Hay
Date
Dec. 9, 2024, 6:35 a.m.

Environment
qemu-arm64
qemu-x86_64

[   28.813001] ==================================================================
[   28.814322] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xad4/0x4858
[   28.815674] Write of size 4 at addr fff00000c12e87b0 by task kunit_try_catch/253
[   28.816732] 
[   28.817036] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc2-next-20241209 #1
[   28.818540] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.819056] Hardware name: linux,dummy-virt (DT)
[   28.819577] Call trace:
[   28.820125]  show_stack+0x20/0x38 (C)
[   28.821000]  dump_stack_lvl+0x8c/0xd0
[   28.821560]  print_report+0x118/0x5e0
[   28.822119]  kasan_report+0xc8/0x118
[   28.822651]  kasan_check_range+0x100/0x1a8
[   28.823339]  __kasan_check_write+0x20/0x30
[   28.823934]  kasan_atomics_helper+0xad4/0x4858
[   28.824590]  kasan_atomics+0x198/0x2e8
[   28.825152]  kunit_try_run_case+0x14c/0x3d0
[   28.825770]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   28.826441]  kthread+0x24c/0x2d0
[   28.826978]  ret_from_fork+0x10/0x20
[   28.827560] 
[   28.827902] Allocated by task 253:
[   28.828304]  kasan_save_stack+0x3c/0x68
[   28.828943]  kasan_save_track+0x20/0x40
[   28.829420]  kasan_save_alloc_info+0x40/0x58
[   28.830104]  __kasan_kmalloc+0xd4/0xd8
[   28.830618]  __kmalloc_cache_noprof+0x15c/0x3c0
[   28.831166]  kasan_atomics+0xb8/0x2e8
[   28.831795]  kunit_try_run_case+0x14c/0x3d0
[   28.832330]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   28.833074]  kthread+0x24c/0x2d0
[   28.833510]  ret_from_fork+0x10/0x20
[   28.834108] 
[   28.834411] The buggy address belongs to the object at fff00000c12e8780
[   28.834411]  which belongs to the cache kmalloc-64 of size 64
[   28.835720] The buggy address is located 0 bytes to the right of
[   28.835720]  allocated 48-byte region [fff00000c12e8780, fff00000c12e87b0)
[   28.836907] 
[   28.837274] The buggy address belongs to the physical page:
[   28.837955] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1012e8
[   28.838893] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   28.839659] page_type: f5(slab)
[   28.840144] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   28.840927] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   28.841840] page dumped because: kasan: bad access detected
[   28.842519] 
[   28.842864] Memory state around the buggy address:
[   28.843447]  fff00000c12e8680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.844164]  fff00000c12e8700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.845097] >fff00000c12e8780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   28.845936]                                      ^
[   28.846517]  fff00000c12e8800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.847306]  fff00000c12e8880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.848100] ==================================================================
[   30.103719] ==================================================================
[   30.104333] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e10/0x4858
[   30.105502] Read of size 8 at addr fff00000c12e87b0 by task kunit_try_catch/253
[   30.106248] 
[   30.106590] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc2-next-20241209 #1
[   30.107833] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.108345] Hardware name: linux,dummy-virt (DT)
[   30.108962] Call trace:
[   30.109388]  show_stack+0x20/0x38 (C)
[   30.109929]  dump_stack_lvl+0x8c/0xd0
[   30.110584]  print_report+0x118/0x5e0
[   30.111192]  kasan_report+0xc8/0x118
[   30.111780]  __asan_report_load8_noabort+0x20/0x30
[   30.112457]  kasan_atomics_helper+0x3e10/0x4858
[   30.113099]  kasan_atomics+0x198/0x2e8
[   30.113621]  kunit_try_run_case+0x14c/0x3d0
[   30.114235]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.114850]  kthread+0x24c/0x2d0
[   30.115355]  ret_from_fork+0x10/0x20
[   30.115894] 
[   30.116201] Allocated by task 253:
[   30.116774]  kasan_save_stack+0x3c/0x68
[   30.117372]  kasan_save_track+0x20/0x40
[   30.117919]  kasan_save_alloc_info+0x40/0x58
[   30.118475]  __kasan_kmalloc+0xd4/0xd8
[   30.119026]  __kmalloc_cache_noprof+0x15c/0x3c0
[   30.119655]  kasan_atomics+0xb8/0x2e8
[   30.120200]  kunit_try_run_case+0x14c/0x3d0
[   30.120866]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.121468]  kthread+0x24c/0x2d0
[   30.122018]  ret_from_fork+0x10/0x20
[   30.122557] 
[   30.122875] The buggy address belongs to the object at fff00000c12e8780
[   30.122875]  which belongs to the cache kmalloc-64 of size 64
[   30.124121] The buggy address is located 0 bytes to the right of
[   30.124121]  allocated 48-byte region [fff00000c12e8780, fff00000c12e87b0)
[   30.125439] 
[   30.125763] The buggy address belongs to the physical page:
[   30.126446] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1012e8
[   30.127391] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   30.128158] page_type: f5(slab)
[   30.128651] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   30.129504] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   30.130380] page dumped because: kasan: bad access detected
[   30.131031] 
[   30.131347] Memory state around the buggy address:
[   30.131914]  fff00000c12e8680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   30.132645]  fff00000c12e8700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   30.133467] >fff00000c12e8780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   30.134252]                                      ^
[   30.134842]  fff00000c12e8800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.135581]  fff00000c12e8880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.136424] ==================================================================
[   30.173548] ==================================================================
[   30.174322] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e20/0x4858
[   30.175243] Read of size 8 at addr fff00000c12e87b0 by task kunit_try_catch/253
[   30.176014] 
[   30.176534] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc2-next-20241209 #1
[   30.177783] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.178291] Hardware name: linux,dummy-virt (DT)
[   30.178916] Call trace:
[   30.179340]  show_stack+0x20/0x38 (C)
[   30.179902]  dump_stack_lvl+0x8c/0xd0
[   30.180433]  print_report+0x118/0x5e0
[   30.180981]  kasan_report+0xc8/0x118
[   30.181586]  __asan_report_load8_noabort+0x20/0x30
[   30.182194]  kasan_atomics_helper+0x3e20/0x4858
[   30.182869]  kasan_atomics+0x198/0x2e8
[   30.183448]  kunit_try_run_case+0x14c/0x3d0
[   30.184038]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.184728]  kthread+0x24c/0x2d0
[   30.185264]  ret_from_fork+0x10/0x20
[   30.185796] 
[   30.186141] Allocated by task 253:
[   30.186645]  kasan_save_stack+0x3c/0x68
[   30.187202]  kasan_save_track+0x20/0x40
[   30.187776]  kasan_save_alloc_info+0x40/0x58
[   30.188333]  __kasan_kmalloc+0xd4/0xd8
[   30.188878]  __kmalloc_cache_noprof+0x15c/0x3c0
[   30.189617]  kasan_atomics+0xb8/0x2e8
[   30.190155]  kunit_try_run_case+0x14c/0x3d0
[   30.190846]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.191443]  kthread+0x24c/0x2d0
[   30.192026]  ret_from_fork+0x10/0x20
[   30.192549] 
[   30.192892] The buggy address belongs to the object at fff00000c12e8780
[   30.192892]  which belongs to the cache kmalloc-64 of size 64
[   30.194090] The buggy address is located 0 bytes to the right of
[   30.194090]  allocated 48-byte region [fff00000c12e8780, fff00000c12e87b0)
[   30.195350] 
[   30.195743] The buggy address belongs to the physical page:
[   30.196317] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1012e8
[   30.197257] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   30.198071] page_type: f5(slab)
[   30.198731] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   30.199683] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   30.200632] page dumped because: kasan: bad access detected
[   30.201291] 
[   30.201596] Memory state around the buggy address:
[   30.202164]  fff00000c12e8680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   30.202948]  fff00000c12e8700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   30.203791] >fff00000c12e8780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   30.204554]                                      ^
[   30.205204]  fff00000c12e8800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.205992]  fff00000c12e8880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.206773] ==================================================================
[   29.715615] ==================================================================
[   29.716322] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1384/0x4858
[   29.717188] Write of size 8 at addr fff00000c12e87b0 by task kunit_try_catch/253
[   29.718249] 
[   29.718593] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc2-next-20241209 #1
[   29.719717] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.720235] Hardware name: linux,dummy-virt (DT)
[   29.720792] Call trace:
[   29.721239]  show_stack+0x20/0x38 (C)
[   29.721833]  dump_stack_lvl+0x8c/0xd0
[   29.722474]  print_report+0x118/0x5e0
[   29.723020]  kasan_report+0xc8/0x118
[   29.723587]  kasan_check_range+0x100/0x1a8
[   29.724291]  __kasan_check_write+0x20/0x30
[   29.724889]  kasan_atomics_helper+0x1384/0x4858
[   29.725452]  kasan_atomics+0x198/0x2e8
[   29.726079]  kunit_try_run_case+0x14c/0x3d0
[   29.726654]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.727421]  kthread+0x24c/0x2d0
[   29.727986]  ret_from_fork+0x10/0x20
[   29.728544] 
[   29.728875] Allocated by task 253:
[   29.729366]  kasan_save_stack+0x3c/0x68
[   29.729935]  kasan_save_track+0x20/0x40
[   29.730561]  kasan_save_alloc_info+0x40/0x58
[   29.731136]  __kasan_kmalloc+0xd4/0xd8
[   29.731724]  __kmalloc_cache_noprof+0x15c/0x3c0
[   29.732378]  kasan_atomics+0xb8/0x2e8
[   29.732975]  kunit_try_run_case+0x14c/0x3d0
[   29.733532]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.734287]  kthread+0x24c/0x2d0
[   29.734832]  ret_from_fork+0x10/0x20
[   29.735364] 
[   29.735713] The buggy address belongs to the object at fff00000c12e8780
[   29.735713]  which belongs to the cache kmalloc-64 of size 64
[   29.736918] The buggy address is located 0 bytes to the right of
[   29.736918]  allocated 48-byte region [fff00000c12e8780, fff00000c12e87b0)
[   29.738221] 
[   29.738548] The buggy address belongs to the physical page:
[   29.739277] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1012e8
[   29.740124] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   29.740887] page_type: f5(slab)
[   29.741413] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   29.742262] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   29.743138] page dumped because: kasan: bad access detected
[   29.743788] 
[   29.744123] Memory state around the buggy address:
[   29.744739]  fff00000c12e8680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.745777]  fff00000c12e8700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.746616] >fff00000c12e8780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   29.747585]                                      ^
[   29.748268]  fff00000c12e8800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.749168]  fff00000c12e8880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.749984] ==================================================================
[   27.888812] ==================================================================
[   27.890168] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x40a8/0x4858
[   27.891744] Read of size 4 at addr fff00000c12e87b0 by task kunit_try_catch/253
[   27.892639] 
[   27.893110] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc2-next-20241209 #1
[   27.894235] Tainted: [B]=BAD_PAGE, [N]=TEST
[   27.894864] Hardware name: linux,dummy-virt (DT)
[   27.895386] Call trace:
[   27.895812]  show_stack+0x20/0x38 (C)
[   27.896391]  dump_stack_lvl+0x8c/0xd0
[   27.897106]  print_report+0x118/0x5e0
[   27.897691]  kasan_report+0xc8/0x118
[   27.898303]  __asan_report_load4_noabort+0x20/0x30
[   27.899067]  kasan_atomics_helper+0x40a8/0x4858
[   27.899719]  kasan_atomics+0x198/0x2e8
[   27.900372]  kunit_try_run_case+0x14c/0x3d0
[   27.901011]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   27.901783]  kthread+0x24c/0x2d0
[   27.902343]  ret_from_fork+0x10/0x20
[   27.903019] 
[   27.903370] Allocated by task 253:
[   27.903873]  kasan_save_stack+0x3c/0x68
[   27.904568]  kasan_save_track+0x20/0x40
[   27.905189]  kasan_save_alloc_info+0x40/0x58
[   27.905851]  __kasan_kmalloc+0xd4/0xd8
[   27.906443]  __kmalloc_cache_noprof+0x15c/0x3c0
[   27.907440]  kasan_atomics+0xb8/0x2e8
[   27.908290]  kunit_try_run_case+0x14c/0x3d0
[   27.909341]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   27.910290]  kthread+0x24c/0x2d0
[   27.911007]  ret_from_fork+0x10/0x20
[   27.911503] 
[   27.911822] The buggy address belongs to the object at fff00000c12e8780
[   27.911822]  which belongs to the cache kmalloc-64 of size 64
[   27.913391] The buggy address is located 0 bytes to the right of
[   27.913391]  allocated 48-byte region [fff00000c12e8780, fff00000c12e87b0)
[   27.914786] 
[   27.915161] The buggy address belongs to the physical page:
[   27.915942] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1012e8
[   27.916952] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   27.917754] page_type: f5(slab)
[   27.918292] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   27.919168] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   27.920233] page dumped because: kasan: bad access detected
[   27.920947] 
[   27.921371] Memory state around the buggy address:
[   27.922029]  fff00000c12e8680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.922963]  fff00000c12e8700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.924157] >fff00000c12e8780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   27.924820]                                      ^
[   27.925501]  fff00000c12e8800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.926421]  fff00000c12e8880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.927300] ==================================================================
[   27.967254] ==================================================================
[   27.968057] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1ec/0x4858
[   27.969017] Read of size 4 at addr fff00000c12e87b0 by task kunit_try_catch/253
[   27.969641] 
[   27.969901] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc2-next-20241209 #1
[   27.971846] Tainted: [B]=BAD_PAGE, [N]=TEST
[   27.972554] Hardware name: linux,dummy-virt (DT)
[   27.973165] Call trace:
[   27.973431]  show_stack+0x20/0x38 (C)
[   27.973807]  dump_stack_lvl+0x8c/0xd0
[   27.974188]  print_report+0x118/0x5e0
[   27.974595]  kasan_report+0xc8/0x118
[   27.976158]  kasan_check_range+0x100/0x1a8
[   27.976845]  __kasan_check_read+0x20/0x30
[   27.977498]  kasan_atomics_helper+0x1ec/0x4858
[   27.978058]  kasan_atomics+0x198/0x2e8
[   27.978602]  kunit_try_run_case+0x14c/0x3d0
[   27.979576]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   27.980322]  kthread+0x24c/0x2d0
[   27.980987]  ret_from_fork+0x10/0x20
[   27.981589] 
[   27.981969] Allocated by task 253:
[   27.982552]  kasan_save_stack+0x3c/0x68
[   27.983261]  kasan_save_track+0x20/0x40
[   27.983839]  kasan_save_alloc_info+0x40/0x58
[   27.984488]  __kasan_kmalloc+0xd4/0xd8
[   27.985174]  __kmalloc_cache_noprof+0x15c/0x3c0
[   27.985814]  kasan_atomics+0xb8/0x2e8
[   27.986446]  kunit_try_run_case+0x14c/0x3d0
[   27.987113]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   27.987999]  kthread+0x24c/0x2d0
[   27.988632]  ret_from_fork+0x10/0x20
[   27.989111] 
[   27.989450] The buggy address belongs to the object at fff00000c12e8780
[   27.989450]  which belongs to the cache kmalloc-64 of size 64
[   27.990637] The buggy address is located 0 bytes to the right of
[   27.990637]  allocated 48-byte region [fff00000c12e8780, fff00000c12e87b0)
[   27.992085] 
[   27.992559] The buggy address belongs to the physical page:
[   27.993199] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1012e8
[   27.995152] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   27.995808] page_type: f5(slab)
[   27.996531] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   27.997520] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   27.998352] page dumped because: kasan: bad access detected
[   27.999040] 
[   27.999353] Memory state around the buggy address:
[   27.999936]  fff00000c12e8680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.000785]  fff00000c12e8700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.001865] >fff00000c12e8780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   28.002615]                                      ^
[   28.003333]  fff00000c12e8800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.004281]  fff00000c12e8880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.005058] ==================================================================
[   28.521162] ==================================================================
[   28.521879] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x760/0x4858
[   28.523270] Write of size 4 at addr fff00000c12e87b0 by task kunit_try_catch/253
[   28.524845] 
[   28.525221] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc2-next-20241209 #1
[   28.526149] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.526381] Hardware name: linux,dummy-virt (DT)
[   28.526623] Call trace:
[   28.526958]  show_stack+0x20/0x38 (C)
[   28.527658]  dump_stack_lvl+0x8c/0xd0
[   28.528256]  print_report+0x118/0x5e0
[   28.528811]  kasan_report+0xc8/0x118
[   28.529464]  kasan_check_range+0x100/0x1a8
[   28.530219]  __kasan_check_write+0x20/0x30
[   28.530828]  kasan_atomics_helper+0x760/0x4858
[   28.531519]  kasan_atomics+0x198/0x2e8
[   28.532105]  kunit_try_run_case+0x14c/0x3d0
[   28.532762]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   28.533615]  kthread+0x24c/0x2d0
[   28.534143]  ret_from_fork+0x10/0x20
[   28.534604] 
[   28.535003] Allocated by task 253:
[   28.535533]  kasan_save_stack+0x3c/0x68
[   28.536257]  kasan_save_track+0x20/0x40
[   28.536828]  kasan_save_alloc_info+0x40/0x58
[   28.537560]  __kasan_kmalloc+0xd4/0xd8
[   28.538179]  __kmalloc_cache_noprof+0x15c/0x3c0
[   28.538778]  kasan_atomics+0xb8/0x2e8
[   28.539411]  kunit_try_run_case+0x14c/0x3d0
[   28.540050]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   28.540907]  kthread+0x24c/0x2d0
[   28.541520]  ret_from_fork+0x10/0x20
[   28.542003] 
[   28.542291] The buggy address belongs to the object at fff00000c12e8780
[   28.542291]  which belongs to the cache kmalloc-64 of size 64
[   28.543499] The buggy address is located 0 bytes to the right of
[   28.543499]  allocated 48-byte region [fff00000c12e8780, fff00000c12e87b0)
[   28.544823] 
[   28.545184] The buggy address belongs to the physical page:
[   28.545830] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1012e8
[   28.546743] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   28.547451] page_type: f5(slab)
[   28.548009] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   28.548832] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   28.549665] page dumped because: kasan: bad access detected
[   28.550351] 
[   28.550660] Memory state around the buggy address:
[   28.551250]  fff00000c12e8680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.551977]  fff00000c12e8700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.552734] >fff00000c12e8780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   28.553576]                                      ^
[   28.554190]  fff00000c12e8800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.554986]  fff00000c12e8880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.555815] ==================================================================
[   29.388404] ==================================================================
[   29.389140] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf88/0x4858
[   29.390059] Write of size 8 at addr fff00000c12e87b0 by task kunit_try_catch/253
[   29.390807] 
[   29.391228] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc2-next-20241209 #1
[   29.392303] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.392961] Hardware name: linux,dummy-virt (DT)
[   29.393491] Call trace:
[   29.393991]  show_stack+0x20/0x38 (C)
[   29.394599]  dump_stack_lvl+0x8c/0xd0
[   29.395165]  print_report+0x118/0x5e0
[   29.395673]  kasan_report+0xc8/0x118
[   29.396280]  kasan_check_range+0x100/0x1a8
[   29.396874]  __kasan_check_write+0x20/0x30
[   29.397460]  kasan_atomics_helper+0xf88/0x4858
[   29.398139]  kasan_atomics+0x198/0x2e8
[   29.398686]  kunit_try_run_case+0x14c/0x3d0
[   29.399263]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.400038]  kthread+0x24c/0x2d0
[   29.400571]  ret_from_fork+0x10/0x20
[   29.401147] 
[   29.401499] Allocated by task 253:
[   29.401973]  kasan_save_stack+0x3c/0x68
[   29.402553]  kasan_save_track+0x20/0x40
[   29.403109]  kasan_save_alloc_info+0x40/0x58
[   29.403681]  __kasan_kmalloc+0xd4/0xd8
[   29.404277]  __kmalloc_cache_noprof+0x15c/0x3c0
[   29.404884]  kasan_atomics+0xb8/0x2e8
[   29.405385]  kunit_try_run_case+0x14c/0x3d0
[   29.405934]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.406672]  kthread+0x24c/0x2d0
[   29.407181]  ret_from_fork+0x10/0x20
[   29.407718] 
[   29.408020] The buggy address belongs to the object at fff00000c12e8780
[   29.408020]  which belongs to the cache kmalloc-64 of size 64
[   29.409244] The buggy address is located 0 bytes to the right of
[   29.409244]  allocated 48-byte region [fff00000c12e8780, fff00000c12e87b0)
[   29.410564] 
[   29.410884] The buggy address belongs to the physical page:
[   29.411532] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1012e8
[   29.412361] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   29.413145] page_type: f5(slab)
[   29.413578] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   29.414497] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   29.415408] page dumped because: kasan: bad access detected
[   29.416042] 
[   29.416345] Memory state around the buggy address:
[   29.417021]  fff00000c12e8680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.417790]  fff00000c12e8700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.418541] >fff00000c12e8780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   29.419336]                                      ^
[   29.419943]  fff00000c12e8800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.420798]  fff00000c12e8880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.421572] ==================================================================
[   29.529597] ==================================================================
[   29.530297] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1128/0x4858
[   29.531092] Write of size 8 at addr fff00000c12e87b0 by task kunit_try_catch/253
[   29.531753] 
[   29.532058] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc2-next-20241209 #1
[   29.532554] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.533193] Hardware name: linux,dummy-virt (DT)
[   29.533970] Call trace:
[   29.534430]  show_stack+0x20/0x38 (C)
[   29.535192]  dump_stack_lvl+0x8c/0xd0
[   29.535825]  print_report+0x118/0x5e0
[   29.536441]  kasan_report+0xc8/0x118
[   29.537066]  kasan_check_range+0x100/0x1a8
[   29.537712]  __kasan_check_write+0x20/0x30
[   29.538308]  kasan_atomics_helper+0x1128/0x4858
[   29.538940]  kasan_atomics+0x198/0x2e8
[   29.539574]  kunit_try_run_case+0x14c/0x3d0
[   29.540227]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.540964]  kthread+0x24c/0x2d0
[   29.541526]  ret_from_fork+0x10/0x20
[   29.542113] 
[   29.542469] Allocated by task 253:
[   29.542992]  kasan_save_stack+0x3c/0x68
[   29.543641]  kasan_save_track+0x20/0x40
[   29.544230]  kasan_save_alloc_info+0x40/0x58
[   29.544936]  __kasan_kmalloc+0xd4/0xd8
[   29.545527]  __kmalloc_cache_noprof+0x15c/0x3c0
[   29.546157]  kasan_atomics+0xb8/0x2e8
[   29.546737]  kunit_try_run_case+0x14c/0x3d0
[   29.547355]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.548134]  kthread+0x24c/0x2d0
[   29.548712]  ret_from_fork+0x10/0x20
[   29.549328] 
[   29.549617] The buggy address belongs to the object at fff00000c12e8780
[   29.549617]  which belongs to the cache kmalloc-64 of size 64
[   29.551213] The buggy address is located 0 bytes to the right of
[   29.551213]  allocated 48-byte region [fff00000c12e8780, fff00000c12e87b0)
[   29.552512] 
[   29.552982] The buggy address belongs to the physical page:
[   29.553784] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1012e8
[   29.554691] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   29.555459] page_type: f5(slab)
[   29.555959] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   29.556927] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   29.557828] page dumped because: kasan: bad access detected
[   29.558515] 
[   29.558863] Memory state around the buggy address:
[   29.559535]  fff00000c12e8680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.560390]  fff00000c12e8700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.561234] >fff00000c12e8780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   29.562104]                                      ^
[   29.562749]  fff00000c12e8800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.563572]  fff00000c12e8880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.564354] ==================================================================
[   28.959688] ==================================================================
[   28.960343] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xc08/0x4858
[   28.961018] Write of size 4 at addr fff00000c12e87b0 by task kunit_try_catch/253
[   28.961859] 
[   28.962111] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc2-next-20241209 #1
[   28.962865] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.963246] Hardware name: linux,dummy-virt (DT)
[   28.963653] Call trace:
[   28.964067]  show_stack+0x20/0x38 (C)
[   28.964823]  dump_stack_lvl+0x8c/0xd0
[   28.965469]  print_report+0x118/0x5e0
[   28.966155]  kasan_report+0xc8/0x118
[   28.966893]  kasan_check_range+0x100/0x1a8
[   28.967464]  __kasan_check_write+0x20/0x30
[   28.967978]  kasan_atomics_helper+0xc08/0x4858
[   28.968539]  kasan_atomics+0x198/0x2e8
[   28.969313]  kunit_try_run_case+0x14c/0x3d0
[   28.970074]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   28.970947]  kthread+0x24c/0x2d0
[   28.971560]  ret_from_fork+0x10/0x20
[   28.972222] 
[   28.972625] Allocated by task 253:
[   28.973229]  kasan_save_stack+0x3c/0x68
[   28.973851]  kasan_save_track+0x20/0x40
[   28.974467]  kasan_save_alloc_info+0x40/0x58
[   28.975097]  __kasan_kmalloc+0xd4/0xd8
[   28.975768]  __kmalloc_cache_noprof+0x15c/0x3c0
[   28.976540]  kasan_atomics+0xb8/0x2e8
[   28.977316]  kunit_try_run_case+0x14c/0x3d0
[   28.977919]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   28.978577]  kthread+0x24c/0x2d0
[   28.979184]  ret_from_fork+0x10/0x20
[   28.979825] 
[   28.980163] The buggy address belongs to the object at fff00000c12e8780
[   28.980163]  which belongs to the cache kmalloc-64 of size 64
[   28.981447] The buggy address is located 0 bytes to the right of
[   28.981447]  allocated 48-byte region [fff00000c12e8780, fff00000c12e87b0)
[   28.982855] 
[   28.983226] The buggy address belongs to the physical page:
[   28.983944] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1012e8
[   28.984869] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   28.985725] page_type: f5(slab)
[   28.986274] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   28.987190] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   28.988073] page dumped because: kasan: bad access detected
[   28.988728] 
[   28.989146] Memory state around the buggy address:
[   28.989788]  fff00000c12e8680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.990534]  fff00000c12e8700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.991409] >fff00000c12e8780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   28.992218]                                      ^
[   28.992884]  fff00000c12e8800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.993625]  fff00000c12e8880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.994534] ==================================================================
[   29.177250] ==================================================================
[   29.177911] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xdd4/0x4858
[   29.178672] Read of size 8 at addr fff00000c12e87b0 by task kunit_try_catch/253
[   29.179445] 
[   29.179843] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc2-next-20241209 #1
[   29.180938] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.181543] Hardware name: linux,dummy-virt (DT)
[   29.182055] Call trace:
[   29.182531]  show_stack+0x20/0x38 (C)
[   29.183080]  dump_stack_lvl+0x8c/0xd0
[   29.183640]  print_report+0x118/0x5e0
[   29.184254]  kasan_report+0xc8/0x118
[   29.184816]  kasan_check_range+0x100/0x1a8
[   29.185475]  __kasan_check_read+0x20/0x30
[   29.186078]  kasan_atomics_helper+0xdd4/0x4858
[   29.186712]  kasan_atomics+0x198/0x2e8
[   29.187278]  kunit_try_run_case+0x14c/0x3d0
[   29.187929]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.188663]  kthread+0x24c/0x2d0
[   29.189188]  ret_from_fork+0x10/0x20
[   29.189850] 
[   29.190177] Allocated by task 253:
[   29.190741]  kasan_save_stack+0x3c/0x68
[   29.191353]  kasan_save_track+0x20/0x40
[   29.191884]  kasan_save_alloc_info+0x40/0x58
[   29.192478]  __kasan_kmalloc+0xd4/0xd8
[   29.193088]  __kmalloc_cache_noprof+0x15c/0x3c0
[   29.193715]  kasan_atomics+0xb8/0x2e8
[   29.194267]  kunit_try_run_case+0x14c/0x3d0
[   29.194845]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.195509]  kthread+0x24c/0x2d0
[   29.196013]  ret_from_fork+0x10/0x20
[   29.196521] 
[   29.196849] The buggy address belongs to the object at fff00000c12e8780
[   29.196849]  which belongs to the cache kmalloc-64 of size 64
[   29.198040] The buggy address is located 0 bytes to the right of
[   29.198040]  allocated 48-byte region [fff00000c12e8780, fff00000c12e87b0)
[   29.199328] 
[   29.199649] The buggy address belongs to the physical page:
[   29.200256] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1012e8
[   29.201121] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   29.201946] page_type: f5(slab)
[   29.202413] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   29.203233] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   29.204021] page dumped because: kasan: bad access detected
[   29.204736] 
[   29.205052] Memory state around the buggy address:
[   29.205618]  fff00000c12e8680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.206393]  fff00000c12e8700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.207171] >fff00000c12e8780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   29.207962]                                      ^
[   29.208556]  fff00000c12e8800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.209358]  fff00000c12e8880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.210118] ==================================================================
[   29.962054] ==================================================================
[   29.963262] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3db0/0x4858
[   29.964116] Read of size 8 at addr fff00000c12e87b0 by task kunit_try_catch/253
[   29.964932] 
[   29.965291] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc2-next-20241209 #1
[   29.966490] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.967026] Hardware name: linux,dummy-virt (DT)
[   29.967278] Call trace:
[   29.967444]  show_stack+0x20/0x38 (C)
[   29.967682]  dump_stack_lvl+0x8c/0xd0
[   29.968257]  print_report+0x118/0x5e0
[   29.968891]  kasan_report+0xc8/0x118
[   29.969491]  __asan_report_load8_noabort+0x20/0x30
[   29.970163]  kasan_atomics_helper+0x3db0/0x4858
[   29.970962]  kasan_atomics+0x198/0x2e8
[   29.971639]  kunit_try_run_case+0x14c/0x3d0
[   29.972344]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.973114]  kthread+0x24c/0x2d0
[   29.973673]  ret_from_fork+0x10/0x20
[   29.974261] 
[   29.974603] Allocated by task 253:
[   29.975152]  kasan_save_stack+0x3c/0x68
[   29.975772]  kasan_save_track+0x20/0x40
[   29.976368]  kasan_save_alloc_info+0x40/0x58
[   29.977004]  __kasan_kmalloc+0xd4/0xd8
[   29.977582]  __kmalloc_cache_noprof+0x15c/0x3c0
[   29.978222]  kasan_atomics+0xb8/0x2e8
[   29.978808]  kunit_try_run_case+0x14c/0x3d0
[   29.979430]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.980142]  kthread+0x24c/0x2d0
[   29.980677]  ret_from_fork+0x10/0x20
[   29.981281] 
[   29.981625] The buggy address belongs to the object at fff00000c12e8780
[   29.981625]  which belongs to the cache kmalloc-64 of size 64
[   29.982944] The buggy address is located 0 bytes to the right of
[   29.982944]  allocated 48-byte region [fff00000c12e8780, fff00000c12e87b0)
[   29.984328] 
