Hay
Date
Dec. 6, 2024, 3:11 p.m.

Environment
qemu-arm64
qemu-x86_64

[   35.288398] ==================================================================
[   35.289036] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x2b0/0x4858
[   35.289963] Read of size 4 at addr fff00000c69ef0b0 by task kunit_try_catch/254
[   35.290976] 
[   35.291432] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241206 #1
[   35.292501] Tainted: [B]=BAD_PAGE, [N]=TEST
[   35.293182] Hardware name: linux,dummy-virt (DT)
[   35.293913] Call trace:
[   35.294418]  show_stack+0x20/0x38 (C)
[   35.295088]  dump_stack_lvl+0x8c/0xd0
[   35.295830]  print_report+0x118/0x5e0
[   35.296442]  kasan_report+0xc8/0x118
[   35.297155]  kasan_check_range+0x100/0x1a8
[   35.297906]  __kasan_check_read+0x20/0x30
[   35.298598]  kasan_atomics_helper+0x2b0/0x4858
[   35.299290]  kasan_atomics+0x198/0x2e8
[   35.300003]  kunit_try_run_case+0x14c/0x3d0
[   35.300637]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.301485]  kthread+0x24c/0x2d0
[   35.302075]  ret_from_fork+0x10/0x20
[   35.302729] 
[   35.303230] Allocated by task 254:
[   35.303786]  kasan_save_stack+0x3c/0x68
[   35.304483]  kasan_save_track+0x20/0x40
[   35.305268]  kasan_save_alloc_info+0x40/0x58
[   35.305868]  __kasan_kmalloc+0xd4/0xd8
[   35.306155]  __kmalloc_cache_noprof+0x15c/0x3c0
[   35.306441]  kasan_atomics+0xb8/0x2e8
[   35.306894]  kunit_try_run_case+0x14c/0x3d0
[   35.307583]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.308368]  kthread+0x24c/0x2d0
[   35.308964]  ret_from_fork+0x10/0x20
[   35.309491] 
[   35.309932] The buggy address belongs to the object at fff00000c69ef080
[   35.309932]  which belongs to the cache kmalloc-64 of size 64
[   35.311087] The buggy address is located 0 bytes to the right of
[   35.311087]  allocated 48-byte region [fff00000c69ef080, fff00000c69ef0b0)
[   35.312646] 
[   35.313033] The buggy address belongs to the physical page:
[   35.313852] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1069ef
[   35.314794] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   35.315740] page_type: f5(slab)
[   35.316287] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   35.317194] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   35.318137] page dumped because: kasan: bad access detected
[   35.318907] 
[   35.319272] Memory state around the buggy address:
[   35.320002]  fff00000c69eef80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   35.320874]  fff00000c69ef000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.321724] >fff00000c69ef080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   35.322601]                                      ^
[   35.323273]  fff00000c69ef100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.324137]  fff00000c69ef180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.324841] ==================================================================
[   37.472359] ==================================================================
[   37.473319] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e10/0x4858
[   37.474922] Read of size 8 at addr fff00000c69ef0b0 by task kunit_try_catch/254
[   37.475923] 
[   37.476303] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241206 #1
[   37.477375] Tainted: [B]=BAD_PAGE, [N]=TEST
[   37.478010] Hardware name: linux,dummy-virt (DT)
[   37.478622] Call trace:
[   37.479097]  show_stack+0x20/0x38 (C)
[   37.479717]  dump_stack_lvl+0x8c/0xd0
[   37.480335]  print_report+0x118/0x5e0
[   37.481003]  kasan_report+0xc8/0x118
[   37.481653]  __asan_report_load8_noabort+0x20/0x30
[   37.482333]  kasan_atomics_helper+0x3e10/0x4858
[   37.483035]  kasan_atomics+0x198/0x2e8
[   37.483608]  kunit_try_run_case+0x14c/0x3d0
[   37.484311]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.485132]  kthread+0x24c/0x2d0
[   37.485692]  ret_from_fork+0x10/0x20
[   37.486380] 
[   37.486768] Allocated by task 254:
[   37.487344]  kasan_save_stack+0x3c/0x68
[   37.487888]  kasan_save_track+0x20/0x40
[   37.488539]  kasan_save_alloc_info+0x40/0x58
[   37.489192]  __kasan_kmalloc+0xd4/0xd8
[   37.489812]  __kmalloc_cache_noprof+0x15c/0x3c0
[   37.490500]  kasan_atomics+0xb8/0x2e8
[   37.491145]  kunit_try_run_case+0x14c/0x3d0
[   37.491736]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.492490]  kthread+0x24c/0x2d0
[   37.493097]  ret_from_fork+0x10/0x20
[   37.493678] 
[   37.494050] The buggy address belongs to the object at fff00000c69ef080
[   37.494050]  which belongs to the cache kmalloc-64 of size 64
[   37.495318] The buggy address is located 0 bytes to the right of
[   37.495318]  allocated 48-byte region [fff00000c69ef080, fff00000c69ef0b0)
[   37.496710] 
[   37.497094] The buggy address belongs to the physical page:
[   37.497752] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1069ef
[   37.498769] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   37.499528] page_type: f5(slab)
[   37.500100] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   37.500836] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   37.501811] page dumped because: kasan: bad access detected
[   37.502561] 
[   37.502949] Memory state around the buggy address:
[   37.503593]  fff00000c69eef80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   37.504441]  fff00000c69ef000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   37.505318] >fff00000c69ef080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   37.506131]                                      ^
[   37.506780]  fff00000c69ef100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.507630]  fff00000c69ef180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.508383] ==================================================================
[   36.052666] ==================================================================
[   36.053437] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa6c/0x4858
[   36.054353] Write of size 4 at addr fff00000c69ef0b0 by task kunit_try_catch/254
[   36.055384] 
[   36.055874] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241206 #1
[   36.057115] Tainted: [B]=BAD_PAGE, [N]=TEST
[   36.057756] Hardware name: linux,dummy-virt (DT)
[   36.058402] Call trace:
[   36.058850]  show_stack+0x20/0x38 (C)
[   36.059580]  dump_stack_lvl+0x8c/0xd0
[   36.060240]  print_report+0x118/0x5e0
[   36.060917]  kasan_report+0xc8/0x118
[   36.061625]  kasan_check_range+0x100/0x1a8
[   36.062341]  __kasan_check_write+0x20/0x30
[   36.063026]  kasan_atomics_helper+0xa6c/0x4858
[   36.063745]  kasan_atomics+0x198/0x2e8
[   36.064388]  kunit_try_run_case+0x14c/0x3d0
[   36.065113]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.065885]  kthread+0x24c/0x2d0
[   36.066431]  ret_from_fork+0x10/0x20
[   36.067043] 
[   36.067371] Allocated by task 254:
[   36.067953]  kasan_save_stack+0x3c/0x68
[   36.068461]  kasan_save_track+0x20/0x40
[   36.069109]  kasan_save_alloc_info+0x40/0x58
[   36.069734]  __kasan_kmalloc+0xd4/0xd8
[   36.070365]  __kmalloc_cache_noprof+0x15c/0x3c0
[   36.071055]  kasan_atomics+0xb8/0x2e8
[   36.071570]  kunit_try_run_case+0x14c/0x3d0
[   36.072245]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.072923]  kthread+0x24c/0x2d0
[   36.073497]  ret_from_fork+0x10/0x20
[   36.073985] 
[   36.074357] The buggy address belongs to the object at fff00000c69ef080
[   36.074357]  which belongs to the cache kmalloc-64 of size 64
[   36.075625] The buggy address is located 0 bytes to the right of
[   36.075625]  allocated 48-byte region [fff00000c69ef080, fff00000c69ef0b0)
[   36.076844] 
[   36.077220] The buggy address belongs to the physical page:
[   36.077998] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1069ef
[   36.078799] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   36.079696] page_type: f5(slab)
[   36.080265] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   36.081229] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   36.082196] page dumped because: kasan: bad access detected
[   36.082870] 
[   36.083244] Memory state around the buggy address:
[   36.084130]  fff00000c69eef80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   36.084933]  fff00000c69ef000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   36.085998] >fff00000c69ef080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   36.086776]                                      ^
[   36.087088]  fff00000c69ef100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.087453]  fff00000c69ef180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.088159] ==================================================================
[   35.825236] ==================================================================
[   35.826140] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x7cc/0x4858
[   35.826973] Write of size 4 at addr fff00000c69ef0b0 by task kunit_try_catch/254
[   35.827957] 
[   35.828374] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241206 #1
[   35.829678] Tainted: [B]=BAD_PAGE, [N]=TEST
[   35.830460] Hardware name: linux,dummy-virt (DT)
[   35.831186] Call trace:
[   35.831676]  show_stack+0x20/0x38 (C)
[   35.832303]  dump_stack_lvl+0x8c/0xd0
[   35.832983]  print_report+0x118/0x5e0
[   35.833535]  kasan_report+0xc8/0x118
[   35.834195]  kasan_check_range+0x100/0x1a8
[   35.834909]  __kasan_check_write+0x20/0x30
[   35.835628]  kasan_atomics_helper+0x7cc/0x4858
[   35.836304]  kasan_atomics+0x198/0x2e8
[   35.836909]  kunit_try_run_case+0x14c/0x3d0
[   35.837565]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.838368]  kthread+0x24c/0x2d0
[   35.839008]  ret_from_fork+0x10/0x20
[   35.839650] 
[   35.839967] Allocated by task 254:
[   35.840554]  kasan_save_stack+0x3c/0x68
[   35.841094]  kasan_save_track+0x20/0x40
[   35.841720]  kasan_save_alloc_info+0x40/0x58
[   35.842388]  __kasan_kmalloc+0xd4/0xd8
[   35.842918]  __kmalloc_cache_noprof+0x15c/0x3c0
[   35.843636]  kasan_atomics+0xb8/0x2e8
[   35.844130]  kunit_try_run_case+0x14c/0x3d0
[   35.844815]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.845498]  kthread+0x24c/0x2d0
[   35.846119]  ret_from_fork+0x10/0x20
[   35.846682] 
[   35.847066] The buggy address belongs to the object at fff00000c69ef080
[   35.847066]  which belongs to the cache kmalloc-64 of size 64
[   35.848158] The buggy address is located 0 bytes to the right of
[   35.848158]  allocated 48-byte region [fff00000c69ef080, fff00000c69ef0b0)
[   35.849466] 
[   35.849863] The buggy address belongs to the physical page:
[   35.850614] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1069ef
[   35.851564] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   35.852310] page_type: f5(slab)
[   35.852895] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   35.853685] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   35.854652] page dumped because: kasan: bad access detected
[   35.855352] 
[   35.855783] Memory state around the buggy address:
[   35.856298]  fff00000c69eef80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   35.857208]  fff00000c69ef000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.858039] >fff00000c69ef080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   35.858803]                                      ^
[   35.859531]  fff00000c69ef100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.860281]  fff00000c69ef180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.861222] ==================================================================
[   35.327852] ==================================================================
[   35.328809] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x40fc/0x4858
[   35.329772] Read of size 4 at addr fff00000c69ef0b0 by task kunit_try_catch/254
[   35.330761] 
[   35.331804] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241206 #1
[   35.332875] Tainted: [B]=BAD_PAGE, [N]=TEST
[   35.333151] Hardware name: linux,dummy-virt (DT)
[   35.333425] Call trace:
[   35.333731]  show_stack+0x20/0x38 (C)
[   35.334472]  dump_stack_lvl+0x8c/0xd0
[   35.335875]  print_report+0x118/0x5e0
[   35.336539]  kasan_report+0xc8/0x118
[   35.337178]  __asan_report_load4_noabort+0x20/0x30
[   35.338580]  kasan_atomics_helper+0x40fc/0x4858
[   35.339378]  kasan_atomics+0x198/0x2e8
[   35.339972]  kunit_try_run_case+0x14c/0x3d0
[   35.340740]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.341527]  kthread+0x24c/0x2d0
[   35.342112]  ret_from_fork+0x10/0x20
[   35.342804] 
[   35.343223] Allocated by task 254:
[   35.343849]  kasan_save_stack+0x3c/0x68
[   35.344540]  kasan_save_track+0x20/0x40
[   35.345136]  kasan_save_alloc_info+0x40/0x58
[   35.345868]  __kasan_kmalloc+0xd4/0xd8
[   35.346540]  __kmalloc_cache_noprof+0x15c/0x3c0
[   35.347189]  kasan_atomics+0xb8/0x2e8
[   35.347872]  kunit_try_run_case+0x14c/0x3d0
[   35.348596]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.349297]  kthread+0x24c/0x2d0
[   35.349940]  ret_from_fork+0x10/0x20
[   35.350487] 
[   35.350922] The buggy address belongs to the object at fff00000c69ef080
[   35.350922]  which belongs to the cache kmalloc-64 of size 64
[   35.352232] The buggy address is located 0 bytes to the right of
[   35.352232]  allocated 48-byte region [fff00000c69ef080, fff00000c69ef0b0)
[   35.353570] 
[   35.353997] The buggy address belongs to the physical page:
[   35.354838] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1069ef
[   35.355752] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   35.356700] page_type: f5(slab)
[   35.357310] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   35.358268] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   35.359204] page dumped because: kasan: bad access detected
[   35.359922] 
[   35.360279] Memory state around the buggy address:
[   35.360965]  fff00000c69eef80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   35.361902]  fff00000c69ef000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.362787] >fff00000c69ef080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   35.363502]                                      ^
[   35.364262]  fff00000c69ef100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.365125]  fff00000c69ef180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.365918] ==================================================================
[   35.711921] ==================================================================
[   35.712694] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x684/0x4858
[   35.713658] Write of size 4 at addr fff00000c69ef0b0 by task kunit_try_catch/254
[   35.714505] 
[   35.714955] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241206 #1
[   35.716165] Tainted: [B]=BAD_PAGE, [N]=TEST
[   35.716743] Hardware name: linux,dummy-virt (DT)
[   35.717351] Call trace:
[   35.717765]  show_stack+0x20/0x38 (C)
[   35.718413]  dump_stack_lvl+0x8c/0xd0
[   35.719097]  print_report+0x118/0x5e0
[   35.719771]  kasan_report+0xc8/0x118
[   35.720346]  kasan_check_range+0x100/0x1a8
[   35.721054]  __kasan_check_write+0x20/0x30
[   35.721608]  kasan_atomics_helper+0x684/0x4858
[   35.722334]  kasan_atomics+0x198/0x2e8
[   35.723021]  kunit_try_run_case+0x14c/0x3d0
[   35.723620]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.724386]  kthread+0x24c/0x2d0
[   35.724966]  ret_from_fork+0x10/0x20
[   35.725573] 
[   35.725993] Allocated by task 254:
[   35.726580]  kasan_save_stack+0x3c/0x68
[   35.727195]  kasan_save_track+0x20/0x40
[   35.727830]  kasan_save_alloc_info+0x40/0x58
[   35.728434]  __kasan_kmalloc+0xd4/0xd8
[   35.729074]  __kmalloc_cache_noprof+0x15c/0x3c0
[   35.729716]  kasan_atomics+0xb8/0x2e8
[   35.730334]  kunit_try_run_case+0x14c/0x3d0
[   35.731025]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.731726]  kthread+0x24c/0x2d0
[   35.732212]  ret_from_fork+0x10/0x20
[   35.732877] 
[   35.733244] The buggy address belongs to the object at fff00000c69ef080
[   35.733244]  which belongs to the cache kmalloc-64 of size 64
[   35.734495] The buggy address is located 0 bytes to the right of
[   35.734495]  allocated 48-byte region [fff00000c69ef080, fff00000c69ef0b0)
[   35.735756] 
[   35.736130] The buggy address belongs to the physical page:
[   35.736828] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1069ef
[   35.737709] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   35.738541] page_type: f5(slab)
[   35.739065] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   35.739959] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   35.740827] page dumped because: kasan: bad access detected
[   35.741601] 
[   35.741968] Memory state around the buggy address:
[   35.742539]  fff00000c69eef80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   35.743461]  fff00000c69ef000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.744297] >fff00000c69ef080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   35.745030]                                      ^
[   35.745779]  fff00000c69ef100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.746630]  fff00000c69ef180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.747467] ==================================================================
[   35.749069] ==================================================================
[   35.750037] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x6ec/0x4858
[   35.751366] Write of size 4 at addr fff00000c69ef0b0 by task kunit_try_catch/254
[   35.752274] 
[   35.752739] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241206 #1
[   35.754045] Tainted: [B]=BAD_PAGE, [N]=TEST
[   35.754729] Hardware name: linux,dummy-virt (DT)
[   35.755384] Call trace:
[   35.755898]  show_stack+0x20/0x38 (C)
[   35.756529]  dump_stack_lvl+0x8c/0xd0
[   35.757233]  print_report+0x118/0x5e0
[   35.757940]  kasan_report+0xc8/0x118
[   35.758620]  kasan_check_range+0x100/0x1a8
[   35.759310]  __kasan_check_write+0x20/0x30
[   35.760064]  kasan_atomics_helper+0x6ec/0x4858
[   35.760741]  kasan_atomics+0x198/0x2e8
[   35.761446]  kunit_try_run_case+0x14c/0x3d0
[   35.762151]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.763016]  kthread+0x24c/0x2d0
[   35.763681]  ret_from_fork+0x10/0x20
[   35.764304] 
[   35.764649] Allocated by task 254:
[   35.765147]  kasan_save_stack+0x3c/0x68
[   35.765839]  kasan_save_track+0x20/0x40
[   35.766323]  kasan_save_alloc_info+0x40/0x58
[   35.767020]  __kasan_kmalloc+0xd4/0xd8
[   35.767575]  __kmalloc_cache_noprof+0x15c/0x3c0
[   35.768283]  kasan_atomics+0xb8/0x2e8
[   35.768848]  kunit_try_run_case+0x14c/0x3d0
[   35.769528]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.770217]  kthread+0x24c/0x2d0
[   35.770821]  ret_from_fork+0x10/0x20
[   35.771373] 
[   35.771768] The buggy address belongs to the object at fff00000c69ef080
[   35.771768]  which belongs to the cache kmalloc-64 of size 64
[   35.772840] The buggy address is located 0 bytes to the right of
[   35.772840]  allocated 48-byte region [fff00000c69ef080, fff00000c69ef0b0)
[   35.774328] 
[   35.774709] The buggy address belongs to the physical page:
[   35.775376] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1069ef
[   35.776246] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   35.777144] page_type: f5(slab)
[   35.777733] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   35.778594] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   35.779589] page dumped because: kasan: bad access detected
[   35.780230] 
[   35.780590] Memory state around the buggy address:
[   35.781143]  fff00000c69eef80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   35.781997]  fff00000c69ef000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.782805] >fff00000c69ef080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   35.783676]                                      ^
[   35.784355]  fff00000c69ef100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.785234]  fff00000c69ef180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.786095] ==================================================================
[   37.510337] ==================================================================
[   37.511264] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x175c/0x4858
[   37.513043] Write of size 8 at addr fff00000c69ef0b0 by task kunit_try_catch/254
[   37.514617] 
[   37.515125] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241206 #1
[   37.516384] Tainted: [B]=BAD_PAGE, [N]=TEST
[   37.516910] Hardware name: linux,dummy-virt (DT)
[   37.517536] Call trace:
[   37.517993]  show_stack+0x20/0x38 (C)
[   37.518629]  dump_stack_lvl+0x8c/0xd0
[   37.519288]  print_report+0x118/0x5e0
[   37.519881]  kasan_report+0xc8/0x118
[   37.520408]  kasan_check_range+0x100/0x1a8
[   37.521127]  __kasan_check_write+0x20/0x30
[   37.521803]  kasan_atomics_helper+0x175c/0x4858
[   37.522466]  kasan_atomics+0x198/0x2e8
[   37.523100]  kunit_try_run_case+0x14c/0x3d0
[   37.523751]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.524410]  kthread+0x24c/0x2d0
[   37.525068]  ret_from_fork+0x10/0x20
[   37.525766] 
[   37.526144] Allocated by task 254:
[   37.526715]  kasan_save_stack+0x3c/0x68
[   37.527251]  kasan_save_track+0x20/0x40
[   37.527890]  kasan_save_alloc_info+0x40/0x58
[   37.528425]  __kasan_kmalloc+0xd4/0xd8
[   37.529065]  __kmalloc_cache_noprof+0x15c/0x3c0
[   37.529672]  kasan_atomics+0xb8/0x2e8
[   37.530297]  kunit_try_run_case+0x14c/0x3d0
[   37.531003]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.531755]  kthread+0x24c/0x2d0
[   37.532256]  ret_from_fork+0x10/0x20
[   37.532885] 
[   37.533263] The buggy address belongs to the object at fff00000c69ef080
[   37.533263]  which belongs to the cache kmalloc-64 of size 64
[   37.534425] The buggy address is located 0 bytes to the right of
[   37.534425]  allocated 48-byte region [fff00000c69ef080, fff00000c69ef0b0)
[   37.535808] 
[   37.536192] The buggy address belongs to the physical page:
[   37.536788] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1069ef
[   37.537781] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   37.538575] page_type: f5(slab)
[   37.539079] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   37.540002] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   37.540752] page dumped because: kasan: bad access detected
[   37.541499] 
[   37.541850] Memory state around the buggy address:
[   37.542435]  fff00000c69eef80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   37.543225]  fff00000c69ef000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   37.544170] >fff00000c69ef080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   37.544968]                                      ^
[   37.545551]  fff00000c69ef100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.546456]  fff00000c69ef180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.547275] ==================================================================
[   36.857160] ==================================================================
[   36.858010] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1128/0x4858
[   36.858792] Write of size 8 at addr fff00000c69ef0b0 by task kunit_try_catch/254
[   36.859782] 
[   36.860192] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241206 #1
[   36.861236] Tainted: [B]=BAD_PAGE, [N]=TEST
[   36.861887] Hardware name: linux,dummy-virt (DT)
[   36.862575] Call trace:
[   36.863032]  show_stack+0x20/0x38 (C)
[   36.863606]  dump_stack_lvl+0x8c/0xd0
[   36.864269]  print_report+0x118/0x5e0
[   36.864952]  kasan_report+0xc8/0x118
[   36.865505]  kasan_check_range+0x100/0x1a8
[   36.866220]  __kasan_check_write+0x20/0x30
[   36.866939]  kasan_atomics_helper+0x1128/0x4858
[   36.867630]  kasan_atomics+0x198/0x2e8
[   36.868142]  kunit_try_run_case+0x14c/0x3d0
[   36.868875]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.869547]  kthread+0x24c/0x2d0
[   36.870156]  ret_from_fork+0x10/0x20
[   36.870840] 
[   36.871221] Allocated by task 254:
[   36.871803]  kasan_save_stack+0x3c/0x68
[   36.872367]  kasan_save_track+0x20/0x40
[   36.872884]  kasan_save_alloc_info+0x40/0x58
[   36.873579]  __kasan_kmalloc+0xd4/0xd8
[   36.874149]  __kmalloc_cache_noprof+0x15c/0x3c0
[   36.874777]  kasan_atomics+0xb8/0x2e8
[   36.875371]  kunit_try_run_case+0x14c/0x3d0
[   36.875924]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.876718]  kthread+0x24c/0x2d0
[   36.877211]  ret_from_fork+0x10/0x20
[   36.877811] 
[   36.878143] The buggy address belongs to the object at fff00000c69ef080
[   36.878143]  which belongs to the cache kmalloc-64 of size 64
[   36.879543] The buggy address is located 0 bytes to the right of
[   36.879543]  allocated 48-byte region [fff00000c69ef080, fff00000c69ef0b0)
[   36.881261] 
[   36.881620] The buggy address belongs to the physical page:
[   36.882292] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1069ef
[   36.883088] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   36.884012] page_type: f5(slab)
[   36.884275] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   36.884819] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   36.885796] page dumped because: kasan: bad access detected
[   36.886413] 
[   36.886797] Memory state around the buggy address:
[   36.887491]  fff00000c69eef80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   36.888314]  fff00000c69ef000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   36.889114] >fff00000c69ef080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   36.889985]                                      ^
[   36.890710]  fff00000c69ef100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.891534]  fff00000c69ef180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.892360] ==================================================================
[   36.626931] ==================================================================
[   36.627674] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xeb8/0x4858
[   36.628460] Write of size 8 at addr fff00000c69ef0b0 by task kunit_try_catch/254
[   36.629244] 
[   36.629663] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241206 #1
[   36.630851] Tainted: [B]=BAD_PAGE, [N]=TEST
[   36.631360] Hardware name: linux,dummy-virt (DT)
[   36.632559] Call trace:
[   36.632940]  show_stack+0x20/0x38 (C)
[   36.633869]  dump_stack_lvl+0x8c/0xd0
[   36.634398]  print_report+0x118/0x5e0
[   36.635011]  kasan_report+0xc8/0x118
[   36.635663]  kasan_check_range+0x100/0x1a8
[   36.636325]  __kasan_check_write+0x20/0x30
[   36.636962]  kasan_atomics_helper+0xeb8/0x4858
[   36.637572]  kasan_atomics+0x198/0x2e8
[   36.638217]  kunit_try_run_case+0x14c/0x3d0
[   36.638874]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.639567]  kthread+0x24c/0x2d0
[   36.640157]  ret_from_fork+0x10/0x20
[   36.640766] 
[   36.641146] Allocated by task 254:
[   36.641693]  kasan_save_stack+0x3c/0x68
[   36.642260]  kasan_save_track+0x20/0x40
[   36.642889]  kasan_save_alloc_info+0x40/0x58
[   36.643455]  __kasan_kmalloc+0xd4/0xd8
[   36.644072]  __kmalloc_cache_noprof+0x15c/0x3c0
[   36.644717]  kasan_atomics+0xb8/0x2e8
[   36.645241]  kunit_try_run_case+0x14c/0x3d0
[   36.645964]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.646692]  kthread+0x24c/0x2d0
[   36.647278]  ret_from_fork+0x10/0x20
[   36.647896] 
[   36.648226] The buggy address belongs to the object at fff00000c69ef080
[   36.648226]  which belongs to the cache kmalloc-64 of size 64
[   36.649559] The buggy address is located 0 bytes to the right of
[   36.649559]  allocated 48-byte region [fff00000c69ef080, fff00000c69ef0b0)
[   36.650919] 
[   36.651257] The buggy address belongs to the physical page:
[   36.651929] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1069ef
[   36.652846] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   36.653628] page_type: f5(slab)
[   36.654201] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   36.655040] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   36.656024] page dumped because: kasan: bad access detected
[   36.656758] 
[   36.657128] Memory state around the buggy address:
[   36.657730]  fff00000c69eef80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   36.658545]  fff00000c69ef000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   36.659410] >fff00000c69ef080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   36.660175]                                      ^
[   36.660818]  fff00000c69ef100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.661663]  fff00000c69ef180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.662570] ==================================================================
[   36.931370] ==================================================================
[   36.932233] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x11f8/0x4858
[   36.932944] Write of size 8 at addr fff00000c69ef0b0 by task kunit_try_catch/254
[   36.933908] 
[   36.934364] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241206 #1
[   36.935649] Tainted: [B]=BAD_PAGE, [N]=TEST
[   36.936184] Hardware name: linux,dummy-virt (DT)
[   36.936874] Call trace:
[   36.937342]  show_stack+0x20/0x38 (C)
[   36.938032]  dump_stack_lvl+0x8c/0xd0
[   36.938669]  print_report+0x118/0x5e0
[   36.939333]  kasan_report+0xc8/0x118
[   36.939991]  kasan_check_range+0x100/0x1a8
[   36.940604]  __kasan_check_write+0x20/0x30
[   36.941292]  kasan_atomics_helper+0x11f8/0x4858
[   36.941945]  kasan_atomics+0x198/0x2e8
[   36.942543]  kunit_try_run_case+0x14c/0x3d0
[   36.943216]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.944065]  kthread+0x24c/0x2d0
[   36.944687]  ret_from_fork+0x10/0x20
[   36.945271] 
[   36.945674] Allocated by task 254:
[   36.946146]  kasan_save_stack+0x3c/0x68
[   36.946808]  kasan_save_track+0x20/0x40
[   36.947404]  kasan_save_alloc_info+0x40/0x58
[   36.948099]  __kasan_kmalloc+0xd4/0xd8
[   36.948612]  __kmalloc_cache_noprof+0x15c/0x3c0
[   36.949311]  kasan_atomics+0xb8/0x2e8
[   36.949959]  kunit_try_run_case+0x14c/0x3d0
[   36.950550]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.951312]  kthread+0x24c/0x2d0
[   36.951909]  ret_from_fork+0x10/0x20
[   36.952502] 
[   36.952898] The buggy address belongs to the object at fff00000c69ef080
[   36.952898]  which belongs to the cache kmalloc-64 of size 64
[   36.954179] The buggy address is located 0 bytes to the right of
[   36.954179]  allocated 48-byte region [fff00000c69ef080, fff00000c69ef0b0)
[   36.955559] 
[   36.955944] The buggy address belongs to the physical page:
[   36.956588] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1069ef
[   36.957526] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   36.958296] page_type: f5(slab)
[   36.958792] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   36.959690] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   36.960602] page dumped because: kasan: bad access detected
[   36.961350] 
[   36.961742] Memory state around the buggy address:
[   36.962350]  fff00000c69eef80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   36.963292]  fff00000c69ef000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   36.964110] >fff00000c69ef080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   36.965020]                                      ^
[   36.965651]  fff00000c69ef100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.966413]  fff00000c69ef180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.967260] ==================================================================
[   37.239220] ==================================================================
[   37.239964] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x154c/0x4858
[   37.240853] Write of size 8 at addr fff00000c69ef0b0 by task kunit_try_catch/254
[   37.241564] 
[   37.242015] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241206 #1
[   37.243424] Tainted: [B]=BAD_PAGE, [N]=TEST
[   37.244060] Hardware name: linux,dummy-virt (DT)
[   37.244796] Call trace:
[   37.245251]  show_stack+0x20/0x38 (C)
[   37.245954]  dump_stack_lvl+0x8c/0xd0
[   37.246669]  print_report+0x118/0x5e0
[   37.247282]  kasan_report+0xc8/0x118
[   37.247970]  kasan_check_range+0x100/0x1a8
[   37.248641]  __kasan_check_write+0x20/0x30
[   37.249348]  kasan_atomics_helper+0x154c/0x4858
[   37.250075]  kasan_atomics+0x198/0x2e8
[   37.250755]  kunit_try_run_case+0x14c/0x3d0
[   37.251463]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.252260]  kthread+0x24c/0x2d0
[   37.252865]  ret_from_fork+0x10/0x20
[   37.253546] 
[   37.253902] Allocated by task 254:
[   37.254499]  kasan_save_stack+0x3c/0x68
[   37.255206]  kasan_save_track+0x20/0x40
[   37.255840]  kasan_save_alloc_info+0x40/0x58
[   37.256580]  __kasan_kmalloc+0xd4/0xd8
[   37.257115]  __kmalloc_cache_noprof+0x15c/0x3c0
[   37.257864]  kasan_atomics+0xb8/0x2e8
[   37.258410]  kunit_try_run_case+0x14c/0x3d0
[   37.259134]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.259895]  kthread+0x24c/0x2d0
[   37.260466]  ret_from_fork+0x10/0x20
[   37.261060] 
[   37.261466] The buggy address belongs to the object at fff00000c69ef080
[   37.261466]  which belongs to the cache kmalloc-64 of size 64
[   37.262770] The buggy address is located 0 bytes to the right of
[   37.262770]  allocated 48-byte region [fff00000c69ef080, fff00000c69ef0b0)
[   37.264104] 
[   37.264488] The buggy address belongs to the physical page:
[   37.265096] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1069ef
[   37.266205] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   37.267232] page_type: f5(slab)
[   37.267994] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   37.269091] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   37.270132] page dumped because: kasan: bad access detected
[   37.271004] 
[   37.271338] Memory state around the buggy address:
[   37.272039]  fff00000c69eef80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   37.273184]  fff00000c69ef000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   37.274080] >fff00000c69ef080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   37.274911]                                      ^
[   37.275627]  fff00000c69ef100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.276525]  fff00000c69ef180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.277253] ==================================================================
[   37.159976] ==================================================================
[   37.161426] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x147c/0x4858
[   37.163096] Write of size 8 at addr fff00000c69ef0b0 by task kunit_try_catch/254
[   37.164015] 
[   37.164366] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241206 #1
[   37.165587] Tainted: [B]=BAD_PAGE, [N]=TEST
[   37.166106] Hardware name: linux,dummy-virt (DT)
[   37.166790] Call trace:
[   37.167230]  show_stack+0x20/0x38 (C)
[   37.167870]  dump_stack_lvl+0x8c/0xd0
[   37.168439]  print_report+0x118/0x5e0
[   37.169111]  kasan_report+0xc8/0x118
[   37.169766]  kasan_check_range+0x100/0x1a8
[   37.170417]  __kasan_check_write+0x20/0x30
[   37.171089]  kasan_atomics_helper+0x147c/0x4858
[   37.171767]  kasan_atomics+0x198/0x2e8
[   37.172330]  kunit_try_run_case+0x14c/0x3d0
[   37.172962]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.173786]  kthread+0x24c/0x2d0
[   37.174345]  ret_from_fork+0x10/0x20
[   37.174935] 
[   37.175302] Allocated by task 254:
[   37.175811]  kasan_save_stack+0x3c/0x68
[   37.176448]  kasan_save_track+0x20/0x40
[   37.177027]  kasan_save_alloc_info+0x40/0x58
[   37.177685]  __kasan_kmalloc+0xd4/0xd8
[   37.178284]  __kmalloc_cache_noprof+0x15c/0x3c0
[   37.179000]  kasan_atomics+0xb8/0x2e8
[   37.179535]  kunit_try_run_case+0x14c/0x3d0
[   37.180216]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.180889]  kthread+0x24c/0x2d0
[   37.181433]  ret_from_fork+0x10/0x20
[   37.182064] 
[   37.182425] The buggy address belongs to the object at fff00000c69ef080
[   37.182425]  which belongs to the cache kmalloc-64 of size 64
[   37.183643] The buggy address is located 0 bytes to the right of
[   37.183643]  allocated 48-byte region [fff00000c69ef080, fff00000c69ef0b0)
[   37.184975] 
[   37.185356] The buggy address belongs to the physical page:
[   37.186063] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1069ef
[   37.187097] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   37.187875] page_type: f5(slab)
[   37.188450] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   37.189357] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   37.190326] page dumped because: kasan: bad access detected
[   37.191067] 
[   37.191447] Memory state around the buggy address:
[   37.192064]  fff00000c69eef80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   37.193017]  fff00000c69ef000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   37.193774] >fff00000c69ef080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   37.194680]                                      ^
[   37.195357]  fff00000c69ef100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.196230]  fff00000c69ef180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.196924] ==================================================================
[   35.936931] ==================================================================
[   35.937720] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x934/0x4858
[   35.938493] Write of size 4 at addr fff00000c69ef0b0 by task kunit_try_catch/254
[   35.939490] 
[   35.939923] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241206 #1
[   35.941053] Tainted: [B]=BAD_PAGE, [N]=TEST
[   35.941685] Hardware name: linux,dummy-virt (DT)
[   35.942334] Call trace:
[   35.942831]  show_stack+0x20/0x38 (C)
[   35.943439]  dump_stack_lvl+0x8c/0xd0
[   35.943988]  print_report+0x118/0x5e0
[   35.944650]  kasan_report+0xc8/0x118
[   35.945266]  kasan_check_range+0x100/0x1a8
[   35.945895]  __kasan_check_write+0x20/0x30
[   35.946611]  kasan_atomics_helper+0x934/0x4858
[   35.947339]  kasan_atomics+0x198/0x2e8
[   35.947956]  kunit_try_run_case+0x14c/0x3d0
[   35.948571]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.949391]  kthread+0x24c/0x2d0
[   35.950019]  ret_from_fork+0x10/0x20
[   35.950561] 
[   35.950944] Allocated by task 254:
[   35.951526]  kasan_save_stack+0x3c/0x68
[   35.952100]  kasan_save_track+0x20/0x40
[   35.952608]  kasan_save_alloc_info+0x40/0x58
[   35.953290]  __kasan_kmalloc+0xd4/0xd8
[   35.953878]  __kmalloc_cache_noprof+0x15c/0x3c0
[   35.954591]  kasan_atomics+0xb8/0x2e8
[   35.955095]  kunit_try_run_case+0x14c/0x3d0
[   35.955826]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.956625]  kthread+0x24c/0x2d0
[   35.957160]  ret_from_fork+0x10/0x20
[   35.957692] 
[   35.958058] The buggy address belongs to the object at fff00000c69ef080
[   35.958058]  which belongs to the cache kmalloc-64 of size 64
[   35.959284] The buggy address is located 0 bytes to the right of
[   35.959284]  allocated 48-byte region [fff00000c69ef080, fff00000c69ef0b0)
[   35.960651] 
[   35.961032] The buggy address belongs to the physical page:
[   35.961729] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1069ef
[   35.962577] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   35.963430] page_type: f5(slab)
[   35.964018] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   35.964873] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   35.965783] page dumped because: kasan: bad access detected
[   35.966549] 
[   35.966915] Memory state around the buggy address:
[   35.967617]  fff00000c69eef80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   35.968478]  fff00000c69ef000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.969312] >fff00000c69ef080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   35.970139]                                      ^
[   35.970864]  fff00000c69ef100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.971624]  fff00000c69ef180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.972430] ==================================================================
[   36.778529] ==================================================================
[   36.779284] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1058/0x4858
[   36.780341] Write of size 8 at addr fff00000c69ef0b0 by task kunit_try_catch/254
[   36.781285] 
[   36.781699] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241206 #1
[   36.782871] Tainted: [B]=BAD_PAGE, [N]=TEST
[   36.783416] Hardware name: linux,dummy-virt (DT)
[   36.783977] Call trace:
[   36.784441]  show_stack+0x20/0x38 (C)
[   36.785081]  dump_stack_lvl+0x8c/0xd0
[   36.785777]  print_report+0x118/0x5e0
[   36.786343]  kasan_report+0xc8/0x118
[   36.787313]  kasan_check_range+0x100/0x1a8
[   36.788152]  __kasan_check_write+0x20/0x30
[   36.788989]  kasan_atomics_helper+0x1058/0x4858
[   36.789755]  kasan_atomics+0x198/0x2e8
[   36.790406]  kunit_try_run_case+0x14c/0x3d0
[   36.791207]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.791989]  kthread+0x24c/0x2d0
[   36.792599]  ret_from_fork+0x10/0x20
[   36.793203] 
[   36.793622] Allocated by task 254:
[   36.794231]  kasan_save_stack+0x3c/0x68
[   36.794872]  kasan_save_track+0x20/0x40
[   36.795555]  kasan_save_alloc_info+0x40/0x58
[   36.796233]  __kasan_kmalloc+0xd4/0xd8
[   36.796917]  __kmalloc_cache_noprof+0x15c/0x3c0
[   36.797583]  kasan_atomics+0xb8/0x2e8
[   36.798240]  kunit_try_run_case+0x14c/0x3d0
[   36.798838]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.799668]  kthread+0x24c/0x2d0
[   36.800245]  ret_from_fork+0x10/0x20
[   36.800885] 
[   36.801303] The buggy address belongs to the object at fff00000c69ef080
[   36.801303]  which belongs to the cache kmalloc-64 of size 64
[   36.802612] The buggy address is located 0 bytes to the right of
[   36.802612]  allocated 48-byte region [fff00000c69ef080, fff00000c69ef0b0)
[   36.803940] 
[   36.804313] The buggy address belongs to the physical page:
[   36.805035] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1069ef
[   36.806086] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   36.807035] page_type: f5(slab)
[   36.807648] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   36.808550] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   36.809581] page dumped because: kasan: bad access detected
[   36.810260] 
[   36.810625] Memory state around the buggy address:
[   36.811254]  fff00000c69eef80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   36.812476]  fff00000c69ef000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   36.813500] >fff00000c69ef080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   36.814286]                                      ^
[   36.814974]  fff00000c69ef100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.815789]  fff00000c69ef180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.816660] ==================================================================
[   36.130276] ==================================================================
[   36.131576] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3dcc/0x4858
[   36.132446] Read of size 4 at addr fff00000c69ef0b0 by task kunit_try_catch/254
[   36.133121] 
[   36.134326] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241206 #1
[   36.135565] Tainted: [B]=BAD_PAGE, [N]=TEST
[   36.136164] Hardware name: linux,dummy-virt (DT)
[   36.136802] Call trace:
[   36.137299]  show_stack+0x20/0x38 (C)
[   36.137998]  dump_stack_lvl+0x8c/0xd0
[   36.138666]  print_report+0x118/0x5e0
[   36.139332]  kasan_report+0xc8/0x118
[   36.139988]  __asan_report_load4_noabort+0x20/0x30
[   36.140717]  kasan_atomics_helper+0x3dcc/0x4858
[   36.141438]  kasan_atomics+0x198/0x2e8
[   36.142079]  kunit_try_run_case+0x14c/0x3d0
[   36.142798]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.143604]  kthread+0x24c/0x2d0
[   36.144205]  ret_from_fork+0x10/0x20
[   36.144833] 
[   36.145233] Allocated by task 254:
[   36.145763]  kasan_save_stack+0x3c/0x68
[   36.146442]  kasan_save_track+0x20/0x40
[   36.147114]  kasan_save_alloc_info+0x40/0x58
[   36.147848]  __kasan_kmalloc+0xd4/0xd8
[   36.148379]  __kmalloc_cache_noprof+0x15c/0x3c0
[   36.149194]  kasan_atomics+0xb8/0x2e8
[   36.149959]  kunit_try_run_case+0x14c/0x3d0
[   36.150760]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.151585]  kthread+0x24c/0x2d0
[   36.152242]  ret_from_fork+0x10/0x20
[   36.152910] 
[   36.153335] The buggy address belongs to the object at fff00000c69ef080
[   36.153335]  which belongs to the cache kmalloc-64 of size 64
[   36.154607] The buggy address is located 0 bytes to the right of
[   36.154607]  allocated 48-byte region [fff00000c69ef080, fff00000c69ef0b0)
[   36.156047] 
[   36.156479] The buggy address belongs to the physical page:
[   36.157140] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1069ef
[   36.158162] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   36.159097] page_type: f5(slab)
[   36.159629] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   36.160641] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   36.161556] page dumped because: kasan: bad access detected
[   36.162215] 
[   36.162651] Memory state around the buggy address:
[   36.163228]  fff00000c69eef80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   36.164158]  fff00000c69ef000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   36.164972] >fff00000c69ef080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   36.165898]                                      ^
[   36.166579]  fff00000c69ef100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.167448]  fff00000c69ef180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.168298] ==================================================================
[   36.012213] ==================================================================
[   36.013047] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa04/0x4858
[   36.014675] Write of size 4 at addr fff00000c69ef0b0 by task kunit_try_catch/254
[   36.015866] 
[   36.016284] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241206 #1
[   36.017754] Tainted: [B]=BAD_PAGE, [N]=TEST
[   36.018365] Hardware name: linux,dummy-virt (DT)
[   36.019073] Call trace:
[   36.019533]  show_stack+0x20/0x38 (C)
[   36.020289]  dump_stack_lvl+0x8c/0xd0
[   36.021070]  print_report+0x118/0x5e0
[   36.021366]  kasan_report+0xc8/0x118
[   36.021804]  kasan_check_range+0x100/0x1a8
[   36.022619]  __kasan_check_write+0x20/0x30
[   36.023396]  kasan_atomics_helper+0xa04/0x4858
[   36.024252]  kasan_atomics+0x198/0x2e8
[   36.025049]  kunit_try_run_case+0x14c/0x3d0
[   36.025776]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.026803]  kthread+0x24c/0x2d0
[   36.027606]  ret_from_fork+0x10/0x20
[   36.028195] 
[   36.028770] Allocated by task 254:
[   36.029254]  kasan_save_stack+0x3c/0x68
[   36.029896]  kasan_save_track+0x20/0x40
[   36.030473]  kasan_save_alloc_info+0x40/0x58
[   36.031121]  __kasan_kmalloc+0xd4/0xd8
[   36.031803]  __kmalloc_cache_noprof+0x15c/0x3c0
[   36.032400]  kasan_atomics+0xb8/0x2e8
[   36.033076]  kunit_try_run_case+0x14c/0x3d0
[   36.033690]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.034488]  kthread+0x24c/0x2d0
[   36.035108]  ret_from_fork+0x10/0x20
[   36.035682] 
[   36.036087] The buggy address belongs to the object at fff00000c69ef080
[   36.036087]  which belongs to the cache kmalloc-64 of size 64
[   36.037223] The buggy address is located 0 bytes to the right of
[   36.037223]  allocated 48-byte region [fff00000c69ef080, fff00000c69ef0b0)
[   36.038623] 
[   36.039018] The buggy address belongs to the physical page:
[   36.039751] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1069ef
[   36.040669] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   36.041587] page_type: f5(slab)
[   36.042124] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   36.043112] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   36.044049] page dumped because: kasan: bad access detected
[   36.044756] 
[   36.045167] Memory state around the buggy address:
[   36.045802]  fff00000c69eef80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   36.046650]  fff00000c69ef000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   36.047581] >fff00000c69ef080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   36.048423]                                      ^
[   36.049078]  fff00000c69ef100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.050002]  fff00000c69ef180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.050979] ==================================================================
[   36.893684] ==================================================================
[   36.895146] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1190/0x4858
[   36.895969] Write of size 8 at addr fff00000c69ef0b0 by task kunit_try_catch/254
[   36.896796] 
[   36.897207] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241206 #1
[   36.898441] Tainted: [B]=BAD_PAGE, [N]=TEST
[   36.899036] Hardware name: linux,dummy-virt (DT)
[   36.899633] Call trace:
[   36.900028]  show_stack+0x20/0x38 (C)
[   36.900700]  dump_stack_lvl+0x8c/0xd0
[   36.901328]  print_report+0x118/0x5e0
[   36.901996]  kasan_report+0xc8/0x118
[   36.902581]  kasan_check_range+0x100/0x1a8
[   36.903281]  __kasan_check_write+0x20/0x30
[   36.903846]  kasan_atomics_helper+0x1190/0x4858
[   36.904498]  kasan_atomics+0x198/0x2e8
[   36.905175]  kunit_try_run_case+0x14c/0x3d0
[   36.905768]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.906604]  kthread+0x24c/0x2d0
[   36.907230]  ret_from_fork+0x10/0x20
[   36.907880] 
[   36.908210] Allocated by task 254:
[   36.908798]  kasan_save_stack+0x3c/0x68
[   36.909388]  kasan_save_track+0x20/0x40
[   36.909986]  kasan_save_alloc_info+0x40/0x58
[   36.910534]  __kasan_kmalloc+0xd4/0xd8
[   36.911166]  __kmalloc_cache_noprof+0x15c/0x3c0
[   36.911841]  kasan_atomics+0xb8/0x2e8
[   36.912372]  kunit_try_run_case+0x14c/0x3d0
[   36.913045]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.913650]  kthread+0x24c/0x2d0
[   36.914229]  ret_from_fork+0x10/0x20
[   36.914855] 
[   36.915227] The buggy address belongs to the object at fff00000c69ef080
[   36.915227]  which belongs to the cache kmalloc-64 of size 64
[   36.916469] The buggy address is located 0 bytes to the right of
[   36.916469]  allocated 48-byte region [fff00000c69ef080, fff00000c69ef0b0)
[   36.917697] 
[   36.918081] The buggy address belongs to the physical page:
[   36.918854] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1069ef
[   36.919742] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   36.920505] page_type: f5(slab)
[   36.921096] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   36.921988] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   36.922940] page dumped because: kasan: bad access detected
[   36.923700] 
[   36.924018] Memory state around the buggy address:
[   36.924677]  fff00000c69eef80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   36.925450]  fff00000c69ef000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   36.926283] >fff00000c69ef080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   36.927079]                                      ^
[   36.927737]  fff00000c69ef100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.928588]  fff00000c69ef180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.929412] ==================================================================
[   37.317446] ==================================================================
[   37.319113] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3db0/0x4858
[   37.320094] Read of size 8 at addr fff00000c69ef0b0 by task kunit_try_catch/254
[   37.321057] 
[   37.321546] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241206 #1
[   37.322885] Tainted: [B]=BAD_PAGE, [N]=TEST
[   37.323592] Hardware name: linux,dummy-virt (DT)
[   37.324235] Call trace:
[   37.324790]  show_stack+0x20/0x38 (C)
[   37.325525]  dump_stack_lvl+0x8c/0xd0
[   37.326185]  print_report+0x118/0x5e0
[   37.326854]  kasan_report+0xc8/0x118
[   37.327559]  __asan_report_load8_noabort+0x20/0x30
[   37.328352]  kasan_atomics_helper+0x3db0/0x4858
[   37.329210]  kasan_atomics+0x198/0x2e8
[   37.329778]  kunit_try_run_case+0x14c/0x3d0
[   37.330366]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.331249]  kthread+0x24c/0x2d0
[   37.331861]  ret_from_fork+0x10/0x20
[   37.332402] 
[   37.332732] Allocated by task 254:
[   37.333268]  kasan_save_stack+0x3c/0x68
[   37.333873]  kasan_save_track+0x20/0x40
[   37.334506]  kasan_save_alloc_info+0x40/0x58
[   37.335067]  __kasan_kmalloc+0xd4/0xd8
[   37.335754]  __kmalloc_cache_noprof+0x15c/0x3c0
[   37.336342]  kasan_atomics+0xb8/0x2e8
[   37.336980]  kunit_try_run_case+0x14c/0x3d0
[   37.337578]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.338353]  kthread+0x24c/0x2d0
[   37.338963]  ret_from_fork+0x10/0x20
[   37.339478] 
[   37.339875] The buggy address belongs to the object at fff00000c69ef080
[   37.339875]  which belongs to the cache kmalloc-64 of size 64
[   37.341120] The buggy address is located 0 bytes to the right of
[   37.341120]  allocated 48-byte region [fff00000c69ef080, fff00000c69ef0b0)
[   37.342428] 
[   37.342843] The buggy address belongs to the physical page:
[   37.343553] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1069ef
[   37.344499] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   37.345396] page_type: f5(slab)
[   37.346011] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   37.346909] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   37.347887] page dumped because: kasan: bad access detected
[   37.348591] 
[   37.348970] Memory state around the buggy address:
[   37.349669]  fff00000c69eef80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   37.350445]  fff00000c69ef000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   37.351303] >fff00000c69ef080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   37.352086]                                      ^
[   37.352723]  fff00000c69ef100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.353504]  fff00000c69ef180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.354362] ==================================================================
[   35.672403] ==================================================================
[   35.673230] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x61c/0x4858
[   35.674473] Write of size 4 at addr fff00000c69ef0b0 by task kunit_try_catch/254
[   35.676146] 
[   35.676810] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241206 #1
[   35.677887] Tainted: [B]=BAD_PAGE, [N]=TEST
[   35.678491] Hardware name: linux,dummy-virt (DT)
[   35.679115] Call trace:
[   35.679529]  show_stack+0x20/0x38 (C)
[   35.680124]  dump_stack_lvl+0x8c/0xd0
[   35.680704]  print_report+0x118/0x5e0
[   35.681351]  kasan_report+0xc8/0x118
[   35.681972]  kasan_check_range+0x100/0x1a8
[   35.682650]  __kasan_check_write+0x20/0x30
[   35.683238]  kasan_atomics_helper+0x61c/0x4858
[   35.683922]  kasan_atomics+0x198/0x2e8
[   35.684607]  kunit_try_run_case+0x14c/0x3d0
[   35.685315]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.686052]  kthread+0x24c/0x2d0
[   35.686672]  ret_from_fork+0x10/0x20
[   35.687274] 
[   35.687682] Allocated by task 254:
[   35.688244]  kasan_save_stack+0x3c/0x68
[   35.688810]  kasan_save_track+0x20/0x40
[   35.689430]  kasan_save_alloc_info+0x40/0x58
[   35.690080]  __kasan_kmalloc+0xd4/0xd8
[   35.690717]  __kmalloc_cache_noprof+0x15c/0x3c0
[   35.691343]  kasan_atomics+0xb8/0x2e8
[   35.691977]  kunit_try_run_case+0x14c/0x3d0
[   35.692667]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.693673]  kthread+0x24c/0x2d0
[   35.694286]  ret_from_fork+0x10/0x20
[   35.694785] 
[   35.695169] The buggy address belongs to the object at fff00000c69ef080
