28.258517]  kunit_try_run_case+0x1b3/0x490
[   28.258859]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.259464]  kthread+0x257/0x310
[   28.259737]  ret_from_fork+0x41/0x80
[   28.260167]  ret_from_fork_asm+0x1a/0x30
[   28.260481] 
[   28.260852] The buggy address belongs to the object at ffff888101afb700
[   28.260852]  which belongs to the cache kmalloc-64 of size 64
[   28.262234] The buggy address is located 0 bytes to the right of
[   28.262234]  allocated 48-byte region [ffff888101afb700, ffff888101afb730)
[   28.263292] 
[   28.263578] The buggy address belongs to the physical page:
[   28.263975] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101afb
[   28.264914] flags: 0x200000000000000(node=0|zone=2)
[   28.265328] page_type: f5(slab)
[   28.265628] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   28.266709] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   28.267616] page dumped because: kasan: bad access detected
[   28.268845] 
[   28.269118] Memory state around the buggy address:
[   28.269659]  ffff888101afb600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.270259]  ffff888101afb680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.271495] >ffff888101afb700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   28.272472]                                      ^
[   28.273432]  ffff888101afb780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.274333]  ffff888101afb800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.275165] ==================================================================
[   29.145983] ==================================================================
[   29.146509] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x151e/0x5450
[   29.147253] Write of size 8 at addr ffff888101afb730 by task kunit_try_catch/273
[   29.147804] 
[   29.148120] CPU: 0 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241204 #1
[   29.148988] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.149323] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   29.150105] Call Trace:
[   29.150393]  <TASK>
[   29.150675]  dump_stack_lvl+0x73/0xb0
[   29.151214]  print_report+0xd1/0x640
[   29.151576]  ? __virt_addr_valid+0x1db/0x2d0
[   29.152094]  ? kasan_complete_mode_report_info+0x2a/0x200
[   29.152635]  kasan_report+0x102/0x140
[   29.153022]  ? kasan_atomics_helper+0x151e/0x5450
[   29.153604]  ? kasan_atomics_helper+0x151e/0x5450
[   29.154026]  kasan_check_range+0x10c/0x1c0
[   29.154567]  __kasan_check_write+0x18/0x20
[   29.155131]  kasan_atomics_helper+0x151e/0x5450
[   29.155490]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   29.156104]  ? __kmalloc_cache_noprof+0x184/0x410
[   29.156461]  ? __schedule+0xc3e/0x2790
[   29.156957]  ? finish_task_switch.isra.0+0x153/0x700
[   29.157489]  ? kasan_atomics+0x153/0x310
[   29.157883]  kasan_atomics+0x1dd/0x310
[   29.158402]  ? __pfx_kasan_atomics+0x10/0x10
[   29.158806]  ? __pfx_read_tsc+0x10/0x10
[   29.159195]  ? ktime_get_ts64+0x86/0x230
[   29.159692]  kunit_try_run_case+0x1b3/0x490
[   29.160250]  ? __pfx_kunit_try_run_case+0x10/0x10
[   29.160654]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   29.161131]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   29.161571]  ? __kthread_parkme+0x82/0x160
[   29.162062]  ? preempt_count_sub+0x50/0x80
[   29.162396]  ? __pfx_kunit_try_run_case+0x10/0x10
[   29.162955]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   29.163648]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   29.164317]  kthread+0x257/0x310
[   29.164656]  ? __pfx_kthread+0x10/0x10
[   29.164988]  ret_from_fork+0x41/0x80
[   29.165266]  ? __pfx_kthread+0x10/0x10
[   29.165589]  ret_from_fork_asm+0x1a/0x30
[   29.166180]  </TASK>
[   29.166541] 
[   29.166808] Allocated by task 273:
[   29.167317]  kasan_save_stack+0x3d/0x60
[   29.167739]  kasan_save_track+0x18/0x40
[   29.168211]  kasan_save_alloc_info+0x3b/0x50
[   29.168738]  __kasan_kmalloc+0xb7/0xc0
[   29.169156]  __kmalloc_cache_noprof+0x184/0x410
[   29.169667]  kasan_atomics+0x96/0x310
[   29.170048]  kunit_try_run_case+0x1b3/0x490
[   29.170555]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   29.171089]  kthread+0x257/0x310
[   29.171437]  ret_from_fork+0x41/0x80
[   29.171963]  ret_from_fork_asm+0x1a/0x30
[   29.172389] 
[   29.172611] The buggy address belongs to the object at ffff888101afb700
[   29.172611]  which belongs to the cache kmalloc-64 of size 64
[   29.173649] The buggy address is located 0 bytes to the right of
[   29.173649]  allocated 48-byte region [ffff888101afb700, ffff888101afb730)
[   29.174363] 
[   29.174565] The buggy address belongs to the physical page:
[   29.175243] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101afb
[   29.176182] flags: 0x200000000000000(node=0|zone=2)
[   29.176713] page_type: f5(slab)
[   29.177097] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   29.177748] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   29.178384] page dumped because: kasan: bad access detected
[   29.178851] 
[   29.179135] Memory state around the buggy address:
[   29.179666]  ffff888101afb600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.180201]  ffff888101afb680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.180879] >ffff888101afb700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   29.181340]                                      ^
[   29.181890]  ffff888101afb780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.182771]  ffff888101afb800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.183367] ==================================================================
[   27.321718] ==================================================================
[   27.322432] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e0/0x5450
[   27.323070] Read of size 4 at addr ffff888101afb730 by task kunit_try_catch/273
[   27.324482] 
[   27.324690] CPU: 0 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241204 #1
[   27.326428] Tainted: [B]=BAD_PAGE, [N]=TEST
[   27.327065] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   27.328726] Call Trace:
[   27.328956]  <TASK>
[   27.329136]  dump_stack_lvl+0x73/0xb0
[   27.329472]  print_report+0xd1/0x640
[   27.329844]  ? __virt_addr_valid+0x1db/0x2d0
[   27.330792]  ? kasan_complete_mode_report_info+0x2a/0x200
[   27.332321]  kasan_report+0x102/0x140
[   27.332897]  ? kasan_atomics_helper+0x3e0/0x5450
[   27.333372]  ? kasan_atomics_helper+0x3e0/0x5450
[   27.333832]  kasan_check_range+0x10c/0x1c0
[   27.334530]  __kasan_check_read+0x15/0x20
[   27.335278]  kasan_atomics_helper+0x3e0/0x5450
[   27.336464]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   27.336837]  ? __kmalloc_cache_noprof+0x184/0x410
[   27.337802]  ? __schedule+0xc3e/0x2790
[   27.338481]  ? finish_task_switch.isra.0+0x153/0x700
[   27.338797]  ? kasan_atomics+0x153/0x310
[   27.339686]  kasan_atomics+0x1dd/0x310
[   27.340655]  ? __pfx_kasan_atomics+0x10/0x10
[   27.340971]  ? __pfx_read_tsc+0x10/0x10
[   27.341680]  ? ktime_get_ts64+0x86/0x230
[   27.342283]  kunit_try_run_case+0x1b3/0x490
[   27.343646]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.344083]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   27.344942]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   27.345933]  ? __kthread_parkme+0x82/0x160
[   27.346426]  ? preempt_count_sub+0x50/0x80
[   27.346663]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.347297]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   27.348591]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.350106]  kthread+0x257/0x310
[   27.351013]  ? __pfx_kthread+0x10/0x10
[   27.351648]  ret_from_fork+0x41/0x80
[   27.352066]  ? __pfx_kthread+0x10/0x10
[   27.352492]  ret_from_fork_asm+0x1a/0x30
[   27.353118]  </TASK>
[   27.354148] 
[   27.354507] Allocated by task 273:
[   27.354775]  kasan_save_stack+0x3d/0x60
[   27.355333]  kasan_save_track+0x18/0x40
[   27.355694]  kasan_save_alloc_info+0x3b/0x50
[   27.356330]  __kasan_kmalloc+0xb7/0xc0
[   27.356680]  __kmalloc_cache_noprof+0x184/0x410
[   27.357180]  kasan_atomics+0x96/0x310
[   27.357557]  kunit_try_run_case+0x1b3/0x490
[   27.358269]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.359051]  kthread+0x257/0x310
[   27.359569]  ret_from_fork+0x41/0x80
[   27.359887]  ret_from_fork_asm+0x1a/0x30
[   27.361015] 
[   27.361220] The buggy address belongs to the object at ffff888101afb700
[   27.361220]  which belongs to the cache kmalloc-64 of size 64
[   27.363152] The buggy address is located 0 bytes to the right of
[   27.363152]  allocated 48-byte region [ffff888101afb700, ffff888101afb730)
[   27.364895] 
[   27.365094] The buggy address belongs to the physical page:
[   27.365449] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101afb
[   27.367373] flags: 0x200000000000000(node=0|zone=2)
[   27.368029] page_type: f5(slab)
[   27.369346] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   27.370121] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   27.370844] page dumped because: kasan: bad access detected
[   27.372091] 
[   27.372439] Memory state around the buggy address:
[   27.373369]  ffff888101afb600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.375071]  ffff888101afb680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.376034] >ffff888101afb700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   27.376700]                                      ^
[   27.378239]  ffff888101afb780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.379390]  ffff888101afb800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.380499] ==================================================================
[   29.718012] ==================================================================
[   29.718814] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4f32/0x5450
[   29.719750] Read of size 8 at addr ffff888101afb730 by task kunit_try_catch/273
[   29.720513] 
[   29.720977] CPU: 0 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241204 #1
[   29.722076] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.723241] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   29.724076] Call Trace:
[   29.724297]  <TASK>
[   29.724832]  dump_stack_lvl+0x73/0xb0
[   29.725305]  print_report+0xd1/0x640
[   29.725807]  ? __virt_addr_valid+0x1db/0x2d0
[   29.726607]  ? kasan_complete_mode_report_info+0x2a/0x200
[   29.726999]  kasan_report+0x102/0x140
[   29.727548]  ? kasan_atomics_helper+0x4f32/0x5450
[   29.728211]  ? kasan_atomics_helper+0x4f32/0x5450
[   29.728718]  __asan_report_load8_noabort+0x18/0x20
[   29.729348]  kasan_atomics_helper+0x4f32/0x5450
[   29.729799]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   29.730392]  ? __kmalloc_cache_noprof+0x184/0x410
[   29.730970]  ? __schedule+0xc3e/0x2790
[   29.731288]  ? finish_task_switch.isra.0+0x153/0x700
[   29.731966]  ? kasan_atomics+0x153/0x310
[   29.732438]  kasan_atomics+0x1dd/0x310
[   29.732970]  ? __pfx_kasan_atomics+0x10/0x10
[   29.733518]  ? __pfx_read_tsc+0x10/0x10
[   29.733832]  ? ktime_get_ts64+0x86/0x230
[   29.734234]  kunit_try_run_case+0x1b3/0x490
[   29.734833]  ? __pfx_kunit_try_run_case+0x10/0x10
[   29.735715]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   29.736043]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   29.736713]  ? __kthread_parkme+0x82/0x160
[   29.737261]  ? preempt_count_sub+0x50/0x80
[   29.737664]  ? __pfx_kunit_try_run_case+0x10/0x10
[   29.738181]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   29.738766]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   29.739363]  kthread+0x257/0x310
[   29.739813]  ? __pfx_kthread+0x10/0x10
[   29.740335]  ret_from_fork+0x41/0x80
[   29.740770]  ? __pfx_kthread+0x10/0x10
[   29.741248]  ret_from_fork_asm+0x1a/0x30
[   29.741779]  </TASK>
[   29.742060] 
[   29.742369] Allocated by task 273:
[   29.742831]  kasan_save_stack+0x3d/0x60
[   29.743583]  kasan_save_track+0x18/0x40
[   29.743945]  kasan_save_alloc_info+0x3b/0x50
[   29.744546]  __kasan_kmalloc+0xb7/0xc0
[   29.744904]  __kmalloc_cache_noprof+0x184/0x410
[   29.745224]  kasan_atomics+0x96/0x310
[   29.745968]  kunit_try_run_case+0x1b3/0x490
[   29.746425]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   29.746999]  kthread+0x257/0x310
[   29.747445]  ret_from_fork+0x41/0x80
[   29.747831]  ret_from_fork_asm+0x1a/0x30
[   29.748305] 
[   29.748625] The buggy address belongs to the object at ffff888101afb700
[   29.748625]  which belongs to the cache kmalloc-64 of size 64
[   29.749653] The buggy address is located 0 bytes to the right of
[   29.749653]  allocated 48-byte region [ffff888101afb700, ffff888101afb730)
[   29.750838] 
[   29.751227] The buggy address belongs to the physical page:
[   29.751633] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101afb
[   29.752646] flags: 0x200000000000000(node=0|zone=2)
[   29.752977] page_type: f5(slab)
[   29.753319] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   29.754078] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   29.755138] page dumped because: kasan: bad access detected
[   29.755629] 
[   29.755936] Memory state around the buggy address:
[   29.756641]  ffff888101afb600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.757188]  ffff888101afb680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.757900] >ffff888101afb700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   29.759251]                                      ^