[   29.984738] The buggy address belongs to the physical page:
[   29.985385] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1012e8
[   29.986397] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   29.987277] page_type: f5(slab)
[   29.987819] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   29.988744] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   29.989606] page dumped because: kasan: bad access detected
[   29.990281] 
[   29.990632] Memory state around the buggy address:
[   29.991301]  fff00000c12e8680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.992159]  fff00000c12e8700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.992983] >fff00000c12e8780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   29.993792]                                      ^
[   29.994403]  fff00000c12e8800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.995255]  fff00000c12e8880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.996055] ==================================================================
[   30.068427] ==================================================================
[   30.069099] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x16d0/0x4858
[   30.069863] Write of size 8 at addr fff00000c12e87b0 by task kunit_try_catch/253
[   30.070583] 
[   30.071009] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc2-next-20241209 #1
[   30.072130] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.072759] Hardware name: linux,dummy-virt (DT)
[   30.073295] Call trace:
[   30.073695]  show_stack+0x20/0x38 (C)
[   30.074295]  dump_stack_lvl+0x8c/0xd0
[   30.074939]  print_report+0x118/0x5e0
[   30.075542]  kasan_report+0xc8/0x118
[   30.076104]  kasan_check_range+0x100/0x1a8
[   30.076695]  __kasan_check_write+0x20/0x30
[   30.077282]  kasan_atomics_helper+0x16d0/0x4858
[   30.077901]  kasan_atomics+0x198/0x2e8
[   30.078519]  kunit_try_run_case+0x14c/0x3d0
[   30.079147]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.079825]  kthread+0x24c/0x2d0
[   30.080401]  ret_from_fork+0x10/0x20
[   30.081006] 
[   30.081309] Allocated by task 253:
[   30.082098]  kasan_save_stack+0x3c/0x68
[   30.082657]  kasan_save_track+0x20/0x40
[   30.083183]  kasan_save_alloc_info+0x40/0x58
[   30.083798]  __kasan_kmalloc+0xd4/0xd8
[   30.084337]  __kmalloc_cache_noprof+0x15c/0x3c0
[   30.084988]  kasan_atomics+0xb8/0x2e8
[   30.085491]  kunit_try_run_case+0x14c/0x3d0
[   30.086123]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.086856]  kthread+0x24c/0x2d0
[   30.087389]  ret_from_fork+0x10/0x20
[   30.087905] 
[   30.088220] The buggy address belongs to the object at fff00000c12e8780
[   30.088220]  which belongs to the cache kmalloc-64 of size 64
[   30.089448] The buggy address is located 0 bytes to the right of
[   30.089448]  allocated 48-byte region [fff00000c12e8780, fff00000c12e87b0)
[   30.090733] 
[   30.091051] The buggy address belongs to the physical page:
[   30.091661] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1012e8
[   30.092521] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   30.093262] page_type: f5(slab)
[   30.093784] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   30.094618] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   30.095509] page dumped because: kasan: bad access detected
[   30.096121] 
[   30.096455] Memory state around the buggy address:
[   30.097048]  fff00000c12e8680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   30.097810]  fff00000c12e8700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   30.098625] >fff00000c12e8780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   30.099411]                                      ^
[   30.100018]  fff00000c12e8800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.100853]  fff00000c12e8880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.101614] ==================================================================
[   28.340078] ==================================================================
[   28.340847] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x54c/0x4858
[   28.341518] Write of size 4 at addr fff00000c12e87b0 by task kunit_try_catch/253
[   28.342402] 
[   28.342763] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc2-next-20241209 #1
[   28.343851] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.344330] Hardware name: linux,dummy-virt (DT)
[   28.345025] Call trace:
[   28.345418]  show_stack+0x20/0x38 (C)
[   28.346005]  dump_stack_lvl+0x8c/0xd0
[   28.346502]  print_report+0x118/0x5e0
[   28.347113]  kasan_report+0xc8/0x118
[   28.347800]  kasan_check_range+0x100/0x1a8
[   28.348391]  __kasan_check_write+0x20/0x30
[   28.348991]  kasan_atomics_helper+0x54c/0x4858
[   28.349561]  kasan_atomics+0x198/0x2e8
[   28.350250]  kunit_try_run_case+0x14c/0x3d0
[   28.350882]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   28.351655]  kthread+0x24c/0x2d0
[   28.352219]  ret_from_fork+0x10/0x20
[   28.352838] 
[   28.353163] Allocated by task 253:
[   28.353684]  kasan_save_stack+0x3c/0x68
[   28.354293]  kasan_save_track+0x20/0x40
[   28.354813]  kasan_save_alloc_info+0x40/0x58
[   28.355410]  __kasan_kmalloc+0xd4/0xd8
[   28.355994]  __kmalloc_cache_noprof+0x15c/0x3c0
[   28.356600]  kasan_atomics+0xb8/0x2e8
[   28.357199]  kunit_try_run_case+0x14c/0x3d0
[   28.357795]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   28.358524]  kthread+0x24c/0x2d0
[   28.359066]  ret_from_fork+0x10/0x20
[   28.359608] 
[   28.359959] The buggy address belongs to the object at fff00000c12e8780
[   28.359959]  which belongs to the cache kmalloc-64 of size 64
[   28.361233] The buggy address is located 0 bytes to the right of
[   28.361233]  allocated 48-byte region [fff00000c12e8780, fff00000c12e87b0)
[   28.362469] 
[   28.362809] The buggy address belongs to the physical page:
[   28.363466] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1012e8
[   28.364299] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   28.365047] page_type: f5(slab)
[   28.365588] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   28.366405] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   28.367252] page dumped because: kasan: bad access detected
[   28.367930] 
[   28.368242] Memory state around the buggy address:
[   28.368841]  fff00000c12e8680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.369574]  fff00000c12e8700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.370344] >fff00000c12e8780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   28.371115]                                      ^
[   28.371742]  fff00000c12e8800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.372526]  fff00000c12e8880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.373332] ==================================================================
[   28.672354] ==================================================================
[   28.673129] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x934/0x4858
[   28.673937] Write of size 4 at addr fff00000c12e87b0 by task kunit_try_catch/253
[   28.674732] 
[   28.675078] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc2-next-20241209 #1
[   28.676192] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.676789] Hardware name: linux,dummy-virt (DT)
[   28.677333] Call trace:
[   28.677767]  show_stack+0x20/0x38 (C)
[   28.678342]  dump_stack_lvl+0x8c/0xd0
[   28.678940]  print_report+0x118/0x5e0
[   28.679444]  kasan_report+0xc8/0x118
[   28.680059]  kasan_check_range+0x100/0x1a8
[   28.680643]  __kasan_check_write+0x20/0x30
[   28.681249]  kasan_atomics_helper+0x934/0x4858
[   28.681843]  kasan_atomics+0x198/0x2e8
[   28.682470]  kunit_try_run_case+0x14c/0x3d0
[   28.683026]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   28.683827]  kthread+0x24c/0x2d0
[   28.684393]  ret_from_fork+0x10/0x20
[   28.684944] 
[   28.685260] Allocated by task 253:
[   28.685678]  kasan_save_stack+0x3c/0x68
[   28.686258]  kasan_save_track+0x20/0x40
[   28.686833]  kasan_save_alloc_info+0x40/0x58
[   28.687389]  __kasan_kmalloc+0xd4/0xd8
[   28.688011]  __kmalloc_cache_noprof+0x15c/0x3c0
[   28.688581]  kasan_atomics+0xb8/0x2e8
[   28.689160]  kunit_try_run_case+0x14c/0x3d0
[   28.689750]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   28.690406]  kthread+0x24c/0x2d0
[   28.690948]  ret_from_fork+0x10/0x20
[   28.691462] 
[   28.691773] The buggy address belongs to the object at fff00000c12e8780
[   28.691773]  which belongs to the cache kmalloc-64 of size 64
[   28.693005] The buggy address is located 0 bytes to the right of
[   28.693005]  allocated 48-byte region [fff00000c12e8780, fff00000c12e87b0)
[   28.694294] 
[   28.694654] The buggy address belongs to the physical page:
[   28.695277] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1012e8
[   28.696196] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   28.696938] page_type: f5(slab)
[   28.697524] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   28.698307] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   28.699140] page dumped because: kasan: bad access detected
[   28.699819] 
[   28.700163] Memory state around the buggy address:
[   28.700782]  fff00000c12e8680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.701537]  fff00000c12e8700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.702345] >fff00000c12e8780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   28.703161]                                      ^
[   28.703795]  fff00000c12e8800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.704596]  fff00000c12e8880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.705414] ==================================================================
[   28.196141] ==================================================================
[   28.196770] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3ac/0x4858
[   28.197658] Write of size 4 at addr fff00000c12e87b0 by task kunit_try_catch/253
[   28.198485] 
[   28.198844] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc2-next-20241209 #1
[   28.199963] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.200500] Hardware name: linux,dummy-virt (DT)
[   28.201197] Call trace:
[   28.201582]  show_stack+0x20/0x38 (C)
[   28.202205]  dump_stack_lvl+0x8c/0xd0
[   28.202820]  print_report+0x118/0x5e0
[   28.203373]  kasan_report+0xc8/0x118
[   28.204035]  kasan_check_range+0x100/0x1a8
[   28.204683]  __kasan_check_write+0x20/0x30
[   28.205291]  kasan_atomics_helper+0x3ac/0x4858
[   28.205907]  kasan_atomics+0x198/0x2e8
[   28.206509]  kunit_try_run_case+0x14c/0x3d0
[   28.207142]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   28.207893]  kthread+0x24c/0x2d0
[   28.208457]  ret_from_fork+0x10/0x20
[   28.209017] 
[   28.209327] Allocated by task 253:
[   28.209880]  kasan_save_stack+0x3c/0x68
[   28.210417]  kasan_save_track+0x20/0x40
[   28.211002]  kasan_save_alloc_info+0x40/0x58
[   28.211583]  __kasan_kmalloc+0xd4/0xd8
[   28.212102]  __kmalloc_cache_noprof+0x15c/0x3c0
[   28.212764]  kasan_atomics+0xb8/0x2e8
[   28.213276]  kunit_try_run_case+0x14c/0x3d0
[   28.213881]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   28.214537]  kthread+0x24c/0x2d0
[   28.215040]  ret_from_fork+0x10/0x20
[   28.215536] 
[   28.215928] The buggy address belongs to the object at fff00000c12e8780
[   28.215928]  which belongs to the cache kmalloc-64 of size 64
[   28.217133] The buggy address is located 0 bytes to the right of
[   28.217133]  allocated 48-byte region [fff00000c12e8780, fff00000c12e87b0)
[   28.218427] 
[   28.218766] The buggy address belongs to the physical page:
[   28.219372] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1012e8
[   28.220323] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   28.221070] page_type: f5(slab)
[   28.221580] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   28.222419] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   28.223329] page dumped because: kasan: bad access detected
[   28.223946] 
[   28.224302] Memory state around the buggy address:
[   28.224924]  fff00000c12e8680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.225824]  fff00000c12e8700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.226535] >fff00000c12e8780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   28.227384]                                      ^
[   28.227993]  fff00000c12e8800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.228818]  fff00000c12e8880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.229592] ==================================================================
[   28.230928] ==================================================================
[   28.231800] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x414/0x4858
[   28.232596] Write of size 4 at addr fff00000c12e87b0 by task kunit_try_catch/253
[   28.233388] 
[   28.233761] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc2-next-20241209 #1
[   28.234771] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.235271] Hardware name: linux,dummy-virt (DT)
[   28.235861] Call trace:
[   28.236339]  show_stack+0x20/0x38 (C)
[   28.236970]  dump_stack_lvl+0x8c/0xd0
[   28.237482]  print_report+0x118/0x5e0
[   28.238130]  kasan_report+0xc8/0x118
[   28.238658]  kasan_check_range+0x100/0x1a8
[   28.239329]  __kasan_check_write+0x20/0x30
[   28.239923]  kasan_atomics_helper+0x414/0x4858
[   28.240558]  kasan_atomics+0x198/0x2e8
[   28.241117]  kunit_try_run_case+0x14c/0x3d0
[   28.241795]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   28.242530]  kthread+0x24c/0x2d0
[   28.243120]  ret_from_fork+0x10/0x20
[   28.243688] 
[   28.244040] Allocated by task 253:
[   28.244487]  kasan_save_stack+0x3c/0x68
[   28.245062]  kasan_save_track+0x20/0x40
[   28.245626]  kasan_save_alloc_info+0x40/0x58
[   28.246203]  __kasan_kmalloc+0xd4/0xd8
[   28.246750]  __kmalloc_cache_noprof+0x15c/0x3c0
[   28.247342]  kasan_atomics+0xb8/0x2e8
[   28.247875]  kunit_try_run_case+0x14c/0x3d0
[   28.248435]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   28.249140]  kthread+0x24c/0x2d0
[   28.249628]  ret_from_fork+0x10/0x20
[   28.250138] 
[   28.250448] The buggy address belongs to the object at fff00000c12e8780
[   28.250448]  which belongs to the cache kmalloc-64 of size 64
[   28.251695] The buggy address is located 0 bytes to the right of
[   28.251695]  allocated 48-byte region [fff00000c12e8780, fff00000c12e87b0)
[   28.252974] 
[   28.253326] The buggy address belongs to the physical page:
[   28.253936] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1012e8
[   28.254780] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   28.255488] page_type: f5(slab)
[   28.255997] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   28.256821] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   28.257643] page dumped because: kasan: bad access detected
[   28.258328] 
[   28.258652] Memory state around the buggy address:
[   28.259237]  fff00000c12e8680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.260006]  fff00000c12e8700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.260824] >fff00000c12e8780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   28.261647]                                      ^
[   28.262279]  fff00000c12e8800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.263035]  fff00000c12e8880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.263833] ==================================================================
[   29.352046] ==================================================================
[   29.353552] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf20/0x4858
[   29.354390] Write of size 8 at addr fff00000c12e87b0 by task kunit_try_catch/253
[   29.355666] 
[   29.356151] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc2-next-20241209 #1
[   29.357332] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.357993] Hardware name: linux,dummy-virt (DT)
[   29.358568] Call trace:
[   29.359131]  show_stack+0x20/0x38 (C)
[   29.359608]  dump_stack_lvl+0x8c/0xd0
[   29.360152]  print_report+0x118/0x5e0
[   29.360785]  kasan_report+0xc8/0x118
[   29.361403]  kasan_check_range+0x100/0x1a8
[   29.362037]  __kasan_check_write+0x20/0x30
[   29.362621]  kasan_atomics_helper+0xf20/0x4858
[   29.363276]  kasan_atomics+0x198/0x2e8
[   29.363890]  kunit_try_run_case+0x14c/0x3d0
[   29.364442]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.365241]  kthread+0x24c/0x2d0
[   29.365759]  ret_from_fork+0x10/0x20
[   29.366368] 
[   29.366721] Allocated by task 253:
[   29.367164]  kasan_save_stack+0x3c/0x68
[   29.367744]  kasan_save_track+0x20/0x40
[   29.368300]  kasan_save_alloc_info+0x40/0x58
[   29.368874]  __kasan_kmalloc+0xd4/0xd8
[   29.369399]  __kmalloc_cache_noprof+0x15c/0x3c0
[   29.369986]  kasan_atomics+0xb8/0x2e8
[   29.370516]  kunit_try_run_case+0x14c/0x3d0
[   29.371112]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.371791]  kthread+0x24c/0x2d0
[   29.372257]  ret_from_fork+0x10/0x20
[   29.372819] 
[   29.373146] The buggy address belongs to the object at fff00000c12e8780
[   29.373146]  which belongs to the cache kmalloc-64 of size 64
[   29.374403] The buggy address is located 0 bytes to the right of
[   29.374403]  allocated 48-byte region [fff00000c12e8780, fff00000c12e87b0)
[   29.375623] 
[   29.375970] The buggy address belongs to the physical page:
[   29.376655] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1012e8
[   29.377458] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   29.378288] page_type: f5(slab)
[   29.378812] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   29.379639] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   29.380555] page dumped because: kasan: bad access detected
[   29.381232] 
[   29.381539] Memory state around the buggy address:
[   29.382054]  fff00000c12e8680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.382865]  fff00000c12e8700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.383659] >fff00000c12e8780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   29.384503]                                      ^
[   29.385106]  fff00000c12e8800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.385916]  fff00000c12e8880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.386689] ==================================================================
[   29.565902] ==================================================================
[   29.566539] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1190/0x4858
[   29.567547] Write of size 8 at addr fff00000c12e87b0 by task kunit_try_catch/253
[   29.568600] 
[   29.568945] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc2-next-20241209 #1
[   29.570574] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.571319] Hardware name: linux,dummy-virt (DT)
[   29.571888] Call trace:
[   29.572352]  show_stack+0x20/0x38 (C)
[   29.573044]  dump_stack_lvl+0x8c/0xd0
[   29.573712]  print_report+0x118/0x5e0
[   29.574277]  kasan_report+0xc8/0x118
[   29.574936]  kasan_check_range+0x100/0x1a8
[   29.575589]  __kasan_check_write+0x20/0x30
[   29.576224]  kasan_atomics_helper+0x1190/0x4858
[   29.576898]  kasan_atomics+0x198/0x2e8
[   29.577484]  kunit_try_run_case+0x14c/0x3d0
[   29.578143]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.578979]  kthread+0x24c/0x2d0
[   29.579565]  ret_from_fork+0x10/0x20
[   29.580185] 
[   29.580565] Allocated by task 253:
[   29.581131]  kasan_save_stack+0x3c/0x68
[   29.581836]  kasan_save_track+0x20/0x40
[   29.582384]  kasan_save_alloc_info+0x40/0x58
[   29.583059]  __kasan_kmalloc+0xd4/0xd8
[   29.583625]  __kmalloc_cache_noprof+0x15c/0x3c0
[   29.584272]  kasan_atomics+0xb8/0x2e8
[   29.584870]  kunit_try_run_case+0x14c/0x3d0
[   29.585485]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.586207]  kthread+0x24c/0x2d0
[   29.586753]  ret_from_fork+0x10/0x20
[   29.587310] 
[   29.587638] The buggy address belongs to the object at fff00000c12e8780
[   29.587638]  which belongs to the cache kmalloc-64 of size 64
[   29.589003] The buggy address is located 0 bytes to the right of
[   29.589003]  allocated 48-byte region [fff00000c12e8780, fff00000c12e87b0)
[   29.590345] 
[   29.590659] The buggy address belongs to the physical page:
[   29.591318] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1012e8
[   29.592290] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   29.593097] page_type: f5(slab)
[   29.593631] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   29.594512] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   29.595407] page dumped because: kasan: bad access detected
[   29.596144] 
[   29.596505] Memory state around the buggy address:
[   29.597152]  fff00000c12e8680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.598061]  fff00000c12e8700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.598903] >fff00000c12e8780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   29.599723]                                      ^
[   29.600329]  fff00000c12e8800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.601183]  fff00000c12e8880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.601995] ==================================================================
[   29.105885] ==================================================================
[   29.106612] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xd3c/0x4858
[   29.107547] Write of size 4 at addr fff00000c12e87b0 by task kunit_try_catch/253
[   29.108327] 
[   29.108732] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc2-next-20241209 #1
[   29.109880] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.110440] Hardware name: linux,dummy-virt (DT)
[   29.111089] Call trace:
[   29.111481]  show_stack+0x20/0x38 (C)
[   29.112110]  dump_stack_lvl+0x8c/0xd0
[   29.112663]  print_report+0x118/0x5e0
[   29.113225]  kasan_report+0xc8/0x118
[   29.113804]  kasan_check_range+0x100/0x1a8
[   29.114443]  __kasan_check_write+0x20/0x30
[   29.115077]  kasan_atomics_helper+0xd3c/0x4858
[   29.115743]  kasan_atomics+0x198/0x2e8
[   29.116280]  kunit_try_run_case+0x14c/0x3d0
[   29.116927]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.117586]  kthread+0x24c/0x2d0
[   29.118215]  ret_from_fork+0x10/0x20
[   29.118778] 
[   29.119143] Allocated by task 253:
[   29.119642]  kasan_save_stack+0x3c/0x68
[   29.120494]  kasan_save_track+0x20/0x40
[   29.121017]  kasan_save_alloc_info+0x40/0x58
[   29.121598]  __kasan_kmalloc+0xd4/0xd8
[   29.122294]  __kmalloc_cache_noprof+0x15c/0x3c0
[   29.122862]  kasan_atomics+0xb8/0x2e8
[   29.123384]  kunit_try_run_case+0x14c/0x3d0
[   29.123949]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.124658]  kthread+0x24c/0x2d0
[   29.125224]  ret_from_fork+0x10/0x20
[   29.125760] 
[   29.126141] The buggy address belongs to the object at fff00000c12e8780
[   29.126141]  which belongs to the cache kmalloc-64 of size 64
[   29.127368] The buggy address is located 0 bytes to the right of
[   29.127368]  allocated 48-byte region [fff00000c12e8780, fff00000c12e87b0)
[   29.128629] 
[   29.128987] The buggy address belongs to the physical page:
[   29.129664] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1012e8
[   29.130544] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   29.131311] page_type: f5(slab)
[   29.131834] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   29.132648] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   29.133515] page dumped because: kasan: bad access detected
[   29.134146] 
[   29.134477] Memory state around the buggy address:
[   29.135139]  fff00000c12e8680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.135931]  fff00000c12e8700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.136785] >fff00000c12e8780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   29.137554]                                      ^
[   29.138182]  fff00000c12e8800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.138964]  fff00000c12e8880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.139738] ==================================================================
[   29.142365] ==================================================================
[   29.143180] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e04/0x4858
[   29.143857] Read of size 4 at addr fff00000c12e87b0 by task kunit_try_catch/253
[   29.144508] 
[   29.145160] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc2-next-20241209 #1
[   29.146886] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.147554] Hardware name: linux,dummy-virt (DT)
[   29.148374] Call trace:
[   29.148910]  show_stack+0x20/0x38 (C)
[   29.149409]  dump_stack_lvl+0x8c/0xd0
[   29.149912]  print_report+0x118/0x5e0
[   29.150389]  kasan_report+0xc8/0x118
[   29.150998]  __asan_report_load4_noabort+0x20/0x30
[   29.151659]  kasan_atomics_helper+0x3e04/0x4858
[   29.152377]  kasan_atomics+0x198/0x2e8
[   29.152990]  kunit_try_run_case+0x14c/0x3d0
[   29.153613]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.154264]  kthread+0x24c/0x2d0
[   29.154864]  ret_from_fork+0x10/0x20
[   29.155419] 
[   29.155788] Allocated by task 253:
[   29.156253]  kasan_save_stack+0x3c/0x68
[   29.156846]  kasan_save_track+0x20/0x40
[   29.157419]  kasan_save_alloc_info+0x40/0x58
[   29.157982]  __kasan_kmalloc+0xd4/0xd8
[   29.158592]  __kmalloc_cache_noprof+0x15c/0x3c0
[   29.159177]  kasan_atomics+0xb8/0x2e8
[   29.159807]  kunit_try_run_case+0x14c/0x3d0
[   29.160376]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.161085]  kthread+0x24c/0x2d0
[   29.161573]  ret_from_fork+0x10/0x20
[   29.162048] 
[   29.162406] The buggy address belongs to the object at fff00000c12e8780
[   29.162406]  which belongs to the cache kmalloc-64 of size 64
[   29.163634] The buggy address is located 0 bytes to the right of
[   29.163634]  allocated 48-byte region [fff00000c12e8780, fff00000c12e87b0)
[   29.164916] 
[   29.165240] The buggy address belongs to the physical page:
[   29.165930] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1012e8
[   29.166805] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   29.167555] page_type: f5(slab)
[   29.168016] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   29.168904] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   29.169741] page dumped because: kasan: bad access detected
[   29.170357] 
[   29.170708] Memory state around the buggy address:
[   29.171289]  fff00000c12e8680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.172029]  fff00000c12e8700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.172796] >fff00000c12e8780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   29.173647]                                      ^
[   29.174253]  fff00000c12e8800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.175057]  fff00000c12e8880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.175840] ==================================================================
[   29.493352] ==================================================================
[   29.494326] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x10c0/0x4858
[   29.496002] Write of size 8 at addr fff00000c12e87b0 by task kunit_try_catch/253
[   29.496937] 
[   29.497361] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc2-next-20241209 #1
[   29.498372] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.499099] Hardware name: linux,dummy-virt (DT)
[   29.499802] Call trace:
[   29.500295]  show_stack+0x20/0x38 (C)
[   29.500956]  dump_stack_lvl+0x8c/0xd0
[   29.501607]  print_report+0x118/0x5e0
[   29.502186]  kasan_report+0xc8/0x118
[   29.502740]  kasan_check_range+0x100/0x1a8
[   29.503325]  __kasan_check_write+0x20/0x30
[   29.503882]  kasan_atomics_helper+0x10c0/0x4858
[   29.504568]  kasan_atomics+0x198/0x2e8
[   29.505161]  kunit_try_run_case+0x14c/0x3d0
[   29.505846]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.506546]  kthread+0x24c/0x2d0
[   29.507105]  ret_from_fork+0x10/0x20
[   29.507723] 
[   29.508038] Allocated by task 253:
[   29.508513]  kasan_save_stack+0x3c/0x68
[   29.509075]  kasan_save_track+0x20/0x40
[   29.509578]  kasan_save_alloc_info+0x40/0x58
[   29.510248]  __kasan_kmalloc+0xd4/0xd8
[   29.510833]  __kmalloc_cache_noprof+0x15c/0x3c0
[   29.511426]  kasan_atomics+0xb8/0x2e8
[   29.511975]  kunit_try_run_case+0x14c/0x3d0
[   29.512535]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.513146]  kthread+0x24c/0x2d0
[   29.513680]  ret_from_fork+0x10/0x20
[   29.514377] 
[   29.514676] The buggy address belongs to the object at fff00000c12e8780
[   29.514676]  which belongs to the cache kmalloc-64 of size 64
[   29.515937] The buggy address is located 0 bytes to the right of
[   29.515937]  allocated 48-byte region [fff00000c12e8780, fff00000c12e87b0)
[   29.517241] 
[   29.517580] The buggy address belongs to the physical page:
[   29.518154] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1012e8
[   29.518981] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   29.519788] page_type: f5(slab)
[   29.520259] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   29.521184] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   29.521974] page dumped because: kasan: bad access detected
[   29.522618] 
[   29.522962] Memory state around the buggy address:
[   29.523559]  fff00000c12e8680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.524305]  fff00000c12e8700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.525115] >fff00000c12e8780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   29.525917]                                      ^
[   29.526559]  fff00000c12e8800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.527325]  fff00000c12e8880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.528103] ==================================================================
[   29.317335] ==================================================================
[   29.317959] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xeb8/0x4858
[   29.318960] Write of size 8 at addr fff00000c12e87b0 by task kunit_try_catch/253
[   29.319765] 
[   29.320110] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc2-next-20241209 #1
[   29.321197] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.321673] Hardware name: linux,dummy-virt (DT)
[   29.322361] Call trace:
[   29.322757]  show_stack+0x20/0x38 (C)
[   29.323279]  dump_stack_lvl+0x8c/0xd0
[   29.323876]  print_report+0x118/0x5e0
[   29.324524]  kasan_report+0xc8/0x118
[   29.325058]  kasan_check_range+0x100/0x1a8
[   29.325664]  __kasan_check_write+0x20/0x30
[   29.326362]  kasan_atomics_helper+0xeb8/0x4858
[   29.327018]  kasan_atomics+0x198/0x2e8
[   29.327563]  kunit_try_run_case+0x14c/0x3d0
[   29.328155]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.328847]  kthread+0x24c/0x2d0
[   29.329438]  ret_from_fork+0x10/0x20
[   29.330039] 
[   29.330327] Allocated by task 253:
[   29.330840]  kasan_save_stack+0x3c/0x68
[   29.331440]  kasan_save_track+0x20/0x40
[   29.332024]  kasan_save_alloc_info+0x40/0x58
[   29.332584]  __kasan_kmalloc+0xd4/0xd8
[   29.333174]  __kmalloc_cache_noprof+0x15c/0x3c0
[   29.333694]  kasan_atomics+0xb8/0x2e8
[   29.334329]  kunit_try_run_case+0x14c/0x3d0
[   29.334923]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.335515]  kthread+0x24c/0x2d0
[   29.336077]  ret_from_fork+0x10/0x20
[   29.336629] 
[   29.336947] The buggy address belongs to the object at fff00000c12e8780
[   29.336947]  which belongs to the cache kmalloc-64 of size 64
[   29.338237] The buggy address is located 0 bytes to the right of
[   29.338237]  allocated 48-byte region [fff00000c12e8780, fff00000c12e87b0)
[   29.339491] 
[   29.339848] The buggy address belongs to the physical page:
[   29.340468] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1012e8
[   29.341241] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   29.342147] page_type: f5(slab)
[   29.342606] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   29.343542] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   29.344364] page dumped because: kasan: bad access detected
[   29.345029] 
[   29.345348] Memory state around the buggy address:
[   29.345924]  fff00000c12e8680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.346733]  fff00000c12e8700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.347543] >fff00000c12e8780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   29.348283]                                      ^
[   29.348870]  fff00000c12e8800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.349725]  fff00000c12e8880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.350523] ==================================================================
[   29.603921] ==================================================================
[   29.604454] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x11f8/0x4858
[   29.605440] Write of size 8 at addr fff00000c12e87b0 by task kunit_try_catch/253
[   29.606258] 
[   29.606637] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc2-next-20241209 #1
[   29.607903] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.608517] Hardware name: linux,dummy-virt (DT)
[   29.609188] Call trace:
[   29.609635]  show_stack+0x20/0x38 (C)
[   29.610197]  dump_stack_lvl+0x8c/0xd0
[   29.610932]  print_report+0x118/0x5e0
[   29.611499]  kasan_report+0xc8/0x118
[   29.612173]  kasan_check_range+0x100/0x1a8
[   29.612877]  __kasan_check_write+0x20/0x30
[   29.613514]  kasan_atomics_helper+0x11f8/0x4858