[   35.695169]  which belongs to the cache kmalloc-64 of size 64
[   35.696448] The buggy address is located 0 bytes to the right of
[   35.696448]  allocated 48-byte region [fff00000c69ef080, fff00000c69ef0b0)
[   35.697704] 
[   35.698084] The buggy address belongs to the physical page:
[   35.698829] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1069ef
[   35.699731] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   35.700550] page_type: f5(slab)
[   35.701058] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   35.701938] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   35.702841] page dumped because: kasan: bad access detected
[   35.703599] 
[   35.703922] Memory state around the buggy address:
[   35.704534]  fff00000c69eef80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   35.705381]  fff00000c69ef000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.706375] >fff00000c69ef080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   35.707253]                                      ^
[   35.708140]  fff00000c69ef100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.709161]  fff00000c69ef180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.710095] ==================================================================
[   35.974636] ==================================================================
[   35.975729] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x99c/0x4858
[   35.976625] Write of size 4 at addr fff00000c69ef0b0 by task kunit_try_catch/254
[   35.977420] 
[   35.977831] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241206 #1
[   35.979015] Tainted: [B]=BAD_PAGE, [N]=TEST
[   35.979528] Hardware name: linux,dummy-virt (DT)
[   35.980204] Call trace:
[   35.980623]  show_stack+0x20/0x38 (C)
[   35.981274]  dump_stack_lvl+0x8c/0xd0
[   35.981960]  print_report+0x118/0x5e0
[   35.982620]  kasan_report+0xc8/0x118
[   35.983235]  kasan_check_range+0x100/0x1a8
[   35.983868]  __kasan_check_write+0x20/0x30
[   35.984584]  kasan_atomics_helper+0x99c/0x4858
[   35.985262]  kasan_atomics+0x198/0x2e8
[   35.985896]  kunit_try_run_case+0x14c/0x3d0
[   35.986489]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.987338]  kthread+0x24c/0x2d0
[   35.987949]  ret_from_fork+0x10/0x20
[   35.988622] 
[   35.988995] Allocated by task 254:
[   35.989455]  kasan_save_stack+0x3c/0x68
[   35.990101]  kasan_save_track+0x20/0x40
[   35.990638]  kasan_save_alloc_info+0x40/0x58
[   35.991312]  __kasan_kmalloc+0xd4/0xd8
[   35.991876]  __kmalloc_cache_noprof+0x15c/0x3c0
[   35.992469]  kasan_atomics+0xb8/0x2e8
[   35.993106]  kunit_try_run_case+0x14c/0x3d0
[   35.993777]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.994472]  kthread+0x24c/0x2d0
[   35.994994]  ret_from_fork+0x10/0x20
[   35.995553] 
[   35.995960] The buggy address belongs to the object at fff00000c69ef080
[   35.995960]  which belongs to the cache kmalloc-64 of size 64
[   35.997150] The buggy address is located 0 bytes to the right of
[   35.997150]  allocated 48-byte region [fff00000c69ef080, fff00000c69ef0b0)
[   35.998399] 
[   35.998800] The buggy address belongs to the physical page:
[   35.999575] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1069ef
[   36.000387] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   36.001164] page_type: f5(slab)
[   36.001756] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   36.002604] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   36.003529] page dumped because: kasan: bad access detected
[   36.004217] 
[   36.004560] Memory state around the buggy address:
[   36.005134]  fff00000c69eef80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   36.006062]  fff00000c69ef000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   36.006826] >fff00000c69ef080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   36.007749]                                      ^
[   36.008387]  fff00000c69ef100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.009193]  fff00000c69ef180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.010060] ==================================================================
[   37.083463] ==================================================================
[   37.084309] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f04/0x4858
[   37.085243] Read of size 8 at addr fff00000c69ef0b0 by task kunit_try_catch/254
[   37.086576] 
[   37.086961] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241206 #1
[   37.088094] Tainted: [B]=BAD_PAGE, [N]=TEST
[   37.088664] Hardware name: linux,dummy-virt (DT)
[   37.089182] Call trace:
[   37.089675]  show_stack+0x20/0x38 (C)
[   37.090318]  dump_stack_lvl+0x8c/0xd0
[   37.090954]  print_report+0x118/0x5e0
[   37.091605]  kasan_report+0xc8/0x118
[   37.092211]  __asan_report_load8_noabort+0x20/0x30
[   37.092965]  kasan_atomics_helper+0x3f04/0x4858
[   37.093693]  kasan_atomics+0x198/0x2e8
[   37.094337]  kunit_try_run_case+0x14c/0x3d0
[   37.095017]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.095775]  kthread+0x24c/0x2d0
[   37.096337]  ret_from_fork+0x10/0x20
[   37.097007] 
[   37.097383] Allocated by task 254:
[   37.097880]  kasan_save_stack+0x3c/0x68
[   37.098546]  kasan_save_track+0x20/0x40
[   37.099195]  kasan_save_alloc_info+0x40/0x58
[   37.099816]  __kasan_kmalloc+0xd4/0xd8
[   37.100415]  __kmalloc_cache_noprof+0x15c/0x3c0
[   37.101044]  kasan_atomics+0xb8/0x2e8
[   37.101672]  kunit_try_run_case+0x14c/0x3d0
[   37.102379]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.103043]  kthread+0x24c/0x2d0
[   37.103650]  ret_from_fork+0x10/0x20
[   37.104251] 
[   37.104632] The buggy address belongs to the object at fff00000c69ef080
[   37.104632]  which belongs to the cache kmalloc-64 of size 64
[   37.105860] The buggy address is located 0 bytes to the right of
[   37.105860]  allocated 48-byte region [fff00000c69ef080, fff00000c69ef0b0)
[   37.107105] 
[   37.107485] The buggy address belongs to the physical page:
[   37.108207] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1069ef
[   37.109133] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   37.109978] page_type: f5(slab)
[   37.110497] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   37.111472] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   37.112231] page dumped because: kasan: bad access detected
[   37.113161] 
[   37.113492] Memory state around the buggy address:
[   37.114116]  fff00000c69eef80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   37.114920]  fff00000c69ef000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   37.115857] >fff00000c69ef080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   37.116753]                                      ^
[   37.117458]  fff00000c69ef100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.118316]  fff00000c69ef180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.119205] ==================================================================
[   35.248841] ==================================================================
[   35.249587] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x24c/0x4858
[   35.250635] Write of size 4 at addr fff00000c69ef0b0 by task kunit_try_catch/254
[   35.251699] 
[   35.252139] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241206 #1
[   35.253071] Tainted: [B]=BAD_PAGE, [N]=TEST
[   35.253688] Hardware name: linux,dummy-virt (DT)
[   35.254416] Call trace:
[   35.255013]  show_stack+0x20/0x38 (C)
[   35.255760]  dump_stack_lvl+0x8c/0xd0
[   35.256471]  print_report+0x118/0x5e0
[   35.257158]  kasan_report+0xc8/0x118
[   35.257818]  kasan_check_range+0x100/0x1a8
[   35.258598]  __kasan_check_write+0x20/0x30
[   35.259314]  kasan_atomics_helper+0x24c/0x4858
[   35.260136]  kasan_atomics+0x198/0x2e8
[   35.260852]  kunit_try_run_case+0x14c/0x3d0
[   35.261529]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.262351]  kthread+0x24c/0x2d0
[   35.262965]  ret_from_fork+0x10/0x20
[   35.263626] 
[   35.264015] Allocated by task 254:
[   35.264652]  kasan_save_stack+0x3c/0x68
[   35.265259]  kasan_save_track+0x20/0x40
[   35.265965]  kasan_save_alloc_info+0x40/0x58
[   35.266564]  __kasan_kmalloc+0xd4/0xd8
[   35.267227]  __kmalloc_cache_noprof+0x15c/0x3c0
[   35.267876]  kasan_atomics+0xb8/0x2e8
[   35.268542]  kunit_try_run_case+0x14c/0x3d0
[   35.269156]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.269961]  kthread+0x24c/0x2d0
[   35.270538]  ret_from_fork+0x10/0x20
[   35.271133] 
[   35.271569] The buggy address belongs to the object at fff00000c69ef080
[   35.271569]  which belongs to the cache kmalloc-64 of size 64
[   35.272858] The buggy address is located 0 bytes to the right of
[   35.272858]  allocated 48-byte region [fff00000c69ef080, fff00000c69ef0b0)
[   35.274193] 
[   35.274622] The buggy address belongs to the physical page:
[   35.275307] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1069ef
[   35.276409] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   35.277228] page_type: f5(slab)
[   35.277842] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   35.278739] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   35.279686] page dumped because: kasan: bad access detected
[   35.280393] 
[   35.280785] Memory state around the buggy address:
[   35.281379]  fff00000c69eef80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   35.282311]  fff00000c69ef000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.283174] >fff00000c69ef080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   35.284085]                                      ^
[   35.284753]  fff00000c69ef100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.285641]  fff00000c69ef180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.286499] ==================================================================
[   36.361876] ==================================================================
[   36.362733] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3dd8/0x4858
[   36.363554] Read of size 4 at addr fff00000c69ef0b0 by task kunit_try_catch/254
[   36.364276] 
[   36.364712] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241206 #1
[   36.365929] Tainted: [B]=BAD_PAGE, [N]=TEST
[   36.366570] Hardware name: linux,dummy-virt (DT)
[   36.367088] Call trace:
[   36.368045]  show_stack+0x20/0x38 (C)
[   36.368652]  dump_stack_lvl+0x8c/0xd0
[   36.369248]  print_report+0x118/0x5e0
[   36.369841]  kasan_report+0xc8/0x118
[   36.370404]  __asan_report_load4_noabort+0x20/0x30
[   36.371193]  kasan_atomics_helper+0x3dd8/0x4858
[   36.371927]  kasan_atomics+0x198/0x2e8
[   36.372545]  kunit_try_run_case+0x14c/0x3d0
[   36.373176]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.374001]  kthread+0x24c/0x2d0
[   36.374559]  ret_from_fork+0x10/0x20
[   36.375132] 
[   36.375487] Allocated by task 254:
[   36.376047]  kasan_save_stack+0x3c/0x68
[   36.376706]  kasan_save_track+0x20/0x40
[   36.377236]  kasan_save_alloc_info+0x40/0x58
[   36.377907]  __kasan_kmalloc+0xd4/0xd8
[   36.378448]  __kmalloc_cache_noprof+0x15c/0x3c0
[   36.379152]  kasan_atomics+0xb8/0x2e8
[   36.379781]  kunit_try_run_case+0x14c/0x3d0
[   36.380335]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.381107]  kthread+0x24c/0x2d0
[   36.381654]  ret_from_fork+0x10/0x20
[   36.382268] 
[   36.382672] The buggy address belongs to the object at fff00000c69ef080
[   36.382672]  which belongs to the cache kmalloc-64 of size 64
[   36.383894] The buggy address is located 0 bytes to the right of
[   36.383894]  allocated 48-byte region [fff00000c69ef080, fff00000c69ef0b0)
[   36.385090] 
[   36.385470] The buggy address belongs to the physical page:
[   36.386216] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1069ef
[   36.387087] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   36.387987] page_type: f5(slab)
[   36.388563] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   36.389361] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   36.390331] page dumped because: kasan: bad access detected
[   36.391034] 
[   36.391376] Memory state around the buggy address:
[   36.392089]  fff00000c69eef80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   36.392933]  fff00000c69ef000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   36.393872] >fff00000c69ef080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   36.394640]                                      ^
[   36.395306]  fff00000c69ef100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.396282]  fff00000c69ef180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.397094] ==================================================================
[   36.171264] ==================================================================
[   36.172023] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xb70/0x4858
[   36.172743] Write of size 4 at addr fff00000c69ef0b0 by task kunit_try_catch/254
[   36.173656] 
[   36.174091] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241206 #1
[   36.175583] Tainted: [B]=BAD_PAGE, [N]=TEST
[   36.176266] Hardware name: linux,dummy-virt (DT)
[   36.176897] Call trace:
[   36.177381]  show_stack+0x20/0x38 (C)
[   36.177988]  dump_stack_lvl+0x8c/0xd0
[   36.178692]  print_report+0x118/0x5e0
[   36.179332]  kasan_report+0xc8/0x118
[   36.179976]  kasan_check_range+0x100/0x1a8
[   36.180668]  __kasan_check_write+0x20/0x30
[   36.181359]  kasan_atomics_helper+0xb70/0x4858
[   36.182053]  kasan_atomics+0x198/0x2e8
[   36.182727]  kunit_try_run_case+0x14c/0x3d0
[   36.183424]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.184236]  kthread+0x24c/0x2d0
[   36.184849]  ret_from_fork+0x10/0x20
[   36.185444] 
[   36.185877] Allocated by task 254:
[   36.186390]  kasan_save_stack+0x3c/0x68
[   36.187094]  kasan_save_track+0x20/0x40
[   36.187719]  kasan_save_alloc_info+0x40/0x58
[   36.188427]  __kasan_kmalloc+0xd4/0xd8
[   36.189008]  __kmalloc_cache_noprof+0x15c/0x3c0
[   36.189753]  kasan_atomics+0xb8/0x2e8
[   36.190338]  kunit_try_run_case+0x14c/0x3d0
[   36.191066]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.191771]  kthread+0x24c/0x2d0
[   36.192387]  ret_from_fork+0x10/0x20
[   36.192971] 
[   36.193395] The buggy address belongs to the object at fff00000c69ef080
[   36.193395]  which belongs to the cache kmalloc-64 of size 64
[   36.194729] The buggy address is located 0 bytes to the right of
[   36.194729]  allocated 48-byte region [fff00000c69ef080, fff00000c69ef0b0)
[   36.196159] 
[   36.196500] The buggy address belongs to the physical page:
[   36.197259] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1069ef
[   36.198209] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   36.199103] page_type: f5(slab)
[   36.199620] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   36.200606] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   36.201504] page dumped because: kasan: bad access detected
[   36.202217] 
[   36.202624] Memory state around the buggy address:
[   36.203224]  fff00000c69eef80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   36.204144]  fff00000c69ef000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   36.205053] >fff00000c69ef080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   36.206022]                                      ^
[   36.206676]  fff00000c69ef100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.207612]  fff00000c69ef180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.208388] ==================================================================
[   35.368458] ==================================================================
[   35.369246] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x32c/0x4858
[   35.370068] Write of size 4 at addr fff00000c69ef0b0 by task kunit_try_catch/254
[   35.370933] 
[   35.371310] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241206 #1
[   35.372486] Tainted: [B]=BAD_PAGE, [N]=TEST
[   35.373128] Hardware name: linux,dummy-virt (DT)
[   35.373707] Call trace:
[   35.374114]  show_stack+0x20/0x38 (C)
[   35.374789]  dump_stack_lvl+0x8c/0xd0
[   35.375450]  print_report+0x118/0x5e0
[   35.376067]  kasan_report+0xc8/0x118
[   35.376664]  kasan_check_range+0x100/0x1a8
[   35.377250]  __kasan_check_write+0x20/0x30
[   35.377961]  kasan_atomics_helper+0x32c/0x4858
[   35.378634]  kasan_atomics+0x198/0x2e8
[   35.379219]  kunit_try_run_case+0x14c/0x3d0
[   35.379957]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.380707]  kthread+0x24c/0x2d0
[   35.381319]  ret_from_fork+0x10/0x20
[   35.381984] 
[   35.382367] Allocated by task 254:
[   35.382910]  kasan_save_stack+0x3c/0x68
[   35.383567]  kasan_save_track+0x20/0x40
[   35.384095]  kasan_save_alloc_info+0x40/0x58
[   35.384771]  __kasan_kmalloc+0xd4/0xd8
[   35.385237]  __kmalloc_cache_noprof+0x15c/0x3c0
[   35.385940]  kasan_atomics+0xb8/0x2e8
[   35.386468]  kunit_try_run_case+0x14c/0x3d0
[   35.387181]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.387968]  kthread+0x24c/0x2d0
[   35.388466]  ret_from_fork+0x10/0x20
[   35.389098] 
[   35.389426] The buggy address belongs to the object at fff00000c69ef080
[   35.389426]  which belongs to the cache kmalloc-64 of size 64
[   35.390744] The buggy address is located 0 bytes to the right of
[   35.390744]  allocated 48-byte region [fff00000c69ef080, fff00000c69ef0b0)
[   35.391956] 
[   35.392343] The buggy address belongs to the physical page:
[   35.393102] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1069ef
[   35.393948] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   35.394806] page_type: f5(slab)
[   35.395324] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   35.396215] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   35.397195] page dumped because: kasan: bad access detected
[   35.397907] 
[   35.398284] Memory state around the buggy address:
[   35.398993]  fff00000c69eef80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   35.399743]  fff00000c69ef000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.400693] >fff00000c69ef080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   35.401416]                                      ^
[   35.402132]  fff00000c69ef100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.402915]  fff00000c69ef180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.403789] ==================================================================
[   36.703609] ==================================================================
[   36.704399] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf88/0x4858
[   36.705334] Write of size 8 at addr fff00000c69ef0b0 by task kunit_try_catch/254
[   36.706203] 
[   36.706628] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241206 #1
[   36.708015] Tainted: [B]=BAD_PAGE, [N]=TEST
[   36.708643] Hardware name: linux,dummy-virt (DT)
[   36.709254] Call trace:
[   36.709657]  show_stack+0x20/0x38 (C)
[   36.710268]  dump_stack_lvl+0x8c/0xd0
[   36.710952]  print_report+0x118/0x5e0
[   36.711621]  kasan_report+0xc8/0x118
[   36.712267]  kasan_check_range+0x100/0x1a8
[   36.712960]  __kasan_check_write+0x20/0x30
[   36.713663]  kasan_atomics_helper+0xf88/0x4858
[   36.714338]  kasan_atomics+0x198/0x2e8
[   36.715023]  kunit_try_run_case+0x14c/0x3d0
[   36.715784]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.716477]  kthread+0x24c/0x2d0
[   36.717113]  ret_from_fork+0x10/0x20
[   36.717733] 
[   36.718079] Allocated by task 254:
[   36.718661]  kasan_save_stack+0x3c/0x68
[   36.719303]  kasan_save_track+0x20/0x40
[   36.719913]  kasan_save_alloc_info+0x40/0x58
[   36.720580]  __kasan_kmalloc+0xd4/0xd8
[   36.721201]  __kmalloc_cache_noprof+0x15c/0x3c0
[   36.721905]  kasan_atomics+0xb8/0x2e8
[   36.722391]  kunit_try_run_case+0x14c/0x3d0
[   36.723094]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.723833]  kthread+0x24c/0x2d0
[   36.724363]  ret_from_fork+0x10/0x20
[   36.724995] 
[   36.725306] The buggy address belongs to the object at fff00000c69ef080
[   36.725306]  which belongs to the cache kmalloc-64 of size 64
[   36.726642] The buggy address is located 0 bytes to the right of
[   36.726642]  allocated 48-byte region [fff00000c69ef080, fff00000c69ef0b0)
[   36.727903] 
[   36.728278] The buggy address belongs to the physical page:
[   36.729036] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1069ef
[   36.729857] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   36.730753] page_type: f5(slab)
[   36.731275] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   36.732200] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   36.733160] page dumped because: kasan: bad access detected
[   36.733782] 
[   36.734152] Memory state around the buggy address:
[   36.734860]  fff00000c69eef80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   36.735736]  fff00000c69ef000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   36.736476] >fff00000c69ef080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   36.737349]                                      ^
[   36.737972]  fff00000c69ef100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.738803]  fff00000c69ef180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.739646] ==================================================================
[   36.968754] ==================================================================
[   36.969692] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x126c/0x4858
[   36.970670] Write of size 8 at addr fff00000c69ef0b0 by task kunit_try_catch/254
[   36.971472] 
[   36.971903] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241206 #1
[   36.973054] Tainted: [B]=BAD_PAGE, [N]=TEST
[   36.973662] Hardware name: linux,dummy-virt (DT)
[   36.974272] Call trace:
[   36.974687]  show_stack+0x20/0x38 (C)
[   36.975293]  dump_stack_lvl+0x8c/0xd0
[   36.975948]  print_report+0x118/0x5e0
[   36.976622]  kasan_report+0xc8/0x118
[   36.977274]  kasan_check_range+0x100/0x1a8
[   36.977984]  __kasan_check_write+0x20/0x30
[   36.978589]  kasan_atomics_helper+0x126c/0x4858
[   36.979324]  kasan_atomics+0x198/0x2e8
[   36.979886]  kunit_try_run_case+0x14c/0x3d0
[   36.980627]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.981361]  kthread+0x24c/0x2d0
[   36.981969]  ret_from_fork+0x10/0x20
[   36.982641] 
[   36.983019] Allocated by task 254:
[   36.983611]  kasan_save_stack+0x3c/0x68
[   36.984192]  kasan_save_track+0x20/0x40
[   36.984740]  kasan_save_alloc_info+0x40/0x58
[   36.985422]  __kasan_kmalloc+0xd4/0xd8
[   36.986028]  __kmalloc_cache_noprof+0x15c/0x3c0
[   36.986738]  kasan_atomics+0xb8/0x2e8
[   36.987266]  kunit_try_run_case+0x14c/0x3d0
[   36.987957]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.988658]  kthread+0x24c/0x2d0
[   36.989195]  ret_from_fork+0x10/0x20
[   36.989807] 
[   36.990180] The buggy address belongs to the object at fff00000c69ef080
[   36.990180]  which belongs to the cache kmalloc-64 of size 64
[   36.991469] The buggy address is located 0 bytes to the right of
[   36.991469]  allocated 48-byte region [fff00000c69ef080, fff00000c69ef0b0)
[   36.992709] 
[   36.993094] The buggy address belongs to the physical page:
[   36.993858] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1069ef
[   36.994693] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   36.995538] page_type: f5(slab)
[   36.996028] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   36.996981] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   36.997839] page dumped because: kasan: bad access detected
[   36.998378] 
[   36.998769] Memory state around the buggy address:
[   36.999457]  fff00000c69eef80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   37.000304]  fff00000c69ef000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   37.001219] >fff00000c69ef080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   37.002066]                                      ^
[   37.002783]  fff00000c69ef100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.003541]  fff00000c69ef180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.004398] ==================================================================
[   35.559076] ==================================================================
[   35.560006] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4e4/0x4858
[   35.561071] Write of size 4 at addr fff00000c69ef0b0 by task kunit_try_catch/254
[   35.562012] 
[   35.562397] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241206 #1
[   35.563535] Tainted: [B]=BAD_PAGE, [N]=TEST
[   35.564154] Hardware name: linux,dummy-virt (DT)
[   35.564743] Call trace:
[   35.565214]  show_stack+0x20/0x38 (C)
[   35.565888]  dump_stack_lvl+0x8c/0xd0
[   35.566485]  print_report+0x118/0x5e0
[   35.567050]  kasan_report+0xc8/0x118
[   35.567696]  kasan_check_range+0x100/0x1a8
[   35.568384]  __kasan_check_write+0x20/0x30
[   35.569017]  kasan_atomics_helper+0x4e4/0x4858
[   35.569757]  kasan_atomics+0x198/0x2e8
[   35.570355]  kunit_try_run_case+0x14c/0x3d0
[   35.570942]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.571759]  kthread+0x24c/0x2d0
[   35.572343]  ret_from_fork+0x10/0x20
[   35.573018] 
[   35.573394] Allocated by task 254:
[   35.573898]  kasan_save_stack+0x3c/0x68
[   35.574556]  kasan_save_track+0x20/0x40
[   35.575119]  kasan_save_alloc_info+0x40/0x58
[   35.575728]  __kasan_kmalloc+0xd4/0xd8
[   35.576353]  __kmalloc_cache_noprof+0x15c/0x3c0
[   35.577015]  kasan_atomics+0xb8/0x2e8
[   35.577659]  kunit_try_run_case+0x14c/0x3d0
[   35.578322]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.579026]  kthread+0x24c/0x2d0
[   35.579591]  ret_from_fork+0x10/0x20
[   35.580118] 
[   35.580497] The buggy address belongs to the object at fff00000c69ef080
[   35.580497]  which belongs to the cache kmalloc-64 of size 64
[   35.581971] The buggy address is located 0 bytes to the right of
[   35.581971]  allocated 48-byte region [fff00000c69ef080, fff00000c69ef0b0)
[   35.583233] 
[   35.583628] The buggy address belongs to the physical page:
[   35.584205] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1069ef
[   35.585221] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   35.586067] page_type: f5(slab)
[   35.586647] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   35.587547] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   35.588299] page dumped because: kasan: bad access detected
[   35.588966] 
[   35.589334] Memory state around the buggy address:
[   35.589857]  fff00000c69eef80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   35.590796]  fff00000c69ef000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.591665] >fff00000c69ef080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   35.592355]                                      ^
[   35.593073]  fff00000c69ef100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.593888]  fff00000c69ef180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.594772] ==================================================================
[   35.207633] ==================================================================
[   35.208605] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1ec/0x4858
[   35.209653] Read of size 4 at addr fff00000c69ef0b0 by task kunit_try_catch/254
[   35.211069] 
[   35.211416] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241206 #1
[   35.212737] Tainted: [B]=BAD_PAGE, [N]=TEST
[   35.213377] Hardware name: linux,dummy-virt (DT)
[   35.214119] Call trace:
[   35.214717]  show_stack+0x20/0x38 (C)
[   35.215354]  dump_stack_lvl+0x8c/0xd0
[   35.216110]  print_report+0x118/0x5e0
[   35.216762]  kasan_report+0xc8/0x118
[   35.217454]  kasan_check_range+0x100/0x1a8
[   35.218171]  __kasan_check_read+0x20/0x30
[   35.218891]  kasan_atomics_helper+0x1ec/0x4858
[   35.219651]  kasan_atomics+0x198/0x2e8
[   35.220298]  kunit_try_run_case+0x14c/0x3d0
[   35.221019]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.221840]  kthread+0x24c/0x2d0
[   35.222494]  ret_from_fork+0x10/0x20
[   35.223151] 
[   35.223525] Allocated by task 254:
[   35.224125]  kasan_save_stack+0x3c/0x68
[   35.224817]  kasan_save_track+0x20/0x40
[   35.225386]  kasan_save_alloc_info+0x40/0x58
[   35.226144]  __kasan_kmalloc+0xd4/0xd8
[   35.226694]  __kmalloc_cache_noprof+0x15c/0x3c0
[   35.227435]  kasan_atomics+0xb8/0x2e8
[   35.228038]  kunit_try_run_case+0x14c/0x3d0
[   35.228766]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.229528]  kthread+0x24c/0x2d0
[   35.230086]  ret_from_fork+0x10/0x20
[   35.230754] 
[   35.231154] The buggy address belongs to the object at fff00000c69ef080
[   35.231154]  which belongs to the cache kmalloc-64 of size 64
[   35.232526] The buggy address is located 0 bytes to the right of
[   35.232526]  allocated 48-byte region [fff00000c69ef080, fff00000c69ef0b0)
[   35.233916] 
[   35.234251] The buggy address belongs to the physical page:
[   35.235036] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1069ef
[   35.235999] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   35.236903] page_type: f5(slab)
[   35.237462] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   35.238415] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   35.239341] page dumped because: kasan: bad access detected
[   35.240028] 
[   35.240414] Memory state around the buggy address:
[   35.241006]  fff00000c69eef80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   35.241962]  fff00000c69ef000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.242850] >fff00000c69ef080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   35.243721]                                      ^
[   35.244396]  fff00000c69ef100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.245263]  fff00000c69ef180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.246135] ==================================================================
[   36.741070] ==================================================================
[   36.741889] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xff0/0x4858
[   36.742719] Write of size 8 at addr fff00000c69ef0b0 by task kunit_try_catch/254
[   36.743669] 
[   36.744059] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241206 #1
[   36.745296] Tainted: [B]=BAD_PAGE, [N]=TEST
[   36.745868] Hardware name: linux,dummy-virt (DT)
[   36.746564] Call trace:
[   36.747034]  show_stack+0x20/0x38 (C)
[   36.747709]  dump_stack_lvl+0x8c/0xd0
[   36.748312]  print_report+0x118/0x5e0
[   36.748944]  kasan_report+0xc8/0x118
[   36.749606]  kasan_check_range+0x100/0x1a8
[   36.750306]  __kasan_check_write+0x20/0x30
[   36.751030]  kasan_atomics_helper+0xff0/0x4858
[   36.751741]  kasan_atomics+0x198/0x2e8
[   36.752252]  kunit_try_run_case+0x14c/0x3d0
[   36.752987]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.753812]  kthread+0x24c/0x2d0
[   36.754408]  ret_from_fork+0x10/0x20
[   36.755089] 
[   36.755424] Allocated by task 254:
[   36.755962]  kasan_save_stack+0x3c/0x68
[   36.756618]  kasan_save_track+0x20/0x40
[   36.757194]  kasan_save_alloc_info+0x40/0x58
[   36.757817]  __kasan_kmalloc+0xd4/0xd8
[   36.758306]  __kmalloc_cache_noprof+0x15c/0x3c0
[   36.759024]  kasan_atomics+0xb8/0x2e8
[   36.759656]  kunit_try_run_case+0x14c/0x3d0
[   36.760341]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.761136]  kthread+0x24c/0x2d0
[   36.761654]  ret_from_fork+0x10/0x20
[   36.762259] 
[   36.762653] The buggy address belongs to the object at fff00000c69ef080
[   36.762653]  which belongs to the cache kmalloc-64 of size 64
[   36.763798] The buggy address is located 0 bytes to the right of
[   36.763798]  allocated 48-byte region [fff00000c69ef080, fff00000c69ef0b0)
[   36.765045] 
[   36.765419] The buggy address belongs to the physical page:
[   36.766218] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1069ef
[   36.767134] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   36.767940] page_type: f5(slab)
[   36.768537] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   36.769409] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   36.770146] page dumped because: kasan: bad access detected
[   36.770931] 
[   36.771302] Memory state around the buggy address:
[   36.771863]  fff00000c69eef80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   36.772773]  fff00000c69ef000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   36.773592] >fff00000c69ef080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   36.774376]                                      ^
[   36.775096]  fff00000c69ef100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.775934]  fff00000c69ef180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.776700] ==================================================================
[   37.397941] ==================================================================
[   37.398920] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3df4/0x4858
[   37.399780] Read of size 8 at addr fff00000c69ef0b0 by task kunit_try_catch/254
[   37.401148] 
[   37.401441] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241206 #1
[   37.402551] Tainted: [B]=BAD_PAGE, [N]=TEST
[   37.403102] Hardware name: linux,dummy-virt (DT)
[   37.403726] Call trace:
[   37.404090]  show_stack+0x20/0x38 (C)
[   37.404750]  dump_stack_lvl+0x8c/0xd0
[   37.405331]  print_report+0x118/0x5e0
[   37.405998]  kasan_report+0xc8/0x118
[   37.406530]  __asan_report_load8_noabort+0x20/0x30
[   37.407288]  kasan_atomics_helper+0x3df4/0x4858
[   37.407999]  kasan_atomics+0x198/0x2e8
[   37.408671]  kunit_try_run_case+0x14c/0x3d0
[   37.409316]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.410106]  kthread+0x24c/0x2d0
[   37.410609]  ret_from_fork+0x10/0x20
[   37.411245] 
[   37.411636] Allocated by task 254:
[   37.412208]  kasan_save_stack+0x3c/0x68
[   37.412764]  kasan_save_track+0x20/0x40
[   37.413327]  kasan_save_alloc_info+0x40/0x58
[   37.414007]  __kasan_kmalloc+0xd4/0xd8
[   37.414653]  __kmalloc_cache_noprof+0x15c/0x3c0
[   37.415207]  kasan_atomics+0xb8/0x2e8
[   37.415882]  kunit_try_run_case+0x14c/0x3d0
[   37.416434]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.417247]  kthread+0x24c/0x2d0
[   37.417782]  ret_from_fork+0x10/0x20
[   37.418320] 
[   37.418712] The buggy address belongs to the object at fff00000c69ef080
[   37.418712]  which belongs to the cache kmalloc-64 of size 64
[   37.419864] The buggy address is located 0 bytes to the right of
[   37.419864]  allocated 48-byte region [fff00000c69ef080, fff00000c69ef0b0)
[   37.421150] 
[   37.421821] The buggy address belongs to the physical page:
[   37.422671] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1069ef
[   37.423575] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   37.424357] page_type: f5(slab)
[   37.425083] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   37.426181] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   37.427085] page dumped because: kasan: bad access detected
[   37.427865] 
[   37.428202] Memory state around the buggy address:
[   37.428742]  fff00000c69eef80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   37.429681]  fff00000c69ef000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   37.430448] >fff00000c69ef080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   37.431283]                                      ^
[   37.431972]  fff00000c69ef100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.432794]  fff00000c69ef180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.433545] ==================================================================
[   37.587561] ==================================================================
[   37.588318] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x17ec/0x4858
[   37.589324] Write of size 8 at addr fff00000c69ef0b0 by task kunit_try_catch/254
[   37.590667] 
[   37.591134] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241206 #1
[   37.592432] Tainted: [B]=BAD_PAGE, [N]=TEST
[   37.593115] Hardware name: linux,dummy-virt (DT)
[   37.593767] Call trace:
[   37.594272]  show_stack+0x20/0x38 (C)
[   37.594988]  dump_stack_lvl+0x8c/0xd0
[   37.595692]  print_report+0x118/0x5e0
[   37.596373]  kasan_report+0xc8/0x118
[   37.597001]  kasan_check_range+0x100/0x1a8
[   37.597727]  __kasan_check_write+0x20/0x30
[   37.598427]  kasan_atomics_helper+0x17ec/0x4858
[   37.599155]  kasan_atomics+0x198/0x2e8
[   37.599858]  kunit_try_run_case+0x14c/0x3d0
[   37.600576]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.601363]  kthread+0x24c/0x2d0
[   37.601967]  ret_from_fork+0x10/0x20
[   37.602598] 
[   37.603016] Allocated by task 254:
[   37.603644]  kasan_save_stack+0x3c/0x68
[   37.604189]  kasan_save_track+0x20/0x40
[   37.604880]  kasan_save_alloc_info+0x40/0x58
[   37.605489]  __kasan_kmalloc+0xd4/0xd8
[   37.606196]  __kmalloc_cache_noprof+0x15c/0x3c0
[   37.606846]  kasan_atomics+0xb8/0x2e8
[   37.607450]  kunit_try_run_case+0x14c/0x3d0
[   37.608156]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.608953]  kthread+0x24c/0x2d0
[   37.609498]  ret_from_fork+0x10/0x20
[   37.610117] 
[   37.610503] The buggy address belongs to the object at fff00000c69ef080
[   37.610503]  which belongs to the cache kmalloc-64 of size 64
[   37.611850] The buggy address is located 0 bytes to the right of
[   37.611850]  allocated 48-byte region [fff00000c69ef080, fff00000c69ef0b0)
[   37.613394] 
[   37.613745] The buggy address belongs to the physical page:
[   37.614532] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1069ef
[   37.615463] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   37.616390] page_type: f5(slab)
[   37.617025] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   37.618000] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   37.619327] page dumped because: kasan: bad access detected
[   37.619850] 
[   37.620130] Memory state around the buggy address:
[   37.620764]  fff00000c69eef80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   37.621830]  fff00000c69ef000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   37.622807] >fff00000c69ef080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   37.623779]                                      ^
[   37.624536]  fff00000c69ef100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.625565]  fff00000c69ef180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.626414] ==================================================================
[   35.863099] ==================================================================
[   35.863992] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x894/0x4858
[   35.864886] Write of size 4 at addr fff00000c69ef0b0 by task kunit_try_catch/254
[   35.865828] 
[   35.866257] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241206 #1
[   35.867399] Tainted: [B]=BAD_PAGE, [N]=TEST
[   35.868040] Hardware name: linux,dummy-virt (DT)
[   35.868604] Call trace:
[   35.869080]  show_stack+0x20/0x38 (C)
[   35.869709]  dump_stack_lvl+0x8c/0xd0
[   35.870373]  print_report+0x118/0x5e0
[   35.870956]  kasan_report+0xc8/0x118
[   35.871553]  kasan_check_range+0x100/0x1a8
[   35.872093]  __kasan_check_write+0x20/0x30
[   35.872805]  kasan_atomics_helper+0x894/0x4858
[   35.873561]  kasan_atomics+0x198/0x2e8
[   35.874218]  kunit_try_run_case+0x14c/0x3d0
[   35.874956]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.875771]  kthread+0x24c/0x2d0
[   35.876366]  ret_from_fork+0x10/0x20
[   35.876974] 
[   35.877302] Allocated by task 254:
[   35.877817]  kasan_save_stack+0x3c/0x68
[   35.878453]  kasan_save_track+0x20/0x40
[   35.879124]  kasan_save_alloc_info+0x40/0x58
[   35.879775]  __kasan_kmalloc+0xd4/0xd8
[   35.880374]  __kmalloc_cache_noprof+0x15c/0x3c0
[   35.881059]  kasan_atomics+0xb8/0x2e8
[   35.881696]  kunit_try_run_case+0x14c/0x3d0
[   35.882293]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.883070]  kthread+0x24c/0x2d0
[   35.883543]  ret_from_fork+0x10/0x20
[   35.884144] 
[   35.884528] The buggy address belongs to the object at fff00000c69ef080
[   35.884528]  which belongs to the cache kmalloc-64 of size 64
[   35.885839] The buggy address is located 0 bytes to the right of
[   35.885839]  allocated 48-byte region [fff00000c69ef080, fff00000c69ef0b0)
[   35.887113] 
[   35.887438] The buggy address belongs to the physical page:
[   35.888215] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1069ef
[   35.889076] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   35.889911] page_type: f5(slab)
[   35.890455] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   35.891374] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   35.892314] page dumped because: kasan: bad access detected
[   35.892873] 
[   35.893250] Memory state around the buggy address:
[   35.893957]  fff00000c69eef80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   35.894822]  fff00000c69ef000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.895805] >fff00000c69ef080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   35.896679]                                      ^
[   35.897374]  fff00000c69ef100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.898143]  fff00000c69ef180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.899063] ==================================================================
[   35.518719] ==================================================================
[   35.519550] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x47c/0x4858
[   35.520466] Write of size 4 at addr fff00000c69ef0b0 by task kunit_try_catch/254
[   35.521340] 
[   35.521801] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241206 #1
[   35.523373] Tainted: [B]=BAD_PAGE, [N]=TEST
[   35.524062] Hardware name: linux,dummy-virt (DT)
[   35.524777] Call trace:
[   35.525286]  show_stack+0x20/0x38 (C)
[   35.525981]  dump_stack_lvl+0x8c/0xd0
[   35.526615]  print_report+0x118/0x5e0
[   35.527323]  kasan_report+0xc8/0x118
[   35.527939]  kasan_check_range+0x100/0x1a8
[   35.528677]  __kasan_check_write+0x20/0x30
[   35.529335]  kasan_atomics_helper+0x47c/0x4858
[   35.530043]  kasan_atomics+0x198/0x2e8
[   35.530688]  kunit_try_run_case+0x14c/0x3d0
[   35.531398]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.532195]  kthread+0x24c/0x2d0
[   35.532827]  ret_from_fork+0x10/0x20
[   35.533463] 
[   35.533843] Allocated by task 254:
[   35.534451]  kasan_save_stack+0x3c/0x68
[   35.535087]  kasan_save_track+0x20/0x40
[   35.535823]  kasan_save_alloc_info+0x40/0x58
[   35.536711]  __kasan_kmalloc+0xd4/0xd8
[   35.537538]  __kmalloc_cache_noprof+0x15c/0x3c0
[   35.538436]  kasan_atomics+0xb8/0x2e8
[   35.539249]  kunit_try_run_case+0x14c/0x3d0
[   35.539986]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.540800]  kthread+0x24c/0x2d0
[   35.541269]  ret_from_fork+0x10/0x20
[   35.541816] 
[   35.542197] The buggy address belongs to the object at fff00000c69ef080
[   35.542197]  which belongs to the cache kmalloc-64 of size 64
[   35.543549] The buggy address is located 0 bytes to the right of
[   35.543549]  allocated 48-byte region [fff00000c69ef080, fff00000c69ef0b0)
[   35.544700] 
[   35.545086] The buggy address belongs to the physical page:
[   35.545889] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1069ef
[   35.546853] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   35.547648] page_type: f5(slab)
[   35.548226] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   35.549110] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   35.549906] page dumped because: kasan: bad access detected
[   35.550638] 
[   35.551080] Memory state around the buggy address:
[   35.551644]  fff00000c69eef80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   35.552576]  fff00000c69ef000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.553387] >fff00000c69ef080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   35.554149]                                      ^
[   35.554863]  fff00000c69ef100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.555610]  fff00000c69ef180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.556495] ==================================================================
[   35.119324] ==================================================================
[   35.120920] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x40a8/0x4858
[   35.121811] Read of size 4 at addr fff00000c69ef0b0 by task kunit_try_catch/254
[   35.122693] 
[   35.123076] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241206 #1
[   35.124243] Tainted: [B]=BAD_PAGE, [N]=TEST
[   35.124917] Hardware name: linux,dummy-virt (DT)
[   35.125834] Call trace:
[   35.126181]  show_stack+0x20/0x38 (C)
[   35.127288]  dump_stack_lvl+0x8c/0xd0
[   35.127853]  print_report+0x118/0x5e0
[   35.128495]  kasan_report+0xc8/0x118
[   35.129023]  __asan_report_load4_noabort+0x20/0x30
[   35.129799]  kasan_atomics_helper+0x40a8/0x4858
[   35.130760]  kasan_atomics+0x198/0x2e8
[   35.131336]  kunit_try_run_case+0x14c/0x3d0
[   35.132036]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.132813]  kthread+0x24c/0x2d0
[   35.133414]  ret_from_fork+0x10/0x20
[   35.134035] 
[   35.134605] Allocated by task 254:
[   35.135221]  kasan_save_stack+0x3c/0x68
[   35.136077]  kasan_save_track+0x20/0x40
[   35.137110]  kasan_save_alloc_info+0x40/0x58
[   35.137772]  __kasan_kmalloc+0xd4/0xd8
[   35.139610]  __kmalloc_cache_noprof+0x15c/0x3c0
[   35.140649]  kasan_atomics+0xb8/0x2e8
[   35.141529]  kunit_try_run_case+0x14c/0x3d0
[   35.142039]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.143258]  kthread+0x24c/0x2d0
[   35.143821]  ret_from_fork+0x10/0x20
[   35.144497] 
[   35.144912] The buggy address belongs to the object at fff00000c69ef080
[   35.144912]  which belongs to the cache kmalloc-64 of size 64
[   35.146225] The buggy address is located 0 bytes to the right of
[   35.146225]  allocated 48-byte region [fff00000c69ef080, fff00000c69ef0b0)
[   35.147450] 
[   35.148166] The buggy address belongs to the physical page:
[   35.149142] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1069ef
[   35.150025] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   35.150859] page_type: f5(slab)
[   35.151556] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   35.152568] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   35.153601] page dumped because: kasan: bad access detected
[   35.154395] 
[   35.154877] Memory state around the buggy address:
[   35.155662]  fff00000c69eef80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   35.156649]  fff00000c69ef000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.157360] >fff00000c69ef080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   35.158238]                                      ^
[   35.158896]  fff00000c69ef100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.159673]  fff00000c69ef180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.160610] ==================================================================
[   36.513252] ==================================================================
[   36.514038] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f58/0x4858
[   36.515042] Read of size 8 at addr fff00000c69ef0b0 by task kunit_try_catch/254
[   36.515864] 
[   36.516266] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241206 #1
[   36.517427] Tainted: [B]=BAD_PAGE, [N]=TEST
[   36.518014] Hardware name: linux,dummy-virt (DT)
[   36.518899] Call trace:
[   36.519859]  show_stack+0x20/0x38 (C)
[   36.520844]  dump_stack_lvl+0x8c/0xd0
[   36.521493]  print_report+0x118/0x5e0
[   36.522151]  kasan_report+0xc8/0x118
[   36.522732]  __asan_report_load8_noabort+0x20/0x30
[   36.523419]  kasan_atomics_helper+0x3f58/0x4858
[   36.524146]  kasan_atomics+0x198/0x2e8
[   36.524819]  kunit_try_run_case+0x14c/0x3d0
[   36.525454]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.526331]  kthread+0x24c/0x2d0
[   36.526901]  ret_from_fork+0x10/0x20
[   36.527471] 
[   36.527806] Allocated by task 254:
[   36.528370]  kasan_save_stack+0x3c/0x68
[   36.528883]  kasan_save_track+0x20/0x40
[   36.529541]  kasan_save_alloc_info+0x40/0x58
[   36.530168]  __kasan_kmalloc+0xd4/0xd8
[   36.530759]  __kmalloc_cache_noprof+0x15c/0x3c0
[   36.531460]  kasan_atomics+0xb8/0x2e8
[   36.531992]  kunit_try_run_case+0x14c/0x3d0
[   36.532697]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.533487]  kthread+0x24c/0x2d0
[   36.534026]  ret_from_fork+0x10/0x20
[   36.534619] 
[   36.534999] The buggy address belongs to the object at fff00000c69ef080
[   36.534999]  which belongs to the cache kmalloc-64 of size 64
[   36.536195] The buggy address is located 0 bytes to the right of
[   36.536195]  allocated 48-byte region [fff00000c69ef080, fff00000c69ef0b0)
[   36.537438] 
[   36.537839] The buggy address belongs to the physical page:
[   36.538926] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1069ef
[   36.539936] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   36.540791] page_type: f5(slab)
[   36.541324] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   36.542265] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   36.543193] page dumped because: kasan: bad access detected
[   36.543822] 
[   36.544201] Memory state around the buggy address:
[   36.544899]  fff00000c69eef80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   36.545874]  fff00000c69ef000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   36.546609] >fff00000c69ef080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   36.547490]                                      ^
[   36.548137]  fff00000c69ef100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.548987]  fff00000c69ef180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.549724] ==================================================================
[   37.434975] ==================================================================
[   37.435770] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x16d0/0x4858
[   37.436741] Write of size 8 at addr fff00000c69ef0b0 by task kunit_try_catch/254
[   37.437670] 
[   37.438007] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241206 #1
[   37.439352] Tainted: [B]=BAD_PAGE, [N]=TEST
[   37.439944] Hardware name: linux,dummy-virt (DT)
[   37.440621] Call trace:
[   37.441088]  show_stack+0x20/0x38 (C)
[   37.441759]  dump_stack_lvl+0x8c/0xd0
[   37.442287]  print_report+0x118/0x5e0
[   37.442964]  kasan_report+0xc8/0x118
[   37.443643]  kasan_check_range+0x100/0x1a8
[   37.444227]  __kasan_check_write+0x20/0x30
[   37.444927]  kasan_atomics_helper+0x16d0/0x4858
[   37.445596]  kasan_atomics+0x198/0x2e8
[   37.446247]  kunit_try_run_case+0x14c/0x3d0
[   37.446843]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.447687]  kthread+0x24c/0x2d0
[   37.448212]  ret_from_fork+0x10/0x20
[   37.448880] 
[   37.449250] Allocated by task 254:
[   37.449821]  kasan_save_stack+0x3c/0x68
[   37.450311]  kasan_save_track+0x20/0x40
[   37.450963]  kasan_save_alloc_info+0x40/0x58
[   37.451541]  __kasan_kmalloc+0xd4/0xd8
[   37.452181]  __kmalloc_cache_noprof+0x15c/0x3c0
[   37.452824]  kasan_atomics+0xb8/0x2e8
[   37.453435]  kunit_try_run_case+0x14c/0x3d0
[   37.454037]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.454780]  kthread+0x24c/0x2d0
[   37.455384]  ret_from_fork+0x10/0x20
[   37.455942] 
[   37.456313] The buggy address belongs to the object at fff00000c69ef080
[   37.456313]  which belongs to the cache kmalloc-64 of size 64
[   37.457584] The buggy address is located 0 bytes to the right of
[   37.457584]  allocated 48-byte region [fff00000c69ef080, fff00000c69ef0b0)
[   37.458780] 
[   37.459170] The buggy address belongs to the physical page:
[   37.459938] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1069ef
[   37.460819] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   37.461597] page_type: f5(slab)
[   37.462150] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   37.463180] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   37.463967] page dumped because: kasan: bad access detected
[   37.464698] 
[   37.465050] Memory state around the buggy address:
[   37.465619]  fff00000c69eef80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   37.466452]  fff00000c69ef000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   37.467390] >fff00000c69ef080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   37.468266]                                      ^
[   37.468950]  fff00000c69ef100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.469841]  fff00000c69ef180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.470721] ==================================================================
[   36.474964] ==================================================================
[   36.475900] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xdd4/0x4858
[   36.476281] Read of size 8 at addr fff00000c69ef0b0 by task kunit_try_catch/254
[   36.477149] 
[   36.477758] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241206 #1
[   36.479191] Tainted: [B]=BAD_PAGE, [N]=TEST
[   36.479592] Hardware name: linux,dummy-virt (DT)
[   36.480568] Call trace:
[   36.481036]  show_stack+0x20/0x38 (C)
[   36.481672]  dump_stack_lvl+0x8c/0xd0
[   36.482229]  print_report+0x118/0x5e0
[   36.482912]  kasan_report+0xc8/0x118
[   36.483557]  kasan_check_range+0x100/0x1a8
[   36.484256]  __kasan_check_read+0x20/0x30
[   36.484970]  kasan_atomics_helper+0xdd4/0x4858
[   36.485748]  kasan_atomics+0x198/0x2e8
[   36.486426]  kunit_try_run_case+0x14c/0x3d0
[   36.487267]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.488133]  kthread+0x24c/0x2d0
[   36.488724]  ret_from_fork+0x10/0x20
[   36.489258] 
[   36.489661] Allocated by task 254:
[   36.490159]  kasan_save_stack+0x3c/0x68
[   36.490796]  kasan_save_track+0x20/0x40
[   36.491446]  kasan_save_alloc_info+0x40/0x58
[   36.492123]  __kasan_kmalloc+0xd4/0xd8
[   36.492644]  __kmalloc_cache_noprof+0x15c/0x3c0
[   36.493339]  kasan_atomics+0xb8/0x2e8
[   36.493904]  kunit_try_run_case+0x14c/0x3d0
[   36.494606]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.495394]  kthread+0x24c/0x2d0
[   36.495945]  ret_from_fork+0x10/0x20
[   36.496556] 
[   36.496939] The buggy address belongs to the object at fff00000c69ef080
[   36.496939]  which belongs to the cache kmalloc-64 of size 64
[   36.498176] The buggy address is located 0 bytes to the right of
[   36.498176]  allocated 48-byte region [fff00000c69ef080, fff00000c69ef0b0)
[   36.499597] 
[   36.499979] The buggy address belongs to the physical page:
[   36.500585] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1069ef
[   36.501612] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   36.502303] page_type: f5(slab)
[   36.502910] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   36.503736] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   36.504646] page dumped because: kasan: bad access detected
[   36.505304] 
[   36.505681] Memory state around the buggy address:
[   36.506400]  fff00000c69eef80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   36.507276]  fff00000c69ef000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   36.508123] >fff00000c69ef080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   36.508859]                                      ^
[   36.509579]  fff00000c69ef100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.510356]  fff00000c69ef180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.511232] ==================================================================
[   37.355866] ==================================================================
[   37.356812] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1644/0x4858
[   37.357750] Write of size 8 at addr fff00000c69ef0b0 by task kunit_try_catch/254
[   37.358783] 
[   37.359220] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241206 #1
[   37.360584] Tainted: [B]=BAD_PAGE, [N]=TEST
[   37.361251] Hardware name: linux,dummy-virt (DT)