[   29.759642]  ffff888101afb780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.760434]  ffff888101afb800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.760915] ==================================================================
[   29.988119] ==================================================================
[   29.989550] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4f73/0x5450
[   29.990196] Read of size 8 at addr ffff888101afb730 by task kunit_try_catch/273
[   29.991757] 
[   29.992294] CPU: 0 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241204 #1
[   29.993623] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.994008] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   29.995334] Call Trace:
[   29.995579]  <TASK>
[   29.996348]  dump_stack_lvl+0x73/0xb0
[   29.996776]  print_report+0xd1/0x640
[   29.997377]  ? __virt_addr_valid+0x1db/0x2d0
[   29.998051]  ? kasan_complete_mode_report_info+0x2a/0x200
[   29.998535]  kasan_report+0x102/0x140
[   29.998903]  ? kasan_atomics_helper+0x4f73/0x5450
[   29.999822]  ? kasan_atomics_helper+0x4f73/0x5450
[   30.000326]  __asan_report_load8_noabort+0x18/0x20
[   30.000956]  kasan_atomics_helper+0x4f73/0x5450
[   30.001704]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   30.002398]  ? __kmalloc_cache_noprof+0x184/0x410
[   30.003004]  ? __schedule+0xc3e/0x2790
[   30.003497]  ? finish_task_switch.isra.0+0x153/0x700
[   30.004001]  ? kasan_atomics+0x153/0x310
[   30.004798]  kasan_atomics+0x1dd/0x310
[   30.005436]  ? __pfx_kasan_atomics+0x10/0x10
[   30.006084]  ? __pfx_read_tsc+0x10/0x10
[   30.006532]  ? ktime_get_ts64+0x86/0x230
[   30.006934]  kunit_try_run_case+0x1b3/0x490
[   30.007690]  ? __pfx_kunit_try_run_case+0x10/0x10
[   30.008032]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   30.008810]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   30.009725]  ? __kthread_parkme+0x82/0x160
[   30.010111]  ? preempt_count_sub+0x50/0x80
[   30.010708]  ? __pfx_kunit_try_run_case+0x10/0x10
[   30.011353]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   30.012118]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   30.012820]  kthread+0x257/0x310
[   30.013313]  ? __pfx_kthread+0x10/0x10
[   30.013959]  ret_from_fork+0x41/0x80
[   30.014440]  ? __pfx_kthread+0x10/0x10
[   30.015157]  ret_from_fork_asm+0x1a/0x30
[   30.015830]  </TASK>
[   30.015964] 
[   30.016147] Allocated by task 273:
[   30.017014]  kasan_save_stack+0x3d/0x60
[   30.017296]  kasan_save_track+0x18/0x40
[   30.017797]  kasan_save_alloc_info+0x3b/0x50
[   30.018706]  __kasan_kmalloc+0xb7/0xc0
[   30.018992]  __kmalloc_cache_noprof+0x184/0x410
[   30.019574]  kasan_atomics+0x96/0x310
[   30.020287]  kunit_try_run_case+0x1b3/0x490
[   30.020797]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   30.021705]  kthread+0x257/0x310
[   30.022245]  ret_from_fork+0x41/0x80
[   30.022747]  ret_from_fork_asm+0x1a/0x30
[   30.023400] 
[   30.023849] The buggy address belongs to the object at ffff888101afb700
[   30.023849]  which belongs to the cache kmalloc-64 of size 64
[   30.025189] The buggy address is located 0 bytes to the right of
[   30.025189]  allocated 48-byte region [ffff888101afb700, ffff888101afb730)
[   30.026720] 
[   30.026887] The buggy address belongs to the physical page:
[   30.027549] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101afb
[   30.028328] flags: 0x200000000000000(node=0|zone=2)
[   30.028816] page_type: f5(slab)
[   30.029290] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   30.030198] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   30.030894] page dumped because: kasan: bad access detected
[   30.031552] 
[   30.031753] Memory state around the buggy address:
[   30.032383]  ffff888101afb600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   30.033108]  ffff888101afb680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   30.033894] >ffff888101afb700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   30.034611]                                      ^
[   30.035187]  ffff888101afb780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.035907]  ffff888101afb800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.036452] ==================================================================
[   27.442669] ==================================================================
[   27.443961] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a1/0x5450
[   27.444305] Write of size 4 at addr ffff888101afb730 by task kunit_try_catch/273
[   27.445954] 
[   27.446441] CPU: 0 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241204 #1
[   27.447223] Tainted: [B]=BAD_PAGE, [N]=TEST
[   27.448030] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   27.449639] Call Trace:
[   27.450409]  <TASK>
[   27.450640]  dump_stack_lvl+0x73/0xb0
[   27.451006]  print_report+0xd1/0x640
[   27.451354]  ? __virt_addr_valid+0x1db/0x2d0
[   27.452057]  ? kasan_complete_mode_report_info+0x2a/0x200
[   27.453338]  kasan_report+0x102/0x140
[   27.454438]  ? kasan_atomics_helper+0x4a1/0x5450
[   27.455031]  ? kasan_atomics_helper+0x4a1/0x5450
[   27.455921]  kasan_check_range+0x10c/0x1c0
[   27.456867]  __kasan_check_write+0x18/0x20
[   27.457434]  kasan_atomics_helper+0x4a1/0x5450
[   27.458005]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   27.458460]  ? __kmalloc_cache_noprof+0x184/0x410
[   27.459206]  ? __schedule+0xc3e/0x2790
[   27.460161]  ? finish_task_switch.isra.0+0x153/0x700
[   27.460777]  ? kasan_atomics+0x153/0x310
[   27.461348]  kasan_atomics+0x1dd/0x310
[   27.462083]  ? __pfx_kasan_atomics+0x10/0x10
[   27.462466]  ? __pfx_read_tsc+0x10/0x10
[   27.463266]  ? ktime_get_ts64+0x86/0x230
[   27.464520]  kunit_try_run_case+0x1b3/0x490
[   27.465167]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.465884]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   27.466442]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   27.466916]  ? __kthread_parkme+0x82/0x160
[   27.467302]  ? preempt_count_sub+0x50/0x80
[   27.468062]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.468815]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   27.469525]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.470201]  kthread+0x257/0x310
[   27.471201]  ? __pfx_kthread+0x10/0x10
[   27.472023]  ret_from_fork+0x41/0x80
[   27.472708]  ? __pfx_kthread+0x10/0x10
[   27.473208]  ret_from_fork_asm+0x1a/0x30
[   27.473856]  </TASK>
[   27.474164] 
[   27.474943] Allocated by task 273:
[   27.475681]  kasan_save_stack+0x3d/0x60
[   27.476253]  kasan_save_track+0x18/0x40
[   27.477051]  kasan_save_alloc_info+0x3b/0x50
[   27.477723]  __kasan_kmalloc+0xb7/0xc0
[   27.478097]  __kmalloc_cache_noprof+0x184/0x410
[   27.478919]  kasan_atomics+0x96/0x310
[   27.479223]  kunit_try_run_case+0x1b3/0x490
[   27.479996]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.481119]  kthread+0x257/0x310
[   27.481711]  ret_from_fork+0x41/0x80
[   27.482678]  ret_from_fork_asm+0x1a/0x30
[   27.483698] 
[   27.484132] The buggy address belongs to the object at ffff888101afb700
[   27.484132]  which belongs to the cache kmalloc-64 of size 64
[   27.485886] The buggy address is located 0 bytes to the right of
[   27.485886]  allocated 48-byte region [ffff888101afb700, ffff888101afb730)
[   27.487861] 
[   27.488097] The buggy address belongs to the physical page:
[   27.489185] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101afb
[   27.490527] flags: 0x200000000000000(node=0|zone=2)
[   27.491042] page_type: f5(slab)
[   27.491469] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   27.492945] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   27.493429] page dumped because: kasan: bad access detected
[   27.494627] 
[   27.495265] Memory state around the buggy address:
[   27.496002]  ffff888101afb600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.496681]  ffff888101afb680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.497715] >ffff888101afb700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   27.498396]                                      ^
[   27.499179]  ffff888101afb780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.500002]  ffff888101afb800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.500608] ==================================================================
[   28.752215] ==================================================================
[   28.753454] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1218/0x5450
[   28.754222] Write of size 4 at addr ffff888101afb730 by task kunit_try_catch/273
[   28.754866] 
[   28.755152] CPU: 0 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241204 #1
[   28.756486] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.756773] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   28.757568] Call Trace:
[   28.757891]  <TASK>
[   28.758577]  dump_stack_lvl+0x73/0xb0
[   28.758967]  print_report+0xd1/0x640
[   28.759331]  ? __virt_addr_valid+0x1db/0x2d0
[   28.759745]  ? kasan_complete_mode_report_info+0x2a/0x200
[   28.760661]  kasan_report+0x102/0x140
[   28.761009]  ? kasan_atomics_helper+0x1218/0x5450
[   28.761385]  ? kasan_atomics_helper+0x1218/0x5450
[   28.762043]  kasan_check_range+0x10c/0x1c0
[   28.762478]  __kasan_check_write+0x18/0x20
[   28.762966]  kasan_atomics_helper+0x1218/0x5450
[   28.763803]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   28.764360]  ? __kmalloc_cache_noprof+0x184/0x410
[   28.765054]  ? __schedule+0xc3e/0x2790
[   28.765576]  ? finish_task_switch.isra.0+0x153/0x700
[   28.766604]  ? kasan_atomics+0x153/0x310
[   28.767258]  kasan_atomics+0x1dd/0x310
[   28.767851]  ? __pfx_kasan_atomics+0x10/0x10
[   28.768292]  ? __pfx_read_tsc+0x10/0x10
[   28.768653]  ? ktime_get_ts64+0x86/0x230
[   28.769647]  kunit_try_run_case+0x1b3/0x490
[   28.770181]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.770845]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   28.771740]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   28.772520]  ? __kthread_parkme+0x82/0x160
[   28.772952]  ? preempt_count_sub+0x50/0x80
[   28.773786]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.774928]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   28.775826]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.776716]  kthread+0x257/0x310
[   28.777265]  ? __pfx_kthread+0x10/0x10
[   28.777731]  ret_from_fork+0x41/0x80
[   28.778667]  ? __pfx_kthread+0x10/0x10
[   28.779224]  ret_from_fork_asm+0x1a/0x30
[   28.779782]  </TASK>
[   28.780001] 
[   28.780391] Allocated by task 273:
[   28.780810]  kasan_save_stack+0x3d/0x60
[   28.781603]  kasan_save_track+0x18/0x40
[   28.782364]  kasan_save_alloc_info+0x3b/0x50
[   28.783136]  __kasan_kmalloc+0xb7/0xc0
[   28.783550]  __kmalloc_cache_noprof+0x184/0x410
[   28.784580]  kasan_atomics+0x96/0x310
[   28.785519]  kunit_try_run_case+0x1b3/0x490
[   28.786333]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.786701]  kthread+0x257/0x310
[   28.787112]  ret_from_fork+0x41/0x80
[   28.787735]  ret_from_fork_asm+0x1a/0x30
[   28.788183] 
[   28.788472] The buggy address belongs to the object at ffff888101afb700
[   28.788472]  which belongs to the cache kmalloc-64 of size 64
[   28.789465] The buggy address is located 0 bytes to the right of
[   28.789465]  allocated 48-byte region [ffff888101afb700, ffff888101afb730)
[   28.790751] 
[   28.791042] The buggy address belongs to the physical page:
[   28.791393] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101afb
[   28.792328] flags: 0x200000000000000(node=0|zone=2)
[   28.792686] page_type: f5(slab)
[   28.792988] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   28.793889] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   28.794480] page dumped because: kasan: bad access detected
[   28.795311] 
[   28.795593] Memory state around the buggy address:
[   28.795988]  ffff888101afb600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.796761]  ffff888101afb680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.797496] >ffff888101afb700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   28.797932]                                      ^
[   28.798716]  ffff888101afb780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.799322]  ffff888101afb800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.800072] ==================================================================
[   28.082572] ==================================================================
[   28.083488] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xac8/0x5450
[   28.085434] Write of size 4 at addr ffff888101afb730 by task kunit_try_catch/273
[   28.086445] 
[   28.086650] CPU: 0 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241204 #1
[   28.088177] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.088625] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   28.089605] Call Trace:
[   28.090005]  <TASK>
[   28.090414]  dump_stack_lvl+0x73/0xb0
[   28.090981]  print_report+0xd1/0x640
[   28.091642]  ? __virt_addr_valid+0x1db/0x2d0
[   28.092343]  ? kasan_complete_mode_report_info+0x2a/0x200
[   28.092823]  kasan_report+0x102/0x140
[   28.093667]  ? kasan_atomics_helper+0xac8/0x5450
[   28.094341]  ? kasan_atomics_helper+0xac8/0x5450
[   28.095072]  kasan_check_range+0x10c/0x1c0