[   29.614199]  kasan_atomics+0x198/0x2e8
[   29.614803]  kunit_try_run_case+0x14c/0x3d0
[   29.615449]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.616188]  kthread+0x24c/0x2d0
[   29.616766]  ret_from_fork+0x10/0x20
[   29.617364] 
[   29.617653] Allocated by task 253:
[   29.618189]  kasan_save_stack+0x3c/0x68
[   29.618809]  kasan_save_track+0x20/0x40
[   29.619433]  kasan_save_alloc_info+0x40/0x58
[   29.620088]  __kasan_kmalloc+0xd4/0xd8
[   29.620721]  __kmalloc_cache_noprof+0x15c/0x3c0
[   29.621634]  kasan_atomics+0xb8/0x2e8
[   29.622050]  kunit_try_run_case+0x14c/0x3d0
[   29.622839]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.624111]  kthread+0x24c/0x2d0
[   29.624780]  ret_from_fork+0x10/0x20
[   29.625493] 
[   29.626493] The buggy address belongs to the object at fff00000c12e8780
[   29.626493]  which belongs to the cache kmalloc-64 of size 64
[   29.628547] The buggy address is located 0 bytes to the right of
[   29.628547]  allocated 48-byte region [fff00000c12e8780, fff00000c12e87b0)
[   29.629843] 
[   29.630227] The buggy address belongs to the physical page:
[   29.630868] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1012e8
[   29.631902] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   29.632679] page_type: f5(slab)
[   29.633223] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   29.634152] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   29.635015] page dumped because: kasan: bad access detected
[   29.635713] 
[   29.636097] Memory state around the buggy address:
[   29.636746]  fff00000c12e8680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.637501]  fff00000c12e8700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.638397] >fff00000c12e8780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   29.639218]                                      ^
[   29.639856]  fff00000c12e8800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.640695]  fff00000c12e8880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.641496] ==================================================================
[   28.557256] ==================================================================
[   28.557985] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x7cc/0x4858
[   28.559014] Write of size 4 at addr fff00000c12e87b0 by task kunit_try_catch/253
[   28.559778] 
[   28.560152] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc2-next-20241209 #1
[   28.561204] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.561861] Hardware name: linux,dummy-virt (DT)
[   28.562727] Call trace:
[   28.563202]  show_stack+0x20/0x38 (C)
[   28.563947]  dump_stack_lvl+0x8c/0xd0
[   28.564623]  print_report+0x118/0x5e0
[   28.565317]  kasan_report+0xc8/0x118
[   28.565970]  kasan_check_range+0x100/0x1a8
[   28.566635]  __kasan_check_write+0x20/0x30
[   28.567332]  kasan_atomics_helper+0x7cc/0x4858
[   28.568042]  kasan_atomics+0x198/0x2e8
[   28.568723]  kunit_try_run_case+0x14c/0x3d0
[   28.569485]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   28.570292]  kthread+0x24c/0x2d0
[   28.570889]  ret_from_fork+0x10/0x20
[   28.571525] 
[   28.571956] Allocated by task 253:
[   28.572512]  kasan_save_stack+0x3c/0x68
[   28.573173]  kasan_save_track+0x20/0x40
[   28.573835]  kasan_save_alloc_info+0x40/0x58
[   28.574519]  __kasan_kmalloc+0xd4/0xd8
[   28.575131]  __kmalloc_cache_noprof+0x15c/0x3c0
[   28.575813]  kasan_atomics+0xb8/0x2e8
[   28.576501]  kunit_try_run_case+0x14c/0x3d0
[   28.577194]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   28.577947]  kthread+0x24c/0x2d0
[   28.578528]  ret_from_fork+0x10/0x20
[   28.579139] 
[   28.579516] The buggy address belongs to the object at fff00000c12e8780
[   28.579516]  which belongs to the cache kmalloc-64 of size 64
[   28.580940] The buggy address is located 0 bytes to the right of
[   28.580940]  allocated 48-byte region [fff00000c12e8780, fff00000c12e87b0)
[   28.582447] 
[   28.582905] The buggy address belongs to the physical page:
[   28.583582] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1012e8
[   28.584577] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   28.585411] page_type: f5(slab)
[   28.586010] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   28.587158] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   28.588061] page dumped because: kasan: bad access detected
[   28.588828] 
[   28.589265] Memory state around the buggy address:
[   28.589968]  fff00000c12e8680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.590902]  fff00000c12e8700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.591780] >fff00000c12e8780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   28.592589]                                      ^
[   28.593283]  fff00000c12e8800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.594152]  fff00000c12e8880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.594981] ==================================================================
[   29.643185] ==================================================================
[   29.644062] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x126c/0x4858
[   29.644795] Write of size 8 at addr fff00000c12e87b0 by task kunit_try_catch/253
[   29.645643] 
[   29.645971] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc2-next-20241209 #1
[   29.647496] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.648129] Hardware name: linux,dummy-virt (DT)
[   29.648580] Call trace:
[   29.649024]  show_stack+0x20/0x38 (C)
[   29.649660]  dump_stack_lvl+0x8c/0xd0
[   29.650208]  print_report+0x118/0x5e0
[   29.650820]  kasan_report+0xc8/0x118
[   29.651386]  kasan_check_range+0x100/0x1a8
[   29.652025]  __kasan_check_write+0x20/0x30
[   29.652684]  kasan_atomics_helper+0x126c/0x4858
[   29.653393]  kasan_atomics+0x198/0x2e8
[   29.653932]  kunit_try_run_case+0x14c/0x3d0
[   29.654505]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.655245]  kthread+0x24c/0x2d0
[   29.655843]  ret_from_fork+0x10/0x20
[   29.656398] 
[   29.656783] Allocated by task 253:
[   29.657217]  kasan_save_stack+0x3c/0x68
[   29.657822]  kasan_save_track+0x20/0x40
[   29.658483]  kasan_save_alloc_info+0x40/0x58
[   29.659015]  __kasan_kmalloc+0xd4/0xd8
[   29.659630]  __kmalloc_cache_noprof+0x15c/0x3c0
[   29.660237]  kasan_atomics+0xb8/0x2e8
[   29.660778]  kunit_try_run_case+0x14c/0x3d0
[   29.661345]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.662022]  kthread+0x24c/0x2d0
[   29.662491]  ret_from_fork+0x10/0x20
[   29.663066] 
[   29.663370] The buggy address belongs to the object at fff00000c12e8780
[   29.663370]  which belongs to the cache kmalloc-64 of size 64
[   29.664528] The buggy address is located 0 bytes to the right of
[   29.664528]  allocated 48-byte region [fff00000c12e8780, fff00000c12e87b0)
[   29.666212] 
[   29.666467] The buggy address belongs to the physical page:
[   29.666970] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1012e8
[   29.667612] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   29.668346] page_type: f5(slab)
[   29.669282] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   29.670283] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   29.670981] page dumped because: kasan: bad access detected
[   29.671634] 
[   29.672089] Memory state around the buggy address:
[   29.672783]  fff00000c12e8680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.673725]  fff00000c12e8700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.674471] >fff00000c12e8780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   29.675396]                                      ^
[   29.675940]  fff00000c12e8800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.677090]  fff00000c12e8880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.678034] ==================================================================
[   28.046793] ==================================================================
[   28.047786] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x2b0/0x4858
[   28.048862] Read of size 4 at addr fff00000c12e87b0 by task kunit_try_catch/253
[   28.049859] 
[   28.050170] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc2-next-20241209 #1
[   28.051558] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.052406] Hardware name: linux,dummy-virt (DT)
[   28.053088] Call trace:
[   28.053621]  show_stack+0x20/0x38 (C)
[   28.054328]  dump_stack_lvl+0x8c/0xd0
[   28.055065]  print_report+0x118/0x5e0
[   28.055607]  kasan_report+0xc8/0x118
[   28.056240]  kasan_check_range+0x100/0x1a8
[   28.056981]  __kasan_check_read+0x20/0x30
[   28.057648]  kasan_atomics_helper+0x2b0/0x4858
[   28.058400]  kasan_atomics+0x198/0x2e8
[   28.059109]  kunit_try_run_case+0x14c/0x3d0
[   28.059807]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   28.060547]  kthread+0x24c/0x2d0
[   28.061138]  ret_from_fork+0x10/0x20
[   28.061765] 
[   28.062092] Allocated by task 253:
[   28.062596]  kasan_save_stack+0x3c/0x68
[   28.063312]  kasan_save_track+0x20/0x40
[   28.063944]  kasan_save_alloc_info+0x40/0x58
[   28.064544]  __kasan_kmalloc+0xd4/0xd8
[   28.065181]  __kmalloc_cache_noprof+0x15c/0x3c0
[   28.065896]  kasan_atomics+0xb8/0x2e8
[   28.066417]  kunit_try_run_case+0x14c/0x3d0
[   28.067057]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   28.068006]  kthread+0x24c/0x2d0
[   28.068730]  ret_from_fork+0x10/0x20
[   28.069548] 
[   28.070139] The buggy address belongs to the object at fff00000c12e8780
[   28.070139]  which belongs to the cache kmalloc-64 of size 64
[   28.071568] The buggy address is located 0 bytes to the right of
[   28.071568]  allocated 48-byte region [fff00000c12e8780, fff00000c12e87b0)
[   28.072924] 
[   28.073244] The buggy address belongs to the physical page:
[   28.073997] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1012e8
[   28.075239] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   28.075998] page_type: f5(slab)
[   28.076523] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   28.077418] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   28.078268] page dumped because: kasan: bad access detected
[   28.078942] 
[   28.079288] Memory state around the buggy address:
[   28.080217]  fff00000c12e8680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.080983]  fff00000c12e8700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.081904] >fff00000c12e8780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   28.082740]                                      ^
[   28.083454]  fff00000c12e8800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.084260]  fff00000c12e8880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.085253] ==================================================================
[   29.822237] ==================================================================
[   29.822895] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x147c/0x4858
[   29.823847] Write of size 8 at addr fff00000c12e87b0 by task kunit_try_catch/253
[   29.824636] 
[   29.825004] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc2-next-20241209 #1
[   29.826157] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.826667] Hardware name: linux,dummy-virt (DT)
[   29.827201] Call trace:
[   29.827591]  show_stack+0x20/0x38 (C)
[   29.828205]  dump_stack_lvl+0x8c/0xd0
[   29.828827]  print_report+0x118/0x5e0
[   29.829384]  kasan_report+0xc8/0x118
[   29.829970]  kasan_check_range+0x100/0x1a8
[   29.830625]  __kasan_check_write+0x20/0x30
[   29.831440]  kasan_atomics_helper+0x147c/0x4858
[   29.832144]  kasan_atomics+0x198/0x2e8
[   29.832693]  kunit_try_run_case+0x14c/0x3d0
[   29.833229]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.833882]  kthread+0x24c/0x2d0
[   29.834400]  ret_from_fork+0x10/0x20
[   29.834977] 
[   29.835344] Allocated by task 253:
[   29.835800]  kasan_save_stack+0x3c/0x68
[   29.836402]  kasan_save_track+0x20/0x40
[   29.836959]  kasan_save_alloc_info+0x40/0x58
[   29.837587]  __kasan_kmalloc+0xd4/0xd8
[   29.838137]  __kmalloc_cache_noprof+0x15c/0x3c0
[   29.838798]  kasan_atomics+0xb8/0x2e8
[   29.839328]  kunit_try_run_case+0x14c/0x3d0
[   29.839901]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.840518]  kthread+0x24c/0x2d0
[   29.841135]  ret_from_fork+0x10/0x20
[   29.841604] 
[   29.841950] The buggy address belongs to the object at fff00000c12e8780
[   29.841950]  which belongs to the cache kmalloc-64 of size 64
[   29.843245] The buggy address is located 0 bytes to the right of
[   29.843245]  allocated 48-byte region [fff00000c12e8780, fff00000c12e87b0)
[   29.844507] 
[   29.844853] The buggy address belongs to the physical page:
[   29.845611] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1012e8
[   29.846506] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   29.847259] page_type: f5(slab)
[   29.847762] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   29.848601] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   29.849460] page dumped because: kasan: bad access detected
[   29.850101] 
[   29.850409] Memory state around the buggy address:
[   29.851015]  fff00000c12e8680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.851795]  fff00000c12e8700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.852525] >fff00000c12e8780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   29.853366]                                      ^
[   29.854028]  fff00000c12e8800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.854805]  fff00000c12e8880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.855553] ==================================================================
[   29.857100] ==================================================================
[   29.857835] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x14e4/0x4858
[   29.858453] Write of size 8 at addr fff00000c12e87b0 by task kunit_try_catch/253
[   29.859507] 
[   29.859906] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc2-next-20241209 #1
[   29.861123] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.861640] Hardware name: linux,dummy-virt (DT)
[   29.862235] Call trace:
[   29.862667]  show_stack+0x20/0x38 (C)
[   29.863221]  dump_stack_lvl+0x8c/0xd0
[   29.863789]  print_report+0x118/0x5e0
[   29.864319]  kasan_report+0xc8/0x118
[   29.864949]  kasan_check_range+0x100/0x1a8
[   29.865660]  __kasan_check_write+0x20/0x30
[   29.866264]  kasan_atomics_helper+0x14e4/0x4858
[   29.867042]  kasan_atomics+0x198/0x2e8
[   29.867651]  kunit_try_run_case+0x14c/0x3d0
[   29.868248]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.868905]  kthread+0x24c/0x2d0
[   29.869511]  ret_from_fork+0x10/0x20
[   29.870085] 
[   29.870427] Allocated by task 253:
[   29.870906]  kasan_save_stack+0x3c/0x68
[   29.871501]  kasan_save_track+0x20/0x40
[   29.872028]  kasan_save_alloc_info+0x40/0x58
[   29.872548]  __kasan_kmalloc+0xd4/0xd8
[   29.873142]  __kmalloc_cache_noprof+0x15c/0x3c0
[   29.873903]  kasan_atomics+0xb8/0x2e8
[   29.874446]  kunit_try_run_case+0x14c/0x3d0
[   29.874997]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.875726]  kthread+0x24c/0x2d0
[   29.876215]  ret_from_fork+0x10/0x20
[   29.876755] 
[   29.877066] The buggy address belongs to the object at fff00000c12e8780
[   29.877066]  which belongs to the cache kmalloc-64 of size 64
[   29.878219] The buggy address is located 0 bytes to the right of
[   29.878219]  allocated 48-byte region [fff00000c12e8780, fff00000c12e87b0)
[   29.879414] 
[   29.879804] The buggy address belongs to the physical page:
[   29.880464] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1012e8
[   29.881297] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   29.882073] page_type: f5(slab)
[   29.882628] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   29.883453] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   29.884333] page dumped because: kasan: bad access detected
[   29.885021] 
[   29.885345] Memory state around the buggy address:
[   29.885959]  fff00000c12e8680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.886735]  fff00000c12e8700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.887525] >fff00000c12e8780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   29.888301]                                      ^
[   29.888907]  fff00000c12e8800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.889669]  fff00000c12e8880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.890508] ==================================================================
[   28.125057] ==================================================================
[   28.125843] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x32c/0x4858
[   28.127550] Write of size 4 at addr fff00000c12e87b0 by task kunit_try_catch/253
[   28.128421] 
[   28.128764] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc2-next-20241209 #1
[   28.129923] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.130462] Hardware name: linux,dummy-virt (DT)
[   28.131123] Call trace:
[   28.131531]  show_stack+0x20/0x38 (C)
[   28.132100]  dump_stack_lvl+0x8c/0xd0
[   28.132816]  print_report+0x118/0x5e0
[   28.133302]  kasan_report+0xc8/0x118
[   28.133800]  kasan_check_range+0x100/0x1a8
[   28.134395]  __kasan_check_write+0x20/0x30
[   28.135169]  kasan_atomics_helper+0x32c/0x4858
[   28.135883]  kasan_atomics+0x198/0x2e8
[   28.136479]  kunit_try_run_case+0x14c/0x3d0
[   28.137140]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   28.137826]  kthread+0x24c/0x2d0
[   28.138339]  ret_from_fork+0x10/0x20
[   28.138878] 
[   28.139250] Allocated by task 253:
[   28.139685]  kasan_save_stack+0x3c/0x68
[   28.140315]  kasan_save_track+0x20/0x40
[   28.140877]  kasan_save_alloc_info+0x40/0x58
[   28.141438]  __kasan_kmalloc+0xd4/0xd8
[   28.141992]  __kmalloc_cache_noprof+0x15c/0x3c0
[   28.142588]  kasan_atomics+0xb8/0x2e8
[   28.143166]  kunit_try_run_case+0x14c/0x3d0
[   28.143767]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   28.144459]  kthread+0x24c/0x2d0
[   28.144948]  ret_from_fork+0x10/0x20
[   28.145469] 
[   28.145805] The buggy address belongs to the object at fff00000c12e8780
[   28.145805]  which belongs to the cache kmalloc-64 of size 64
[   28.147029] The buggy address is located 0 bytes to the right of
[   28.147029]  allocated 48-byte region [fff00000c12e8780, fff00000c12e87b0)
[   28.148202] 
[   28.148579] The buggy address belongs to the physical page:
[   28.149182] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1012e8
[   28.150110] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   28.150841] page_type: f5(slab)
[   28.151302] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   28.152107] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   28.152984] page dumped because: kasan: bad access detected
[   28.153624] 
[   28.153863] Memory state around the buggy address:
[   28.154452]  fff00000c12e8680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.155304]  fff00000c12e8700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.156057] >fff00000c12e8780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   28.156968]                                      ^
[   28.157474]  fff00000c12e8800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.158345]  fff00000c12e8880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.159104] ==================================================================
[   29.422742] ==================================================================
[   29.423524] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xff0/0x4858
[   29.424423] Write of size 8 at addr fff00000c12e87b0 by task kunit_try_catch/253
[   29.425333] 
[   29.425724] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc2-next-20241209 #1
[   29.426785] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.427269] Hardware name: linux,dummy-virt (DT)
[   29.427842] Call trace:
[   29.428285]  show_stack+0x20/0x38 (C)
[   29.428813]  dump_stack_lvl+0x8c/0xd0
[   29.429492]  print_report+0x118/0x5e0
[   29.430006]  kasan_report+0xc8/0x118
[   29.430672]  kasan_check_range+0x100/0x1a8
[   29.431252]  __kasan_check_write+0x20/0x30
[   29.431921]  kasan_atomics_helper+0xff0/0x4858
[   29.432539]  kasan_atomics+0x198/0x2e8
[   29.433152]  kunit_try_run_case+0x14c/0x3d0
[   29.433777]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.434506]  kthread+0x24c/0x2d0
[   29.435026]  ret_from_fork+0x10/0x20
[   29.435596] 
[   29.435937] Allocated by task 253:
[   29.436375]  kasan_save_stack+0x3c/0x68
[   29.437034]  kasan_save_track+0x20/0x40
[   29.437589]  kasan_save_alloc_info+0x40/0x58
[   29.438304]  __kasan_kmalloc+0xd4/0xd8
[   29.438861]  __kmalloc_cache_noprof+0x15c/0x3c0
[   29.439411]  kasan_atomics+0xb8/0x2e8
[   29.439979]  kunit_try_run_case+0x14c/0x3d0
[   29.440624]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.441304]  kthread+0x24c/0x2d0
[   29.441754]  ret_from_fork+0x10/0x20
[   29.442350] 
[   29.442681] The buggy address belongs to the object at fff00000c12e8780
[   29.442681]  which belongs to the cache kmalloc-64 of size 64
[   29.443820] The buggy address is located 0 bytes to the right of
[   29.443820]  allocated 48-byte region [fff00000c12e8780, fff00000c12e87b0)
[   29.445157] 
[   29.445527] The buggy address belongs to the physical page:
[   29.446104] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1012e8
[   29.447048] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   29.447787] page_type: f5(slab)
[   29.448367] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   29.449227] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   29.450146] page dumped because: kasan: bad access detected
[   29.450867] 
[   29.451172] Memory state around the buggy address:
[   29.451692]  fff00000c12e8680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.452497]  fff00000c12e8700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.453297] >fff00000c12e8780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   29.454157]                                      ^
[   29.454744]  fff00000c12e8800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.455527]  fff00000c12e8880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.456306] ==================================================================
[   29.245899] ==================================================================
[   29.246645] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xe44/0x4858
[   29.247373] Write of size 8 at addr fff00000c12e87b0 by task kunit_try_catch/253
[   29.248317] 
[   29.248772] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc2-next-20241209 #1
[   29.251084] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.251648] Hardware name: linux,dummy-virt (DT)
[   29.252412] Call trace:
[   29.252830]  show_stack+0x20/0x38 (C)
[   29.253474]  dump_stack_lvl+0x8c/0xd0
[   29.254082]  print_report+0x118/0x5e0
[   29.254679]  kasan_report+0xc8/0x118
[   29.255290]  kasan_check_range+0x100/0x1a8
[   29.255908]  __kasan_check_write+0x20/0x30
[   29.256506]  kasan_atomics_helper+0xe44/0x4858
[   29.257220]  kasan_atomics+0x198/0x2e8
[   29.257827]  kunit_try_run_case+0x14c/0x3d0
[   29.258474]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.259212]  kthread+0x24c/0x2d0
[   29.259760]  ret_from_fork+0x10/0x20
[   29.260314] 
[   29.260642] Allocated by task 253:
[   29.261145]  kasan_save_stack+0x3c/0x68
[   29.261650]  kasan_save_track+0x20/0x40
[   29.262299]  kasan_save_alloc_info+0x40/0x58
[   29.262867]  __kasan_kmalloc+0xd4/0xd8
[   29.263439]  __kmalloc_cache_noprof+0x15c/0x3c0
[   29.264113]  kasan_atomics+0xb8/0x2e8
[   29.264636]  kunit_try_run_case+0x14c/0x3d0
[   29.265228]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.265869]  kthread+0x24c/0x2d0
[   29.266400]  ret_from_fork+0x10/0x20
[   29.266932] 
[   29.267250] The buggy address belongs to the object at fff00000c12e8780
[   29.267250]  which belongs to the cache kmalloc-64 of size 64
[   29.268507] The buggy address is located 0 bytes to the right of
[   29.268507]  allocated 48-byte region [fff00000c12e8780, fff00000c12e87b0)
[   29.269822] 
[   29.270183] The buggy address belongs to the physical page:
[   29.270752] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1012e8
[   29.271743] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   29.272522] page_type: f5(slab)
[   29.273178] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   29.274051] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   29.274891] page dumped because: kasan: bad access detected
[   29.275486] 
[   29.275816] Memory state around the buggy address:
[   29.276393]  fff00000c12e8680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.277289]  fff00000c12e8700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.278023] >fff00000c12e8780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   29.278907]                                      ^
[   29.279553]  fff00000c12e8800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.280336]  fff00000c12e8880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.281176] ==================================================================
[   28.849655] ==================================================================
[   28.850473] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3dcc/0x4858
[   28.851241] Read of size 4 at addr fff00000c12e87b0 by task kunit_try_catch/253
[   28.852740] 
[   28.853243] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc2-next-20241209 #1
[   28.854360] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.855007] Hardware name: linux,dummy-virt (DT)
[   28.855629] Call trace:
[   28.856066]  show_stack+0x20/0x38 (C)
[   28.856721]  dump_stack_lvl+0x8c/0xd0
[   28.857351]  print_report+0x118/0x5e0
[   28.857940]  kasan_report+0xc8/0x118
[   28.858410]  __asan_report_load4_noabort+0x20/0x30
[   28.859113]  kasan_atomics_helper+0x3dcc/0x4858
[   28.859667]  kasan_atomics+0x198/0x2e8
[   28.860289]  kunit_try_run_case+0x14c/0x3d0
[   28.860929]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   28.861732]  kthread+0x24c/0x2d0
[   28.862240]  ret_from_fork+0x10/0x20
[   28.862784] 
[   28.863160] Allocated by task 253:
[   28.863670]  kasan_save_stack+0x3c/0x68
[   28.864218]  kasan_save_track+0x20/0x40
[   28.864791]  kasan_save_alloc_info+0x40/0x58
[   28.865430]  __kasan_kmalloc+0xd4/0xd8
[   28.865915]  __kmalloc_cache_noprof+0x15c/0x3c0
[   28.866610]  kasan_atomics+0xb8/0x2e8
[   28.867133]  kunit_try_run_case+0x14c/0x3d0
[   28.867686]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   28.868355]  kthread+0x24c/0x2d0
[   28.868920]  ret_from_fork+0x10/0x20
[   28.869420] 
[   28.869787] The buggy address belongs to the object at fff00000c12e8780
[   28.869787]  which belongs to the cache kmalloc-64 of size 64
[   28.871006] The buggy address is located 0 bytes to the right of
[   28.871006]  allocated 48-byte region [fff00000c12e8780, fff00000c12e87b0)
[   28.872255] 
[   28.872615] The buggy address belongs to the physical page:
[   28.873334] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1012e8
[   28.874268] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   28.875012] page_type: f5(slab)
[   28.875482] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   28.876338] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   28.877127] page dumped because: kasan: bad access detected
[   28.877811] 
[   28.878122] Memory state around the buggy address:
[   28.878680]  fff00000c12e8680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.879475]  fff00000c12e8700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.880276] >fff00000c12e8780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   28.881065]                                      ^
[   28.881678]  fff00000c12e8800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.882555]  fff00000c12e8880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.883380] ==================================================================
[   30.138114] ==================================================================
[   30.138865] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x175c/0x4858
[   30.139808] Write of size 8 at addr fff00000c12e87b0 by task kunit_try_catch/253
[   30.141441] 
[   30.141906] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc2-next-20241209 #1
[   30.142993] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.143490] Hardware name: linux,dummy-virt (DT)
[   30.144106] Call trace:
[   30.144515]  show_stack+0x20/0x38 (C)
[   30.145075]  dump_stack_lvl+0x8c/0xd0
[   30.145720]  print_report+0x118/0x5e0
[   30.146268]  kasan_report+0xc8/0x118
[   30.146793]  kasan_check_range+0x100/0x1a8
[   30.147433]  __kasan_check_write+0x20/0x30
[   30.148061]  kasan_atomics_helper+0x175c/0x4858
[   30.148694]  kasan_atomics+0x198/0x2e8
[   30.149284]  kunit_try_run_case+0x14c/0x3d0
[   30.149919]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.150667]  kthread+0x24c/0x2d0
[   30.151214]  ret_from_fork+0x10/0x20
[   30.151763] 
[   30.152087] Allocated by task 253:
[   30.152547]  kasan_save_stack+0x3c/0x68
[   30.153173]  kasan_save_track+0x20/0x40
[   30.153736]  kasan_save_alloc_info+0x40/0x58
[   30.154364]  __kasan_kmalloc+0xd4/0xd8
[   30.154910]  __kmalloc_cache_noprof+0x15c/0x3c0
[   30.155488]  kasan_atomics+0xb8/0x2e8
[   30.156153]  kunit_try_run_case+0x14c/0x3d0
[   30.156743]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.157447]  kthread+0x24c/0x2d0
[   30.157911]  ret_from_fork+0x10/0x20
[   30.158448] 
[   30.158812] The buggy address belongs to the object at fff00000c12e8780
[   30.158812]  which belongs to the cache kmalloc-64 of size 64
[   30.159980] The buggy address is located 0 bytes to the right of
[   30.159980]  allocated 48-byte region [fff00000c12e8780, fff00000c12e87b0)
[   30.161298] 
[   30.161636] The buggy address belongs to the physical page:
[   30.162275] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1012e8
[   30.163148] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   30.163869] page_type: f5(slab)
[   30.164321] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   30.165256] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   30.166066] page dumped because: kasan: bad access detected
[   30.166729] 
[   30.167047] Memory state around the buggy address:
[   30.167604]  fff00000c12e8680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   30.168404]  fff00000c12e8700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   30.169149] >fff00000c12e8780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   30.169974]                                      ^
[   30.170561]  fff00000c12e8800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.171335]  fff00000c12e8880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.172056] ==================================================================
[   27.929632] ==================================================================
[   27.930312] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f7c/0x4858
[   27.931117] Write of size 4 at addr fff00000c12e87b0 by task kunit_try_catch/253
[   27.932785] 
[   27.933263] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc2-next-20241209 #1
[   27.935162] Tainted: [B]=BAD_PAGE, [N]=TEST
[   27.936001] Hardware name: linux,dummy-virt (DT)
[   27.936575] Call trace:
[   27.936853]  show_stack+0x20/0x38 (C)
[   27.937543]  dump_stack_lvl+0x8c/0xd0
[   27.938145]  print_report+0x118/0x5e0
[   27.938834]  kasan_report+0xc8/0x118
[   27.939432]  __asan_report_store4_noabort+0x20/0x30
[   27.940184]  kasan_atomics_helper+0x3f7c/0x4858
[   27.940868]  kasan_atomics+0x198/0x2e8
[   27.941469]  kunit_try_run_case+0x14c/0x3d0
[   27.942117]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   27.942904]  kthread+0x24c/0x2d0
[   27.943517]  ret_from_fork+0x10/0x20
[   27.944225] 
[   27.944462] Allocated by task 253:
[   27.945186]  kasan_save_stack+0x3c/0x68
[   27.945845]  kasan_save_track+0x20/0x40
[   27.946467]  kasan_save_alloc_info+0x40/0x58
[   27.947126]  __kasan_kmalloc+0xd4/0xd8
[   27.947622]  __kmalloc_cache_noprof+0x15c/0x3c0
[   27.948420]  kasan_atomics+0xb8/0x2e8
[   27.949035]  kunit_try_run_case+0x14c/0x3d0
[   27.949665]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   27.950389]  kthread+0x24c/0x2d0
[   27.951002]  ret_from_fork+0x10/0x20
[   27.951561] 
[   27.951933] The buggy address belongs to the object at fff00000c12e8780
[   27.951933]  which belongs to the cache kmalloc-64 of size 64
[   27.953408] The buggy address is located 0 bytes to the right of
[   27.953408]  allocated 48-byte region [fff00000c12e8780, fff00000c12e87b0)
[   27.954472] 
[   27.954742] The buggy address belongs to the physical page:
[   27.955483] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1012e8
[   27.956323] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   27.957372] page_type: f5(slab)
[   27.958024] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   27.959180] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   27.960012] page dumped because: kasan: bad access detected
[   27.960339] 
[   27.960480] Memory state around the buggy address:
[   27.960776]  fff00000c12e8680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.961322]  fff00000c12e8700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.962292] >fff00000c12e8780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   27.963137]                                      ^