[   37.362003] Call trace:
[   37.362480]  show_stack+0x20/0x38 (C)
[   37.363291]  dump_stack_lvl+0x8c/0xd0
[   37.364037]  print_report+0x118/0x5e0
[   37.364808]  kasan_report+0xc8/0x118
[   37.365491]  kasan_check_range+0x100/0x1a8
[   37.366275]  __kasan_check_write+0x20/0x30
[   37.367090]  kasan_atomics_helper+0x1644/0x4858
[   37.367865]  kasan_atomics+0x198/0x2e8
[   37.368578]  kunit_try_run_case+0x14c/0x3d0
[   37.369370]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.370206]  kthread+0x24c/0x2d0
[   37.370740]  ret_from_fork+0x10/0x20
[   37.371388] 
[   37.371769] Allocated by task 254:
[   37.372282]  kasan_save_stack+0x3c/0x68
[   37.372950]  kasan_save_track+0x20/0x40
[   37.373636]  kasan_save_alloc_info+0x40/0x58
[   37.374269]  __kasan_kmalloc+0xd4/0xd8
[   37.374942]  __kmalloc_cache_noprof+0x15c/0x3c0
[   37.375569]  kasan_atomics+0xb8/0x2e8
[   37.376253]  kunit_try_run_case+0x14c/0x3d0
[   37.376923]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.377708]  kthread+0x24c/0x2d0
[   37.378275]  ret_from_fork+0x10/0x20
[   37.378940] 
[   37.379303] The buggy address belongs to the object at fff00000c69ef080
[   37.379303]  which belongs to the cache kmalloc-64 of size 64
[   37.380568] The buggy address is located 0 bytes to the right of
[   37.380568]  allocated 48-byte region [fff00000c69ef080, fff00000c69ef0b0)
[   37.381902] 
[   37.382267] The buggy address belongs to the physical page:
[   37.382978] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1069ef
[   37.384021] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   37.384873] page_type: f5(slab)
[   37.385480] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   37.386444] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   37.387384] page dumped because: kasan: bad access detected
[   37.388086] 
[   37.388479] Memory state around the buggy address:
[   37.389103]  fff00000c69eef80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   37.390088]  fff00000c69ef000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   37.391163] >fff00000c69ef080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   37.392189]                                      ^
[   37.393005]  fff00000c69ef100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.394021]  fff00000c69ef180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.395029] ==================================================================
[   37.198504] ==================================================================
[   37.199269] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x14e4/0x4858
[   37.200098] Write of size 8 at addr fff00000c69ef0b0 by task kunit_try_catch/254
[   37.201037] 
[   37.201376] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241206 #1
[   37.202475] Tainted: [B]=BAD_PAGE, [N]=TEST
[   37.203361] Hardware name: linux,dummy-virt (DT)
[   37.204058] Call trace:
[   37.204544]  show_stack+0x20/0x38 (C)
[   37.205155]  dump_stack_lvl+0x8c/0xd0
[   37.205702]  print_report+0x118/0x5e0
[   37.206347]  kasan_report+0xc8/0x118
[   37.207024]  kasan_check_range+0x100/0x1a8
[   37.207661]  __kasan_check_write+0x20/0x30
[   37.208307]  kasan_atomics_helper+0x14e4/0x4858
[   37.208914]  kasan_atomics+0x198/0x2e8
[   37.209576]  kunit_try_run_case+0x14c/0x3d0
[   37.210288]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.211120]  kthread+0x24c/0x2d0
[   37.211777]  ret_from_fork+0x10/0x20
[   37.212323] 
[   37.213048] Allocated by task 254:
[   37.213713]  kasan_save_stack+0x3c/0x68
[   37.214335]  kasan_save_track+0x20/0x40
[   37.215050]  kasan_save_alloc_info+0x40/0x58
[   37.215802]  __kasan_kmalloc+0xd4/0xd8
[   37.216526]  __kmalloc_cache_noprof+0x15c/0x3c0
[   37.217145]  kasan_atomics+0xb8/0x2e8
[   37.217819]  kunit_try_run_case+0x14c/0x3d0
[   37.218455]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.219247]  kthread+0x24c/0x2d0
[   37.219823]  ret_from_fork+0x10/0x20
[   37.220442] 
[   37.220880] The buggy address belongs to the object at fff00000c69ef080
[   37.220880]  which belongs to the cache kmalloc-64 of size 64
[   37.222180] The buggy address is located 0 bytes to the right of
[   37.222180]  allocated 48-byte region [fff00000c69ef080, fff00000c69ef0b0)
[   37.223574] 
[   37.223975] The buggy address belongs to the physical page:
[   37.224742] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1069ef
[   37.225784] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   37.226679] page_type: f5(slab)
[   37.227172] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   37.228121] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   37.229068] page dumped because: kasan: bad access detected
[   37.229764] 
[   37.230161] Memory state around the buggy address:
[   37.230894]  fff00000c69eef80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   37.231812]  fff00000c69ef000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   37.232663] >fff00000c69ef080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   37.233557]                                      ^
[   37.234251]  fff00000c69ef100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.235140]  fff00000c69ef180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.236017] ==================================================================
[   37.279206] ==================================================================
[   37.280009] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x15b4/0x4858
[   37.281773] Write of size 8 at addr fff00000c69ef0b0 by task kunit_try_catch/254
[   37.282980] 
[   37.283365] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241206 #1
[   37.284492] Tainted: [B]=BAD_PAGE, [N]=TEST
[   37.285096] Hardware name: linux,dummy-virt (DT)
[   37.285678] Call trace:
[   37.286181]  show_stack+0x20/0x38 (C)
[   37.286785]  dump_stack_lvl+0x8c/0xd0
[   37.287452]  print_report+0x118/0x5e0
[   37.288103]  kasan_report+0xc8/0x118
[   37.288701]  kasan_check_range+0x100/0x1a8
[   37.289284]  __kasan_check_write+0x20/0x30
[   37.289994]  kasan_atomics_helper+0x15b4/0x4858
[   37.290655]  kasan_atomics+0x198/0x2e8
[   37.291326]  kunit_try_run_case+0x14c/0x3d0
[   37.291961]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.292778]  kthread+0x24c/0x2d0
[   37.293398]  ret_from_fork+0x10/0x20
[   37.294010] 
[   37.294339] Allocated by task 254:
[   37.294845]  kasan_save_stack+0x3c/0x68
[   37.295486]  kasan_save_track+0x20/0x40
[   37.296104]  kasan_save_alloc_info+0x40/0x58
[   37.296938]  __kasan_kmalloc+0xd4/0xd8
[   37.297440]  __kmalloc_cache_noprof+0x15c/0x3c0
[   37.298160]  kasan_atomics+0xb8/0x2e8
[   37.298791]  kunit_try_run_case+0x14c/0x3d0
[   37.299450]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.300093]  kthread+0x24c/0x2d0
[   37.300685]  ret_from_fork+0x10/0x20
[   37.301294] 
[   37.301689] The buggy address belongs to the object at fff00000c69ef080
[   37.301689]  which belongs to the cache kmalloc-64 of size 64
[   37.302898] The buggy address is located 0 bytes to the right of
[   37.302898]  allocated 48-byte region [fff00000c69ef080, fff00000c69ef0b0)
[   37.304256] 
[   37.304605] The buggy address belongs to the physical page:
[   37.305317] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1069ef
[   37.306285] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   37.307133] page_type: f5(slab)
[   37.307688] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   37.308612] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   37.309525] page dumped because: kasan: bad access detected
[   37.310131] 
[   37.310498] Memory state around the buggy address:
[   37.311110]  fff00000c69eef80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   37.312014]  fff00000c69ef000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   37.312725] >fff00000c69ef080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   37.313642]                                      ^
[   37.314253]  fff00000c69ef100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.315066]  fff00000c69ef180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.316020] ==================================================================
[   36.248123] ==================================================================
[   36.248771] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xc08/0x4858
[   36.249685] Write of size 4 at addr fff00000c69ef0b0 by task kunit_try_catch/254
[   36.250559] 
[   36.250977] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241206 #1
[   36.251993] Tainted: [B]=BAD_PAGE, [N]=TEST
[   36.252630] Hardware name: linux,dummy-virt (DT)
[   36.253308] Call trace:
[   36.253806]  show_stack+0x20/0x38 (C)
[   36.254356]  dump_stack_lvl+0x8c/0xd0
[   36.255021]  print_report+0x118/0x5e0
[   36.255602]  kasan_report+0xc8/0x118
[   36.256269]  kasan_check_range+0x100/0x1a8
[   36.256824]  __kasan_check_write+0x20/0x30
[   36.257537]  kasan_atomics_helper+0xc08/0x4858
[   36.258264]  kasan_atomics+0x198/0x2e8
[   36.258909]  kunit_try_run_case+0x14c/0x3d0
[   36.259647]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.260471]  kthread+0x24c/0x2d0
[   36.261054]  ret_from_fork+0x10/0x20
[   36.261621] 
[   36.262003] Allocated by task 254:
[   36.262489]  kasan_save_stack+0x3c/0x68
[   36.263156]  kasan_save_track+0x20/0x40
[   36.263736]  kasan_save_alloc_info+0x40/0x58
[   36.264360]  __kasan_kmalloc+0xd4/0xd8
[   36.264922]  __kmalloc_cache_noprof+0x15c/0x3c0
[   36.265641]  kasan_atomics+0xb8/0x2e8
[   36.266165]  kunit_try_run_case+0x14c/0x3d0
[   36.266860]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.267638]  kthread+0x24c/0x2d0
[   36.268219]  ret_from_fork+0x10/0x20
[   36.268793] 
[   36.269110] The buggy address belongs to the object at fff00000c69ef080
[   36.269110]  which belongs to the cache kmalloc-64 of size 64
[   36.270412] The buggy address is located 0 bytes to the right of
[   36.270412]  allocated 48-byte region [fff00000c69ef080, fff00000c69ef0b0)
[   36.271721] 
[   36.272104] The buggy address belongs to the physical page:
[   36.272822] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1069ef
[   36.273689] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   36.274419] page_type: f5(slab)
[   36.275027] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   36.275954] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   36.276925] page dumped because: kasan: bad access detected
[   36.277592] 
[   36.277965] Memory state around the buggy address:
[   36.278674]  fff00000c69eef80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   36.279504]  fff00000c69ef000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   36.280302] >fff00000c69ef080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   36.281065]                                      ^
[   36.281770]  fff00000c69ef100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.282548]  fff00000c69ef180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.283315] ==================================================================
[   37.006006] ==================================================================
[   37.006956] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x12d8/0x4858
[   37.007679] Write of size 8 at addr fff00000c69ef0b0 by task kunit_try_catch/254
[   37.008658] 
[   37.009063] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241206 #1
[   37.010136] Tainted: [B]=BAD_PAGE, [N]=TEST
[   37.010718] Hardware name: linux,dummy-virt (DT)
[   37.011398] Call trace:
[   37.011888]  show_stack+0x20/0x38 (C)
[   37.012501]  dump_stack_lvl+0x8c/0xd0
[   37.013124]  print_report+0x118/0x5e0
[   37.013802]  kasan_report+0xc8/0x118
[   37.014351]  kasan_check_range+0x100/0x1a8
[   37.015085]  __kasan_check_write+0x20/0x30
[   37.015784]  kasan_atomics_helper+0x12d8/0x4858
[   37.016377]  kasan_atomics+0x198/0x2e8
[   37.017050]  kunit_try_run_case+0x14c/0x3d0
[   37.017753]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.018589]  kthread+0x24c/0x2d0
[   37.019086]  ret_from_fork+0x10/0x20
[   37.019765] 
[   37.020144] Allocated by task 254:
[   37.020719]  kasan_save_stack+0x3c/0x68
[   37.021214]  kasan_save_track+0x20/0x40
[   37.021852]  kasan_save_alloc_info+0x40/0x58
[   37.022553]  __kasan_kmalloc+0xd4/0xd8
[   37.023188]  __kmalloc_cache_noprof+0x15c/0x3c0
[   37.023861]  kasan_atomics+0xb8/0x2e8
[   37.024407]  kunit_try_run_case+0x14c/0x3d0
[   37.025102]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.025894]  kthread+0x24c/0x2d0
[   37.026427]  ret_from_fork+0x10/0x20
[   37.026981] 
[   37.027347] The buggy address belongs to the object at fff00000c69ef080
[   37.027347]  which belongs to the cache kmalloc-64 of size 64
[   37.028587] The buggy address is located 0 bytes to the right of
[   37.028587]  allocated 48-byte region [fff00000c69ef080, fff00000c69ef0b0)
[   37.029957] 
[   37.030283] The buggy address belongs to the physical page:
[   37.031001] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1069ef
[   37.031849] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   37.032732] page_type: f5(slab)
[   37.033273] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   37.034155] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   37.035032] page dumped because: kasan: bad access detected
[   37.035886] 
[   37.036547] Memory state around the buggy address:
[   37.037183]  fff00000c69eef80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   37.038068]  fff00000c69ef000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   37.038979] >fff00000c69ef080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   37.039996]                                      ^
[   37.040594]  fff00000c69ef100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.041473]  fff00000c69ef180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.042465] ==================================================================
[   36.284721] ==================================================================
[   36.285454] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3de4/0x4858
[   36.286422] Read of size 4 at addr fff00000c69ef0b0 by task kunit_try_catch/254
[   36.287422] 
[   36.287853] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241206 #1
[   36.288968] Tainted: [B]=BAD_PAGE, [N]=TEST
[   36.289566] Hardware name: linux,dummy-virt (DT)
[   36.290094] Call trace:
[   36.290576]  show_stack+0x20/0x38 (C)
[   36.291234]  dump_stack_lvl+0x8c/0xd0
[   36.291870]  print_report+0x118/0x5e0
[   36.292381]  kasan_report+0xc8/0x118
[   36.293037]  __asan_report_load4_noabort+0x20/0x30
[   36.293794]  kasan_atomics_helper+0x3de4/0x4858
[   36.294349]  kasan_atomics+0x198/0x2e8
[   36.295014]  kunit_try_run_case+0x14c/0x3d0
[   36.295763]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.296482]  kthread+0x24c/0x2d0
[   36.297112]  ret_from_fork+0x10/0x20
[   36.297746] 
[   36.298132] Allocated by task 254:
[   36.298714]  kasan_save_stack+0x3c/0x68
[   36.299271]  kasan_save_track+0x20/0x40
[   36.299931]  kasan_save_alloc_info+0x40/0x58
[   36.300568]  __kasan_kmalloc+0xd4/0xd8
[   36.301147]  __kmalloc_cache_noprof+0x15c/0x3c0
[   36.301847]  kasan_atomics+0xb8/0x2e8
[   36.302458]  kunit_try_run_case+0x14c/0x3d0
[   36.303046]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.303810]  kthread+0x24c/0x2d0
[   36.304355]  ret_from_fork+0x10/0x20
[   36.304894] 
[   36.305274] The buggy address belongs to the object at fff00000c69ef080
[   36.305274]  which belongs to the cache kmalloc-64 of size 64
[   36.307013] The buggy address is located 0 bytes to the right of
[   36.307013]  allocated 48-byte region [fff00000c69ef080, fff00000c69ef0b0)
[   36.308313] 
[   36.309089] The buggy address belongs to the physical page:
[   36.309861] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1069ef
[   36.310572] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   36.311463] page_type: f5(slab)
[   36.312044] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   36.313025] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   36.314046] page dumped because: kasan: bad access detected
[   36.314677] 
[   36.315005] Memory state around the buggy address:
[   36.315751]  fff00000c69eef80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   36.316558]  fff00000c69ef000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   36.317486] >fff00000c69ef080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   36.318211]                                      ^
[   36.318926]  fff00000c69ef100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.319709]  fff00000c69ef180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.320456] ==================================================================
[   35.788143] ==================================================================
[   35.788981] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x760/0x4858
[   35.789724] Write of size 4 at addr fff00000c69ef0b0 by task kunit_try_catch/254
[   35.791016] 
[   35.791421] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241206 #1
[   35.792543] Tainted: [B]=BAD_PAGE, [N]=TEST
[   35.793173] Hardware name: linux,dummy-virt (DT)
[   35.793878] Call trace:
[   35.794398]  show_stack+0x20/0x38 (C)
[   35.795004]  dump_stack_lvl+0x8c/0xd0
[   35.795674]  print_report+0x118/0x5e0
[   35.796360]  kasan_report+0xc8/0x118
[   35.796933]  kasan_check_range+0x100/0x1a8
[   35.797633]  __kasan_check_write+0x20/0x30
[   35.798213]  kasan_atomics_helper+0x760/0x4858
[   35.798998]  kasan_atomics+0x198/0x2e8
[   35.799955]  kunit_try_run_case+0x14c/0x3d0
[   35.800575]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.801243]  kthread+0x24c/0x2d0
[   35.801807]  ret_from_fork+0x10/0x20
[   35.802387] 
[   35.802785] Allocated by task 254:
[   35.803333]  kasan_save_stack+0x3c/0x68
[   35.803990]  kasan_save_track+0x20/0x40
[   35.804642]  kasan_save_alloc_info+0x40/0x58
[   35.805166]  __kasan_kmalloc+0xd4/0xd8
[   35.805841]  __kmalloc_cache_noprof+0x15c/0x3c0
[   35.806416]  kasan_atomics+0xb8/0x2e8
[   35.807062]  kunit_try_run_case+0x14c/0x3d0
[   35.807669]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.808305]  kthread+0x24c/0x2d0
[   35.808912]  ret_from_fork+0x10/0x20
[   35.809468] 
[   35.809811] The buggy address belongs to the object at fff00000c69ef080
[   35.809811]  which belongs to the cache kmalloc-64 of size 64
[   35.811008] The buggy address is located 0 bytes to the right of
[   35.811008]  allocated 48-byte region [fff00000c69ef080, fff00000c69ef0b0)
[   35.812339] 
[   35.812743] The buggy address belongs to the physical page:
[   35.813319] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1069ef
[   35.814243] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   35.815063] page_type: f5(slab)
[   35.815573] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   35.816616] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   35.817386] page dumped because: kasan: bad access detected
[   35.818154] 
[   35.818468] Memory state around the buggy address:
[   35.819084]  fff00000c69eef80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   35.819961]  fff00000c69ef000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.820722] >fff00000c69ef080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   35.821476]                                      ^
[   35.822198]  fff00000c69ef100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.822973]  fff00000c69ef180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.823905] ==================================================================
[   35.900810] ==================================================================
[   35.901645] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x42d8/0x4858
[   35.902424] Read of size 4 at addr fff00000c69ef0b0 by task kunit_try_catch/254
[   35.903316] 
[   35.903703] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241206 #1
[   35.904830] Tainted: [B]=BAD_PAGE, [N]=TEST
[   35.905320] Hardware name: linux,dummy-virt (DT)
[   35.906020] Call trace:
[   35.906488]  show_stack+0x20/0x38 (C)
[   35.907161]  dump_stack_lvl+0x8c/0xd0
[   35.907739]  print_report+0x118/0x5e0
[   35.908385]  kasan_report+0xc8/0x118
[   35.908951]  __asan_report_load4_noabort+0x20/0x30
[   35.909704]  kasan_atomics_helper+0x42d8/0x4858
[   35.910268]  kasan_atomics+0x198/0x2e8
[   35.910941]  kunit_try_run_case+0x14c/0x3d0
[   35.911538]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.912316]  kthread+0x24c/0x2d0
[   35.912861]  ret_from_fork+0x10/0x20
[   35.913526] 
[   35.913897] Allocated by task 254:
[   35.914455]  kasan_save_stack+0x3c/0x68
[   35.915041]  kasan_save_track+0x20/0x40
[   35.915715]  kasan_save_alloc_info+0x40/0x58
[   35.916245]  __kasan_kmalloc+0xd4/0xd8
[   35.916893]  __kmalloc_cache_noprof+0x15c/0x3c0
[   35.917548]  kasan_atomics+0xb8/0x2e8
[   35.918168]  kunit_try_run_case+0x14c/0x3d0
[   35.918753]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.919585]  kthread+0x24c/0x2d0
[   35.920131]  ret_from_fork+0x10/0x20
[   35.920629] 
[   35.921008] The buggy address belongs to the object at fff00000c69ef080
[   35.921008]  which belongs to the cache kmalloc-64 of size 64
[   35.922312] The buggy address is located 0 bytes to the right of
[   35.922312]  allocated 48-byte region [fff00000c69ef080, fff00000c69ef0b0)
[   35.923739] 
[   35.924094] The buggy address belongs to the physical page:
[   35.924855] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1069ef
[   35.925737] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   35.926623] page_type: f5(slab)
[   35.927171] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   35.928013] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   35.928861] page dumped because: kasan: bad access detected
[   35.929628] 
[   35.929951] Memory state around the buggy address:
[   35.930530]  fff00000c69eef80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   35.931375]  fff00000c69ef000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.932203] >fff00000c69ef080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   35.933023]                                      ^
[   35.933661]  fff00000c69ef100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.934606]  fff00000c69ef180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.935292] ==================================================================
[   37.120741] ==================================================================
[   37.121485] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1414/0x4858
[   37.122501] Write of size 8 at addr fff00000c69ef0b0 by task kunit_try_catch/254
[   37.123492] 
[   37.123956] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241206 #1
[   37.125113] Tainted: [B]=BAD_PAGE, [N]=TEST
[   37.125797] Hardware name: linux,dummy-virt (DT)
[   37.126359] Call trace:
[   37.126881]  show_stack+0x20/0x38 (C)
[   37.127529]  dump_stack_lvl+0x8c/0xd0
[   37.128203]  print_report+0x118/0x5e0
[   37.128892]  kasan_report+0xc8/0x118
[   37.129569]  kasan_check_range+0x100/0x1a8
[   37.130330]  __kasan_check_write+0x20/0x30
[   37.130959]  kasan_atomics_helper+0x1414/0x4858
[   37.131795]  kasan_atomics+0x198/0x2e8
[   37.132430]  kunit_try_run_case+0x14c/0x3d0
[   37.133198]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.133969]  kthread+0x24c/0x2d0
[   37.134643]  ret_from_fork+0x10/0x20
[   37.135279] 
[   37.135672] Allocated by task 254:
[   37.136276]  kasan_save_stack+0x3c/0x68
[   37.136890]  kasan_save_track+0x20/0x40
[   37.137582]  kasan_save_alloc_info+0x40/0x58
[   37.138202]  __kasan_kmalloc+0xd4/0xd8
[   37.138893]  __kmalloc_cache_noprof+0x15c/0x3c0
[   37.139559]  kasan_atomics+0xb8/0x2e8
[   37.140211]  kunit_try_run_case+0x14c/0x3d0
[   37.140799]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.141601]  kthread+0x24c/0x2d0
[   37.142196]  ret_from_fork+0x10/0x20
[   37.142798] 
[   37.143220] The buggy address belongs to the object at fff00000c69ef080
[   37.143220]  which belongs to the cache kmalloc-64 of size 64
[   37.144487] The buggy address is located 0 bytes to the right of
[   37.144487]  allocated 48-byte region [fff00000c69ef080, fff00000c69ef0b0)
[   37.145847] 
[   37.146220] The buggy address belongs to the physical page:
[   37.146883] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1069ef
[   37.147851] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   37.148745] page_type: f5(slab)
[   37.149280] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   37.150251] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   37.151200] page dumped because: kasan: bad access detected
[   37.151899] 
[   37.152298] Memory state around the buggy address:
[   37.152940]  fff00000c69eef80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   37.153864]  fff00000c69ef000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   37.154736] >fff00000c69ef080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   37.155616]                                      ^
[   37.156228]  fff00000c69ef100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.157107]  fff00000c69ef180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.157996] ==================================================================
[   35.481423] ==================================================================
[   35.482566] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x414/0x4858
[   35.483611] Write of size 4 at addr fff00000c69ef0b0 by task kunit_try_catch/254
[   35.484503] 
[   35.484865] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241206 #1
[   35.486008] Tainted: [B]=BAD_PAGE, [N]=TEST
[   35.486617] Hardware name: linux,dummy-virt (DT)
[   35.487130] Call trace:
[   35.487620]  show_stack+0x20/0x38 (C)
[   35.488279]  dump_stack_lvl+0x8c/0xd0
[   35.488905]  print_report+0x118/0x5e0
[   35.489421]  kasan_report+0xc8/0x118
[   35.490077]  kasan_check_range+0x100/0x1a8
[   35.490791]  __kasan_check_write+0x20/0x30
[   35.491363]  kasan_atomics_helper+0x414/0x4858
[   35.492095]  kasan_atomics+0x198/0x2e8
[   35.492707]  kunit_try_run_case+0x14c/0x3d0
[   35.493417]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.494156]  kthread+0x24c/0x2d0
[   35.494731]  ret_from_fork+0x10/0x20
[   35.495305] 
[   35.495706] Allocated by task 254:
[   35.496171]  kasan_save_stack+0x3c/0x68
[   35.496823]  kasan_save_track+0x20/0x40
[   35.497398]  kasan_save_alloc_info+0x40/0x58
[   35.498069]  __kasan_kmalloc+0xd4/0xd8
[   35.498576]  __kmalloc_cache_noprof+0x15c/0x3c0
[   35.499280]  kasan_atomics+0xb8/0x2e8
[   35.499786]  kunit_try_run_case+0x14c/0x3d0
[   35.500455]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.501101]  kthread+0x24c/0x2d0
[   35.501642]  ret_from_fork+0x10/0x20
[   35.502245] 
[   35.502646] The buggy address belongs to the object at fff00000c69ef080
[   35.502646]  which belongs to the cache kmalloc-64 of size 64
[   35.503918] The buggy address is located 0 bytes to the right of
[   35.503918]  allocated 48-byte region [fff00000c69ef080, fff00000c69ef0b0)
[   35.505027] 
[   35.505443] The buggy address belongs to the physical page:
[   35.506219] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1069ef
[   35.507196] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   35.507939] page_type: f5(slab)
[   35.508567] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   35.509484] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   35.510396] page dumped because: kasan: bad access detected
[   35.511114] 
[   35.511491] Memory state around the buggy address:
[   35.512205]  fff00000c69eef80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   35.513048]  fff00000c69ef000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.513951] >fff00000c69ef080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   35.514818]                                      ^
[   35.515436]  fff00000c69ef100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.516340]  fff00000c69ef180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.517201] ==================================================================
[   35.405667] ==================================================================
[   35.406736] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f94/0x4858
[   35.407801] Write of size 4 at addr fff00000c69ef0b0 by task kunit_try_catch/254
[   35.408477] 
[   35.408913] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241206 #1
[   35.410100] Tainted: [B]=BAD_PAGE, [N]=TEST
[   35.410597] Hardware name: linux,dummy-virt (DT)
[   35.411282] Call trace:
[   35.411777]  show_stack+0x20/0x38 (C)
[   35.412429]  dump_stack_lvl+0x8c/0xd0
[   35.413109]  print_report+0x118/0x5e0
[   35.413750]  kasan_report+0xc8/0x118
[   35.414260]  __asan_report_store4_noabort+0x20/0x30
[   35.415046]  kasan_atomics_helper+0x3f94/0x4858
[   35.415807]  kasan_atomics+0x198/0x2e8
[   35.416457]  kunit_try_run_case+0x14c/0x3d0
[   35.417175]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.418004]  kthread+0x24c/0x2d0
[   35.418572]  ret_from_fork+0x10/0x20
[   35.419159] 
[   35.419542] Allocated by task 254:
[   35.420085]  kasan_save_stack+0x3c/0x68
[   35.420756]  kasan_save_track+0x20/0x40
[   35.421376]  kasan_save_alloc_info+0x40/0x58
[   35.422025]  __kasan_kmalloc+0xd4/0xd8
[   35.422671]  __kmalloc_cache_noprof+0x15c/0x3c0
[   35.423376]  kasan_atomics+0xb8/0x2e8
[   35.423961]  kunit_try_run_case+0x14c/0x3d0
[   35.424619]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.425413]  kthread+0x24c/0x2d0
[   35.425978]  ret_from_fork+0x10/0x20
[   35.426607] 
[   35.426966] The buggy address belongs to the object at fff00000c69ef080
[   35.426966]  which belongs to the cache kmalloc-64 of size 64
[   35.428243] The buggy address is located 0 bytes to the right of
[   35.428243]  allocated 48-byte region [fff00000c69ef080, fff00000c69ef0b0)
[   35.429545] 
[   35.429928] The buggy address belongs to the physical page:
[   35.430632] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1069ef
[   35.431473] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   35.432345] page_type: f5(slab)
[   35.432896] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   35.433780] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   35.434647] page dumped because: kasan: bad access detected
[   35.435307] 
[   35.435691] Memory state around the buggy address:
[   35.436389]  fff00000c69eef80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   35.437138]  fff00000c69ef000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.438046] >fff00000c69ef080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   35.438877]                                      ^
[   35.439428]  fff00000c69ef100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.440378]  fff00000c69ef180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.441152] ==================================================================
[   36.819357] ==================================================================
[   36.820413] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x10c0/0x4858
[   36.821240] Write of size 8 at addr fff00000c69ef0b0 by task kunit_try_catch/254
[   36.822203] 
[   36.822660] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241206 #1
[   36.823960] Tainted: [B]=BAD_PAGE, [N]=TEST
[   36.824609] Hardware name: linux,dummy-virt (DT)
[   36.825302] Call trace:
[   36.825747]  show_stack+0x20/0x38 (C)
[   36.826404]  dump_stack_lvl+0x8c/0xd0
[   36.827007]  print_report+0x118/0x5e0
[   36.827594]  kasan_report+0xc8/0x118
[   36.828248]  kasan_check_range+0x100/0x1a8
[   36.828964]  __kasan_check_write+0x20/0x30
[   36.829672]  kasan_atomics_helper+0x10c0/0x4858
[   36.830288]  kasan_atomics+0x198/0x2e8
[   36.830968]  kunit_try_run_case+0x14c/0x3d0
[   36.831629]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.832436]  kthread+0x24c/0x2d0
[   36.833067]  ret_from_fork+0x10/0x20
[   36.833694] 
[   36.834040] Allocated by task 254:
[   36.834620]  kasan_save_stack+0x3c/0x68
[   36.835197]  kasan_save_track+0x20/0x40
[   36.835796]  kasan_save_alloc_info+0x40/0x58
[   36.836367]  __kasan_kmalloc+0xd4/0xd8
[   36.836971]  __kmalloc_cache_noprof+0x15c/0x3c0
[   36.837558]  kasan_atomics+0xb8/0x2e8
[   36.838191]  kunit_try_run_case+0x14c/0x3d0
[   36.838882]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.839657]  kthread+0x24c/0x2d0
[   36.840245]  ret_from_fork+0x10/0x20
[   36.840878] 
[   36.841264] The buggy address belongs to the object at fff00000c69ef080
[   36.841264]  which belongs to the cache kmalloc-64 of size 64
[   36.842348] The buggy address is located 0 bytes to the right of
[   36.842348]  allocated 48-byte region [fff00000c69ef080, fff00000c69ef0b0)
[   36.843718] 
[   36.844090] The buggy address belongs to the physical page:
[   36.844853] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1069ef
[   36.845707] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   36.846530] page_type: f5(slab)
[   36.847066] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   36.848071] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   36.848883] page dumped because: kasan: bad access detected
[   36.849708] 
[   36.850005] Memory state around the buggy address:
[   36.850710]  fff00000c69eef80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   36.851560]  fff00000c69ef000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   36.852338] >fff00000c69ef080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   36.853163]                                      ^
[   36.853746]  fff00000c69ef100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.854681]  fff00000c69ef180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.855491] ==================================================================
[   36.551253] ==================================================================
[   36.552086] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xe44/0x4858
[   36.552820] Write of size 8 at addr fff00000c69ef0b0 by task kunit_try_catch/254
[   36.553766] 
[   36.554210] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241206 #1
[   36.555277] Tainted: [B]=BAD_PAGE, [N]=TEST
[   36.555941] Hardware name: linux,dummy-virt (DT)
[   36.556571] Call trace:
[   36.557037]  show_stack+0x20/0x38 (C)
[   36.557662]  dump_stack_lvl+0x8c/0xd0
[   36.558319]  print_report+0x118/0x5e0
[   36.559003]  kasan_report+0xc8/0x118
[   36.559643]  kasan_check_range+0x100/0x1a8
[   36.560167]  __kasan_check_write+0x20/0x30
[   36.560881]  kasan_atomics_helper+0xe44/0x4858
[   36.561620]  kasan_atomics+0x198/0x2e8
[   36.562215]  kunit_try_run_case+0x14c/0x3d0
[   36.562884]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.563637]  kthread+0x24c/0x2d0
[   36.564262]  ret_from_fork+0x10/0x20
[   36.564837] 
[   36.565220] Allocated by task 254:
[   36.565814]  kasan_save_stack+0x3c/0x68
[   36.566444]  kasan_save_track+0x20/0x40
[   36.566973]  kasan_save_alloc_info+0x40/0x58
[   36.567671]  __kasan_kmalloc+0xd4/0xd8
[   36.568304]  __kmalloc_cache_noprof+0x15c/0x3c0
[   36.568888]  kasan_atomics+0xb8/0x2e8
[   36.569776]  kunit_try_run_case+0x14c/0x3d0
[   36.570406]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.571131]  kthread+0x24c/0x2d0
[   36.571729]  ret_from_fork+0x10/0x20
[   36.572268] 
[   36.572661] The buggy address belongs to the object at fff00000c69ef080
[   36.572661]  which belongs to the cache kmalloc-64 of size 64
[   36.573848] The buggy address is located 0 bytes to the right of
[   36.573848]  allocated 48-byte region [fff00000c69ef080, fff00000c69ef0b0)
[   36.575113] 
[   36.575483] The buggy address belongs to the physical page:
[   36.576278] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1069ef
[   36.577105] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   36.577955] page_type: f5(slab)
[   36.578550] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   36.579388] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   36.580362] page dumped because: kasan: bad access detected
[   36.581082] 
[   36.581456] Memory state around the buggy address:
[   36.582097]  fff00000c69eef80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   36.582943]  fff00000c69ef000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   36.583785] >fff00000c69ef080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   36.584544]                                      ^
[   36.585232]  fff00000c69ef100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.586080]  fff00000c69ef180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.586928] ==================================================================
[   37.548824] ==================================================================
[   37.549767] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e20/0x4858
[   37.550857] Read of size 8 at addr fff00000c69ef0b0 by task kunit_try_catch/254
[   37.552051] 
[   37.552782] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241206 #1
[   37.554207] Tainted: [B]=BAD_PAGE, [N]=TEST
[   37.554670] Hardware name: linux,dummy-virt (DT)
[   37.555143] Call trace:
[   37.555591]  show_stack+0x20/0x38 (C)
[   37.556111]  dump_stack_lvl+0x8c/0xd0
[   37.556405]  print_report+0x118/0x5e0
[   37.557178]  kasan_report+0xc8/0x118
[   37.557875]  __asan_report_load8_noabort+0x20/0x30
[   37.558724]  kasan_atomics_helper+0x3e20/0x4858
[   37.559529]  kasan_atomics+0x198/0x2e8
[   37.560104]  kunit_try_run_case+0x14c/0x3d0
[   37.560823]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.561637]  kthread+0x24c/0x2d0
[   37.562246]  ret_from_fork+0x10/0x20
[   37.562827] 
[   37.563203] Allocated by task 254:
[   37.563691]  kasan_save_stack+0x3c/0x68
[   37.564331]  kasan_save_track+0x20/0x40
[   37.565032]  kasan_save_alloc_info+0x40/0x58
[   37.565797]  __kasan_kmalloc+0xd4/0xd8
[   37.566335]  __kmalloc_cache_noprof+0x15c/0x3c0
[   37.567092]  kasan_atomics+0xb8/0x2e8
[   37.567681]  kunit_try_run_case+0x14c/0x3d0
[   37.568398]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.569158]  kthread+0x24c/0x2d0
[   37.569806]  ret_from_fork+0x10/0x20
[   37.570374] 
[   37.570811] The buggy address belongs to the object at fff00000c69ef080
[   37.570811]  which belongs to the cache kmalloc-64 of size 64
[   37.572127] The buggy address is located 0 bytes to the right of
[   37.572127]  allocated 48-byte region [fff00000c69ef080, fff00000c69ef0b0)
[   37.573485] 
[   37.573927] The buggy address belongs to the physical page:
[   37.574638] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1069ef
[   37.575640] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   37.576603] page_type: f5(slab)
[   37.577126] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   37.578098] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   37.579008] page dumped because: kasan: bad access detected
[   37.579748] 
[   37.580159] Memory state around the buggy address:
[   37.580860]  fff00000c69eef80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   37.581777]  fff00000c69ef000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   37.582642] >fff00000c69ef080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   37.583542]                                      ^
[   37.584158]  fff00000c69ef100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.585083]  fff00000c69ef180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.585997] ==================================================================
[   36.588661] ==================================================================
[   36.589716] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e5c/0x4858
[   36.590910] Write of size 8 at addr fff00000c69ef0b0 by task kunit_try_catch/254
[   36.591702] 
[   36.592108] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241206 #1
[   36.593407] Tainted: [B]=BAD_PAGE, [N]=TEST
[   36.593934] Hardware name: linux,dummy-virt (DT)
[   36.594631] Call trace:
[   36.595104]  show_stack+0x20/0x38 (C)
[   36.595796]  dump_stack_lvl+0x8c/0xd0
[   36.596351]  print_report+0x118/0x5e0
[   36.597004]  kasan_report+0xc8/0x118
[   36.597566]  __asan_report_store8_noabort+0x20/0x30
[   36.598326]  kasan_atomics_helper+0x3e5c/0x4858
[   36.598940]  kasan_atomics+0x198/0x2e8
[   36.599604]  kunit_try_run_case+0x14c/0x3d0
[   36.600316]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.601783]  kthread+0x24c/0x2d0
[   36.602339]  ret_from_fork+0x10/0x20
[   36.602885] 
[   36.603265] Allocated by task 254:
[   36.603840]  kasan_save_stack+0x3c/0x68
[   36.604453]  kasan_save_track+0x20/0x40
[   36.605106]  kasan_save_alloc_info+0x40/0x58
[   36.605846]  __kasan_kmalloc+0xd4/0xd8
[   36.606469]  __kmalloc_cache_noprof+0x15c/0x3c0
[   36.607097]  kasan_atomics+0xb8/0x2e8
[   36.607714]  kunit_try_run_case+0x14c/0x3d0
[   36.608399]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.609191]  kthread+0x24c/0x2d0
[   36.609719]  ret_from_fork+0x10/0x20
[   36.610302] 
[   36.610693] The buggy address belongs to the object at fff00000c69ef080
[   36.610693]  which belongs to the cache kmalloc-64 of size 64
[   36.611897] The buggy address is located 0 bytes to the right of
[   36.611897]  allocated 48-byte region [fff00000c69ef080, fff00000c69ef0b0)
[   36.613247] 
[   36.613649] The buggy address belongs to the physical page:
[   36.614301] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1069ef
[   36.615333] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   36.616141] page_type: f5(slab)
[   36.616671] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   36.617601] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   36.618371] page dumped because: kasan: bad access detected
[   36.619140] 
[   36.619535] Memory state around the buggy address:
[   36.620180]  fff00000c69eef80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   36.621126]  fff00000c69ef000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   36.621887] >fff00000c69ef080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   36.622771]                                      ^
[   36.623429]  fff00000c69ef100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.624315]  fff00000c69ef180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.625171] ==================================================================
[   37.045413] ==================================================================
[   37.046393] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1384/0x4858
[   37.047404] Write of size 8 at addr fff00000c69ef0b0 by task kunit_try_catch/254
[   37.048446] 
[   37.048944] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241206 #1
[   37.049775] Tainted: [B]=BAD_PAGE, [N]=TEST
[   37.050396] Hardware name: linux,dummy-virt (DT)
[   37.051112] Call trace:
[   37.051584]  show_stack+0x20/0x38 (C)
[   37.052247]  dump_stack_lvl+0x8c/0xd0
[   37.052827]  print_report+0x118/0x5e0
[   37.053729]  kasan_report+0xc8/0x118
[   37.054271]  kasan_check_range+0x100/0x1a8
[   37.054928]  __kasan_check_write+0x20/0x30
[   37.055619]  kasan_atomics_helper+0x1384/0x4858
[   37.056281]  kasan_atomics+0x198/0x2e8
[   37.056950]  kunit_try_run_case+0x14c/0x3d0
[   37.057567]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.058357]  kthread+0x24c/0x2d0
[   37.058918]  ret_from_fork+0x10/0x20
[   37.059584] 
[   37.059953] Allocated by task 254:
[   37.060449]  kasan_save_stack+0x3c/0x68
[   37.061114]  kasan_save_track+0x20/0x40
[   37.061734]  kasan_save_alloc_info+0x40/0x58
[   37.062419]  __kasan_kmalloc+0xd4/0xd8
[   37.063074]  __kmalloc_cache_noprof+0x15c/0x3c0
[   37.063685]  kasan_atomics+0xb8/0x2e8
[   37.064263]  kunit_try_run_case+0x14c/0x3d0
[   37.064956]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.065751]  kthread+0x24c/0x2d0
[   37.066276]  ret_from_fork+0x10/0x20
[   37.066864] 
[   37.067248] The buggy address belongs to the object at fff00000c69ef080
[   37.067248]  which belongs to the cache kmalloc-64 of size 64
[   37.068426] The buggy address is located 0 bytes to the right of
[   37.068426]  allocated 48-byte region [fff00000c69ef080, fff00000c69ef0b0)
[   37.069870] 
[   37.070253] The buggy address belongs to the physical page:
[   37.071041] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1069ef
[   37.071868] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   37.072727] page_type: f5(slab)
[   37.073307] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   37.074292] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   37.075150] page dumped because: kasan: bad access detected
[   37.075905] 
[   37.076282] Memory state around the buggy address:
[   37.076939]  fff00000c69eef80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   37.077879]  fff00000c69ef000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   37.078780] >fff00000c69ef080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   37.079638]                                      ^
[   37.080326]  fff00000c69ef100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.081114]  fff00000c69ef180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.081904] ==================================================================
[   35.596223] ==================================================================
[   35.597234] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x54c/0x4858
[   35.598425] Write of size 4 at addr fff00000c69ef0b0 by task kunit_try_catch/254
[   35.599456] 
[   35.599918] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241206 #1
[   35.601185] Tainted: [B]=BAD_PAGE, [N]=TEST
[   35.601741] Hardware name: linux,dummy-virt (DT)
[   35.602416] Call trace:
[   35.602943]  show_stack+0x20/0x38 (C)
[   35.603565]  dump_stack_lvl+0x8c/0xd0
[   35.604261]  print_report+0x118/0x5e0
[   35.604893]  kasan_report+0xc8/0x118
[   35.605472]  kasan_check_range+0x100/0x1a8
[   35.606167]  __kasan_check_write+0x20/0x30
[   35.606821]  kasan_atomics_helper+0x54c/0x4858
[   35.607558]  kasan_atomics+0x198/0x2e8
[   35.608221]  kunit_try_run_case+0x14c/0x3d0
[   35.608955]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.609652]  kthread+0x24c/0x2d0
[   35.610257]  ret_from_fork+0x10/0x20
[   35.610927] 
[   35.611280] Allocated by task 254:
[   35.611831]  kasan_save_stack+0x3c/0x68
[   35.612462]  kasan_save_track+0x20/0x40
[   35.613184]  kasan_save_alloc_info+0x40/0x58
[   35.613855]  __kasan_kmalloc+0xd4/0xd8
[   35.614413]  __kmalloc_cache_noprof+0x15c/0x3c0
[   35.615066]  kasan_atomics+0xb8/0x2e8
[   35.615584]  kunit_try_run_case+0x14c/0x3d0
[   35.616302]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.617098]  kthread+0x24c/0x2d0
[   35.617699]  ret_from_fork+0x10/0x20
[   35.618177] 
[   35.618577] The buggy address belongs to the object at fff00000c69ef080
[   35.618577]  which belongs to the cache kmalloc-64 of size 64
[   35.619686] The buggy address is located 0 bytes to the right of
[   35.619686]  allocated 48-byte region [fff00000c69ef080, fff00000c69ef0b0)
[   35.621141] 
[   35.621541] The buggy address belongs to the physical page:
[   35.622138] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1069ef
[   35.623153] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   35.624054] page_type: f5(slab)
[   35.624536] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   35.625437] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   35.626311] page dumped because: kasan: bad access detected
[   35.627087] 
[   35.627395] Memory state around the buggy address:
[   35.628013]  fff00000c69eef80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   35.628858]  fff00000c69ef000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.629722] >fff00000c69ef080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   35.630468]                                      ^
[   35.631161]  fff00000c69ef100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.631955]  fff00000c69ef180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.632818] ==================================================================
[   35.635238] ==================================================================
[   35.636199] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x5b4/0x4858
[   35.637054] Write of size 4 at addr fff00000c69ef0b0 by task kunit_try_catch/254
[   35.637905] 
[   35.638340] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241206 #1
[   35.639286] Tainted: [B]=BAD_PAGE, [N]=TEST
[   35.639920] Hardware name: linux,dummy-virt (DT)
[   35.640614] Call trace:
[   35.641084]  show_stack+0x20/0x38 (C)
[   35.641765]  dump_stack_lvl+0x8c/0xd0
[   35.642317]  print_report+0x118/0x5e0
[   35.642989]  kasan_report+0xc8/0x118
[   35.643622]  kasan_check_range+0x100/0x1a8
[   35.644251]  __kasan_check_write+0x20/0x30
[   35.644859]  kasan_atomics_helper+0x5b4/0x4858
[   35.645506]  kasan_atomics+0x198/0x2e8
[   35.646161]  kunit_try_run_case+0x14c/0x3d0
[   35.646786]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.647638]  kthread+0x24c/0x2d0
[   35.648227]  ret_from_fork+0x10/0x20
[   35.648814] 
[   35.649181] Allocated by task 254:
[   35.649720]  kasan_save_stack+0x3c/0x68
[   35.650357]  kasan_save_track+0x20/0x40
[   35.650923]  kasan_save_alloc_info+0x40/0x58
[   35.651627]  __kasan_kmalloc+0xd4/0xd8
[   35.652252]  __kmalloc_cache_noprof+0x15c/0x3c0
[   35.652808]  kasan_atomics+0xb8/0x2e8
[   35.653435]  kunit_try_run_case+0x14c/0x3d0
[   35.654125]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.654880]  kthread+0x24c/0x2d0
[   35.655467]  ret_from_fork+0x10/0x20
[   35.656122] 
[   35.656503] The buggy address belongs to the object at fff00000c69ef080
[   35.656503]  which belongs to the cache kmalloc-64 of size 64
[   35.657644] The buggy address is located 0 bytes to the right of
[   35.657644]  allocated 48-byte region [fff00000c69ef080, fff00000c69ef0b0)
[   35.658844] 
[   35.659221] The buggy address belongs to the physical page:
[   35.659965] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1069ef
[   35.660929] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   35.661676] page_type: f5(slab)
[   35.662212] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   35.663226] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   35.663990] page dumped because: kasan: bad access detected
[   35.664752] 
[   35.665132] Memory state around the buggy address:
[   35.665718]  fff00000c69eef80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   35.666615]  fff00000c69ef000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.667571] >fff00000c69ef080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   35.668265]                                      ^
[   35.668976]  fff00000c69ef100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.669772]  fff00000c69ef180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.670558] ==================================================================
[   36.091041] ==================================================================
[   36.091874] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xad4/0x4858
[   36.092788] Write of size 4 at addr fff00000c69ef0b0 by task kunit_try_catch/254
[   36.093462] 
[   36.093893] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241206 #1
[   36.095101] Tainted: [B]=BAD_PAGE, [N]=TEST
[   36.095752] Hardware name: linux,dummy-virt (DT)
[   36.096287] Call trace:
[   36.096765]  show_stack+0x20/0x38 (C)
[   36.097399]  dump_stack_lvl+0x8c/0xd0
[   36.098078]  print_report+0x118/0x5e0
[   36.098682]  kasan_report+0xc8/0x118
[   36.099343]  kasan_check_range+0x100/0x1a8
[   36.100035]  __kasan_check_write+0x20/0x30
[   36.100750]  kasan_atomics_helper+0xad4/0x4858
[   36.101408]  kasan_atomics+0x198/0x2e8
[   36.102016]  kunit_try_run_case+0x14c/0x3d0
[   36.102704]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.103555]  kthread+0x24c/0x2d0
[   36.104136]  ret_from_fork+0x10/0x20
[   36.104732] 
[   36.105162] Allocated by task 254:
[   36.105629]  kasan_save_stack+0x3c/0x68
[   36.106217]  kasan_save_track+0x20/0x40
[   36.106829]  kasan_save_alloc_info+0x40/0x58
[   36.107458]  __kasan_kmalloc+0xd4/0xd8
[   36.108068]  __kmalloc_cache_noprof+0x15c/0x3c0
[   36.109150]  kasan_atomics+0xb8/0x2e8
[   36.109674]  kunit_try_run_case+0x14c/0x3d0
[   36.110255]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.111032]  kthread+0x24c/0x2d0
[   36.111620]  ret_from_fork+0x10/0x20
[   36.112267] 
[   36.112664] The buggy address belongs to the object at fff00000c69ef080
[   36.112664]  which belongs to the cache kmalloc-64 of size 64
[   36.113919] The buggy address is located 0 bytes to the right of
[   36.113919]  allocated 48-byte region [fff00000c69ef080, fff00000c69ef0b0)
[   36.115249] 
[   36.115675] The buggy address belongs to the physical page:
[   36.116431] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1069ef
[   36.117447] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   36.118320] page_type: f5(slab)
[   36.118924] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   36.119953] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   36.120982] page dumped because: kasan: bad access detected
[   36.121772] 
[   36.122201] Memory state around the buggy address:
[   36.122864]  fff00000c69eef80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   36.123869]  fff00000c69ef000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   36.124800] >fff00000c69ef080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   36.125776]                                      ^
[   36.126345]  fff00000c69ef100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.127318]  fff00000c69ef180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.128300] ==================================================================
[   36.210102] ==================================================================
[   36.210797] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3dbc/0x4858
[   36.211792] Read of size 4 at addr fff00000c69ef0b0 by task kunit_try_catch/254
[   36.212692] 
[   36.213081] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241206 #1
[   36.214146] Tainted: [B]=BAD_PAGE, [N]=TEST
[   36.214796] Hardware name: linux,dummy-virt (DT)
[   36.215489] Call trace:
[   36.215986]  show_stack+0x20/0x38 (C)
[   36.216649]  dump_stack_lvl+0x8c/0xd0
[   36.217264]  print_report+0x118/0x5e0
[   36.217787]  kasan_report+0xc8/0x118
[   36.218420]  __asan_report_load4_noabort+0x20/0x30
[   36.219133]  kasan_atomics_helper+0x3dbc/0x4858
[   36.219869]  kasan_atomics+0x198/0x2e8
[   36.220438]  kunit_try_run_case+0x14c/0x3d0
[   36.221075]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.221851]  kthread+0x24c/0x2d0
[   36.222457]  ret_from_fork+0x10/0x20
[   36.223126] 
[   36.223440] Allocated by task 254:
[   36.224026]  kasan_save_stack+0x3c/0x68
[   36.224628]  kasan_save_track+0x20/0x40
[   36.225158]  kasan_save_alloc_info+0x40/0x58
[   36.225874]  __kasan_kmalloc+0xd4/0xd8
[   36.226496]  __kmalloc_cache_noprof+0x15c/0x3c0
[   36.227128]  kasan_atomics+0xb8/0x2e8
[   36.227775]  kunit_try_run_case+0x14c/0x3d0
[   36.228444]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.229202]  kthread+0x24c/0x2d0
[   36.229772]  ret_from_fork+0x10/0x20
[   36.230381] 
[   36.230758] The buggy address belongs to the object at fff00000c69ef080
[   36.230758]  which belongs to the cache kmalloc-64 of size 64
[   36.231956] The buggy address is located 0 bytes to the right of
[   36.231956]  allocated 48-byte region [fff00000c69ef080, fff00000c69ef0b0)
[   36.233185] 
[   36.233592] The buggy address belongs to the physical page:
[   36.234331] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1069ef
[   36.235183] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   36.236010] page_type: f5(slab)
[   36.236584] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   36.237466] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   36.238317] page dumped because: kasan: bad access detected