[   28.095901]  __kasan_check_write+0x18/0x20
[   28.096258]  kasan_atomics_helper+0xac8/0x5450
[   28.097007]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   28.098185]  ? __kmalloc_cache_noprof+0x184/0x410
[   28.098621]  ? __schedule+0xc3e/0x2790
[   28.099440]  ? finish_task_switch.isra.0+0x153/0x700
[   28.100061]  ? kasan_atomics+0x153/0x310
[   28.100516]  kasan_atomics+0x1dd/0x310
[   28.101631]  ? __pfx_kasan_atomics+0x10/0x10
[   28.102036]  ? __pfx_read_tsc+0x10/0x10
[   28.102460]  ? ktime_get_ts64+0x86/0x230
[   28.103169]  kunit_try_run_case+0x1b3/0x490
[   28.103914]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.104347]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   28.105030]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   28.105639]  ? __kthread_parkme+0x82/0x160
[   28.106285]  ? preempt_count_sub+0x50/0x80
[   28.106746]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.107304]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   28.108013]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.108578]  kthread+0x257/0x310
[   28.108999]  ? __pfx_kthread+0x10/0x10
[   28.109438]  ret_from_fork+0x41/0x80
[   28.109896]  ? __pfx_kthread+0x10/0x10
[   28.110406]  ret_from_fork_asm+0x1a/0x30
[   28.110736]  </TASK>
[   28.111241] 
[   28.111423] Allocated by task 273:
[   28.111631]  kasan_save_stack+0x3d/0x60
[   28.111888]  kasan_save_track+0x18/0x40
[   28.112598]  kasan_save_alloc_info+0x3b/0x50
[   28.113464]  __kasan_kmalloc+0xb7/0xc0
[   28.114134]  __kmalloc_cache_noprof+0x184/0x410
[   28.115065]  kasan_atomics+0x96/0x310
[   28.115713]  kunit_try_run_case+0x1b3/0x490
[   28.116139]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.116726]  kthread+0x257/0x310
[   28.117202]  ret_from_fork+0x41/0x80
[   28.117623]  ret_from_fork_asm+0x1a/0x30
[   28.118085] 
[   28.118403] The buggy address belongs to the object at ffff888101afb700
[   28.118403]  which belongs to the cache kmalloc-64 of size 64
[   28.119438] The buggy address is located 0 bytes to the right of
[   28.119438]  allocated 48-byte region [ffff888101afb700, ffff888101afb730)
[   28.120542] 
[   28.120800] The buggy address belongs to the physical page:
[   28.121393] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101afb
[   28.122010] flags: 0x200000000000000(node=0|zone=2)
[   28.122588] page_type: f5(slab)
[   28.122887] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   28.123852] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   28.124576] page dumped because: kasan: bad access detected
[   28.125218] 
[   28.125551] Memory state around the buggy address:
[   28.126020]  ffff888101afb600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.126944]  ffff888101afb680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.127572] >ffff888101afb700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   28.128227]                                      ^
[   28.128951]  ffff888101afb780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.129405]  ffff888101afb800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.130090] ==================================================================
[   28.325783] ==================================================================
[   28.326879] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xde1/0x5450
[   28.327627] Write of size 4 at addr ffff888101afb730 by task kunit_try_catch/273
[   28.328511] 
[   28.328746] CPU: 0 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241204 #1
[   28.329757] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.330271] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   28.331131] Call Trace:
[   28.331419]  <TASK>
[   28.331745]  dump_stack_lvl+0x73/0xb0
[   28.332242]  print_report+0xd1/0x640
[   28.332617]  ? __virt_addr_valid+0x1db/0x2d0
[   28.332959]  ? kasan_complete_mode_report_info+0x2a/0x200
[   28.333627]  kasan_report+0x102/0x140
[   28.334148]  ? kasan_atomics_helper+0xde1/0x5450
[   28.334701]  ? kasan_atomics_helper+0xde1/0x5450
[   28.335200]  kasan_check_range+0x10c/0x1c0
[   28.335700]  __kasan_check_write+0x18/0x20
[   28.336163]  kasan_atomics_helper+0xde1/0x5450
[   28.336585]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   28.337152]  ? __kmalloc_cache_noprof+0x184/0x410
[   28.337537]  ? __schedule+0xc3e/0x2790
[   28.338087]  ? finish_task_switch.isra.0+0x153/0x700
[   28.338674]  ? kasan_atomics+0x153/0x310
[   28.339277]  kasan_atomics+0x1dd/0x310
[   28.339624]  ? __pfx_kasan_atomics+0x10/0x10
[   28.340178]  ? __pfx_read_tsc+0x10/0x10
[   28.340589]  ? ktime_get_ts64+0x86/0x230
[   28.341015]  kunit_try_run_case+0x1b3/0x490
[   28.341460]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.341983]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   28.342537]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   28.342966]  ? __kthread_parkme+0x82/0x160
[   28.343445]  ? preempt_count_sub+0x50/0x80
[   28.343755]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.344253]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   28.345055]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.345728]  kthread+0x257/0x310
[   28.346182]  ? __pfx_kthread+0x10/0x10
[   28.346542]  ret_from_fork+0x41/0x80
[   28.347015]  ? __pfx_kthread+0x10/0x10
[   28.347337]  ret_from_fork_asm+0x1a/0x30
[   28.347883]  </TASK>
[   28.348181] 
[   28.348384] Allocated by task 273:
[   28.348780]  kasan_save_stack+0x3d/0x60
[   28.349201]  kasan_save_track+0x18/0x40
[   28.349516]  kasan_save_alloc_info+0x3b/0x50
[   28.349873]  __kasan_kmalloc+0xb7/0xc0
[   28.350275]  __kmalloc_cache_noprof+0x184/0x410
[   28.350895]  kasan_atomics+0x96/0x310
[   28.351390]  kunit_try_run_case+0x1b3/0x490
[   28.351932]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.353524]  kthread+0x257/0x310
[   28.354027]  ret_from_fork+0x41/0x80
[   28.354343]  ret_from_fork_asm+0x1a/0x30
[   28.354775] 
[   28.355685] The buggy address belongs to the object at ffff888101afb700
[   28.355685]  which belongs to the cache kmalloc-64 of size 64
[   28.357167] The buggy address is located 0 bytes to the right of
[   28.357167]  allocated 48-byte region [ffff888101afb700, ffff888101afb730)
[   28.358385] 
[   28.358678] The buggy address belongs to the physical page:
[   28.359256] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101afb
[   28.359979] flags: 0x200000000000000(node=0|zone=2)
[   28.360347] page_type: f5(slab)
[   28.360768] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   28.361345] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   28.362116] page dumped because: kasan: bad access detected
[   28.362488] 
[   28.362724] Memory state around the buggy address:
[   28.363278]  ffff888101afb600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.363764]  ffff888101afb680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.364579] >ffff888101afb700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   28.365250]                                      ^
[   28.365711]  ffff888101afb780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.366305]  ffff888101afb800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.367001] ==================================================================
[   29.464204] ==================================================================
[   29.465711] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x194b/0x5450
[   29.467590] Write of size 8 at addr ffff888101afb730 by task kunit_try_catch/273
[   29.468595] 
[   29.468843] CPU: 0 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241204 #1
[   29.469751] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.469939] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   29.470719] Call Trace:
[   29.471106]  <TASK>
[   29.471476]  dump_stack_lvl+0x73/0xb0
[   29.472218]  print_report+0xd1/0x640
[   29.472730]  ? __virt_addr_valid+0x1db/0x2d0
[   29.473781]  ? kasan_complete_mode_report_info+0x2a/0x200
[   29.474436]  kasan_report+0x102/0x140
[   29.474659]  ? kasan_atomics_helper+0x194b/0x5450
[   29.474877]  ? kasan_atomics_helper+0x194b/0x5450
[   29.475204]  kasan_check_range+0x10c/0x1c0
[   29.475927]  __kasan_check_write+0x18/0x20
[   29.476907]  kasan_atomics_helper+0x194b/0x5450
[   29.477578]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   29.478166]  ? __kmalloc_cache_noprof+0x184/0x410
[   29.478664]  ? __schedule+0xc3e/0x2790
[   29.479289]  ? finish_task_switch.isra.0+0x153/0x700
[   29.479752]  ? kasan_atomics+0x153/0x310
[   29.480544]  kasan_atomics+0x1dd/0x310
[   29.481171]  ? __pfx_kasan_atomics+0x10/0x10
[   29.481697]  ? __pfx_read_tsc+0x10/0x10
[   29.482015]  ? ktime_get_ts64+0x86/0x230
[   29.482534]  kunit_try_run_case+0x1b3/0x490
[   29.482956]  ? __pfx_kunit_try_run_case+0x10/0x10
[   29.483368]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   29.483920]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   29.484442]  ? __kthread_parkme+0x82/0x160
[   29.484807]  ? preempt_count_sub+0x50/0x80
[   29.485386]  ? __pfx_kunit_try_run_case+0x10/0x10
[   29.485930]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   29.486814]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   29.487571]  kthread+0x257/0x310
[   29.487992]  ? __pfx_kthread+0x10/0x10
[   29.488497]  ret_from_fork+0x41/0x80
[   29.489159]  ? __pfx_kthread+0x10/0x10
[   29.489458]  ret_from_fork_asm+0x1a/0x30
[   29.490249]  </TASK>
[   29.490736] 
[   29.490951] Allocated by task 273:
[   29.491832]  kasan_save_stack+0x3d/0x60
[   29.492218]  kasan_save_track+0x18/0x40
[   29.492805]  kasan_save_alloc_info+0x3b/0x50
[   29.493171]  __kasan_kmalloc+0xb7/0xc0
[   29.493625]  __kmalloc_cache_noprof+0x184/0x410
[   29.494241]  kasan_atomics+0x96/0x310
[   29.494685]  kunit_try_run_case+0x1b3/0x490
[   29.495015]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   29.495710]  kthread+0x257/0x310
[   29.496453]  ret_from_fork+0x41/0x80
[   29.496885]  ret_from_fork_asm+0x1a/0x30
[   29.497579] 
[   29.497739] The buggy address belongs to the object at ffff888101afb700
[   29.497739]  which belongs to the cache kmalloc-64 of size 64
[   29.498808] The buggy address is located 0 bytes to the right of
[   29.498808]  allocated 48-byte region [ffff888101afb700, ffff888101afb730)
[   29.500371] 
[   29.500643] The buggy address belongs to the physical page:
[   29.501077] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101afb
[   29.501970] flags: 0x200000000000000(node=0|zone=2)
[   29.502675] page_type: f5(slab)
[   29.502951] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   29.503823] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   29.504348] page dumped because: kasan: bad access detected
[   29.505282] 
[   29.505589] Memory state around the buggy address:
[   29.506012]  ffff888101afb600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.506782]  ffff888101afb680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.507368] >ffff888101afb700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   29.508148]                                      ^
[   29.508622]  ffff888101afb780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.509289]  ffff888101afb800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.510312] ==================================================================
[   28.619540] ==================================================================
[   28.620192] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a1e/0x5450
[   28.621248] Read of size 4 at addr ffff888101afb730 by task kunit_try_catch/273
[   28.622298] 
[   28.622561] CPU: 0 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241204 #1
[   28.623727] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.624745] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   28.625918] Call Trace:
[   28.626311]  <TASK>
[   28.626506]  dump_stack_lvl+0x73/0xb0
[   28.626729]  print_report+0xd1/0x640
[   28.626962]  ? __virt_addr_valid+0x1db/0x2d0
[   28.627739]  ? kasan_complete_mode_report_info+0x2a/0x200
[   28.628597]  kasan_report+0x102/0x140
[   28.628960]  ? kasan_atomics_helper+0x4a1e/0x5450
[   28.629464]  ? kasan_atomics_helper+0x4a1e/0x5450
[   28.629815]  __asan_report_load4_noabort+0x18/0x20
[   28.630484]  kasan_atomics_helper+0x4a1e/0x5450
[   28.630910]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   28.631631]  ? __kmalloc_cache_noprof+0x184/0x410
[   28.632400]  ? __schedule+0xc3e/0x2790
[   28.632837]  ? finish_task_switch.isra.0+0x153/0x700
[   28.633894]  ? kasan_atomics+0x153/0x310
[   28.634293]  kasan_atomics+0x1dd/0x310
[   28.634675]  ? __pfx_kasan_atomics+0x10/0x10
[   28.635109]  ? __pfx_read_tsc+0x10/0x10
[   28.635645]  ? ktime_get_ts64+0x86/0x230
[   28.636170]  kunit_try_run_case+0x1b3/0x490
[   28.636602]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.637382]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   28.637810]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   28.638650]  ? __kthread_parkme+0x82/0x160
[   28.639309]  ? preempt_count_sub+0x50/0x80
[   28.639955]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.640563]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   28.641264]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.641992]  kthread+0x257/0x310
[   28.642232]  ? __pfx_kthread+0x10/0x10
[   28.642955]  ret_from_fork+0x41/0x80
[   28.643477]  ? __pfx_kthread+0x10/0x10