[   27.963816]  fff00000c12e8800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.964740]  fff00000c12e8880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.965548] ==================================================================
[   29.786318] ==================================================================
[   29.787011] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1414/0x4858
[   29.788191] Write of size 8 at addr fff00000c12e87b0 by task kunit_try_catch/253
[   29.789876] 
[   29.790278] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc2-next-20241209 #1
[   29.791583] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.792116] Hardware name: linux,dummy-virt (DT)
[   29.792693] Call trace:
[   29.793114]  show_stack+0x20/0x38 (C)
[   29.793642]  dump_stack_lvl+0x8c/0xd0
[   29.794244]  print_report+0x118/0x5e0
[   29.794804]  kasan_report+0xc8/0x118
[   29.795396]  kasan_check_range+0x100/0x1a8
[   29.796016]  __kasan_check_write+0x20/0x30
[   29.796671]  kasan_atomics_helper+0x1414/0x4858
[   29.797352]  kasan_atomics+0x198/0x2e8
[   29.797992]  kunit_try_run_case+0x14c/0x3d0
[   29.798584]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.799251]  kthread+0x24c/0x2d0
[   29.799819]  ret_from_fork+0x10/0x20
[   29.800221] 
[   29.800596] Allocated by task 253:
[   29.801113]  kasan_save_stack+0x3c/0x68
[   29.801630]  kasan_save_track+0x20/0x40
[   29.802227]  kasan_save_alloc_info+0x40/0x58
[   29.802885]  __kasan_kmalloc+0xd4/0xd8
[   29.803410]  __kmalloc_cache_noprof+0x15c/0x3c0
[   29.803974]  kasan_atomics+0xb8/0x2e8
[   29.804559]  kunit_try_run_case+0x14c/0x3d0
[   29.805148]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.805795]  kthread+0x24c/0x2d0
[   29.806338]  ret_from_fork+0x10/0x20
[   29.806890] 
[   29.807203] The buggy address belongs to the object at fff00000c12e8780
[   29.807203]  which belongs to the cache kmalloc-64 of size 64
[   29.808473] The buggy address is located 0 bytes to the right of
[   29.808473]  allocated 48-byte region [fff00000c12e8780, fff00000c12e87b0)
[   29.809690] 
[   29.810021] The buggy address belongs to the physical page:
[   29.810712] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1012e8
[   29.811527] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   29.812358] page_type: f5(slab)
[   29.812910] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   29.813758] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   29.814583] page dumped because: kasan: bad access detected
[   29.815253] 
[   29.815573] Memory state around the buggy address:
[   29.816161]  fff00000c12e8680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.816910]  fff00000c12e8700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.817749] >fff00000c12e8780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   29.818530]                                      ^
[   29.819183]  fff00000c12e8800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.819972]  fff00000c12e8880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.820818] ==================================================================
[   28.412064] ==================================================================
[   28.412945] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x61c/0x4858
[   28.413648] Write of size 4 at addr fff00000c12e87b0 by task kunit_try_catch/253
[   28.414323] 
[   28.414549] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc2-next-20241209 #1
[   28.415577] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.416181] Hardware name: linux,dummy-virt (DT)
[   28.416729] Call trace:
[   28.417209]  show_stack+0x20/0x38 (C)
[   28.417852]  dump_stack_lvl+0x8c/0xd0
[   28.418488]  print_report+0x118/0x5e0
[   28.419239]  kasan_report+0xc8/0x118
[   28.419811]  kasan_check_range+0x100/0x1a8
[   28.420532]  __kasan_check_write+0x20/0x30
[   28.421220]  kasan_atomics_helper+0x61c/0x4858
[   28.422003]  kasan_atomics+0x198/0x2e8
[   28.422658]  kunit_try_run_case+0x14c/0x3d0
[   28.423377]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   28.424167]  kthread+0x24c/0x2d0
[   28.424670]  ret_from_fork+0x10/0x20
[   28.425332] 
[   28.425679] Allocated by task 253:
[   28.426171]  kasan_save_stack+0x3c/0x68
[   28.426754]  kasan_save_track+0x20/0x40
[   28.427275]  kasan_save_alloc_info+0x40/0x58
[   28.427798]  __kasan_kmalloc+0xd4/0xd8
[   28.428365]  __kmalloc_cache_noprof+0x15c/0x3c0
[   28.428898]  kasan_atomics+0xb8/0x2e8
[   28.429499]  kunit_try_run_case+0x14c/0x3d0
[   28.430095]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   28.430755]  kthread+0x24c/0x2d0
[   28.431272]  ret_from_fork+0x10/0x20
[   28.431834] 
[   28.432125] The buggy address belongs to the object at fff00000c12e8780
[   28.432125]  which belongs to the cache kmalloc-64 of size 64
[   28.433352] The buggy address is located 0 bytes to the right of
[   28.433352]  allocated 48-byte region [fff00000c12e8780, fff00000c12e87b0)
[   28.434629] 
[   28.434949] The buggy address belongs to the physical page:
[   28.435563] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1012e8
[   28.436489] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   28.437350] page_type: f5(slab)
[   28.437870] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   28.438762] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   28.439501] page dumped because: kasan: bad access detected
[   28.440219] 
[   28.440559] Memory state around the buggy address:
[   28.441154]  fff00000c12e8680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.441969]  fff00000c12e8700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.442792] >fff00000c12e8780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   28.443575]                                      ^
[   28.444187]  fff00000c12e8800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.444981]  fff00000c12e8880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.445793] ==================================================================
[   29.458906] ==================================================================
[   29.459747] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1058/0x4858
[   29.460434] Write of size 8 at addr fff00000c12e87b0 by task kunit_try_catch/253
[   29.461223] 
[   29.461601] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc2-next-20241209 #1
[   29.462677] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.463333] Hardware name: linux,dummy-virt (DT)
[   29.463859] Call trace:
[   29.464335]  show_stack+0x20/0x38 (C)
[   29.464962]  dump_stack_lvl+0x8c/0xd0
[   29.465517]  print_report+0x118/0x5e0
[   29.466050]  kasan_report+0xc8/0x118
[   29.466646]  kasan_check_range+0x100/0x1a8
[   29.467217]  __kasan_check_write+0x20/0x30
[   29.467837]  kasan_atomics_helper+0x1058/0x4858
[   29.468495]  kasan_atomics+0x198/0x2e8
[   29.469111]  kunit_try_run_case+0x14c/0x3d0
[   29.469763]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.470472]  kthread+0x24c/0x2d0
[   29.471081]  ret_from_fork+0x10/0x20
[   29.471587] 
[   29.471944] Allocated by task 253:
[   29.472416]  kasan_save_stack+0x3c/0x68
[   29.473081]  kasan_save_track+0x20/0x40
[   29.473614]  kasan_save_alloc_info+0x40/0x58
[   29.474184]  __kasan_kmalloc+0xd4/0xd8
[   29.474653]  __kmalloc_cache_noprof+0x15c/0x3c0
[   29.475323]  kasan_atomics+0xb8/0x2e8
[   29.475845]  kunit_try_run_case+0x14c/0x3d0
[   29.476367]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.477110]  kthread+0x24c/0x2d0
[   29.477594]  ret_from_fork+0x10/0x20
[   29.478125] 
[   29.478445] The buggy address belongs to the object at fff00000c12e8780
[   29.478445]  which belongs to the cache kmalloc-64 of size 64
[   29.479607] The buggy address is located 0 bytes to the right of
[   29.479607]  allocated 48-byte region [fff00000c12e8780, fff00000c12e87b0)
[   29.480862] 
[   29.481197] The buggy address belongs to the physical page:
[   29.481762] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1012e8
[   29.482658] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   29.483464] page_type: f5(slab)
[   29.483950] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   29.484871] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   29.485673] page dumped because: kasan: bad access detected
[   29.486318] 
[   29.486668] Memory state around the buggy address:
[   29.487265]  fff00000c12e8680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.488041]  fff00000c12e8700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.488846] >fff00000c12e8780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   29.489691]                                      ^
[   29.490287]  fff00000c12e8800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.491085]  fff00000c12e8880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.491839] ==================================================================
[   30.032731] ==================================================================
[   30.033567] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3df4/0x4858
[   30.034560] Read of size 8 at addr fff00000c12e87b0 by task kunit_try_catch/253
[   30.035630] 
[   30.035983] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc2-next-20241209 #1
[   30.037041] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.037529] Hardware name: linux,dummy-virt (DT)
[   30.038164] Call trace:
[   30.038590]  show_stack+0x20/0x38 (C)
[   30.039245]  dump_stack_lvl+0x8c/0xd0
[   30.039839]  print_report+0x118/0x5e0
[   30.040430]  kasan_report+0xc8/0x118
[   30.040998]  __asan_report_load8_noabort+0x20/0x30
[   30.041675]  kasan_atomics_helper+0x3df4/0x4858
[   30.042292]  kasan_atomics+0x198/0x2e8
[   30.042883]  kunit_try_run_case+0x14c/0x3d0
[   30.043484]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.044210]  kthread+0x24c/0x2d0
[   30.044819]  ret_from_fork+0x10/0x20
[   30.045402] 
[   30.045739] Allocated by task 253:
[   30.046164]  kasan_save_stack+0x3c/0x68
[   30.046733]  kasan_save_track+0x20/0x40
[   30.047295]  kasan_save_alloc_info+0x40/0x58
[   30.047914]  __kasan_kmalloc+0xd4/0xd8
[   30.048494]  __kmalloc_cache_noprof+0x15c/0x3c0
[   30.049111]  kasan_atomics+0xb8/0x2e8
[   30.049680]  kunit_try_run_case+0x14c/0x3d0
[   30.050315]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.051031]  kthread+0x24c/0x2d0
[   30.051548]  ret_from_fork+0x10/0x20
[   30.052073] 
[   30.052403] The buggy address belongs to the object at fff00000c12e8780
[   30.052403]  which belongs to the cache kmalloc-64 of size 64
[   30.053610] The buggy address is located 0 bytes to the right of
[   30.053610]  allocated 48-byte region [fff00000c12e8780, fff00000c12e87b0)
[   30.054919] 
[   30.055284] The buggy address belongs to the physical page:
[   30.055879] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1012e8
[   30.056784] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   30.057491] page_type: f5(slab)
[   30.058024] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   30.058816] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   30.059736] page dumped because: kasan: bad access detected
[   30.060355] 
[   30.060676] Memory state around the buggy address:
[   30.061267]  fff00000c12e8680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   30.062043]  fff00000c12e8700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   30.062826] >fff00000c12e8780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   30.063592]                                      ^
[   30.064189]  fff00000c12e8800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.065016]  fff00000c12e8880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.065775] ==================================================================
[   28.885834] ==================================================================
[   28.886760] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xb70/0x4858
[   28.887740] Write of size 4 at addr fff00000c12e87b0 by task kunit_try_catch/253
[   28.888531] 
[   28.888931] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc2-next-20241209 #1
[   28.890212] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.890443] Hardware name: linux,dummy-virt (DT)
[   28.890685] Call trace:
[   28.890883]  show_stack+0x20/0x38 (C)
[   28.891131]  dump_stack_lvl+0x8c/0xd0
[   28.891372]  print_report+0x118/0x5e0
[   28.891611]  kasan_report+0xc8/0x118
[   28.892591]  kasan_check_range+0x100/0x1a8
[   28.893548]  __kasan_check_write+0x20/0x30
[   28.894383]  kasan_atomics_helper+0xb70/0x4858
[   28.895173]  kasan_atomics+0x198/0x2e8
[   28.895667]  kunit_try_run_case+0x14c/0x3d0
[   28.896384]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   28.897158]  kthread+0x24c/0x2d0
[   28.897802]  ret_from_fork+0x10/0x20
[   28.898400] 
[   28.898839] Allocated by task 253:
[   28.899511]  kasan_save_stack+0x3c/0x68
[   28.900087]  kasan_save_track+0x20/0x40
[   28.900717]  kasan_save_alloc_info+0x40/0x58
[   28.901367]  __kasan_kmalloc+0xd4/0xd8
[   28.901972]  __kmalloc_cache_noprof+0x15c/0x3c0
[   28.902651]  kasan_atomics+0xb8/0x2e8
[   28.903289]  kunit_try_run_case+0x14c/0x3d0
[   28.903955]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   28.904724]  kthread+0x24c/0x2d0
[   28.905257]  ret_from_fork+0x10/0x20
[   28.905827] 
[   28.906204] The buggy address belongs to the object at fff00000c12e8780
[   28.906204]  which belongs to the cache kmalloc-64 of size 64
[   28.907494] The buggy address is located 0 bytes to the right of
[   28.907494]  allocated 48-byte region [fff00000c12e8780, fff00000c12e87b0)
[   28.908793] 
[   28.909199] The buggy address belongs to the physical page:
[   28.909880] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1012e8
[   28.910878] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   28.911617] page_type: f5(slab)
[   28.912098] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   28.913014] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   28.913888] page dumped because: kasan: bad access detected
[   28.914558] 
[   28.914887] Memory state around the buggy address:
[   28.915534]  fff00000c12e8680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.916355]  fff00000c12e8700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.917262] >fff00000c12e8780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   28.918061]                                      ^
[   28.918715]  fff00000c12e8800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.919589]  fff00000c12e8880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.920402] ==================================================================
[   28.482601] ==================================================================
[   28.483330] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x6ec/0x4858
[   28.485621] Write of size 4 at addr fff00000c12e87b0 by task kunit_try_catch/253
[   28.486842] 
[   28.487266] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc2-next-20241209 #1
[   28.488526] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.489048] Hardware name: linux,dummy-virt (DT)
[   28.489590] Call trace:
[   28.489997]  show_stack+0x20/0x38 (C)
[   28.490871]  dump_stack_lvl+0x8c/0xd0
[   28.491448]  print_report+0x118/0x5e0
[   28.492149]  kasan_report+0xc8/0x118
[   28.492657]  kasan_check_range+0x100/0x1a8
[   28.493208]  __kasan_check_write+0x20/0x30
[   28.493795]  kasan_atomics_helper+0x6ec/0x4858
[   28.494448]  kasan_atomics+0x198/0x2e8
[   28.495089]  kunit_try_run_case+0x14c/0x3d0
[   28.495773]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   28.496636]  kthread+0x24c/0x2d0
[   28.497157]  ret_from_fork+0x10/0x20
[   28.497918] 
[   28.498218] Allocated by task 253:
[   28.498675]  kasan_save_stack+0x3c/0x68
[   28.499237]  kasan_save_track+0x20/0x40
[   28.500022]  kasan_save_alloc_info+0x40/0x58
[   28.500657]  __kasan_kmalloc+0xd4/0xd8
[   28.501445]  __kmalloc_cache_noprof+0x15c/0x3c0
[   28.502088]  kasan_atomics+0xb8/0x2e8
[   28.502789]  kunit_try_run_case+0x14c/0x3d0
[   28.503494]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   28.504279]  kthread+0x24c/0x2d0
[   28.504810]  ret_from_fork+0x10/0x20
[   28.505309] 
[   28.505645] The buggy address belongs to the object at fff00000c12e8780
[   28.505645]  which belongs to the cache kmalloc-64 of size 64
[   28.506875] The buggy address is located 0 bytes to the right of
[   28.506875]  allocated 48-byte region [fff00000c12e8780, fff00000c12e87b0)
[   28.508062] 
[   28.508406] The buggy address belongs to the physical page:
[   28.509087] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1012e8
[   28.509913] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   28.510761] page_type: f5(slab)
[   28.511285] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   28.512159] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   28.513033] page dumped because: kasan: bad access detected
[   28.513695] 
[   28.514038] Memory state around the buggy address:
[   28.514652]  fff00000c12e8680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.515426]  fff00000c12e8700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.516171] >fff00000c12e8780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   28.516963]                                      ^
[   28.517583]  fff00000c12e8800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.518431]  fff00000c12e8880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.519213] ==================================================================
[   29.751563] ==================================================================
[   29.752261] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f04/0x4858
[   29.753041] Read of size 8 at addr fff00000c12e87b0 by task kunit_try_catch/253
[   29.753967] 
[   29.754303] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc2-next-20241209 #1
[   29.755352] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.756095] Hardware name: linux,dummy-virt (DT)
[   29.756736] Call trace:
[   29.757220]  show_stack+0x20/0x38 (C)
[   29.757799]  dump_stack_lvl+0x8c/0xd0
[   29.758299]  print_report+0x118/0x5e0
[   29.758890]  kasan_report+0xc8/0x118
[   29.759536]  __asan_report_load8_noabort+0x20/0x30
[   29.760177]  kasan_atomics_helper+0x3f04/0x4858
[   29.760876]  kasan_atomics+0x198/0x2e8
[   29.761352]  kunit_try_run_case+0x14c/0x3d0
[   29.762054]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.762724]  kthread+0x24c/0x2d0
[   29.763307]  ret_from_fork+0x10/0x20
[   29.763892] 
[   29.764205] Allocated by task 253:
[   29.764715]  kasan_save_stack+0x3c/0x68
[   29.765345]  kasan_save_track+0x20/0x40
[   29.765962]  kasan_save_alloc_info+0x40/0x58
[   29.766600]  __kasan_kmalloc+0xd4/0xd8
[   29.767159]  __kmalloc_cache_noprof+0x15c/0x3c0
[   29.767729]  kasan_atomics+0xb8/0x2e8
[   29.768327]  kunit_try_run_case+0x14c/0x3d0
[   29.769014]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.769671]  kthread+0x24c/0x2d0
[   29.770217]  ret_from_fork+0x10/0x20
[   29.770751] 
[   29.771047] The buggy address belongs to the object at fff00000c12e8780
[   29.771047]  which belongs to the cache kmalloc-64 of size 64
[   29.772293] The buggy address is located 0 bytes to the right of
[   29.772293]  allocated 48-byte region [fff00000c12e8780, fff00000c12e87b0)
[   29.773615] 
[   29.773954] The buggy address belongs to the physical page:
[   29.774661] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1012e8
[   29.775557] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   29.776361] page_type: f5(slab)
[   29.776861] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   29.777626] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   29.778469] page dumped because: kasan: bad access detected
[   29.779157] 
[   29.779469] Memory state around the buggy address:
[   29.780029]  fff00000c12e8680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.780814]  fff00000c12e8700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.781610] >fff00000c12e8780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   29.782415]                                      ^
[   29.783014]  fff00000c12e8800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.783764]  fff00000c12e8880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.784567] ==================================================================
[   28.636962] ==================================================================
[   28.637733] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x42d8/0x4858
[   28.638553] Read of size 4 at addr fff00000c12e87b0 by task kunit_try_catch/253
[   28.639938] 
[   28.640359] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc2-next-20241209 #1
[   28.641564] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.642147] Hardware name: linux,dummy-virt (DT)
[   28.642754] Call trace:
[   28.643198]  show_stack+0x20/0x38 (C)
[   28.643850]  dump_stack_lvl+0x8c/0xd0
[   28.644485]  print_report+0x118/0x5e0
[   28.645144]  kasan_report+0xc8/0x118
[   28.645750]  __asan_report_load4_noabort+0x20/0x30
[   28.646450]  kasan_atomics_helper+0x42d8/0x4858
[   28.647107]  kasan_atomics+0x198/0x2e8
[   28.647660]  kunit_try_run_case+0x14c/0x3d0
[   28.648291]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   28.649010]  kthread+0x24c/0x2d0
[   28.649532]  ret_from_fork+0x10/0x20
[   28.650105] 
[   28.650450] Allocated by task 253:
[   28.650984]  kasan_save_stack+0x3c/0x68
[   28.651560]  kasan_save_track+0x20/0x40
[   28.652088]  kasan_save_alloc_info+0x40/0x58
[   28.652761]  __kasan_kmalloc+0xd4/0xd8
[   28.653240]  __kmalloc_cache_noprof+0x15c/0x3c0
[   28.653933]  kasan_atomics+0xb8/0x2e8
[   28.654428]  kunit_try_run_case+0x14c/0x3d0
[   28.655072]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   28.655767]  kthread+0x24c/0x2d0
[   28.656314]  ret_from_fork+0x10/0x20
[   28.656836] 
[   28.657171] The buggy address belongs to the object at fff00000c12e8780
[   28.657171]  which belongs to the cache kmalloc-64 of size 64
[   28.658332] The buggy address is located 0 bytes to the right of
[   28.658332]  allocated 48-byte region [fff00000c12e8780, fff00000c12e87b0)
[   28.659458] 
[   28.659818] The buggy address belongs to the physical page:
[   28.660548] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1012e8
[   28.661346] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   28.662135] page_type: f5(slab)
[   28.662647] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   28.663584] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   28.664427] page dumped because: kasan: bad access detected
[   28.665117] 
[   28.665406] Memory state around the buggy address:
[   28.666030]  fff00000c12e8680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.666880]  fff00000c12e8700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.667653] >fff00000c12e8780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   28.668411]                                      ^
[   28.669015]  fff00000c12e8800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.669803]  fff00000c12e8880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.670534] ==================================================================
[   29.211255] ==================================================================
[   29.212007] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f58/0x4858
[   29.212881] Read of size 8 at addr fff00000c12e87b0 by task kunit_try_catch/253
[   29.213593] 
[   29.213983] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc2-next-20241209 #1
[   29.215081] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.215736] Hardware name: linux,dummy-virt (DT)
[   29.216229] Call trace:
[   29.216717]  show_stack+0x20/0x38 (C)
[   29.217317]  dump_stack_lvl+0x8c/0xd0
[   29.217864]  print_report+0x118/0x5e0
[   29.218542]  kasan_report+0xc8/0x118
[   29.219103]  __asan_report_load8_noabort+0x20/0x30
[   29.219784]  kasan_atomics_helper+0x3f58/0x4858
[   29.220406]  kasan_atomics+0x198/0x2e8
[   29.220960]  kunit_try_run_case+0x14c/0x3d0
[   29.221555]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.222318]  kthread+0x24c/0x2d0
[   29.222795]  ret_from_fork+0x10/0x20
[   29.223441] 
[   29.223800] Allocated by task 253:
[   29.224312]  kasan_save_stack+0x3c/0x68
[   29.224965]  kasan_save_track+0x20/0x40
[   29.225550]  kasan_save_alloc_info+0x40/0x58
[   29.226163]  __kasan_kmalloc+0xd4/0xd8
[   29.226750]  __kmalloc_cache_noprof+0x15c/0x3c0
[   29.227378]  kasan_atomics+0xb8/0x2e8
[   29.227966]  kunit_try_run_case+0x14c/0x3d0
[   29.228556]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.229263]  kthread+0x24c/0x2d0
[   29.229801]  ret_from_fork+0x10/0x20
[   29.230344] 
[   29.230653] The buggy address belongs to the object at fff00000c12e8780
[   29.230653]  which belongs to the cache kmalloc-64 of size 64
[   29.231861] The buggy address is located 0 bytes to the right of
[   29.231861]  allocated 48-byte region [fff00000c12e8780, fff00000c12e87b0)
[   29.233199] 
[   29.233528] The buggy address belongs to the physical page:
[   29.234209] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1012e8
[   29.235098] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   29.235824] page_type: f5(slab)
[   29.236380] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   29.237263] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   29.238111] page dumped because: kasan: bad access detected
[   29.238679] 
[   29.239078] Memory state around the buggy address:
[   29.239639]  fff00000c12e8680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.240504]  fff00000c12e8700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.241301] >fff00000c12e8780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   29.242140]                                      ^
[   29.242694]  fff00000c12e8800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.243536]  fff00000c12e8880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.244314] ==================================================================
[   28.375184] ==================================================================
[   28.376300] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x5b4/0x4858
[   28.378123] Write of size 4 at addr fff00000c12e87b0 by task kunit_try_catch/253
[   28.379449] 
[   28.380113] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc2-next-20241209 #1
[   28.381017] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.381500] Hardware name: linux,dummy-virt (DT)
[   28.382206] Call trace:
[   28.382563]  show_stack+0x20/0x38 (C)
[   28.383193]  dump_stack_lvl+0x8c/0xd0
[   28.383826]  print_report+0x118/0x5e0
[   28.384502]  kasan_report+0xc8/0x118
[   28.385215]  kasan_check_range+0x100/0x1a8
[   28.385898]  __kasan_check_write+0x20/0x30
[   28.386322]  kasan_atomics_helper+0x5b4/0x4858
[   28.387012]  kasan_atomics+0x198/0x2e8
[   28.387512]  kunit_try_run_case+0x14c/0x3d0
[   28.388202]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   28.388892]  kthread+0x24c/0x2d0
[   28.389443]  ret_from_fork+0x10/0x20
[   28.389982] 
[   28.390313] Allocated by task 253:
[   28.390833]  kasan_save_stack+0x3c/0x68
[   28.391379]  kasan_save_track+0x20/0x40
[   28.391863]  kasan_save_alloc_info+0x40/0x58
[   28.392469]  __kasan_kmalloc+0xd4/0xd8
[   28.392974]  __kmalloc_cache_noprof+0x15c/0x3c0
[   28.393640]  kasan_atomics+0xb8/0x2e8
[   28.394158]  kunit_try_run_case+0x14c/0x3d0
[   28.394678]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   28.395438]  kthread+0x24c/0x2d0
[   28.395890]  ret_from_fork+0x10/0x20
[   28.396502] 
[   28.396856] The buggy address belongs to the object at fff00000c12e8780
[   28.396856]  which belongs to the cache kmalloc-64 of size 64
[   28.398003] The buggy address is located 0 bytes to the right of
[   28.398003]  allocated 48-byte region [fff00000c12e8780, fff00000c12e87b0)
[   28.399293] 
[   28.399624] The buggy address belongs to the physical page:
[   28.400301] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1012e8
[   28.401211] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   28.401929] page_type: f5(slab)
[   28.402463] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   28.403302] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   28.404144] page dumped because: kasan: bad access detected
[   28.404845] 
[   28.405413] Memory state around the buggy address:
[   28.406051]  fff00000c12e8680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.406844]  fff00000c12e8700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.407552] >fff00000c12e8780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   28.408443]                                      ^
[   28.409039]  fff00000c12e8800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.409897]  fff00000c12e8880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.410683] ==================================================================
[   29.892032] ==================================================================
[   29.892684] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x154c/0x4858
[   29.893485] Write of size 8 at addr fff00000c12e87b0 by task kunit_try_catch/253
[   29.894488] 
[   29.895184] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc2-next-20241209 #1
[   29.896316] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.896849] Hardware name: linux,dummy-virt (DT)
[   29.897359] Call trace:
[   29.897813]  show_stack+0x20/0x38 (C)
[   29.898406]  dump_stack_lvl+0x8c/0xd0
[   29.899089]  print_report+0x118/0x5e0
[   29.899656]  kasan_report+0xc8/0x118
[   29.900209]  kasan_check_range+0x100/0x1a8
[   29.900939]  __kasan_check_write+0x20/0x30
[   29.901513]  kasan_atomics_helper+0x154c/0x4858
[   29.902129]  kasan_atomics+0x198/0x2e8
[   29.902678]  kunit_try_run_case+0x14c/0x3d0
[   29.903290]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.904048]  kthread+0x24c/0x2d0
[   29.904593]  ret_from_fork+0x10/0x20
[   29.905177] 
[   29.905475] Allocated by task 253:
[   29.905931]  kasan_save_stack+0x3c/0x68
[   29.906517]  kasan_save_track+0x20/0x40
[   29.907002]  kasan_save_alloc_info+0x40/0x58
[   29.907641]  __kasan_kmalloc+0xd4/0xd8
[   29.908311]  __kmalloc_cache_noprof+0x15c/0x3c0
[   29.908896]  kasan_atomics+0xb8/0x2e8
[   29.909472]  kunit_try_run_case+0x14c/0x3d0
[   29.910040]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.910793]  kthread+0x24c/0x2d0
[   29.911300]  ret_from_fork+0x10/0x20
[   29.911850] 
[   29.912192] The buggy address belongs to the object at fff00000c12e8780
[   29.912192]  which belongs to the cache kmalloc-64 of size 64
[   29.913386] The buggy address is located 0 bytes to the right of
[   29.913386]  allocated 48-byte region [fff00000c12e8780, fff00000c12e87b0)
[   29.914687] 
[   29.915054] The buggy address belongs to the physical page:
[   29.915673] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1012e8
[   29.916531] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   29.917290] page_type: f5(slab)
[   29.917807] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   29.918621] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   29.919476] page dumped because: kasan: bad access detected
[   29.920126] 
[   29.920443] Memory state around the buggy address:
[   29.921097]  fff00000c12e8680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.921873]  fff00000c12e8700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.922638] >fff00000c12e8780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   29.923410]                                      ^
[   29.924018]  fff00000c12e8800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.924818]  fff00000c12e8880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.925626] ==================================================================
[   29.680688] ==================================================================
[   29.681581] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x12d8/0x4858
[   29.682607] Write of size 8 at addr fff00000c12e87b0 by task kunit_try_catch/253
[   29.683903] 
[   29.684169] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc2-next-20241209 #1
[   29.685289] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.685837] Hardware name: linux,dummy-virt (DT)
[   29.686437] Call trace:
[   29.686823]  show_stack+0x20/0x38 (C)
[   29.687420]  dump_stack_lvl+0x8c/0xd0
[   29.687975]  print_report+0x118/0x5e0
[   29.688519]  kasan_report+0xc8/0x118
[   29.689113]  kasan_check_range+0x100/0x1a8
[   29.689715]  __kasan_check_write+0x20/0x30
[   29.690294]  kasan_atomics_helper+0x12d8/0x4858
[   29.690939]  kasan_atomics+0x198/0x2e8
[   29.691491]  kunit_try_run_case+0x14c/0x3d0
[   29.692083]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.692810]  kthread+0x24c/0x2d0
[   29.693333]  ret_from_fork+0x10/0x20
[   29.693889] 
[   29.694235] Allocated by task 253:
[   29.694743]  kasan_save_stack+0x3c/0x68
[   29.695286]  kasan_save_track+0x20/0x40
[   29.695758]  kasan_save_alloc_info+0x40/0x58
[   29.696437]  __kasan_kmalloc+0xd4/0xd8
[   29.696966]  __kmalloc_cache_noprof+0x15c/0x3c0
[   29.697575]  kasan_atomics+0xb8/0x2e8
[   29.698131]  kunit_try_run_case+0x14c/0x3d0
[   29.698760]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.699411]  kthread+0x24c/0x2d0
[   29.699909]  ret_from_fork+0x10/0x20
[   29.700488] 
[   29.700823] The buggy address belongs to the object at fff00000c12e8780
[   29.700823]  which belongs to the cache kmalloc-64 of size 64