[   36.238962] 
[   36.239338] Memory state around the buggy address:
[   36.240041]  fff00000c69eef80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   36.240847]  fff00000c69ef000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   36.241626] >fff00000c69ef080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   36.242427]                                      ^
[   36.243151]  fff00000c69ef100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.243916]  fff00000c69ef180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.244569] ==================================================================
[   36.398494] ==================================================================
[   36.399859] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xd3c/0x4858
[   36.400841] Write of size 4 at addr fff00000c69ef0b0 by task kunit_try_catch/254
[   36.401704] 
[   36.402098] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241206 #1
[   36.403363] Tainted: [B]=BAD_PAGE, [N]=TEST
[   36.403863] Hardware name: linux,dummy-virt (DT)
[   36.404551] Call trace:
[   36.404947]  show_stack+0x20/0x38 (C)
[   36.405622]  dump_stack_lvl+0x8c/0xd0
[   36.406225]  print_report+0x118/0x5e0
[   36.406828]  kasan_report+0xc8/0x118
[   36.407483]  kasan_check_range+0x100/0x1a8
[   36.408196]  __kasan_check_write+0x20/0x30
[   36.408836]  kasan_atomics_helper+0xd3c/0x4858
[   36.409586]  kasan_atomics+0x198/0x2e8
[   36.410243]  kunit_try_run_case+0x14c/0x3d0
[   36.410984]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.411741]  kthread+0x24c/0x2d0
[   36.412245]  ret_from_fork+0x10/0x20
[   36.412914] 
[   36.413285] Allocated by task 254:
[   36.413836]  kasan_save_stack+0x3c/0x68
[   36.414468]  kasan_save_track+0x20/0x40
[   36.415048]  kasan_save_alloc_info+0x40/0x58
[   36.415668]  __kasan_kmalloc+0xd4/0xd8
[   36.416330]  __kmalloc_cache_noprof+0x15c/0x3c0
[   36.416909]  kasan_atomics+0xb8/0x2e8
[   36.417538]  kunit_try_run_case+0x14c/0x3d0
[   36.418115]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.418874]  kthread+0x24c/0x2d0
[   36.419452]  ret_from_fork+0x10/0x20
[   36.420017] 
[   36.420346] The buggy address belongs to the object at fff00000c69ef080
[   36.420346]  which belongs to the cache kmalloc-64 of size 64
[   36.421640] The buggy address is located 0 bytes to the right of
[   36.421640]  allocated 48-byte region [fff00000c69ef080, fff00000c69ef0b0)
[   36.422871] 
[   36.423252] The buggy address belongs to the physical page:
[   36.423953] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1069ef
[   36.424903] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   36.425775] page_type: f5(slab)
[   36.426317] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   36.427244] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   36.428015] page dumped because: kasan: bad access detected
[   36.428772] 
[   36.429147] Memory state around the buggy address:
[   36.430110]  fff00000c69eef80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   36.430965]  fff00000c69ef000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   36.431786] >fff00000c69ef080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   36.432603]                                      ^
[   36.433239]  fff00000c69ef100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.434089]  fff00000c69ef180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.434915] ==================================================================
[   35.443206] ==================================================================
[   35.443876] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3ac/0x4858
[   35.444500] Write of size 4 at addr fff00000c69ef0b0 by task kunit_try_catch/254
[   35.445319] 
[   35.445750] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241206 #1
[   35.447927] Tainted: [B]=BAD_PAGE, [N]=TEST
[   35.448493] Hardware name: linux,dummy-virt (DT)
[   35.449200] Call trace:
[   35.449673]  show_stack+0x20/0x38 (C)
[   35.450219]  dump_stack_lvl+0x8c/0xd0
[   35.450912]  print_report+0x118/0x5e0
[   35.451585]  kasan_report+0xc8/0x118
[   35.452205]  kasan_check_range+0x100/0x1a8
[   35.452848]  __kasan_check_write+0x20/0x30
[   35.453481]  kasan_atomics_helper+0x3ac/0x4858
[   35.454123]  kasan_atomics+0x198/0x2e8
[   35.454737]  kunit_try_run_case+0x14c/0x3d0
[   35.455400]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.456103]  kthread+0x24c/0x2d0
[   35.456732]  ret_from_fork+0x10/0x20
[   35.457373] 
[   35.457734] Allocated by task 254:
[   35.458243]  kasan_save_stack+0x3c/0x68
[   35.458868]  kasan_save_track+0x20/0x40
[   35.459488]  kasan_save_alloc_info+0x40/0x58
[   35.460178]  __kasan_kmalloc+0xd4/0xd8
[   35.460822]  __kmalloc_cache_noprof+0x15c/0x3c0
[   35.461533]  kasan_atomics+0xb8/0x2e8
[   35.462055]  kunit_try_run_case+0x14c/0x3d0
[   35.463208]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.464075]  kthread+0x24c/0x2d0
[   35.464551]  ret_from_fork+0x10/0x20
[   35.465150] 
[   35.465557] The buggy address belongs to the object at fff00000c69ef080
[   35.465557]  which belongs to the cache kmalloc-64 of size 64
[   35.466771] The buggy address is located 0 bytes to the right of
[   35.466771]  allocated 48-byte region [fff00000c69ef080, fff00000c69ef0b0)
[   35.468029] 
[   35.468412] The buggy address belongs to the physical page:
[   35.469180] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1069ef
[   35.470076] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   35.470779] page_type: f5(slab)
[   35.471359] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   35.472241] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   35.473092] page dumped because: kasan: bad access detected
[   35.473883] 
[   35.474287] Memory state around the buggy address:
[   35.474997]  fff00000c69eef80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   35.475977]  fff00000c69ef000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.476848] >fff00000c69ef080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   35.477574]                                      ^
[   35.478271]  fff00000c69ef100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.479051]  fff00000c69ef180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.479845] ==================================================================
[   36.664179] ==================================================================
[   36.665139] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf20/0x4858
[   36.665840] Write of size 8 at addr fff00000c69ef0b0 by task kunit_try_catch/254
[   36.666927] 
[   36.667338] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241206 #1
[   36.668702] Tainted: [B]=BAD_PAGE, [N]=TEST
[   36.669343] Hardware name: linux,dummy-virt (DT)
[   36.670072] Call trace:
[   36.670595]  show_stack+0x20/0x38 (C)
[   36.671280]  dump_stack_lvl+0x8c/0xd0
[   36.671888]  print_report+0x118/0x5e0
[   36.672577]  kasan_report+0xc8/0x118
[   36.673120]  kasan_check_range+0x100/0x1a8
[   36.673834]  __kasan_check_write+0x20/0x30
[   36.674452]  kasan_atomics_helper+0xf20/0x4858
[   36.675101]  kasan_atomics+0x198/0x2e8
[   36.675746]  kunit_try_run_case+0x14c/0x3d0
[   36.676460]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.677281]  kthread+0x24c/0x2d0
[   36.677926]  ret_from_fork+0x10/0x20
[   36.678594] 
[   36.678990] Allocated by task 254:
[   36.679426]  kasan_save_stack+0x3c/0x68
[   36.680270]  kasan_save_track+0x20/0x40
[   36.680868]  kasan_save_alloc_info+0x40/0x58
[   36.681418]  __kasan_kmalloc+0xd4/0xd8
[   36.681906]  __kmalloc_cache_noprof+0x15c/0x3c0
[   36.682408]  kasan_atomics+0xb8/0x2e8
[   36.682885]  kunit_try_run_case+0x14c/0x3d0
[   36.683572]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.684336]  kthread+0x24c/0x2d0
[   36.684870]  ret_from_fork+0x10/0x20
[   36.685472] 
[   36.685865] The buggy address belongs to the object at fff00000c69ef080
[   36.685865]  which belongs to the cache kmalloc-64 of size 64
[   36.686855] The buggy address is located 0 bytes to the right of
[   36.686855]  allocated 48-byte region [fff00000c69ef080, fff00000c69ef0b0)
[   36.687820] 
[   36.688092] The buggy address belongs to the physical page:
[   36.688593] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1069ef
[   36.689633] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   36.690539] page_type: f5(slab)
[   36.691118] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   36.692142] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   36.693108] page dumped because: kasan: bad access detected
[   36.693823] 
[   36.694191] Memory state around the buggy address:
[   36.694903]  fff00000c69eef80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   36.696734]  fff00000c69ef000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   36.698015] >fff00000c69ef080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   36.698834]                                      ^
[   36.699437]  fff00000c69ef100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.700249]  fff00000c69ef180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.701080] ==================================================================
[   36.322177] ==================================================================
[   36.323053] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xca0/0x4858
[   36.324003] Write of size 4 at addr fff00000c69ef0b0 by task kunit_try_catch/254
[   36.324792] 
[   36.325137] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241206 #1
[   36.326453] Tainted: [B]=BAD_PAGE, [N]=TEST
[   36.327095] Hardware name: linux,dummy-virt (DT)
[   36.327788] Call trace:
[   36.328212]  show_stack+0x20/0x38 (C)
[   36.328890]  dump_stack_lvl+0x8c/0xd0
[   36.329573]  print_report+0x118/0x5e0
[   36.330179]  kasan_report+0xc8/0x118
[   36.330809]  kasan_check_range+0x100/0x1a8
[   36.331526]  __kasan_check_write+0x20/0x30
[   36.332219]  kasan_atomics_helper+0xca0/0x4858
[   36.332915]  kasan_atomics+0x198/0x2e8
[   36.333561]  kunit_try_run_case+0x14c/0x3d0
[   36.334280]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.335143]  kthread+0x24c/0x2d0
[   36.335722]  ret_from_fork+0x10/0x20
[   36.336348] 
[   36.336939] Allocated by task 254:
[   36.337495]  kasan_save_stack+0x3c/0x68
[   36.338155]  kasan_save_track+0x20/0x40
[   36.338758]  kasan_save_alloc_info+0x40/0x58
[   36.339482]  __kasan_kmalloc+0xd4/0xd8
[   36.340075]  __kmalloc_cache_noprof+0x15c/0x3c0
[   36.340795]  kasan_atomics+0xb8/0x2e8
[   36.341457]  kunit_try_run_case+0x14c/0x3d0
[   36.342160]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.343019]  kthread+0x24c/0x2d0
[   36.343571]  ret_from_fork+0x10/0x20
[   36.344139] 
[   36.344458] The buggy address belongs to the object at fff00000c69ef080
[   36.344458]  which belongs to the cache kmalloc-64 of size 64
[   36.345688] The buggy address is located 0 bytes to the right of
[   36.345688]  allocated 48-byte region [fff00000c69ef080, fff00000c69ef0b0)
[   36.347030] 
[   36.347410] The buggy address belongs to the physical page:
[   36.348117] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1069ef
[   36.348981] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   36.349815] page_type: f5(slab)
[   36.350313] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   36.351195] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   36.352066] page dumped because: kasan: bad access detected
[   36.352743] 
[   36.353111] Memory state around the buggy address:
[   36.353647]  fff00000c69eef80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   36.354539]  fff00000c69ef000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   36.355273] >fff00000c69ef080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   36.356183]                                      ^
[   36.356806]  fff00000c69ef100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.357692]  fff00000c69ef180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.358532] ==================================================================
[   36.436231] ==================================================================
[   36.437054] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e04/0x4858
[   36.438436] Read of size 4 at addr fff00000c69ef0b0 by task kunit_try_catch/254
[   36.439289] 
[   36.439711] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241206 #1
[   36.440856] Tainted: [B]=BAD_PAGE, [N]=TEST
[   36.441392] Hardware name: linux,dummy-virt (DT)
[   36.442089] Call trace:
[   36.442563]  show_stack+0x20/0x38 (C)
[   36.443121]  dump_stack_lvl+0x8c/0xd0
[   36.443750]  print_report+0x118/0x5e0
[   36.444284]  kasan_report+0xc8/0x118
[   36.444937]  __asan_report_load4_noabort+0x20/0x30
[   36.445732]  kasan_atomics_helper+0x3e04/0x4858
[   36.446471]  kasan_atomics+0x198/0x2e8
[   36.447127]  kunit_try_run_case+0x14c/0x3d0
[   36.447766]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.448502]  kthread+0x24c/0x2d0
[   36.449014]  ret_from_fork+0x10/0x20
[   36.449677] 
[   36.450018] Allocated by task 254:
[   36.450599]  kasan_save_stack+0x3c/0x68
[   36.451225]  kasan_save_track+0x20/0x40
[   36.451824]  kasan_save_alloc_info+0x40/0x58
[   36.452416]  __kasan_kmalloc+0xd4/0xd8
[   36.453063]  __kmalloc_cache_noprof+0x15c/0x3c0
[   36.453695]  kasan_atomics+0xb8/0x2e8
[   36.454249]  kunit_try_run_case+0x14c/0x3d0
[   36.454952]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.455721]  kthread+0x24c/0x2d0
[   36.456240]  ret_from_fork+0x10/0x20
[   36.456876] 
[   36.457251] The buggy address belongs to the object at fff00000c69ef080
[   36.457251]  which belongs to the cache kmalloc-64 of size 64
[   36.458441] The buggy address is located 0 bytes to the right of
[   36.458441]  allocated 48-byte region [fff00000c69ef080, fff00000c69ef0b0)
[   36.459857] 
[   36.460219] The buggy address belongs to the physical page:
[   36.460993] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1069ef
[   36.461921] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   36.462793] page_type: f5(slab)
[   36.463376] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   36.464221] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   36.465189] page dumped because: kasan: bad access detected
[   36.465936] 
[   36.466317] Memory state around the buggy address:
[   36.466958]  fff00000c69eef80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   36.467793]  fff00000c69ef000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   36.468625] >fff00000c69ef080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   36.469403]                                      ^
[   36.470108]  fff00000c69ef100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.470939]  fff00000c69ef180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.471861] ==================================================================
[   35.162576] ==================================================================
[   35.163669] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f7c/0x4858
[   35.164545] Write of size 4 at addr fff00000c69ef0b0 by task kunit_try_catch/254
[   35.165654] 
[   35.166200] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241206 #1
[   35.167768] Tainted: [B]=BAD_PAGE, [N]=TEST
[   35.168213] Hardware name: linux,dummy-virt (DT)
[   35.168754] Call trace:
[   35.169295]  show_stack+0x20/0x38 (C)
[   35.170001]  dump_stack_lvl+0x8c/0xd0
[   35.170692]  print_report+0x118/0x5e0
[   35.171826]  kasan_report+0xc8/0x118
[   35.172482]  __asan_report_store4_noabort+0x20/0x30
[   35.173379]  kasan_atomics_helper+0x3f7c/0x4858
[   35.174133]  kasan_atomics+0x198/0x2e8
[   35.174833]  kunit_try_run_case+0x14c/0x3d0
[   35.175808]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.176600]  kthread+0x24c/0x2d0
[   35.177204]  ret_from_fork+0x10/0x20
[   35.177910] 
[   35.178204] Allocated by task 254:
[   35.179175]  kasan_save_stack+0x3c/0x68
[   35.179828]  kasan_save_track+0x20/0x40
[   35.180373]  kasan_save_alloc_info+0x40/0x58
[   35.181634]  __kasan_kmalloc+0xd4/0xd8
[   35.182435]  __kmalloc_cache_noprof+0x15c/0x3c0
[   35.183307]  kasan_atomics+0xb8/0x2e8
[   35.183907]  kunit_try_run_case+0x14c/0x3d0
[   35.184215]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.184571]  kthread+0x24c/0x2d0
[   35.185072]  ret_from_fork+0x10/0x20
[   35.185824] 
[   35.186248] The buggy address belongs to the object at fff00000c69ef080
[   35.186248]  which belongs to the cache kmalloc-64 of size 64
[   35.187645] The buggy address is located 0 bytes to the right of
[   35.187645]  allocated 48-byte region [fff00000c69ef080, fff00000c69ef0b0)
[   35.189100] 
[   35.189419] The buggy address belongs to the physical page:
[   35.190304] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1069ef
[   35.191270] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   35.192113] page_type: f5(slab)
[   35.192739] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   35.193546] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   35.194617] page dumped because: kasan: bad access detected
[   35.195271] 
[   35.195729] Memory state around the buggy address:
[   35.196467]  fff00000c69eef80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   35.197326]  fff00000c69ef000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.198750] >fff00000c69ef080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   35.199652]                                      ^
[   35.200129]  fff00000c69ef100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.201778]  fff00000c69ef180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.202769] ==================================================================

[   28.862205] ==================================================================
[   28.864294] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x730/0x5450
[   28.864984] Write of size 4 at addr ffff888102486230 by task kunit_try_catch/273
[   28.865841] 
[   28.866344] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241206 #1
[   28.867318] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.867819] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   28.869784] Call Trace:
[   28.870124]  <TASK>
[   28.870402]  dump_stack_lvl+0x73/0xb0
[   28.870828]  print_report+0xd1/0x640
[   28.871127]  ? __virt_addr_valid+0x1db/0x2d0
[   28.871958]  ? kasan_complete_mode_report_info+0x2a/0x200
[   28.873205]  kasan_report+0x102/0x140
[   28.873732]  ? kasan_atomics_helper+0x730/0x5450
[   28.874489]  ? kasan_atomics_helper+0x730/0x5450
[   28.875138]  kasan_check_range+0x10c/0x1c0
[   28.875483]  __kasan_check_write+0x18/0x20
[   28.875794]  kasan_atomics_helper+0x730/0x5450
[   28.876482]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   28.877512]  ? __kmalloc_cache_noprof+0x184/0x410
[   28.877987]  ? trace_hardirqs_on+0x37/0xe0
[   28.879066]  ? kasan_atomics+0x153/0x310
[   28.879441]  kasan_atomics+0x1dd/0x310
[   28.879823]  ? __pfx_kasan_atomics+0x10/0x10
[   28.880231]  ? __pfx_kasan_atomics+0x10/0x10
[   28.880694]  kunit_try_run_case+0x1b3/0x490
[   28.882623]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.883328]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   28.883825]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   28.884674]  ? __kthread_parkme+0x82/0x160
[   28.885324]  ? preempt_count_sub+0x50/0x80
[   28.885751]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.886686]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   28.887221]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.888226]  kthread+0x257/0x310
[   28.888617]  ? __pfx_kthread+0x10/0x10
[   28.889419]  ret_from_fork+0x41/0x80
[   28.889728]  ? __pfx_kthread+0x10/0x10
[   28.890654]  ret_from_fork_asm+0x1a/0x30
[   28.891127]  </TASK>
[   28.891348] 
[   28.891612] Allocated by task 273:
[   28.891885]  kasan_save_stack+0x3d/0x60
[   28.893012]  kasan_save_track+0x18/0x40
[   28.893435]  kasan_save_alloc_info+0x3b/0x50
[   28.893876]  __kasan_kmalloc+0xb7/0xc0
[   28.894249]  __kmalloc_cache_noprof+0x184/0x410
[   28.894675]  kasan_atomics+0x96/0x310
[   28.895646]  kunit_try_run_case+0x1b3/0x490
[   28.895975]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.897385]  kthread+0x257/0x310
[   28.897800]  ret_from_fork+0x41/0x80
[   28.898297]  ret_from_fork_asm+0x1a/0x30
[   28.899090] 
[   28.899613] The buggy address belongs to the object at ffff888102486200
[   28.899613]  which belongs to the cache kmalloc-64 of size 64
[   28.900761] The buggy address is located 0 bytes to the right of
[   28.900761]  allocated 48-byte region [ffff888102486200, ffff888102486230)
[   28.902363] 
[   28.902806] The buggy address belongs to the physical page:
[   28.903629] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102486
[   28.904511] flags: 0x200000000000000(node=0|zone=2)
[   28.904744] page_type: f5(slab)
[   28.904912] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   28.905429] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   28.906767] page dumped because: kasan: bad access detected
[   28.907165] 
[   28.907431] Memory state around the buggy address:
[   28.908141]  ffff888102486100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.909549]  ffff888102486180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.910136] >ffff888102486200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   28.911120]                                      ^
[   28.911738]  ffff888102486280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.912994]  ffff888102486300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.913647] ==================================================================
[   30.462356] ==================================================================
[   30.463920] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1819/0x5450
[   30.465346] Write of size 8 at addr ffff888102486230 by task kunit_try_catch/273
[   30.466148] 
[   30.466459] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241206 #1
[   30.467427] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.467977] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   30.469020] Call Trace:
[   30.469501]  <TASK>
[   30.469891]  dump_stack_lvl+0x73/0xb0
[   30.470303]  print_report+0xd1/0x640
[   30.470802]  ? __virt_addr_valid+0x1db/0x2d0
[   30.471388]  ? kasan_complete_mode_report_info+0x2a/0x200
[   30.472103]  kasan_report+0x102/0x140
[   30.472591]  ? kasan_atomics_helper+0x1819/0x5450
[   30.473330]  ? kasan_atomics_helper+0x1819/0x5450
[   30.473786]  kasan_check_range+0x10c/0x1c0
[   30.474208]  __kasan_check_write+0x18/0x20
[   30.474795]  kasan_atomics_helper+0x1819/0x5450
[   30.475434]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   30.475837]  ? __kmalloc_cache_noprof+0x184/0x410
[   30.476500]  ? trace_hardirqs_on+0x37/0xe0
[   30.477247]  ? kasan_atomics+0x153/0x310
[   30.477677]  kasan_atomics+0x1dd/0x310
[   30.478041]  ? __pfx_kasan_atomics+0x10/0x10
[   30.478646]  ? __pfx_kasan_atomics+0x10/0x10
[   30.479292]  kunit_try_run_case+0x1b3/0x490
[   30.479636]  ? __pfx_kunit_try_run_case+0x10/0x10
[   30.479982]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   30.480682]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   30.481646]  ? __kthread_parkme+0x82/0x160
[   30.482032]  ? preempt_count_sub+0x50/0x80
[   30.482738]  ? __pfx_kunit_try_run_case+0x10/0x10
[   30.483231]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   30.483747]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   30.484762]  kthread+0x257/0x310
[   30.485104]  ? __pfx_kthread+0x10/0x10
[   30.485343]  ret_from_fork+0x41/0x80
[   30.485525]  ? __pfx_kthread+0x10/0x10
[   30.485709]  ret_from_fork_asm+0x1a/0x30
[   30.485926]  </TASK>
[   30.486304] 
[   30.486682] Allocated by task 273:
[   30.486996]  kasan_save_stack+0x3d/0x60
[   30.487727]  kasan_save_track+0x18/0x40
[   30.488642]  kasan_save_alloc_info+0x3b/0x50
[   30.489536]  __kasan_kmalloc+0xb7/0xc0
[   30.490157]  __kmalloc_cache_noprof+0x184/0x410
[   30.490894]  kasan_atomics+0x96/0x310
[   30.491505]  kunit_try_run_case+0x1b3/0x490
[   30.492007]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   30.492593]  kthread+0x257/0x310
[   30.493037]  ret_from_fork+0x41/0x80
[   30.493483]  ret_from_fork_asm+0x1a/0x30
[   30.493996] 
[   30.494381] The buggy address belongs to the object at ffff888102486200
[   30.494381]  which belongs to the cache kmalloc-64 of size 64
[   30.495647] The buggy address is located 0 bytes to the right of
[   30.495647]  allocated 48-byte region [ffff888102486200, ffff888102486230)
[   30.496962] 
[   30.497281] The buggy address belongs to the physical page:
[   30.497757] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102486
[   30.498620] flags: 0x200000000000000(node=0|zone=2)
[   30.499308] page_type: f5(slab)
[   30.499775] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   30.500663] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   30.501585] page dumped because: kasan: bad access detected
[   30.502231] 
[   30.502513] Memory state around the buggy address:
[   30.503050]  ffff888102486100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   30.503838]  ffff888102486180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   30.504688] >ffff888102486200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   30.505391]                                      ^
[   30.506164]  ffff888102486280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.506859]  ffff888102486300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.507686] ==================================================================
[   28.623333] ==================================================================
[   28.624122] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a1/0x5450
[   28.625033] Write of size 4 at addr ffff888102486230 by task kunit_try_catch/273
[   28.625767] 
[   28.626097] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241206 #1
[   28.627725] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.628323] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   28.629256] Call Trace:
[   28.629519]  <TASK>
[   28.630182]  dump_stack_lvl+0x73/0xb0
[   28.630566]  print_report+0xd1/0x640
[   28.630959]  ? __virt_addr_valid+0x1db/0x2d0
[   28.631713]  ? kasan_complete_mode_report_info+0x2a/0x200
[   28.632157]  kasan_report+0x102/0x140
[   28.632981]  ? kasan_atomics_helper+0x4a1/0x5450
[   28.633738]  ? kasan_atomics_helper+0x4a1/0x5450
[   28.634601]  kasan_check_range+0x10c/0x1c0
[   28.635014]  __kasan_check_write+0x18/0x20
[   28.635814]  kasan_atomics_helper+0x4a1/0x5450
[   28.636288]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   28.636913]  ? __kmalloc_cache_noprof+0x184/0x410
[   28.637447]  ? trace_hardirqs_on+0x37/0xe0
[   28.637884]  ? kasan_atomics+0x153/0x310
[   28.638282]  kasan_atomics+0x1dd/0x310
[   28.639177]  ? __pfx_kasan_atomics+0x10/0x10
[   28.639729]  ? __pfx_kasan_atomics+0x10/0x10
[   28.640153]  kunit_try_run_case+0x1b3/0x490
[   28.640994]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.641619]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   28.642074]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   28.642959]  ? __kthread_parkme+0x82/0x160
[   28.643527]  ? preempt_count_sub+0x50/0x80
[   28.643949]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.644781]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   28.645374]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.646050]  kthread+0x257/0x310
[   28.646545]  ? __pfx_kthread+0x10/0x10
[   28.646985]  ret_from_fork+0x41/0x80
[   28.647872]  ? __pfx_kthread+0x10/0x10
[   28.648280]  ret_from_fork_asm+0x1a/0x30
[   28.648745]  </TASK>
[   28.649360] 
[   28.649561] Allocated by task 273:
[   28.649891]  kasan_save_stack+0x3d/0x60
[   28.650629]  kasan_save_track+0x18/0x40
[   28.651281]  kasan_save_alloc_info+0x3b/0x50
[   28.651714]  __kasan_kmalloc+0xb7/0xc0
[   28.652096]  __kmalloc_cache_noprof+0x184/0x410
[   28.653096]  kasan_atomics+0x96/0x310
[   28.653361]  kunit_try_run_case+0x1b3/0x490
[   28.654275]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.655005]  kthread+0x257/0x310
[   28.655422]  ret_from_fork+0x41/0x80
[   28.656025]  ret_from_fork_asm+0x1a/0x30
[   28.656646] 
[   28.656901] The buggy address belongs to the object at ffff888102486200
[   28.656901]  which belongs to the cache kmalloc-64 of size 64
[   28.658221] The buggy address is located 0 bytes to the right of
[   28.658221]  allocated 48-byte region [ffff888102486200, ffff888102486230)
[   28.659136] 
[   28.659353] The buggy address belongs to the physical page:
[   28.659757] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102486
[   28.661287] flags: 0x200000000000000(node=0|zone=2)
[   28.661877] page_type: f5(slab)
[   28.662291] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   28.663169] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   28.664067] page dumped because: kasan: bad access detected
[   28.664867] 
[   28.665240] Memory state around the buggy address:
[   28.666040]  ffff888102486100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.666726]  ffff888102486180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.667487] >ffff888102486200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   28.668256]                                      ^
[   28.668739]  ffff888102486280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.669572]  ffff888102486300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.670585] ==================================================================
[   30.316221] ==================================================================
[   30.317662] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1650/0x5450
[   30.318181] Write of size 8 at addr ffff888102486230 by task kunit_try_catch/273
[   30.320698] 
[   30.320967] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241206 #1
[   30.321983] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.322428] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   30.323496] Call Trace:
[   30.323828]  <TASK>
[   30.324215]  dump_stack_lvl+0x73/0xb0
[   30.324649]  print_report+0xd1/0x640
[   30.325167]  ? __virt_addr_valid+0x1db/0x2d0
[   30.325539]  ? kasan_complete_mode_report_info+0x2a/0x200
[   30.326306]  kasan_report+0x102/0x140
[   30.326888]  ? kasan_atomics_helper+0x1650/0x5450
[   30.327486]  ? kasan_atomics_helper+0x1650/0x5450
[   30.327882]  kasan_check_range+0x10c/0x1c0
[   30.328477]  __kasan_check_write+0x18/0x20
[   30.329100]  kasan_atomics_helper+0x1650/0x5450
[   30.329858]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   30.330420]  ? __kmalloc_cache_noprof+0x184/0x410
[   30.330989]  ? trace_hardirqs_on+0x37/0xe0
[   30.331569]  ? kasan_atomics+0x153/0x310
[   30.331989]  kasan_atomics+0x1dd/0x310
[   30.332441]  ? __pfx_kasan_atomics+0x10/0x10
[   30.332977]  ? __pfx_kasan_atomics+0x10/0x10
[   30.333299]  kunit_try_run_case+0x1b3/0x490
[   30.333910]  ? __pfx_kunit_try_run_case+0x10/0x10
[   30.334652]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   30.335156]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   30.335624]  ? __kthread_parkme+0x82/0x160
[   30.336055]  ? preempt_count_sub+0x50/0x80
[   30.336680]  ? __pfx_kunit_try_run_case+0x10/0x10
[   30.337222]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   30.337988]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   30.338492]  kthread+0x257/0x310
[   30.338893]  ? __pfx_kthread+0x10/0x10
[   30.339396]  ret_from_fork+0x41/0x80
[   30.339852]  ? __pfx_kthread+0x10/0x10
[   30.340388]  ret_from_fork_asm+0x1a/0x30
[   30.341458]  </TASK>
[   30.342271] 
[   30.342531] Allocated by task 273:
[   30.343610]  kasan_save_stack+0x3d/0x60
[   30.344137]  kasan_save_track+0x18/0x40
[   30.344481]  kasan_save_alloc_info+0x3b/0x50
[   30.345027]  __kasan_kmalloc+0xb7/0xc0
[   30.345604]  __kmalloc_cache_noprof+0x184/0x410
[   30.346174]  kasan_atomics+0x96/0x310
[   30.346591]  kunit_try_run_case+0x1b3/0x490
[   30.347130]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   30.347637]  kthread+0x257/0x310
[   30.348158]  ret_from_fork+0x41/0x80
[   30.348488]  ret_from_fork_asm+0x1a/0x30
[   30.349107] 
[   30.349317] The buggy address belongs to the object at ffff888102486200
[   30.349317]  which belongs to the cache kmalloc-64 of size 64
[   30.350473] The buggy address is located 0 bytes to the right of
[   30.350473]  allocated 48-byte region [ffff888102486200, ffff888102486230)
[   30.351641] 
[   30.351925] The buggy address belongs to the physical page:
[   30.352449] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102486
[   30.353370] flags: 0x200000000000000(node=0|zone=2)
[   30.353897] page_type: f5(slab)
[   30.354437] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   30.354989] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   30.355781] page dumped because: kasan: bad access detected
[   30.356197] 
[   30.356452] Memory state around the buggy address:
[   30.357126]  ffff888102486100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   30.358069]  ffff888102486180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   30.358531] >ffff888102486200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   30.359094]                                      ^
[   30.359766]  ffff888102486280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.360890]  ffff888102486300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.361553] ==================================================================
[   30.707293] ==================================================================
[   30.708632] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1b23/0x5450
[   30.709575] Write of size 8 at addr ffff888102486230 by task kunit_try_catch/273
[   30.710517] 
[   30.711434] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241206 #1
[   30.712968] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.713434] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   30.714320] Call Trace:
[   30.714685]  <TASK>
[   30.714995]  dump_stack_lvl+0x73/0xb0
[   30.715479]  print_report+0xd1/0x640
[   30.715795]  ? __virt_addr_valid+0x1db/0x2d0
[   30.716448]  ? kasan_complete_mode_report_info+0x2a/0x200
[   30.717054]  kasan_report+0x102/0x140
[   30.717611]  ? kasan_atomics_helper+0x1b23/0x5450
[   30.718420]  ? kasan_atomics_helper+0x1b23/0x5450
[   30.718800]  kasan_check_range+0x10c/0x1c0
[   30.719497]  __kasan_check_write+0x18/0x20
[   30.719862]  kasan_atomics_helper+0x1b23/0x5450
[   30.720710]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   30.721206]  ? __kmalloc_cache_noprof+0x184/0x410
[   30.721865]  ? trace_hardirqs_on+0x37/0xe0
[   30.722546]  ? kasan_atomics+0x153/0x310
[   30.723049]  kasan_atomics+0x1dd/0x310
[   30.723487]  ? __pfx_kasan_atomics+0x10/0x10
[   30.724548]  ? __pfx_kasan_atomics+0x10/0x10
[   30.725011]  kunit_try_run_case+0x1b3/0x490
[   30.725899]  ? __pfx_kunit_try_run_case+0x10/0x10
[   30.726532]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   30.727635]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   30.727995]  ? __kthread_parkme+0x82/0x160
[   30.728676]  ? preempt_count_sub+0x50/0x80
[   30.729023]  ? __pfx_kunit_try_run_case+0x10/0x10
[   30.729758]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   30.730705]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   30.731207]  kthread+0x257/0x310
[   30.731896]  ? __pfx_kthread+0x10/0x10
[   30.732397]  ret_from_fork+0x41/0x80
[   30.732908]  ? __pfx_kthread+0x10/0x10
[   30.733385]  ret_from_fork_asm+0x1a/0x30
[   30.733891]  </TASK>
[   30.734337] 
[   30.734512] Allocated by task 273:
[   30.734851]  kasan_save_stack+0x3d/0x60
[   30.735535]  kasan_save_track+0x18/0x40
[   30.735864]  kasan_save_alloc_info+0x3b/0x50
[   30.736198]  __kasan_kmalloc+0xb7/0xc0
[   30.736793]  __kmalloc_cache_noprof+0x184/0x410
[   30.737681]  kasan_atomics+0x96/0x310
[   30.738181]  kunit_try_run_case+0x1b3/0x490
[   30.738636]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   30.739023]  kthread+0x257/0x310
[   30.739771]  ret_from_fork+0x41/0x80
[   30.740368]  ret_from_fork_asm+0x1a/0x30
[   30.740968] 
[   30.741258] The buggy address belongs to the object at ffff888102486200
[   30.741258]  which belongs to the cache kmalloc-64 of size 64
[   30.742067] The buggy address is located 0 bytes to the right of
[   30.742067]  allocated 48-byte region [ffff888102486200, ffff888102486230)
[   30.743438] 
[   30.743752] The buggy address belongs to the physical page:
[   30.744832] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102486
[   30.745653] flags: 0x200000000000000(node=0|zone=2)
[   30.746096] page_type: f5(slab)
[   30.746540] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   30.747475] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   30.747999] page dumped because: kasan: bad access detected
[   30.749041] 
[   30.749337] Memory state around the buggy address:
[   30.750080]  ffff888102486100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   30.750597]  ffff888102486180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   30.751308] >ffff888102486200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   30.752073]                                      ^
[   30.752330]  ffff888102486280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.752610]  ffff888102486300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.752882] ==================================================================
[   29.253513] ==================================================================
[   29.255260] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xc71/0x5450
[   29.256102] Write of size 4 at addr ffff888102486230 by task kunit_try_catch/273
[   29.257622] 
[   29.257928] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241206 #1
[   29.259128] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.259509] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   29.260248] Call Trace:
[   29.261070]  <TASK>
[   29.261299]  dump_stack_lvl+0x73/0xb0
[   29.262183]  print_report+0xd1/0x640
[   29.262758]  ? __virt_addr_valid+0x1db/0x2d0
[   29.263488]  ? kasan_complete_mode_report_info+0x2a/0x200
[   29.264021]  kasan_report+0x102/0x140
[   29.264764]  ? kasan_atomics_helper+0xc71/0x5450
[   29.265215]  ? kasan_atomics_helper+0xc71/0x5450
[   29.266053]  kasan_check_range+0x10c/0x1c0
[   29.266464]  __kasan_check_write+0x18/0x20
[   29.266870]  kasan_atomics_helper+0xc71/0x5450
[   29.267862]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   29.268384]  ? __kmalloc_cache_noprof+0x184/0x410
[   29.269092]  ? trace_hardirqs_on+0x37/0xe0
[   29.269709]  ? kasan_atomics+0x153/0x310
[   29.270452]  kasan_atomics+0x1dd/0x310
[   29.270842]  ? __pfx_kasan_atomics+0x10/0x10
[   29.271525]  ? __pfx_kasan_atomics+0x10/0x10
[   29.272014]  kunit_try_run_case+0x1b3/0x490
[   29.272820]  ? __pfx_kunit_try_run_case+0x10/0x10
[   29.273192]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   29.273851]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   29.274605]  ? __kthread_parkme+0x82/0x160
[   29.275397]  ? preempt_count_sub+0x50/0x80
[   29.275979]  ? __pfx_kunit_try_run_case+0x10/0x10
[   29.276692]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   29.277245]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   29.278351]  kthread+0x257/0x310
[   29.278946]  ? __pfx_kthread+0x10/0x10
[   29.279395]  ret_from_fork+0x41/0x80
[   29.280139]  ? __pfx_kthread+0x10/0x10
[   29.280794]  ret_from_fork_asm+0x1a/0x30
[   29.281559]  </TASK>
[   29.281979] 
[   29.282640] Allocated by task 273:
[   29.283243]  kasan_save_stack+0x3d/0x60
[   29.283871]  kasan_save_track+0x18/0x40
[   29.284386]  kasan_save_alloc_info+0x3b/0x50
[   29.284764]  __kasan_kmalloc+0xb7/0xc0
[   29.285225]  __kmalloc_cache_noprof+0x184/0x410
[   29.285919]  kasan_atomics+0x96/0x310
[   29.286278]  kunit_try_run_case+0x1b3/0x490
[   29.286706]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   29.287234]  kthread+0x257/0x310
[   29.287714]  ret_from_fork+0x41/0x80
[   29.288146]  ret_from_fork_asm+0x1a/0x30
[   29.288632] 
[   29.288803] The buggy address belongs to the object at ffff888102486200
[   29.288803]  which belongs to the cache kmalloc-64 of size 64
[   29.290347] The buggy address is located 0 bytes to the right of
[   29.290347]  allocated 48-byte region [ffff888102486200, ffff888102486230)
[   29.291490] 
[   29.291674] The buggy address belongs to the physical page:
[   29.292037] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102486
[   29.293248] flags: 0x200000000000000(node=0|zone=2)
[   29.293841] page_type: f5(slab)
[   29.294249] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   29.295029] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   29.295504] page dumped because: kasan: bad access detected
[   29.296165] 
[   29.296461] Memory state around the buggy address:
[   29.296974]  ffff888102486100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.297701]  ffff888102486180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.298529] >ffff888102486200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   29.298990]                                      ^
[   29.299342]  ffff888102486280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.300242]  ffff888102486300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.300883] ==================================================================
[   31.429096] ==================================================================
[   31.429734] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4fa7/0x5450
[   31.430406] Read of size 8 at addr ffff888102486230 by task kunit_try_catch/273
[   31.431062] 
[   31.431432] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241206 #1
[   31.432180] Tainted: [B]=BAD_PAGE, [N]=TEST
[   31.432521] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   31.433889] Call Trace:
[   31.434160]  <TASK>
[   31.434364]  dump_stack_lvl+0x73/0xb0
[   31.435121]  print_report+0xd1/0x640
[   31.435708]  ? __virt_addr_valid+0x1db/0x2d0
[   31.436488]  ? kasan_complete_mode_report_info+0x2a/0x200
[   31.437065]  kasan_report+0x102/0x140
[   31.437491]  ? kasan_atomics_helper+0x4fa7/0x5450
[   31.438030]  ? kasan_atomics_helper+0x4fa7/0x5450
[   31.440393]  __asan_report_load8_noabort+0x18/0x20
[   31.440645]  kasan_atomics_helper+0x4fa7/0x5450
[   31.440860]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   31.441829]  ? __kmalloc_cache_noprof+0x184/0x410
[   31.442337]  ? trace_hardirqs_on+0x37/0xe0
[   31.442952]  ? kasan_atomics+0x153/0x310
[   31.443399]  kasan_atomics+0x1dd/0x310
[   31.443893]  ? __pfx_kasan_atomics+0x10/0x10
[   31.444332]  ? __pfx_kasan_atomics+0x10/0x10
[   31.444693]  kunit_try_run_case+0x1b3/0x490
[   31.445372]  ? __pfx_kunit_try_run_case+0x10/0x10
[   31.445973]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   31.446440]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   31.447151]  ? __kthread_parkme+0x82/0x160
[   31.447583]  ? preempt_count_sub+0x50/0x80
[   31.448188]  ? __pfx_kunit_try_run_case+0x10/0x10
[   31.448738]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   31.449378]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   31.450068]  kthread+0x257/0x310
[   31.450478]  ? __pfx_kthread+0x10/0x10
[   31.450983]  ret_from_fork+0x41/0x80
[   31.451474]  ? __pfx_kthread+0x10/0x10
[   31.451967]  ret_from_fork_asm+0x1a/0x30
[   31.452576]  </TASK>
[   31.452925] 
[   31.453242] Allocated by task 273:
[   31.453628]  kasan_save_stack+0x3d/0x60
[   31.454202]  kasan_save_track+0x18/0x40
[   31.454746]  kasan_save_alloc_info+0x3b/0x50
[   31.455236]  __kasan_kmalloc+0xb7/0xc0
[   31.455741]  __kmalloc_cache_noprof+0x184/0x410
[   31.456165]  kasan_atomics+0x96/0x310
[   31.456655]  kunit_try_run_case+0x1b3/0x490
[   31.457355]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   31.457804]  kthread+0x257/0x310
[   31.458256]  ret_from_fork+0x41/0x80
[   31.458596]  ret_from_fork_asm+0x1a/0x30
[   31.459221] 
[   31.459474] The buggy address belongs to the object at ffff888102486200
[   31.459474]  which belongs to the cache kmalloc-64 of size 64
[   31.460600] The buggy address is located 0 bytes to the right of
[   31.460600]  allocated 48-byte region [ffff888102486200, ffff888102486230)
[   31.461870] 
[   31.462168] The buggy address belongs to the physical page:
[   31.462736] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102486
[   31.463583] flags: 0x200000000000000(node=0|zone=2)
[   31.464145] page_type: f5(slab)
[   31.464590] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   31.465233] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   31.466047] page dumped because: kasan: bad access detected
[   31.466790] 
[   31.467022] Memory state around the buggy address:
[   31.467585]  ffff888102486100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   31.468399]  ffff888102486180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   31.469131] >ffff888102486200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   31.469726]                                      ^
[   31.470412]  ffff888102486280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.471153]  ffff888102486300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.471819] ==================================================================
[   30.041814] ==================================================================
[   30.043419] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x13b6/0x5450
[   30.044178] Read of size 8 at addr ffff888102486230 by task kunit_try_catch/273
[   30.045810] 
[   30.046071] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241206 #1
[   30.047984] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.048413] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   30.049184] Call Trace:
[   30.050111]  <TASK>
[   30.050382]  dump_stack_lvl+0x73/0xb0
[   30.050978]  print_report+0xd1/0x640
[   30.051605]  ? __virt_addr_valid+0x1db/0x2d0
[   30.052231]  ? kasan_complete_mode_report_info+0x2a/0x200
[   30.052916]  kasan_report+0x102/0x140
[   30.053407]  ? kasan_atomics_helper+0x13b6/0x5450
[   30.053901]  ? kasan_atomics_helper+0x13b6/0x5450
[   30.054254]  kasan_check_range+0x10c/0x1c0
[   30.054795]  __kasan_check_read+0x15/0x20
[   30.056031]  kasan_atomics_helper+0x13b6/0x5450
[   30.056676]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   30.057504]  ? __kmalloc_cache_noprof+0x184/0x410
[   30.058214]  ? trace_hardirqs_on+0x37/0xe0
[   30.058832]  ? kasan_atomics+0x153/0x310
[   30.059740]  kasan_atomics+0x1dd/0x310
[   30.060149]  ? __pfx_kasan_atomics+0x10/0x10
[   30.060871]  ? __pfx_kasan_atomics+0x10/0x10
[   30.061346]  kunit_try_run_case+0x1b3/0x490
[   30.062020]  ? __pfx_kunit_try_run_case+0x10/0x10
[   30.062807]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   30.063677]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   30.064465]  ? __kthread_parkme+0x82/0x160
[   30.065177]  ? preempt_count_sub+0x50/0x80
[   30.065835]  ? __pfx_kunit_try_run_case+0x10/0x10
[   30.066611]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   30.067558]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   30.068142]  kthread+0x257/0x310
[   30.068646]  ? __pfx_kthread+0x10/0x10
[   30.069086]  ret_from_fork+0x41/0x80
[   30.070044]  ? __pfx_kthread+0x10/0x10
[   30.070691]  ret_from_fork_asm+0x1a/0x30
[   30.071367]  </TASK>
[   30.071875] 
[   30.072094] Allocated by task 273:
[   30.072547]  kasan_save_stack+0x3d/0x60
[   30.073037]  kasan_save_track+0x18/0x40
[   30.073472]  kasan_save_alloc_info+0x3b/0x50
[   30.073980]  __kasan_kmalloc+0xb7/0xc0
[   30.074426]  __kmalloc_cache_noprof+0x184/0x410
[   30.074822]  kasan_atomics+0x96/0x310
[   30.075219]  kunit_try_run_case+0x1b3/0x490
[   30.075919]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   30.076296]  kthread+0x257/0x310
[   30.076808]  ret_from_fork+0x41/0x80
[   30.077409]  ret_from_fork_asm+0x1a/0x30
[   30.077872] 
[   30.078067] The buggy address belongs to the object at ffff888102486200
[   30.078067]  which belongs to the cache kmalloc-64 of size 64
[   30.079269] The buggy address is located 0 bytes to the right of
[   30.079269]  allocated 48-byte region [ffff888102486200, ffff888102486230)
[   30.080641] 
[   30.080917] The buggy address belongs to the physical page:
[   30.081561] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102486
[   30.082208] flags: 0x200000000000000(node=0|zone=2)
[   30.082999] page_type: f5(slab)
[   30.083376] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   30.084307] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   30.084727] page dumped because: kasan: bad access detected
[   30.085651] 
[   30.085987] Memory state around the buggy address:
[   30.086428]  ffff888102486100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   30.087120]  ffff888102486180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   30.087600] >ffff888102486200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   30.088373]                                      ^
[   30.088688]  ffff888102486280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.089643]  ffff888102486300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.090441] ==================================================================
[   30.411115] ==================================================================
[   30.412064] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1780/0x5450
[   30.413495] Write of size 8 at addr ffff888102486230 by task kunit_try_catch/273
[   30.415156] 
[   30.415353] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241206 #1
[   30.416541] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.416946] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   30.417872] Call Trace:
[   30.418238]  <TASK>
[   30.418547]  dump_stack_lvl+0x73/0xb0
[   30.419074]  print_report+0xd1/0x640
[   30.419565]  ? __virt_addr_valid+0x1db/0x2d0
[   30.420052]  ? kasan_complete_mode_report_info+0x2a/0x200
[   30.420598]  kasan_report+0x102/0x140
[   30.421094]  ? kasan_atomics_helper+0x1780/0x5450
[   30.421739]  ? kasan_atomics_helper+0x1780/0x5450
[   30.422159]  kasan_check_range+0x10c/0x1c0
[   30.422745]  __kasan_check_write+0x18/0x20
[   30.423229]  kasan_atomics_helper+0x1780/0x5450
[   30.423589]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   30.424241]  ? __kmalloc_cache_noprof+0x184/0x410
[   30.424776]  ? trace_hardirqs_on+0x37/0xe0
[   30.425263]  ? kasan_atomics+0x153/0x310
[   30.425878]  kasan_atomics+0x1dd/0x310
[   30.426406]  ? __pfx_kasan_atomics+0x10/0x10
[   30.426749]  ? __pfx_kasan_atomics+0x10/0x10
[   30.427568]  kunit_try_run_case+0x1b3/0x490
[   30.428688]  ? __pfx_kunit_try_run_case+0x10/0x10
[   30.429481]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   30.430275]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   30.431082]  ? __kthread_parkme+0x82/0x160
[   30.431668]  ? preempt_count_sub+0x50/0x80
[   30.432518]  ? __pfx_kunit_try_run_case+0x10/0x10
[   30.433285]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   30.433878]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   30.434763]  kthread+0x257/0x310
[   30.435432]  ? __pfx_kthread+0x10/0x10
[   30.435867]  ret_from_fork+0x41/0x80
[   30.436817]  ? __pfx_kthread+0x10/0x10
[   30.437551]  ret_from_fork_asm+0x1a/0x30
[   30.438078]  </TASK>
[   30.438713] 
[   30.438909] Allocated by task 273:
[   30.439531]  kasan_save_stack+0x3d/0x60
[   30.439852]  kasan_save_track+0x18/0x40
[   30.440599]  kasan_save_alloc_info+0x3b/0x50
[   30.441320]  __kasan_kmalloc+0xb7/0xc0
[   30.442014]  __kmalloc_cache_noprof+0x184/0x410
[   30.442498]  kasan_atomics+0x96/0x310
[   30.443337]  kunit_try_run_case+0x1b3/0x490
[   30.443787]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   30.444762]  kthread+0x257/0x310
[   30.445500]  ret_from_fork+0x41/0x80
[   30.445885]  ret_from_fork_asm+0x1a/0x30
[   30.446858] 
[   30.447335] The buggy address belongs to the object at ffff888102486200
[   30.447335]  which belongs to the cache kmalloc-64 of size 64
[   30.448414] The buggy address is located 0 bytes to the right of
[   30.448414]  allocated 48-byte region [ffff888102486200, ffff888102486230)
[   30.450223] 
[   30.450569] The buggy address belongs to the physical page:
[   30.451660] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102486
[   30.452470] flags: 0x200000000000000(node=0|zone=2)
[   30.453334] page_type: f5(slab)
[   30.453742] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   30.454517] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   30.455312] page dumped because: kasan: bad access detected
[   30.455833] 
[   30.456104] Memory state around the buggy address:
[   30.456854]  ffff888102486100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   30.457406]  ffff888102486180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   30.458151] >ffff888102486200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   30.458817]                                      ^
[   30.459363]  ffff888102486280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.460086]  ffff888102486300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.460784] ==================================================================
[   30.851018] ==================================================================
[   30.851500] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1ce2/0x5450
[   30.853140] Write of size 8 at addr ffff888102486230 by task kunit_try_catch/273
[   30.853859] 
[   30.854069] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241206 #1
[   30.856408] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.857028] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   30.858208] Call Trace:
[   30.858587]  <TASK>
[   30.859266]  dump_stack_lvl+0x73/0xb0
[   30.859665]  print_report+0xd1/0x640
[   30.860380]  ? __virt_addr_valid+0x1db/0x2d0
[   30.860830]  ? kasan_complete_mode_report_info+0x2a/0x200
[   30.861453]  kasan_report+0x102/0x140
[   30.861958]  ? kasan_atomics_helper+0x1ce2/0x5450
[   30.862432]  ? kasan_atomics_helper+0x1ce2/0x5450
[   30.863044]  kasan_check_range+0x10c/0x1c0
[   30.863870]  __kasan_check_write+0x18/0x20
[   30.864233]  kasan_atomics_helper+0x1ce2/0x5450
[   30.864848]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   30.865853]  ? __kmalloc_cache_noprof+0x184/0x410
[   30.866509]  ? trace_hardirqs_on+0x37/0xe0
[   30.867397]  ? kasan_atomics+0x153/0x310
[   30.867863]  kasan_atomics+0x1dd/0x310
[   30.868382]  ? __pfx_kasan_atomics+0x10/0x10
[   30.868838]  ? __pfx_kasan_atomics+0x10/0x10
[   30.870449]  kunit_try_run_case+0x1b3/0x490
[   30.871130]  ? __pfx_kunit_try_run_case+0x10/0x10
[   30.871739]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   30.872675]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   30.873245]  ? __kthread_parkme+0x82/0x160
[   30.873688]  ? preempt_count_sub+0x50/0x80
[   30.874121]  ? __pfx_kunit_try_run_case+0x10/0x10
[   30.874478]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   30.875742]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   30.876985]  kthread+0x257/0x310
[   30.877543]  ? __pfx_kthread+0x10/0x10
[   30.878040]  ret_from_fork+0x41/0x80
[   30.878425]  ? __pfx_kthread+0x10/0x10
[   30.878810]  ret_from_fork_asm+0x1a/0x30
[   30.879889]  </TASK>
[   30.880091] 
[   30.880279] Allocated by task 273:
[   30.881316]  kasan_save_stack+0x3d/0x60
[   30.881898]  kasan_save_track+0x18/0x40
[   30.882310]  kasan_save_alloc_info+0x3b/0x50
[   30.882984]  __kasan_kmalloc+0xb7/0xc0
[   30.883658]  __kmalloc_cache_noprof+0x184/0x410