[   28.643982]  ret_from_fork_asm+0x1a/0x30
[   28.644597]  </TASK>
[   28.645062] 
[   28.645296] Allocated by task 273:
[   28.645765]  kasan_save_stack+0x3d/0x60
[   28.646307]  kasan_save_track+0x18/0x40
[   28.646936]  kasan_save_alloc_info+0x3b/0x50
[   28.647634]  __kasan_kmalloc+0xb7/0xc0
[   28.648140]  __kmalloc_cache_noprof+0x184/0x410
[   28.648738]  kasan_atomics+0x96/0x310
[   28.649283]  kunit_try_run_case+0x1b3/0x490
[   28.649851]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.650534]  kthread+0x257/0x310
[   28.651098]  ret_from_fork+0x41/0x80
[   28.651527]  ret_from_fork_asm+0x1a/0x30
[   28.652106] 
[   28.652358] The buggy address belongs to the object at ffff888101afb700
[   28.652358]  which belongs to the cache kmalloc-64 of size 64
[   28.653379] The buggy address is located 0 bytes to the right of
[   28.653379]  allocated 48-byte region [ffff888101afb700, ffff888101afb730)
[   28.654612] 
[   28.654897] The buggy address belongs to the physical page:
[   28.655528] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101afb
[   28.656273] flags: 0x200000000000000(node=0|zone=2)
[   28.656666] page_type: f5(slab)
[   28.657005] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   28.657681] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   28.658622] page dumped because: kasan: bad access detected
[   28.659104] 
[   28.659360] Memory state around the buggy address:
[   28.660126]  ffff888101afb600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.660663]  ffff888101afb680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.661484] >ffff888101afb700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   28.662226]                                      ^
[   28.662820]  ffff888101afb780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.663567]  ffff888101afb800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.664327] ==================================================================
[   27.900836] ==================================================================
[   27.901428] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x8fa/0x5450
[   27.902404] Write of size 4 at addr ffff888101afb730 by task kunit_try_catch/273
[   27.903134] 
[   27.903596] CPU: 0 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241204 #1
[   27.904464] Tainted: [B]=BAD_PAGE, [N]=TEST
[   27.905136] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   27.906023] Call Trace:
[   27.906240]  <TASK>
[   27.907395]  dump_stack_lvl+0x73/0xb0
[   27.907855]  print_report+0xd1/0x640
[   27.908294]  ? __virt_addr_valid+0x1db/0x2d0
[   27.909201]  ? kasan_complete_mode_report_info+0x2a/0x200
[   27.909696]  kasan_report+0x102/0x140
[   27.910560]  ? kasan_atomics_helper+0x8fa/0x5450
[   27.911154]  ? kasan_atomics_helper+0x8fa/0x5450
[   27.911727]  kasan_check_range+0x10c/0x1c0
[   27.912249]  __kasan_check_write+0x18/0x20
[   27.913024]  kasan_atomics_helper+0x8fa/0x5450
[   27.913404]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   27.914930]  ? __kmalloc_cache_noprof+0x184/0x410
[   27.915557]  ? __schedule+0xc3e/0x2790
[   27.916240]  ? finish_task_switch.isra.0+0x153/0x700
[   27.916832]  ? kasan_atomics+0x153/0x310
[   27.917685]  kasan_atomics+0x1dd/0x310
[   27.918276]  ? __pfx_kasan_atomics+0x10/0x10
[   27.918908]  ? __pfx_read_tsc+0x10/0x10
[   27.919474]  ? ktime_get_ts64+0x86/0x230
[   27.919819]  kunit_try_run_case+0x1b3/0x490
[   27.920770]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.921567]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   27.922190]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   27.922789]  ? __kthread_parkme+0x82/0x160
[   27.923977]  ? preempt_count_sub+0x50/0x80
[   27.924272]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.924912]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   27.925755]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.926749]  kthread+0x257/0x310
[   27.927278]  ? __pfx_kthread+0x10/0x10
[   27.928035]  ret_from_fork+0x41/0x80
[   27.928430]  ? __pfx_kthread+0x10/0x10
[   27.928861]  ret_from_fork_asm+0x1a/0x30
[   27.930139]  </TASK>
[   27.930967] 
[   27.931112] Allocated by task 273:
[   27.931303]  kasan_save_stack+0x3d/0x60
[   27.931853]  kasan_save_track+0x18/0x40
[   27.933511]  kasan_save_alloc_info+0x3b/0x50
[   27.934088]  __kasan_kmalloc+0xb7/0xc0
[   27.935230]  __kmalloc_cache_noprof+0x184/0x410
[   27.936581]  kasan_atomics+0x96/0x310
[   27.937163]  kunit_try_run_case+0x1b3/0x490
[   27.937499]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.938964]  kthread+0x257/0x310
[   27.939286]  ret_from_fork+0x41/0x80
[   27.940704]  ret_from_fork_asm+0x1a/0x30
[   27.941195] 
[   27.941587] The buggy address belongs to the object at ffff888101afb700
[   27.941587]  which belongs to the cache kmalloc-64 of size 64
[   27.943044] The buggy address is located 0 bytes to the right of
[   27.943044]  allocated 48-byte region [ffff888101afb700, ffff888101afb730)
[   27.944466] 
[   27.945230] The buggy address belongs to the physical page:
[   27.946485] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101afb
[   27.947591] flags: 0x200000000000000(node=0|zone=2)
[   27.948265] page_type: f5(slab)
[   27.948588] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   27.949568] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   27.950268] page dumped because: kasan: bad access detected
[   27.952120] 
[   27.952489] Memory state around the buggy address:
[   27.953084]  ffff888101afb600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.954063]  ffff888101afb680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.954811] >ffff888101afb700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   27.955728]                                      ^
[   27.956558]  ffff888101afb780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.957905]  ffff888101afb800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.958729] ==================================================================
[   29.049756] ==================================================================
[   29.050153] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1468/0x5450
[   29.051296] Write of size 8 at addr ffff888101afb730 by task kunit_try_catch/273
[   29.053192] 
[   29.053553] CPU: 0 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241204 #1
[   29.055264] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.055651] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   29.056960] Call Trace:
[   29.057306]  <TASK>
[   29.057840]  dump_stack_lvl+0x73/0xb0
[   29.058294]  print_report+0xd1/0x640
[   29.058735]  ? __virt_addr_valid+0x1db/0x2d0
[   29.059789]  ? kasan_complete_mode_report_info+0x2a/0x200
[   29.060363]  kasan_report+0x102/0x140
[   29.061048]  ? kasan_atomics_helper+0x1468/0x5450
[   29.061729]  ? kasan_atomics_helper+0x1468/0x5450
[   29.062271]  kasan_check_range+0x10c/0x1c0
[   29.062507]  __kasan_check_write+0x18/0x20
[   29.062704]  kasan_atomics_helper+0x1468/0x5450
[   29.062922]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   29.063459]  ? __kmalloc_cache_noprof+0x184/0x410
[   29.064066]  ? __schedule+0xc3e/0x2790
[   29.064513]  ? finish_task_switch.isra.0+0x153/0x700
[   29.065227]  ? kasan_atomics+0x153/0x310
[   29.065711]  kasan_atomics+0x1dd/0x310
[   29.066389]  ? __pfx_kasan_atomics+0x10/0x10
[   29.067099]  ? __pfx_read_tsc+0x10/0x10
[   29.067502]  ? ktime_get_ts64+0x86/0x230
[   29.068170]  kunit_try_run_case+0x1b3/0x490
[   29.068912]  ? __pfx_kunit_try_run_case+0x10/0x10
[   29.069571]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   29.070283]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   29.070886]  ? __kthread_parkme+0x82/0x160
[   29.071514]  ? preempt_count_sub+0x50/0x80
[   29.072274]  ? __pfx_kunit_try_run_case+0x10/0x10
[   29.072715]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   29.073285]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   29.074461]  kthread+0x257/0x310
[   29.075003]  ? __pfx_kthread+0x10/0x10
[   29.075553]  ret_from_fork+0x41/0x80
[   29.076159]  ? __pfx_kthread+0x10/0x10
[   29.076703]  ret_from_fork_asm+0x1a/0x30
[   29.077241]  </TASK>
[   29.077483] 
[   29.077737] Allocated by task 273:
[   29.078539]  kasan_save_stack+0x3d/0x60
[   29.078816]  kasan_save_track+0x18/0x40
[   29.079692]  kasan_save_alloc_info+0x3b/0x50
[   29.080461]  __kasan_kmalloc+0xb7/0xc0
[   29.080881]  __kmalloc_cache_noprof+0x184/0x410
[   29.081745]  kasan_atomics+0x96/0x310
[   29.082140]  kunit_try_run_case+0x1b3/0x490
[   29.082624]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   29.083349]  kthread+0x257/0x310
[   29.083609]  ret_from_fork+0x41/0x80
[   29.084095]  ret_from_fork_asm+0x1a/0x30
[   29.084509] 
[   29.084750] The buggy address belongs to the object at ffff888101afb700
[   29.084750]  which belongs to the cache kmalloc-64 of size 64
[   29.086416] The buggy address is located 0 bytes to the right of
[   29.086416]  allocated 48-byte region [ffff888101afb700, ffff888101afb730)
[   29.088321] 
[   29.088543] The buggy address belongs to the physical page:
[   29.088862] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101afb
[   29.090012] flags: 0x200000000000000(node=0|zone=2)
[   29.090306] page_type: f5(slab)
[   29.090520] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   29.091153] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   29.092174] page dumped because: kasan: bad access detected
[   29.092823] 
[   29.093063] Memory state around the buggy address:
[   29.094391]  ffff888101afb600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.094945]  ffff888101afb680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.096138] >ffff888101afb700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   29.097241]                                      ^
[   29.097596]  ffff888101afb780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.098865]  ffff888101afb800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.099430] ==================================================================
[   28.022552] ==================================================================
[   28.023052] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa2c/0x5450
[   28.024134] Write of size 4 at addr ffff888101afb730 by task kunit_try_catch/273
[   28.025361] 
[   28.025587] CPU: 0 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241204 #1
[   28.028260] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.028846] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   28.030083] Call Trace:
[   28.030569]  <TASK>
[   28.031209]  dump_stack_lvl+0x73/0xb0
[   28.032163]  print_report+0xd1/0x640
[   28.033079]  ? __virt_addr_valid+0x1db/0x2d0
[   28.033901]  ? kasan_complete_mode_report_info+0x2a/0x200
[   28.034614]  kasan_report+0x102/0x140
[   28.034994]  ? kasan_atomics_helper+0xa2c/0x5450
[   28.035530]  ? kasan_atomics_helper+0xa2c/0x5450
[   28.036089]  kasan_check_range+0x10c/0x1c0
[   28.036884]  __kasan_check_write+0x18/0x20
[   28.037684]  kasan_atomics_helper+0xa2c/0x5450
[   28.038781]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   28.039533]  ? __kmalloc_cache_noprof+0x184/0x410
[   28.040214]  ? __schedule+0xc3e/0x2790
[   28.041002]  ? finish_task_switch.isra.0+0x153/0x700
[   28.041678]  ? kasan_atomics+0x153/0x310
[   28.042281]  kasan_atomics+0x1dd/0x310
[   28.043206]  ? __pfx_kasan_atomics+0x10/0x10
[   28.044117]  ? __pfx_read_tsc+0x10/0x10
[   28.044585]  ? ktime_get_ts64+0x86/0x230
[   28.045060]  kunit_try_run_case+0x1b3/0x490
[   28.045761]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.046197]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   28.046792]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   28.047505]  ? __kthread_parkme+0x82/0x160
[   28.047886]  ? preempt_count_sub+0x50/0x80
[   28.049140]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.049863]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   28.050862]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.051726]  kthread+0x257/0x310
[   28.052116]  ? __pfx_kthread+0x10/0x10
[   28.053077]  ret_from_fork+0x41/0x80
[   28.053649]  ? __pfx_kthread+0x10/0x10
[   28.054614]  ret_from_fork_asm+0x1a/0x30
[   28.055525]  </TASK>
[   28.056020] 
[   28.056233] Allocated by task 273:
[   28.057182]  kasan_save_stack+0x3d/0x60
[   28.057702]  kasan_save_track+0x18/0x40
[   28.058671]  kasan_save_alloc_info+0x3b/0x50
[   28.059609]  __kasan_kmalloc+0xb7/0xc0
[   28.060898]  __kmalloc_cache_noprof+0x184/0x410
[   28.061356]  kasan_atomics+0x96/0x310
[   28.061959]  kunit_try_run_case+0x1b3/0x490
[   28.062532]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.063684]  kthread+0x257/0x310
[   28.064232]  ret_from_fork+0x41/0x80
[   28.064633]  ret_from_fork_asm+0x1a/0x30
[   28.065081] 
[   28.065311] The buggy address belongs to the object at ffff888101afb700
[   28.065311]  which belongs to the cache kmalloc-64 of size 64
[   28.067349] The buggy address is located 0 bytes to the right of
[   28.067349]  allocated 48-byte region [ffff888101afb700, ffff888101afb730)
[   28.069214] 
[   28.069797] The buggy address belongs to the physical page:
[   28.070649] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101afb
[   28.071101] flags: 0x200000000000000(node=0|zone=2)
[   28.071813] page_type: f5(slab)