[   29.702105] The buggy address is located 0 bytes to the right of
[   29.702105]  allocated 48-byte region [fff00000c12e8780, fff00000c12e87b0)
[   29.703306] 
[   29.703658] The buggy address belongs to the physical page:
[   29.704246] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1012e8
[   29.705151] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   29.705888] page_type: f5(slab)
[   29.706393] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   29.707243] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   29.708035] page dumped because: kasan: bad access detected
[   29.708670] 
[   29.709038] Memory state around the buggy address:
[   29.709641]  fff00000c12e8680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.710420]  fff00000c12e8700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.711206] >fff00000c12e8780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   29.711960]                                      ^
[   29.712624]  fff00000c12e8800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.713502]  fff00000c12e8880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.714249] ==================================================================
[   28.265725] ==================================================================
[   28.266381] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x47c/0x4858
[   28.267259] Write of size 4 at addr fff00000c12e87b0 by task kunit_try_catch/253
[   28.268119] 
[   28.268517] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc2-next-20241209 #1
[   28.269820] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.270253] Hardware name: linux,dummy-virt (DT)
[   28.271165] Call trace:
[   28.271611]  show_stack+0x20/0x38 (C)
[   28.272444]  dump_stack_lvl+0x8c/0xd0
[   28.273547]  print_report+0x118/0x5e0
[   28.274188]  kasan_report+0xc8/0x118
[   28.274741]  kasan_check_range+0x100/0x1a8
[   28.275360]  __kasan_check_write+0x20/0x30
[   28.275995]  kasan_atomics_helper+0x47c/0x4858
[   28.276682]  kasan_atomics+0x198/0x2e8
[   28.277263]  kunit_try_run_case+0x14c/0x3d0
[   28.277898]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   28.278570]  kthread+0x24c/0x2d0
[   28.279142]  ret_from_fork+0x10/0x20
[   28.279730] 
[   28.280125] Allocated by task 253:
[   28.280684]  kasan_save_stack+0x3c/0x68
[   28.281236]  kasan_save_track+0x20/0x40
[   28.281945]  kasan_save_alloc_info+0x40/0x58
[   28.282577]  __kasan_kmalloc+0xd4/0xd8
[   28.283174]  __kmalloc_cache_noprof+0x15c/0x3c0
[   28.283775]  kasan_atomics+0xb8/0x2e8
[   28.284376]  kunit_try_run_case+0x14c/0x3d0
[   28.285211]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   28.285944]  kthread+0x24c/0x2d0
[   28.286463]  ret_from_fork+0x10/0x20
[   28.287040] 
[   28.287388] The buggy address belongs to the object at fff00000c12e8780
[   28.287388]  which belongs to the cache kmalloc-64 of size 64
[   28.288717] The buggy address is located 0 bytes to the right of
[   28.288717]  allocated 48-byte region [fff00000c12e8780, fff00000c12e87b0)
[   28.290051] 
[   28.290497] The buggy address belongs to the physical page:
[   28.291169] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1012e8
[   28.292055] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   28.292929] page_type: f5(slab)
[   28.293477] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   28.294400] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   28.295232] page dumped because: kasan: bad access detected
[   28.295964] 
[   28.296349] Memory state around the buggy address:
[   28.297006]  fff00000c12e8680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.297937]  fff00000c12e8700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.298712] >fff00000c12e8780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   28.299597]                                      ^
[   28.300209]  fff00000c12e8800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.301150]  fff00000c12e8880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.301879] ==================================================================
[   28.087296] ==================================================================
[   28.088690] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x40fc/0x4858
[   28.089716] Read of size 4 at addr fff00000c12e87b0 by task kunit_try_catch/253
[   28.091043] 
[   28.091529] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc2-next-20241209 #1
[   28.092631] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.093290] Hardware name: linux,dummy-virt (DT)
[   28.093844] Call trace:
[   28.094194]  show_stack+0x20/0x38 (C)
[   28.094679]  dump_stack_lvl+0x8c/0xd0
[   28.095576]  print_report+0x118/0x5e0
[   28.096277]  kasan_report+0xc8/0x118
[   28.096935]  __asan_report_load4_noabort+0x20/0x30
[   28.097669]  kasan_atomics_helper+0x40fc/0x4858
[   28.098434]  kasan_atomics+0x198/0x2e8
[   28.099102]  kunit_try_run_case+0x14c/0x3d0
[   28.099646]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   28.100521]  kthread+0x24c/0x2d0
[   28.101198]  ret_from_fork+0x10/0x20
[   28.101898] 
[   28.102361] Allocated by task 253:
[   28.103008]  kasan_save_stack+0x3c/0x68
[   28.103634]  kasan_save_track+0x20/0x40
[   28.104299]  kasan_save_alloc_info+0x40/0x58
[   28.104844]  __kasan_kmalloc+0xd4/0xd8
[   28.105324]  __kmalloc_cache_noprof+0x15c/0x3c0
[   28.106154]  kasan_atomics+0xb8/0x2e8
[   28.106757]  kunit_try_run_case+0x14c/0x3d0
[   28.107390]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   28.108155]  kthread+0x24c/0x2d0
[   28.108676]  ret_from_fork+0x10/0x20
[   28.109219] 
[   28.109520] The buggy address belongs to the object at fff00000c12e8780
[   28.109520]  which belongs to the cache kmalloc-64 of size 64
[   28.110759] The buggy address is located 0 bytes to the right of
[   28.110759]  allocated 48-byte region [fff00000c12e8780, fff00000c12e87b0)
[   28.112023] 
[   28.112337] The buggy address belongs to the physical page:
[   28.112971] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1012e8
[   28.113860] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   28.114592] page_type: f5(slab)
[   28.115069] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   28.115949] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   28.116762] page dumped because: kasan: bad access detected
[   28.117396] 
[   28.117744] Memory state around the buggy address:
[   28.118300]  fff00000c12e8680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.119057]  fff00000c12e8700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.119792] >fff00000c12e8780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   28.120600]                                      ^
[   28.121229]  fff00000c12e8800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.122046]  fff00000c12e8880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.122817] ==================================================================
[   29.033719] ==================================================================
[   29.034396] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xca0/0x4858
[   29.035633] Write of size 4 at addr fff00000c12e87b0 by task kunit_try_catch/253
[   29.037412] 
[   29.037731] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc2-next-20241209 #1
[   29.039135] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.039632] Hardware name: linux,dummy-virt (DT)
[   29.040203] Call trace:
[   29.040625]  show_stack+0x20/0x38 (C)
[   29.041226]  dump_stack_lvl+0x8c/0xd0
[   29.041792]  print_report+0x118/0x5e0
[   29.042344]  kasan_report+0xc8/0x118
[   29.042862]  kasan_check_range+0x100/0x1a8
[   29.043512]  __kasan_check_write+0x20/0x30
[   29.044109]  kasan_atomics_helper+0xca0/0x4858
[   29.044980]  kasan_atomics+0x198/0x2e8
[   29.045618]  kunit_try_run_case+0x14c/0x3d0
[   29.046197]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.047035]  kthread+0x24c/0x2d0
[   29.047605]  ret_from_fork+0x10/0x20
[   29.048157] 
[   29.048486] Allocated by task 253:
[   29.049317]  kasan_save_stack+0x3c/0x68
[   29.050088]  kasan_save_track+0x20/0x40
[   29.050713]  kasan_save_alloc_info+0x40/0x58
[   29.051549]  __kasan_kmalloc+0xd4/0xd8
[   29.052055]  __kmalloc_cache_noprof+0x15c/0x3c0
[   29.052560]  kasan_atomics+0xb8/0x2e8
[   29.053189]  kunit_try_run_case+0x14c/0x3d0
[   29.053795]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.054551]  kthread+0x24c/0x2d0
[   29.055052]  ret_from_fork+0x10/0x20
[   29.055555] 
[   29.055871] The buggy address belongs to the object at fff00000c12e8780
[   29.055871]  which belongs to the cache kmalloc-64 of size 64
[   29.057893] The buggy address is located 0 bytes to the right of
[   29.057893]  allocated 48-byte region [fff00000c12e8780, fff00000c12e87b0)
[   29.059080] 
[   29.059413] The buggy address belongs to the physical page:
[   29.060123] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1012e8
[   29.060985] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   29.061689] page_type: f5(slab)
[   29.062219] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   29.063118] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   29.063894] page dumped because: kasan: bad access detected
[   29.064532] 
[   29.064867] Memory state around the buggy address:
[   29.065443]  fff00000c12e8680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.066261]  fff00000c12e8700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.066991] >fff00000c12e8780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   29.067809]                                      ^
[   29.068418]  fff00000c12e8800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.069248]  fff00000c12e8880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.070052] ==================================================================
[   28.741967] ==================================================================
[   28.743319] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa04/0x4858
[   28.744311] Write of size 4 at addr fff00000c12e87b0 by task kunit_try_catch/253
[   28.745342] 
[   28.745692] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc2-next-20241209 #1
[   28.747004] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.747563] Hardware name: linux,dummy-virt (DT)
[   28.748320] Call trace:
[   28.748813]  show_stack+0x20/0x38 (C)
[   28.749488]  dump_stack_lvl+0x8c/0xd0
[   28.750104]  print_report+0x118/0x5e0
[   28.750677]  kasan_report+0xc8/0x118
[   28.751393]  kasan_check_range+0x100/0x1a8
[   28.752046]  __kasan_check_write+0x20/0x30
[   28.752693]  kasan_atomics_helper+0xa04/0x4858
[   28.753339]  kasan_atomics+0x198/0x2e8
[   28.754008]  kunit_try_run_case+0x14c/0x3d0
[   28.754659]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   28.755416]  kthread+0x24c/0x2d0
[   28.755965]  ret_from_fork+0x10/0x20
[   28.756550] 
[   28.756919] Allocated by task 253:
[   28.757432]  kasan_save_stack+0x3c/0x68
[   28.757987]  kasan_save_track+0x20/0x40
[   28.758601]  kasan_save_alloc_info+0x40/0x58
[   28.759123]  __kasan_kmalloc+0xd4/0xd8
[   28.759674]  __kmalloc_cache_noprof+0x15c/0x3c0
[   28.760320]  kasan_atomics+0xb8/0x2e8
[   28.760922]  kunit_try_run_case+0x14c/0x3d0
[   28.761496]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   28.762149]  kthread+0x24c/0x2d0
[   28.762717]  ret_from_fork+0x10/0x20
[   28.763218] 
[   28.763544] The buggy address belongs to the object at fff00000c12e8780
[   28.763544]  which belongs to the cache kmalloc-64 of size 64
[   28.764681] The buggy address is located 0 bytes to the right of
[   28.764681]  allocated 48-byte region [fff00000c12e8780, fff00000c12e87b0)
[   28.766035] 
[   28.766344] The buggy address belongs to the physical page:
[   28.767032] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1012e8
[   28.767950] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   28.768755] page_type: f5(slab)
[   28.769269] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   28.770063] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   28.770981] page dumped because: kasan: bad access detected
[   28.771530] 
[   28.771873] Memory state around the buggy address:
[   28.772468]  fff00000c12e8680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.773338]  fff00000c12e8700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.774164] >fff00000c12e8780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   28.774948]                                      ^
[   28.775561]  fff00000c12e8800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.776333]  fff00000c12e8880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.777165] ==================================================================
[   28.447081] ==================================================================
[   28.447864] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x684/0x4858
[   28.448911] Write of size 4 at addr fff00000c12e87b0 by task kunit_try_catch/253
[   28.449754] 
[   28.450182] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc2-next-20241209 #1
[   28.451341] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.451968] Hardware name: linux,dummy-virt (DT)
[   28.452640] Call trace:
[   28.453061]  show_stack+0x20/0x38 (C)
[   28.453685]  dump_stack_lvl+0x8c/0xd0
[   28.454334]  print_report+0x118/0x5e0
[   28.454969]  kasan_report+0xc8/0x118
[   28.455593]  kasan_check_range+0x100/0x1a8
[   28.456211]  __kasan_check_write+0x20/0x30
[   28.456770]  kasan_atomics_helper+0x684/0x4858
[   28.457408]  kasan_atomics+0x198/0x2e8
[   28.458035]  kunit_try_run_case+0x14c/0x3d0
[   28.458677]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   28.459377]  kthread+0x24c/0x2d0
[   28.459936]  ret_from_fork+0x10/0x20
[   28.460511] 
[   28.460844] Allocated by task 253:
[   28.461370]  kasan_save_stack+0x3c/0x68
[   28.461966]  kasan_save_track+0x20/0x40
[   28.462460]  kasan_save_alloc_info+0x40/0x58
[   28.463025]  __kasan_kmalloc+0xd4/0xd8
[   28.463611]  __kmalloc_cache_noprof+0x15c/0x3c0
[   28.464232]  kasan_atomics+0xb8/0x2e8
[   28.464768]  kunit_try_run_case+0x14c/0x3d0
[   28.465332]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   28.466067]  kthread+0x24c/0x2d0
[   28.466560]  ret_from_fork+0x10/0x20
[   28.467068] 
[   28.467382] The buggy address belongs to the object at fff00000c12e8780
[   28.467382]  which belongs to the cache kmalloc-64 of size 64
[   28.468556] The buggy address is located 0 bytes to the right of
[   28.468556]  allocated 48-byte region [fff00000c12e8780, fff00000c12e87b0)
[   28.469851] 
[   28.470153] The buggy address belongs to the physical page:
[   28.470812] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1012e8
[   28.471666] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   28.472538] page_type: f5(slab)
[   28.473023] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   28.473911] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   28.474692] page dumped because: kasan: bad access detected
[   28.475327] 
[   28.475680] Memory state around the buggy address:
[   28.476278]  fff00000c12e8680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.477011]  fff00000c12e8700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.477900] >fff00000c12e8780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   28.478735]                                      ^
[   28.479304]  fff00000c12e8800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.480147]  fff00000c12e8880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.480946] ==================================================================
[   29.927042] ==================================================================
[   29.927849] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x15b4/0x4858
[   29.928901] Write of size 8 at addr fff00000c12e87b0 by task kunit_try_catch/253
[   29.929791] 
[   29.930168] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc2-next-20241209 #1
[   29.931458] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.932077] Hardware name: linux,dummy-virt (DT)
[   29.932736] Call trace:
[   29.933187]  show_stack+0x20/0x38 (C)
[   29.933870]  dump_stack_lvl+0x8c/0xd0
[   29.934491]  print_report+0x118/0x5e0
[   29.935048]  kasan_report+0xc8/0x118
[   29.935724]  kasan_check_range+0x100/0x1a8
[   29.936325]  __kasan_check_write+0x20/0x30
[   29.937078]  kasan_atomics_helper+0x15b4/0x4858
[   29.937674]  kasan_atomics+0x198/0x2e8
[   29.938261]  kunit_try_run_case+0x14c/0x3d0
[   29.938843]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.939649]  kthread+0x24c/0x2d0
[   29.940165]  ret_from_fork+0x10/0x20
[   29.940762] 
[   29.941097] Allocated by task 253:
[   29.941535]  kasan_save_stack+0x3c/0x68
[   29.942148]  kasan_save_track+0x20/0x40
[   29.942726]  kasan_save_alloc_info+0x40/0x58
[   29.943294]  __kasan_kmalloc+0xd4/0xd8
[   29.943772]  __kmalloc_cache_noprof+0x15c/0x3c0
[   29.944490]  kasan_atomics+0xb8/0x2e8
[   29.945010]  kunit_try_run_case+0x14c/0x3d0
[   29.945664]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.946326]  kthread+0x24c/0x2d0
[   29.946865]  ret_from_fork+0x10/0x20
[   29.947371] 
[   29.947684] The buggy address belongs to the object at fff00000c12e8780
[   29.947684]  which belongs to the cache kmalloc-64 of size 64
[   29.948865] The buggy address is located 0 bytes to the right of
[   29.948865]  allocated 48-byte region [fff00000c12e8780, fff00000c12e87b0)
[   29.950111] 
[   29.950412] The buggy address belongs to the physical page:
[   29.950999] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1012e8
[   29.951928] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   29.952563] page_type: f5(slab)
[   29.952999] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   29.953872] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   29.954651] page dumped because: kasan: bad access detected
[   29.955284] 
[   29.955506] Memory state around the buggy address:
[   29.955979]  fff00000c12e8680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.956629]  fff00000c12e8700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.957789] >fff00000c12e8780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   29.958542]                                      ^
[   29.959040]  fff00000c12e8800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.959916]  fff00000c12e8880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.960678] ==================================================================
[   28.597228] ==================================================================
[   28.597984] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x894/0x4858
[   28.599287] Write of size 4 at addr fff00000c12e87b0 by task kunit_try_catch/253
[   28.600524] 
[   28.601085] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc2-next-20241209 #1
[   28.602249] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.602733] Hardware name: linux,dummy-virt (DT)
[   28.603686] Call trace:
[   28.604306]  show_stack+0x20/0x38 (C)
[   28.604926]  dump_stack_lvl+0x8c/0xd0
[   28.605600]  print_report+0x118/0x5e0
[   28.606273]  kasan_report+0xc8/0x118
[   28.606925]  kasan_check_range+0x100/0x1a8
[   28.607617]  __kasan_check_write+0x20/0x30
[   28.608306]  kasan_atomics_helper+0x894/0x4858
[   28.609088]  kasan_atomics+0x198/0x2e8
[   28.609758]  kunit_try_run_case+0x14c/0x3d0
[   28.610430]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   28.611241]  kthread+0x24c/0x2d0
[   28.611859]  ret_from_fork+0x10/0x20
[   28.612507] 
[   28.612923] Allocated by task 253:
[   28.613481]  kasan_save_stack+0x3c/0x68
[   28.613993]  kasan_save_track+0x20/0x40
[   28.614480]  kasan_save_alloc_info+0x40/0x58
[   28.615085]  __kasan_kmalloc+0xd4/0xd8
[   28.615756]  __kmalloc_cache_noprof+0x15c/0x3c0
[   28.616394]  kasan_atomics+0xb8/0x2e8
[   28.617006]  kunit_try_run_case+0x14c/0x3d0
[   28.617645]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   28.618403]  kthread+0x24c/0x2d0
[   28.618902]  ret_from_fork+0x10/0x20
[   28.619393] 
[   28.619689] The buggy address belongs to the object at fff00000c12e8780
[   28.619689]  which belongs to the cache kmalloc-64 of size 64
[   28.621221] The buggy address is located 0 bytes to the right of
[   28.621221]  allocated 48-byte region [fff00000c12e8780, fff00000c12e87b0)
[   28.622403] 
[   28.622689] The buggy address belongs to the physical page:
[   28.623801] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1012e8
[   28.624826] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   28.625733] page_type: f5(slab)
[   28.626381] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   28.627376] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   28.628346] page dumped because: kasan: bad access detected
[   28.629140] 
[   28.629610] Memory state around the buggy address:
[   28.630267]  fff00000c12e8680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.631215]  fff00000c12e8700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.632083] >fff00000c12e8780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   28.632979]                                      ^
[   28.633644]  fff00000c12e8800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.634514]  fff00000c12e8880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.635343] ==================================================================
[   28.922647] ==================================================================
[   28.923674] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3dbc/0x4858
[   28.924420] Read of size 4 at addr fff00000c12e87b0 by task kunit_try_catch/253
[   28.925334] 
[   28.925873] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc2-next-20241209 #1
[   28.927109] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.927680] Hardware name: linux,dummy-virt (DT)
[   28.928415] Call trace:
[   28.928914]  show_stack+0x20/0x38 (C)
[   28.929541]  dump_stack_lvl+0x8c/0xd0
[   28.930237]  print_report+0x118/0x5e0
[   28.930891]  kasan_report+0xc8/0x118
[   28.931509]  __asan_report_load4_noabort+0x20/0x30
[   28.932274]  kasan_atomics_helper+0x3dbc/0x4858
[   28.932988]  kasan_atomics+0x198/0x2e8
[   28.933610]  kunit_try_run_case+0x14c/0x3d0
[   28.934290]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   28.935039]  kthread+0x24c/0x2d0
[   28.935598]  ret_from_fork+0x10/0x20
[   28.936200] 
[   28.936529] Allocated by task 253:
[   28.937045]  kasan_save_stack+0x3c/0x68
[   28.937687]  kasan_save_track+0x20/0x40
[   28.938323]  kasan_save_alloc_info+0x40/0x58
[   28.938965]  __kasan_kmalloc+0xd4/0xd8
[   28.939554]  __kmalloc_cache_noprof+0x15c/0x3c0
[   28.940195]  kasan_atomics+0xb8/0x2e8
[   28.940779]  kunit_try_run_case+0x14c/0x3d0
[   28.941421]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   28.942144]  kthread+0x24c/0x2d0
[   28.942746]  ret_from_fork+0x10/0x20
[   28.943308] 
[   28.943647] The buggy address belongs to the object at fff00000c12e8780
[   28.943647]  which belongs to the cache kmalloc-64 of size 64
[   28.945010] The buggy address is located 0 bytes to the right of
[   28.945010]  allocated 48-byte region [fff00000c12e8780, fff00000c12e87b0)
[   28.946367] 
[   28.946754] The buggy address belongs to the physical page:
[   28.947438] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1012e8
[   28.948384] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   28.949173] page_type: f5(slab)
[   28.949678] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   28.950608] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   28.951475] page dumped because: kasan: bad access detected
[   28.952120] 
[   28.952413] Memory state around the buggy address:
[   28.953081]  fff00000c12e8680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.954127]  fff00000c12e8700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.954952] >fff00000c12e8780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   28.955759]                                      ^
[   28.956338]  fff00000c12e8800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.957174]  fff00000c12e8880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.957981] ==================================================================
[   28.303561] ==================================================================
[   28.304400] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4e4/0x4858
[   28.305157] Write of size 4 at addr fff00000c12e87b0 by task kunit_try_catch/253
[   28.306782] 
[   28.307230] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc2-next-20241209 #1
[   28.308353] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.308914] Hardware name: linux,dummy-virt (DT)
[   28.309493] Call trace:
[   28.309909]  show_stack+0x20/0x38 (C)
[   28.310548]  dump_stack_lvl+0x8c/0xd0
[   28.311138]  print_report+0x118/0x5e0
[   28.311827]  kasan_report+0xc8/0x118
[   28.312429]  kasan_check_range+0x100/0x1a8
[   28.313063]  __kasan_check_write+0x20/0x30
[   28.313759]  kasan_atomics_helper+0x4e4/0x4858
[   28.314408]  kasan_atomics+0x198/0x2e8
[   28.315120]  kunit_try_run_case+0x14c/0x3d0
[   28.315760]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   28.316540]  kthread+0x24c/0x2d0
[   28.317152]  ret_from_fork+0x10/0x20
[   28.317771] 
[   28.318123] Allocated by task 253:
[   28.318620]  kasan_save_stack+0x3c/0x68
[   28.319213]  kasan_save_track+0x20/0x40
[   28.319817]  kasan_save_alloc_info+0x40/0x58
[   28.320487]  __kasan_kmalloc+0xd4/0xd8
[   28.321072]  __kmalloc_cache_noprof+0x15c/0x3c0
[   28.321772]  kasan_atomics+0xb8/0x2e8
[   28.322338]  kunit_try_run_case+0x14c/0x3d0
[   28.322937]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   28.323694]  kthread+0x24c/0x2d0
[   28.324196]  ret_from_fork+0x10/0x20
[   28.324826] 
[   28.325168] The buggy address belongs to the object at fff00000c12e8780
[   28.325168]  which belongs to the cache kmalloc-64 of size 64
[   28.326440] The buggy address is located 0 bytes to the right of
[   28.326440]  allocated 48-byte region [fff00000c12e8780, fff00000c12e87b0)
[   28.327834] 
[   28.328304] The buggy address belongs to the physical page:
[   28.328998] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1012e8
[   28.329695] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   28.330484] page_type: f5(slab)
[   28.331027] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   28.331869] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   28.332727] page dumped because: kasan: bad access detected
[   28.333376] 
[   28.333680] Memory state around the buggy address:
[   28.334273]  fff00000c12e8680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.335018]  fff00000c12e8700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.335847] >fff00000c12e8780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   28.336587]                                      ^
[   28.337229]  fff00000c12e8800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.337970]  fff00000c12e8880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.338837] ==================================================================
[   28.007845] ==================================================================
[   28.008670] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x24c/0x4858
[   28.009341] Write of size 4 at addr fff00000c12e87b0 by task kunit_try_catch/253
[   28.010117] 
[   28.010479] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc2-next-20241209 #1
[   28.011729] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.012690] Hardware name: linux,dummy-virt (DT)
[   28.013411] Call trace:
[   28.013946]  show_stack+0x20/0x38 (C)
[   28.014458]  dump_stack_lvl+0x8c/0xd0
[   28.015034]  print_report+0x118/0x5e0
[   28.015675]  kasan_report+0xc8/0x118
[   28.016221]  kasan_check_range+0x100/0x1a8
[   28.016807]  __kasan_check_write+0x20/0x30
[   28.017401]  kasan_atomics_helper+0x24c/0x4858
[   28.018077]  kasan_atomics+0x198/0x2e8
[   28.018616]  kunit_try_run_case+0x14c/0x3d0
[   28.019484]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   28.020212]  kthread+0x24c/0x2d0
[   28.020720]  ret_from_fork+0x10/0x20
[   28.021341] 
[   28.021664] Allocated by task 253:
[   28.022150]  kasan_save_stack+0x3c/0x68
[   28.022778]  kasan_save_track+0x20/0x40
[   28.023403]  kasan_save_alloc_info+0x40/0x58
[   28.024014]  __kasan_kmalloc+0xd4/0xd8
[   28.024542]  __kmalloc_cache_noprof+0x15c/0x3c0
[   28.025126]  kasan_atomics+0xb8/0x2e8
[   28.025692]  kunit_try_run_case+0x14c/0x3d0
[   28.026204]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   28.026989]  kthread+0x24c/0x2d0
[   28.027553]  ret_from_fork+0x10/0x20
[   28.028122] 
[   28.028449] The buggy address belongs to the object at fff00000c12e8780
[   28.028449]  which belongs to the cache kmalloc-64 of size 64
[   28.030849] The buggy address is located 0 bytes to the right of
[   28.030849]  allocated 48-byte region [fff00000c12e8780, fff00000c12e87b0)
[   28.032252] 
[   28.032562] The buggy address belongs to the physical page:
[   28.033215] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1012e8
[   28.034451] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   28.035475] page_type: f5(slab)
[   28.035926] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   28.036628] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   28.037643] page dumped because: kasan: bad access detected
[   28.038232] 
[   28.038516] Memory state around the buggy address:
[   28.039223]  fff00000c12e8680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.040558]  fff00000c12e8700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.041504] >fff00000c12e8780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   28.042329]                                      ^
[   28.043165]  fff00000c12e8800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.044129]  fff00000c12e8880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.045089] ==================================================================
[   30.209518] ==================================================================
[   30.210177] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x17ec/0x4858
[   30.210914] Write of size 8 at addr fff00000c12e87b0 by task kunit_try_catch/253
[   30.211671] 
[   30.212087] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc2-next-20241209 #1
[   30.213254] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.213812] Hardware name: linux,dummy-virt (DT)
[   30.214361] Call trace:
[   30.214755]  show_stack+0x20/0x38 (C)
[   30.215321]  dump_stack_lvl+0x8c/0xd0
[   30.215915]  print_report+0x118/0x5e0
[   30.216380]  kasan_report+0xc8/0x118
[   30.216827]  kasan_check_range+0x100/0x1a8
[   30.217444]  __kasan_check_write+0x20/0x30
[   30.218159]  kasan_atomics_helper+0x17ec/0x4858
[   30.218888]  kasan_atomics+0x198/0x2e8
[   30.219481]  kunit_try_run_case+0x14c/0x3d0
[   30.220149]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.220917]  kthread+0x24c/0x2d0
[   30.221464]  ret_from_fork+0x10/0x20
[   30.222016] 
[   30.222341] Allocated by task 253:
[   30.222866]  kasan_save_stack+0x3c/0x68
[   30.223471]  kasan_save_track+0x20/0x40
[   30.224113]  kasan_save_alloc_info+0x40/0x58
[   30.224726]  __kasan_kmalloc+0xd4/0xd8
[   30.225352]  __kmalloc_cache_noprof+0x15c/0x3c0
[   30.225966]  kasan_atomics+0xb8/0x2e8
[   30.226528]  kunit_try_run_case+0x14c/0x3d0
[   30.227160]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.227872]  kthread+0x24c/0x2d0
[   30.228440]  ret_from_fork+0x10/0x20
[   30.229024] 
[   30.229392] The buggy address belongs to the object at fff00000c12e8780
[   30.229392]  which belongs to the cache kmalloc-64 of size 64
[   30.230690] The buggy address is located 0 bytes to the right of
[   30.230690]  allocated 48-byte region [fff00000c12e8780, fff00000c12e87b0)
[   30.232060] 
[   30.232463] The buggy address belongs to the physical page:
[   30.233188] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1012e8
[   30.234215] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   30.234998] page_type: f5(slab)
[   30.235582] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   30.236528] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   30.237381] page dumped because: kasan: bad access detected
[   30.238069] 
[   30.238439] Memory state around the buggy address:
[   30.239033]  fff00000c12e8680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   30.239944]  fff00000c12e8700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   30.240784] >fff00000c12e8780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   30.241595]                                      ^
[   30.242216]  fff00000c12e8800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.243045]  fff00000c12e8880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.243866] ==================================================================
[   29.071933] ==================================================================
[   29.072663] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3dd8/0x4858
[   29.073452] Read of size 4 at addr fff00000c12e87b0 by task kunit_try_catch/253
[   29.074463] 
[   29.074816] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc2-next-20241209 #1
[   29.075887] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.076384] Hardware name: linux,dummy-virt (DT)
[   29.076990] Call trace:
[   29.077477]  show_stack+0x20/0x38 (C)
[   29.078057]  dump_stack_lvl+0x8c/0xd0