[   30.884439]  kasan_atomics+0x96/0x310
[   30.884839]  kunit_try_run_case+0x1b3/0x490
[   30.885429]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   30.886966]  kthread+0x257/0x310
[   30.887600]  ret_from_fork+0x41/0x80
[   30.888083]  ret_from_fork_asm+0x1a/0x30
[   30.888831] 
[   30.889134] The buggy address belongs to the object at ffff888102486200
[   30.889134]  which belongs to the cache kmalloc-64 of size 64
[   30.890022] The buggy address is located 0 bytes to the right of
[   30.890022]  allocated 48-byte region [ffff888102486200, ffff888102486230)
[   30.892099] 
[   30.892596] The buggy address belongs to the physical page:
[   30.892969] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102486
[   30.893712] flags: 0x200000000000000(node=0|zone=2)
[   30.894627] page_type: f5(slab)
[   30.895078] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   30.896442] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   30.897130] page dumped because: kasan: bad access detected
[   30.897859] 
[   30.898126] Memory state around the buggy address:
[   30.899036]  ffff888102486100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   30.899874]  ffff888102486180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   30.900682] >ffff888102486200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   30.901969]                                      ^
[   30.902639]  ffff888102486280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.904066]  ffff888102486300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.904750] ==================================================================
[   29.051311] ==================================================================
[   29.052324] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x993/0x5450
[   29.053428] Write of size 4 at addr ffff888102486230 by task kunit_try_catch/273
[   29.053763] 
[   29.053897] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241206 #1
[   29.055902] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.056289] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   29.057098] Call Trace:
[   29.057464]  <TASK>
[   29.057915]  dump_stack_lvl+0x73/0xb0
[   29.058312]  print_report+0xd1/0x640
[   29.058866]  ? __virt_addr_valid+0x1db/0x2d0
[   29.059527]  ? kasan_complete_mode_report_info+0x2a/0x200
[   29.060062]  kasan_report+0x102/0x140
[   29.060579]  ? kasan_atomics_helper+0x993/0x5450
[   29.061128]  ? kasan_atomics_helper+0x993/0x5450
[   29.061645]  kasan_check_range+0x10c/0x1c0
[   29.062024]  __kasan_check_write+0x18/0x20
[   29.062579]  kasan_atomics_helper+0x993/0x5450
[   29.062987]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   29.063882]  ? __kmalloc_cache_noprof+0x184/0x410
[   29.064344]  ? trace_hardirqs_on+0x37/0xe0
[   29.065143]  ? kasan_atomics+0x153/0x310
[   29.065752]  kasan_atomics+0x1dd/0x310
[   29.066757]  ? __pfx_kasan_atomics+0x10/0x10
[   29.067275]  ? __pfx_kasan_atomics+0x10/0x10
[   29.067735]  kunit_try_run_case+0x1b3/0x490
[   29.068925]  ? __pfx_kunit_try_run_case+0x10/0x10
[   29.069681]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   29.070543]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   29.071450]  ? __kthread_parkme+0x82/0x160
[   29.071793]  ? preempt_count_sub+0x50/0x80
[   29.072774]  ? __pfx_kunit_try_run_case+0x10/0x10
[   29.073978]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   29.074663]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   29.076012]  kthread+0x257/0x310
[   29.076467]  ? __pfx_kthread+0x10/0x10
[   29.077107]  ret_from_fork+0x41/0x80
[   29.077685]  ? __pfx_kthread+0x10/0x10
[   29.078366]  ret_from_fork_asm+0x1a/0x30
[   29.078973]  </TASK>
[   29.079559] 
[   29.079803] Allocated by task 273:
[   29.080172]  kasan_save_stack+0x3d/0x60
[   29.080669]  kasan_save_track+0x18/0x40
[   29.081100]  kasan_save_alloc_info+0x3b/0x50
[   29.081832]  __kasan_kmalloc+0xb7/0xc0
[   29.082894]  __kmalloc_cache_noprof+0x184/0x410
[   29.083688]  kasan_atomics+0x96/0x310
[   29.084056]  kunit_try_run_case+0x1b3/0x490
[   29.084853]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   29.085489]  kthread+0x257/0x310
[   29.085737]  ret_from_fork+0x41/0x80
[   29.086655]  ret_from_fork_asm+0x1a/0x30
[   29.087436] 
[   29.087628] The buggy address belongs to the object at ffff888102486200
[   29.087628]  which belongs to the cache kmalloc-64 of size 64
[   29.088701] The buggy address is located 0 bytes to the right of
[   29.088701]  allocated 48-byte region [ffff888102486200, ffff888102486230)
[   29.089357] 
[   29.089627] The buggy address belongs to the physical page:
[   29.091108] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102486
[   29.091811] flags: 0x200000000000000(node=0|zone=2)
[   29.092551] page_type: f5(slab)
[   29.093248] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   29.094009] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   29.094901] page dumped because: kasan: bad access detected
[   29.095593] 
[   29.095699] Memory state around the buggy address:
[   29.095903]  ffff888102486100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.096314]  ffff888102486180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.097417] >ffff888102486200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   29.097836]                                      ^
[   29.098699]  ffff888102486280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.099458]  ffff888102486300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.100334] ==================================================================
[   28.573373] ==================================================================
[   28.574511] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b56/0x5450
[   28.575728] Read of size 4 at addr ffff888102486230 by task kunit_try_catch/273
[   28.576555] 
[   28.576745] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241206 #1
[   28.578966] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.579591] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   28.580748] Call Trace:
[   28.581262]  <TASK>
[   28.581822]  dump_stack_lvl+0x73/0xb0
[   28.582647]  print_report+0xd1/0x640
[   28.583064]  ? __virt_addr_valid+0x1db/0x2d0
[   28.583521]  ? kasan_complete_mode_report_info+0x2a/0x200
[   28.584055]  kasan_report+0x102/0x140
[   28.584334]  ? kasan_atomics_helper+0x4b56/0x5450
[   28.585537]  ? kasan_atomics_helper+0x4b56/0x5450
[   28.586284]  __asan_report_load4_noabort+0x18/0x20
[   28.586858]  kasan_atomics_helper+0x4b56/0x5450
[   28.587985]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   28.588556]  ? __kmalloc_cache_noprof+0x184/0x410
[   28.589034]  ? trace_hardirqs_on+0x37/0xe0
[   28.590049]  ? kasan_atomics+0x153/0x310
[   28.590467]  kasan_atomics+0x1dd/0x310
[   28.591046]  ? __pfx_kasan_atomics+0x10/0x10
[   28.591487]  ? __pfx_kasan_atomics+0x10/0x10
[   28.591952]  kunit_try_run_case+0x1b3/0x490
[   28.592503]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.593398]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   28.594246]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   28.594727]  ? __kthread_parkme+0x82/0x160
[   28.595361]  ? preempt_count_sub+0x50/0x80
[   28.595830]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.597105]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   28.597739]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.598190]  kthread+0x257/0x310
[   28.598867]  ? __pfx_kthread+0x10/0x10
[   28.599610]  ret_from_fork+0x41/0x80
[   28.599838]  ? __pfx_kthread+0x10/0x10
[   28.600099]  ret_from_fork_asm+0x1a/0x30
[   28.600416]  </TASK>
[   28.600563] 
[   28.600660] Allocated by task 273:
[   28.600823]  kasan_save_stack+0x3d/0x60
[   28.601045]  kasan_save_track+0x18/0x40
[   28.601960]  kasan_save_alloc_info+0x3b/0x50
[   28.602681]  __kasan_kmalloc+0xb7/0xc0
[   28.603406]  __kmalloc_cache_noprof+0x184/0x410
[   28.604175]  kasan_atomics+0x96/0x310
[   28.604459]  kunit_try_run_case+0x1b3/0x490
[   28.605247]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.605717]  kthread+0x257/0x310
[   28.606335]  ret_from_fork+0x41/0x80
[   28.606714]  ret_from_fork_asm+0x1a/0x30
[   28.607302] 
[   28.607554] The buggy address belongs to the object at ffff888102486200
[   28.607554]  which belongs to the cache kmalloc-64 of size 64
[   28.608738] The buggy address is located 0 bytes to the right of
[   28.608738]  allocated 48-byte region [ffff888102486200, ffff888102486230)
[   28.609823] 
[   28.610095] The buggy address belongs to the physical page:
[   28.610569] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102486
[   28.611309] flags: 0x200000000000000(node=0|zone=2)
[   28.611640] page_type: f5(slab)
[   28.612166] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   28.613072] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   28.613624] page dumped because: kasan: bad access detected
[   28.614408] 
[   28.614640] Memory state around the buggy address:
[   28.615365]  ffff888102486100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.616294]  ffff888102486180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.617216] >ffff888102486200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   28.617783]                                      ^
[   28.618669]  ffff888102486280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.619725]  ffff888102486300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.620155] ==================================================================
[   29.886452] ==================================================================
[   29.887178] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x49ea/0x5450
[   29.887865] Read of size 4 at addr ffff888102486230 by task kunit_try_catch/273
[   29.888455] 
[   29.888635] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241206 #1
[   29.889753] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.890305] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   29.890819] Call Trace:
[   29.891060]  <TASK>
[   29.891270]  dump_stack_lvl+0x73/0xb0
[   29.891751]  print_report+0xd1/0x640
[   29.892281]  ? __virt_addr_valid+0x1db/0x2d0
[   29.892798]  ? kasan_complete_mode_report_info+0x2a/0x200
[   29.893427]  kasan_report+0x102/0x140
[   29.893886]  ? kasan_atomics_helper+0x49ea/0x5450
[   29.894244]  ? kasan_atomics_helper+0x49ea/0x5450
[   29.894588]  __asan_report_load4_noabort+0x18/0x20
[   29.895478]  kasan_atomics_helper+0x49ea/0x5450
[   29.896156]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   29.896826]  ? __kmalloc_cache_noprof+0x184/0x410
[   29.897621]  ? trace_hardirqs_on+0x37/0xe0
[   29.898011]  ? kasan_atomics+0x153/0x310
[   29.898535]  kasan_atomics+0x1dd/0x310
[   29.898994]  ? __pfx_kasan_atomics+0x10/0x10
[   29.899629]  ? __pfx_kasan_atomics+0x10/0x10
[   29.899990]  kunit_try_run_case+0x1b3/0x490
[   29.900301]  ? __pfx_kunit_try_run_case+0x10/0x10
[   29.900624]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   29.901333]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   29.902036]  ? __kthread_parkme+0x82/0x160
[   29.902825]  ? preempt_count_sub+0x50/0x80
[   29.903561]  ? __pfx_kunit_try_run_case+0x10/0x10
[   29.904092]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   29.904563]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   29.904965]  kthread+0x257/0x310
[   29.905236]  ? __pfx_kthread+0x10/0x10
[   29.905761]  ret_from_fork+0x41/0x80
[   29.906348]  ? __pfx_kthread+0x10/0x10
[   29.907178]  ret_from_fork_asm+0x1a/0x30
[   29.907651]  </TASK>
[   29.907969] 
[   29.908163] Allocated by task 273:
[   29.908618]  kasan_save_stack+0x3d/0x60
[   29.909133]  kasan_save_track+0x18/0x40
[   29.909473]  kasan_save_alloc_info+0x3b/0x50
[   29.909811]  __kasan_kmalloc+0xb7/0xc0
[   29.910120]  __kmalloc_cache_noprof+0x184/0x410
[   29.910440]  kasan_atomics+0x96/0x310
[   29.910707]  kunit_try_run_case+0x1b3/0x490
[   29.911279]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   29.912021]  kthread+0x257/0x310
[   29.912623]  ret_from_fork+0x41/0x80
[   29.913208]  ret_from_fork_asm+0x1a/0x30
[   29.913727] 
[   29.914018] The buggy address belongs to the object at ffff888102486200
[   29.914018]  which belongs to the cache kmalloc-64 of size 64
[   29.916109] The buggy address is located 0 bytes to the right of
[   29.916109]  allocated 48-byte region [ffff888102486200, ffff888102486230)
[   29.917541] 
[   29.917749] The buggy address belongs to the physical page:
[   29.918344] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102486
[   29.919573] flags: 0x200000000000000(node=0|zone=2)
[   29.920714] page_type: f5(slab)
[   29.921510] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   29.922620] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   29.923654] page dumped because: kasan: bad access detected
[   29.924248] 
[   29.924457] Memory state around the buggy address:
[   29.924975]  ffff888102486100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.925417]  ffff888102486180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.926053] >ffff888102486200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   29.926922]                                      ^
[   29.927733]  ffff888102486280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.928492]  ffff888102486300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.929374] ==================================================================
[   28.720475] ==================================================================
[   28.721266] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x566/0x5450
[   28.723239] Write of size 4 at addr ffff888102486230 by task kunit_try_catch/273
[   28.723901] 
[   28.724146] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241206 #1
[   28.726713] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.727405] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   28.728399] Call Trace:
[   28.728690]  <TASK>
[   28.729334]  dump_stack_lvl+0x73/0xb0
[   28.729644]  print_report+0xd1/0x640
[   28.731765]  ? __virt_addr_valid+0x1db/0x2d0
[   28.732152]  ? kasan_complete_mode_report_info+0x2a/0x200
[   28.732493]  kasan_report+0x102/0x140
[   28.732766]  ? kasan_atomics_helper+0x566/0x5450
[   28.733242]  ? kasan_atomics_helper+0x566/0x5450
[   28.733574]  kasan_check_range+0x10c/0x1c0
[   28.733894]  __kasan_check_write+0x18/0x20
[   28.735492]  kasan_atomics_helper+0x566/0x5450
[   28.735842]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   28.737020]  ? __kmalloc_cache_noprof+0x184/0x410
[   28.738048]  ? trace_hardirqs_on+0x37/0xe0
[   28.738648]  ? kasan_atomics+0x153/0x310
[   28.739148]  kasan_atomics+0x1dd/0x310
[   28.739590]  ? __pfx_kasan_atomics+0x10/0x10
[   28.740089]  ? __pfx_kasan_atomics+0x10/0x10
[   28.740853]  kunit_try_run_case+0x1b3/0x490
[   28.741262]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.741761]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   28.742239]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   28.742824]  ? __kthread_parkme+0x82/0x160
[   28.743194]  ? preempt_count_sub+0x50/0x80
[   28.743689]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.744520]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   28.745095]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.745925]  kthread+0x257/0x310
[   28.746531]  ? __pfx_kthread+0x10/0x10
[   28.746972]  ret_from_fork+0x41/0x80
[   28.747263]  ? __pfx_kthread+0x10/0x10
[   28.747773]  ret_from_fork_asm+0x1a/0x30
[   28.748578]  </TASK>
[   28.749137] 
[   28.749538] Allocated by task 273:
[   28.750230]  kasan_save_stack+0x3d/0x60
[   28.750635]  kasan_save_track+0x18/0x40
[   28.750832]  kasan_save_alloc_info+0x3b/0x50
[   28.751105]  __kasan_kmalloc+0xb7/0xc0
[   28.751759]  __kmalloc_cache_noprof+0x184/0x410
[   28.752315]  kasan_atomics+0x96/0x310
[   28.752678]  kunit_try_run_case+0x1b3/0x490
[   28.753447]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.753887]  kthread+0x257/0x310
[   28.754590]  ret_from_fork+0x41/0x80
[   28.755026]  ret_from_fork_asm+0x1a/0x30
[   28.755980] 
[   28.756387] The buggy address belongs to the object at ffff888102486200
[   28.756387]  which belongs to the cache kmalloc-64 of size 64
[   28.757368] The buggy address is located 0 bytes to the right of
[   28.757368]  allocated 48-byte region [ffff888102486200, ffff888102486230)
[   28.758461] 
[   28.759336] The buggy address belongs to the physical page:
[   28.759916] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102486
[   28.760688] flags: 0x200000000000000(node=0|zone=2)
[   28.761130] page_type: f5(slab)
[   28.761644] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   28.762414] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   28.762966] page dumped because: kasan: bad access detected
[   28.763835] 
[   28.764050] Memory state around the buggy address:
[   28.764658]  ffff888102486100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.765372]  ffff888102486180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.765840] >ffff888102486200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   28.766839]                                      ^
[   28.767369]  ffff888102486280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.767902]  ffff888102486300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.768817] ==================================================================
[   29.930842] ==================================================================
[   29.931845] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x12e7/0x5450
[   29.933040] Write of size 4 at addr ffff888102486230 by task kunit_try_catch/273
[   29.934100] 
[   29.934768] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241206 #1
[   29.936094] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.936757] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   29.937905] Call Trace:
[   29.938276]  <TASK>
[   29.938552]  dump_stack_lvl+0x73/0xb0
[   29.939006]  print_report+0xd1/0x640
[   29.940438]  ? __virt_addr_valid+0x1db/0x2d0
[   29.941113]  ? kasan_complete_mode_report_info+0x2a/0x200
[   29.941697]  kasan_report+0x102/0x140
[   29.942146]  ? kasan_atomics_helper+0x12e7/0x5450
[   29.942644]  ? kasan_atomics_helper+0x12e7/0x5450
[   29.943722]  kasan_check_range+0x10c/0x1c0
[   29.944099]  __kasan_check_write+0x18/0x20
[   29.945109]  kasan_atomics_helper+0x12e7/0x5450
[   29.946241]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   29.946970]  ? __kmalloc_cache_noprof+0x184/0x410
[   29.947532]  ? trace_hardirqs_on+0x37/0xe0
[   29.948017]  ? kasan_atomics+0x153/0x310
[   29.949069]  kasan_atomics+0x1dd/0x310
[   29.949727]  ? __pfx_kasan_atomics+0x10/0x10
[   29.950185]  ? __pfx_kasan_atomics+0x10/0x10
[   29.950978]  kunit_try_run_case+0x1b3/0x490
[   29.951669]  ? __pfx_kunit_try_run_case+0x10/0x10
[   29.952249]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   29.953024]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   29.953843]  ? __kthread_parkme+0x82/0x160
[   29.954491]  ? preempt_count_sub+0x50/0x80
[   29.955325]  ? __pfx_kunit_try_run_case+0x10/0x10
[   29.955740]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   29.956639]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   29.957553]  kthread+0x257/0x310
[   29.957953]  ? __pfx_kthread+0x10/0x10
[   29.958580]  ret_from_fork+0x41/0x80
[   29.959175]  ? __pfx_kthread+0x10/0x10
[   29.959686]  ret_from_fork_asm+0x1a/0x30
[   29.960736]  </TASK>
[   29.961327] 
[   29.961730] Allocated by task 273:
[   29.962087]  kasan_save_stack+0x3d/0x60
[   29.962533]  kasan_save_track+0x18/0x40
[   29.962973]  kasan_save_alloc_info+0x3b/0x50
[   29.963293]  __kasan_kmalloc+0xb7/0xc0
[   29.963644]  __kmalloc_cache_noprof+0x184/0x410
[   29.964785]  kasan_atomics+0x96/0x310
[   29.965493]  kunit_try_run_case+0x1b3/0x490
[   29.965802]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   29.966801]  kthread+0x257/0x310
[   29.967342]  ret_from_fork+0x41/0x80
[   29.967720]  ret_from_fork_asm+0x1a/0x30
[   29.968500] 
[   29.969200] The buggy address belongs to the object at ffff888102486200
[   29.969200]  which belongs to the cache kmalloc-64 of size 64
[   29.971198] The buggy address is located 0 bytes to the right of
[   29.971198]  allocated 48-byte region [ffff888102486200, ffff888102486230)
[   29.973569] 
[   29.973956] The buggy address belongs to the physical page:
[   29.974862] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102486
[   29.976227] flags: 0x200000000000000(node=0|zone=2)
[   29.976978] page_type: f5(slab)
[   29.977477] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   29.978535] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   29.979547] page dumped because: kasan: bad access detected
[   29.980119] 
[   29.980332] Memory state around the buggy address:
[   29.980871]  ffff888102486100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.981499]  ffff888102486180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.982047] >ffff888102486200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   29.983186]                                      ^
[   29.983695]  ffff888102486280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.985345]  ffff888102486300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.986186] ==================================================================
[   30.177886] ==================================================================
[   30.178387] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x50d6/0x5450
[   30.179409] Write of size 8 at addr ffff888102486230 by task kunit_try_catch/273
[   30.180138] 
[   30.180326] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241206 #1
[   30.181133] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.181677] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   30.182586] Call Trace:
[   30.183004]  <TASK>
[   30.183302]  dump_stack_lvl+0x73/0xb0
[   30.183592]  print_report+0xd1/0x640
[   30.183881]  ? __virt_addr_valid+0x1db/0x2d0
[   30.184545]  ? kasan_complete_mode_report_info+0x2a/0x200
[   30.185185]  kasan_report+0x102/0x140
[   30.185541]  ? kasan_atomics_helper+0x50d6/0x5450
[   30.186279]  ? kasan_atomics_helper+0x50d6/0x5450
[   30.186908]  __asan_report_store8_noabort+0x1b/0x30
[   30.187457]  kasan_atomics_helper+0x50d6/0x5450
[   30.187822]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   30.188492]  ? __kmalloc_cache_noprof+0x184/0x410
[   30.188898]  ? trace_hardirqs_on+0x37/0xe0
[   30.189561]  ? kasan_atomics+0x153/0x310
[   30.190183]  kasan_atomics+0x1dd/0x310
[   30.190700]  ? __pfx_kasan_atomics+0x10/0x10
[   30.191190]  ? __pfx_kasan_atomics+0x10/0x10
[   30.191558]  kunit_try_run_case+0x1b3/0x490
[   30.191907]  ? __pfx_kunit_try_run_case+0x10/0x10
[   30.192578]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   30.193212]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   30.193590]  ? __kthread_parkme+0x82/0x160
[   30.194232]  ? preempt_count_sub+0x50/0x80
[   30.194762]  ? __pfx_kunit_try_run_case+0x10/0x10
[   30.195238]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   30.195800]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   30.196381]  kthread+0x257/0x310
[   30.196709]  ? __pfx_kthread+0x10/0x10
[   30.197283]  ret_from_fork+0x41/0x80
[   30.197565]  ? __pfx_kthread+0x10/0x10
[   30.197871]  ret_from_fork_asm+0x1a/0x30
[   30.198487]  </TASK>
[   30.198829] 
[   30.199263] Allocated by task 273:
[   30.199713]  kasan_save_stack+0x3d/0x60
[   30.200276]  kasan_save_track+0x18/0x40
[   30.200673]  kasan_save_alloc_info+0x3b/0x50
[   30.201202]  __kasan_kmalloc+0xb7/0xc0
[   30.202316]  __kmalloc_cache_noprof+0x184/0x410
[   30.202727]  kasan_atomics+0x96/0x310
[   30.203303]  kunit_try_run_case+0x1b3/0x490
[   30.203640]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   30.204333]  kthread+0x257/0x310
[   30.204692]  ret_from_fork+0x41/0x80
[   30.205213]  ret_from_fork_asm+0x1a/0x30
[   30.205785] 
[   30.206000] The buggy address belongs to the object at ffff888102486200
[   30.206000]  which belongs to the cache kmalloc-64 of size 64
[   30.207272] The buggy address is located 0 bytes to the right of
[   30.207272]  allocated 48-byte region [ffff888102486200, ffff888102486230)
[   30.208347] 
[   30.208615] The buggy address belongs to the physical page:
[   30.209243] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102486
[   30.210159] flags: 0x200000000000000(node=0|zone=2)
[   30.210581] page_type: f5(slab)
[   30.210972] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   30.211852] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   30.212657] page dumped because: kasan: bad access detected
[   30.213202] 
[   30.213458] Memory state around the buggy address:
[   30.213999]  ffff888102486100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   30.214858]  ffff888102486180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   30.215544] >ffff888102486200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   30.216278]                                      ^
[   30.216778]  ffff888102486280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.217508]  ffff888102486300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.218221] ==================================================================
[   30.508982] ==================================================================
[   30.509853] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x18b2/0x5450
[   30.511202] Write of size 8 at addr ffff888102486230 by task kunit_try_catch/273
[   30.511952] 
[   30.512173] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241206 #1
[   30.513251] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.513735] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   30.514741] Call Trace:
[   30.515155]  <TASK>
[   30.515427]  dump_stack_lvl+0x73/0xb0
[   30.515974]  print_report+0xd1/0x640
[   30.516482]  ? __virt_addr_valid+0x1db/0x2d0
[   30.516912]  ? kasan_complete_mode_report_info+0x2a/0x200
[   30.517553]  kasan_report+0x102/0x140
[   30.518038]  ? kasan_atomics_helper+0x18b2/0x5450
[   30.518713]  ? kasan_atomics_helper+0x18b2/0x5450
[   30.519380]  kasan_check_range+0x10c/0x1c0
[   30.519866]  __kasan_check_write+0x18/0x20
[   30.520458]  kasan_atomics_helper+0x18b2/0x5450
[   30.521224]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   30.521707]  ? __kmalloc_cache_noprof+0x184/0x410
[   30.522302]  ? trace_hardirqs_on+0x37/0xe0
[   30.522780]  ? kasan_atomics+0x153/0x310
[   30.523331]  kasan_atomics+0x1dd/0x310
[   30.523856]  ? __pfx_kasan_atomics+0x10/0x10
[   30.524476]  ? __pfx_kasan_atomics+0x10/0x10
[   30.524987]  kunit_try_run_case+0x1b3/0x490
[   30.525536]  ? __pfx_kunit_try_run_case+0x10/0x10
[   30.526073]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   30.526475]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   30.527222]  ? __kthread_parkme+0x82/0x160
[   30.527853]  ? preempt_count_sub+0x50/0x80
[   30.528377]  ? __pfx_kunit_try_run_case+0x10/0x10
[   30.528708]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   30.529613]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   30.530432]  kthread+0x257/0x310
[   30.530922]  ? __pfx_kthread+0x10/0x10
[   30.531389]  ret_from_fork+0x41/0x80
[   30.531801]  ? __pfx_kthread+0x10/0x10
[   30.532299]  ret_from_fork_asm+0x1a/0x30
[   30.532759]  </TASK>
[   30.533152] 
[   30.533435] Allocated by task 273:
[   30.533971]  kasan_save_stack+0x3d/0x60
[   30.534409]  kasan_save_track+0x18/0x40
[   30.535005]  kasan_save_alloc_info+0x3b/0x50
[   30.535468]  __kasan_kmalloc+0xb7/0xc0
[   30.535851]  __kmalloc_cache_noprof+0x184/0x410
[   30.536321]  kasan_atomics+0x96/0x310
[   30.536796]  kunit_try_run_case+0x1b3/0x490
[   30.537438]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   30.537820]  kthread+0x257/0x310
[   30.538447]  ret_from_fork+0x41/0x80
[   30.538998]  ret_from_fork_asm+0x1a/0x30
[   30.539516] 
[   30.539755] The buggy address belongs to the object at ffff888102486200
[   30.539755]  which belongs to the cache kmalloc-64 of size 64
[   30.541047] The buggy address is located 0 bytes to the right of
[   30.541047]  allocated 48-byte region [ffff888102486200, ffff888102486230)
[   30.542378] 
[   30.542651] The buggy address belongs to the physical page:
[   30.543368] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102486
[   30.543904] flags: 0x200000000000000(node=0|zone=2)
[   30.544542] page_type: f5(slab)
[   30.545066] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   30.545852] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   30.546673] page dumped because: kasan: bad access detected
[   30.547251] 
[   30.547494] Memory state around the buggy address:
[   30.547979]  ffff888102486100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   30.548777]  ffff888102486180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   30.549605] >ffff888102486200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   30.550337]                                      ^
[   30.550843]  ffff888102486280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.551582]  ffff888102486300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.552277] ==================================================================
[   31.017441] ==================================================================
[   31.019336] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1eab/0x5450
[   31.020080] Write of size 8 at addr ffff888102486230 by task kunit_try_catch/273
[   31.021474] 
[   31.021999] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241206 #1
[   31.022877] Tainted: [B]=BAD_PAGE, [N]=TEST
[   31.023629] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   31.024699] Call Trace:
[   31.025075]  <TASK>
[   31.025835]  dump_stack_lvl+0x73/0xb0
[   31.026676]  print_report+0xd1/0x640
[   31.027387]  ? __virt_addr_valid+0x1db/0x2d0
[   31.027852]  ? kasan_complete_mode_report_info+0x2a/0x200
[   31.028828]  kasan_report+0x102/0x140
[   31.029600]  ? kasan_atomics_helper+0x1eab/0x5450
[   31.030528]  ? kasan_atomics_helper+0x1eab/0x5450
[   31.031024]  kasan_check_range+0x10c/0x1c0
[   31.031545]  __kasan_check_write+0x18/0x20
[   31.032456]  kasan_atomics_helper+0x1eab/0x5450
[   31.032685]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   31.032905]  ? __kmalloc_cache_noprof+0x184/0x410
[   31.033276]  ? trace_hardirqs_on+0x37/0xe0
[   31.033698]  ? kasan_atomics+0x153/0x310
[   31.034279]  kasan_atomics+0x1dd/0x310
[   31.034583]  ? __pfx_kasan_atomics+0x10/0x10
[   31.035252]  ? __pfx_kasan_atomics+0x10/0x10
[   31.035839]  kunit_try_run_case+0x1b3/0x490
[   31.036520]  ? __pfx_kunit_try_run_case+0x10/0x10
[   31.036863]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   31.037579]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   31.038140]  ? __kthread_parkme+0x82/0x160
[   31.038674]  ? preempt_count_sub+0x50/0x80
[   31.039019]  ? __pfx_kunit_try_run_case+0x10/0x10
[   31.039701]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   31.040630]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   31.041080]  kthread+0x257/0x310
[   31.041534]  ? __pfx_kthread+0x10/0x10
[   31.042147]  ret_from_fork+0x41/0x80
[   31.042476]  ? __pfx_kthread+0x10/0x10
[   31.043110]  ret_from_fork_asm+0x1a/0x30
[   31.043711]  </TASK>
[   31.044072] 
[   31.044294] Allocated by task 273:
[   31.044758]  kasan_save_stack+0x3d/0x60
[   31.045384]  kasan_save_track+0x18/0x40
[   31.045753]  kasan_save_alloc_info+0x3b/0x50
[   31.046428]  __kasan_kmalloc+0xb7/0xc0
[   31.046926]  __kmalloc_cache_noprof+0x184/0x410
[   31.047716]  kasan_atomics+0x96/0x310
[   31.048019]  kunit_try_run_case+0x1b3/0x490
[   31.048318]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   31.049149]  kthread+0x257/0x310
[   31.049740]  ret_from_fork+0x41/0x80
[   31.050251]  ret_from_fork_asm+0x1a/0x30
[   31.050914] 
[   31.051271] The buggy address belongs to the object at ffff888102486200
[   31.051271]  which belongs to the cache kmalloc-64 of size 64
[   31.051989] The buggy address is located 0 bytes to the right of
[   31.051989]  allocated 48-byte region [ffff888102486200, ffff888102486230)
[   31.053172] 
[   31.053465] The buggy address belongs to the physical page:
[   31.054420] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102486
[   31.055218] flags: 0x200000000000000(node=0|zone=2)
[   31.055686] page_type: f5(slab)
[   31.055997] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   31.056819] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   31.058065] page dumped because: kasan: bad access detected
[   31.058637] 
[   31.059091] Memory state around the buggy address:
[   31.059632]  ffff888102486100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   31.060186]  ffff888102486180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   31.061350] >ffff888102486200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   31.061977]                                      ^
[   31.062685]  ffff888102486280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.063695]  ffff888102486300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.064654] ==================================================================
[   29.631814] ==================================================================
[   29.632585] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x107a/0x5450
[   29.633467] Write of size 4 at addr ffff888102486230 by task kunit_try_catch/273
[   29.634197] 
[   29.634507] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241206 #1
[   29.635488] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.635965] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   29.636784] Call Trace:
[   29.637250]  <TASK>
[   29.637566]  dump_stack_lvl+0x73/0xb0
[   29.638073]  print_report+0xd1/0x640
[   29.638542]  ? __virt_addr_valid+0x1db/0x2d0
[   29.639000]  ? kasan_complete_mode_report_info+0x2a/0x200
[   29.639675]  kasan_report+0x102/0x140
[   29.640164]  ? kasan_atomics_helper+0x107a/0x5450
[   29.640806]  ? kasan_atomics_helper+0x107a/0x5450
[   29.641424]  kasan_check_range+0x10c/0x1c0
[   29.641876]  __kasan_check_write+0x18/0x20
[   29.642478]  kasan_atomics_helper+0x107a/0x5450
[   29.643036]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   29.643532]  ? __kmalloc_cache_noprof+0x184/0x410
[   29.644180]  ? trace_hardirqs_on+0x37/0xe0
[   29.644571]  ? kasan_atomics+0x153/0x310
[   29.645056]  kasan_atomics+0x1dd/0x310
[   29.645647]  ? __pfx_kasan_atomics+0x10/0x10
[   29.646153]  ? __pfx_kasan_atomics+0x10/0x10
[   29.646657]  kunit_try_run_case+0x1b3/0x490
[   29.647248]  ? __pfx_kunit_try_run_case+0x10/0x10
[   29.647814]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   29.648356]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   29.649032]  ? __kthread_parkme+0x82/0x160
[   29.649521]  ? preempt_count_sub+0x50/0x80
[   29.649983]  ? __pfx_kunit_try_run_case+0x10/0x10
[   29.650663]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   29.651361]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   29.652016]  kthread+0x257/0x310
[   29.652429]  ? __pfx_kthread+0x10/0x10
[   29.653041]  ret_from_fork+0x41/0x80
[   29.653496]  ? __pfx_kthread+0x10/0x10
[   29.653975]  ret_from_fork_asm+0x1a/0x30
[   29.654589]  </TASK>
[   29.654856] 
[   29.655162] Allocated by task 273:
[   29.655498]  kasan_save_stack+0x3d/0x60
[   29.655861]  kasan_save_track+0x18/0x40
[   29.656409]  kasan_save_alloc_info+0x3b/0x50
[   29.656832]  __kasan_kmalloc+0xb7/0xc0
[   29.657295]  __kmalloc_cache_noprof+0x184/0x410
[   29.657611]  kasan_atomics+0x96/0x310
[   29.658034]  kunit_try_run_case+0x1b3/0x490
[   29.658716]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   29.659466]  kthread+0x257/0x310
[   29.659858]  ret_from_fork+0x41/0x80
[   29.660365]  ret_from_fork_asm+0x1a/0x30
[   29.660802] 
[   29.661000] The buggy address belongs to the object at ffff888102486200
[   29.661000]  which belongs to the cache kmalloc-64 of size 64
[   29.662335] The buggy address is located 0 bytes to the right of
[   29.662335]  allocated 48-byte region [ffff888102486200, ffff888102486230)
[   29.663795] 
[   29.664351] The buggy address belongs to the physical page:
[   29.665689] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102486
[   29.666252] flags: 0x200000000000000(node=0|zone=2)
[   29.666976] page_type: f5(slab)
[   29.667650] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   29.669012] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   29.669687] page dumped because: kasan: bad access detected
[   29.670278] 
[   29.670486] Memory state around the buggy address:
[   29.670985]  ffff888102486100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.671485]  ffff888102486180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.672402] >ffff888102486200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   29.672999]                                      ^
[   29.673482]  ffff888102486280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.674496]  ffff888102486300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.675122] ==================================================================
[   30.606411] ==================================================================
[   30.607339] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x19e4/0x5450
[   30.609140] Write of size 8 at addr ffff888102486230 by task kunit_try_catch/273
[   30.610676] 
[   30.611020] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241206 #1
[   30.612214] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.612638] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   30.614004] Call Trace:
[   30.614619]  <TASK>
[   30.614888]  dump_stack_lvl+0x73/0xb0
[   30.615347]  print_report+0xd1/0x640
[   30.615775]  ? __virt_addr_valid+0x1db/0x2d0
[   30.616235]  ? kasan_complete_mode_report_info+0x2a/0x200
[   30.616762]  kasan_report+0x102/0x140
[   30.618060]  ? kasan_atomics_helper+0x19e4/0x5450
[   30.618554]  ? kasan_atomics_helper+0x19e4/0x5450
[   30.618989]  kasan_check_range+0x10c/0x1c0
[   30.619333]  __kasan_check_write+0x18/0x20
[   30.620018]  kasan_atomics_helper+0x19e4/0x5450
[   30.620877]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   30.621764]  ? __kmalloc_cache_noprof+0x184/0x410
[   30.622187]  ? trace_hardirqs_on+0x37/0xe0
[   30.622717]  ? kasan_atomics+0x153/0x310
[   30.623223]  kasan_atomics+0x1dd/0x310
[   30.623674]  ? __pfx_kasan_atomics+0x10/0x10
[   30.624142]  ? __pfx_kasan_atomics+0x10/0x10
[   30.624597]  kunit_try_run_case+0x1b3/0x490
[   30.625202]  ? __pfx_kunit_try_run_case+0x10/0x10
[   30.625884]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   30.626783]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   30.627578]  ? __kthread_parkme+0x82/0x160
[   30.628101]  ? preempt_count_sub+0x50/0x80
[   30.628588]  ? __pfx_kunit_try_run_case+0x10/0x10
[   30.629169]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   30.629635]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   30.630519]  kthread+0x257/0x310
[   30.630974]  ? __pfx_kthread+0x10/0x10
[   30.631620]  ret_from_fork+0x41/0x80
[   30.631964]  ? __pfx_kthread+0x10/0x10
[   30.632407]  ret_from_fork_asm+0x1a/0x30
[   30.633033]  </TASK>
[   30.633241] 
[   30.633407] Allocated by task 273:
[   30.634019]  kasan_save_stack+0x3d/0x60
[   30.634531]  kasan_save_track+0x18/0x40
[   30.634861]  kasan_save_alloc_info+0x3b/0x50
[   30.635637]  __kasan_kmalloc+0xb7/0xc0
[   30.636101]  __kmalloc_cache_noprof+0x184/0x410
[   30.636633]  kasan_atomics+0x96/0x310
[   30.636951]  kunit_try_run_case+0x1b3/0x490
[   30.637257]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   30.638200]  kthread+0x257/0x310
[   30.638684]  ret_from_fork+0x41/0x80
[   30.639343]  ret_from_fork_asm+0x1a/0x30
[   30.639812] 
[   30.640097] The buggy address belongs to the object at ffff888102486200
[   30.640097]  which belongs to the cache kmalloc-64 of size 64
[   30.641158] The buggy address is located 0 bytes to the right of
[   30.641158]  allocated 48-byte region [ffff888102486200, ffff888102486230)
[   30.642082] 
[   30.642346] The buggy address belongs to the physical page:
[   30.643073] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102486
[   30.643850] flags: 0x200000000000000(node=0|zone=2)
[   30.644376] page_type: f5(slab)
[   30.644637] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   30.645190] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   30.646172] page dumped because: kasan: bad access detected
[   30.646893] 
[   30.647253] Memory state around the buggy address:
[   30.647815]  ffff888102486100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   30.648570]  ffff888102486180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   30.650561] >ffff888102486200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   30.652186]                                      ^
[   30.652798]  ffff888102486280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.653202]  ffff888102486300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.654247] ==================================================================
[   31.161391] ==================================================================
[   31.161881] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x2007/0x5450
[   31.162801] Write of size 8 at addr ffff888102486230 by task kunit_try_catch/273
[   31.164187] 
[   31.164390] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241206 #1
[   31.165014] Tainted: [B]=BAD_PAGE, [N]=TEST
[   31.165998] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   31.167325] Call Trace:
[   31.167640]  <TASK>
[   31.167910]  dump_stack_lvl+0x73/0xb0
[   31.168225]  print_report+0xd1/0x640
[   31.169386]  ? __virt_addr_valid+0x1db/0x2d0
[   31.170171]  ? kasan_complete_mode_report_info+0x2a/0x200
[   31.170918]  kasan_report+0x102/0x140
[   31.171603]  ? kasan_atomics_helper+0x2007/0x5450
[   31.172510]  ? kasan_atomics_helper+0x2007/0x5450
[   31.173210]  kasan_check_range+0x10c/0x1c0
[   31.173956]  __kasan_check_write+0x18/0x20
[   31.174622]  kasan_atomics_helper+0x2007/0x5450
[   31.175164]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   31.176283]  ? __kmalloc_cache_noprof+0x184/0x410
[   31.176988]  ? trace_hardirqs_on+0x37/0xe0
[   31.177566]  ? kasan_atomics+0x153/0x310
[   31.178036]  kasan_atomics+0x1dd/0x310
[   31.179228]  ? __pfx_kasan_atomics+0x10/0x10
[   31.179855]  ? __pfx_kasan_atomics+0x10/0x10
[   31.180567]  kunit_try_run_case+0x1b3/0x490
[   31.181008]  ? __pfx_kunit_try_run_case+0x10/0x10
[   31.181859]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   31.182379]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   31.183186]  ? __kthread_parkme+0x82/0x160
[   31.183653]  ? preempt_count_sub+0x50/0x80
[   31.184109]  ? __pfx_kunit_try_run_case+0x10/0x10
[   31.184557]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   31.185602]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   31.186115]  kthread+0x257/0x310
[   31.186828]  ? __pfx_kthread+0x10/0x10
[   31.187495]  ret_from_fork+0x41/0x80
[   31.188047]  ? __pfx_kthread+0x10/0x10
[   31.188796]  ret_from_fork_asm+0x1a/0x30
[   31.189470]  </TASK>
[   31.189802] 
[   31.190309] Allocated by task 273:
[   31.190670]  kasan_save_stack+0x3d/0x60
[   31.191090]  kasan_save_track+0x18/0x40
[   31.192078]  kasan_save_alloc_info+0x3b/0x50
[   31.192533]  __kasan_kmalloc+0xb7/0xc0
[   31.192911]  __kmalloc_cache_noprof+0x184/0x410
[   31.193407]  kasan_atomics+0x96/0x310
[   31.194374]  kunit_try_run_case+0x1b3/0x490
[   31.194662]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   31.195539]  kthread+0x257/0x310
[   31.195878]  ret_from_fork+0x41/0x80
[   31.196663]  ret_from_fork_asm+0x1a/0x30
[   31.197526] 
[   31.197704] The buggy address belongs to the object at ffff888102486200
[   31.197704]  which belongs to the cache kmalloc-64 of size 64
[   31.199520] The buggy address is located 0 bytes to the right of
[   31.199520]  allocated 48-byte region [ffff888102486200, ffff888102486230)
[   31.201143] 
[   31.201320] The buggy address belongs to the physical page:
[   31.201850] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102486
[   31.203318] flags: 0x200000000000000(node=0|zone=2)
[   31.204052] page_type: f5(slab)
[   31.204483] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   31.205134] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   31.205748] page dumped because: kasan: bad access detected
[   31.206917] 
[   31.207218] Memory state around the buggy address:
[   31.207960]  ffff888102486100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   31.208812]  ffff888102486180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   31.209824] >ffff888102486200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   31.210697]                                      ^
[   31.211423]  ffff888102486280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.212190]  ffff888102486300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.212856] ==================================================================
[   31.268264] ==================================================================
[   31.269913] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x20c9/0x5450
[   31.270866] Write of size 8 at addr ffff888102486230 by task kunit_try_catch/273
[   31.272344] 
[   31.272619] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241206 #1
[   31.273762] Tainted: [B]=BAD_PAGE, [N]=TEST
[   31.274175] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   31.275465] Call Trace:
[   31.275772]  <TASK>
[   31.276458]  dump_stack_lvl+0x73/0xb0
[   31.276905]  print_report+0xd1/0x640
[   31.277625]  ? __virt_addr_valid+0x1db/0x2d0
[   31.277988]  ? kasan_complete_mode_report_info+0x2a/0x200
[   31.279134]  kasan_report+0x102/0x140
[   31.279918]  ? kasan_atomics_helper+0x20c9/0x5450
[   31.280496]  ? kasan_atomics_helper+0x20c9/0x5450
[   31.281074]  kasan_check_range+0x10c/0x1c0
[   31.281962]  __kasan_check_write+0x18/0x20
[   31.282668]  kasan_atomics_helper+0x20c9/0x5450
[   31.283392]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   31.284021]  ? __kmalloc_cache_noprof+0x184/0x410
[   31.284780]  ? trace_hardirqs_on+0x37/0xe0
[   31.285211]  ? kasan_atomics+0x153/0x310
[   31.285922]  kasan_atomics+0x1dd/0x310
[   31.286598]  ? __pfx_kasan_atomics+0x10/0x10
[   31.287179]  ? __pfx_kasan_atomics+0x10/0x10
[   31.287640]  kunit_try_run_case+0x1b3/0x490
[   31.288066]  ? __pfx_kunit_try_run_case+0x10/0x10
[   31.288495]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   31.289514]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   31.290036]  ? __kthread_parkme+0x82/0x160
[   31.290760]  ? preempt_count_sub+0x50/0x80
[   31.291235]  ? __pfx_kunit_try_run_case+0x10/0x10
[   31.292175]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   31.292815]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   31.293716]  kthread+0x257/0x310
[   31.294412]  ? __pfx_kthread+0x10/0x10
[   31.295113]  ret_from_fork+0x41/0x80
[   31.295506]  ? __pfx_kthread+0x10/0x10
[   31.295882]  ret_from_fork_asm+0x1a/0x30
[   31.296666]  </TASK>
[   31.296895] 
[   31.297165] Allocated by task 273:
[   31.298142]  kasan_save_stack+0x3d/0x60
[   31.298520]  kasan_save_track+0x18/0x40
[   31.298950]  kasan_save_alloc_info+0x3b/0x50
[   31.299224]  __kasan_kmalloc+0xb7/0xc0
[   31.299408]  __kmalloc_cache_noprof+0x184/0x410
[   31.299610]  kasan_atomics+0x96/0x310
[   31.299784]  kunit_try_run_case+0x1b3/0x490
[   31.301028]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   31.301532]  kthread+0x257/0x310
[   31.302964]  ret_from_fork+0x41/0x80
[   31.303243]  ret_from_fork_asm+0x1a/0x30
[   31.304061] 
[   31.304691] The buggy address belongs to the object at ffff888102486200
[   31.304691]  which belongs to the cache kmalloc-64 of size 64
[   31.306727] The buggy address is located 0 bytes to the right of
[   31.306727]  allocated 48-byte region [ffff888102486200, ffff888102486230)
[   31.308434] 
[   31.308724] The buggy address belongs to the physical page:
[   31.309231] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102486
[   31.310108] flags: 0x200000000000000(node=0|zone=2)
[   31.310667] page_type: f5(slab)
[   31.310969] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   31.311837] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   31.313035] page dumped because: kasan: bad access detected
[   31.313839] 
[   31.314069] Memory state around the buggy address:
[   31.315330]  ffff888102486100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   31.316162]  ffff888102486180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   31.317286] >ffff888102486200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   31.318260]                                      ^
[   31.318755]  ffff888102486280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.319710]  ffff888102486300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.320497] ==================================================================
[   30.267250] ==================================================================
[   30.268714] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x15b7/0x5450
[   30.269727] Write of size 8 at addr ffff888102486230 by task kunit_try_catch/273
[   30.270612] 
[   30.270857] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241206 #1
[   30.272106] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.272690] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   30.273988] Call Trace:
[   30.274683]  <TASK>
[   30.274958]  dump_stack_lvl+0x73/0xb0
[   30.275405]  print_report+0xd1/0x640
[   30.275813]  ? __virt_addr_valid+0x1db/0x2d0
[   30.276261]  ? kasan_complete_mode_report_info+0x2a/0x200
[   30.276763]  kasan_report+0x102/0x140
[   30.277856]  ? kasan_atomics_helper+0x15b7/0x5450
[   30.279075]  ? kasan_atomics_helper+0x15b7/0x5450
[   30.279580]  kasan_check_range+0x10c/0x1c0
[   30.280203]  __kasan_check_write+0x18/0x20
[   30.280808]  kasan_atomics_helper+0x15b7/0x5450
[   30.281657]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   30.282478]  ? __kmalloc_cache_noprof+0x184/0x410
[   30.283146]  ? trace_hardirqs_on+0x37/0xe0
[   30.283666]  ? kasan_atomics+0x153/0x310
[   30.284147]  kasan_atomics+0x1dd/0x310
[   30.284596]  ? __pfx_kasan_atomics+0x10/0x10
[   30.285070]  ? __pfx_kasan_atomics+0x10/0x10
[   30.285741]  kunit_try_run_case+0x1b3/0x490
[   30.286165]  ? __pfx_kunit_try_run_case+0x10/0x10
[   30.286926]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   30.287368]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   30.288534]  ? __kthread_parkme+0x82/0x160
[   30.289587]  ? preempt_count_sub+0x50/0x80
[   30.290139]  ? __pfx_kunit_try_run_case+0x10/0x10
[   30.291022]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   30.292042]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   30.293058]  kthread+0x257/0x310
[   30.293505]  ? __pfx_kthread+0x10/0x10
[   30.294139]  ret_from_fork+0x41/0x80
[   30.294717]  ? __pfx_kthread+0x10/0x10
[   30.295398]  ret_from_fork_asm+0x1a/0x30
[   30.295854]  </TASK>
[   30.296081] 
[   30.296335] Allocated by task 273:
[   30.296850]  kasan_save_stack+0x3d/0x60
[   30.297486]  kasan_save_track+0x18/0x40
[   30.297801]  kasan_save_alloc_info+0x3b/0x50
[   30.298455]  __kasan_kmalloc+0xb7/0xc0
[   30.299064]  __kmalloc_cache_noprof+0x184/0x410
[   30.299470]  kasan_atomics+0x96/0x310
[   30.299923]  kunit_try_run_case+0x1b3/0x490
[   30.300704]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   30.301115]  kthread+0x257/0x310
[   30.301674]  ret_from_fork+0x41/0x80
[   30.302226]  ret_from_fork_asm+0x1a/0x30
[   30.302524] 
[   30.302868] The buggy address belongs to the object at ffff888102486200
[   30.302868]  which belongs to the cache kmalloc-64 of size 64
[   30.303897] The buggy address is located 0 bytes to the right of
[   30.303897]  allocated 48-byte region [ffff888102486200, ffff888102486230)
[   30.305145] 
[   30.305324] The buggy address belongs to the physical page:
[   30.305714] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102486
[   30.306587] flags: 0x200000000000000(node=0|zone=2)
[   30.307094] page_type: f5(slab)
[   30.307558] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   30.308089] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   30.308524] page dumped because: kasan: bad access detected
[   30.309213] 
[   30.309481] Memory state around the buggy address:
[   30.310208]  ffff888102486100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   30.311048]  ffff888102486180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   30.311789] >ffff888102486200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   30.312576]                                      ^
[   30.312907]  ffff888102486280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.314094]  ffff888102486300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.314727] ==================================================================
[   28.522846] ==================================================================
[   28.523562] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e0/0x5450
[   28.524422] Read of size 4 at addr ffff888102486230 by task kunit_try_catch/273
[   28.524872] 
[   28.525091] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241206 #1
[   28.525992] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.526503] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   28.527606] Call Trace:
[   28.527849]  <TASK>
[   28.528215]  dump_stack_lvl+0x73/0xb0
[   28.528605]  print_report+0xd1/0x640
[   28.528962]  ? __virt_addr_valid+0x1db/0x2d0
[   28.529511]  ? kasan_complete_mode_report_info+0x2a/0x200
[   28.530103]  kasan_report+0x102/0x140
[   28.530414]  ? kasan_atomics_helper+0x3e0/0x5450
[   28.530949]  ? kasan_atomics_helper+0x3e0/0x5450
[   28.532771]  kasan_check_range+0x10c/0x1c0
[   28.533896]  __kasan_check_read+0x15/0x20
[   28.534535]  kasan_atomics_helper+0x3e0/0x5450
[   28.535268]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   28.535912]  ? __kmalloc_cache_noprof+0x184/0x410
[   28.536823]  ? trace_hardirqs_on+0x37/0xe0
[   28.537586]  ? kasan_atomics+0x153/0x310
[   28.538279]  kasan_atomics+0x1dd/0x310
[   28.538843]  ? __pfx_kasan_atomics+0x10/0x10
[   28.539665]  ? __pfx_kasan_atomics+0x10/0x10
[   28.540287]  kunit_try_run_case+0x1b3/0x490
[   28.540873]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.541597]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   28.542100]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   28.542627]  ? __kthread_parkme+0x82/0x160
[   28.543491]  ? preempt_count_sub+0x50/0x80
[   28.543780]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.544891]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   28.545645]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.546438]  kthread+0x257/0x310
[   28.546834]  ? __pfx_kthread+0x10/0x10
[   28.547612]  ret_from_fork+0x41/0x80
[   28.547927]  ? __pfx_kthread+0x10/0x10
[   28.548869]  ret_from_fork_asm+0x1a/0x30
[   28.549570]  </TASK>
[   28.549994] 
[   28.550243] Allocated by task 273:
[   28.550805]  kasan_save_stack+0x3d/0x60
[   28.551283]  kasan_save_track+0x18/0x40
[   28.551654]  kasan_save_alloc_info+0x3b/0x50
[   28.552596]  __kasan_kmalloc+0xb7/0xc0
[   28.552856]  __kmalloc_cache_noprof+0x184/0x410
[   28.553885]  kasan_atomics+0x96/0x310
[   28.554531]  kunit_try_run_case+0x1b3/0x490
[   28.555136]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.555950]  kthread+0x257/0x310
[   28.556548]  ret_from_fork+0x41/0x80
[   28.556913]  ret_from_fork_asm+0x1a/0x30
[   28.557642] 