[   28.072308] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   28.073511] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   28.074600] page dumped because: kasan: bad access detected
[   28.074986] 
[   28.075245] Memory state around the buggy address:
[   28.076017]  ffff888101afb600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.076698]  ffff888101afb680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.077427] >ffff888101afb700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   28.078116]                                      ^
[   28.078780]  ffff888101afb780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.079655]  ffff888101afb800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.080147] ==================================================================
[   30.087770] ==================================================================
[   30.088818] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4f9a/0x5450
[   30.089526] Read of size 8 at addr ffff888101afb730 by task kunit_try_catch/273
[   30.090359] 
[   30.090549] CPU: 0 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241204 #1
[   30.091473] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.092060] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   30.092740] Call Trace:
[   30.093169]  <TASK>
[   30.093550]  dump_stack_lvl+0x73/0xb0
[   30.093988]  print_report+0xd1/0x640
[   30.094417]  ? __virt_addr_valid+0x1db/0x2d0
[   30.094939]  ? kasan_complete_mode_report_info+0x2a/0x200
[   30.095671]  kasan_report+0x102/0x140
[   30.096172]  ? kasan_atomics_helper+0x4f9a/0x5450
[   30.096673]  ? kasan_atomics_helper+0x4f9a/0x5450
[   30.097257]  __asan_report_load8_noabort+0x18/0x20
[   30.097910]  kasan_atomics_helper+0x4f9a/0x5450
[   30.098303]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   30.098761]  ? __kmalloc_cache_noprof+0x184/0x410
[   30.099047]  ? __schedule+0xc3e/0x2790
[   30.099679]  ? finish_task_switch.isra.0+0x153/0x700
[   30.100427]  ? kasan_atomics+0x153/0x310
[   30.100854]  kasan_atomics+0x1dd/0x310
[   30.101154]  ? __pfx_kasan_atomics+0x10/0x10
[   30.101996]  ? __pfx_read_tsc+0x10/0x10
[   30.102507]  ? ktime_get_ts64+0x86/0x230
[   30.102897]  kunit_try_run_case+0x1b3/0x490
[   30.104486]  ? __pfx_kunit_try_run_case+0x10/0x10
[   30.105472]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   30.105822]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   30.106587]  ? __kthread_parkme+0x82/0x160
[   30.107634]  ? preempt_count_sub+0x50/0x80
[   30.107963]  ? __pfx_kunit_try_run_case+0x10/0x10
[   30.108684]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   30.109630]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   30.110656]  kthread+0x257/0x310
[   30.111019]  ? __pfx_kthread+0x10/0x10
[   30.111677]  ret_from_fork+0x41/0x80
[   30.112849]  ? __pfx_kthread+0x10/0x10
[   30.113287]  ret_from_fork_asm+0x1a/0x30
[   30.114018]  </TASK>
[   30.114397] 
[   30.114552] Allocated by task 273:
[   30.115083]  kasan_save_stack+0x3d/0x60
[   30.115553]  kasan_save_track+0x18/0x40
[   30.116087]  kasan_save_alloc_info+0x3b/0x50
[   30.116587]  __kasan_kmalloc+0xb7/0xc0
[   30.117023]  __kmalloc_cache_noprof+0x184/0x410
[   30.117736]  kasan_atomics+0x96/0x310
[   30.118216]  kunit_try_run_case+0x1b3/0x490
[   30.118659]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   30.119328]  kthread+0x257/0x310
[   30.119672]  ret_from_fork+0x41/0x80
[   30.120201]  ret_from_fork_asm+0x1a/0x30
[   30.120779] 
[   30.121070] The buggy address belongs to the object at ffff888101afb700
[   30.121070]  which belongs to the cache kmalloc-64 of size 64
[   30.121961] The buggy address is located 0 bytes to the right of
[   30.121961]  allocated 48-byte region [ffff888101afb700, ffff888101afb730)
[   30.123183] 
[   30.123499] The buggy address belongs to the physical page:
[   30.123958] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101afb
[   30.124742] flags: 0x200000000000000(node=0|zone=2)
[   30.125370] page_type: f5(slab)
[   30.125777] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   30.126609] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   30.127374] page dumped because: kasan: bad access detected
[   30.127938] 
[   30.128258] Memory state around the buggy address:
[   30.128734]  ffff888101afb600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   30.129398]  ffff888101afb680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   30.130179] >ffff888101afb700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   30.130743]                                      ^
[   30.131341]  ffff888101afb780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.132335]  ffff888101afb800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.133160] ==================================================================
[   28.998096] ==================================================================
[   28.998760] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4eb0/0x5450
[   28.999644] Read of size 8 at addr ffff888101afb730 by task kunit_try_catch/273
[   29.000324] 
[   29.000979] CPU: 0 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241204 #1
[   29.002098] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.002422] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   29.002828] Call Trace:
[   29.003151]  <TASK>
[   29.003663]  dump_stack_lvl+0x73/0xb0
[   29.004359]  print_report+0xd1/0x640
[   29.005082]  ? __virt_addr_valid+0x1db/0x2d0
[   29.005814]  ? kasan_complete_mode_report_info+0x2a/0x200
[   29.006626]  kasan_report+0x102/0x140
[   29.007720]  ? kasan_atomics_helper+0x4eb0/0x5450
[   29.008587]  ? kasan_atomics_helper+0x4eb0/0x5450
[   29.009073]  __asan_report_load8_noabort+0x18/0x20
[   29.009608]  kasan_atomics_helper+0x4eb0/0x5450
[   29.010491]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   29.010915]  ? __kmalloc_cache_noprof+0x184/0x410
[   29.011636]  ? __schedule+0xc3e/0x2790
[   29.012038]  ? finish_task_switch.isra.0+0x153/0x700
[   29.012557]  ? kasan_atomics+0x153/0x310
[   29.013254]  kasan_atomics+0x1dd/0x310
[   29.013862]  ? __pfx_kasan_atomics+0x10/0x10
[   29.014510]  ? __pfx_read_tsc+0x10/0x10
[   29.015673]  ? ktime_get_ts64+0x86/0x230
[   29.016226]  kunit_try_run_case+0x1b3/0x490
[   29.016723]  ? __pfx_kunit_try_run_case+0x10/0x10
[   29.017685]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   29.018125]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   29.018807]  ? __kthread_parkme+0x82/0x160
[   29.019884]  ? preempt_count_sub+0x50/0x80
[   29.020321]  ? __pfx_kunit_try_run_case+0x10/0x10
[   29.020952]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   29.021677]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   29.022501]  kthread+0x257/0x310
[   29.022747]  ? __pfx_kthread+0x10/0x10
[   29.023565]  ret_from_fork+0x41/0x80
[   29.023924]  ? __pfx_kthread+0x10/0x10
[   29.024389]  ret_from_fork_asm+0x1a/0x30
[   29.024785]  </TASK>
[   29.025115] 
[   29.025533] Allocated by task 273:
[   29.025824]  kasan_save_stack+0x3d/0x60
[   29.026934]  kasan_save_track+0x18/0x40
[   29.027341]  kasan_save_alloc_info+0x3b/0x50
[   29.027805]  __kasan_kmalloc+0xb7/0xc0
[   29.029136]  __kmalloc_cache_noprof+0x184/0x410
[   29.029794]  kasan_atomics+0x96/0x310
[   29.030566]  kunit_try_run_case+0x1b3/0x490
[   29.030982]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   29.031424]  kthread+0x257/0x310
[   29.031776]  ret_from_fork+0x41/0x80
[   29.032713]  ret_from_fork_asm+0x1a/0x30
[   29.033224] 
[   29.033397] The buggy address belongs to the object at ffff888101afb700
[   29.033397]  which belongs to the cache kmalloc-64 of size 64
[   29.035012] The buggy address is located 0 bytes to the right of
[   29.035012]  allocated 48-byte region [ffff888101afb700, ffff888101afb730)
[   29.036531] 
[   29.036690] The buggy address belongs to the physical page:
[   29.037679] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101afb
[   29.038551] flags: 0x200000000000000(node=0|zone=2)
[   29.038944] page_type: f5(slab)
[   29.039682] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   29.040583] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   29.041287] page dumped because: kasan: bad access detected
[   29.042078] 
[   29.042519] Memory state around the buggy address:
[   29.043265]  ffff888101afb600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.043912]  ffff888101afb680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.045083] >ffff888101afb700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   29.046067]                                      ^
[   29.046692]  ffff888101afb780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.047712]  ffff888101afb800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.048501] ==================================================================
[   28.178989] ==================================================================
[   28.180958] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xc71/0x5450
[   28.181877] Write of size 4 at addr ffff888101afb730 by task kunit_try_catch/273
[   28.182593] 
[   28.182907] CPU: 0 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241204 #1
[   28.184042] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.184527] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   28.185015] Call Trace:
[   28.185572]  <TASK>
[   28.186160]  dump_stack_lvl+0x73/0xb0
[   28.186652]  print_report+0xd1/0x640
[   28.187720]  ? __virt_addr_valid+0x1db/0x2d0
[   28.188305]  ? kasan_complete_mode_report_info+0x2a/0x200
[   28.188844]  kasan_report+0x102/0x140
[   28.189735]  ? kasan_atomics_helper+0xc71/0x5450
[   28.190505]  ? kasan_atomics_helper+0xc71/0x5450
[   28.191620]  kasan_check_range+0x10c/0x1c0
[   28.192179]  __kasan_check_write+0x18/0x20
[   28.192593]  kasan_atomics_helper+0xc71/0x5450
[   28.193639]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   28.194447]  ? __kmalloc_cache_noprof+0x184/0x410
[   28.195377]  ? __schedule+0xc3e/0x2790
[   28.195882]  ? finish_task_switch.isra.0+0x153/0x700
[   28.196429]  ? kasan_atomics+0x153/0x310
[   28.196880]  kasan_atomics+0x1dd/0x310
[   28.197284]  ? __pfx_kasan_atomics+0x10/0x10
[   28.197724]  ? __pfx_read_tsc+0x10/0x10
[   28.198277]  ? ktime_get_ts64+0x86/0x230
[   28.198933]  kunit_try_run_case+0x1b3/0x490
[   28.199304]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.199851]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   28.200271]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   28.201031]  ? __kthread_parkme+0x82/0x160
[   28.201411]  ? preempt_count_sub+0x50/0x80
[   28.202013]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.202421]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   28.203160]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.203650]  kthread+0x257/0x310
[   28.204226]  ? __pfx_kthread+0x10/0x10
[   28.204546]  ret_from_fork+0x41/0x80
[   28.205155]  ? __pfx_kthread+0x10/0x10
[   28.205624]  ret_from_fork_asm+0x1a/0x30
[   28.206219]  </TASK>
[   28.206631] 
[   28.206810] Allocated by task 273:
[   28.207105]  kasan_save_stack+0x3d/0x60
[   28.208272]  kasan_save_track+0x18/0x40
[   28.209015]  kasan_save_alloc_info+0x3b/0x50
[   28.209741]  __kasan_kmalloc+0xb7/0xc0
[   28.210467]  __kmalloc_cache_noprof+0x184/0x410
[   28.210783]  kasan_atomics+0x96/0x310
[   28.211444]  kunit_try_run_case+0x1b3/0x490
[   28.212634]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.213720]  kthread+0x257/0x310
[   28.214191]  ret_from_fork+0x41/0x80
[   28.214830]  ret_from_fork_asm+0x1a/0x30
[   28.215677] 
[   28.216084] The buggy address belongs to the object at ffff888101afb700
[   28.216084]  which belongs to the cache kmalloc-64 of size 64
[   28.217052] The buggy address is located 0 bytes to the right of
[   28.217052]  allocated 48-byte region [ffff888101afb700, ffff888101afb730)
[   28.218600] 
[   28.218816] The buggy address belongs to the physical page:
[   28.220070] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101afb
[   28.220866] flags: 0x200000000000000(node=0|zone=2)
[   28.221289] page_type: f5(slab)
[   28.221924] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   28.222721] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   28.223599] page dumped because: kasan: bad access detected
[   28.224154] 
[   28.224415] Memory state around the buggy address:
[   28.224954]  ffff888101afb600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.225580]  ffff888101afb680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.226235] >ffff888101afb700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   28.227048]                                      ^
[   28.227459]  ffff888101afb780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.228303]  ffff888101afb800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.229061] ==================================================================
[   28.277550] ==================================================================
[   28.278368] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xd48/0x5450
[   28.279163] Write of size 4 at addr ffff888101afb730 by task kunit_try_catch/273
[   28.279805] 
[   28.280317] CPU: 0 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241204 #1
[   28.282028] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.282577] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   28.283660] Call Trace:
[   28.284371]  <TASK>
[   28.284680]  dump_stack_lvl+0x73/0xb0
[   28.285100]  print_report+0xd1/0x640
[   28.285493]  ? __virt_addr_valid+0x1db/0x2d0
[   28.285927]  ? kasan_complete_mode_report_info+0x2a/0x200
[   28.286659]  kasan_report+0x102/0x140
[   28.287565]  ? kasan_atomics_helper+0xd48/0x5450
[   28.288284]  ? kasan_atomics_helper+0xd48/0x5450
[   28.288742]  kasan_check_range+0x10c/0x1c0
[   28.289469]  __kasan_check_write+0x18/0x20
[   28.290141]  kasan_atomics_helper+0xd48/0x5450
[   28.290620]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   28.291242]  ? __kmalloc_cache_noprof+0x184/0x410
[   28.291536]  ? __schedule+0xc3e/0x2790
[   28.291863]  ? finish_task_switch.isra.0+0x153/0x700
[   28.292542]  ? kasan_atomics+0x153/0x310
[   28.293559]  kasan_atomics+0x1dd/0x310
[   28.294138]  ? __pfx_kasan_atomics+0x10/0x10
[   28.294537]  ? __pfx_read_tsc+0x10/0x10
[   28.295018]  ? ktime_get_ts64+0x86/0x230
[   28.295463]  kunit_try_run_case+0x1b3/0x490
[   28.296038]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.296618]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   28.297142]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   28.297857]  ? __kthread_parkme+0x82/0x160
[   28.298341]  ? preempt_count_sub+0x50/0x80
[   28.298728]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.299324]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   28.300072]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.300617]  kthread+0x257/0x310
[   28.301208]  ? __pfx_kthread+0x10/0x10
[   28.301646]  ret_from_fork+0x41/0x80
[   28.302123]  ? __pfx_kthread+0x10/0x10
[   28.302438]  ret_from_fork_asm+0x1a/0x30
[   28.302967]  </TASK>
[   28.303444] 
[   28.303782] Allocated by task 273:
[   28.304052]  kasan_save_stack+0x3d/0x60
[   28.304686]  kasan_save_track+0x18/0x40
[   28.305163]  kasan_save_alloc_info+0x3b/0x50
[   28.305748]  __kasan_kmalloc+0xb7/0xc0
[   28.306042]  __kmalloc_cache_noprof+0x184/0x410
[   28.306362]  kasan_atomics+0x96/0x310
[   28.306872]  kunit_try_run_case+0x1b3/0x490
[   28.307785]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.308242]  kthread+0x257/0x310
[   28.308678]  ret_from_fork+0x41/0x80
[   28.309070]  ret_from_fork_asm+0x1a/0x30
[   28.309783] 
[   28.310164] The buggy address belongs to the object at ffff888101afb700
[   28.310164]  which belongs to the cache kmalloc-64 of size 64
[   28.310858] The buggy address is located 0 bytes to the right of
[   28.310858]  allocated 48-byte region [ffff888101afb700, ffff888101afb730)
[   28.312145] 
[   28.312337] The buggy address belongs to the physical page:
[   28.314329] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101afb
[   28.314995] flags: 0x200000000000000(node=0|zone=2)
[   28.315498] page_type: f5(slab)
[   28.315765] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   28.316739] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   28.318034] page dumped because: kasan: bad access detected
[   28.318496] 
[   28.318667] Memory state around the buggy address:
[   28.319512]  ffff888101afb600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.320861]  ffff888101afb680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.321956] >ffff888101afb700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   28.322449]                                      ^
[   28.322891]  ffff888101afb780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.323504]  ffff888101afb800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.324120] ==================================================================
[   27.961053] ==================================================================
[   27.962476] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x993/0x5450
[   27.963280] Write of size 4 at addr ffff888101afb730 by task kunit_try_catch/273
[   27.963999] 
[   27.964234] CPU: 0 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241204 #1
[   27.966012] Tainted: [B]=BAD_PAGE, [N]=TEST
[   27.966614] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   27.967436] Call Trace:
[   27.968134]  <TASK>
[   27.969060]  dump_stack_lvl+0x73/0xb0
[   27.970002]  print_report+0xd1/0x640
[   27.971059]  ? __virt_addr_valid+0x1db/0x2d0
[   27.972136]  ? kasan_complete_mode_report_info+0x2a/0x200
[   27.973119]  kasan_report+0x102/0x140
[   27.973934]  ? kasan_atomics_helper+0x993/0x5450
[   27.974744]  ? kasan_atomics_helper+0x993/0x5450
[   27.975746]  kasan_check_range+0x10c/0x1c0
[   27.976200]  __kasan_check_write+0x18/0x20
[   27.977016]  kasan_atomics_helper+0x993/0x5450
[   27.977891]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   27.978879]  ? __kmalloc_cache_noprof+0x184/0x410
[   27.979721]  ? __schedule+0xc3e/0x2790
[   27.980831]  ? finish_task_switch.isra.0+0x153/0x700
[   27.981287]  ? kasan_atomics+0x153/0x310
[   27.982107]  kasan_atomics+0x1dd/0x310
[   27.982632]  ? __pfx_kasan_atomics+0x10/0x10
[   27.983804]  ? __pfx_read_tsc+0x10/0x10
[   27.984181]  ? ktime_get_ts64+0x86/0x230
[   27.985856]  kunit_try_run_case+0x1b3/0x490
[   27.986292]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.987855]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   27.988317]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   27.989241]  ? __kthread_parkme+0x82/0x160
[   27.989570]  ? preempt_count_sub+0x50/0x80
[   27.990545]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.991418]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   27.992129]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.992797]  kthread+0x257/0x310
[   27.994182]  ? __pfx_kthread+0x10/0x10
[   27.994927]  ret_from_fork+0x41/0x80
[   27.995477]  ? __pfx_kthread+0x10/0x10
[   27.995700]  ret_from_fork_asm+0x1a/0x30
[   27.995917]  </TASK>
[   27.996041] 
[   27.996138] Allocated by task 273:
[   27.996295]  kasan_save_stack+0x3d/0x60
[   27.997084]  kasan_save_track+0x18/0x40
[   27.997809]  kasan_save_alloc_info+0x3b/0x50
[   27.998767]  __kasan_kmalloc+0xb7/0xc0
[   27.999507]  __kmalloc_cache_noprof+0x184/0x410
[   28.000520]  kasan_atomics+0x96/0x310
[   28.001504]  kunit_try_run_case+0x1b3/0x490
[   28.001826]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.002335]  kthread+0x257/0x310
[   28.002595]  ret_from_fork+0x41/0x80
[   28.003057]  ret_from_fork_asm+0x1a/0x30
[   28.003638] 
[   28.004041] The buggy address belongs to the object at ffff888101afb700
[   28.004041]  which belongs to the cache kmalloc-64 of size 64
[   28.006148] The buggy address is located 0 bytes to the right of
[   28.006148]  allocated 48-byte region [ffff888101afb700, ffff888101afb730)
[   28.008336] 
[   28.008757] The buggy address belongs to the physical page:
[   28.009256] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101afb
[   28.010621] flags: 0x200000000000000(node=0|zone=2)
[   28.011205] page_type: f5(slab)
[   28.011897] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   28.012788] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   28.014264] page dumped because: kasan: bad access detected
[   28.014831] 
[   28.015499] Memory state around the buggy address:
[   28.015946]  ffff888101afb600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.017130]  ffff888101afb680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.018062] >ffff888101afb700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   28.018449]                                      ^
[   28.019395]  ffff888101afb780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.020225]  ffff888101afb800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.021215] ==================================================================
[   30.222938] ==================================================================
[   30.223609] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x218b/0x5450
[   30.224328] Write of size 8 at addr ffff888101afb730 by task kunit_try_catch/273
[   30.225089] 
[   30.225403] CPU: 0 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241204 #1
[   30.226332] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.226636] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   30.227758] Call Trace:
[   30.228212]  <TASK>
[   30.228453]  dump_stack_lvl+0x73/0xb0
[   30.228966]  print_report+0xd1/0x640
[   30.229360]  ? __virt_addr_valid+0x1db/0x2d0
[   30.229957]  ? kasan_complete_mode_report_info+0x2a/0x200
[   30.230511]  kasan_report+0x102/0x140
[   30.230910]  ? kasan_atomics_helper+0x218b/0x5450
[   30.231634]  ? kasan_atomics_helper+0x218b/0x5450
[   30.232229]  kasan_check_range+0x10c/0x1c0
[   30.232787]  __kasan_check_write+0x18/0x20
[   30.233345]  kasan_atomics_helper+0x218b/0x5450
[   30.233821]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   30.234439]  ? __kmalloc_cache_noprof+0x184/0x410
[   30.235046]  ? __schedule+0xc3e/0x2790
[   30.235523]  ? finish_task_switch.isra.0+0x153/0x700
[   30.236059]  ? kasan_atomics+0x153/0x310
[   30.236622]  kasan_atomics+0x1dd/0x310
[   30.237238]  ? __pfx_kasan_atomics+0x10/0x10
[   30.237725]  ? __pfx_read_tsc+0x10/0x10
[   30.238154]  ? ktime_get_ts64+0x86/0x230
[   30.238751]  kunit_try_run_case+0x1b3/0x490
[   30.239266]  ? __pfx_kunit_try_run_case+0x10/0x10
[   30.239805]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   30.240290]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   30.240902]  ? __kthread_parkme+0x82/0x160
[   30.241434]  ? preempt_count_sub+0x50/0x80
[   30.241836]  ? __pfx_kunit_try_run_case+0x10/0x10
[   30.242393]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   30.243066]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   30.243673]  kthread+0x257/0x310
[   30.244229]  ? __pfx_kthread+0x10/0x10
[   30.244599]  ret_from_fork+0x41/0x80
[   30.245144]  ? __pfx_kthread+0x10/0x10
[   30.245661]  ret_from_fork_asm+0x1a/0x30
[   30.246215]  </TASK>
[   30.246520] 
[   30.246848] Allocated by task 273:
[   30.247195]  kasan_save_stack+0x3d/0x60
[   30.247759]  kasan_save_track+0x18/0x40
[   30.248216]  kasan_save_alloc_info+0x3b/0x50
[   30.248782]  __kasan_kmalloc+0xb7/0xc0
[   30.249276]  __kmalloc_cache_noprof+0x184/0x410
[   30.249713]  kasan_atomics+0x96/0x310
[   30.250326]  kunit_try_run_case+0x1b3/0x490
[   30.250718]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   30.251360]  kthread+0x257/0x310
[   30.251656]  ret_from_fork+0x41/0x80
[   30.252215]  ret_from_fork_asm+0x1a/0x30
[   30.252671] 
[   30.252967] The buggy address belongs to the object at ffff888101afb700
[   30.252967]  which belongs to the cache kmalloc-64 of size 64
[   30.254096] The buggy address is located 0 bytes to the right of
[   30.254096]  allocated 48-byte region [ffff888101afb700, ffff888101afb730)
[   30.255231] 
[   30.255541] The buggy address belongs to the physical page:
[   30.256083] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101afb
[   30.256840] flags: 0x200000000000000(node=0|zone=2)
[   30.257379] page_type: f5(slab)
[   30.257845] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   30.258547] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   30.259331] page dumped because: kasan: bad access detected
[   30.259903] 
[   30.260281] Memory state around the buggy address:
[   30.260616]  ffff888101afb600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   30.261376]  ffff888101afb680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   30.262184] >ffff888101afb700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   30.262776]                                      ^
[   30.263369]  ffff888101afb780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.264247]  ffff888101afb800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.264966] ==================================================================
[   27.735873] ==================================================================
[   27.736861] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x730/0x5450
[   27.738032] Write of size 4 at addr ffff888101afb730 by task kunit_try_catch/273
[   27.738896] 
[   27.739187] CPU: 0 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241204 #1
[   27.740415] Tainted: [B]=BAD_PAGE, [N]=TEST
[   27.740894] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   27.742322] Call Trace:
[   27.742725]  <TASK>
[   27.743001]  dump_stack_lvl+0x73/0xb0
[   27.743815]  print_report+0xd1/0x640
[   27.744410]  ? __virt_addr_valid+0x1db/0x2d0
[   27.745067]  ? kasan_complete_mode_report_info+0x2a/0x200
[   27.745610]  kasan_report+0x102/0x140
[   27.746267]  ? kasan_atomics_helper+0x730/0x5450
[   27.747050]  ? kasan_atomics_helper+0x730/0x5450
[   27.748143]  kasan_check_range+0x10c/0x1c0
[   27.748745]  __kasan_check_write+0x18/0x20
[   27.749278]  kasan_atomics_helper+0x730/0x5450
[   27.750075]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   27.750494]  ? __kmalloc_cache_noprof+0x184/0x410
[   27.751393]  ? __schedule+0xc3e/0x2790
[   27.751715]  ? finish_task_switch.isra.0+0x153/0x700
[   27.752938]  ? kasan_atomics+0x153/0x310
[   27.753325]  kasan_atomics+0x1dd/0x310
[   27.753994]  ? __pfx_kasan_atomics+0x10/0x10
[   27.754507]  ? __pfx_read_tsc+0x10/0x10
[   27.755062]  ? ktime_get_ts64+0x86/0x230
[   27.755426]  kunit_try_run_case+0x1b3/0x490
[   27.756043]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.756775]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   27.757368]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   27.758074]  ? __kthread_parkme+0x82/0x160