[   29.078655]  print_report+0x118/0x5e0
[   29.079216]  kasan_report+0xc8/0x118
[   29.079788]  __asan_report_load4_noabort+0x20/0x30
[   29.080481]  kasan_atomics_helper+0x3dd8/0x4858
[   29.081165]  kasan_atomics+0x198/0x2e8
[   29.081693]  kunit_try_run_case+0x14c/0x3d0
[   29.082272]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.083006]  kthread+0x24c/0x2d0
[   29.083571]  ret_from_fork+0x10/0x20
[   29.084144] 
[   29.084476] Allocated by task 253:
[   29.084988]  kasan_save_stack+0x3c/0x68
[   29.085536]  kasan_save_track+0x20/0x40
[   29.086124]  kasan_save_alloc_info+0x40/0x58
[   29.086748]  __kasan_kmalloc+0xd4/0xd8
[   29.087243]  __kmalloc_cache_noprof+0x15c/0x3c0
[   29.087987]  kasan_atomics+0xb8/0x2e8
[   29.088451]  kunit_try_run_case+0x14c/0x3d0
[   29.089130]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.089693]  kthread+0x24c/0x2d0
[   29.090204]  ret_from_fork+0x10/0x20
[   29.090715] 
[   29.091099] The buggy address belongs to the object at fff00000c12e8780
[   29.091099]  which belongs to the cache kmalloc-64 of size 64
[   29.092314] The buggy address is located 0 bytes to the right of
[   29.092314]  allocated 48-byte region [fff00000c12e8780, fff00000c12e87b0)
[   29.093630] 
[   29.093962] The buggy address belongs to the physical page:
[   29.094528] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1012e8
[   29.095458] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   29.096183] page_type: f5(slab)
[   29.096760] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   29.097582] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   29.098375] page dumped because: kasan: bad access detected
[   29.099043] 
[   29.099368] Memory state around the buggy address:
[   29.099977]  fff00000c12e8680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.100765]  fff00000c12e8700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.101530] >fff00000c12e8780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   29.102367]                                      ^
[   29.102956]  fff00000c12e8800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.103813]  fff00000c12e8880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.104574] ==================================================================
[   28.995815] ==================================================================
[   28.996630] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3de4/0x4858
[   28.997807] Read of size 4 at addr fff00000c12e87b0 by task kunit_try_catch/253
[   28.998627] 
[   28.999033] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc2-next-20241209 #1
[   29.000210] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.000850] Hardware name: linux,dummy-virt (DT)
[   29.001512] Call trace:
[   29.002000]  show_stack+0x20/0x38 (C)
[   29.002629]  dump_stack_lvl+0x8c/0xd0
[   29.003274]  print_report+0x118/0x5e0
[   29.003871]  kasan_report+0xc8/0x118
[   29.004459]  __asan_report_load4_noabort+0x20/0x30
[   29.005194]  kasan_atomics_helper+0x3de4/0x4858
[   29.005804]  kasan_atomics+0x198/0x2e8
[   29.006450]  kunit_try_run_case+0x14c/0x3d0
[   29.007121]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.007855]  kthread+0x24c/0x2d0
[   29.008391]  ret_from_fork+0x10/0x20
[   29.009105] 
[   29.009587] Allocated by task 253:
[   29.010034]  kasan_save_stack+0x3c/0x68
[   29.010587]  kasan_save_track+0x20/0x40
[   29.011239]  kasan_save_alloc_info+0x40/0x58
[   29.011942]  __kasan_kmalloc+0xd4/0xd8
[   29.012589]  __kmalloc_cache_noprof+0x15c/0x3c0
[   29.013311]  kasan_atomics+0xb8/0x2e8
[   29.013797]  kunit_try_run_case+0x14c/0x3d0
[   29.014305]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.014956]  kthread+0x24c/0x2d0
[   29.015540]  ret_from_fork+0x10/0x20
[   29.016306] 
[   29.016745] The buggy address belongs to the object at fff00000c12e8780
[   29.016745]  which belongs to the cache kmalloc-64 of size 64
[   29.018194] The buggy address is located 0 bytes to the right of
[   29.018194]  allocated 48-byte region [fff00000c12e8780, fff00000c12e87b0)
[   29.019726] 
[   29.020155] The buggy address belongs to the physical page:
[   29.020936] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1012e8
[   29.021909] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   29.022786] page_type: f5(slab)
[   29.023326] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   29.024277] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   29.025165] page dumped because: kasan: bad access detected
[   29.025898] 
[   29.026284] Memory state around the buggy address:
[   29.026988]  fff00000c12e8680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.027868]  fff00000c12e8700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.028776] >fff00000c12e8780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   29.029571]                                      ^
[   29.030291]  fff00000c12e8800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.031147]  fff00000c12e8880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.032006] ==================================================================
[   28.160888] ==================================================================
[   28.161658] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f94/0x4858
[   28.162455] Write of size 4 at addr fff00000c12e87b0 by task kunit_try_catch/253
[   28.164053] 
[   28.164474] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc2-next-20241209 #1
[   28.165685] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.166229] Hardware name: linux,dummy-virt (DT)
[   28.166832] Call trace:
[   28.167275]  show_stack+0x20/0x38 (C)
[   28.167855]  dump_stack_lvl+0x8c/0xd0
[   28.168492]  print_report+0x118/0x5e0
[   28.169008]  kasan_report+0xc8/0x118
[   28.169591]  __asan_report_store4_noabort+0x20/0x30
[   28.170303]  kasan_atomics_helper+0x3f94/0x4858
[   28.170982]  kasan_atomics+0x198/0x2e8
[   28.171460]  kunit_try_run_case+0x14c/0x3d0
[   28.172110]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   28.172810]  kthread+0x24c/0x2d0
[   28.173338]  ret_from_fork+0x10/0x20
[   28.173927] 
[   28.174232] Allocated by task 253:
[   28.174754]  kasan_save_stack+0x3c/0x68
[   28.175318]  kasan_save_track+0x20/0x40
[   28.175889]  kasan_save_alloc_info+0x40/0x58
[   28.176443]  __kasan_kmalloc+0xd4/0xd8
[   28.177054]  __kmalloc_cache_noprof+0x15c/0x3c0
[   28.177760]  kasan_atomics+0xb8/0x2e8
[   28.178233]  kunit_try_run_case+0x14c/0x3d0
[   28.178861]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   28.179482]  kthread+0x24c/0x2d0
[   28.180062]  ret_from_fork+0x10/0x20
[   28.180573] 
[   28.180930] The buggy address belongs to the object at fff00000c12e8780
[   28.180930]  which belongs to the cache kmalloc-64 of size 64
[   28.182154] The buggy address is located 0 bytes to the right of
[   28.182154]  allocated 48-byte region [fff00000c12e8780, fff00000c12e87b0)
[   28.183393] 
[   28.183763] The buggy address belongs to the physical page:
[   28.184440] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1012e8
[   28.185377] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   28.186117] page_type: f5(slab)
[   28.186635] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   28.187438] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   28.188214] page dumped because: kasan: bad access detected
[   28.188900] 
[   28.189231] Memory state around the buggy address:
[   28.189798]  fff00000c12e8680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.190570]  fff00000c12e8700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.191388] >fff00000c12e8780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   28.192256]                                      ^
[   28.192777]  fff00000c12e8800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.193582]  fff00000c12e8880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.194372] ==================================================================
[   28.707394] ==================================================================
[   28.708381] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x99c/0x4858
[   28.709313] Write of size 4 at addr fff00000c12e87b0 by task kunit_try_catch/253
[   28.710097] 
[   28.710495] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc2-next-20241209 #1
[   28.712284] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.712820] Hardware name: linux,dummy-virt (DT)
[   28.713407] Call trace:
[   28.713848]  show_stack+0x20/0x38 (C)
[   28.714346]  dump_stack_lvl+0x8c/0xd0
[   28.714906]  print_report+0x118/0x5e0
[   28.715453]  kasan_report+0xc8/0x118
[   28.715969]  kasan_check_range+0x100/0x1a8
[   28.716645]  __kasan_check_write+0x20/0x30
[   28.717304]  kasan_atomics_helper+0x99c/0x4858
[   28.717958]  kasan_atomics+0x198/0x2e8
[   28.718581]  kunit_try_run_case+0x14c/0x3d0
[   28.719244]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   28.719955]  kthread+0x24c/0x2d0
[   28.720570]  ret_from_fork+0x10/0x20
[   28.721135] 
[   28.721471] Allocated by task 253:
[   28.721998]  kasan_save_stack+0x3c/0x68
[   28.722511]  kasan_save_track+0x20/0x40
[   28.723113]  kasan_save_alloc_info+0x40/0x58
[   28.723639]  __kasan_kmalloc+0xd4/0xd8
[   28.724249]  __kmalloc_cache_noprof+0x15c/0x3c0
[   28.724851]  kasan_atomics+0xb8/0x2e8
[   28.725458]  kunit_try_run_case+0x14c/0x3d0
[   28.726024]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   28.726781]  kthread+0x24c/0x2d0
[   28.727288]  ret_from_fork+0x10/0x20
[   28.727763] 
[   28.728117] The buggy address belongs to the object at fff00000c12e8780
[   28.728117]  which belongs to the cache kmalloc-64 of size 64
[   28.729432] The buggy address is located 0 bytes to the right of
[   28.729432]  allocated 48-byte region [fff00000c12e8780, fff00000c12e87b0)
[   28.730716] 
[   28.731025] The buggy address belongs to the physical page:
[   28.731753] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1012e8
[   28.732598] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   28.733356] page_type: f5(slab)
[   28.733924] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   28.734744] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   28.735582] page dumped because: kasan: bad access detected
[   28.736206] 
[   28.736548] Memory state around the buggy address:
[   28.737097]  fff00000c12e8680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.737960]  fff00000c12e8700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.738799] >fff00000c12e8780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   28.739588]                                      ^
[   28.740087]  fff00000c12e8800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.740424]  fff00000c12e8880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.740799] ==================================================================
[   29.282410] ==================================================================
[   29.283556] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e5c/0x4858
[   29.284418] Write of size 8 at addr fff00000c12e87b0 by task kunit_try_catch/253
[   29.285254] 
[   29.285630] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc2-next-20241209 #1
[   29.286685] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.287279] Hardware name: linux,dummy-virt (DT)
[   29.287856] Call trace:
[   29.288305]  show_stack+0x20/0x38 (C)
[   29.288933]  dump_stack_lvl+0x8c/0xd0
[   29.289523]  print_report+0x118/0x5e0
[   29.290107]  kasan_report+0xc8/0x118
[   29.290667]  __asan_report_store8_noabort+0x20/0x30
[   29.291347]  kasan_atomics_helper+0x3e5c/0x4858
[   29.291969]  kasan_atomics+0x198/0x2e8
[   29.292503]  kunit_try_run_case+0x14c/0x3d0
[   29.293188]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.293885]  kthread+0x24c/0x2d0
[   29.294404]  ret_from_fork+0x10/0x20
[   29.294985] 
[   29.295331] Allocated by task 253:
[   29.295835]  kasan_save_stack+0x3c/0x68
[   29.296349]  kasan_save_track+0x20/0x40
[   29.296982]  kasan_save_alloc_info+0x40/0x58
[   29.297538]  __kasan_kmalloc+0xd4/0xd8
[   29.298089]  __kmalloc_cache_noprof+0x15c/0x3c0
[   29.298715]  kasan_atomics+0xb8/0x2e8
[   29.299234]  kunit_try_run_case+0x14c/0x3d0
[   29.299826]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.300540]  kthread+0x24c/0x2d0
[   29.301058]  ret_from_fork+0x10/0x20
[   29.301581] 
[   29.301934] The buggy address belongs to the object at fff00000c12e8780
[   29.301934]  which belongs to the cache kmalloc-64 of size 64
[   29.303207] The buggy address is located 0 bytes to the right of
[   29.303207]  allocated 48-byte region [fff00000c12e8780, fff00000c12e87b0)
[   29.304555] 
[   29.304913] The buggy address belongs to the physical page:
[   29.305547] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1012e8
[   29.306558] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   29.307276] page_type: f5(slab)
[   29.307844] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   29.308674] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   29.309576] page dumped because: kasan: bad access detected
[   29.310270] 
[   29.310580] Memory state around the buggy address:
[   29.311135]  fff00000c12e8680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.311899]  fff00000c12e8700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.312735] >fff00000c12e8780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   29.313481]                                      ^
[   29.314095]  fff00000c12e8800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.314915]  fff00000c12e8880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.315688] ==================================================================
[   28.778604] ==================================================================
[   28.779354] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa6c/0x4858
[   28.780135] Write of size 4 at addr fff00000c12e87b0 by task kunit_try_catch/253
[   28.780816] 
[   28.781219] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc2-next-20241209 #1
[   28.782354] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.782863] Hardware name: linux,dummy-virt (DT)
[   28.783525] Call trace:
[   28.783956]  show_stack+0x20/0x38 (C)
[   28.784490]  dump_stack_lvl+0x8c/0xd0
[   28.785064]  print_report+0x118/0x5e0
[   28.785721]  kasan_report+0xc8/0x118
[   28.786241]  kasan_check_range+0x100/0x1a8
[   28.786811]  __kasan_check_write+0x20/0x30
[   28.787416]  kasan_atomics_helper+0xa6c/0x4858
[   28.788076]  kasan_atomics+0x198/0x2e8
[   28.788662]  kunit_try_run_case+0x14c/0x3d0
[   28.789302]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   28.790044]  kthread+0x24c/0x2d0
[   28.790560]  ret_from_fork+0x10/0x20
[   28.791122] 
[   28.791472] Allocated by task 253:
[   28.791957]  kasan_save_stack+0x3c/0x68
[   28.792480]  kasan_save_track+0x20/0x40
[   28.793097]  kasan_save_alloc_info+0x40/0x58
[   28.793609]  __kasan_kmalloc+0xd4/0xd8
[   28.794218]  __kmalloc_cache_noprof+0x15c/0x3c0
[   28.794825]  kasan_atomics+0xb8/0x2e8
[   28.795351]  kunit_try_run_case+0x14c/0x3d0
[   28.795876]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   28.796506]  kthread+0x24c/0x2d0
[   28.797096]  ret_from_fork+0x10/0x20
[   28.797647] 
[   28.798042] The buggy address belongs to the object at fff00000c12e8780
[   28.798042]  which belongs to the cache kmalloc-64 of size 64
[   28.799283] The buggy address is located 0 bytes to the right of
[   28.799283]  allocated 48-byte region [fff00000c12e8780, fff00000c12e87b0)
[   28.800536] 
[   28.800892] The buggy address belongs to the physical page:
[   28.801517] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1012e8
[   28.802470] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   28.803262] page_type: f5(slab)
[   28.803750] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   28.804593] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   28.805507] page dumped because: kasan: bad access detected
[   28.806175] 
[   28.806497] Memory state around the buggy address:
[   28.807138]  fff00000c12e8680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.807925]  fff00000c12e8700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.808676] >fff00000c12e8780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   28.809485]                                      ^
[   28.810026]  fff00000c12e8800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.810364]  fff00000c12e8880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.810686] ==================================================================
[   29.997733] ==================================================================
[   29.998389] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1644/0x4858
[   29.999452] Write of size 8 at addr fff00000c12e87b0 by task kunit_try_catch/253
[   30.000480] 
[   30.000859] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc2-next-20241209 #1
[   30.002264] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.002642] Hardware name: linux,dummy-virt (DT)
[   30.003145] Call trace:
[   30.003615]  show_stack+0x20/0x38 (C)
[   30.004185]  dump_stack_lvl+0x8c/0xd0
[   30.004771]  print_report+0x118/0x5e0
[   30.005368]  kasan_report+0xc8/0x118
[   30.005879]  kasan_check_range+0x100/0x1a8
[   30.006571]  __kasan_check_write+0x20/0x30
[   30.007278]  kasan_atomics_helper+0x1644/0x4858
[   30.007905]  kasan_atomics+0x198/0x2e8
[   30.008433]  kunit_try_run_case+0x14c/0x3d0
[   30.009134]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.009945]  kthread+0x24c/0x2d0
[   30.010488]  ret_from_fork+0x10/0x20
[   30.011089] 
[   30.011439] Allocated by task 253:
[   30.011898]  kasan_save_stack+0x3c/0x68
[   30.012458]  kasan_save_track+0x20/0x40
[   30.013111]  kasan_save_alloc_info+0x40/0x58
[   30.013681]  __kasan_kmalloc+0xd4/0xd8
[   30.014259]  __kmalloc_cache_noprof+0x15c/0x3c0
[   30.014919]  kasan_atomics+0xb8/0x2e8
[   30.015469]  kunit_try_run_case+0x14c/0x3d0
[   30.016072]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.016804]  kthread+0x24c/0x2d0
[   30.017283]  ret_from_fork+0x10/0x20
[   30.017927] 
[   30.018232] The buggy address belongs to the object at fff00000c12e8780
[   30.018232]  which belongs to the cache kmalloc-64 of size 64
[   30.019379] The buggy address is located 0 bytes to the right of
[   30.019379]  allocated 48-byte region [fff00000c12e8780, fff00000c12e87b0)
[   30.020468] 
[   30.020850] The buggy address belongs to the physical page:
[   30.021585] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1012e8
[   30.022457] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   30.023199] page_type: f5(slab)
[   30.023659] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   30.024525] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   30.025403] page dumped because: kasan: bad access detected
[   30.026065] 
[   30.026391] Memory state around the buggy address:
[   30.026918]  fff00000c12e8680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   30.027727]  fff00000c12e8700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   30.028456] >fff00000c12e8780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   30.029286]                                      ^
[   30.029865]  fff00000c12e8800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.030650]  fff00000c12e8880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.031406] ==================================================================

[   31.587929] ==================================================================
[   31.588746] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4fb4/0x5450
[   31.590044] Read of size 8 at addr ffff888102969630 by task kunit_try_catch/272
[   31.591720] 
[   31.591929] CPU: 0 UID: 0 PID: 272 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc2-next-20241209 #1
[   31.593020] Tainted: [B]=BAD_PAGE, [N]=TEST
[   31.593593] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   31.594539] Call Trace:
[   31.594836]  <TASK>
[   31.595227]  dump_stack_lvl+0x73/0xb0
[   31.595715]  print_report+0xd1/0x640
[   31.596319]  ? __virt_addr_valid+0x1db/0x2d0
[   31.596963]  ? kasan_complete_mode_report_info+0x2a/0x200
[   31.597554]  kasan_report+0x102/0x140
[   31.597958]  ? kasan_atomics_helper+0x4fb4/0x5450
[   31.598550]  ? kasan_atomics_helper+0x4fb4/0x5450
[   31.599378]  __asan_report_load8_noabort+0x18/0x20
[   31.599843]  kasan_atomics_helper+0x4fb4/0x5450
[   31.600407]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   31.601119]  ? __kmalloc_cache_noprof+0x184/0x410
[   31.601733]  ? kasan_atomics+0x153/0x310
[   31.602135]  kasan_atomics+0x1dd/0x310
[   31.602554]  ? __pfx_kasan_atomics+0x10/0x10
[   31.603146]  ? __pfx_read_tsc+0x10/0x10
[   31.603811]  ? ktime_get_ts64+0x86/0x230
[   31.604338]  kunit_try_run_case+0x1b3/0x490
[   31.604717]  ? __pfx_kunit_try_run_case+0x10/0x10
[   31.605414]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   31.606142]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   31.606811]  ? __kthread_parkme+0x82/0x160
[   31.607185]  ? preempt_count_sub+0x50/0x80
[   31.607634]  ? __pfx_kunit_try_run_case+0x10/0x10
[   31.608306]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   31.608971]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   31.609635]  kthread+0x257/0x310
[   31.609998]  ? __pfx_kthread+0x10/0x10
[   31.610581]  ret_from_fork+0x41/0x80
[   31.611118]  ? __pfx_kthread+0x10/0x10
[   31.611598]  ret_from_fork_asm+0x1a/0x30
[   31.612091]  </TASK>
[   31.612445] 
[   31.612749] Allocated by task 272:
[   31.613030]  kasan_save_stack+0x3d/0x60
[   31.613738]  kasan_save_track+0x18/0x40
[   31.614021]  kasan_save_alloc_info+0x3b/0x50
[   31.615357]  __kasan_kmalloc+0xb7/0xc0
[   31.615992]  __kmalloc_cache_noprof+0x184/0x410
[   31.616520]  kasan_atomics+0x96/0x310
[   31.617054]  kunit_try_run_case+0x1b3/0x490
[   31.617645]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   31.618218]  kthread+0x257/0x310
[   31.618571]  ret_from_fork+0x41/0x80
[   31.618934]  ret_from_fork_asm+0x1a/0x30
[   31.619472] 
[   31.619640] The buggy address belongs to the object at ffff888102969600
[   31.619640]  which belongs to the cache kmalloc-64 of size 64
[   31.621049] The buggy address is located 0 bytes to the right of
[   31.621049]  allocated 48-byte region [ffff888102969600, ffff888102969630)
[   31.622166] 
[   31.622535] The buggy address belongs to the physical page:
[   31.623105] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102969
[   31.624009] flags: 0x200000000000000(node=0|zone=2)
[   31.624678] page_type: f5(slab)
[   31.625132] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   31.626032] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   31.626809] page dumped because: kasan: bad access detected
[   31.627422] 
[   31.627611] Memory state around the buggy address:
[   31.628226]  ffff888102969500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   31.628928]  ffff888102969580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   31.629651] >ffff888102969600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   31.630628]                                      ^
[   31.631457]  ffff888102969680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.632065]  ffff888102969700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.632927] ==================================================================
[   31.100874] ==================================================================
[   31.101858] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4f32/0x5450
[   31.103174] Read of size 8 at addr ffff888102969630 by task kunit_try_catch/272
[   31.105005] 
[   31.105480] CPU: 0 UID: 0 PID: 272 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc2-next-20241209 #1
[   31.106565] Tainted: [B]=BAD_PAGE, [N]=TEST
[   31.107292] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   31.108384] Call Trace:
[   31.108686]  <TASK>
[   31.109353]  dump_stack_lvl+0x73/0xb0
[   31.110049]  print_report+0xd1/0x640
[   31.110722]  ? __virt_addr_valid+0x1db/0x2d0
[   31.111561]  ? kasan_complete_mode_report_info+0x2a/0x200
[   31.112461]  kasan_report+0x102/0x140
[   31.113089]  ? kasan_atomics_helper+0x4f32/0x5450
[   31.113606]  ? kasan_atomics_helper+0x4f32/0x5450
[   31.114188]  __asan_report_load8_noabort+0x18/0x20
[   31.114980]  kasan_atomics_helper+0x4f32/0x5450
[   31.115225]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   31.115572]  ? __kmalloc_cache_noprof+0x184/0x410
[   31.116577]  ? kasan_atomics+0x153/0x310
[   31.117384]  kasan_atomics+0x1dd/0x310
[   31.118114]  ? __pfx_kasan_atomics+0x10/0x10
[   31.118601]  ? __pfx_read_tsc+0x10/0x10
[   31.119331]  ? ktime_get_ts64+0x86/0x230
[   31.120040]  kunit_try_run_case+0x1b3/0x490
[   31.120444]  ? __pfx_kunit_try_run_case+0x10/0x10
[   31.120998]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   31.121578]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   31.122119]  ? __kthread_parkme+0x82/0x160
[   31.122846]  ? preempt_count_sub+0x50/0x80
[   31.123324]  ? __pfx_kunit_try_run_case+0x10/0x10
[   31.124122]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   31.125010]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   31.125708]  kthread+0x257/0x310
[   31.126280]  ? __pfx_kthread+0x10/0x10
[   31.126886]  ret_from_fork+0x41/0x80
[   31.127457]  ? __pfx_kthread+0x10/0x10
[   31.128029]  ret_from_fork_asm+0x1a/0x30
[   31.128657]  </TASK>
[   31.128974] 
[   31.129245] Allocated by task 272:
[   31.129696]  kasan_save_stack+0x3d/0x60
[   31.130245]  kasan_save_track+0x18/0x40
[   31.130992]  kasan_save_alloc_info+0x3b/0x50
[   31.131575]  __kasan_kmalloc+0xb7/0xc0
[   31.132134]  __kmalloc_cache_noprof+0x184/0x410
[   31.132888]  kasan_atomics+0x96/0x310
[   31.133438]  kunit_try_run_case+0x1b3/0x490
[   31.134060]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   31.134728]  kthread+0x257/0x310
[   31.135364]  ret_from_fork+0x41/0x80
[   31.135837]  ret_from_fork_asm+0x1a/0x30
[   31.136275] 
[   31.136539] The buggy address belongs to the object at ffff888102969600
[   31.136539]  which belongs to the cache kmalloc-64 of size 64
[   31.137711] The buggy address is located 0 bytes to the right of
[   31.137711]  allocated 48-byte region [ffff888102969600, ffff888102969630)
[   31.139019] 
[   31.139329] The buggy address belongs to the physical page:
[   31.139985] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102969
[   31.140931] flags: 0x200000000000000(node=0|zone=2)
[   31.141643] page_type: f5(slab)
[   31.142036] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   31.142994] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   31.143790] page dumped because: kasan: bad access detected
[   31.144452] 
[   31.144807] Memory state around the buggy address:
[   31.145411]  ffff888102969500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   31.146183]  ffff888102969580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   31.146987] >ffff888102969600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   31.147677]                                      ^
[   31.148228]  ffff888102969680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.149037]  ffff888102969700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.149846] ==================================================================
[   28.793808] ==================================================================
[   28.794282] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a1/0x5450
[   28.795444] Write of size 4 at addr ffff888102969630 by task kunit_try_catch/272
[   28.796574] 
[   28.797168] CPU: 0 UID: 0 PID: 272 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc2-next-20241209 #1
[   28.798373] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.798769] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   28.799582] Call Trace:
[   28.800097]  <TASK>
[   28.800353]  dump_stack_lvl+0x73/0xb0
[   28.801670]  print_report+0xd1/0x640
[   28.802371]  ? __virt_addr_valid+0x1db/0x2d0
[   28.802747]  ? kasan_complete_mode_report_info+0x2a/0x200
[   28.803318]  kasan_report+0x102/0x140
[   28.803744]  ? kasan_atomics_helper+0x4a1/0x5450
[   28.805119]  ? kasan_atomics_helper+0x4a1/0x5450
[   28.805688]  kasan_check_range+0x10c/0x1c0
[   28.806430]  __kasan_check_write+0x18/0x20
[   28.807033]  kasan_atomics_helper+0x4a1/0x5450
[   28.807601]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   28.808028]  ? __kmalloc_cache_noprof+0x184/0x410
[   28.809242]  ? kasan_atomics+0x153/0x310
[   28.809651]  kasan_atomics+0x1dd/0x310
[   28.810570]  ? __pfx_kasan_atomics+0x10/0x10
[   28.811328]  ? __pfx_read_tsc+0x10/0x10
[   28.811754]  ? ktime_get_ts64+0x86/0x230
[   28.812156]  kunit_try_run_case+0x1b3/0x490
[   28.812669]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.813118]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   28.814071]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   28.814985]  ? __kthread_parkme+0x82/0x160
[   28.815609]  ? preempt_count_sub+0x50/0x80
[   28.816065]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.816536]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   28.817641]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.819066]  kthread+0x257/0x310
[   28.819968]  ? __pfx_kthread+0x10/0x10
[   28.820550]  ret_from_fork+0x41/0x80
[   28.821735]  ? __pfx_kthread+0x10/0x10
[   28.822145]  ret_from_fork_asm+0x1a/0x30
[   28.822781]  </TASK>
[   28.823491] 
[   28.823680] Allocated by task 272:
[   28.824041]  kasan_save_stack+0x3d/0x60
[   28.825030]  kasan_save_track+0x18/0x40
[   28.826380]  kasan_save_alloc_info+0x3b/0x50
[   28.827064]  __kasan_kmalloc+0xb7/0xc0
[   28.827728]  __kmalloc_cache_noprof+0x184/0x410
[   28.828721]  kasan_atomics+0x96/0x310
[   28.829123]  kunit_try_run_case+0x1b3/0x490
[   28.829720]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.830332]  kthread+0x257/0x310
[   28.831668]  ret_from_fork+0x41/0x80
[   28.831951]  ret_from_fork_asm+0x1a/0x30
[   28.832825] 
[   28.833079] The buggy address belongs to the object at ffff888102969600
[   28.833079]  which belongs to the cache kmalloc-64 of size 64
[   28.835301] The buggy address is located 0 bytes to the right of
[   28.835301]  allocated 48-byte region [ffff888102969600, ffff888102969630)
[   28.836683] 
[   28.836971] The buggy address belongs to the physical page:
[   28.837898] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102969
[   28.839132] flags: 0x200000000000000(node=0|zone=2)
[   28.840004] page_type: f5(slab)
[   28.840498] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   28.841577] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   28.842734] page dumped because: kasan: bad access detected
[   28.843492] 
[   28.843634] Memory state around the buggy address:
[   28.844323]  ffff888102969500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.845381]  ffff888102969580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.846350] >ffff888102969600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   28.847090]                                      ^
[   28.847668]  ffff888102969680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.848376]  ffff888102969700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.848873] ==================================================================
[   29.319578] ==================================================================
[   29.321301] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x993/0x5450
[   29.322472] Write of size 4 at addr ffff888102969630 by task kunit_try_catch/272
[   29.323908] 
[   29.324713] CPU: 0 UID: 0 PID: 272 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc2-next-20241209 #1
[   29.325132] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.325451] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   29.327746] Call Trace:
[   29.328848]  <TASK>
[   29.329293]  dump_stack_lvl+0x73/0xb0
[   29.330007]  print_report+0xd1/0x640
[   29.330682]  ? __virt_addr_valid+0x1db/0x2d0
[   29.331478]  ? kasan_complete_mode_report_info+0x2a/0x200
[   29.332036]  kasan_report+0x102/0x140
[   29.333221]  ? kasan_atomics_helper+0x993/0x5450
[   29.333714]  ? kasan_atomics_helper+0x993/0x5450
[   29.334818]  kasan_check_range+0x10c/0x1c0
[   29.335242]  __kasan_check_write+0x18/0x20
[   29.336061]  kasan_atomics_helper+0x993/0x5450
[   29.337244]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   29.337740]  ? __kmalloc_cache_noprof+0x184/0x410
[   29.338523]  ? kasan_atomics+0x153/0x310
[   29.339419]  kasan_atomics+0x1dd/0x310
[   29.340280]  ? __pfx_kasan_atomics+0x10/0x10
[   29.340720]  ? __pfx_read_tsc+0x10/0x10
[   29.341698]  ? ktime_get_ts64+0x86/0x230
[   29.342433]  kunit_try_run_case+0x1b3/0x490
[   29.343036]  ? __pfx_kunit_try_run_case+0x10/0x10
[   29.343786]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   29.344299]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   29.345702]  ? __kthread_parkme+0x82/0x160
[   29.346150]  ? preempt_count_sub+0x50/0x80
[   29.347128]  ? __pfx_kunit_try_run_case+0x10/0x10
[   29.348032]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   29.349309]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   29.350391]  kthread+0x257/0x310
[   29.351363]  ? __pfx_kthread+0x10/0x10
[   29.351961]  ret_from_fork+0x41/0x80
[   29.352542]  ? __pfx_kthread+0x10/0x10
[   29.353871]  ret_from_fork_asm+0x1a/0x30
[   29.354324]  </TASK>