[   28.557960] The buggy address belongs to the object at ffff888102486200
[   28.557960]  which belongs to the cache kmalloc-64 of size 64
[   28.559728] The buggy address is located 0 bytes to the right of
[   28.559728]  allocated 48-byte region [ffff888102486200, ffff888102486230)
[   28.561446] 
[   28.561664] The buggy address belongs to the physical page:
[   28.562752] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102486
[   28.563473] flags: 0x200000000000000(node=0|zone=2)
[   28.563883] page_type: f5(slab)
[   28.564299] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   28.565586] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   28.566177] page dumped because: kasan: bad access detected
[   28.566965] 
[   28.567232] Memory state around the buggy address:
[   28.568096]  ffff888102486100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.568951]  ffff888102486180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.569987] >ffff888102486200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   28.571171]                                      ^
[   28.571416]  ffff888102486280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.571688]  ffff888102486300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.571998] ==================================================================
[   28.480756] ==================================================================
[   28.481345] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b70/0x5450
[   28.482999] Write of size 4 at addr ffff888102486230 by task kunit_try_catch/273
[   28.483722] 
[   28.484035] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241206 #1
[   28.485010] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.485385] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   28.486499] Call Trace:
[   28.486922]  <TASK>
[   28.487352]  dump_stack_lvl+0x73/0xb0
[   28.487799]  print_report+0xd1/0x640
[   28.488369]  ? __virt_addr_valid+0x1db/0x2d0
[   28.488763]  ? kasan_complete_mode_report_info+0x2a/0x200
[   28.489154]  kasan_report+0x102/0x140
[   28.489701]  ? kasan_atomics_helper+0x4b70/0x5450
[   28.490477]  ? kasan_atomics_helper+0x4b70/0x5450
[   28.490967]  __asan_report_store4_noabort+0x1b/0x30
[   28.491464]  kasan_atomics_helper+0x4b70/0x5450
[   28.491784]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   28.492235]  ? __kmalloc_cache_noprof+0x184/0x410
[   28.492972]  ? trace_hardirqs_on+0x37/0xe0
[   28.493557]  ? kasan_atomics+0x153/0x310
[   28.494373]  kasan_atomics+0x1dd/0x310
[   28.494668]  ? __pfx_kasan_atomics+0x10/0x10
[   28.495185]  ? __pfx_kasan_atomics+0x10/0x10
[   28.495825]  kunit_try_run_case+0x1b3/0x490
[   28.496429]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.496831]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   28.497722]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   28.498358]  ? __kthread_parkme+0x82/0x160
[   28.498726]  ? preempt_count_sub+0x50/0x80
[   28.499332]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.499837]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   28.501024]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.502007]  kthread+0x257/0x310
[   28.502717]  ? __pfx_kthread+0x10/0x10
[   28.503111]  ret_from_fork+0x41/0x80
[   28.503514]  ? __pfx_kthread+0x10/0x10
[   28.503906]  ret_from_fork_asm+0x1a/0x30
[   28.504226]  </TASK>
[   28.504455] 
[   28.504695] Allocated by task 273:
[   28.505160]  kasan_save_stack+0x3d/0x60
[   28.505660]  kasan_save_track+0x18/0x40
[   28.506082]  kasan_save_alloc_info+0x3b/0x50
[   28.506399]  __kasan_kmalloc+0xb7/0xc0
[   28.506859]  __kmalloc_cache_noprof+0x184/0x410
[   28.507300]  kasan_atomics+0x96/0x310
[   28.507579]  kunit_try_run_case+0x1b3/0x490
[   28.508176]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.508834]  kthread+0x257/0x310
[   28.509123]  ret_from_fork+0x41/0x80
[   28.509594]  ret_from_fork_asm+0x1a/0x30
[   28.510073] 
[   28.510332] The buggy address belongs to the object at ffff888102486200
[   28.510332]  which belongs to the cache kmalloc-64 of size 64
[   28.511129] The buggy address is located 0 bytes to the right of
[   28.511129]  allocated 48-byte region [ffff888102486200, ffff888102486230)
[   28.512321] 
[   28.512490] The buggy address belongs to the physical page:
[   28.512822] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102486
[   28.513616] flags: 0x200000000000000(node=0|zone=2)
[   28.514219] page_type: f5(slab)
[   28.514667] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   28.515501] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   28.516185] page dumped because: kasan: bad access detected
[   28.516737] 
[   28.516888] Memory state around the buggy address:
[   28.517232]  ffff888102486100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.517653]  ffff888102486180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.518110] >ffff888102486200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   28.519084]                                      ^
[   28.519647]  ffff888102486280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.520503]  ffff888102486300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.520926] ==================================================================
[   29.483799] ==================================================================
[   29.484952] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf11/0x5450
[   29.485613] Write of size 4 at addr ffff888102486230 by task kunit_try_catch/273
[   29.486333] 
[   29.486517] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241206 #1
[   29.487889] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.488363] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   29.489180] Call Trace:
[   29.489598]  <TASK>
[   29.489900]  dump_stack_lvl+0x73/0xb0
[   29.490268]  print_report+0xd1/0x640
[   29.490756]  ? __virt_addr_valid+0x1db/0x2d0
[   29.491319]  ? kasan_complete_mode_report_info+0x2a/0x200
[   29.491708]  kasan_report+0x102/0x140
[   29.492079]  ? kasan_atomics_helper+0xf11/0x5450
[   29.492865]  ? kasan_atomics_helper+0xf11/0x5450
[   29.493587]  kasan_check_range+0x10c/0x1c0
[   29.494249]  __kasan_check_write+0x18/0x20
[   29.494560]  kasan_atomics_helper+0xf11/0x5450
[   29.495220]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   29.495822]  ? __kmalloc_cache_noprof+0x184/0x410
[   29.496361]  ? trace_hardirqs_on+0x37/0xe0
[   29.496683]  ? kasan_atomics+0x153/0x310
[   29.497256]  kasan_atomics+0x1dd/0x310
[   29.498017]  ? __pfx_kasan_atomics+0x10/0x10
[   29.498412]  ? __pfx_kasan_atomics+0x10/0x10
[   29.499014]  kunit_try_run_case+0x1b3/0x490
[   29.499534]  ? __pfx_kunit_try_run_case+0x10/0x10
[   29.500332]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   29.500719]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   29.501432]  ? __kthread_parkme+0x82/0x160
[   29.501748]  ? preempt_count_sub+0x50/0x80
[   29.502151]  ? __pfx_kunit_try_run_case+0x10/0x10
[   29.502798]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   29.503740]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   29.504334]  kthread+0x257/0x310
[   29.504620]  ? __pfx_kthread+0x10/0x10
[   29.504919]  ret_from_fork+0x41/0x80
[   29.505400]  ? __pfx_kthread+0x10/0x10
[   29.505914]  ret_from_fork_asm+0x1a/0x30
[   29.506578]  </TASK>
[   29.506917] 
[   29.508287] Allocated by task 273:
[   29.508668]  kasan_save_stack+0x3d/0x60
[   29.509429]  kasan_save_track+0x18/0x40
[   29.509654]  kasan_save_alloc_info+0x3b/0x50
[   29.509873]  __kasan_kmalloc+0xb7/0xc0
[   29.510173]  __kmalloc_cache_noprof+0x184/0x410
[   29.510669]  kasan_atomics+0x96/0x310
[   29.511025]  kunit_try_run_case+0x1b3/0x490
[   29.511453]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   29.512211]  kthread+0x257/0x310
[   29.512528]  ret_from_fork+0x41/0x80
[   29.512885]  ret_from_fork_asm+0x1a/0x30
[   29.513326] 
[   29.513621] The buggy address belongs to the object at ffff888102486200
[   29.513621]  which belongs to the cache kmalloc-64 of size 64
[   29.516029] The buggy address is located 0 bytes to the right of
[   29.516029]  allocated 48-byte region [ffff888102486200, ffff888102486230)
[   29.517523] 
[   29.517700] The buggy address belongs to the physical page:
[   29.518812] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102486
[   29.519583] flags: 0x200000000000000(node=0|zone=2)
[   29.520294] page_type: f5(slab)
[   29.520694] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   29.521804] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   29.522494] page dumped because: kasan: bad access detected
[   29.523561] 
[   29.523764] Memory state around the buggy address:
[   29.524352]  ffff888102486100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.525859]  ffff888102486180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.526302] >ffff888102486200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   29.527081]                                      ^
[   29.527495]  ffff888102486280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.528540]  ffff888102486300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.529301] ==================================================================
[   30.132996] ==================================================================
[   30.133958] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1468/0x5450
[   30.134728] Write of size 8 at addr ffff888102486230 by task kunit_try_catch/273
[   30.135511] 
[   30.135696] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241206 #1
[   30.136925] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.137458] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   30.138067] Call Trace:
[   30.138495]  <TASK>
[   30.138843]  dump_stack_lvl+0x73/0xb0
[   30.139297]  print_report+0xd1/0x640
[   30.139926]  ? __virt_addr_valid+0x1db/0x2d0
[   30.140482]  ? kasan_complete_mode_report_info+0x2a/0x200
[   30.141208]  kasan_report+0x102/0x140
[   30.141909]  ? kasan_atomics_helper+0x1468/0x5450
[   30.142468]  ? kasan_atomics_helper+0x1468/0x5450
[   30.143052]  kasan_check_range+0x10c/0x1c0
[   30.143618]  __kasan_check_write+0x18/0x20
[   30.144042]  kasan_atomics_helper+0x1468/0x5450
[   30.144693]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   30.145298]  ? __kmalloc_cache_noprof+0x184/0x410
[   30.145876]  ? trace_hardirqs_on+0x37/0xe0
[   30.146377]  ? kasan_atomics+0x153/0x310
[   30.146886]  kasan_atomics+0x1dd/0x310
[   30.147521]  ? __pfx_kasan_atomics+0x10/0x10
[   30.147860]  ? __pfx_kasan_atomics+0x10/0x10
[   30.148520]  kunit_try_run_case+0x1b3/0x490
[   30.148881]  ? __pfx_kunit_try_run_case+0x10/0x10
[   30.149595]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   30.150033]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   30.150724]  ? __kthread_parkme+0x82/0x160
[   30.151232]  ? preempt_count_sub+0x50/0x80
[   30.151750]  ? __pfx_kunit_try_run_case+0x10/0x10
[   30.152101]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   30.152491]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   30.153129]  kthread+0x257/0x310
[   30.153597]  ? __pfx_kthread+0x10/0x10
[   30.154129]  ret_from_fork+0x41/0x80
[   30.154594]  ? __pfx_kthread+0x10/0x10
[   30.154885]  ret_from_fork_asm+0x1a/0x30
[   30.155665]  </TASK>
[   30.155966] 
[   30.156314] Allocated by task 273:
[   30.156677]  kasan_save_stack+0x3d/0x60
[   30.157152]  kasan_save_track+0x18/0x40
[   30.157662]  kasan_save_alloc_info+0x3b/0x50
[   30.158179]  __kasan_kmalloc+0xb7/0xc0
[   30.158521]  __kmalloc_cache_noprof+0x184/0x410
[   30.159012]  kasan_atomics+0x96/0x310
[   30.159770]  kunit_try_run_case+0x1b3/0x490
[   30.160097]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   30.160768]  kthread+0x257/0x310
[   30.161282]  ret_from_fork+0x41/0x80
[   30.161678]  ret_from_fork_asm+0x1a/0x30
[   30.162143] 
[   30.162354] The buggy address belongs to the object at ffff888102486200
[   30.162354]  which belongs to the cache kmalloc-64 of size 64
[   30.164818] The buggy address is located 0 bytes to the right of
[   30.164818]  allocated 48-byte region [ffff888102486200, ffff888102486230)
[   30.165550] 
[   30.165729] The buggy address belongs to the physical page:
[   30.167449] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102486
[   30.168448] flags: 0x200000000000000(node=0|zone=2)
[   30.168992] page_type: f5(slab)
[   30.169262] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   30.169637] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   30.170090] page dumped because: kasan: bad access detected
[   30.171206] 
[   30.171381] Memory state around the buggy address:
[   30.171760]  ffff888102486100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   30.173315]  ffff888102486180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   30.174130] >ffff888102486200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   30.174754]                                      ^
[   30.175362]  ffff888102486280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.175964]  ffff888102486300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.176663] ==================================================================
[   30.755103] ==================================================================
[   30.755869] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1c19/0x5450
[   30.756623] Write of size 8 at addr ffff888102486230 by task kunit_try_catch/273
[   30.758059] 
[   30.758262] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241206 #1
[   30.759322] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.759721] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   30.760882] Call Trace:
[   30.761264]  <TASK>
[   30.761673]  dump_stack_lvl+0x73/0xb0
[   30.762624]  print_report+0xd1/0x640
[   30.763118]  ? __virt_addr_valid+0x1db/0x2d0
[   30.763878]  ? kasan_complete_mode_report_info+0x2a/0x200
[   30.764355]  kasan_report+0x102/0x140
[   30.764699]  ? kasan_atomics_helper+0x1c19/0x5450
[   30.765383]  ? kasan_atomics_helper+0x1c19/0x5450
[   30.765850]  kasan_check_range+0x10c/0x1c0
[   30.766439]  __kasan_check_write+0x18/0x20
[   30.766978]  kasan_atomics_helper+0x1c19/0x5450
[   30.767580]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   30.767972]  ? __kmalloc_cache_noprof+0x184/0x410
[   30.768474]  ? trace_hardirqs_on+0x37/0xe0
[   30.768974]  ? kasan_atomics+0x153/0x310
[   30.769478]  kasan_atomics+0x1dd/0x310
[   30.770024]  ? __pfx_kasan_atomics+0x10/0x10
[   30.770566]  ? __pfx_kasan_atomics+0x10/0x10
[   30.770927]  kunit_try_run_case+0x1b3/0x490
[   30.771700]  ? __pfx_kunit_try_run_case+0x10/0x10
[   30.772100]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   30.772649]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   30.773140]  ? __kthread_parkme+0x82/0x160
[   30.773481]  ? preempt_count_sub+0x50/0x80
[   30.773881]  ? __pfx_kunit_try_run_case+0x10/0x10
[   30.775353]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   30.776034]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   30.776696]  kthread+0x257/0x310
[   30.777337]  ? __pfx_kthread+0x10/0x10
[   30.777714]  ret_from_fork+0x41/0x80
[   30.778076]  ? __pfx_kthread+0x10/0x10
[   30.778641]  ret_from_fork_asm+0x1a/0x30
[   30.779537]  </TASK>
[   30.779746] 
[   30.779905] Allocated by task 273:
[   30.780826]  kasan_save_stack+0x3d/0x60
[   30.781645]  kasan_save_track+0x18/0x40
[   30.781985]  kasan_save_alloc_info+0x3b/0x50
[   30.782637]  __kasan_kmalloc+0xb7/0xc0
[   30.782956]  __kmalloc_cache_noprof+0x184/0x410
[   30.783648]  kasan_atomics+0x96/0x310
[   30.784062]  kunit_try_run_case+0x1b3/0x490
[   30.784587]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   30.785190]  kthread+0x257/0x310
[   30.785535]  ret_from_fork+0x41/0x80
[   30.785993]  ret_from_fork_asm+0x1a/0x30
[   30.786580] 
[   30.786772] The buggy address belongs to the object at ffff888102486200
[   30.786772]  which belongs to the cache kmalloc-64 of size 64
[   30.787763] The buggy address is located 0 bytes to the right of
[   30.787763]  allocated 48-byte region [ffff888102486200, ffff888102486230)
[   30.789137] 
[   30.789480] The buggy address belongs to the physical page:
[   30.790027] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102486
[   30.790751] flags: 0x200000000000000(node=0|zone=2)
[   30.791470] page_type: f5(slab)
[   30.791897] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   30.792778] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   30.793462] page dumped because: kasan: bad access detected
[   30.793963] 
[   30.794222] Memory state around the buggy address:
[   30.794718]  ffff888102486100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   30.795402]  ffff888102486180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   30.795826] >ffff888102486200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   30.796729]                                      ^
[   30.797352]  ffff888102486280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.798065]  ffff888102486300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.798832] ==================================================================
[   30.363206] ==================================================================
[   30.364765] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x16e8/0x5450
[   30.366642] Write of size 8 at addr ffff888102486230 by task kunit_try_catch/273
[   30.367585] 
[   30.367814] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241206 #1
[   30.368585] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.369073] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   30.369805] Call Trace:
[   30.370222]  <TASK>
[   30.370481]  dump_stack_lvl+0x73/0xb0
[   30.371057]  print_report+0xd1/0x640
[   30.371520]  ? __virt_addr_valid+0x1db/0x2d0
[   30.372012]  ? kasan_complete_mode_report_info+0x2a/0x200
[   30.372726]  kasan_report+0x102/0x140
[   30.373363]  ? kasan_atomics_helper+0x16e8/0x5450
[   30.373747]  ? kasan_atomics_helper+0x16e8/0x5450
[   30.374566]  kasan_check_range+0x10c/0x1c0
[   30.375089]  __kasan_check_write+0x18/0x20
[   30.375600]  kasan_atomics_helper+0x16e8/0x5450
[   30.376278]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   30.376693]  ? __kmalloc_cache_noprof+0x184/0x410
[   30.377472]  ? trace_hardirqs_on+0x37/0xe0
[   30.377902]  ? kasan_atomics+0x153/0x310
[   30.378450]  kasan_atomics+0x1dd/0x310
[   30.378832]  ? __pfx_kasan_atomics+0x10/0x10
[   30.379168]  ? __pfx_kasan_atomics+0x10/0x10
[   30.379826]  kunit_try_run_case+0x1b3/0x490
[   30.380584]  ? __pfx_kunit_try_run_case+0x10/0x10
[   30.381001]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   30.381596]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   30.382185]  ? __kthread_parkme+0x82/0x160
[   30.382589]  ? preempt_count_sub+0x50/0x80
[   30.382897]  ? __pfx_kunit_try_run_case+0x10/0x10
[   30.383798]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   30.384308]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   30.385024]  kthread+0x257/0x310
[   30.385320]  ? __pfx_kthread+0x10/0x10
[   30.385913]  ret_from_fork+0x41/0x80
[   30.386501]  ? __pfx_kthread+0x10/0x10
[   30.387110]  ret_from_fork_asm+0x1a/0x30
[   30.387429]  </TASK>
[   30.387626] 
[   30.387890] Allocated by task 273:
[   30.388462]  kasan_save_stack+0x3d/0x60
[   30.388849]  kasan_save_track+0x18/0x40
[   30.389154]  kasan_save_alloc_info+0x3b/0x50
[   30.389682]  __kasan_kmalloc+0xb7/0xc0
[   30.390305]  __kmalloc_cache_noprof+0x184/0x410
[   30.390855]  kasan_atomics+0x96/0x310
[   30.391437]  kunit_try_run_case+0x1b3/0x490
[   30.391970]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   30.392783]  kthread+0x257/0x310
[   30.393305]  ret_from_fork+0x41/0x80
[   30.393683]  ret_from_fork_asm+0x1a/0x30
[   30.394255] 
[   30.394465] The buggy address belongs to the object at ffff888102486200
[   30.394465]  which belongs to the cache kmalloc-64 of size 64
[   30.395255] The buggy address is located 0 bytes to the right of
[   30.395255]  allocated 48-byte region [ffff888102486200, ffff888102486230)
[   30.396430] 
[   30.396607] The buggy address belongs to the physical page:
[   30.397137] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102486
[   30.398085] flags: 0x200000000000000(node=0|zone=2)
[   30.398540] page_type: f5(slab)
[   30.398974] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   30.400616] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   30.401597] page dumped because: kasan: bad access detected
[   30.402578] 
[   30.402989] Memory state around the buggy address:
[   30.403961]  ffff888102486100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   30.405305]  ffff888102486180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   30.406431] >ffff888102486200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   30.406961]                                      ^
[   30.407263]  ffff888102486280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.408528]  ffff888102486300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.409619] ==================================================================
[   29.732139] ==================================================================
[   29.733158] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1149/0x5450
[   29.733605] Write of size 4 at addr ffff888102486230 by task kunit_try_catch/273
[   29.734651] 
[   29.734878] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241206 #1
[   29.736607] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.737024] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   29.738153] Call Trace:
[   29.738527]  <TASK>
[   29.738799]  dump_stack_lvl+0x73/0xb0
[   29.739903]  print_report+0xd1/0x640
[   29.740534]  ? __virt_addr_valid+0x1db/0x2d0
[   29.741191]  ? kasan_complete_mode_report_info+0x2a/0x200
[   29.741702]  kasan_report+0x102/0x140
[   29.742454]  ? kasan_atomics_helper+0x1149/0x5450
[   29.743243]  ? kasan_atomics_helper+0x1149/0x5450
[   29.743705]  kasan_check_range+0x10c/0x1c0
[   29.744388]  __kasan_check_write+0x18/0x20
[   29.744702]  kasan_atomics_helper+0x1149/0x5450
[   29.745227]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   29.745711]  ? __kmalloc_cache_noprof+0x184/0x410
[   29.746731]  ? trace_hardirqs_on+0x37/0xe0
[   29.747637]  ? kasan_atomics+0x153/0x310
[   29.748385]  kasan_atomics+0x1dd/0x310
[   29.748682]  ? __pfx_kasan_atomics+0x10/0x10
[   29.749157]  ? __pfx_kasan_atomics+0x10/0x10
[   29.750445]  kunit_try_run_case+0x1b3/0x490
[   29.750863]  ? __pfx_kunit_try_run_case+0x10/0x10
[   29.751453]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   29.752009]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   29.752898]  ? __kthread_parkme+0x82/0x160
[   29.753682]  ? preempt_count_sub+0x50/0x80
[   29.754131]  ? __pfx_kunit_try_run_case+0x10/0x10
[   29.754857]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   29.755913]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   29.756568]  kthread+0x257/0x310
[   29.757327]  ? __pfx_kthread+0x10/0x10
[   29.757863]  ret_from_fork+0x41/0x80
[   29.758641]  ? __pfx_kthread+0x10/0x10
[   29.759070]  ret_from_fork_asm+0x1a/0x30
[   29.759847]  </TASK>
[   29.760175] 
[   29.760796] Allocated by task 273:
[   29.761189]  kasan_save_stack+0x3d/0x60
[   29.761917]  kasan_save_track+0x18/0x40
[   29.762426]  kasan_save_alloc_info+0x3b/0x50
[   29.762870]  __kasan_kmalloc+0xb7/0xc0
[   29.763729]  __kmalloc_cache_noprof+0x184/0x410
[   29.764194]  kasan_atomics+0x96/0x310
[   29.764788]  kunit_try_run_case+0x1b3/0x490
[   29.765565]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   29.766752]  kthread+0x257/0x310
[   29.767126]  ret_from_fork+0x41/0x80
[   29.767646]  ret_from_fork_asm+0x1a/0x30
[   29.768395] 
[   29.768609] The buggy address belongs to the object at ffff888102486200
[   29.768609]  which belongs to the cache kmalloc-64 of size 64
[   29.769987] The buggy address is located 0 bytes to the right of
[   29.769987]  allocated 48-byte region [ffff888102486200, ffff888102486230)
[   29.771414] 
[   29.771612] The buggy address belongs to the physical page:
[   29.772404] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102486
[   29.773660] flags: 0x200000000000000(node=0|zone=2)
[   29.774135] page_type: f5(slab)
[   29.774913] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   29.776003] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   29.777094] page dumped because: kasan: bad access detected
[   29.777653] 
[   29.778322] Memory state around the buggy address:
[   29.779028]  ffff888102486100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.779732]  ffff888102486180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.780893] >ffff888102486200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   29.781497]                                      ^
[   29.782199]  ffff888102486280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.783141]  ffff888102486300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.783704] ==================================================================
[   31.377052] ==================================================================
[   31.378524] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x218b/0x5450
[   31.379887] Write of size 8 at addr ffff888102486230 by task kunit_try_catch/273
[   31.380359] 
[   31.380511] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241206 #1
[   31.380908] Tainted: [B]=BAD_PAGE, [N]=TEST
[   31.381277] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   31.382652] Call Trace:
[   31.383176]  <TASK>
[   31.383765]  dump_stack_lvl+0x73/0xb0
[   31.384562]  print_report+0xd1/0x640
[   31.385315]  ? __virt_addr_valid+0x1db/0x2d0
[   31.385698]  ? kasan_complete_mode_report_info+0x2a/0x200
[   31.386237]  kasan_report+0x102/0x140
[   31.386872]  ? kasan_atomics_helper+0x218b/0x5450
[   31.387689]  ? kasan_atomics_helper+0x218b/0x5450
[   31.388360]  kasan_check_range+0x10c/0x1c0
[   31.389007]  __kasan_check_write+0x18/0x20
[   31.389539]  kasan_atomics_helper+0x218b/0x5450
[   31.390085]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   31.391029]  ? __kmalloc_cache_noprof+0x184/0x410
[   31.391977]  ? trace_hardirqs_on+0x37/0xe0
[   31.392546]  ? kasan_atomics+0x153/0x310
[   31.393010]  kasan_atomics+0x1dd/0x310
[   31.393554]  ? __pfx_kasan_atomics+0x10/0x10
[   31.394051]  ? __pfx_kasan_atomics+0x10/0x10
[   31.395071]  kunit_try_run_case+0x1b3/0x490
[   31.395683]  ? __pfx_kunit_try_run_case+0x10/0x10
[   31.396449]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   31.397406]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   31.398272]  ? __kthread_parkme+0x82/0x160
[   31.398655]  ? preempt_count_sub+0x50/0x80
[   31.399121]  ? __pfx_kunit_try_run_case+0x10/0x10
[   31.399679]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   31.400863]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   31.401631]  kthread+0x257/0x310
[   31.402140]  ? __pfx_kthread+0x10/0x10
[   31.403136]  ret_from_fork+0x41/0x80
[   31.403491]  ? __pfx_kthread+0x10/0x10
[   31.404144]  ret_from_fork_asm+0x1a/0x30
[   31.404839]  </TASK>
[   31.405132] 
[   31.405333] Allocated by task 273:
[   31.405714]  kasan_save_stack+0x3d/0x60
[   31.407304]  kasan_save_track+0x18/0x40
[   31.407691]  kasan_save_alloc_info+0x3b/0x50
[   31.408162]  __kasan_kmalloc+0xb7/0xc0
[   31.408855]  __kmalloc_cache_noprof+0x184/0x410
[   31.409260]  kasan_atomics+0x96/0x310
[   31.409671]  kunit_try_run_case+0x1b3/0x490
[   31.410534]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   31.411201]  kthread+0x257/0x310
[   31.411674]  ret_from_fork+0x41/0x80
[   31.412127]  ret_from_fork_asm+0x1a/0x30
[   31.412757] 
[   31.412970] The buggy address belongs to the object at ffff888102486200
[   31.412970]  which belongs to the cache kmalloc-64 of size 64
[   31.414192] The buggy address is located 0 bytes to the right of
[   31.414192]  allocated 48-byte region [ffff888102486200, ffff888102486230)
[   31.416334] 
[   31.416738] The buggy address belongs to the physical page:
[   31.417487] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102486
[   31.418683] flags: 0x200000000000000(node=0|zone=2)
[   31.419425] page_type: f5(slab)
[   31.420004] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   31.420857] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   31.421732] page dumped because: kasan: bad access detected
[   31.422705] 
[   31.422922] Memory state around the buggy address:
[   31.423648]  ffff888102486100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   31.424504]  ffff888102486180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   31.425206] >ffff888102486200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   31.425821]                                      ^
[   31.426497]  ffff888102486280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.427130]  ffff888102486300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.427649] ==================================================================
[   31.518486] ==================================================================
[   31.519393] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x5117/0x5450
[   31.520161] Read of size 8 at addr ffff888102486230 by task kunit_try_catch/273
[   31.520906] 
[   31.521509] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241206 #1
[   31.523313] Tainted: [B]=BAD_PAGE, [N]=TEST
[   31.523788] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   31.525028] Call Trace:
[   31.525312]  <TASK>
[   31.525740]  dump_stack_lvl+0x73/0xb0
[   31.526296]  print_report+0xd1/0x640
[   31.526839]  ? __virt_addr_valid+0x1db/0x2d0
[   31.527347]  ? kasan_complete_mode_report_info+0x2a/0x200
[   31.527895]  kasan_report+0x102/0x140
[   31.528430]  ? kasan_atomics_helper+0x5117/0x5450
[   31.528981]  ? kasan_atomics_helper+0x5117/0x5450
[   31.529502]  __asan_report_load8_noabort+0x18/0x20
[   31.530031]  kasan_atomics_helper+0x5117/0x5450
[   31.530606]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   31.531359]  ? __kmalloc_cache_noprof+0x184/0x410
[   31.532001]  ? trace_hardirqs_on+0x37/0xe0
[   31.532462]  ? kasan_atomics+0x153/0x310
[   31.532885]  kasan_atomics+0x1dd/0x310
[   31.533313]  ? __pfx_kasan_atomics+0x10/0x10
[   31.533785]  ? __pfx_kasan_atomics+0x10/0x10
[   31.535228]  kunit_try_run_case+0x1b3/0x490
[   31.535867]  ? __pfx_kunit_try_run_case+0x10/0x10
[   31.536389]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   31.536847]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   31.537541]  ? __kthread_parkme+0x82/0x160
[   31.537970]  ? preempt_count_sub+0x50/0x80
[   31.538525]  ? __pfx_kunit_try_run_case+0x10/0x10
[   31.539046]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   31.539709]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   31.540393]  kthread+0x257/0x310
[   31.540795]  ? __pfx_kthread+0x10/0x10
[   31.541324]  ret_from_fork+0x41/0x80
[   31.541670]  ? __pfx_kthread+0x10/0x10
[   31.542184]  ret_from_fork_asm+0x1a/0x30
[   31.542651]  </TASK>
[   31.543051] 
[   31.543297] Allocated by task 273:
[   31.543723]  kasan_save_stack+0x3d/0x60
[   31.544071]  kasan_save_track+0x18/0x40
[   31.544653]  kasan_save_alloc_info+0x3b/0x50
[   31.545120]  __kasan_kmalloc+0xb7/0xc0
[   31.545703]  __kmalloc_cache_noprof+0x184/0x410
[   31.546077]  kasan_atomics+0x96/0x310
[   31.546663]  kunit_try_run_case+0x1b3/0x490
[   31.547249]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   31.547805]  kthread+0x257/0x310
[   31.548258]  ret_from_fork+0x41/0x80
[   31.548698]  ret_from_fork_asm+0x1a/0x30
[   31.549277] 
[   31.549483] The buggy address belongs to the object at ffff888102486200
[   31.549483]  which belongs to the cache kmalloc-64 of size 64
[   31.550619] The buggy address is located 0 bytes to the right of
[   31.550619]  allocated 48-byte region [ffff888102486200, ffff888102486230)
[   31.551688] 
[   31.552013] The buggy address belongs to the physical page:
[   31.552586] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102486
[   31.553567] flags: 0x200000000000000(node=0|zone=2)
[   31.554058] page_type: f5(slab)
[   31.554562] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   31.555333] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   31.556067] page dumped because: kasan: bad access detected
[   31.556708] 
[   31.556908] Memory state around the buggy address:
[   31.557483]  ffff888102486100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   31.558186]  ffff888102486180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   31.558883] >ffff888102486200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   31.559718]                                      ^
[   31.560262]  ffff888102486280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.560916]  ffff888102486300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.561613] ==================================================================
[   29.007002] ==================================================================
[   29.007972] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x8fa/0x5450
[   29.008724] Write of size 4 at addr ffff888102486230 by task kunit_try_catch/273
[   29.009334] 
[   29.009679] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241206 #1
[   29.010568] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.011253] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   29.012014] Call Trace:
[   29.012548]  <TASK>
[   29.012926]  dump_stack_lvl+0x73/0xb0
[   29.013504]  print_report+0xd1/0x640
[   29.014174]  ? __virt_addr_valid+0x1db/0x2d0
[   29.014493]  ? kasan_complete_mode_report_info+0x2a/0x200
[   29.015199]  kasan_report+0x102/0x140
[   29.015520]  ? kasan_atomics_helper+0x8fa/0x5450
[   29.016108]  ? kasan_atomics_helper+0x8fa/0x5450
[   29.016654]  kasan_check_range+0x10c/0x1c0
[   29.017243]  __kasan_check_write+0x18/0x20
[   29.017701]  kasan_atomics_helper+0x8fa/0x5450
[   29.018385]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   29.018777]  ? __kmalloc_cache_noprof+0x184/0x410
[   29.019268]  ? trace_hardirqs_on+0x37/0xe0
[   29.019681]  ? kasan_atomics+0x153/0x310
[   29.020423]  kasan_atomics+0x1dd/0x310
[   29.021330]  ? __pfx_kasan_atomics+0x10/0x10
[   29.022131]  ? __pfx_kasan_atomics+0x10/0x10
[   29.022588]  kunit_try_run_case+0x1b3/0x490
[   29.023145]  ? __pfx_kunit_try_run_case+0x10/0x10
[   29.023634]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   29.024214]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   29.024833]  ? __kthread_parkme+0x82/0x160
[   29.025356]  ? preempt_count_sub+0x50/0x80
[   29.025856]  ? __pfx_kunit_try_run_case+0x10/0x10
[   29.026514]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   29.027025]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   29.027660]  kthread+0x257/0x310
[   29.028141]  ? __pfx_kthread+0x10/0x10
[   29.028553]  ret_from_fork+0x41/0x80
[   29.029227]  ? __pfx_kthread+0x10/0x10
[   29.029619]  ret_from_fork_asm+0x1a/0x30
[   29.030177]  </TASK>
[   29.030640] 
[   29.030906] Allocated by task 273:
[   29.031413]  kasan_save_stack+0x3d/0x60
[   29.031973]  kasan_save_track+0x18/0x40
[   29.032461]  kasan_save_alloc_info+0x3b/0x50
[   29.032873]  __kasan_kmalloc+0xb7/0xc0
[   29.033405]  __kmalloc_cache_noprof+0x184/0x410
[   29.034168]  kasan_atomics+0x96/0x310
[   29.034533]  kunit_try_run_case+0x1b3/0x490
[   29.035147]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   29.035690]  kthread+0x257/0x310
[   29.036149]  ret_from_fork+0x41/0x80
[   29.036715]  ret_from_fork_asm+0x1a/0x30
[   29.037040] 
[   29.037206] The buggy address belongs to the object at ffff888102486200
[   29.037206]  which belongs to the cache kmalloc-64 of size 64
[   29.038529] The buggy address is located 0 bytes to the right of
[   29.038529]  allocated 48-byte region [ffff888102486200, ffff888102486230)
[   29.040103] 
[   29.040274] The buggy address belongs to the physical page:
[   29.040610] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102486
[   29.041817] flags: 0x200000000000000(node=0|zone=2)
[   29.042469] page_type: f5(slab)
[   29.042853] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   29.043738] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   29.044524] page dumped because: kasan: bad access detected
[   29.045158] 
[   29.045355] Memory state around the buggy address:
[   29.045671]  ffff888102486100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.046229]  ffff888102486180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.047174] >ffff888102486200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   29.048287]                                      ^
[   29.048635]  ffff888102486280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.049070]  ffff888102486300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.049896] ==================================================================
[   29.677910] ==================================================================
[   29.678692] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a1e/0x5450
[   29.679538] Read of size 4 at addr ffff888102486230 by task kunit_try_catch/273
[   29.680862] 
[   29.681072] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241206 #1
[   29.682054] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.683380] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   29.684086] Call Trace:
[   29.684323]  <TASK>
[   29.684633]  dump_stack_lvl+0x73/0xb0
[   29.685539]  print_report+0xd1/0x640
[   29.685853]  ? __virt_addr_valid+0x1db/0x2d0
[   29.686762]  ? kasan_complete_mode_report_info+0x2a/0x200
[   29.687650]  kasan_report+0x102/0x140
[   29.688084]  ? kasan_atomics_helper+0x4a1e/0x5450
[   29.688590]  ? kasan_atomics_helper+0x4a1e/0x5450
[   29.689845]  __asan_report_load4_noabort+0x18/0x20
[   29.690174]  kasan_atomics_helper+0x4a1e/0x5450
[   29.690984]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   29.691437]  ? __kmalloc_cache_noprof+0x184/0x410
[   29.692286]  ? trace_hardirqs_on+0x37/0xe0
[   29.692729]  ? kasan_atomics+0x153/0x310
[   29.693162]  kasan_atomics+0x1dd/0x310
[   29.693569]  ? __pfx_kasan_atomics+0x10/0x10
[   29.695074]  ? __pfx_kasan_atomics+0x10/0x10
[   29.695642]  kunit_try_run_case+0x1b3/0x490
[   29.696218]  ? __pfx_kunit_try_run_case+0x10/0x10
[   29.696689]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   29.697288]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   29.697734]  ? __kthread_parkme+0x82/0x160
[   29.698376]  ? preempt_count_sub+0x50/0x80
[   29.698855]  ? __pfx_kunit_try_run_case+0x10/0x10
[   29.699772]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   29.700710]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   29.701387]  kthread+0x257/0x310
[   29.701757]  ? __pfx_kthread+0x10/0x10
[   29.703047]  ret_from_fork+0x41/0x80
[   29.703637]  ? __pfx_kthread+0x10/0x10
[   29.704069]  ret_from_fork_asm+0x1a/0x30
[   29.704806]  </TASK>
[   29.705336] 
[   29.705596] Allocated by task 273:
[   29.706344]  kasan_save_stack+0x3d/0x60
[   29.706720]  kasan_save_track+0x18/0x40
[   29.707089]  kasan_save_alloc_info+0x3b/0x50
[   29.707460]  __kasan_kmalloc+0xb7/0xc0
[   29.707856]  __kmalloc_cache_noprof+0x184/0x410
[   29.708840]  kasan_atomics+0x96/0x310
[   29.709386]  kunit_try_run_case+0x1b3/0x490
[   29.709822]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   29.710510]  kthread+0x257/0x310
[   29.711387]  ret_from_fork+0x41/0x80
[   29.711886]  ret_from_fork_asm+0x1a/0x30
[   29.712750] 
[   29.713165] The buggy address belongs to the object at ffff888102486200
[   29.713165]  which belongs to the cache kmalloc-64 of size 64
[   29.714966] The buggy address is located 0 bytes to the right of
[   29.714966]  allocated 48-byte region [ffff888102486200, ffff888102486230)
[   29.716435] 
[   29.716805] The buggy address belongs to the physical page:
[   29.717375] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102486
[   29.718494] flags: 0x200000000000000(node=0|zone=2)
[   29.719019] page_type: f5(slab)
[   29.719539] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   29.720425] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   29.721701] page dumped because: kasan: bad access detected
[   29.723108] 
[   29.723763] Memory state around the buggy address:
[   29.725413]  ffff888102486100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.726648]  ffff888102486180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.727269] >ffff888102486200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   29.727851]                                      ^
[   29.728853]  ffff888102486280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.729805]  ffff888102486300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.731107] ==================================================================
[   29.786566] ==================================================================
[   29.787967] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a04/0x5450
[   29.788906] Read of size 4 at addr ffff888102486230 by task kunit_try_catch/273
[   29.790076] 
[   29.790315] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241206 #1
[   29.791163] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.791570] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   29.793068] Call Trace:
[   29.793480]  <TASK>
[   29.794094]  dump_stack_lvl+0x73/0xb0
[   29.794715]  print_report+0xd1/0x640
[   29.795414]  ? __virt_addr_valid+0x1db/0x2d0
[   29.796030]  ? kasan_complete_mode_report_info+0x2a/0x200
[   29.796822]  kasan_report+0x102/0x140
[   29.797564]  ? kasan_atomics_helper+0x4a04/0x5450
[   29.798328]  ? kasan_atomics_helper+0x4a04/0x5450
[   29.799027]  __asan_report_load4_noabort+0x18/0x20
[   29.799709]  kasan_atomics_helper+0x4a04/0x5450
[   29.800478]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   29.801197]  ? __kmalloc_cache_noprof+0x184/0x410
[   29.801864]  ? trace_hardirqs_on+0x37/0xe0
[   29.802480]  ? kasan_atomics+0x153/0x310
[   29.802889]  kasan_atomics+0x1dd/0x310
[   29.803746]  ? __pfx_kasan_atomics+0x10/0x10
[   29.804248]  ? __pfx_kasan_atomics+0x10/0x10
[   29.805211]  kunit_try_run_case+0x1b3/0x490
[   29.805970]  ? __pfx_kunit_try_run_case+0x10/0x10
[   29.806717]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   29.807422]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   29.807887]  ? __kthread_parkme+0x82/0x160
[   29.808347]  ? preempt_count_sub+0x50/0x80
[   29.808788]  ? __pfx_kunit_try_run_case+0x10/0x10
[   29.809925]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   29.810901]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   29.811701]  kthread+0x257/0x310
[   29.812300]  ? __pfx_kthread+0x10/0x10
[   29.812898]  ret_from_fork+0x41/0x80
[   29.813399]  ? __pfx_kthread+0x10/0x10
[   29.814122]  ret_from_fork_asm+0x1a/0x30
[   29.814861]  </TASK>
[   29.815170] 
[   29.815399] Allocated by task 273:
[   29.816283]  kasan_save_stack+0x3d/0x60
[   29.816756]  kasan_save_track+0x18/0x40
[   29.817188]  kasan_save_alloc_info+0x3b/0x50
[   29.817618]  __kasan_kmalloc+0xb7/0xc0
[   29.818170]  __kmalloc_cache_noprof+0x184/0x410
[   29.818492]  kasan_atomics+0x96/0x310
[   29.819017]  kunit_try_run_case+0x1b3/0x490
[   29.819744]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   29.820331]  kthread+0x257/0x310
[   29.820743]  ret_from_fork+0x41/0x80
[   29.821465]  ret_from_fork_asm+0x1a/0x30
[   29.821926] 
[   29.822335] The buggy address belongs to the object at ffff888102486200
[   29.822335]  which belongs to the cache kmalloc-64 of size 64
[   29.823674] The buggy address is located 0 bytes to the right of
[   29.823674]  allocated 48-byte region [ffff888102486200, ffff888102486230)
[   29.825006] 
[   29.825272] The buggy address belongs to the physical page:
[   29.825803] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102486
[   29.826728] flags: 0x200000000000000(node=0|zone=2)
[   29.827337] page_type: f5(slab)
[   29.827856] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   29.828672] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   29.829419] page dumped because: kasan: bad access detected
[   29.830014] 
[   29.830336] Memory state around the buggy address:
[   29.830793]  ffff888102486100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.831516]  ffff888102486180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.832194] >ffff888102486200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   29.832844]                                      ^
[   29.833490]  ffff888102486280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.834340]  ffff888102486300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.835017] ==================================================================
[   28.374727] ==================================================================
[   28.375177] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4ba4/0x5450
[   28.375620] Write of size 4 at addr ffff888102486230 by task kunit_try_catch/273
[   28.376321] 
[   28.376660] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241206 #1
[   28.378238] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.379131] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   28.380441] Call Trace:
[   28.381062]  <TASK>
[   28.382154]  dump_stack_lvl+0x73/0xb0
[   28.382767]  print_report+0xd1/0x640
[   28.383420]  ? __virt_addr_valid+0x1db/0x2d0
[   28.384359]  ? kasan_complete_mode_report_info+0x2a/0x200
[   28.385093]  kasan_report+0x102/0x140
[   28.386287]  ? kasan_atomics_helper+0x4ba4/0x5450
[   28.386753]  ? kasan_atomics_helper+0x4ba4/0x5450
[   28.388026]  __asan_report_store4_noabort+0x1b/0x30
[   28.388693]  kasan_atomics_helper+0x4ba4/0x5450
[   28.389185]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   28.390254]  ? __kmalloc_cache_noprof+0x184/0x410
[   28.391183]  ? trace_hardirqs_on+0x37/0xe0
[   28.392076]  ? kasan_atomics+0x153/0x310
[   28.392382]  kasan_atomics+0x1dd/0x310
[   28.393247]  ? __pfx_kasan_atomics+0x10/0x10
[   28.394163]  ? __pfx_kasan_atomics+0x10/0x10
[   28.394659]  kunit_try_run_case+0x1b3/0x490
[   28.395119]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.395597]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   28.397080]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   28.398253]  ? __kthread_parkme+0x82/0x160
[   28.398774]  ? preempt_count_sub+0x50/0x80
[   28.399281]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.400381]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   28.401021]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.402715]  kthread+0x257/0x310
[   28.403023]  ? __pfx_kthread+0x10/0x10
[   28.403488]  ret_from_fork+0x41/0x80
[   28.403849]  ? __pfx_kthread+0x10/0x10
[   28.404449]  ret_from_fork_asm+0x1a/0x30
[   28.404794]  </TASK>
[   28.405309] 
[   28.406262] Allocated by task 273:
[   28.406593]  kasan_save_stack+0x3d/0x60
[   28.407033]  kasan_save_track+0x18/0x40
[   28.407813]  kasan_save_alloc_info+0x3b/0x50
[   28.408385]  __kasan_kmalloc+0xb7/0xc0
[   28.408721]  __kmalloc_cache_noprof+0x184/0x410
[   28.409311]  kasan_atomics+0x96/0x310
[   28.409921]  kunit_try_run_case+0x1b3/0x490
[   28.410712]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.411107]  kthread+0x257/0x310
[   28.411687]  ret_from_fork+0x41/0x80
[   28.412478]  ret_from_fork_asm+0x1a/0x30
[   28.413174] 
[   28.413438] The buggy address belongs to the object at ffff888102486200
[   28.413438]  which belongs to the cache kmalloc-64 of size 64
[   28.414761] The buggy address is located 0 bytes to the right of
[   28.414761]  allocated 48-byte region [ffff888102486200, ffff888102486230)
[   28.416166] 
[   28.416926] The buggy address belongs to the physical page:
[   28.417576] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102486
[   28.418471] flags: 0x200000000000000(node=0|zone=2)
[   28.419003] page_type: f5(slab)
[   28.419399] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   28.420351] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   28.421200] page dumped because: kasan: bad access detected
[   28.422285] 
[   28.422567] Memory state around the buggy address:
[   28.423022]  ffff888102486100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.424015]  ffff888102486180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.424743] >ffff888102486200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   28.426209]                                      ^
[   28.426791]  ffff888102486280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.427810]  ffff888102486300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.428958] ==================================================================
[   31.321999] ==================================================================
[   31.324256] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4fb4/0x5450
[   31.325557] Read of size 8 at addr ffff888102486230 by task kunit_try_catch/273
[   31.327195] 
[   31.327498] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241206 #1
[   31.328370] Tainted: [B]=BAD_PAGE, [N]=TEST
[   31.328749] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   31.330498] Call Trace:
[   31.330832]  <TASK>
[   31.331630]  dump_stack_lvl+0x73/0xb0
[   31.332115]  print_report+0xd1/0x640
[   31.332810]  ? __virt_addr_valid+0x1db/0x2d0
[   31.333183]  ? kasan_complete_mode_report_info+0x2a/0x200
[   31.334112]  kasan_report+0x102/0x140
[   31.334514]  ? kasan_atomics_helper+0x4fb4/0x5450
[   31.335423]  ? kasan_atomics_helper+0x4fb4/0x5450
[   31.335972]  __asan_report_load8_noabort+0x18/0x20
[   31.336783]  kasan_atomics_helper+0x4fb4/0x5450
[   31.337807]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   31.338238]  ? __kmalloc_cache_noprof+0x184/0x410
[   31.338463]  ? trace_hardirqs_on+0x37/0xe0
[   31.338660]  ? kasan_atomics+0x153/0x310
[   31.338850]  kasan_atomics+0x1dd/0x310
[   31.339120]  ? __pfx_kasan_atomics+0x10/0x10
[   31.339752]  ? __pfx_kasan_atomics+0x10/0x10
[   31.340539]  kunit_try_run_case+0x1b3/0x490
[   31.341060]  ? __pfx_kunit_try_run_case+0x10/0x10
[   31.341655]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   31.343469]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   31.343979]  ? __kthread_parkme+0x82/0x160
[   31.344604]  ? preempt_count_sub+0x50/0x80
[   31.345047]  ? __pfx_kunit_try_run_case+0x10/0x10
[   31.345719]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   31.346637]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   31.347671]  kthread+0x257/0x310
[   31.348069]  ? __pfx_kthread+0x10/0x10
[   31.348493]  ret_from_fork+0x41/0x80
[   31.348886]  ? __pfx_kthread+0x10/0x10
[   31.349199]  ret_from_fork_asm+0x1a/0x30
[   31.349532]  </TASK>
[   31.349887] 
[   31.350165] Allocated by task 273:
[   31.351007]  kasan_save_stack+0x3d/0x60
[   31.351843]  kasan_save_track+0x18/0x40
[   31.352495]  kasan_save_alloc_info+0x3b/0x50
[   31.353491]  __kasan_kmalloc+0xb7/0xc0
[   31.353952]  __kmalloc_cache_noprof+0x184/0x410
[   31.354523]  kasan_atomics+0x96/0x310
[   31.355393]  kunit_try_run_case+0x1b3/0x490
[   31.356055]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   31.356966]  kthread+0x257/0x310
[   31.357672]  ret_from_fork+0x41/0x80
[   31.358360]  ret_from_fork_asm+0x1a/0x30
[   31.359064] 
[   31.359704] The buggy address belongs to the object at ffff888102486200
[   31.359704]  which belongs to the cache kmalloc-64 of size 64
[   31.361202] The buggy address is located 0 bytes to the right of
[   31.361202]  allocated 48-byte region [ffff888102486200, ffff888102486230)
[   31.362175] 
[   31.362452] The buggy address belongs to the physical page:
[   31.363562] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102486
[   31.364582] flags: 0x200000000000000(node=0|zone=2)
[   31.365464] page_type: f5(slab)
[   31.365850] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   31.367474] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   31.368445] page dumped because: kasan: bad access detected
[   31.369252] 
[   31.369809] Memory state around the buggy address:
[   31.370434]  ffff888102486100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   31.370979]  ffff888102486180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   31.371724] >ffff888102486200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   31.372423]                                      ^
[   31.372898]  ffff888102486280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.374229]  ffff888102486300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.374869] ==================================================================
[   30.091552] ==================================================================
[   30.092437] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4eb0/0x5450
[   30.092947] Read of size 8 at addr ffff888102486230 by task kunit_try_catch/273
[   30.094061] 
[   30.094229] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241206 #1
[   30.095294] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.095572] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   30.096637] Call Trace:
[   30.097012]  <TASK>
[   30.097360]  dump_stack_lvl+0x73/0xb0
[   30.097697]  print_report+0xd1/0x640
[   30.098060]  ? __virt_addr_valid+0x1db/0x2d0
[   30.098628]  ? kasan_complete_mode_report_info+0x2a/0x200
[   30.099393]  kasan_report+0x102/0x140
[   30.099703]  ? kasan_atomics_helper+0x4eb0/0x5450
[   30.100068]  ? kasan_atomics_helper+0x4eb0/0x5450
[   30.100633]  __asan_report_load8_noabort+0x18/0x20
[   30.101320]  kasan_atomics_helper+0x4eb0/0x5450
[   30.102019]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   30.102500]  ? __kmalloc_cache_noprof+0x184/0x410
[   30.103067]  ? trace_hardirqs_on+0x37/0xe0
[   30.103488]  ? kasan_atomics+0x153/0x310
[   30.103799]  kasan_atomics+0x1dd/0x310
[   30.104246]  ? __pfx_kasan_atomics+0x10/0x10
[   30.104913]  ? __pfx_kasan_atomics+0x10/0x10
[   30.105622]  kunit_try_run_case+0x1b3/0x490
[   30.106059]  ? __pfx_kunit_try_run_case+0x10/0x10
[   30.106497]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   30.106835]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   30.107641]  ? __kthread_parkme+0x82/0x160
[   30.108134]  ? preempt_count_sub+0x50/0x80
[   30.108602]  ? __pfx_kunit_try_run_case+0x10/0x10
[   30.108953]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   30.109350]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   30.110073]  kthread+0x257/0x310
[   30.110775]  ? __pfx_kthread+0x10/0x10
[   30.111253]  ret_from_fork+0x41/0x80
[   30.111519]  ? __pfx_kthread+0x10/0x10
[   30.112354]  ret_from_fork_asm+0x1a/0x30
[   30.112818]  </TASK>
[   30.113040] 
[   30.113200] Allocated by task 273:
[   30.113457]  kasan_save_stack+0x3d/0x60
[   30.114016]  kasan_save_track+0x18/0x40
[   30.114537]  kasan_save_alloc_info+0x3b/0x50
[   30.115419]  __kasan_kmalloc+0xb7/0xc0
[   30.115831]  __kmalloc_cache_noprof+0x184/0x410
[   30.116170]  kasan_atomics+0x96/0x310
[   30.116718]  kunit_try_run_case+0x1b3/0x490
[   30.117531]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   30.117965]  kthread+0x257/0x310
[   30.118554]  ret_from_fork+0x41/0x80
[   30.118857]  ret_from_fork_asm+0x1a/0x30
[   30.119174] 
[   30.119336] The buggy address belongs to the object at ffff888102486200
[   30.119336]  which belongs to the cache kmalloc-64 of size 64
[   30.120650] The buggy address is located 0 bytes to the right of
[   30.120650]  allocated 48-byte region [ffff888102486200, ffff888102486230)
[   30.122027] 
[   30.122429] The buggy address belongs to the physical page:
[   30.122844] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102486
[   30.123328] flags: 0x200000000000000(node=0|zone=2)
[   30.123988] page_type: f5(slab)