[   27.758725]  ? preempt_count_sub+0x50/0x80
[   27.759397]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.759905]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   27.760590]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.761188]  kthread+0x257/0x310
[   27.762232]  ? __pfx_kthread+0x10/0x10
[   27.762543]  ret_from_fork+0x41/0x80
[   27.763062]  ? __pfx_kthread+0x10/0x10
[   27.763841]  ret_from_fork_asm+0x1a/0x30
[   27.764439]  </TASK>
[   27.764756] 
[   27.764986] Allocated by task 273:
[   27.765364]  kasan_save_stack+0x3d/0x60
[   27.765807]  kasan_save_track+0x18/0x40
[   27.766407]  kasan_save_alloc_info+0x3b/0x50
[   27.767390]  __kasan_kmalloc+0xb7/0xc0
[   27.767834]  __kmalloc_cache_noprof+0x184/0x410
[   27.768699]  kasan_atomics+0x96/0x310
[   27.769191]  kunit_try_run_case+0x1b3/0x490
[   27.769656]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.770588]  kthread+0x257/0x310
[   27.771093]  ret_from_fork+0x41/0x80
[   27.771722]  ret_from_fork_asm+0x1a/0x30
[   27.772164] 
[   27.773001] The buggy address belongs to the object at ffff888101afb700
[   27.773001]  which belongs to the cache kmalloc-64 of size 64
[   27.774175] The buggy address is located 0 bytes to the right of
[   27.774175]  allocated 48-byte region [ffff888101afb700, ffff888101afb730)
[   27.775571] 
[   27.775823] The buggy address belongs to the physical page:
[   27.776416] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101afb
[   27.777619] flags: 0x200000000000000(node=0|zone=2)
[   27.778097] page_type: f5(slab)
[   27.778711] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   27.779464] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   27.781026] page dumped because: kasan: bad access detected
[   27.781726] 
[   27.781990] Memory state around the buggy address:
[   27.782513]  ffff888101afb600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.783415]  ffff888101afb680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.784107] >ffff888101afb700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   27.784984]                                      ^
[   27.785376]  ffff888101afb780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.786920]  ffff888101afb800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.787307] ==================================================================
[   28.572656] ==================================================================
[   28.573732] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x107a/0x5450
[   28.574498] Write of size 4 at addr ffff888101afb730 by task kunit_try_catch/273
[   28.575110] 
[   28.575321] CPU: 0 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241204 #1
[   28.576926] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.577502] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   28.578264] Call Trace:
[   28.578566]  <TASK>
[   28.578828]  dump_stack_lvl+0x73/0xb0
[   28.579671]  print_report+0xd1/0x640
[   28.580236]  ? __virt_addr_valid+0x1db/0x2d0
[   28.580929]  ? kasan_complete_mode_report_info+0x2a/0x200
[   28.581608]  kasan_report+0x102/0x140
[   28.582057]  ? kasan_atomics_helper+0x107a/0x5450
[   28.582720]  ? kasan_atomics_helper+0x107a/0x5450
[   28.583314]  kasan_check_range+0x10c/0x1c0
[   28.583568]  __kasan_check_write+0x18/0x20
[   28.583765]  kasan_atomics_helper+0x107a/0x5450
[   28.584075]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   28.584745]  ? __kmalloc_cache_noprof+0x184/0x410
[   28.585598]  ? __schedule+0xc3e/0x2790
[   28.586191]  ? finish_task_switch.isra.0+0x153/0x700
[   28.587100]  ? kasan_atomics+0x153/0x310
[   28.587653]  kasan_atomics+0x1dd/0x310
[   28.588202]  ? __pfx_kasan_atomics+0x10/0x10
[   28.589100]  ? __pfx_read_tsc+0x10/0x10
[   28.589546]  ? ktime_get_ts64+0x86/0x230
[   28.590245]  kunit_try_run_case+0x1b3/0x490
[   28.590789]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.591366]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   28.591746]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   28.592236]  ? __kthread_parkme+0x82/0x160
[   28.592566]  ? preempt_count_sub+0x50/0x80
[   28.593099]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.593850]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   28.594901]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.595494]  kthread+0x257/0x310
[   28.595686]  ? __pfx_kthread+0x10/0x10
[   28.595882]  ret_from_fork+0x41/0x80
[   28.596166]  ? __pfx_kthread+0x10/0x10
[   28.596638]  ret_from_fork_asm+0x1a/0x30
[   28.597070]  </TASK>
[   28.597363] 
[   28.597575] Allocated by task 273:
[   28.598255]  kasan_save_stack+0x3d/0x60
[   28.598786]  kasan_save_track+0x18/0x40
[   28.599154]  kasan_save_alloc_info+0x3b/0x50
[   28.599519]  __kasan_kmalloc+0xb7/0xc0
[   28.600326]  __kmalloc_cache_noprof+0x184/0x410
[   28.601141]  kasan_atomics+0x96/0x310
[   28.601558]  kunit_try_run_case+0x1b3/0x490
[   28.602557]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.602947]  kthread+0x257/0x310
[   28.603520]  ret_from_fork+0x41/0x80
[   28.604019]  ret_from_fork_asm+0x1a/0x30
[   28.604437] 
[   28.605163] The buggy address belongs to the object at ffff888101afb700
[   28.605163]  which belongs to the cache kmalloc-64 of size 64
[   28.606948] The buggy address is located 0 bytes to the right of
[   28.606948]  allocated 48-byte region [ffff888101afb700, ffff888101afb730)
[   28.608527] 
[   28.608752] The buggy address belongs to the physical page:
[   28.609371] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101afb
[   28.609768] flags: 0x200000000000000(node=0|zone=2)
[   28.610408] page_type: f5(slab)
[   28.611014] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   28.612187] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   28.612559] page dumped because: kasan: bad access detected
[   28.613316] 
[   28.613522] Memory state around the buggy address:
[   28.613822]  ffff888101afb600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.614661]  ffff888101afb680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.615519] >ffff888101afb700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   28.616149]                                      ^
[   28.616739]  ffff888101afb780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.617638]  ffff888101afb800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.618291] ==================================================================
[   29.669051] ==================================================================
[   29.670646] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1c19/0x5450
[   29.671585] Write of size 8 at addr ffff888101afb730 by task kunit_try_catch/273
[   29.672585] 
[   29.672819] CPU: 0 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241204 #1
[   29.674098] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.674701] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   29.675680] Call Trace:
[   29.676241]  <TASK>
[   29.676512]  dump_stack_lvl+0x73/0xb0
[   29.676902]  print_report+0xd1/0x640
[   29.677561]  ? __virt_addr_valid+0x1db/0x2d0
[   29.678617]  ? kasan_complete_mode_report_info+0x2a/0x200
[   29.679444]  kasan_report+0x102/0x140
[   29.680386]  ? kasan_atomics_helper+0x1c19/0x5450
[   29.680877]  ? kasan_atomics_helper+0x1c19/0x5450
[   29.681697]  kasan_check_range+0x10c/0x1c0
[   29.682818]  __kasan_check_write+0x18/0x20
[   29.683443]  kasan_atomics_helper+0x1c19/0x5450
[   29.683907]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   29.684978]  ? __kmalloc_cache_noprof+0x184/0x410
[   29.685613]  ? __schedule+0xc3e/0x2790
[   29.685981]  ? finish_task_switch.isra.0+0x153/0x700
[   29.686632]  ? kasan_atomics+0x153/0x310
[   29.687242]  kasan_atomics+0x1dd/0x310
[   29.687578]  ? __pfx_kasan_atomics+0x10/0x10
[   29.688108]  ? __pfx_read_tsc+0x10/0x10
[   29.688720]  ? ktime_get_ts64+0x86/0x230
[   29.689773]  kunit_try_run_case+0x1b3/0x490
[   29.690502]  ? __pfx_kunit_try_run_case+0x10/0x10
[   29.690901]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   29.691429]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   29.692179]  ? __kthread_parkme+0x82/0x160
[   29.692662]  ? preempt_count_sub+0x50/0x80
[   29.693469]  ? __pfx_kunit_try_run_case+0x10/0x10
[   29.694761]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   29.695344]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   29.695984]  kthread+0x257/0x310
[   29.696278]  ? __pfx_kthread+0x10/0x10
[   29.696748]  ret_from_fork+0x41/0x80
[   29.697342]  ? __pfx_kthread+0x10/0x10
[   29.697720]  ret_from_fork_asm+0x1a/0x30
[   29.698311]  </TASK>
[   29.698588] 
[   29.698854] Allocated by task 273:
[   29.699270]  kasan_save_stack+0x3d/0x60
[   29.699797]  kasan_save_track+0x18/0x40
[   29.700422]  kasan_save_alloc_info+0x3b/0x50
[   29.700893]  __kasan_kmalloc+0xb7/0xc0
[   29.701213]  __kmalloc_cache_noprof+0x184/0x410
[   29.701872]  kasan_atomics+0x96/0x310
[   29.702321]  kunit_try_run_case+0x1b3/0x490
[   29.702797]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   29.703338]  kthread+0x257/0x310
[   29.703818]  ret_from_fork+0x41/0x80
[   29.704358]  ret_from_fork_asm+0x1a/0x30
[   29.704758] 
[   29.704932] The buggy address belongs to the object at ffff888101afb700
[   29.704932]  which belongs to the cache kmalloc-64 of size 64
[   29.706225] The buggy address is located 0 bytes to the right of
[   29.706225]  allocated 48-byte region [ffff888101afb700, ffff888101afb730)
[   29.707445] 
[   29.707741] The buggy address belongs to the physical page:
[   29.708265] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101afb
[   29.708938] flags: 0x200000000000000(node=0|zone=2)
[   29.709582] page_type: f5(slab)
[   29.710058] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   29.710690] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   29.711342] page dumped because: kasan: bad access detected
[   29.711698] 
[   29.711901] Memory state around the buggy address:
[   29.712896]  ffff888101afb600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.713406]  ffff888101afb680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.714257] >ffff888101afb700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   29.714909]                                      ^
[   29.715459]  ffff888101afb780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.716057]  ffff888101afb800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.716569] ==================================================================
[   29.368635] ==================================================================
[   29.369585] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1819/0x5450
[   29.370369] Write of size 8 at addr ffff888101afb730 by task kunit_try_catch/273
[   29.371076] 
[   29.371335] CPU: 0 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241204 #1
[   29.372344] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.372671] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   29.373599] Call Trace:
[   29.374014]  <TASK>
[   29.374392]  dump_stack_lvl+0x73/0xb0
[   29.374988]  print_report+0xd1/0x640
[   29.375291]  ? __virt_addr_valid+0x1db/0x2d0
[   29.375888]  ? kasan_complete_mode_report_info+0x2a/0x200
[   29.376543]  kasan_report+0x102/0x140
[   29.376962]  ? kasan_atomics_helper+0x1819/0x5450
[   29.377479]  ? kasan_atomics_helper+0x1819/0x5450
[   29.378014]  kasan_check_range+0x10c/0x1c0
[   29.378452]  __kasan_check_write+0x18/0x20
[   29.379110]  kasan_atomics_helper+0x1819/0x5450
[   29.379691]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   29.380219]  ? __kmalloc_cache_noprof+0x184/0x410
[   29.380815]  ? __schedule+0xc3e/0x2790
[   29.381260]  ? finish_task_switch.isra.0+0x153/0x700
[   29.381783]  ? kasan_atomics+0x153/0x310
[   29.382308]  kasan_atomics+0x1dd/0x310
[   29.382668]  ? __pfx_kasan_atomics+0x10/0x10
[   29.383164]  ? __pfx_read_tsc+0x10/0x10
[   29.383880]  ? ktime_get_ts64+0x86/0x230
[   29.384753]  kunit_try_run_case+0x1b3/0x490
[   29.385388]  ? __pfx_kunit_try_run_case+0x10/0x10
[   29.386075]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   29.386553]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   29.387018]  ? __kthread_parkme+0x82/0x160
[   29.387588]  ? preempt_count_sub+0x50/0x80
[   29.388058]  ? __pfx_kunit_try_run_case+0x10/0x10
[   29.388705]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   29.389548]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   29.390190]  kthread+0x257/0x310
[   29.390749]  ? __pfx_kthread+0x10/0x10
[   29.391372]  ret_from_fork+0x41/0x80
[   29.391769]  ? __pfx_kthread+0x10/0x10
[   29.392200]  ret_from_fork_asm+0x1a/0x30
[   29.392983]  </TASK>
[   29.393164] 
[   29.393309] Allocated by task 273:
[   29.393573]  kasan_save_stack+0x3d/0x60
[   29.393840]  kasan_save_track+0x18/0x40
[   29.394103]  kasan_save_alloc_info+0x3b/0x50
[   29.394400]  __kasan_kmalloc+0xb7/0xc0
[   29.394768]  __kmalloc_cache_noprof+0x184/0x410
[   29.395084]  kasan_atomics+0x96/0x310
[   29.395363]  kunit_try_run_case+0x1b3/0x490
[   29.396440]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   29.397190]  kthread+0x257/0x310
[   29.397715]  ret_from_fork+0x41/0x80
[   29.398387]  ret_from_fork_asm+0x1a/0x30
[   29.398858] 
[   29.399221] The buggy address belongs to the object at ffff888101afb700