[   29.354598] 
[   29.355023] Allocated by task 272:
[   29.355525]  kasan_save_stack+0x3d/0x60
[   29.356125]  kasan_save_track+0x18/0x40
[   29.356699]  kasan_save_alloc_info+0x3b/0x50
[   29.357675]  __kasan_kmalloc+0xb7/0xc0
[   29.358099]  __kmalloc_cache_noprof+0x184/0x410
[   29.358510]  kasan_atomics+0x96/0x310
[   29.359231]  kunit_try_run_case+0x1b3/0x490
[   29.359936]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   29.360501]  kthread+0x257/0x310
[   29.361030]  ret_from_fork+0x41/0x80
[   29.361954]  ret_from_fork_asm+0x1a/0x30
[   29.362519] 
[   29.362713] The buggy address belongs to the object at ffff888102969600
[   29.362713]  which belongs to the cache kmalloc-64 of size 64
[   29.364754] The buggy address is located 0 bytes to the right of
[   29.364754]  allocated 48-byte region [ffff888102969600, ffff888102969630)
[   29.366238] 
[   29.366429] The buggy address belongs to the physical page:
[   29.367921] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102969
[   29.369054] flags: 0x200000000000000(node=0|zone=2)
[   29.369861] page_type: f5(slab)
[   29.370230] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   29.371439] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   29.373135] page dumped because: kasan: bad access detected
[   29.373686] 
[   29.373873] Memory state around the buggy address:
[   29.374361]  ffff888102969500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.375708]  ffff888102969580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.376555] >ffff888102969600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   29.377563]                                      ^
[   29.378140]  ffff888102969680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.379681]  ffff888102969700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.380701] ==================================================================
[   31.683543] ==================================================================
[   31.684515] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4fa7/0x5450
[   31.685283] Read of size 8 at addr ffff888102969630 by task kunit_try_catch/272
[   31.685915] 
[   31.686151] CPU: 0 UID: 0 PID: 272 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc2-next-20241209 #1
[   31.686882] Tainted: [B]=BAD_PAGE, [N]=TEST
[   31.687397] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   31.688240] Call Trace:
[   31.688516]  <TASK>
[   31.688853]  dump_stack_lvl+0x73/0xb0
[   31.689183]  print_report+0xd1/0x640
[   31.689679]  ? __virt_addr_valid+0x1db/0x2d0
[   31.690275]  ? kasan_complete_mode_report_info+0x2a/0x200
[   31.690904]  kasan_report+0x102/0x140
[   31.691344]  ? kasan_atomics_helper+0x4fa7/0x5450
[   31.691808]  ? kasan_atomics_helper+0x4fa7/0x5450
[   31.692298]  __asan_report_load8_noabort+0x18/0x20
[   31.692894]  kasan_atomics_helper+0x4fa7/0x5450
[   31.693240]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   31.693874]  ? __kmalloc_cache_noprof+0x184/0x410
[   31.694453]  ? kasan_atomics+0x153/0x310
[   31.694937]  kasan_atomics+0x1dd/0x310
[   31.695384]  ? __pfx_kasan_atomics+0x10/0x10
[   31.695863]  ? __pfx_read_tsc+0x10/0x10
[   31.696165]  ? ktime_get_ts64+0x86/0x230
[   31.696690]  kunit_try_run_case+0x1b3/0x490
[   31.697224]  ? __pfx_kunit_try_run_case+0x10/0x10
[   31.697600]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   31.698113]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   31.698777]  ? __kthread_parkme+0x82/0x160
[   31.699115]  ? preempt_count_sub+0x50/0x80
[   31.699661]  ? __pfx_kunit_try_run_case+0x10/0x10
[   31.700047]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   31.700806]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   31.701352]  kthread+0x257/0x310
[   31.701625]  ? __pfx_kthread+0x10/0x10
[   31.702128]  ret_from_fork+0x41/0x80
[   31.702467]  ? __pfx_kthread+0x10/0x10
[   31.702987]  ret_from_fork_asm+0x1a/0x30
[   31.703490]  </TASK>
[   31.704418] 
[   31.704634] Allocated by task 272:
[   31.705491]  kasan_save_stack+0x3d/0x60
[   31.705973]  kasan_save_track+0x18/0x40
[   31.706444]  kasan_save_alloc_info+0x3b/0x50
[   31.707200]  __kasan_kmalloc+0xb7/0xc0
[   31.708098]  __kmalloc_cache_noprof+0x184/0x410
[   31.709104]  kasan_atomics+0x96/0x310
[   31.709415]  kunit_try_run_case+0x1b3/0x490
[   31.709614]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   31.710189]  kthread+0x257/0x310
[   31.711044]  ret_from_fork+0x41/0x80
[   31.711346]  ret_from_fork_asm+0x1a/0x30
[   31.711711] 
[   31.712398] The buggy address belongs to the object at ffff888102969600
[   31.712398]  which belongs to the cache kmalloc-64 of size 64
[   31.714059] The buggy address is located 0 bytes to the right of
[   31.714059]  allocated 48-byte region [ffff888102969600, ffff888102969630)
[   31.715456] 
[   31.715667] The buggy address belongs to the physical page:
[   31.716916] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102969
[   31.717703] flags: 0x200000000000000(node=0|zone=2)
[   31.718548] page_type: f5(slab)
[   31.718817] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   31.719615] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   31.720951] page dumped because: kasan: bad access detected
[   31.721628] 
[   31.721781] Memory state around the buggy address:
[   31.722973]  ffff888102969500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   31.723667]  ffff888102969580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   31.724952] >ffff888102969600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   31.725765]                                      ^
[   31.726452]  ffff888102969680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.727571]  ffff888102969700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.728548] ==================================================================
[   31.202700] ==================================================================
[   31.203147] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1d7b/0x5450
[   31.204959] Write of size 8 at addr ffff888102969630 by task kunit_try_catch/272
[   31.206191] 
[   31.206406] CPU: 0 UID: 0 PID: 272 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc2-next-20241209 #1
[   31.207998] Tainted: [B]=BAD_PAGE, [N]=TEST
[   31.208438] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   31.209727] Call Trace:
[   31.210062]  <TASK>
[   31.210349]  dump_stack_lvl+0x73/0xb0
[   31.210834]  print_report+0xd1/0x640
[   31.211243]  ? __virt_addr_valid+0x1db/0x2d0
[   31.211883]  ? kasan_complete_mode_report_info+0x2a/0x200
[   31.212351]  kasan_report+0x102/0x140
[   31.213029]  ? kasan_atomics_helper+0x1d7b/0x5450
[   31.213780]  ? kasan_atomics_helper+0x1d7b/0x5450
[   31.214355]  kasan_check_range+0x10c/0x1c0
[   31.214978]  __kasan_check_write+0x18/0x20
[   31.215492]  kasan_atomics_helper+0x1d7b/0x5450
[   31.216043]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   31.216504]  ? __kmalloc_cache_noprof+0x184/0x410
[   31.217220]  ? kasan_atomics+0x153/0x310
[   31.217794]  kasan_atomics+0x1dd/0x310
[   31.218247]  ? __pfx_kasan_atomics+0x10/0x10
[   31.218678]  ? __pfx_read_tsc+0x10/0x10
[   31.219338]  ? ktime_get_ts64+0x86/0x230
[   31.219935]  kunit_try_run_case+0x1b3/0x490
[   31.220556]  ? __pfx_kunit_try_run_case+0x10/0x10
[   31.221229]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   31.221624]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   31.222495]  ? __kthread_parkme+0x82/0x160
[   31.223012]  ? preempt_count_sub+0x50/0x80
[   31.223657]  ? __pfx_kunit_try_run_case+0x10/0x10
[   31.224100]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   31.224982]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   31.225604]  kthread+0x257/0x310
[   31.226168]  ? __pfx_kthread+0x10/0x10
[   31.226644]  ret_from_fork+0x41/0x80
[   31.227206]  ? __pfx_kthread+0x10/0x10
[   31.227623]  ret_from_fork_asm+0x1a/0x30
[   31.228286]  </TASK>
[   31.228611] 
[   31.229017] Allocated by task 272:
[   31.229400]  kasan_save_stack+0x3d/0x60
[   31.229974]  kasan_save_track+0x18/0x40
[   31.230486]  kasan_save_alloc_info+0x3b/0x50
[   31.230955]  __kasan_kmalloc+0xb7/0xc0
[   31.231519]  __kmalloc_cache_noprof+0x184/0x410
[   31.232010]  kasan_atomics+0x96/0x310
[   31.232389]  kunit_try_run_case+0x1b3/0x490
[   31.232854]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   31.233467]  kthread+0x257/0x310
[   31.233808]  ret_from_fork+0x41/0x80
[   31.234154]  ret_from_fork_asm+0x1a/0x30
[   31.234721] 
[   31.235031] The buggy address belongs to the object at ffff888102969600
[   31.235031]  which belongs to the cache kmalloc-64 of size 64
[   31.236148] The buggy address is located 0 bytes to the right of
[   31.236148]  allocated 48-byte region [ffff888102969600, ffff888102969630)
[   31.237248] 
[   31.237523] The buggy address belongs to the physical page:
[   31.238163] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102969
[   31.238665] flags: 0x200000000000000(node=0|zone=2)
[   31.239424] page_type: f5(slab)
[   31.239956] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   31.241433] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   31.242189] page dumped because: kasan: bad access detected
[   31.243085] 
[   31.243444] Memory state around the buggy address:
[   31.243699]  ffff888102969500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   31.244126]  ffff888102969580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   31.245047] >ffff888102969600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   31.245954]                                      ^
[   31.246168]  ffff888102969680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.246656]  ffff888102969700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.247495] ==================================================================
[   28.850038] ==================================================================
[   28.851840] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b3c/0x5450
[   28.853525] Write of size 4 at addr ffff888102969630 by task kunit_try_catch/272
[   28.854232] 
[   28.855199] CPU: 0 UID: 0 PID: 272 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc2-next-20241209 #1
[   28.856448] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.857190] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   28.858193] Call Trace:
[   28.858560]  <TASK>
[   28.859825]  dump_stack_lvl+0x73/0xb0
[   28.860782]  print_report+0xd1/0x640
[   28.861214]  ? __virt_addr_valid+0x1db/0x2d0
[   28.861771]  ? kasan_complete_mode_report_info+0x2a/0x200
[   28.862384]  kasan_report+0x102/0x140
[   28.862809]  ? kasan_atomics_helper+0x4b3c/0x5450
[   28.863331]  ? kasan_atomics_helper+0x4b3c/0x5450
[   28.864741]  __asan_report_store4_noabort+0x1b/0x30
[   28.865234]  kasan_atomics_helper+0x4b3c/0x5450
[   28.865641]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   28.866829]  ? __kmalloc_cache_noprof+0x184/0x410
[   28.867861]  ? kasan_atomics+0x153/0x310
[   28.868287]  kasan_atomics+0x1dd/0x310
[   28.868783]  ? __pfx_kasan_atomics+0x10/0x10
[   28.869683]  ? __pfx_read_tsc+0x10/0x10
[   28.870765]  ? ktime_get_ts64+0x86/0x230
[   28.871217]  kunit_try_run_case+0x1b3/0x490
[   28.871726]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.872216]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   28.873777]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   28.874296]  ? __kthread_parkme+0x82/0x160
[   28.874863]  ? preempt_count_sub+0x50/0x80
[   28.876042]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.876475]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   28.877198]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.878515]  kthread+0x257/0x310
[   28.878969]  ? __pfx_kthread+0x10/0x10
[   28.879277]  ret_from_fork+0x41/0x80
[   28.879748]  ? __pfx_kthread+0x10/0x10
[   28.880279]  ret_from_fork_asm+0x1a/0x30
[   28.880670]  </TASK>
[   28.881608] 
[   28.881886] Allocated by task 272:
[   28.882147]  kasan_save_stack+0x3d/0x60
[   28.882938]  kasan_save_track+0x18/0x40
[   28.883515]  kasan_save_alloc_info+0x3b/0x50
[   28.884525]  __kasan_kmalloc+0xb7/0xc0
[   28.885030]  __kmalloc_cache_noprof+0x184/0x410
[   28.885964]  kasan_atomics+0x96/0x310
[   28.886528]  kunit_try_run_case+0x1b3/0x490
[   28.887206]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.887990]  kthread+0x257/0x310
[   28.889330]  ret_from_fork+0x41/0x80
[   28.889605]  ret_from_fork_asm+0x1a/0x30
[   28.890249] 
[   28.890719] The buggy address belongs to the object at ffff888102969600
[   28.890719]  which belongs to the cache kmalloc-64 of size 64
[   28.891389] The buggy address is located 0 bytes to the right of
[   28.891389]  allocated 48-byte region [ffff888102969600, ffff888102969630)
[   28.892693] 
[   28.892993] The buggy address belongs to the physical page:
[   28.893872] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102969
[   28.895511] flags: 0x200000000000000(node=0|zone=2)
[   28.895959] page_type: f5(slab)
[   28.896712] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   28.897640] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   28.898515] page dumped because: kasan: bad access detected
[   28.899503] 
[   28.899669] Memory state around the buggy address:
[   28.900166]  ffff888102969500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.901002]  ffff888102969580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.901846] >ffff888102969600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   28.902674]                                      ^
[   28.903942]  ffff888102969680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.904876]  ffff888102969700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.905983] ==================================================================
[   30.529725] ==================================================================
[   30.531586] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x151e/0x5450
[   30.533207] Write of size 8 at addr ffff888102969630 by task kunit_try_catch/272
[   30.534121] 
[   30.534456] CPU: 0 UID: 0 PID: 272 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc2-next-20241209 #1
[   30.536376] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.537055] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   30.537788] Call Trace:
[   30.538145]  <TASK>
[   30.538487]  dump_stack_lvl+0x73/0xb0
[   30.538834]  print_report+0xd1/0x640
[   30.539330]  ? __virt_addr_valid+0x1db/0x2d0
[   30.539987]  ? kasan_complete_mode_report_info+0x2a/0x200
[   30.540446]  kasan_report+0x102/0x140
[   30.540911]  ? kasan_atomics_helper+0x151e/0x5450
[   30.541396]  ? kasan_atomics_helper+0x151e/0x5450
[   30.542456]  kasan_check_range+0x10c/0x1c0
[   30.542852]  __kasan_check_write+0x18/0x20
[   30.543543]  kasan_atomics_helper+0x151e/0x5450
[   30.544250]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   30.544729]  ? __kmalloc_cache_noprof+0x184/0x410
[   30.545736]  ? kasan_atomics+0x153/0x310
[   30.546362]  kasan_atomics+0x1dd/0x310
[   30.546792]  ? __pfx_kasan_atomics+0x10/0x10
[   30.547496]  ? __pfx_read_tsc+0x10/0x10
[   30.548307]  ? ktime_get_ts64+0x86/0x230
[   30.548976]  kunit_try_run_case+0x1b3/0x490
[   30.549621]  ? __pfx_kunit_try_run_case+0x10/0x10
[   30.550378]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   30.551278]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   30.551748]  ? __kthread_parkme+0x82/0x160
[   30.552304]  ? preempt_count_sub+0x50/0x80
[   30.552777]  ? __pfx_kunit_try_run_case+0x10/0x10
[   30.553296]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   30.553845]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   30.554493]  kthread+0x257/0x310
[   30.554955]  ? __pfx_kthread+0x10/0x10
[   30.555324]  ret_from_fork+0x41/0x80
[   30.555715]  ? __pfx_kthread+0x10/0x10
[   30.556172]  ret_from_fork_asm+0x1a/0x30
[   30.556516]  </TASK>
[   30.556977] 
[   30.557316] Allocated by task 272:
[   30.557698]  kasan_save_stack+0x3d/0x60
[   30.558287]  kasan_save_track+0x18/0x40
[   30.558712]  kasan_save_alloc_info+0x3b/0x50
[   30.559204]  __kasan_kmalloc+0xb7/0xc0
[   30.559515]  __kmalloc_cache_noprof+0x184/0x410
[   30.559870]  kasan_atomics+0x96/0x310
[   30.560347]  kunit_try_run_case+0x1b3/0x490
[   30.560872]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   30.561546]  kthread+0x257/0x310
[   30.562073]  ret_from_fork+0x41/0x80
[   30.562378]  ret_from_fork_asm+0x1a/0x30
[   30.563063] 
[   30.563251] The buggy address belongs to the object at ffff888102969600
[   30.563251]  which belongs to the cache kmalloc-64 of size 64
[   30.564089] The buggy address is located 0 bytes to the right of
[   30.564089]  allocated 48-byte region [ffff888102969600, ffff888102969630)
[   30.565334] 
[   30.565616] The buggy address belongs to the physical page:
[   30.566317] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102969
[   30.567019] flags: 0x200000000000000(node=0|zone=2)
[   30.567624] page_type: f5(slab)
[   30.568000] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   30.569095] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   30.569616] page dumped because: kasan: bad access detected
[   30.570166] 
[   30.570476] Memory state around the buggy address:
[   30.571226]  ffff888102969500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   30.572897]  ffff888102969580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   30.573559] >ffff888102969600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   30.574436]                                      ^
[   30.575115]  ffff888102969680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.575686]  ffff888102969700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.576543] ==================================================================
[   31.780920] ==================================================================
[   31.781476] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x5117/0x5450
[   31.782497] Read of size 8 at addr ffff888102969630 by task kunit_try_catch/272
[   31.783320] 
[   31.783555] CPU: 0 UID: 0 PID: 272 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc2-next-20241209 #1
[   31.784490] Tainted: [B]=BAD_PAGE, [N]=TEST
[   31.785096] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   31.785827] Call Trace:
[   31.786522]  <TASK>
[   31.787816]  dump_stack_lvl+0x73/0xb0
[   31.788298]  print_report+0xd1/0x640
[   31.789684]  ? __virt_addr_valid+0x1db/0x2d0
[   31.790106]  ? kasan_complete_mode_report_info+0x2a/0x200
[   31.790878]  kasan_report+0x102/0x140
[   31.791455]  ? kasan_atomics_helper+0x5117/0x5450
[   31.792189]  ? kasan_atomics_helper+0x5117/0x5450
[   31.792917]  __asan_report_load8_noabort+0x18/0x20
[   31.793628]  kasan_atomics_helper+0x5117/0x5450
[   31.794590]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   31.795090]  ? __kmalloc_cache_noprof+0x184/0x410
[   31.795802]  ? kasan_atomics+0x153/0x310
[   31.796460]  kasan_atomics+0x1dd/0x310
[   31.797070]  ? __pfx_kasan_atomics+0x10/0x10
[   31.797688]  ? __pfx_read_tsc+0x10/0x10
[   31.798642]  ? ktime_get_ts64+0x86/0x230
[   31.799122]  kunit_try_run_case+0x1b3/0x490
[   31.799584]  ? __pfx_kunit_try_run_case+0x10/0x10
[   31.800332]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   31.801019]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   31.801672]  ? __kthread_parkme+0x82/0x160
[   31.802491]  ? preempt_count_sub+0x50/0x80
[   31.802911]  ? __pfx_kunit_try_run_case+0x10/0x10
[   31.803553]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   31.804335]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   31.805076]  kthread+0x257/0x310
[   31.805650]  ? __pfx_kthread+0x10/0x10
[   31.806315]  ret_from_fork+0x41/0x80
[   31.806694]  ? __pfx_kthread+0x10/0x10
[   31.807651]  ret_from_fork_asm+0x1a/0x30
[   31.808162]  </TASK>
[   31.808464] 
[   31.808677] Allocated by task 272:
[   31.809451]  kasan_save_stack+0x3d/0x60
[   31.809732]  kasan_save_track+0x18/0x40
[   31.810529]  kasan_save_alloc_info+0x3b/0x50
[   31.811195]  __kasan_kmalloc+0xb7/0xc0
[   31.811607]  __kmalloc_cache_noprof+0x184/0x410
[   31.812510]  kasan_atomics+0x96/0x310
[   31.813107]  kunit_try_run_case+0x1b3/0x490
[   31.813547]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   31.814577]  kthread+0x257/0x310
[   31.814931]  ret_from_fork+0x41/0x80
[   31.815445]  ret_from_fork_asm+0x1a/0x30
[   31.816234] 
[   31.816566] The buggy address belongs to the object at ffff888102969600
[   31.816566]  which belongs to the cache kmalloc-64 of size 64
[   31.818216] The buggy address is located 0 bytes to the right of
[   31.818216]  allocated 48-byte region [ffff888102969600, ffff888102969630)
[   31.819843] 
[   31.820310] The buggy address belongs to the physical page:
[   31.820780] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102969
[   31.822073] flags: 0x200000000000000(node=0|zone=2)
[   31.822807] page_type: f5(slab)
[   31.823375] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   31.824480] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   31.825525] page dumped because: kasan: bad access detected
[   31.825975] 
[   31.826641] Memory state around the buggy address:
[   31.827386]  ffff888102969500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   31.828396]  ffff888102969580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   31.829432] >ffff888102969600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   31.830101]                                      ^
[   31.830823]  ffff888102969680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.831492]  ffff888102969700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.832657] ==================================================================
[   29.023971] ==================================================================
[   29.024652] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x698/0x5450
[   29.025342] Write of size 4 at addr ffff888102969630 by task kunit_try_catch/272
[   29.026714] 
[   29.027226] CPU: 0 UID: 0 PID: 272 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc2-next-20241209 #1
[   29.028996] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.029739] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   29.031209] Call Trace:
[   29.031444]  <TASK>
[   29.031763]  dump_stack_lvl+0x73/0xb0
[   29.032178]  print_report+0xd1/0x640
[   29.033417]  ? __virt_addr_valid+0x1db/0x2d0
[   29.034179]  ? kasan_complete_mode_report_info+0x2a/0x200
[   29.035413]  kasan_report+0x102/0x140
[   29.035806]  ? kasan_atomics_helper+0x698/0x5450
[   29.037067]  ? kasan_atomics_helper+0x698/0x5450
[   29.037678]  kasan_check_range+0x10c/0x1c0
[   29.038939]  __kasan_check_write+0x18/0x20
[   29.040073]  kasan_atomics_helper+0x698/0x5450
[   29.040591]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   29.041217]  ? __kmalloc_cache_noprof+0x184/0x410
[   29.041970]  ? kasan_atomics+0x153/0x310
[   29.042748]  kasan_atomics+0x1dd/0x310
[   29.043144]  ? __pfx_kasan_atomics+0x10/0x10
[   29.044250]  ? __pfx_read_tsc+0x10/0x10
[   29.044652]  ? ktime_get_ts64+0x86/0x230
[   29.045171]  kunit_try_run_case+0x1b3/0x490
[   29.046107]  ? __pfx_kunit_try_run_case+0x10/0x10
[   29.047307]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   29.047787]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   29.048858]  ? __kthread_parkme+0x82/0x160
[   29.049450]  ? preempt_count_sub+0x50/0x80
[   29.050417]  ? __pfx_kunit_try_run_case+0x10/0x10
[   29.051466]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   29.052096]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   29.053294]  kthread+0x257/0x310
[   29.053679]  ? __pfx_kthread+0x10/0x10
[   29.054852]  ret_from_fork+0x41/0x80
[   29.055073]  ? __pfx_kthread+0x10/0x10
[   29.056051]  ret_from_fork_asm+0x1a/0x30
[   29.056747]  </TASK>
[   29.057062] 
[   29.057721] Allocated by task 272:
[   29.058908]  kasan_save_stack+0x3d/0x60
[   29.059249]  kasan_save_track+0x18/0x40
[   29.060369]  kasan_save_alloc_info+0x3b/0x50
[   29.060814]  __kasan_kmalloc+0xb7/0xc0
[   29.061185]  __kmalloc_cache_noprof+0x184/0x410
[   29.061614]  kasan_atomics+0x96/0x310
[   29.062040]  kunit_try_run_case+0x1b3/0x490
[   29.062989]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   29.063854]  kthread+0x257/0x310
[   29.064109]  ret_from_fork+0x41/0x80
[   29.064711]  ret_from_fork_asm+0x1a/0x30
[   29.065328] 
[   29.065567] The buggy address belongs to the object at ffff888102969600
[   29.065567]  which belongs to the cache kmalloc-64 of size 64
[   29.067054] The buggy address is located 0 bytes to the right of
[   29.067054]  allocated 48-byte region [ffff888102969600, ffff888102969630)
[   29.068676] 
[   29.068923] The buggy address belongs to the physical page:
[   29.069559] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102969
[   29.070223] flags: 0x200000000000000(node=0|zone=2)
[   29.070683] page_type: f5(slab)
[   29.071098] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   29.072142] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   29.073002] page dumped because: kasan: bad access detected
[   29.073650] 
[   29.073898] Memory state around the buggy address:
[   29.074584]  ffff888102969500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.075696]  ffff888102969580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.076512] >ffff888102969600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   29.077437]                                      ^
[   29.078482]  ffff888102969680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.079595]  ffff888102969700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.080516] ==================================================================
[   29.773609] ==================================================================
[   29.775794] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf11/0x5450
[   29.776546] Write of size 4 at addr ffff888102969630 by task kunit_try_catch/272
[   29.778067] 
[   29.778348] CPU: 0 UID: 0 PID: 272 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc2-next-20241209 #1
[   29.779499] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.780220] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   29.781218] Call Trace:
[   29.781471]  <TASK>
[   29.781993]  dump_stack_lvl+0x73/0xb0
[   29.782504]  print_report+0xd1/0x640
[   29.782871]  ? __virt_addr_valid+0x1db/0x2d0
[   29.783310]  ? kasan_complete_mode_report_info+0x2a/0x200
[   29.784350]  kasan_report+0x102/0x140
[   29.784786]  ? kasan_atomics_helper+0xf11/0x5450
[   29.785461]  ? kasan_atomics_helper+0xf11/0x5450
[   29.785692]  kasan_check_range+0x10c/0x1c0
[   29.786031]  __kasan_check_write+0x18/0x20
[   29.786623]  kasan_atomics_helper+0xf11/0x5450
[   29.787167]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   29.788012]  ? __kmalloc_cache_noprof+0x184/0x410
[   29.788599]  ? kasan_atomics+0x153/0x310
[   29.789355]  kasan_atomics+0x1dd/0x310
[   29.790368]  ? __pfx_kasan_atomics+0x10/0x10
[   29.790888]  ? __pfx_read_tsc+0x10/0x10
[   29.791348]  ? ktime_get_ts64+0x86/0x230
[   29.791864]  kunit_try_run_case+0x1b3/0x490
[   29.792417]  ? __pfx_kunit_try_run_case+0x10/0x10
[   29.792875]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   29.793546]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   29.794143]  ? __kthread_parkme+0x82/0x160
[   29.794673]  ? preempt_count_sub+0x50/0x80
[   29.795483]  ? __pfx_kunit_try_run_case+0x10/0x10
[   29.796441]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   29.797322]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   29.797774]  kthread+0x257/0x310
[   29.798384]  ? __pfx_kthread+0x10/0x10
[   29.799073]  ret_from_fork+0x41/0x80
[   29.799471]  ? __pfx_kthread+0x10/0x10
[   29.800289]  ret_from_fork_asm+0x1a/0x30
[   29.801072]  </TASK>
[   29.801365] 
[   29.801558] Allocated by task 272:
[   29.802537]  kasan_save_stack+0x3d/0x60
[   29.803174]  kasan_save_track+0x18/0x40
[   29.803650]  kasan_save_alloc_info+0x3b/0x50
[   29.804425]  __kasan_kmalloc+0xb7/0xc0
[   29.804796]  __kmalloc_cache_noprof+0x184/0x410
[   29.805386]  kasan_atomics+0x96/0x310
[   29.806109]  kunit_try_run_case+0x1b3/0x490
[   29.806586]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   29.807555]  kthread+0x257/0x310
[   29.808336]  ret_from_fork+0x41/0x80
[   29.809068]  ret_from_fork_asm+0x1a/0x30
[   29.809657] 
[   29.810035] The buggy address belongs to the object at ffff888102969600
[   29.810035]  which belongs to the cache kmalloc-64 of size 64
[   29.812005] The buggy address is located 0 bytes to the right of
[   29.812005]  allocated 48-byte region [ffff888102969600, ffff888102969630)
[   29.813546] 
[   29.813788] The buggy address belongs to the physical page:
[   29.814824] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102969
[   29.815702] flags: 0x200000000000000(node=0|zone=2)
[   29.816436] page_type: f5(slab)
[   29.816824] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   29.817959] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   29.818608] page dumped because: kasan: bad access detected
[   29.819676] 
[   29.819886] Memory state around the buggy address:
[   29.820195]  ffff888102969500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.821594]  ffff888102969580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.822440] >ffff888102969600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   29.823379]                                      ^
[   29.824186]  ffff888102969680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.825342]  ffff888102969700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.825996] ==================================================================
[   28.907313] ==================================================================
[   28.909199] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x566/0x5450
[   28.910075] Write of size 4 at addr ffff888102969630 by task kunit_try_catch/272
[   28.911315] 
[   28.911738] CPU: 0 UID: 0 PID: 272 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc2-next-20241209 #1
[   28.912785] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.913197] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   28.914507] Call Trace:
[   28.914878]  <TASK>
[   28.915287]  dump_stack_lvl+0x73/0xb0
[   28.915761]  print_report+0xd1/0x640
[   28.916335]  ? __virt_addr_valid+0x1db/0x2d0
[   28.917000]  ? kasan_complete_mode_report_info+0x2a/0x200
[   28.917813]  kasan_report+0x102/0x140
[   28.918614]  ? kasan_atomics_helper+0x566/0x5450
[   28.919224]  ? kasan_atomics_helper+0x566/0x5450
[   28.920055]  kasan_check_range+0x10c/0x1c0
[   28.920680]  __kasan_check_write+0x18/0x20
[   28.921471]  kasan_atomics_helper+0x566/0x5450
[   28.922189]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   28.923496]  ? __kmalloc_cache_noprof+0x184/0x410
[   28.924051]  ? kasan_atomics+0x153/0x310
[   28.924700]  kasan_atomics+0x1dd/0x310
[   28.925072]  ? __pfx_kasan_atomics+0x10/0x10
[   28.925708]  ? __pfx_read_tsc+0x10/0x10
[   28.926835]  ? ktime_get_ts64+0x86/0x230
[   28.927493]  kunit_try_run_case+0x1b3/0x490
[   28.928025]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.928786]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   28.929142]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   28.930007]  ? __kthread_parkme+0x82/0x160
[   28.930635]  ? preempt_count_sub+0x50/0x80
[   28.931773]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.932743]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   28.933635]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.934294]  kthread+0x257/0x310
[   28.934703]  ? __pfx_kthread+0x10/0x10
[   28.935344]  ret_from_fork+0x41/0x80
[   28.936240]  ? __pfx_kthread+0x10/0x10
[   28.936749]  ret_from_fork_asm+0x1a/0x30
[   28.937451]  </TASK>
[   28.937706] 
[   28.938064] Allocated by task 272:
[   28.938755]  kasan_save_stack+0x3d/0x60
[   28.939196]  kasan_save_track+0x18/0x40
[   28.940155]  kasan_save_alloc_info+0x3b/0x50
[   28.940690]  __kasan_kmalloc+0xb7/0xc0
[   28.941289]  __kmalloc_cache_noprof+0x184/0x410
[   28.941613]  kasan_atomics+0x96/0x310
[   28.942183]  kunit_try_run_case+0x1b3/0x490
[   28.943065]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.944413]  kthread+0x257/0x310
[   28.944739]  ret_from_fork+0x41/0x80
[   28.945148]  ret_from_fork_asm+0x1a/0x30
[   28.945557] 
[   28.945764] The buggy address belongs to the object at ffff888102969600
[   28.945764]  which belongs to the cache kmalloc-64 of size 64
[   28.946901] The buggy address is located 0 bytes to the right of
[   28.946901]  allocated 48-byte region [ffff888102969600, ffff888102969630)
[   28.948171] 
[   28.948695] The buggy address belongs to the physical page:
[   28.949592] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102969
[   28.951020] flags: 0x200000000000000(node=0|zone=2)
[   28.951796] page_type: f5(slab)
[   28.952365] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   28.953191] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   28.954521] page dumped because: kasan: bad access detected
[   28.955543] 
[   28.955804] Memory state around the buggy address:
[   28.956422]  ffff888102969500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.957249]  ffff888102969580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.958593] >ffff888102969600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   28.959509]                                      ^