[   30.124624] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   30.125462] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   30.126135] page dumped because: kasan: bad access detected
[   30.126540] 
[   30.126700] Memory state around the buggy address:
[   30.127215]  ffff888102486100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   30.128333]  ffff888102486180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   30.128777] >ffff888102486200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   30.129480]                                      ^
[   30.129978]  ffff888102486280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.130845]  ffff888102486300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.131960] ==================================================================
[   29.434643] ==================================================================
[   29.437035] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xe79/0x5450
[   29.437979] Write of size 4 at addr ffff888102486230 by task kunit_try_catch/273
[   29.438647] 
[   29.438978] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241206 #1
[   29.439860] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.440483] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   29.441426] Call Trace:
[   29.441873]  <TASK>
[   29.442162]  dump_stack_lvl+0x73/0xb0
[   29.442751]  print_report+0xd1/0x640
[   29.443309]  ? __virt_addr_valid+0x1db/0x2d0
[   29.443874]  ? kasan_complete_mode_report_info+0x2a/0x200
[   29.444397]  kasan_report+0x102/0x140
[   29.445505]  ? kasan_atomics_helper+0xe79/0x5450
[   29.446091]  ? kasan_atomics_helper+0xe79/0x5450
[   29.447645]  kasan_check_range+0x10c/0x1c0
[   29.448132]  __kasan_check_write+0x18/0x20
[   29.448581]  kasan_atomics_helper+0xe79/0x5450
[   29.449857]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   29.450626]  ? __kmalloc_cache_noprof+0x184/0x410
[   29.451089]  ? trace_hardirqs_on+0x37/0xe0
[   29.451701]  ? kasan_atomics+0x153/0x310
[   29.452085]  kasan_atomics+0x1dd/0x310
[   29.452558]  ? __pfx_kasan_atomics+0x10/0x10
[   29.453033]  ? __pfx_kasan_atomics+0x10/0x10
[   29.453717]  kunit_try_run_case+0x1b3/0x490
[   29.454203]  ? __pfx_kunit_try_run_case+0x10/0x10
[   29.454825]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   29.455486]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   29.456123]  ? __kthread_parkme+0x82/0x160
[   29.456653]  ? preempt_count_sub+0x50/0x80
[   29.457134]  ? __pfx_kunit_try_run_case+0x10/0x10
[   29.457682]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   29.458108]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   29.458780]  kthread+0x257/0x310
[   29.459312]  ? __pfx_kthread+0x10/0x10
[   29.459678]  ret_from_fork+0x41/0x80
[   29.459997]  ? __pfx_kthread+0x10/0x10
[   29.460466]  ret_from_fork_asm+0x1a/0x30
[   29.461103]  </TASK>
[   29.461603] 
[   29.461887] Allocated by task 273:
[   29.462358]  kasan_save_stack+0x3d/0x60
[   29.462683]  kasan_save_track+0x18/0x40
[   29.463296]  kasan_save_alloc_info+0x3b/0x50
[   29.463780]  __kasan_kmalloc+0xb7/0xc0
[   29.464090]  __kmalloc_cache_noprof+0x184/0x410
[   29.464404]  kasan_atomics+0x96/0x310
[   29.464957]  kunit_try_run_case+0x1b3/0x490
[   29.465764]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   29.466496]  kthread+0x257/0x310
[   29.466755]  ret_from_fork+0x41/0x80
[   29.467053]  ret_from_fork_asm+0x1a/0x30
[   29.467520] 
[   29.467799] The buggy address belongs to the object at ffff888102486200
[   29.467799]  which belongs to the cache kmalloc-64 of size 64
[   29.469656] The buggy address is located 0 bytes to the right of
[   29.469656]  allocated 48-byte region [ffff888102486200, ffff888102486230)
[   29.470836] 
[   29.471211] The buggy address belongs to the physical page:
[   29.471623] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102486
[   29.472426] flags: 0x200000000000000(node=0|zone=2)
[   29.472775] page_type: f5(slab)
[   29.473068] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   29.473928] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   29.474991] page dumped because: kasan: bad access detected
[   29.475546] 
[   29.475788] Memory state around the buggy address:
[   29.476893]  ffff888102486100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.478130]  ffff888102486180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.478836] >ffff888102486200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   29.480279]                                      ^
[   29.480849]  ffff888102486280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.481692]  ffff888102486300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.482394] ==================================================================
[   31.473268] ==================================================================
[   31.473810] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x224d/0x5450
[   31.474907] Write of size 8 at addr ffff888102486230 by task kunit_try_catch/273
[   31.475813] 
[   31.476185] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241206 #1
[   31.477232] Tainted: [B]=BAD_PAGE, [N]=TEST
[   31.477747] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   31.478627] Call Trace:
[   31.479000]  <TASK>
[   31.479309]  dump_stack_lvl+0x73/0xb0
[   31.479728]  print_report+0xd1/0x640
[   31.480142]  ? __virt_addr_valid+0x1db/0x2d0
[   31.480636]  ? kasan_complete_mode_report_info+0x2a/0x200
[   31.481273]  kasan_report+0x102/0x140
[   31.481759]  ? kasan_atomics_helper+0x224d/0x5450
[   31.482481]  ? kasan_atomics_helper+0x224d/0x5450
[   31.483044]  kasan_check_range+0x10c/0x1c0
[   31.483656]  __kasan_check_write+0x18/0x20
[   31.484192]  kasan_atomics_helper+0x224d/0x5450
[   31.484734]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   31.485346]  ? __kmalloc_cache_noprof+0x184/0x410
[   31.485947]  ? trace_hardirqs_on+0x37/0xe0
[   31.486466]  ? kasan_atomics+0x153/0x310
[   31.486989]  kasan_atomics+0x1dd/0x310
[   31.487622]  ? __pfx_kasan_atomics+0x10/0x10
[   31.488309]  ? __pfx_kasan_atomics+0x10/0x10
[   31.488854]  kunit_try_run_case+0x1b3/0x490
[   31.489427]  ? __pfx_kunit_try_run_case+0x10/0x10
[   31.490041]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   31.490564]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   31.491282]  ? __kthread_parkme+0x82/0x160
[   31.491845]  ? preempt_count_sub+0x50/0x80
[   31.492518]  ? __pfx_kunit_try_run_case+0x10/0x10
[   31.493053]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   31.493614]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   31.494417]  kthread+0x257/0x310
[   31.494759]  ? __pfx_kthread+0x10/0x10
[   31.495348]  ret_from_fork+0x41/0x80
[   31.495876]  ? __pfx_kthread+0x10/0x10
[   31.496347]  ret_from_fork_asm+0x1a/0x30
[   31.497004]  </TASK>
[   31.497447] 
[   31.497723] Allocated by task 273:
[   31.498321]  kasan_save_stack+0x3d/0x60
[   31.498849]  kasan_save_track+0x18/0x40
[   31.499338]  kasan_save_alloc_info+0x3b/0x50
[   31.499872]  __kasan_kmalloc+0xb7/0xc0
[   31.500461]  __kmalloc_cache_noprof+0x184/0x410
[   31.501576]  kasan_atomics+0x96/0x310
[   31.502081]  kunit_try_run_case+0x1b3/0x490
[   31.502662]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   31.503412]  kthread+0x257/0x310
[   31.503820]  ret_from_fork+0x41/0x80
[   31.504371]  ret_from_fork_asm+0x1a/0x30
[   31.504789] 
[   31.505224] The buggy address belongs to the object at ffff888102486200
[   31.505224]  which belongs to the cache kmalloc-64 of size 64
[   31.506500] The buggy address is located 0 bytes to the right of
[   31.506500]  allocated 48-byte region [ffff888102486200, ffff888102486230)
[   31.507900] 
[   31.508234] The buggy address belongs to the physical page:
[   31.508963] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102486
[   31.509850] flags: 0x200000000000000(node=0|zone=2)
[   31.510468] page_type: f5(slab)
[   31.510801] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   31.511662] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   31.512538] page dumped because: kasan: bad access detected
[   31.513204] 
[   31.513353] Memory state around the buggy address:
[   31.514055]  ffff888102486100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   31.514911]  ffff888102486180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   31.515629] >ffff888102486200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   31.516449]                                      ^
[   31.517066]  ffff888102486280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.517403]  ffff888102486300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.517677] ==================================================================
[   29.530721] ==================================================================
[   29.532171] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xfaa/0x5450
[   29.532828] Write of size 4 at addr ffff888102486230 by task kunit_try_catch/273
[   29.533400] 
[   29.534404] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241206 #1
[   29.535292] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.535849] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   29.536914] Call Trace:
[   29.537219]  <TASK>
[   29.537837]  dump_stack_lvl+0x73/0xb0
[   29.538678]  print_report+0xd1/0x640
[   29.539036]  ? __virt_addr_valid+0x1db/0x2d0
[   29.539579]  ? kasan_complete_mode_report_info+0x2a/0x200
[   29.540113]  kasan_report+0x102/0x140
[   29.540509]  ? kasan_atomics_helper+0xfaa/0x5450
[   29.541569]  ? kasan_atomics_helper+0xfaa/0x5450
[   29.542027]  kasan_check_range+0x10c/0x1c0
[   29.542803]  __kasan_check_write+0x18/0x20
[   29.543549]  kasan_atomics_helper+0xfaa/0x5450
[   29.544214]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   29.544896]  ? __kmalloc_cache_noprof+0x184/0x410
[   29.545468]  ? trace_hardirqs_on+0x37/0xe0
[   29.546271]  ? kasan_atomics+0x153/0x310
[   29.546958]  kasan_atomics+0x1dd/0x310
[   29.547652]  ? __pfx_kasan_atomics+0x10/0x10
[   29.548152]  ? __pfx_kasan_atomics+0x10/0x10
[   29.548883]  kunit_try_run_case+0x1b3/0x490
[   29.549597]  ? __pfx_kunit_try_run_case+0x10/0x10
[   29.550081]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   29.550862]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   29.551703]  ? __kthread_parkme+0x82/0x160
[   29.552545]  ? preempt_count_sub+0x50/0x80
[   29.552989]  ? __pfx_kunit_try_run_case+0x10/0x10
[   29.554043]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   29.554877]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   29.555725]  kthread+0x257/0x310
[   29.556401]  ? __pfx_kthread+0x10/0x10
[   29.556882]  ret_from_fork+0x41/0x80
[   29.557610]  ? __pfx_kthread+0x10/0x10
[   29.558112]  ret_from_fork_asm+0x1a/0x30
[   29.559108]  </TASK>
[   29.559408] 
[   29.560186] Allocated by task 273:
[   29.560552]  kasan_save_stack+0x3d/0x60
[   29.561085]  kasan_save_track+0x18/0x40
[   29.561762]  kasan_save_alloc_info+0x3b/0x50
[   29.562192]  __kasan_kmalloc+0xb7/0xc0
[   29.562680]  __kmalloc_cache_noprof+0x184/0x410
[   29.563122]  kasan_atomics+0x96/0x310
[   29.564135]  kunit_try_run_case+0x1b3/0x490
[   29.564838]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   29.565644]  kthread+0x257/0x310
[   29.566087]  ret_from_fork+0x41/0x80
[   29.566744]  ret_from_fork_asm+0x1a/0x30
[   29.567035] 
[   29.567560] The buggy address belongs to the object at ffff888102486200
[   29.567560]  which belongs to the cache kmalloc-64 of size 64
[   29.569197] The buggy address is located 0 bytes to the right of
[   29.569197]  allocated 48-byte region [ffff888102486200, ffff888102486230)
[   29.570975] 
[   29.571524] The buggy address belongs to the physical page:
[   29.572041] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102486
[   29.573088] flags: 0x200000000000000(node=0|zone=2)
[   29.573765] page_type: f5(slab)
[   29.574481] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   29.575490] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   29.576363] page dumped because: kasan: bad access detected
[   29.576987] 
[   29.577328] Memory state around the buggy address:
[   29.578006]  ffff888102486100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.578793]  ffff888102486180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.579600] >ffff888102486200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   29.580310]                                      ^
[   29.580775]  ffff888102486280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.582030]  ffff888102486300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.582903] ==================================================================
[   29.585716] ==================================================================
[   29.586474] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a38/0x5450
[   29.587204] Read of size 4 at addr ffff888102486230 by task kunit_try_catch/273
[   29.588480] 
[   29.588804] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241206 #1
[   29.589913] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.590722] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   29.592175] Call Trace:
[   29.592736]  <TASK>
[   29.592977]  dump_stack_lvl+0x73/0xb0
[   29.593524]  print_report+0xd1/0x640
[   29.594173]  ? __virt_addr_valid+0x1db/0x2d0
[   29.594567]  ? kasan_complete_mode_report_info+0x2a/0x200
[   29.595150]  kasan_report+0x102/0x140
[   29.595843]  ? kasan_atomics_helper+0x4a38/0x5450
[   29.596982]  ? kasan_atomics_helper+0x4a38/0x5450
[   29.597598]  __asan_report_load4_noabort+0x18/0x20
[   29.598520]  kasan_atomics_helper+0x4a38/0x5450
[   29.599175]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   29.599669]  ? __kmalloc_cache_noprof+0x184/0x410
[   29.600280]  ? trace_hardirqs_on+0x37/0xe0
[   29.600705]  ? kasan_atomics+0x153/0x310
[   29.601280]  kasan_atomics+0x1dd/0x310
[   29.601582]  ? __pfx_kasan_atomics+0x10/0x10
[   29.602456]  ? __pfx_kasan_atomics+0x10/0x10
[   29.603230]  kunit_try_run_case+0x1b3/0x490
[   29.603913]  ? __pfx_kunit_try_run_case+0x10/0x10
[   29.604391]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   29.605078]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   29.605732]  ? __kthread_parkme+0x82/0x160
[   29.606273]  ? preempt_count_sub+0x50/0x80
[   29.606657]  ? __pfx_kunit_try_run_case+0x10/0x10
[   29.607258]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   29.607922]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   29.608502]  kthread+0x257/0x310
[   29.608993]  ? __pfx_kthread+0x10/0x10
[   29.609546]  ret_from_fork+0x41/0x80
[   29.609920]  ? __pfx_kthread+0x10/0x10
[   29.610540]  ret_from_fork_asm+0x1a/0x30
[   29.610990]  </TASK>
[   29.611410] 
[   29.611596] Allocated by task 273:
[   29.612037]  kasan_save_stack+0x3d/0x60
[   29.612504]  kasan_save_track+0x18/0x40
[   29.613032]  kasan_save_alloc_info+0x3b/0x50
[   29.613499]  __kasan_kmalloc+0xb7/0xc0
[   29.614035]  __kmalloc_cache_noprof+0x184/0x410
[   29.614703]  kasan_atomics+0x96/0x310
[   29.615194]  kunit_try_run_case+0x1b3/0x490
[   29.615690]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   29.616465]  kthread+0x257/0x310
[   29.616793]  ret_from_fork+0x41/0x80
[   29.617404]  ret_from_fork_asm+0x1a/0x30
[   29.617817] 
[   29.618202] The buggy address belongs to the object at ffff888102486200
[   29.618202]  which belongs to the cache kmalloc-64 of size 64
[   29.619177] The buggy address is located 0 bytes to the right of
[   29.619177]  allocated 48-byte region [ffff888102486200, ffff888102486230)
[   29.620446] 
[   29.620714] The buggy address belongs to the physical page:
[   29.621170] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102486
[   29.622056] flags: 0x200000000000000(node=0|zone=2)
[   29.622618] page_type: f5(slab)
[   29.622993] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   29.623747] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   29.624548] page dumped because: kasan: bad access detected
[   29.625003] 
[   29.625301] Memory state around the buggy address:
[   29.625882]  ffff888102486100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.626552]  ffff888102486180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.627023] >ffff888102486200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   29.627913]                                      ^
[   29.628559]  ffff888102486280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.629192]  ffff888102486300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.629859] ==================================================================
[   29.837143] ==================================================================
[   29.838511] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1218/0x5450
[   29.838898] Write of size 4 at addr ffff888102486230 by task kunit_try_catch/273
[   29.840883] 
[   29.841165] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241206 #1
[   29.842077] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.842922] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   29.844095] Call Trace:
[   29.844866]  <TASK>
[   29.845193]  dump_stack_lvl+0x73/0xb0
[   29.845812]  print_report+0xd1/0x640
[   29.846570]  ? __virt_addr_valid+0x1db/0x2d0
[   29.847564]  ? kasan_complete_mode_report_info+0x2a/0x200
[   29.848137]  kasan_report+0x102/0x140
[   29.848873]  ? kasan_atomics_helper+0x1218/0x5450
[   29.849423]  ? kasan_atomics_helper+0x1218/0x5450
[   29.849915]  kasan_check_range+0x10c/0x1c0
[   29.850425]  __kasan_check_write+0x18/0x20
[   29.850850]  kasan_atomics_helper+0x1218/0x5450
[   29.852490]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   29.853109]  ? __kmalloc_cache_noprof+0x184/0x410
[   29.854014]  ? trace_hardirqs_on+0x37/0xe0
[   29.854662]  ? kasan_atomics+0x153/0x310
[   29.855352]  kasan_atomics+0x1dd/0x310
[   29.855749]  ? __pfx_kasan_atomics+0x10/0x10
[   29.856188]  ? __pfx_kasan_atomics+0x10/0x10
[   29.856592]  kunit_try_run_case+0x1b3/0x490
[   29.857682]  ? __pfx_kunit_try_run_case+0x10/0x10
[   29.858541]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   29.859359]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   29.859919]  ? __kthread_parkme+0x82/0x160
[   29.860750]  ? preempt_count_sub+0x50/0x80
[   29.861456]  ? __pfx_kunit_try_run_case+0x10/0x10
[   29.862143]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   29.862711]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   29.863708]  kthread+0x257/0x310
[   29.864111]  ? __pfx_kthread+0x10/0x10
[   29.864788]  ret_from_fork+0x41/0x80
[   29.865253]  ? __pfx_kthread+0x10/0x10
[   29.865798]  ret_from_fork_asm+0x1a/0x30
[   29.866400]  </TASK>
[   29.866624] 
[   29.866950] Allocated by task 273:
[   29.867278]  kasan_save_stack+0x3d/0x60
[   29.868063]  kasan_save_track+0x18/0x40
[   29.868363]  kasan_save_alloc_info+0x3b/0x50
[   29.868913]  __kasan_kmalloc+0xb7/0xc0
[   29.869466]  __kmalloc_cache_noprof+0x184/0x410
[   29.870039]  kasan_atomics+0x96/0x310
[   29.870550]  kunit_try_run_case+0x1b3/0x490
[   29.871111]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   29.871662]  kthread+0x257/0x310
[   29.872057]  ret_from_fork+0x41/0x80
[   29.872461]  ret_from_fork_asm+0x1a/0x30
[   29.872964] 
[   29.873122] The buggy address belongs to the object at ffff888102486200
[   29.873122]  which belongs to the cache kmalloc-64 of size 64
[   29.874263] The buggy address is located 0 bytes to the right of
[   29.874263]  allocated 48-byte region [ffff888102486200, ffff888102486230)
[   29.875406] 
[   29.875727] The buggy address belongs to the physical page:
[   29.876270] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102486
[   29.876996] flags: 0x200000000000000(node=0|zone=2)
[   29.877334] page_type: f5(slab)
[   29.877595] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   29.878838] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   29.879525] page dumped because: kasan: bad access detected
[   29.880058] 
[   29.880345] Memory state around the buggy address:
[   29.880872]  ffff888102486100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.881737]  ffff888102486180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.882234] >ffff888102486200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   29.882870]                                      ^
[   29.883480]  ffff888102486280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.884414]  ffff888102486300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.884861] ==================================================================
[   29.153959] ==================================================================
[   29.155149] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xac8/0x5450
[   29.155838] Write of size 4 at addr ffff888102486230 by task kunit_try_catch/273
[   29.156417] 
[   29.157469] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241206 #1
[   29.158520] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.159475] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   29.160435] Call Trace:
[   29.160751]  <TASK>
[   29.161045]  dump_stack_lvl+0x73/0xb0
[   29.162108]  print_report+0xd1/0x640
[   29.162732]  ? __virt_addr_valid+0x1db/0x2d0
[   29.163471]  ? kasan_complete_mode_report_info+0x2a/0x200
[   29.163990]  kasan_report+0x102/0x140
[   29.164403]  ? kasan_atomics_helper+0xac8/0x5450
[   29.164872]  ? kasan_atomics_helper+0xac8/0x5450
[   29.165880]  kasan_check_range+0x10c/0x1c0
[   29.166637]  __kasan_check_write+0x18/0x20
[   29.167305]  kasan_atomics_helper+0xac8/0x5450
[   29.167982]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   29.168637]  ? __kmalloc_cache_noprof+0x184/0x410
[   29.169150]  ? trace_hardirqs_on+0x37/0xe0
[   29.170057]  ? kasan_atomics+0x153/0x310
[   29.170724]  kasan_atomics+0x1dd/0x310
[   29.171442]  ? __pfx_kasan_atomics+0x10/0x10
[   29.172136]  ? __pfx_kasan_atomics+0x10/0x10
[   29.172647]  kunit_try_run_case+0x1b3/0x490
[   29.173511]  ? __pfx_kunit_try_run_case+0x10/0x10
[   29.174028]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   29.175075]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   29.175465]  ? __kthread_parkme+0x82/0x160
[   29.176479]  ? preempt_count_sub+0x50/0x80
[   29.177248]  ? __pfx_kunit_try_run_case+0x10/0x10
[   29.177593]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   29.178321]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   29.178831]  kthread+0x257/0x310
[   29.179346]  ? __pfx_kthread+0x10/0x10
[   29.179712]  ret_from_fork+0x41/0x80
[   29.180289]  ? __pfx_kthread+0x10/0x10
[   29.180776]  ret_from_fork_asm+0x1a/0x30
[   29.181172]  </TASK>
[   29.181564] 
[   29.181855] Allocated by task 273:
[   29.182409]  kasan_save_stack+0x3d/0x60
[   29.182887]  kasan_save_track+0x18/0x40
[   29.183272]  kasan_save_alloc_info+0x3b/0x50
[   29.183620]  __kasan_kmalloc+0xb7/0xc0
[   29.184240]  __kmalloc_cache_noprof+0x184/0x410
[   29.184890]  kasan_atomics+0x96/0x310
[   29.185498]  kunit_try_run_case+0x1b3/0x490
[   29.185862]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   29.186396]  kthread+0x257/0x310
[   29.186911]  ret_from_fork+0x41/0x80
[   29.187504]  ret_from_fork_asm+0x1a/0x30
[   29.188140] 
[   29.188431] The buggy address belongs to the object at ffff888102486200
[   29.188431]  which belongs to the cache kmalloc-64 of size 64
[   29.189272] The buggy address is located 0 bytes to the right of
[   29.189272]  allocated 48-byte region [ffff888102486200, ffff888102486230)
[   29.190560] 
[   29.190843] The buggy address belongs to the physical page:
[   29.191447] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102486
[   29.192199] flags: 0x200000000000000(node=0|zone=2)
[   29.192727] page_type: f5(slab)
[   29.193148] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   29.193598] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   29.194448] page dumped because: kasan: bad access detected
[   29.195207] 
[   29.195442] Memory state around the buggy address:
[   29.196059]  ffff888102486100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.196759]  ffff888102486180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.197550] >ffff888102486200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   29.198262]                                      ^
[   29.198581]  ffff888102486280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.199486]  ffff888102486300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.200027] ==================================================================
[   28.770005] ==================================================================
[   28.770863] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x5ff/0x5450
[   28.773381] Write of size 4 at addr ffff888102486230 by task kunit_try_catch/273
[   28.773864] 
[   28.774336] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241206 #1
[   28.775106] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.775311] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   28.775646] Call Trace:
[   28.775781]  <TASK>
[   28.775909]  dump_stack_lvl+0x73/0xb0
[   28.776304]  print_report+0xd1/0x640
[   28.776969]  ? __virt_addr_valid+0x1db/0x2d0
[   28.777670]  ? kasan_complete_mode_report_info+0x2a/0x200
[   28.778263]  kasan_report+0x102/0x140
[   28.778793]  ? kasan_atomics_helper+0x5ff/0x5450
[   28.779413]  ? kasan_atomics_helper+0x5ff/0x5450
[   28.779815]  kasan_check_range+0x10c/0x1c0
[   28.780506]  __kasan_check_write+0x18/0x20
[   28.781837]  kasan_atomics_helper+0x5ff/0x5450
[   28.782355]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   28.782818]  ? __kmalloc_cache_noprof+0x184/0x410
[   28.783628]  ? trace_hardirqs_on+0x37/0xe0
[   28.784418]  ? kasan_atomics+0x153/0x310
[   28.784769]  kasan_atomics+0x1dd/0x310
[   28.785121]  ? __pfx_kasan_atomics+0x10/0x10
[   28.785983]  ? __pfx_kasan_atomics+0x10/0x10
[   28.786883]  kunit_try_run_case+0x1b3/0x490
[   28.787609]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.788130]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   28.788778]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   28.789397]  ? __kthread_parkme+0x82/0x160
[   28.789823]  ? preempt_count_sub+0x50/0x80
[   28.790377]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.790924]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   28.791612]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.792202]  kthread+0x257/0x310
[   28.792728]  ? __pfx_kthread+0x10/0x10
[   28.793304]  ret_from_fork+0x41/0x80
[   28.793696]  ? __pfx_kthread+0x10/0x10
[   28.794176]  ret_from_fork_asm+0x1a/0x30
[   28.794754]  </TASK>
[   28.795223] 
[   28.795462] Allocated by task 273:
[   28.795899]  kasan_save_stack+0x3d/0x60
[   28.796454]  kasan_save_track+0x18/0x40
[   28.796908]  kasan_save_alloc_info+0x3b/0x50
[   28.797438]  __kasan_kmalloc+0xb7/0xc0
[   28.797983]  __kmalloc_cache_noprof+0x184/0x410
[   28.798513]  kasan_atomics+0x96/0x310
[   28.798873]  kunit_try_run_case+0x1b3/0x490
[   28.799580]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.799981]  kthread+0x257/0x310
[   28.800491]  ret_from_fork+0x41/0x80
[   28.801019]  ret_from_fork_asm+0x1a/0x30
[   28.801381] 
[   28.801641] The buggy address belongs to the object at ffff888102486200
[   28.801641]  which belongs to the cache kmalloc-64 of size 64
[   28.802671] The buggy address is located 0 bytes to the right of
[   28.802671]  allocated 48-byte region [ffff888102486200, ffff888102486230)
[   28.803665] 
[   28.803869] The buggy address belongs to the physical page:
[   28.804416] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102486
[   28.804869] flags: 0x200000000000000(node=0|zone=2)
[   28.805398] page_type: f5(slab)
[   28.805905] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   28.806829] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   28.807622] page dumped because: kasan: bad access detected
[   28.808824] 
[   28.809222] Memory state around the buggy address:
[   28.810119]  ffff888102486100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.810810]  ffff888102486180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.811293] >ffff888102486200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   28.811909]                                      ^
[   28.812419]  ffff888102486280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.813308]  ffff888102486300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.813967] ==================================================================
[   31.214885] ==================================================================
[   31.216769] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4f9a/0x5450
[   31.217947] Read of size 8 at addr ffff888102486230 by task kunit_try_catch/273
[   31.219093] 
[   31.219975] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241206 #1
[   31.221036] Tainted: [B]=BAD_PAGE, [N]=TEST
[   31.221475] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   31.222712] Call Trace:
[   31.223257]  <TASK>
[   31.223606]  dump_stack_lvl+0x73/0xb0
[   31.224090]  print_report+0xd1/0x640
[   31.224992]  ? __virt_addr_valid+0x1db/0x2d0
[   31.225700]  ? kasan_complete_mode_report_info+0x2a/0x200
[   31.226666]  kasan_report+0x102/0x140
[   31.227081]  ? kasan_atomics_helper+0x4f9a/0x5450
[   31.227856]  ? kasan_atomics_helper+0x4f9a/0x5450
[   31.228757]  __asan_report_load8_noabort+0x18/0x20
[   31.229258]  kasan_atomics_helper+0x4f9a/0x5450
[   31.229747]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   31.230617]  ? __kmalloc_cache_noprof+0x184/0x410
[   31.231271]  ? trace_hardirqs_on+0x37/0xe0
[   31.231711]  ? kasan_atomics+0x153/0x310
[   31.232110]  kasan_atomics+0x1dd/0x310
[   31.232953]  ? __pfx_kasan_atomics+0x10/0x10
[   31.233503]  ? __pfx_kasan_atomics+0x10/0x10
[   31.234433]  kunit_try_run_case+0x1b3/0x490
[   31.235065]  ? __pfx_kunit_try_run_case+0x10/0x10
[   31.235819]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   31.236292]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   31.236845]  ? __kthread_parkme+0x82/0x160
[   31.237666]  ? preempt_count_sub+0x50/0x80
[   31.238008]  ? __pfx_kunit_try_run_case+0x10/0x10
[   31.238999]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   31.239906]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   31.240675]  kthread+0x257/0x310
[   31.241277]  ? __pfx_kthread+0x10/0x10
[   31.241882]  ret_from_fork+0x41/0x80
[   31.242329]  ? __pfx_kthread+0x10/0x10
[   31.243131]  ret_from_fork_asm+0x1a/0x30
[   31.243634]  </TASK>
[   31.243901] 
[   31.244113] Allocated by task 273:
[   31.244426]  kasan_save_stack+0x3d/0x60
[   31.244877]  kasan_save_track+0x18/0x40
[   31.245970]  kasan_save_alloc_info+0x3b/0x50
[   31.246725]  __kasan_kmalloc+0xb7/0xc0
[   31.247325]  __kmalloc_cache_noprof+0x184/0x410
[   31.248047]  kasan_atomics+0x96/0x310
[   31.248597]  kunit_try_run_case+0x1b3/0x490
[   31.249049]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   31.249615]  kthread+0x257/0x310
[   31.249983]  ret_from_fork+0x41/0x80
[   31.250843]  ret_from_fork_asm+0x1a/0x30
[   31.251154] 
[   31.251406] The buggy address belongs to the object at ffff888102486200
[   31.251406]  which belongs to the cache kmalloc-64 of size 64
[   31.253115] The buggy address is located 0 bytes to the right of
[   31.253115]  allocated 48-byte region [ffff888102486200, ffff888102486230)
[   31.254513] 
[   31.254797] The buggy address belongs to the physical page:
[   31.255366] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102486
[   31.256850] flags: 0x200000000000000(node=0|zone=2)
[   31.257655] page_type: f5(slab)
[   31.258323] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   31.259423] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   31.260074] page dumped because: kasan: bad access detected
[   31.260548] 
[   31.260747] Memory state around the buggy address:
[   31.261872]  ffff888102486100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   31.262796]  ffff888102486180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   31.263535] >ffff888102486200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   31.264141]                                      ^
[   31.264998]  ffff888102486280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.265868]  ffff888102486300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.266926] ==================================================================
[   30.906262] ==================================================================
[   30.908111] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1d7b/0x5450
[   30.908768] Write of size 8 at addr ffff888102486230 by task kunit_try_catch/273
[   30.909426] 
[   30.910417] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241206 #1
[   30.911300] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.911626] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   30.912734] Call Trace:
[   30.913288]  <TASK>
[   30.913735]  dump_stack_lvl+0x73/0xb0
[   30.914440]  print_report+0xd1/0x640
[   30.915105]  ? __virt_addr_valid+0x1db/0x2d0
[   30.915572]  ? kasan_complete_mode_report_info+0x2a/0x200
[   30.916107]  kasan_report+0x102/0x140
[   30.917038]  ? kasan_atomics_helper+0x1d7b/0x5450
[   30.917672]  ? kasan_atomics_helper+0x1d7b/0x5450
[   30.918251]  kasan_check_range+0x10c/0x1c0
[   30.919179]  __kasan_check_write+0x18/0x20
[   30.919798]  kasan_atomics_helper+0x1d7b/0x5450
[   30.920541]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   30.921258]  ? __kmalloc_cache_noprof+0x184/0x410
[   30.922009]  ? trace_hardirqs_on+0x37/0xe0
[   30.922763]  ? kasan_atomics+0x153/0x310
[   30.923254]  kasan_atomics+0x1dd/0x310
[   30.923652]  ? __pfx_kasan_atomics+0x10/0x10
[   30.924090]  ? __pfx_kasan_atomics+0x10/0x10
[   30.925082]  kunit_try_run_case+0x1b3/0x490
[   30.925683]  ? __pfx_kunit_try_run_case+0x10/0x10
[   30.926528]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   30.927174]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   30.927866]  ? __kthread_parkme+0x82/0x160
[   30.928762]  ? preempt_count_sub+0x50/0x80
[   30.929624]  ? __pfx_kunit_try_run_case+0x10/0x10
[   30.930231]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   30.931137]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   30.932021]  kthread+0x257/0x310
[   30.932688]  ? __pfx_kthread+0x10/0x10
[   30.933154]  ret_from_fork+0x41/0x80
[   30.934003]  ? __pfx_kthread+0x10/0x10
[   30.934651]  ret_from_fork_asm+0x1a/0x30
[   30.935357]  </TASK>
[   30.935637] 
[   30.935857] Allocated by task 273:
[   30.936754]  kasan_save_stack+0x3d/0x60
[   30.937172]  kasan_save_track+0x18/0x40
[   30.937830]  kasan_save_alloc_info+0x3b/0x50
[   30.938630]  __kasan_kmalloc+0xb7/0xc0
[   30.939318]  __kmalloc_cache_noprof+0x184/0x410
[   30.939948]  kasan_atomics+0x96/0x310
[   30.940688]  kunit_try_run_case+0x1b3/0x490
[   30.941448]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   30.942576]  kthread+0x257/0x310
[   30.942956]  ret_from_fork+0x41/0x80
[   30.943503]  ret_from_fork_asm+0x1a/0x30
[   30.943919] 
[   30.944814] The buggy address belongs to the object at ffff888102486200
[   30.944814]  which belongs to the cache kmalloc-64 of size 64
[   30.945994] The buggy address is located 0 bytes to the right of
[   30.945994]  allocated 48-byte region [ffff888102486200, ffff888102486230)
[   30.947849] 
[   30.948576] The buggy address belongs to the physical page:
[   30.949126] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102486
[   30.950208] flags: 0x200000000000000(node=0|zone=2)
[   30.950641] page_type: f5(slab)
[   30.952052] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   30.952759] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   30.954122] page dumped because: kasan: bad access detected
[   30.955049] 
[   30.955316] Memory state around the buggy address:
[   30.956107]  ffff888102486100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   30.957087]  ffff888102486180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   30.957917] >ffff888102486200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   30.958995]                                      ^
[   30.959736]  ffff888102486280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.960510]  ffff888102486300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.961493] ==================================================================
[   30.219224] ==================================================================
[   30.220448] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x151e/0x5450
[   30.221925] Write of size 8 at addr ffff888102486230 by task kunit_try_catch/273
[   30.223301] 
[   30.223656] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241206 #1
[   30.225820] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.226577] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   30.226926] Call Trace:
[   30.227276]  <TASK>
[   30.227613]  dump_stack_lvl+0x73/0xb0
[   30.227995]  print_report+0xd1/0x640
[   30.228625]  ? __virt_addr_valid+0x1db/0x2d0
[   30.229066]  ? kasan_complete_mode_report_info+0x2a/0x200
[   30.229690]  kasan_report+0x102/0x140
[   30.230283]  ? kasan_atomics_helper+0x151e/0x5450
[   30.230810]  ? kasan_atomics_helper+0x151e/0x5450
[   30.231534]  kasan_check_range+0x10c/0x1c0
[   30.232034]  __kasan_check_write+0x18/0x20
[   30.232831]  kasan_atomics_helper+0x151e/0x5450
[   30.233677]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   30.234577]  ? __kmalloc_cache_noprof+0x184/0x410
[   30.235067]  ? trace_hardirqs_on+0x37/0xe0
[   30.235517]  ? kasan_atomics+0x153/0x310
[   30.235959]  kasan_atomics+0x1dd/0x310
[   30.236242]  ? __pfx_kasan_atomics+0x10/0x10
[   30.237186]  ? __pfx_kasan_atomics+0x10/0x10
[   30.237655]  kunit_try_run_case+0x1b3/0x490
[   30.238116]  ? __pfx_kunit_try_run_case+0x10/0x10
[   30.238606]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   30.240106]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   30.240850]  ? __kthread_parkme+0x82/0x160
[   30.241482]  ? preempt_count_sub+0x50/0x80
[   30.241990]  ? __pfx_kunit_try_run_case+0x10/0x10
[   30.242458]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   30.243135]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   30.243710]  kthread+0x257/0x310
[   30.244256]  ? __pfx_kthread+0x10/0x10
[   30.244742]  ret_from_fork+0x41/0x80
[   30.245171]  ? __pfx_kthread+0x10/0x10
[   30.245737]  ret_from_fork_asm+0x1a/0x30
[   30.246307]  </TASK>
[   30.246583] 
[   30.246888] Allocated by task 273:
[   30.247344]  kasan_save_stack+0x3d/0x60
[   30.247767]  kasan_save_track+0x18/0x40
[   30.248307]  kasan_save_alloc_info+0x3b/0x50
[   30.248856]  __kasan_kmalloc+0xb7/0xc0
[   30.249404]  __kmalloc_cache_noprof+0x184/0x410
[   30.249859]  kasan_atomics+0x96/0x310
[   30.250427]  kunit_try_run_case+0x1b3/0x490
[   30.250822]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   30.251494]  kthread+0x257/0x310
[   30.251770]  ret_from_fork+0x41/0x80
[   30.252263]  ret_from_fork_asm+0x1a/0x30
[   30.252661] 
[   30.252859] The buggy address belongs to the object at ffff888102486200
[   30.252859]  which belongs to the cache kmalloc-64 of size 64
[   30.253804] The buggy address is located 0 bytes to the right of
[   30.253804]  allocated 48-byte region [ffff888102486200, ffff888102486230)
[   30.255171] 
[   30.255436] The buggy address belongs to the physical page:
[   30.255947] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102486
[   30.256669] flags: 0x200000000000000(node=0|zone=2)
[   30.257031] page_type: f5(slab)
[   30.257420] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   30.258368] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   30.259295] page dumped because: kasan: bad access detected
[   30.259780] 
[   30.260027] Memory state around the buggy address:
[   30.260383]  ffff888102486100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   30.261162]  ffff888102486180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   30.261952] >ffff888102486200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   30.262683]                                      ^
[   30.263343]  ffff888102486280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.264564]  ffff888102486300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.265637] ==================================================================
[   29.102876] ==================================================================
[   29.103609] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa2c/0x5450
[   29.104694] Write of size 4 at addr ffff888102486230 by task kunit_try_catch/273
[   29.105900] 
[   29.106259] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241206 #1
[   29.107216] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.107630] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   29.109143] Call Trace:
[   29.109441]  <TASK>
[   29.110043]  dump_stack_lvl+0x73/0xb0
[   29.110697]  print_report+0xd1/0x640
[   29.111304]  ? __virt_addr_valid+0x1db/0x2d0
[   29.111515]  ? kasan_complete_mode_report_info+0x2a/0x200
[   29.111751]  kasan_report+0x102/0x140
[   29.111958]  ? kasan_atomics_helper+0xa2c/0x5450
[   29.112409]  ? kasan_atomics_helper+0xa2c/0x5450
[   29.113582]  kasan_check_range+0x10c/0x1c0
[   29.114115]  __kasan_check_write+0x18/0x20
[   29.114836]  kasan_atomics_helper+0xa2c/0x5450
[   29.115537]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   29.116102]  ? __kmalloc_cache_noprof+0x184/0x410
[   29.116885]  ? trace_hardirqs_on+0x37/0xe0
[   29.117766]  ? kasan_atomics+0x153/0x310
[   29.118373]  kasan_atomics+0x1dd/0x310
[   29.118948]  ? __pfx_kasan_atomics+0x10/0x10
[   29.119579]  ? __pfx_kasan_atomics+0x10/0x10
[   29.120054]  kunit_try_run_case+0x1b3/0x490
[   29.120453]  ? __pfx_kunit_try_run_case+0x10/0x10
[   29.120874]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   29.121796]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   29.122489]  ? __kthread_parkme+0x82/0x160
[   29.123086]  ? preempt_count_sub+0x50/0x80
[   29.123821]  ? __pfx_kunit_try_run_case+0x10/0x10
[   29.124633]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   29.125129]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   29.126114]  kthread+0x257/0x310
[   29.126474]  ? __pfx_kthread+0x10/0x10
[   29.126845]  ret_from_fork+0x41/0x80
[   29.127242]  ? __pfx_kthread+0x10/0x10
[   29.127634]  ret_from_fork_asm+0x1a/0x30
[   29.128596]  </TASK>
[   29.128804] 
[   29.128985] Allocated by task 273:
[   29.130008]  kasan_save_stack+0x3d/0x60
[   29.130781]  kasan_save_track+0x18/0x40
[   29.131180]  kasan_save_alloc_info+0x3b/0x50
[   29.131967]  __kasan_kmalloc+0xb7/0xc0
[   29.132510]  __kmalloc_cache_noprof+0x184/0x410
[   29.132991]  kasan_atomics+0x96/0x310
[   29.133914]  kunit_try_run_case+0x1b3/0x490
[   29.134346]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   29.135078]  kthread+0x257/0x310
[   29.135586]  ret_from_fork+0x41/0x80
[   29.135923]  ret_from_fork_asm+0x1a/0x30
[   29.136398] 
[   29.136592] The buggy address belongs to the object at ffff888102486200
[   29.136592]  which belongs to the cache kmalloc-64 of size 64
[   29.138299] The buggy address is located 0 bytes to the right of
[   29.138299]  allocated 48-byte region [ffff888102486200, ffff888102486230)
[   29.139267] 
[   29.140091] The buggy address belongs to the physical page:
[   29.140641] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102486
[   29.141585] flags: 0x200000000000000(node=0|zone=2)
[   29.142014] page_type: f5(slab)
[   29.142791] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   29.143512] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   29.144334] page dumped because: kasan: bad access detected
[   29.144858] 
[   29.145875] Memory state around the buggy address:
[   29.146198]  ffff888102486100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.147132]  ffff888102486180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.147796] >ffff888102486200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   29.148765]                                      ^
[   29.149507]  ffff888102486280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.150536]  ffff888102486300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.151149] ==================================================================
[   29.201981] ==================================================================
[   29.202708] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xb6b/0x5450
[   29.203669] Write of size 4 at addr ffff888102486230 by task kunit_try_catch/273
[   29.204384] 
[   29.204676] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241206 #1
[   29.205712] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.206140] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   29.207044] Call Trace:
[   29.207332]  <TASK>
[   29.207696]  dump_stack_lvl+0x73/0xb0
[   29.208678]  print_report+0xd1/0x640
[   29.208988]  ? __virt_addr_valid+0x1db/0x2d0
[   29.209838]  ? kasan_complete_mode_report_info+0x2a/0x200
[   29.210808]  kasan_report+0x102/0x140
[   29.211500]  ? kasan_atomics_helper+0xb6b/0x5450
[   29.212187]  ? kasan_atomics_helper+0xb6b/0x5450
[   29.212874]  kasan_check_range+0x10c/0x1c0
[   29.213541]  __kasan_check_write+0x18/0x20
[   29.214543]  kasan_atomics_helper+0xb6b/0x5450
[   29.215000]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   29.215589]  ? __kmalloc_cache_noprof+0x184/0x410
[   29.216558]  ? trace_hardirqs_on+0x37/0xe0
[   29.217180]  ? kasan_atomics+0x153/0x310
[   29.218086]  kasan_atomics+0x1dd/0x310
[   29.218560]  ? __pfx_kasan_atomics+0x10/0x10
[   29.219006]  ? __pfx_kasan_atomics+0x10/0x10
[   29.219962]  kunit_try_run_case+0x1b3/0x490
[   29.220266]  ? __pfx_kunit_try_run_case+0x10/0x10
[   29.221017]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   29.221644]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   29.222491]  ? __kthread_parkme+0x82/0x160
[   29.223135]  ? preempt_count_sub+0x50/0x80
[   29.223585]  ? __pfx_kunit_try_run_case+0x10/0x10
[   29.224091]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   29.225565]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   29.226100]  kthread+0x257/0x310
[   29.226461]  ? __pfx_kthread+0x10/0x10
[   29.226910]  ret_from_fork+0x41/0x80
[   29.227445]  ? __pfx_kthread+0x10/0x10
[   29.227892]  ret_from_fork_asm+0x1a/0x30
[   29.228395]  </TASK>
[   29.228620] 
[   29.228785] Allocated by task 273:
[   29.229353]  kasan_save_stack+0x3d/0x60
[   29.229890]  kasan_save_track+0x18/0x40
[   29.230445]  kasan_save_alloc_info+0x3b/0x50
[   29.230916]  __kasan_kmalloc+0xb7/0xc0
[   29.231387]  __kmalloc_cache_noprof+0x184/0x410
[   29.231723]  kasan_atomics+0x96/0x310
[   29.232187]  kunit_try_run_case+0x1b3/0x490
[   29.232809]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   29.233359]  kthread+0x257/0x310
[   29.233642]  ret_from_fork+0x41/0x80
[   29.233971]  ret_from_fork_asm+0x1a/0x30
[   29.234415] 
[   29.234659] The buggy address belongs to the object at ffff888102486200
[   29.234659]  which belongs to the cache kmalloc-64 of size 64
[   29.236816] The buggy address is located 0 bytes to the right of
[   29.236816]  allocated 48-byte region [ffff888102486200, ffff888102486230)
[   29.239212] 
[   29.239665] The buggy address belongs to the physical page:
[   29.240859] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102486
[   29.241697] flags: 0x200000000000000(node=0|zone=2)
[   29.242069] page_type: f5(slab)
[   29.242807] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   29.244032] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   29.244682] page dumped because: kasan: bad access detected
[   29.245426] 
[   29.245698] Memory state around the buggy address:
[   29.246605]  ffff888102486100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.247226]  ffff888102486180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.247898] >ffff888102486200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   29.248927]                                      ^
[   29.249303]  ffff888102486280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.250579]  ffff888102486300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.251142] ==================================================================
[   31.115231] ==================================================================
[   31.115985] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4f73/0x5450
[   31.117508] Read of size 8 at addr ffff888102486230 by task kunit_try_catch/273
[   31.118003] 
[   31.118206] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241206 #1
[   31.119758] Tainted: [B]=BAD_PAGE, [N]=TEST
[   31.120574] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   31.121897] Call Trace:
[   31.122147]  <TASK>
[   31.122509]  dump_stack_lvl+0x73/0xb0
[   31.123552]  print_report+0xd1/0x640
[   31.124359]  ? __virt_addr_valid+0x1db/0x2d0
[   31.124836]  ? kasan_complete_mode_report_info+0x2a/0x200
[   31.125660]  kasan_report+0x102/0x140
[   31.126165]  ? kasan_atomics_helper+0x4f73/0x5450
[   31.126615]  ? kasan_atomics_helper+0x4f73/0x5450
[   31.127222]  __asan_report_load8_noabort+0x18/0x20
[   31.127564]  kasan_atomics_helper+0x4f73/0x5450
[   31.128263]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   31.128746]  ? __kmalloc_cache_noprof+0x184/0x410
[   31.129208]  ? trace_hardirqs_on+0x37/0xe0
[   31.129827]  ? kasan_atomics+0x153/0x310
[   31.130479]  kasan_atomics+0x1dd/0x310
[   31.131004]  ? __pfx_kasan_atomics+0x10/0x10
[   31.131562]  ? __pfx_kasan_atomics+0x10/0x10
[   31.132206]  kunit_try_run_case+0x1b3/0x490
[   31.132713]  ? __pfx_kunit_try_run_case+0x10/0x10
[   31.133376]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   31.134061]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   31.134581]  ? __kthread_parkme+0x82/0x160
[   31.135060]  ? preempt_count_sub+0x50/0x80
[   31.135588]  ? __pfx_kunit_try_run_case+0x10/0x10
[   31.136037]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   31.136738]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   31.137355]  kthread+0x257/0x310
[   31.137752]  ? __pfx_kthread+0x10/0x10
[   31.138310]  ret_from_fork+0x41/0x80
[   31.138676]  ? __pfx_kthread+0x10/0x10
[   31.139161]  ret_from_fork_asm+0x1a/0x30
[   31.139567]  </TASK>
[   31.139965] 
[   31.140371] Allocated by task 273:
[   31.140698]  kasan_save_stack+0x3d/0x60
[   31.141045]  kasan_save_track+0x18/0x40
[   31.141685]  kasan_save_alloc_info+0x3b/0x50
[   31.142424]  __kasan_kmalloc+0xb7/0xc0
[   31.142920]  __kmalloc_cache_noprof+0x184/0x410
[   31.143326]  kasan_atomics+0x96/0x310
[   31.143777]  kunit_try_run_case+0x1b3/0x490
[   31.144487]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   31.145206]  kthread+0x257/0x310
[   31.145643]  ret_from_fork+0x41/0x80
[   31.145997]  ret_from_fork_asm+0x1a/0x30
[   31.146472] 
[   31.146736] The buggy address belongs to the object at ffff888102486200
[   31.146736]  which belongs to the cache kmalloc-64 of size 64
[   31.147779] The buggy address is located 0 bytes to the right of
[   31.147779]  allocated 48-byte region [ffff888102486200, ffff888102486230)
[   31.149354] 
[   31.149631] The buggy address belongs to the physical page:
[   31.150022] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102486
[   31.151055] flags: 0x200000000000000(node=0|zone=2)
[   31.151745] page_type: f5(slab)
[   31.152285] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   31.153183] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   31.153625] page dumped because: kasan: bad access detected
[   31.154205] 
[   31.154414] Memory state around the buggy address:
[   31.154829]  ffff888102486100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   31.156336]  ffff888102486180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   31.157357] >ffff888102486200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   31.157888]                                      ^
[   31.158368]  ffff888102486280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.159392]  ffff888102486300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.160084] ==================================================================
[   31.066101] ==================================================================
[   31.067297] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1f44/0x5450
[   31.067955] Write of size 8 at addr ffff888102486230 by task kunit_try_catch/273
[   31.068777] 
[   31.069184] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241206 #1
[   31.072366] Tainted: [B]=BAD_PAGE, [N]=TEST
[   31.072861] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   31.074286] Call Trace:
[   31.074589]  <TASK>
[   31.074861]  dump_stack_lvl+0x73/0xb0
[   31.076180]  print_report+0xd1/0x640
[   31.076531]  ? __virt_addr_valid+0x1db/0x2d0
[   31.077223]  ? kasan_complete_mode_report_info+0x2a/0x200
[   31.077754]  kasan_report+0x102/0x140
[   31.078379]  ? kasan_atomics_helper+0x1f44/0x5450
[   31.078755]  ? kasan_atomics_helper+0x1f44/0x5450
[   31.079342]  kasan_check_range+0x10c/0x1c0
[   31.079797]  __kasan_check_write+0x18/0x20
[   31.080304]  kasan_atomics_helper+0x1f44/0x5450
[   31.080983]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   31.081576]  ? __kmalloc_cache_noprof+0x184/0x410
[   31.082279]  ? trace_hardirqs_on+0x37/0xe0
[   31.082617]  ? kasan_atomics+0x153/0x310
[   31.083090]  kasan_atomics+0x1dd/0x310
[   31.083630]  ? __pfx_kasan_atomics+0x10/0x10
[   31.084128]  ? __pfx_kasan_atomics+0x10/0x10
[   31.084819]  kunit_try_run_case+0x1b3/0x490
[   31.085161]  ? __pfx_kunit_try_run_case+0x10/0x10
[   31.085879]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   31.086458]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   31.087023]  ? __kthread_parkme+0x82/0x160
[   31.087582]  ? preempt_count_sub+0x50/0x80
[   31.087973]  ? __pfx_kunit_try_run_case+0x10/0x10
[   31.088511]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   31.089007]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   31.089759]  kthread+0x257/0x310
[   31.090446]  ? __pfx_kthread+0x10/0x10
[   31.090906]  ret_from_fork+0x41/0x80
[   31.091672]  ? __pfx_kthread+0x10/0x10
[   31.092300]  ret_from_fork_asm+0x1a/0x30
[   31.092820]  </TASK>
[   31.093305] 
[   31.093702] Allocated by task 273:
[   31.094027]  kasan_save_stack+0x3d/0x60
[   31.094560]  kasan_save_track+0x18/0x40
[   31.095101]  kasan_save_alloc_info+0x3b/0x50
[   31.095972]  __kasan_kmalloc+0xb7/0xc0
[   31.096333]  __kmalloc_cache_noprof+0x184/0x410
[   31.096664]  kasan_atomics+0x96/0x310
[   31.096971]  kunit_try_run_case+0x1b3/0x490
[   31.097861]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   31.098786]  kthread+0x257/0x310
[   31.099412]  ret_from_fork+0x41/0x80
[   31.099797]  ret_from_fork_asm+0x1a/0x30
[   31.100287] 
[   31.100717] The buggy address belongs to the object at ffff888102486200
[   31.100717]  which belongs to the cache kmalloc-64 of size 64
[   31.101852] The buggy address is located 0 bytes to the right of
[   31.101852]  allocated 48-byte region [ffff888102486200, ffff888102486230)
[   31.102650] 
[   31.103067] The buggy address belongs to the physical page:
[   31.103843] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102486
[   31.104766] flags: 0x200000000000000(node=0|zone=2)
[   31.105364] page_type: f5(slab)
[   31.105815] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   31.106735] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   31.107971] page dumped because: kasan: bad access detected
[   31.109133] 
[   31.109314] Memory state around the buggy address:
[   31.109601]  ffff888102486100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   31.109910]  ffff888102486180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   31.111163] >ffff888102486200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   31.112206]                                      ^
[   31.112918]  ffff888102486280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.114153]  ffff888102486300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.114508] ==================================================================
[   30.799980] ==================================================================
[   30.800664] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4f32/0x5450
[   30.801202] Read of size 8 at addr ffff888102486230 by task kunit_try_catch/273
[   30.802165] 
[   30.802454] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241206 #1
[   30.803558] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.804155] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   30.805029] Call Trace:
[   30.805387]  <TASK>
[   30.805727]  dump_stack_lvl+0x73/0xb0
[   30.806236]  print_report+0xd1/0x640
[   30.806726]  ? __virt_addr_valid+0x1db/0x2d0
[   30.807301]  ? kasan_complete_mode_report_info+0x2a/0x200
[   30.807974]  kasan_report+0x102/0x140
[   30.808506]  ? kasan_atomics_helper+0x4f32/0x5450
[   30.809131]  ? kasan_atomics_helper+0x4f32/0x5450
[   30.809797]  __asan_report_load8_noabort+0x18/0x20
[   30.810493]  kasan_atomics_helper+0x4f32/0x5450
[   30.810846]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   30.811559]  ? __kmalloc_cache_noprof+0x184/0x410
[   30.811961]  ? trace_hardirqs_on+0x37/0xe0
[   30.812632]  ? kasan_atomics+0x153/0x310
[   30.813071]  kasan_atomics+0x1dd/0x310
[   30.813611]  ? __pfx_kasan_atomics+0x10/0x10
[   30.814171]  ? __pfx_kasan_atomics+0x10/0x10
[   30.814636]  kunit_try_run_case+0x1b3/0x490
[   30.815160]  ? __pfx_kunit_try_run_case+0x10/0x10
[   30.815775]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   30.816347]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   30.817014]  ? __kthread_parkme+0x82/0x160
[   30.817821]  ? preempt_count_sub+0x50/0x80
[   30.818753]  ? __pfx_kunit_try_run_case+0x10/0x10
[   30.819489]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   30.820355]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   30.821135]  kthread+0x257/0x310
[   30.821854]  ? __pfx_kthread+0x10/0x10
[   30.822479]  ret_from_fork+0x41/0x80
[   30.822890]  ? __pfx_kthread+0x10/0x10
[   30.823182]  ret_from_fork_asm+0x1a/0x30
[   30.824325]  </TASK>
[   30.824537] 
[   30.825011] Allocated by task 273:
[   30.825647]  kasan_save_stack+0x3d/0x60
[   30.826189]  kasan_save_track+0x18/0x40
[   30.826560]  kasan_save_alloc_info+0x3b/0x50
[   30.826995]  __kasan_kmalloc+0xb7/0xc0
[   30.827926]  __kmalloc_cache_noprof+0x184/0x410
[   30.828351]  kasan_atomics+0x96/0x310
[   30.829058]  kunit_try_run_case+0x1b3/0x490
[   30.829516]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   30.830198]  kthread+0x257/0x310
[   30.830696]  ret_from_fork+0x41/0x80
[   30.831597]  ret_from_fork_asm+0x1a/0x30
[   30.832047] 
[   30.832277] The buggy address belongs to the object at ffff888102486200
[   30.832277]  which belongs to the cache kmalloc-64 of size 64
[   30.834175] The buggy address is located 0 bytes to the right of
[   30.834175]  allocated 48-byte region [ffff888102486200, ffff888102486230)
[   30.836457] 
[   30.836694] The buggy address belongs to the physical page:
[   30.837324] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102486
[   30.839030] flags: 0x200000000000000(node=0|zone=2)
[   30.839906] page_type: f5(slab)
[   30.840304] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   30.841217] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   30.842362] page dumped because: kasan: bad access detected
[   30.842705] 
[   30.843285] Memory state around the buggy address:
[   30.843993]  ffff888102486100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   30.845218]  ffff888102486180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   30.845911] >ffff888102486200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   30.846313]                                      ^
[   30.847009]  ffff888102486280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.847688]  ffff888102486300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.849159] ==================================================================
[   28.914736] ==================================================================
[   28.915716] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x7c8/0x5450
[   28.916692] Write of size 4 at addr ffff888102486230 by task kunit_try_catch/273
[   28.917546] 
[   28.917893] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241206 #1
[   28.918499] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.919138] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   28.920215] Call Trace:
[   28.920555]  <TASK>
[   28.920769]  dump_stack_lvl+0x73/0xb0
[   28.921292]  print_report+0xd1/0x640
[   28.921803]  ? __virt_addr_valid+0x1db/0x2d0
[   28.922688]  ? kasan_complete_mode_report_info+0x2a/0x200
[   28.923565]  kasan_report+0x102/0x140
[   28.923862]  ? kasan_atomics_helper+0x7c8/0x5450
[   28.924215]  ? kasan_atomics_helper+0x7c8/0x5450
[   28.924730]  kasan_check_range+0x10c/0x1c0
[   28.925380]  __kasan_check_write+0x18/0x20
[   28.925958]  kasan_atomics_helper+0x7c8/0x5450
[   28.926659]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   28.927358]  ? __kmalloc_cache_noprof+0x184/0x410
[   28.927824]  ? trace_hardirqs_on+0x37/0xe0
[   28.928159]  ? kasan_atomics+0x153/0x310
[   28.928508]  kasan_atomics+0x1dd/0x310
[   28.929055]  ? __pfx_kasan_atomics+0x10/0x10
[   28.929617]  ? __pfx_kasan_atomics+0x10/0x10
[   28.930671]  kunit_try_run_case+0x1b3/0x490
[   28.931387]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.931878]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   28.932535]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   28.933305]  ? __kthread_parkme+0x82/0x160
[   28.933623]  ? preempt_count_sub+0x50/0x80
[   28.934088]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.934818]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   28.935582]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.936117]  kthread+0x257/0x310
[   28.936707]  ? __pfx_kthread+0x10/0x10
[   28.937278]  ret_from_fork+0x41/0x80
[   28.937652]  ? __pfx_kthread+0x10/0x10
[   28.938183]  ret_from_fork_asm+0x1a/0x30
[   28.938883]  </TASK>
[   28.939259] 
[   28.939472] Allocated by task 273:
[   28.940004]  kasan_save_stack+0x3d/0x60
[   28.940576]  kasan_save_track+0x18/0x40
[   28.940875]  kasan_save_alloc_info+0x3b/0x50
[   28.941621]  __kasan_kmalloc+0xb7/0xc0
[   28.942062]  __kmalloc_cache_noprof+0x184/0x410
[   28.942466]  kasan_atomics+0x96/0x310
[   28.942894]  kunit_try_run_case+0x1b3/0x490
[   28.943393]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.943861]  kthread+0x257/0x310
[   28.944649]  ret_from_fork+0x41/0x80
[   28.944913]  ret_from_fork_asm+0x1a/0x30
[   28.945156] 
[   28.945258] The buggy address belongs to the object at ffff888102486200
[   28.945258]  which belongs to the cache kmalloc-64 of size 64
[   28.945695] The buggy address is located 0 bytes to the right of
[   28.945695]  allocated 48-byte region [ffff888102486200, ffff888102486230)
[   28.947197] 
[   28.947391] The buggy address belongs to the physical page:
[   28.947894] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102486
[   28.949137] flags: 0x200000000000000(node=0|zone=2)
[   28.950071] page_type: f5(slab)
[   28.950665] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   28.951254] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   28.952187] page dumped because: kasan: bad access detected
[   28.952724] 
[   28.952916] Memory state around the buggy address:
[   28.953232]  ffff888102486100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.954148]  ffff888102486180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.954651] >ffff888102486200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   28.955575]                                      ^
[   28.956488]  ffff888102486280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.958074]  ffff888102486300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.958734] ==================================================================
[   29.988421] ==================================================================
[   29.989672] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x49d0/0x5450
[   29.990522] Read of size 4 at addr ffff888102486230 by task kunit_try_catch/273
[   29.992136] 
[   29.992336] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241206 #1
[   29.993848] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.994375] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   29.996019] Call Trace:
[   29.996285]  <TASK>
[   29.996988]  dump_stack_lvl+0x73/0xb0
[   29.997574]  print_report+0xd1/0x640
[   29.998232]  ? __virt_addr_valid+0x1db/0x2d0
[   29.998847]  ? kasan_complete_mode_report_info+0x2a/0x200
[   29.999628]  kasan_report+0x102/0x140
[   30.000045]  ? kasan_atomics_helper+0x49d0/0x5450
[   30.000545]  ? kasan_atomics_helper+0x49d0/0x5450
[   30.001534]  __asan_report_load4_noabort+0x18/0x20
[   30.001882]  kasan_atomics_helper+0x49d0/0x5450
[   30.002516]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   30.003552]  ? __kmalloc_cache_noprof+0x184/0x410
[   30.004184]  ? trace_hardirqs_on+0x37/0xe0
[   30.004631]  ? kasan_atomics+0x153/0x310
[   30.005066]  kasan_atomics+0x1dd/0x310
[   30.005484]  ? __pfx_kasan_atomics+0x10/0x10
[   30.005969]  ? __pfx_kasan_atomics+0x10/0x10
[   30.006282]  kunit_try_run_case+0x1b3/0x490
[   30.006600]  ? __pfx_kunit_try_run_case+0x10/0x10
[   30.007284]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   30.007791]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   30.008614]  ? __kthread_parkme+0x82/0x160
[   30.009114]  ? preempt_count_sub+0x50/0x80
[   30.009564]  ? __pfx_kunit_try_run_case+0x10/0x10
[   30.011033]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   30.011898]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   30.012680]  kthread+0x257/0x310
[   30.012876]  ? __pfx_kthread+0x10/0x10
[   30.013094]  ret_from_fork+0x41/0x80
[   30.013475]  ? __pfx_kthread+0x10/0x10
[   30.014046]  ret_from_fork_asm+0x1a/0x30
[   30.014417]  </TASK>
[   30.014773] 
[   30.015464] Allocated by task 273:
[   30.015893]  kasan_save_stack+0x3d/0x60
[   30.016360]  kasan_save_track+0x18/0x40
[   30.016909]  kasan_save_alloc_info+0x3b/0x50
[   30.017669]  __kasan_kmalloc+0xb7/0xc0
[   30.018884]  __kmalloc_cache_noprof+0x184/0x410
[   30.019334]  kasan_atomics+0x96/0x310
[   30.019981]  kunit_try_run_case+0x1b3/0x490
[   30.020773]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   30.021521]  kthread+0x257/0x310
[   30.022213]  ret_from_fork+0x41/0x80
[   30.022838]  ret_from_fork_asm+0x1a/0x30
[   30.023455] 
[   30.023760] The buggy address belongs to the object at ffff888102486200
[   30.023760]  which belongs to the cache kmalloc-64 of size 64
[   30.024860] The buggy address is located 0 bytes to the right of
[   30.024860]  allocated 48-byte region [ffff888102486200, ffff888102486230)
[   30.026975] 
[   30.027245] The buggy address belongs to the physical page:
[   30.027608] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102486
[   30.028753] flags: 0x200000000000000(node=0|zone=2)
[   30.029596] page_type: f5(slab)
[   30.029994] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   30.031274] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   30.032160] page dumped because: kasan: bad access detected
[   30.033144] 
[   30.033387] Memory state around the buggy address:
[   30.033999]  ffff888102486100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   30.035413]  ffff888102486180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   30.036049] >ffff888102486200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   30.036728]                                      ^
[   30.037829]  ffff888102486280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.038956]  ffff888102486300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.039833] ==================================================================
[   28.960201] ==================================================================
[   28.961568] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x861/0x5450
[   28.962557] Write of size 4 at addr ffff888102486230 by task kunit_try_catch/273
[   28.963748] 
[   28.964161] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241206 #1
[   28.965341] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.965795] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   28.966755] Call Trace:
[   28.967128]  <TASK>
[   28.967542]  dump_stack_lvl+0x73/0xb0
[   28.967991]  print_report+0xd1/0x640
[   28.968746]  ? __virt_addr_valid+0x1db/0x2d0
[   28.969202]  ? kasan_complete_mode_report_info+0x2a/0x200
[   28.969792]  kasan_report+0x102/0x140
[   28.970350]  ? kasan_atomics_helper+0x861/0x5450
[   28.971052]  ? kasan_atomics_helper+0x861/0x5450
[   28.971613]  kasan_check_range+0x10c/0x1c0
[   28.972225]  __kasan_check_write+0x18/0x20
[   28.972660]  kasan_atomics_helper+0x861/0x5450
[   28.973370]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   28.973991]  ? __kmalloc_cache_noprof+0x184/0x410
[   28.974539]  ? trace_hardirqs_on+0x37/0xe0
[   28.975101]  ? kasan_atomics+0x153/0x310
[   28.975541]  kasan_atomics+0x1dd/0x310
[   28.976035]  ? __pfx_kasan_atomics+0x10/0x10
[   28.976532]  ? __pfx_kasan_atomics+0x10/0x10
[   28.976949]  kunit_try_run_case+0x1b3/0x490
[   28.977734]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.978232]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   28.979005]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   28.979687]  ? __kthread_parkme+0x82/0x160
[   28.980259]  ? preempt_count_sub+0x50/0x80
[   28.980999]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.981701]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   28.982532]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.983203]  kthread+0x257/0x310
[   28.983535]  ? __pfx_kthread+0x10/0x10
[   28.983990]  ret_from_fork+0x41/0x80
[   28.984477]  ? __pfx_kthread+0x10/0x10
[   28.984952]  ret_from_fork_asm+0x1a/0x30
[   28.985368]  </TASK>
[   28.985707] 
[   28.986051] Allocated by task 273:
[   28.986307]  kasan_save_stack+0x3d/0x60
[   28.986777]  kasan_save_track+0x18/0x40
[   28.987502]  kasan_save_alloc_info+0x3b/0x50
[   28.988054]  __kasan_kmalloc+0xb7/0xc0
[   28.988538]  __kmalloc_cache_noprof+0x184/0x410
[   28.988858]  kasan_atomics+0x96/0x310
[   28.989877]  kunit_try_run_case+0x1b3/0x490
[   28.990359]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.990982]  kthread+0x257/0x310
[   28.991328]  ret_from_fork+0x41/0x80
[   28.991690]  ret_from_fork_asm+0x1a/0x30
[   28.992286] 
[   28.992522] The buggy address belongs to the object at ffff888102486200
[   28.992522]  which belongs to the cache kmalloc-64 of size 64
[   28.993560] The buggy address is located 0 bytes to the right of
[   28.993560]  allocated 48-byte region [ffff888102486200, ffff888102486230)
[   28.994744] 
[   28.994920] The buggy address belongs to the physical page:
[   28.995781] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102486
[   28.996716] flags: 0x200000000000000(node=0|zone=2)
[   28.997159] page_type: f5(slab)
[   28.997609] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   28.998418] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   28.999192] page dumped because: kasan: bad access detected
[   28.999740] 
[   29.000044] Memory state around the buggy address:
[   29.000556]  ffff888102486100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.001376]  ffff888102486180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.001962] >ffff888102486200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   29.002666]                                      ^
[   29.003202]  ffff888102486280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.003763]  ffff888102486300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.004731] ==================================================================
[   28.815205] ==================================================================
[   28.816126] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x698/0x5450
[   28.816762] Write of size 4 at addr ffff888102486230 by task kunit_try_catch/273
[   28.817367] 
[   28.817575] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241206 #1
[   28.818554] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.818981] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   28.819742] Call Trace:
[   28.820070]  <TASK>
[   28.820412]  dump_stack_lvl+0x73/0xb0
[   28.820796]  print_report+0xd1/0x640
[   28.821332]  ? __virt_addr_valid+0x1db/0x2d0
[   28.822015]  ? kasan_complete_mode_report_info+0x2a/0x200
[   28.822526]  kasan_report+0x102/0x140
[   28.823017]  ? kasan_atomics_helper+0x698/0x5450
[   28.823405]  ? kasan_atomics_helper+0x698/0x5450
[   28.823996]  kasan_check_range+0x10c/0x1c0
[   28.824449]  __kasan_check_write+0x18/0x20
[   28.824820]  kasan_atomics_helper+0x698/0x5450
[   28.825347]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   28.825977]  ? __kmalloc_cache_noprof+0x184/0x410
[   28.826408]  ? trace_hardirqs_on+0x37/0xe0
[   28.826880]  ? kasan_atomics+0x153/0x310
[   28.827346]  kasan_atomics+0x1dd/0x310
[   28.827685]  ? __pfx_kasan_atomics+0x10/0x10
[   28.828273]  ? __pfx_kasan_atomics+0x10/0x10
[   28.828756]  kunit_try_run_case+0x1b3/0x490
[   28.829238]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.829839]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   28.830337]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   28.830701]  ? __kthread_parkme+0x82/0x160
[   28.831282]  ? preempt_count_sub+0x50/0x80
[   28.831807]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.832319]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   28.832918]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.833583]  kthread+0x257/0x310
[   28.833989]  ? __pfx_kthread+0x10/0x10
[   28.834333]  ret_from_fork+0x41/0x80
[   28.834740]  ? __pfx_kthread+0x10/0x10
[   28.835308]  ret_from_fork_asm+0x1a/0x30
[   28.835800]  </TASK>
[   28.836302] 
[   28.836665] Allocated by task 273:
[   28.837573]  kasan_save_stack+0x3d/0x60
[   28.838119]  kasan_save_track+0x18/0x40
[   28.838450]  kasan_save_alloc_info+0x3b/0x50
[   28.838750]  __kasan_kmalloc+0xb7/0xc0
[   28.839720]  __kmalloc_cache_noprof+0x184/0x410
[   28.840467]  kasan_atomics+0x96/0x310
[   28.840984]  kunit_try_run_case+0x1b3/0x490
[   28.841647]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.842146]  kthread+0x257/0x310
[   28.842432]  ret_from_fork+0x41/0x80
[   28.843108]  ret_from_fork_asm+0x1a/0x30
[   28.843843] 
[   28.844033] The buggy address belongs to the object at ffff888102486200
[   28.844033]  which belongs to the cache kmalloc-64 of size 64
[   28.845427] The buggy address is located 0 bytes to the right of
[   28.845427]  allocated 48-byte region [ffff888102486200, ffff888102486230)
[   28.847178] 
[   28.847625] The buggy address belongs to the physical page:
[   28.848472] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102486
[   28.849232] flags: 0x200000000000000(node=0|zone=2)
[   28.849831] page_type: f5(slab)
[   28.850558] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   28.851423] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   28.852427] page dumped because: kasan: bad access detected
[   28.853065] 
[   28.853662] Memory state around the buggy address:
[   28.854053]  ffff888102486100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.855181]  ffff888102486180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.856159] >ffff888102486200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   28.856802]                                      ^
[   28.857716]  ffff888102486280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.858873]  ffff888102486300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.859966] ==================================================================
[   28.431269] ==================================================================
[   28.432372] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b8a/0x5450
[   28.433994] Read of size 4 at addr ffff888102486230 by task kunit_try_catch/273
[   28.435082] 
[   28.435355] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241206 #1
[   28.436267] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.437644] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   28.438561] Call Trace:
[   28.439085]  <TASK>
[   28.439333]  dump_stack_lvl+0x73/0xb0
[   28.440050]  print_report+0xd1/0x640
[   28.440505]  ? __virt_addr_valid+0x1db/0x2d0
[   28.441160]  ? kasan_complete_mode_report_info+0x2a/0x200
[   28.441539]  kasan_report+0x102/0x140
[   28.442077]  ? kasan_atomics_helper+0x4b8a/0x5450
[   28.442515]  ? kasan_atomics_helper+0x4b8a/0x5450
[   28.443172]  __asan_report_load4_noabort+0x18/0x20
[   28.443719]  kasan_atomics_helper+0x4b8a/0x5450
[   28.444177]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   28.444603]  ? __kmalloc_cache_noprof+0x184/0x410
[   28.445252]  ? trace_hardirqs_on+0x37/0xe0
[   28.445829]  ? kasan_atomics+0x153/0x310
[   28.446400]  kasan_atomics+0x1dd/0x310
[   28.446835]  ? __pfx_kasan_atomics+0x10/0x10
[   28.447512]  ? __pfx_kasan_atomics+0x10/0x10
[   28.447897]  kunit_try_run_case+0x1b3/0x490
[   28.448468]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.448994]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   28.449422]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   28.450137]  ? __kthread_parkme+0x82/0x160
[   28.450595]  ? preempt_count_sub+0x50/0x80
[   28.451089]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.451795]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   28.452439]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.452920]  kthread+0x257/0x310
[   28.453535]  ? __pfx_kthread+0x10/0x10
[   28.453973]  ret_from_fork+0x41/0x80
[   28.454252]  ? __pfx_kthread+0x10/0x10
[   28.454904]  ret_from_fork_asm+0x1a/0x30
[   28.455595]  </TASK>
[   28.456014] 
[   28.456292] Allocated by task 273:
[   28.456669]  kasan_save_stack+0x3d/0x60
[   28.457188]  kasan_save_track+0x18/0x40
[   28.457800]  kasan_save_alloc_info+0x3b/0x50
[   28.458123]  __kasan_kmalloc+0xb7/0xc0
[   28.458659]  __kmalloc_cache_noprof+0x184/0x410
[   28.459352]  kasan_atomics+0x96/0x310
[   28.459727]  kunit_try_run_case+0x1b3/0x490
[   28.460308]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.460981]  kthread+0x257/0x310
[   28.461251]  ret_from_fork+0x41/0x80
[   28.461593]  ret_from_fork_asm+0x1a/0x30
[   28.462212] 
[   28.462607] The buggy address belongs to the object at ffff888102486200
[   28.462607]  which belongs to the cache kmalloc-64 of size 64
[   28.463739] The buggy address is located 0 bytes to the right of
[   28.463739]  allocated 48-byte region [ffff888102486200, ffff888102486230)
[   28.465435] 
[   28.465883] The buggy address belongs to the physical page:
[   28.466746] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102486
[   28.467732] flags: 0x200000000000000(node=0|zone=2)
[   28.469253] page_type: f5(slab)
[   28.469659] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   28.471167] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   28.471778] page dumped because: kasan: bad access detected
[   28.472689] 
[   28.472992] Memory state around the buggy address:
[   28.473849]  ffff888102486100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.474597]  ffff888102486180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.475553] >ffff888102486200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   28.476129]                                      ^
[   28.476908]  ffff888102486280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.477757]  ffff888102486300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.478843] ==================================================================
[   29.302207] ==================================================================
[   29.302772] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a86/0x5450
[   29.303476] Read of size 4 at addr ffff888102486230 by task kunit_try_catch/273
[   29.304583] 
[   29.304743] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241206 #1
[   29.305923] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.306225] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   29.307483] Call Trace:
[   29.307730]  <TASK>
[   29.308282]  dump_stack_lvl+0x73/0xb0
[   29.308713]  print_report+0xd1/0x640
[   29.309130]  ? __virt_addr_valid+0x1db/0x2d0
[   29.309534]  ? kasan_complete_mode_report_info+0x2a/0x200
[   29.309916]  kasan_report+0x102/0x140
[   29.310636]  ? kasan_atomics_helper+0x4a86/0x5450
[   29.311288]  ? kasan_atomics_helper+0x4a86/0x5450
[   29.311655]  __asan_report_load4_noabort+0x18/0x20
[   29.312085]  kasan_atomics_helper+0x4a86/0x5450
[   29.312667]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   29.313339]  ? __kmalloc_cache_noprof+0x184/0x410
[   29.313833]  ? trace_hardirqs_on+0x37/0xe0
[   29.314500]  ? kasan_atomics+0x153/0x310
[   29.314825]  kasan_atomics+0x1dd/0x310
[   29.315429]  ? __pfx_kasan_atomics+0x10/0x10
[   29.315876]  ? __pfx_kasan_atomics+0x10/0x10
[   29.316226]  kunit_try_run_case+0x1b3/0x490
[   29.316766]  ? __pfx_kunit_try_run_case+0x10/0x10
[   29.317405]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   29.318148]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   29.318708]  ? __kthread_parkme+0x82/0x160
[   29.319046]  ? preempt_count_sub+0x50/0x80
[   29.319596]  ? __pfx_kunit_try_run_case+0x10/0x10
[   29.320223]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   29.320644]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   29.321067]  kthread+0x257/0x310
[   29.321380]  ? __pfx_kthread+0x10/0x10
[   29.321960]  ret_from_fork+0x41/0x80
[   29.322578]  ? __pfx_kthread+0x10/0x10
[   29.323129]  ret_from_fork_asm+0x1a/0x30
[   29.323725]  </TASK>
[   29.324015] 
[   29.324343] Allocated by task 273:
[   29.324809]  kasan_save_stack+0x3d/0x60
[   29.325284]  kasan_save_track+0x18/0x40
[   29.325599]  kasan_save_alloc_info+0x3b/0x50
[   29.325947]  __kasan_kmalloc+0xb7/0xc0
[   29.326421]  __kmalloc_cache_noprof+0x184/0x410
[   29.327102]  kasan_atomics+0x96/0x310
[   29.327494]  kunit_try_run_case+0x1b3/0x490
[   29.328005]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   29.328470]  kthread+0x257/0x310
[   29.328731]  ret_from_fork+0x41/0x80
[   29.329078]  ret_from_fork_asm+0x1a/0x30
[   29.329601] 
[   29.329908] The buggy address belongs to the object at ffff888102486200
[   29.329908]  which belongs to the cache kmalloc-64 of size 64
[   29.331496] The buggy address is located 0 bytes to the right of
[   29.331496]  allocated 48-byte region [ffff888102486200, ffff888102486230)
[   29.332684] 
[   29.332852] The buggy address belongs to the physical page:
[   29.333370] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102486
[   29.334289] flags: 0x200000000000000(node=0|zone=2)
[   29.334645] page_type: f5(slab)
[   29.334907] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   29.335732] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   29.336669] page dumped because: kasan: bad access detected
[   29.337207] 
[   29.337381] Memory state around the buggy address:
[   29.337692]  ffff888102486100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.338371]  ffff888102486180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.339271] >ffff888102486200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   29.340237]                                      ^
[   29.340692]  ffff888102486280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.341319]  ffff888102486300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.342214] ==================================================================
[   28.314248] ==================================================================
[   28.315741] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4bbe/0x5450
[   28.316823] Read of size 4 at addr ffff888102486230 by task kunit_try_catch/273
[   28.318322] 
[   28.318622] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241206 #1
[   28.320113] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.320866] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   28.322429] Call Trace:
[   28.322688]  <TASK>
[   28.323192]  dump_stack_lvl+0x73/0xb0
[   28.323660]  print_report+0xd1/0x640
[   28.324350]  ? __virt_addr_valid+0x1db/0x2d0
[   28.325016]  ? kasan_complete_mode_report_info+0x2a/0x200
[   28.325726]  kasan_report+0x102/0x140
[   28.326210]  ? kasan_atomics_helper+0x4bbe/0x5450
[   28.326969]  ? kasan_atomics_helper+0x4bbe/0x5450
[   28.327663]  __asan_report_load4_noabort+0x18/0x20
[   28.328144]  kasan_atomics_helper+0x4bbe/0x5450
[   28.328647]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   28.329826]  ? __kmalloc_cache_noprof+0x184/0x410
[   28.330459]  ? trace_hardirqs_on+0x37/0xe0
[   28.330778]  ? kasan_atomics+0x153/0x310
[   28.331830]  kasan_atomics+0x1dd/0x310
[   28.332683]  ? __pfx_kasan_atomics+0x10/0x10
[   28.333082]  ? __pfx_kasan_atomics+0x10/0x10
[   28.334122]  kunit_try_run_case+0x1b3/0x490
[   28.335256]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.336217]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   28.336751]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   28.337457]  ? __kthread_parkme+0x82/0x160
[   28.338295]  ? preempt_count_sub+0x50/0x80
[   28.338724]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.339405]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   28.340513]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.341343]  kthread+0x257/0x310
[   28.341710]  ? __pfx_kthread+0x10/0x10
[   28.342191]  ret_from_fork+0x41/0x80
[   28.343294]  ? __pfx_kthread+0x10/0x10
[   28.343883]  ret_from_fork_asm+0x1a/0x30
[   28.344816]  </TASK>
[   28.345425] 
[   28.345914] Allocated by task 273:
[   28.346281]  kasan_save_stack+0x3d/0x60
[   28.346967]  kasan_save_track+0x18/0x40
[   28.348121]  kasan_save_alloc_info+0x3b/0x50
[   28.348483]  __kasan_kmalloc+0xb7/0xc0
[   28.348898]  __kmalloc_cache_noprof+0x184/0x410
[   28.350265]  kasan_atomics+0x96/0x310
[   28.351025]  kunit_try_run_case+0x1b3/0x490
[   28.351951]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.352609]  kthread+0x257/0x310
[   28.353257]  ret_from_fork+0x41/0x80
[   28.353701]  ret_from_fork_asm+0x1a/0x30
[   28.354611] 
[   28.354842] The buggy address belongs to the object at ffff888102486200
[   28.354842]  which belongs to the cache kmalloc-64 of size 64
[   28.357500] The buggy address is located 0 bytes to the right of
[   28.357500]  allocated 48-byte region [ffff888102486200, ffff888102486230)
[   28.359353] 
[   28.359603] The buggy address belongs to the physical page:
[   28.360059] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102486
[   28.361144] flags: 0x200000000000000(node=0|zone=2)
[   28.361727] page_type: f5(slab)
[   28.362127] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   28.363181] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   28.364554] page dumped because: kasan: bad access detected
[   28.365506] 
[   28.365817] Memory state around the buggy address:
[   28.367198]  ffff888102486100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.368100]  ffff888102486180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.368563] >ffff888102486200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   28.369673]                                      ^
[   28.370329]  ffff888102486280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.371789]  ffff888102486300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.373011] ==================================================================
[   29.388782] ==================================================================
[   29.389872] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xde1/0x5450
[   29.390626] Write of size 4 at addr ffff888102486230 by task kunit_try_catch/273
[   29.391340] 
[   29.391528] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241206 #1
[   29.392804] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.393414] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   29.394278] Call Trace:
[   29.394526]  <TASK>
[   29.394774]  dump_stack_lvl+0x73/0xb0
[   29.395551]  print_report+0xd1/0x640
[   29.396202]  ? __virt_addr_valid+0x1db/0x2d0
[   29.396691]  ? kasan_complete_mode_report_info+0x2a/0x200
[   29.397158]  kasan_report+0x102/0x140
[   29.397963]  ? kasan_atomics_helper+0xde1/0x5450
[   29.398660]  ? kasan_atomics_helper+0xde1/0x5450
[   29.399034]  kasan_check_range+0x10c/0x1c0
[   29.399423]  __kasan_check_write+0x18/0x20
[   29.400093]  kasan_atomics_helper+0xde1/0x5450
[   29.400775]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   29.401580]  ? __kmalloc_cache_noprof+0x184/0x410
[   29.402148]  ? trace_hardirqs_on+0x37/0xe0
[   29.403057]  ? kasan_atomics+0x153/0x310
[   29.403390]  kasan_atomics+0x1dd/0x310
[   29.404119]  ? __pfx_kasan_atomics+0x10/0x10
[   29.404756]  ? __pfx_kasan_atomics+0x10/0x10
[   29.405325]  kunit_try_run_case+0x1b3/0x490
[   29.405992]  ? __pfx_kunit_try_run_case+0x10/0x10
[   29.406440]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   29.407130]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   29.407668]  ? __kthread_parkme+0x82/0x160
[   29.408198]  ? preempt_count_sub+0x50/0x80
[   29.408641]  ? __pfx_kunit_try_run_case+0x10/0x10
[   29.409341]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   29.410153]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   29.410678]  kthread+0x257/0x310
[   29.411066]  ? __pfx_kthread+0x10/0x10
[   29.411606]  ret_from_fork+0x41/0x80
[   29.412108]  ? __pfx_kthread+0x10/0x10
[   29.412481]  ret_from_fork_asm+0x1a/0x30
[   29.412999]  </TASK>
[   29.413206] 
[   29.413369] Allocated by task 273:
[   29.413841]  kasan_save_stack+0x3d/0x60
[   29.414519]  kasan_save_track+0x18/0x40
[   29.415146]  kasan_save_alloc_info+0x3b/0x50
[   29.415632]  __kasan_kmalloc+0xb7/0xc0
[   29.415910]  __kmalloc_cache_noprof+0x184/0x410
[   29.416258]  kasan_atomics+0x96/0x310
[   29.416923]  kunit_try_run_case+0x1b3/0x490
[   29.417609]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   29.418374]  kthread+0x257/0x310
[   29.418851]  ret_from_fork+0x41/0x80
[   29.419199]  ret_from_fork_asm+0x1a/0x30
[   29.419754] 
[   29.420070] The buggy address belongs to the object at ffff888102486200
[   29.420070]  which belongs to the cache kmalloc-64 of size 64
[   29.421199] The buggy address is located 0 bytes to the right of
[   29.421199]  allocated 48-byte region [ffff888102486200, ffff888102486230)
[   29.422551] 
[   29.422972] The buggy address belongs to the physical page:
[   29.423573] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102486
[   29.424473] flags: 0x200000000000000(node=0|zone=2)
[   29.424834] page_type: f5(slab)
[   29.425178] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   29.426195] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   29.427228] page dumped because: kasan: bad access detected
[   29.427884] 
[   29.428105] Memory state around the buggy address:
[   29.428631]  ffff888102486100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.429155]  ffff888102486180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.430040] >ffff888102486200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   29.430791]                                      ^
[   29.431149]  ffff888102486280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.431884]  ffff888102486300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.432805] ==================================================================
[   30.963448] ==================================================================
[   30.964042] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1e13/0x5450
[   30.965749] Write of size 8 at addr ffff888102486230 by task kunit_try_catch/273
[   30.966561] 
[   30.967462] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241206 #1
[   30.968421] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.969191] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   30.970249] Call Trace:
[   30.970637]  <TASK>
[   30.971419]  dump_stack_lvl+0x73/0xb0
[   30.971872]  print_report+0xd1/0x640
[   30.972807]  ? __virt_addr_valid+0x1db/0x2d0
[   30.973254]  ? kasan_complete_mode_report_info+0x2a/0x200
[   30.973846]  kasan_report+0x102/0x140
[   30.974582]  ? kasan_atomics_helper+0x1e13/0x5450
[   30.975300]  ? kasan_atomics_helper+0x1e13/0x5450
[   30.975817]  kasan_check_range+0x10c/0x1c0
[   30.976579]  __kasan_check_write+0x18/0x20
[   30.977385]  kasan_atomics_helper+0x1e13/0x5450
[   30.977867]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   30.978671]  ? __kmalloc_cache_noprof+0x184/0x410
[   30.979506]  ? trace_hardirqs_on+0x37/0xe0
[   30.980178]  ? kasan_atomics+0x153/0x310
[   30.980875]  kasan_atomics+0x1dd/0x310
[   30.981741]  ? __pfx_kasan_atomics+0x10/0x10
[   30.982238]  ? __pfx_kasan_atomics+0x10/0x10
[   30.982734]  kunit_try_run_case+0x1b3/0x490
[   30.983431]  ? __pfx_kunit_try_run_case+0x10/0x10
[   30.984196]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   30.984675]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   30.985495]  ? __kthread_parkme+0x82/0x160
[   30.986028]  ? preempt_count_sub+0x50/0x80
[   30.986858]  ? __pfx_kunit_try_run_case+0x10/0x10
[   30.987629]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   30.988214]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   30.988727]  kthread+0x257/0x310
[   30.989254]  ? __pfx_kthread+0x10/0x10
[   30.989660]  ret_from_fork+0x41/0x80
[   30.990158]  ? __pfx_kthread+0x10/0x10
[   30.990597]  ret_from_fork_asm+0x1a/0x30
[   30.991284]  </TASK>
[   30.991491] 
[   30.991774] Allocated by task 273:
[   30.992291]  kasan_save_stack+0x3d/0x60
[   30.993461]  kasan_save_track+0x18/0x40
[   30.993895]  kasan_save_alloc_info+0x3b/0x50
[   30.994447]  __kasan_kmalloc+0xb7/0xc0
[   30.994926]  __kmalloc_cache_noprof+0x184/0x410
[   30.995667]  kasan_atomics+0x96/0x310
[   30.995999]  kunit_try_run_case+0x1b3/0x490
[   30.997210]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   30.997825]  kthread+0x257/0x310
[   30.998724]  ret_from_fork+0x41/0x80
[   30.999292]  ret_from_fork_asm+0x1a/0x30
[   31.000020] 
[   31.000278] The buggy address belongs to the object at ffff888102486200
[   31.000278]  which belongs to the cache kmalloc-64 of size 64
[   31.001886] The buggy address is located 0 bytes to the right of
[   31.001886]  allocated 48-byte region [ffff888102486200, ffff888102486230)
[   31.003339] 
[   31.003883] The buggy address belongs to the physical page:
[   31.004490] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102486
[   31.005575] flags: 0x200000000000000(node=0|zone=2)
[   31.006357] page_type: f5(slab)
[   31.006775] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   31.007773] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   31.008564] page dumped because: kasan: bad access detected
[   31.009562] 
[   31.009718] Memory state around the buggy address:
[   31.010307]  ffff888102486100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   31.011652]  ffff888102486180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   31.012322] >ffff888102486200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   31.013518]                                      ^
[   31.014128]  ffff888102486280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.015478]  ffff888102486300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.016311] ==================================================================
[   28.671833] ==================================================================
[   28.673217] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b3c/0x5450
[   28.673869] Write of size 4 at addr ffff888102486230 by task kunit_try_catch/273
[   28.675184] 
[   28.675562] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241206 #1
[   28.676645] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.677263] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   28.678194] Call Trace:
[   28.678407]  <TASK>
[   28.678719]  dump_stack_lvl+0x73/0xb0
[   28.679123]  print_report+0xd1/0x640
[   28.680194]  ? __virt_addr_valid+0x1db/0x2d0
[   28.680601]  ? kasan_complete_mode_report_info+0x2a/0x200
[   28.681254]  kasan_report+0x102/0x140
[   28.681891]  ? kasan_atomics_helper+0x4b3c/0x5450
[   28.682692]  ? kasan_atomics_helper+0x4b3c/0x5450
[   28.683379]  __asan_report_store4_noabort+0x1b/0x30
[   28.683816]  kasan_atomics_helper+0x4b3c/0x5450
[   28.684696]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   28.685286]  ? __kmalloc_cache_noprof+0x184/0x410
[   28.685766]  ? trace_hardirqs_on+0x37/0xe0
[   28.687004]  ? kasan_atomics+0x153/0x310
[   28.687624]  kasan_atomics+0x1dd/0x310
[   28.688260]  ? __pfx_kasan_atomics+0x10/0x10
[   28.688671]  ? __pfx_kasan_atomics+0x10/0x10
[   28.689560]  kunit_try_run_case+0x1b3/0x490
[   28.690018]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.690560]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   28.691058]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   28.691972]  ? __kthread_parkme+0x82/0x160
[   28.692643]  ? preempt_count_sub+0x50/0x80
[   28.693245]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.693732]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   28.694612]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.695038]  kthread+0x257/0x310
[   28.695831]  ? __pfx_kthread+0x10/0x10
[   28.696436]  ret_from_fork+0x41/0x80
[   28.696777]  ? __pfx_kthread+0x10/0x10
[   28.697203]  ret_from_fork_asm+0x1a/0x30
[   28.698046]  </TASK>
[   28.698505] 
[   28.698673] Allocated by task 273:
[   28.699457]  kasan_save_stack+0x3d/0x60
[   28.700009]  kasan_save_track+0x18/0x40
[   28.700438]  kasan_save_alloc_info+0x3b/0x50
[   28.701233]  __kasan_kmalloc+0xb7/0xc0
[   28.701608]  __kmalloc_cache_noprof+0x184/0x410
[   28.702058]  kasan_atomics+0x96/0x310
[   28.702407]  kunit_try_run_case+0x1b3/0x490
[   28.702785]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.704023]  kthread+0x257/0x310
[   28.704425]  ret_from_fork+0x41/0x80
[   28.705025]  ret_from_fork_asm+0x1a/0x30
[   28.705660] 
[   28.705985] The buggy address belongs to the object at ffff888102486200
[   28.705985]  which belongs to the cache kmalloc-64 of size 64
[   28.707242] The buggy address is located 0 bytes to the right of
[   28.707242]  allocated 48-byte region [ffff888102486200, ffff888102486230)
[   28.708581] 
[   28.709009] The buggy address belongs to the physical page:
[   28.709647] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102486
[   28.710543] flags: 0x200000000000000(node=0|zone=2)
[   28.711243] page_type: f5(slab)
[   28.711779] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   28.712689] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   28.713552] page dumped because: kasan: bad access detected
[   28.714090] 
[   28.714448] Memory state around the buggy address:
[   28.715136]  ffff888102486100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.715774]  ffff888102486180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.716540] >ffff888102486200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   28.717621]                                      ^
[   28.717848]  ffff888102486280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.718241]  ffff888102486300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.719249] ==================================================================
[   30.553642] ==================================================================
[   30.554155] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x194b/0x5450
[   30.555540] Write of size 8 at addr ffff888102486230 by task kunit_try_catch/273
[   30.556494] 
[   30.556696] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241206 #1
[   30.557360] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.558374] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   30.559570] Call Trace:
[   30.560139]  <TASK>
[   30.560549]  dump_stack_lvl+0x73/0xb0
[   30.561245]  print_report+0xd1/0x640
[   30.561711]  ? __virt_addr_valid+0x1db/0x2d0
[   30.562192]  ? kasan_complete_mode_report_info+0x2a/0x200
[   30.563157]  kasan_report+0x102/0x140
[   30.563791]  ? kasan_atomics_helper+0x194b/0x5450
[   30.564512]  ? kasan_atomics_helper+0x194b/0x5450
[   30.565235]  kasan_check_range+0x10c/0x1c0
[   30.565704]  __kasan_check_write+0x18/0x20
[   30.566177]  kasan_atomics_helper+0x194b/0x5450
[   30.566846]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   30.567496]  ? __kmalloc_cache_noprof+0x184/0x410
[   30.568138]  ? trace_hardirqs_on+0x37/0xe0
[   30.568565]  ? kasan_atomics+0x153/0x310
[   30.569063]  kasan_atomics+0x1dd/0x310
[   30.569539]  ? __pfx_kasan_atomics+0x10/0x10
[   30.570255]  ? __pfx_kasan_atomics+0x10/0x10
[   30.570888]  kunit_try_run_case+0x1b3/0x490
[   30.571393]  ? __pfx_kunit_try_run_case+0x10/0x10
[   30.572057]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   30.572798]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   30.573478]  ? __kthread_parkme+0x82/0x160
[   30.574153]  ? preempt_count_sub+0x50/0x80
[   30.574669]  ? __pfx_kunit_try_run_case+0x10/0x10
[   30.575278]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   30.575966]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   30.576696]  kthread+0x257/0x310
[   30.577152]  ? __pfx_kthread+0x10/0x10
[   30.577677]  ret_from_fork+0x41/0x80
[   30.578044]  ? __pfx_kthread+0x10/0x10
[   30.578686]  ret_from_fork_asm+0x1a/0x30
[   30.579251]  </TASK>
[   30.579563] 
[   30.579963] Allocated by task 273:
[   30.580420]  kasan_save_stack+0x3d/0x60
[   30.581076]  kasan_save_track+0x18/0x40
[   30.581565]  kasan_save_alloc_info+0x3b/0x50
[   30.582765]  __kasan_kmalloc+0xb7/0xc0
[   30.583544]  __kmalloc_cache_noprof+0x184/0x410
[   30.584261]  kasan_atomics+0x96/0x310
[   30.584841]  kunit_try_run_case+0x1b3/0x490
[   30.585475]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   30.586337]  kthread+0x257/0x310
[   30.586786]  ret_from_fork+0x41/0x80
[   30.587703]  ret_from_fork_asm+0x1a/0x30
[   30.588098] 
[   30.588331] The buggy address belongs to the object at ffff888102486200
[   30.588331]  which belongs to the cache kmalloc-64 of size 64
[   30.590060] The buggy address is located 0 bytes to the right of
[   30.590060]  allocated 48-byte region [ffff888102486200, ffff888102486230)
[   30.592092] 
[   30.592661] The buggy address belongs to the physical page:
[   30.593240] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102486
[   30.594053] flags: 0x200000000000000(node=0|zone=2)
[   30.594970] page_type: f5(slab)
[   30.595807] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   30.596671] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   30.597607] page dumped because: kasan: bad access detected
[   30.598410] 
[   30.598570] Memory state around the buggy address:
[   30.599141]  ffff888102486100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   30.600796]  ffff888102486180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   30.601573] >ffff888102486200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   30.602680]                                      ^
[   30.603137]  ffff888102486280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.603774]  ffff888102486300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.604736] ==================================================================
[   29.343410] ==================================================================
[   29.344696] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xd48/0x5450
[   29.345552] Write of size 4 at addr ffff888102486230 by task kunit_try_catch/273
[   29.346413] 
[   29.346656] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241206 #1
[   29.347498] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.348052] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   29.348579] Call Trace:
[   29.348800]  <TASK>
[   29.349031]  dump_stack_lvl+0x73/0xb0
[   29.349555]  print_report+0xd1/0x640
[   29.350135]  ? __virt_addr_valid+0x1db/0x2d0
[   29.350732]  ? kasan_complete_mode_report_info+0x2a/0x200
[   29.351260]  kasan_report+0x102/0x140
[   29.351555]  ? kasan_atomics_helper+0xd48/0x5450
[   29.351885]  ? kasan_atomics_helper+0xd48/0x5450
[   29.352745]  kasan_check_range+0x10c/0x1c0
[   29.353325]  __kasan_check_write+0x18/0x20
[   29.353901]  kasan_atomics_helper+0xd48/0x5450
[   29.354278]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   29.354965]  ? __kmalloc_cache_noprof+0x184/0x410
[   29.355470]  ? trace_hardirqs_on+0x37/0xe0
[   29.355797]  ? kasan_atomics+0x153/0x310
[   29.356129]  kasan_atomics+0x1dd/0x310
[   29.356642]  ? __pfx_kasan_atomics+0x10/0x10
[   29.357216]  ? __pfx_kasan_atomics+0x10/0x10
[   29.358147]  kunit_try_run_case+0x1b3/0x490
[   29.358604]  ? __pfx_kunit_try_run_case+0x10/0x10
[   29.358988]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   29.359906]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   29.360436]  ? __kthread_parkme+0x82/0x160
[   29.360751]  ? preempt_count_sub+0x50/0x80
[   29.361204]  ? __pfx_kunit_try_run_case+0x10/0x10
[   29.361848]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   29.362701]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   29.363412]  kthread+0x257/0x310
[   29.363831]  ? __pfx_kthread+0x10/0x10
[   29.364831]  ret_from_fork+0x41/0x80
[   29.365253]  ? __pfx_kthread+0x10/0x10
[   29.365607]  ret_from_fork_asm+0x1a/0x30
[   29.366662]  </TASK>
[   29.367623] 
[   29.368413] Allocated by task 273:
[   29.368798]  kasan_save_stack+0x3d/0x60
[   29.369236]  kasan_save_track+0x18/0x40
[   29.369648]  kasan_save_alloc_info+0x3b/0x50
[   29.370026]  __kasan_kmalloc+0xb7/0xc0
[   29.370301]  __kmalloc_cache_noprof+0x184/0x410
[   29.371018]  kasan_atomics+0x96/0x310
[   29.371567]  kunit_try_run_case+0x1b3/0x490
[   29.371877]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   29.372603]  kthread+0x257/0x310
[   29.373160]  ret_from_fork+0x41/0x80
[   29.373639]  ret_from_fork_asm+0x1a/0x30
[   29.373981] 
[   29.374150] The buggy address belongs to the object at ffff888102486200
[   29.374150]  which belongs to the cache kmalloc-64 of size 64
[   29.375653] The buggy address is located 0 bytes to the right of
[   29.375653]  allocated 48-byte region [ffff888102486200, ffff888102486230)
[   29.376536] 
[   29.376741] The buggy address belongs to the physical page:
[   29.377542] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102486
[   29.378397] flags: 0x200000000000000(node=0|zone=2)
[   29.378889] page_type: f5(slab)
[   29.379556] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   29.380458] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   29.381180] page dumped because: kasan: bad access detected
[   29.381570] 
[   29.381730] Memory state around the buggy address:
[   29.382124]  ffff888102486100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.383129]  ffff888102486180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.383863] >ffff888102486200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   29.384911]                                      ^
[   29.385550]  ffff888102486280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.386351]  ffff888102486300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.386912] ==================================================================
[   30.655377] ==================================================================
[   30.656200] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1a80/0x5450
[   30.657164] Write of size 8 at addr ffff888102486230 by task kunit_try_catch/273
[   30.658121] 
[   30.658316] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241206 #1
[   30.659519] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.659823] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   30.661127] Call Trace:
[   30.661561]  <TASK>
[   30.661798]  dump_stack_lvl+0x73/0xb0
[   30.662446]  print_report+0xd1/0x640
[   30.663196]  ? __virt_addr_valid+0x1db/0x2d0
[   30.663724]  ? kasan_complete_mode_report_info+0x2a/0x200
[   30.664485]  kasan_report+0x102/0x140
[   30.665246]  ? kasan_atomics_helper+0x1a80/0x5450
[   30.665920]  ? kasan_atomics_helper+0x1a80/0x5450
[   30.666707]  kasan_check_range+0x10c/0x1c0
[   30.667070]  __kasan_check_write+0x18/0x20
[   30.667534]  kasan_atomics_helper+0x1a80/0x5450
[   30.668010]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   30.668880]  ? __kmalloc_cache_noprof+0x184/0x410
[   30.669245]  ? trace_hardirqs_on+0x37/0xe0
[   30.669730]  ? kasan_atomics+0x153/0x310
[   30.670380]  kasan_atomics+0x1dd/0x310
[   30.670993]  ? __pfx_kasan_atomics+0x10/0x10
[   30.671585]  ? __pfx_kasan_atomics+0x10/0x10
[   30.672088]  kunit_try_run_case+0x1b3/0x490
[   30.672503]  ? __pfx_kunit_try_run_case+0x10/0x10
[   30.673096]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   30.673714]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   30.674369]  ? __kthread_parkme+0x82/0x160
[   30.674979]  ? preempt_count_sub+0x50/0x80
[   30.675403]  ? __pfx_kunit_try_run_case+0x10/0x10
[   30.675740]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   30.676606]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   30.677321]  kthread+0x257/0x310
[   30.677643]  ? __pfx_kthread+0x10/0x10
[   30.678328]  ret_from_fork+0x41/0x80
[   30.679026]  ? __pfx_kthread+0x10/0x10
[   30.679469]  ret_from_fork_asm+0x1a/0x30
[   30.679989]  </TASK>
[   30.680307] 
[   30.680624] Allocated by task 273:
[   30.681997]  kasan_save_stack+0x3d/0x60
[   30.682578]  kasan_save_track+0x18/0x40
[   30.683004]  kasan_save_alloc_info+0x3b/0x50
[   30.684021]  __kasan_kmalloc+0xb7/0xc0
[   30.684453]  __kmalloc_cache_noprof+0x184/0x410
[   30.684855]  kasan_atomics+0x96/0x310
[   30.686019]  kunit_try_run_case+0x1b3/0x490
[   30.686664]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   30.687699]  kthread+0x257/0x310
[   30.688049]  ret_from_fork+0x41/0x80
[   30.688568]  ret_from_fork_asm+0x1a/0x30
[   30.689064] 
[   30.689549] The buggy address belongs to the object at ffff888102486200
[   30.689549]  which belongs to the cache kmalloc-64 of size 64
[   30.690900] The buggy address is located 0 bytes to the right of
[   30.690900]  allocated 48-byte region [ffff888102486200, ffff888102486230)
[   30.692378] 
[   30.693068] The buggy address belongs to the physical page:
[   30.693459] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102486
[   30.694387] flags: 0x200000000000000(node=0|zone=2)
[   30.694859] page_type: f5(slab)
[   30.695805] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   30.696863] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   30.697864] page dumped because: kasan: bad access detected
[   30.698757] 
[   30.699015] Memory state around the buggy address:
[   30.699424]  ffff888102486100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   30.700956]  ffff888102486180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   30.701676] >ffff888102486200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   30.702921]                                      ^
[   30.703607]  ffff888102486280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.704359]  ffff888102486300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.705465] ==================================================================