[   29.399221]  which belongs to the cache kmalloc-64 of size 64
[   29.399914] The buggy address is located 0 bytes to the right of
[   29.399914]  allocated 48-byte region [ffff888101afb700, ffff888101afb730)
[   29.401393] 
[   29.401601] The buggy address belongs to the physical page:
[   29.402419] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101afb
[   29.402892] flags: 0x200000000000000(node=0|zone=2)
[   29.403218] page_type: f5(slab)
[   29.403477] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   29.404454] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   29.405903] page dumped because: kasan: bad access detected
[   29.406543] 
[   29.406795] Memory state around the buggy address:
[   29.408145]  ffff888101afb600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.409313]  ffff888101afb680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.409762] >ffff888101afb700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   29.410149]                                      ^
[   29.410531]  ffff888101afb780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.411902]  ffff888101afb800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.412615] ==================================================================
[   29.809149] ==================================================================
[   29.809737] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1d7b/0x5450
[   29.810627] Write of size 8 at addr ffff888101afb730 by task kunit_try_catch/273
[   29.811337] 
[   29.811661] CPU: 0 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241204 #1
[   29.812590] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.813192] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   29.814039] Call Trace:
[   29.814464]  <TASK>
[   29.814789]  dump_stack_lvl+0x73/0xb0
[   29.815429]  print_report+0xd1/0x640
[   29.815819]  ? __virt_addr_valid+0x1db/0x2d0
[   29.816411]  ? kasan_complete_mode_report_info+0x2a/0x200
[   29.817088]  kasan_report+0x102/0x140
[   29.817527]  ? kasan_atomics_helper+0x1d7b/0x5450
[   29.818115]  ? kasan_atomics_helper+0x1d7b/0x5450
[   29.818779]  kasan_check_range+0x10c/0x1c0
[   29.819289]  __kasan_check_write+0x18/0x20
[   29.819693]  kasan_atomics_helper+0x1d7b/0x5450
[   29.820246]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   29.820881]  ? __kmalloc_cache_noprof+0x184/0x410
[   29.821444]  ? __schedule+0xc3e/0x2790
[   29.821940]  ? finish_task_switch.isra.0+0x153/0x700
[   29.822630]  ? kasan_atomics+0x153/0x310
[   29.823237]  kasan_atomics+0x1dd/0x310
[   29.823634]  ? __pfx_kasan_atomics+0x10/0x10
[   29.824297]  ? __pfx_read_tsc+0x10/0x10
[   29.824751]  ? ktime_get_ts64+0x86/0x230
[   29.825307]  kunit_try_run_case+0x1b3/0x490
[   29.825790]  ? __pfx_kunit_try_run_case+0x10/0x10
[   29.826346]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   29.826801]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   29.827286]  ? __kthread_parkme+0x82/0x160
[   29.827800]  ? preempt_count_sub+0x50/0x80
[   29.828228]  ? __pfx_kunit_try_run_case+0x10/0x10
[   29.828586]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   29.829416]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   29.830028]  kthread+0x257/0x310
[   29.830530]  ? __pfx_kthread+0x10/0x10
[   29.831037]  ret_from_fork+0x41/0x80
[   29.831498]  ? __pfx_kthread+0x10/0x10
[   29.831933]  ret_from_fork_asm+0x1a/0x30
[   29.832598]  </TASK>
[   29.832851] 
[   29.833213] Allocated by task 273:
[   29.833609]  kasan_save_stack+0x3d/0x60
[   29.834190]  kasan_save_track+0x18/0x40
[   29.834659]  kasan_save_alloc_info+0x3b/0x50
[   29.835289]  __kasan_kmalloc+0xb7/0xc0
[   29.835632]  __kmalloc_cache_noprof+0x184/0x410
[   29.836311]  kasan_atomics+0x96/0x310
[   29.836796]  kunit_try_run_case+0x1b3/0x490
[   29.837303]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   29.837790]  kthread+0x257/0x310
[   29.838294]  ret_from_fork+0x41/0x80
[   29.838933]  ret_from_fork_asm+0x1a/0x30
[   29.839351] 
[   29.839513] The buggy address belongs to the object at ffff888101afb700
[   29.839513]  which belongs to the cache kmalloc-64 of size 64
[   29.840746] The buggy address is located 0 bytes to the right of
[   29.840746]  allocated 48-byte region [ffff888101afb700, ffff888101afb730)
[   29.841914] 
[   29.842173] The buggy address belongs to the physical page:
[   29.842955] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101afb
[   29.843778] flags: 0x200000000000000(node=0|zone=2)
[   29.844388] page_type: f5(slab)
[   29.844808] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   29.845389] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   29.846379] page dumped because: kasan: bad access detected
[   29.846926] 
[   29.847229] Memory state around the buggy address:
[   29.847755]  ffff888101afb600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.848512]  ffff888101afb680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.849177] >ffff888101afb700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   29.850045]                                      ^
[   29.850518]  ffff888101afb780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.851271]  ffff888101afb800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.851701] ==================================================================
[   27.212246] ==================================================================
[   27.213104] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b8a/0x5450
[   27.214671] Read of size 4 at addr ffff888101afb730 by task kunit_try_catch/273
[   27.215259] 
[   27.215749] CPU: 0 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241204 #1
[   27.216891] Tainted: [B]=BAD_PAGE, [N]=TEST
[   27.218343] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   27.219462] Call Trace:
[   27.219820]  <TASK>
[   27.220209]  dump_stack_lvl+0x73/0xb0
[   27.220925]  print_report+0xd1/0x640
[   27.221361]  ? __virt_addr_valid+0x1db/0x2d0
[   27.222188]  ? kasan_complete_mode_report_info+0x2a/0x200
[   27.223012]  kasan_report+0x102/0x140
[   27.223458]  ? kasan_atomics_helper+0x4b8a/0x5450
[   27.224788]  ? kasan_atomics_helper+0x4b8a/0x5450
[   27.225973]  __asan_report_load4_noabort+0x18/0x20
[   27.227019]  kasan_atomics_helper+0x4b8a/0x5450
[   27.227627]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   27.228268]  ? __kmalloc_cache_noprof+0x184/0x410
[   27.229110]  ? __schedule+0xc3e/0x2790
[   27.230268]  ? finish_task_switch.isra.0+0x153/0x700
[   27.231088]  ? kasan_atomics+0x153/0x310
[   27.231836]  kasan_atomics+0x1dd/0x310
[   27.232224]  ? __pfx_kasan_atomics+0x10/0x10
[   27.233096]  ? __pfx_read_tsc+0x10/0x10
[   27.233607]  ? ktime_get_ts64+0x86/0x230
[   27.234114]  kunit_try_run_case+0x1b3/0x490
[   27.234925]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.235607]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   27.236169]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   27.237145]  ? __kthread_parkme+0x82/0x160
[   27.237913]  ? preempt_count_sub+0x50/0x80
[   27.239262]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.240189]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   27.241128]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.241929]  kthread+0x257/0x310
[   27.242170]  ? __pfx_kthread+0x10/0x10
[   27.243199]  ret_from_fork+0x41/0x80
[   27.244118]  ? __pfx_kthread+0x10/0x10
[   27.245358]  ret_from_fork_asm+0x1a/0x30
[   27.245714]  </TASK>
[   27.246090] 
[   27.246242] Allocated by task 273:
[   27.247100]  kasan_save_stack+0x3d/0x60
[   27.248022]  kasan_save_track+0x18/0x40
[   27.248969]  kasan_save_alloc_info+0x3b/0x50
[   27.249804]  __kasan_kmalloc+0xb7/0xc0
[   27.250506]  __kmalloc_cache_noprof+0x184/0x410
[   27.250824]  kasan_atomics+0x96/0x310
[   27.251146]  kunit_try_run_case+0x1b3/0x490
[   27.251514]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.252145]  kthread+0x257/0x310
[   27.252893]  ret_from_fork+0x41/0x80
[   27.253191]  ret_from_fork_asm+0x1a/0x30
[   27.254011] 
[   27.254518] The buggy address belongs to the object at ffff888101afb700
[   27.254518]  which belongs to the cache kmalloc-64 of size 64
[   27.255800] The buggy address is located 0 bytes to the right of
[   27.255800]  allocated 48-byte region [ffff888101afb700, ffff888101afb730)
[   27.258704] 
[   27.259647] The buggy address belongs to the physical page:
[   27.260230] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101afb
[   27.261016] flags: 0x200000000000000(node=0|zone=2)
[   27.261906] page_type: f5(slab)
[   27.262648] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   27.262944] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   27.263226] page dumped because: kasan: bad access detected
[   27.264026] 
[   27.264826] Memory state around the buggy address:
[   27.265716]  ffff888101afb600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.266572]  ffff888101afb680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.267630] >ffff888101afb700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   27.268751]                                      ^
[   27.269125]  ffff888101afb780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.269727]  ffff888101afb800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.271069] ==================================================================
[   30.304485] ==================================================================
[   30.305352] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x224d/0x5450
[   30.306059] Write of size 8 at addr ffff888101afb730 by task kunit_try_catch/273
[   30.306758] 
[   30.307072] CPU: 0 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241204 #1
[   30.307824] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.308304] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   30.309177] Call Trace:
[   30.309403]  <TASK>
[   30.309755]  dump_stack_lvl+0x73/0xb0
[   30.310302]  print_report+0xd1/0x640
[   30.310806]  ? __virt_addr_valid+0x1db/0x2d0
[   30.311248]  ? kasan_complete_mode_report_info+0x2a/0x200
[   30.311851]  kasan_report+0x102/0x140
[   30.312303]  ? kasan_atomics_helper+0x224d/0x5450
[   30.312700]  ? kasan_atomics_helper+0x224d/0x5450
[   30.313142]  kasan_check_range+0x10c/0x1c0
[   30.313764]  __kasan_check_write+0x18/0x20
[   30.314226]  kasan_atomics_helper+0x224d/0x5450
[   30.314685]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   30.315124]  ? __kmalloc_cache_noprof+0x184/0x410
[   30.315739]  ? __schedule+0xc3e/0x2790
[   30.316149]  ? finish_task_switch.isra.0+0x153/0x700
[   30.316522]  ? kasan_atomics+0x153/0x310
[   30.316938]  kasan_atomics+0x1dd/0x310
[   30.317483]  ? __pfx_kasan_atomics+0x10/0x10
[   30.318076]  ? __pfx_read_tsc+0x10/0x10
[   30.318516]  ? ktime_get_ts64+0x86/0x230
[   30.318994]  kunit_try_run_case+0x1b3/0x490
[   30.319410]  ? __pfx_kunit_try_run_case+0x10/0x10
[   30.319802]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   30.320325]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   30.320814]  ? __kthread_parkme+0x82/0x160
[   30.321275]  ? preempt_count_sub+0x50/0x80
[   30.321674]  ? __pfx_kunit_try_run_case+0x10/0x10
[   30.322210]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   30.322605]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   30.323314]  kthread+0x257/0x310
[   30.323787]  ? __pfx_kthread+0x10/0x10
[   30.324169]  ret_from_fork+0x41/0x80
[   30.324632]  ? __pfx_kthread+0x10/0x10
[   30.324944]  ret_from_fork_asm+0x1a/0x30
[   30.325445]  </TASK>
[   30.325696] 
[   30.325955] Allocated by task 273:
[   30.326345]  kasan_save_stack+0x3d/0x60
[   30.326742]  kasan_save_track+0x18/0x40
[   30.327204]  kasan_save_alloc_info+0x3b/0x50
[   30.327572]  __kasan_kmalloc+0xb7/0xc0
[   30.328077]  __kmalloc_cache_noprof+0x184/0x410
[   30.328468]  kasan_atomics+0x96/0x310
[   30.328890]  kunit_try_run_case+0x1b3/0x490
[   30.329361]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   30.329741]  kthread+0x257/0x310
[   30.330004]  ret_from_fork+0x41/0x80
[   30.330339]  ret_from_fork_asm+0x1a/0x30
[   30.330643] 
[   30.330906] The buggy address belongs to the object at ffff888101afb700
[   30.330906]  which belongs to the cache kmalloc-64 of size 64
[   30.332358] The buggy address is located 0 bytes to the right of
[   30.332358]  allocated 48-byte region [ffff888101afb700, ffff888101afb730)
[   30.333512] 
[   30.333730] The buggy address belongs to the physical page:
[   30.334239] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101afb
[   30.335134] flags: 0x200000000000000(node=0|zone=2)
[   30.335736] page_type: f5(slab)
[   30.336067] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   30.336708] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   30.337341] page dumped because: kasan: bad access detected
[   30.337818] 
[   30.338128] Memory state around the buggy address:
[   30.338556]  ffff888101afb600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   30.339304]  ffff888101afb680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   30.339871] >ffff888101afb700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   30.340520]                                      ^
[   30.340855]  ffff888101afb780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.341320]  ffff888101afb800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.341907] ==================================================================