[   28.959897]  ffff888102969680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.960732]  ffff888102969700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.962119] ==================================================================
[   30.310231] ==================================================================
[   30.311515] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x13b6/0x5450
[   30.311987] Read of size 8 at addr ffff888102969630 by task kunit_try_catch/272
[   30.313544] 
[   30.314191] CPU: 0 UID: 0 PID: 272 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc2-next-20241209 #1
[   30.315112] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.315686] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   30.316712] Call Trace:
[   30.317044]  <TASK>
[   30.317370]  dump_stack_lvl+0x73/0xb0
[   30.317801]  print_report+0xd1/0x640
[   30.318188]  ? __virt_addr_valid+0x1db/0x2d0
[   30.318648]  ? kasan_complete_mode_report_info+0x2a/0x200
[   30.319175]  kasan_report+0x102/0x140
[   30.320277]  ? kasan_atomics_helper+0x13b6/0x5450
[   30.321344]  ? kasan_atomics_helper+0x13b6/0x5450
[   30.322181]  kasan_check_range+0x10c/0x1c0
[   30.322634]  __kasan_check_read+0x15/0x20
[   30.323431]  kasan_atomics_helper+0x13b6/0x5450
[   30.324153]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   30.325224]  ? __kmalloc_cache_noprof+0x184/0x410
[   30.325714]  ? kasan_atomics+0x153/0x310
[   30.326378]  kasan_atomics+0x1dd/0x310
[   30.326833]  ? __pfx_kasan_atomics+0x10/0x10
[   30.327577]  ? __pfx_read_tsc+0x10/0x10
[   30.328185]  ? ktime_get_ts64+0x86/0x230
[   30.328800]  kunit_try_run_case+0x1b3/0x490
[   30.329484]  ? __pfx_kunit_try_run_case+0x10/0x10
[   30.330550]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   30.331511]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   30.332160]  ? __kthread_parkme+0x82/0x160
[   30.332637]  ? preempt_count_sub+0x50/0x80
[   30.333329]  ? __pfx_kunit_try_run_case+0x10/0x10
[   30.334327]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   30.335112]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   30.335809]  kthread+0x257/0x310
[   30.336381]  ? __pfx_kthread+0x10/0x10
[   30.337474]  ret_from_fork+0x41/0x80
[   30.338221]  ? __pfx_kthread+0x10/0x10
[   30.338661]  ret_from_fork_asm+0x1a/0x30
[   30.339371]  </TASK>
[   30.339596] 
[   30.339847] Allocated by task 272:
[   30.340666]  kasan_save_stack+0x3d/0x60
[   30.340951]  kasan_save_track+0x18/0x40
[   30.341588]  kasan_save_alloc_info+0x3b/0x50
[   30.342111]  __kasan_kmalloc+0xb7/0xc0
[   30.342925]  __kmalloc_cache_noprof+0x184/0x410
[   30.343484]  kasan_atomics+0x96/0x310
[   30.344355]  kunit_try_run_case+0x1b3/0x490
[   30.344692]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   30.345535]  kthread+0x257/0x310
[   30.346134]  ret_from_fork+0x41/0x80
[   30.346601]  ret_from_fork_asm+0x1a/0x30
[   30.347457] 
[   30.347624] The buggy address belongs to the object at ffff888102969600
[   30.347624]  which belongs to the cache kmalloc-64 of size 64
[   30.349549] The buggy address is located 0 bytes to the right of
[   30.349549]  allocated 48-byte region [ffff888102969600, ffff888102969630)
[   30.351019] 
[   30.351190] The buggy address belongs to the physical page:
[   30.352006] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102969
[   30.353239] flags: 0x200000000000000(node=0|zone=2)
[   30.353981] page_type: f5(slab)
[   30.354301] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   30.355233] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   30.356192] page dumped because: kasan: bad access detected
[   30.356593] 
[   30.357280] Memory state around the buggy address:
[   30.357943]  ffff888102969500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   30.358713]  ffff888102969580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   30.359547] >ffff888102969600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   30.360766]                                      ^
[   30.361589]  ffff888102969680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.362738]  ffff888102969700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.363478] ==================================================================
[   30.114880] ==================================================================
[   30.115543] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1218/0x5450
[   30.116139] Write of size 4 at addr ffff888102969630 by task kunit_try_catch/272
[   30.116789] 
[   30.117062] CPU: 0 UID: 0 PID: 272 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc2-next-20241209 #1
[   30.117705] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.118239] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   30.119008] Call Trace:
[   30.119228]  <TASK>
[   30.119584]  dump_stack_lvl+0x73/0xb0
[   30.120231]  print_report+0xd1/0x640
[   30.120600]  ? __virt_addr_valid+0x1db/0x2d0
[   30.121292]  ? kasan_complete_mode_report_info+0x2a/0x200
[   30.121761]  kasan_report+0x102/0x140
[   30.122109]  ? kasan_atomics_helper+0x1218/0x5450
[   30.122575]  ? kasan_atomics_helper+0x1218/0x5450
[   30.122998]  kasan_check_range+0x10c/0x1c0
[   30.123701]  __kasan_check_write+0x18/0x20
[   30.124014]  kasan_atomics_helper+0x1218/0x5450
[   30.124438]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   30.125293]  ? __kmalloc_cache_noprof+0x184/0x410
[   30.125900]  ? kasan_atomics+0x153/0x310
[   30.126251]  kasan_atomics+0x1dd/0x310
[   30.126623]  ? __pfx_kasan_atomics+0x10/0x10
[   30.127207]  ? __pfx_read_tsc+0x10/0x10
[   30.127638]  ? ktime_get_ts64+0x86/0x230
[   30.128227]  kunit_try_run_case+0x1b3/0x490
[   30.128564]  ? __pfx_kunit_try_run_case+0x10/0x10
[   30.128885]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   30.129214]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   30.129860]  ? __kthread_parkme+0x82/0x160
[   30.130432]  ? preempt_count_sub+0x50/0x80
[   30.131290]  ? __pfx_kunit_try_run_case+0x10/0x10
[   30.131728]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   30.132241]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   30.132619]  kthread+0x257/0x310
[   30.133346]  ? __pfx_kthread+0x10/0x10
[   30.133689]  ret_from_fork+0x41/0x80
[   30.134169]  ? __pfx_kthread+0x10/0x10
[   30.134571]  ret_from_fork_asm+0x1a/0x30
[   30.135097]  </TASK>
[   30.135352] 
[   30.135532] Allocated by task 272:
[   30.135772]  kasan_save_stack+0x3d/0x60
[   30.136064]  kasan_save_track+0x18/0x40
[   30.136454]  kasan_save_alloc_info+0x3b/0x50
[   30.137010]  __kasan_kmalloc+0xb7/0xc0
[   30.137727]  __kmalloc_cache_noprof+0x184/0x410
[   30.138491]  kasan_atomics+0x96/0x310
[   30.138765]  kunit_try_run_case+0x1b3/0x490
[   30.139223]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   30.141468]  kthread+0x257/0x310
[   30.141818]  ret_from_fork+0x41/0x80
[   30.142270]  ret_from_fork_asm+0x1a/0x30
[   30.142586] 
[   30.142752] The buggy address belongs to the object at ffff888102969600
[   30.142752]  which belongs to the cache kmalloc-64 of size 64
[   30.145004] The buggy address is located 0 bytes to the right of
[   30.145004]  allocated 48-byte region [ffff888102969600, ffff888102969630)
[   30.147918] 
[   30.148202] The buggy address belongs to the physical page:
[   30.148624] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102969
[   30.150861] flags: 0x200000000000000(node=0|zone=2)
[   30.151461] page_type: f5(slab)
[   30.151715] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   30.152397] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   30.153101] page dumped because: kasan: bad access detected
[   30.153591] 
[   30.153874] Memory state around the buggy address:
[   30.154226]  ffff888102969500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   30.154930]  ffff888102969580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   30.155389] >ffff888102969600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   30.156106]                                      ^
[   30.156662]  ffff888102969680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.157362]  ffff888102969700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.157862] ==================================================================
[   30.421890] ==================================================================
[   30.423302] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1468/0x5450
[   30.424290] Write of size 8 at addr ffff888102969630 by task kunit_try_catch/272
[   30.426274] 
[   30.426493] CPU: 0 UID: 0 PID: 272 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc2-next-20241209 #1
[   30.427681] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.428458] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   30.429538] Call Trace:
[   30.430379]  <TASK>
[   30.430615]  dump_stack_lvl+0x73/0xb0
[   30.431040]  print_report+0xd1/0x640
[   30.431741]  ? __virt_addr_valid+0x1db/0x2d0
[   30.432345]  ? kasan_complete_mode_report_info+0x2a/0x200
[   30.433304]  kasan_report+0x102/0x140
[   30.433762]  ? kasan_atomics_helper+0x1468/0x5450
[   30.434248]  ? kasan_atomics_helper+0x1468/0x5450
[   30.434667]  kasan_check_range+0x10c/0x1c0
[   30.435288]  __kasan_check_write+0x18/0x20
[   30.435882]  kasan_atomics_helper+0x1468/0x5450
[   30.436395]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   30.437174]  ? __kmalloc_cache_noprof+0x184/0x410
[   30.438345]  ? kasan_atomics+0x153/0x310
[   30.438646]  kasan_atomics+0x1dd/0x310
[   30.439221]  ? __pfx_kasan_atomics+0x10/0x10
[   30.439707]  ? __pfx_read_tsc+0x10/0x10
[   30.440354]  ? ktime_get_ts64+0x86/0x230
[   30.441132]  kunit_try_run_case+0x1b3/0x490
[   30.441685]  ? __pfx_kunit_try_run_case+0x10/0x10
[   30.442637]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   30.443420]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   30.443802]  ? __kthread_parkme+0x82/0x160
[   30.444370]  ? preempt_count_sub+0x50/0x80
[   30.445308]  ? __pfx_kunit_try_run_case+0x10/0x10
[   30.446143]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   30.447006]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   30.447593]  kthread+0x257/0x310
[   30.447946]  ? __pfx_kthread+0x10/0x10
[   30.448455]  ret_from_fork+0x41/0x80
[   30.449002]  ? __pfx_kthread+0x10/0x10
[   30.449532]  ret_from_fork_asm+0x1a/0x30
[   30.450087]  </TASK>
[   30.450405] 
[   30.450699] Allocated by task 272:
[   30.451153]  kasan_save_stack+0x3d/0x60
[   30.451747]  kasan_save_track+0x18/0x40
[   30.452817]  kasan_save_alloc_info+0x3b/0x50
[   30.453492]  __kasan_kmalloc+0xb7/0xc0
[   30.454404]  __kmalloc_cache_noprof+0x184/0x410
[   30.455206]  kasan_atomics+0x96/0x310
[   30.455477]  kunit_try_run_case+0x1b3/0x490
[   30.456755]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   30.457285]  kthread+0x257/0x310
[   30.457655]  ret_from_fork+0x41/0x80
[   30.458355]  ret_from_fork_asm+0x1a/0x30
[   30.459305] 
[   30.459495] The buggy address belongs to the object at ffff888102969600
[   30.459495]  which belongs to the cache kmalloc-64 of size 64
[   30.461290] The buggy address is located 0 bytes to the right of
[   30.461290]  allocated 48-byte region [ffff888102969600, ffff888102969630)
[   30.462789] 
[   30.463001] The buggy address belongs to the physical page:
[   30.463549] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102969
[   30.464751] flags: 0x200000000000000(node=0|zone=2)
[   30.465371] page_type: f5(slab)
[   30.465726] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   30.467067] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   30.467836] page dumped because: kasan: bad access detected
[   30.468602] 
[   30.468900] Memory state around the buggy address:
[   30.469202]  ffff888102969500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   30.470172]  ffff888102969580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   30.471376] >ffff888102969600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   30.472321]                                      ^
[   30.472981]  ffff888102969680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.473485]  ffff888102969700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.474215] ==================================================================
[   28.963180] ==================================================================
[   28.963992] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x5ff/0x5450
[   28.964755] Write of size 4 at addr ffff888102969630 by task kunit_try_catch/272
[   28.966173] 
[   28.966386] CPU: 0 UID: 0 PID: 272 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc2-next-20241209 #1
[   28.967741] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.968461] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   28.970132] Call Trace:
[   28.970988]  <TASK>
[   28.971389]  dump_stack_lvl+0x73/0xb0
[   28.972489]  print_report+0xd1/0x640
[   28.972964]  ? __virt_addr_valid+0x1db/0x2d0
[   28.973859]  ? kasan_complete_mode_report_info+0x2a/0x200
[   28.974409]  kasan_report+0x102/0x140
[   28.974833]  ? kasan_atomics_helper+0x5ff/0x5450
[   28.975944]  ? kasan_atomics_helper+0x5ff/0x5450
[   28.976802]  kasan_check_range+0x10c/0x1c0
[   28.977877]  __kasan_check_write+0x18/0x20
[   28.978284]  kasan_atomics_helper+0x5ff/0x5450
[   28.979244]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   28.979937]  ? __kmalloc_cache_noprof+0x184/0x410
[   28.980575]  ? kasan_atomics+0x153/0x310
[   28.981843]  kasan_atomics+0x1dd/0x310
[   28.982215]  ? __pfx_kasan_atomics+0x10/0x10
[   28.983101]  ? __pfx_read_tsc+0x10/0x10
[   28.983788]  ? ktime_get_ts64+0x86/0x230
[   28.984806]  kunit_try_run_case+0x1b3/0x490
[   28.985722]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.986614]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   28.987151]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   28.988341]  ? __kthread_parkme+0x82/0x160
[   28.988808]  ? preempt_count_sub+0x50/0x80
[   28.989184]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.989746]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   28.990504]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.991540]  kthread+0x257/0x310
[   28.991819]  ? __pfx_kthread+0x10/0x10
[   28.992424]  ret_from_fork+0x41/0x80
[   28.992938]  ? __pfx_kthread+0x10/0x10
[   28.993594]  ret_from_fork_asm+0x1a/0x30
[   28.994422]  </TASK>
[   28.994631] 
[   28.995136] Allocated by task 272:
[   28.996451]  kasan_save_stack+0x3d/0x60
[   28.997020]  kasan_save_track+0x18/0x40
[   28.997686]  kasan_save_alloc_info+0x3b/0x50
[   28.998430]  __kasan_kmalloc+0xb7/0xc0
[   28.999158]  __kmalloc_cache_noprof+0x184/0x410
[   29.000177]  kasan_atomics+0x96/0x310
[   29.000717]  kunit_try_run_case+0x1b3/0x490
[   29.001694]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   29.002336]  kthread+0x257/0x310
[   29.003178]  ret_from_fork+0x41/0x80
[   29.003983]  ret_from_fork_asm+0x1a/0x30
[   29.004421] 
[   29.004630] The buggy address belongs to the object at ffff888102969600
[   29.004630]  which belongs to the cache kmalloc-64 of size 64
[   29.006583] The buggy address is located 0 bytes to the right of
[   29.006583]  allocated 48-byte region [ffff888102969600, ffff888102969630)
[   29.008443] 
[   29.008669] The buggy address belongs to the physical page:
[   29.009161] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102969
[   29.011056] flags: 0x200000000000000(node=0|zone=2)
[   29.011391] page_type: f5(slab)
[   29.011826] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   29.012572] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   29.013420] page dumped because: kasan: bad access detected
[   29.014079] 
[   29.014857] Memory state around the buggy address:
[   29.015762]  ffff888102969500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.016705]  ffff888102969580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.018039] >ffff888102969600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   29.019034]                                      ^
[   29.019764]  ffff888102969680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.021010]  ffff888102969700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.022705] ==================================================================
[   28.503039] ==================================================================
[   28.503912] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4ba4/0x5450
[   28.504621] Write of size 4 at addr ffff888102969630 by task kunit_try_catch/272
[   28.505454] 
[   28.505915] CPU: 0 UID: 0 PID: 272 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc2-next-20241209 #1
[   28.507121] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.507526] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   28.508622] Call Trace:
[   28.508897]  <TASK>
[   28.509193]  dump_stack_lvl+0x73/0xb0
[   28.509699]  print_report+0xd1/0x640
[   28.510192]  ? __virt_addr_valid+0x1db/0x2d0
[   28.510557]  ? kasan_complete_mode_report_info+0x2a/0x200
[   28.511146]  kasan_report+0x102/0x140
[   28.511753]  ? kasan_atomics_helper+0x4ba4/0x5450
[   28.512200]  ? kasan_atomics_helper+0x4ba4/0x5450
[   28.512765]  __asan_report_store4_noabort+0x1b/0x30
[   28.513321]  kasan_atomics_helper+0x4ba4/0x5450
[   28.513763]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   28.514331]  ? __kmalloc_cache_noprof+0x184/0x410
[   28.514974]  ? kasan_atomics+0x153/0x310
[   28.516152]  kasan_atomics+0x1dd/0x310
[   28.516548]  ? __pfx_kasan_atomics+0x10/0x10
[   28.516853]  ? __pfx_read_tsc+0x10/0x10
[   28.517677]  ? ktime_get_ts64+0x86/0x230
[   28.517983]  kunit_try_run_case+0x1b3/0x490
[   28.518760]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.519469]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   28.520023]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   28.520408]  ? __kthread_parkme+0x82/0x160
[   28.520892]  ? preempt_count_sub+0x50/0x80
[   28.521852]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.522443]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   28.523008]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.523394]  kthread+0x257/0x310
[   28.523858]  ? __pfx_kthread+0x10/0x10
[   28.525167]  ret_from_fork+0x41/0x80
[   28.525494]  ? __pfx_kthread+0x10/0x10
[   28.525967]  ret_from_fork_asm+0x1a/0x30
[   28.526427]  </TASK>
[   28.526752] 
[   28.527366] Allocated by task 272:
[   28.527778]  kasan_save_stack+0x3d/0x60
[   28.528089]  kasan_save_track+0x18/0x40
[   28.528395]  kasan_save_alloc_info+0x3b/0x50
[   28.528946]  __kasan_kmalloc+0xb7/0xc0
[   28.529453]  __kmalloc_cache_noprof+0x184/0x410
[   28.530512]  kasan_atomics+0x96/0x310
[   28.530833]  kunit_try_run_case+0x1b3/0x490
[   28.531126]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.531912]  kthread+0x257/0x310
[   28.532438]  ret_from_fork+0x41/0x80
[   28.532939]  ret_from_fork_asm+0x1a/0x30
[   28.533418] 
[   28.533616] The buggy address belongs to the object at ffff888102969600
[   28.533616]  which belongs to the cache kmalloc-64 of size 64
[   28.534697] The buggy address is located 0 bytes to the right of
[   28.534697]  allocated 48-byte region [ffff888102969600, ffff888102969630)
[   28.535797] 
[   28.535959] The buggy address belongs to the physical page:
[   28.536738] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102969
[   28.537891] flags: 0x200000000000000(node=0|zone=2)
[   28.538218] page_type: f5(slab)
[   28.538511] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   28.539363] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   28.540183] page dumped because: kasan: bad access detected
[   28.540712] 
[   28.540920] Memory state around the buggy address:
[   28.541875]  ffff888102969500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.542539]  ffff888102969580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.543180] >ffff888102969600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   28.543861]                                      ^
[   28.544170]  ffff888102969680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.545531]  ffff888102969700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.546430] ==================================================================
[   29.982334] ==================================================================
[   29.982885] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a1e/0x5450
[   29.984943] Read of size 4 at addr ffff888102969630 by task kunit_try_catch/272
[   29.985737] 
[   29.986499] CPU: 0 UID: 0 PID: 272 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc2-next-20241209 #1
[   29.987527] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.988270] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   29.989390] Call Trace:
[   29.989938]  <TASK>
[   29.990326]  dump_stack_lvl+0x73/0xb0
[   29.991182]  print_report+0xd1/0x640
[   29.991820]  ? __virt_addr_valid+0x1db/0x2d0
[   29.992277]  ? kasan_complete_mode_report_info+0x2a/0x200
[   29.993159]  kasan_report+0x102/0x140
[   29.993594]  ? kasan_atomics_helper+0x4a1e/0x5450
[   29.994431]  ? kasan_atomics_helper+0x4a1e/0x5450
[   29.995286]  __asan_report_load4_noabort+0x18/0x20
[   29.995954]  kasan_atomics_helper+0x4a1e/0x5450
[   29.996457]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   29.997420]  ? __kmalloc_cache_noprof+0x184/0x410
[   29.997886]  ? kasan_atomics+0x153/0x310
[   29.998544]  kasan_atomics+0x1dd/0x310
[   29.999183]  ? __pfx_kasan_atomics+0x10/0x10
[   29.999811]  ? __pfx_read_tsc+0x10/0x10
[   30.000577]  ? ktime_get_ts64+0x86/0x230
[   30.001195]  kunit_try_run_case+0x1b3/0x490
[   30.001633]  ? __pfx_kunit_try_run_case+0x10/0x10
[   30.002406]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   30.003415]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   30.003891]  ? __kthread_parkme+0x82/0x160
[   30.004503]  ? preempt_count_sub+0x50/0x80
[   30.005287]  ? __pfx_kunit_try_run_case+0x10/0x10
[   30.005911]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   30.006722]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   30.007470]  kthread+0x257/0x310
[   30.008201]  ? __pfx_kthread+0x10/0x10
[   30.008612]  ret_from_fork+0x41/0x80
[   30.009306]  ? __pfx_kthread+0x10/0x10
[   30.009724]  ret_from_fork_asm+0x1a/0x30
[   30.010628]  </TASK>
[   30.010825] 
[   30.011220] Allocated by task 272:
[   30.011733]  kasan_save_stack+0x3d/0x60
[   30.012173]  kasan_save_track+0x18/0x40
[   30.012708]  kasan_save_alloc_info+0x3b/0x50
[   30.013082]  __kasan_kmalloc+0xb7/0xc0
[   30.013548]  __kmalloc_cache_noprof+0x184/0x410
[   30.014411]  kasan_atomics+0x96/0x310
[   30.014675]  kunit_try_run_case+0x1b3/0x490
[   30.015604]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   30.016312]  kthread+0x257/0x310
[   30.016862]  ret_from_fork+0x41/0x80
[   30.017504]  ret_from_fork_asm+0x1a/0x30
[   30.018086] 
[   30.018248] The buggy address belongs to the object at ffff888102969600
[   30.018248]  which belongs to the cache kmalloc-64 of size 64
[   30.019897] The buggy address is located 0 bytes to the right of
[   30.019897]  allocated 48-byte region [ffff888102969600, ffff888102969630)
[   30.021378] 
[   30.021830] The buggy address belongs to the physical page:
[   30.022305] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102969
[   30.023408] flags: 0x200000000000000(node=0|zone=2)
[   30.024130] page_type: f5(slab)
[   30.024689] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   30.025683] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   30.026627] page dumped because: kasan: bad access detected
[   30.027400] 
[   30.027580] Memory state around the buggy address:
[   30.028481]  ffff888102969500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   30.029282]  ffff888102969580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   30.030232] >ffff888102969600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   30.030836]                                      ^
[   30.031564]  ffff888102969680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.032664]  ffff888102969700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.033497] ==================================================================
[   30.475843] ==================================================================
[   30.476573] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x50d6/0x5450
[   30.477343] Write of size 8 at addr ffff888102969630 by task kunit_try_catch/272
[   30.478429] 
[   30.478649] CPU: 0 UID: 0 PID: 272 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc2-next-20241209 #1
[   30.480877] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.481698] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   30.483233] Call Trace:
[   30.483662]  <TASK>
[   30.484356]  dump_stack_lvl+0x73/0xb0
[   30.485033]  print_report+0xd1/0x640
[   30.485449]  ? __virt_addr_valid+0x1db/0x2d0
[   30.485891]  ? kasan_complete_mode_report_info+0x2a/0x200
[   30.486479]  kasan_report+0x102/0x140
[   30.486784]  ? kasan_atomics_helper+0x50d6/0x5450
[   30.487345]  ? kasan_atomics_helper+0x50d6/0x5450
[   30.487947]  __asan_report_store8_noabort+0x1b/0x30
[   30.488497]  kasan_atomics_helper+0x50d6/0x5450
[   30.489522]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   30.490281]  ? __kmalloc_cache_noprof+0x184/0x410
[   30.490756]  ? kasan_atomics+0x153/0x310
[   30.491122]  kasan_atomics+0x1dd/0x310
[   30.491543]  ? __pfx_kasan_atomics+0x10/0x10
[   30.492319]  ? __pfx_read_tsc+0x10/0x10
[   30.492729]  ? ktime_get_ts64+0x86/0x230
[   30.493954]  kunit_try_run_case+0x1b3/0x490
[   30.494458]  ? __pfx_kunit_try_run_case+0x10/0x10
[   30.495415]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   30.496127]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   30.496648]  ? __kthread_parkme+0x82/0x160
[   30.497589]  ? preempt_count_sub+0x50/0x80
[   30.498289]  ? __pfx_kunit_try_run_case+0x10/0x10
[   30.498758]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   30.499654]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   30.500900]  kthread+0x257/0x310
[   30.501278]  ? __pfx_kthread+0x10/0x10
[   30.501861]  ret_from_fork+0x41/0x80
[   30.502374]  ? __pfx_kthread+0x10/0x10
[   30.502997]  ret_from_fork_asm+0x1a/0x30
[   30.503483]  </TASK>
[   30.504059] 
[   30.504556] Allocated by task 272:
[   30.504801]  kasan_save_stack+0x3d/0x60
[   30.505650]  kasan_save_track+0x18/0x40
[   30.506103]  kasan_save_alloc_info+0x3b/0x50
[   30.506573]  __kasan_kmalloc+0xb7/0xc0
[   30.507582]  __kmalloc_cache_noprof+0x184/0x410
[   30.507949]  kasan_atomics+0x96/0x310
[   30.508748]  kunit_try_run_case+0x1b3/0x490
[   30.509486]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   30.510075]  kthread+0x257/0x310
[   30.510973]  ret_from_fork+0x41/0x80
[   30.511410]  ret_from_fork_asm+0x1a/0x30
[   30.512329] 
[   30.512509] The buggy address belongs to the object at ffff888102969600
[   30.512509]  which belongs to the cache kmalloc-64 of size 64
[   30.513910] The buggy address is located 0 bytes to the right of
[   30.513910]  allocated 48-byte region [ffff888102969600, ffff888102969630)
[   30.515621] 
[   30.516039] The buggy address belongs to the physical page:
[   30.516545] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102969
[   30.517621] flags: 0x200000000000000(node=0|zone=2)
[   30.518380] page_type: f5(slab)
[   30.519462] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   30.520155] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   30.521215] page dumped because: kasan: bad access detected
[   30.521730] 
[   30.522320] Memory state around the buggy address:
[   30.523003]  ffff888102969500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   30.523690]  ffff888102969580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   30.524653] >ffff888102969600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   30.525469]                                      ^
[   30.526079]  ffff888102969680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.527197]  ffff888102969700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.528295] ==================================================================
[   30.075546] ==================================================================
[   30.076474] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a04/0x5450
[   30.077440] Read of size 4 at addr ffff888102969630 by task kunit_try_catch/272
[   30.077937] 
[   30.078201] CPU: 0 UID: 0 PID: 272 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc2-next-20241209 #1
[   30.078825] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.079117] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   30.080300] Call Trace:
[   30.080670]  <TASK>
[   30.080965]  dump_stack_lvl+0x73/0xb0
[   30.081427]  print_report+0xd1/0x640
[   30.081723]  ? __virt_addr_valid+0x1db/0x2d0
[   30.082316]  ? kasan_complete_mode_report_info+0x2a/0x200
[   30.082966]  kasan_report+0x102/0x140
[   30.083382]  ? kasan_atomics_helper+0x4a04/0x5450
[   30.083791]  ? kasan_atomics_helper+0x4a04/0x5450
[   30.084283]  __asan_report_load4_noabort+0x18/0x20
[   30.084757]  kasan_atomics_helper+0x4a04/0x5450
[   30.085071]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   30.085574]  ? __kmalloc_cache_noprof+0x184/0x410
[   30.086121]  ? kasan_atomics+0x153/0x310
[   30.086461]  kasan_atomics+0x1dd/0x310
[   30.086756]  ? __pfx_kasan_atomics+0x10/0x10
[   30.087362]  ? __pfx_read_tsc+0x10/0x10
[   30.088147]  ? ktime_get_ts64+0x86/0x230
[   30.088544]  kunit_try_run_case+0x1b3/0x490
[   30.089057]  ? __pfx_kunit_try_run_case+0x10/0x10
[   30.089837]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   30.090208]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   30.090957]  ? __kthread_parkme+0x82/0x160
[   30.091392]  ? preempt_count_sub+0x50/0x80
[   30.091814]  ? __pfx_kunit_try_run_case+0x10/0x10
[   30.092299]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   30.092814]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   30.093368]  kthread+0x257/0x310
[   30.093721]  ? __pfx_kthread+0x10/0x10
[   30.094092]  ret_from_fork+0x41/0x80
[   30.094522]  ? __pfx_kthread+0x10/0x10
[   30.094813]  ret_from_fork_asm+0x1a/0x30
[   30.095132]  </TASK>
[   30.095395] 
[   30.095665] Allocated by task 272:
[   30.096390]  kasan_save_stack+0x3d/0x60
[   30.096995]  kasan_save_track+0x18/0x40
[   30.097524]  kasan_save_alloc_info+0x3b/0x50
[   30.098066]  __kasan_kmalloc+0xb7/0xc0
[   30.098446]  __kmalloc_cache_noprof+0x184/0x410
[   30.098956]  kasan_atomics+0x96/0x310
[   30.099294]  kunit_try_run_case+0x1b3/0x490
[   30.099619]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   30.099978]  kthread+0x257/0x310
[   30.100237]  ret_from_fork+0x41/0x80
[   30.100559]  ret_from_fork_asm+0x1a/0x30
[   30.101076] 
[   30.101357] The buggy address belongs to the object at ffff888102969600
[   30.101357]  which belongs to the cache kmalloc-64 of size 64
[   30.102619] The buggy address is located 0 bytes to the right of
[   30.102619]  allocated 48-byte region [ffff888102969600, ffff888102969630)
[   30.104205] 
[   30.104394] The buggy address belongs to the physical page:
[   30.104735] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102969
[   30.105599] flags: 0x200000000000000(node=0|zone=2)
[   30.106551] page_type: f5(slab)
[   30.107064] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   30.107684] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   30.108365] page dumped because: kasan: bad access detected
[   30.108706] 
[   30.108868] Memory state around the buggy address:
[   30.109175]  ffff888102969500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   30.109984]  ffff888102969580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   30.110725] >ffff888102969600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   30.111138]                                      ^
[   30.111957]  ffff888102969680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.112740]  ffff888102969700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.113523] ==================================================================
[   29.474170] ==================================================================
[   29.475102] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xb6b/0x5450
[   29.476732] Write of size 4 at addr ffff888102969630 by task kunit_try_catch/272
[   29.477436] 
[   29.477630] CPU: 0 UID: 0 PID: 272 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc2-next-20241209 #1
[   29.478947] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.479416] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   29.480507] Call Trace:
[   29.480906]  <TASK>
[   29.481330]  dump_stack_lvl+0x73/0xb0
[   29.481926]  print_report+0xd1/0x640
[   29.482453]  ? __virt_addr_valid+0x1db/0x2d0
[   29.483135]  ? kasan_complete_mode_report_info+0x2a/0x200
[   29.483798]  kasan_report+0x102/0x140
[   29.484322]  ? kasan_atomics_helper+0xb6b/0x5450
[   29.484739]  ? kasan_atomics_helper+0xb6b/0x5450
[   29.485172]  kasan_check_range+0x10c/0x1c0
[   29.485807]  __kasan_check_write+0x18/0x20
[   29.486284]  kasan_atomics_helper+0xb6b/0x5450
[   29.486916]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   29.487590]  ? __kmalloc_cache_noprof+0x184/0x410
[   29.488378]  ? kasan_atomics+0x153/0x310
[   29.488896]  kasan_atomics+0x1dd/0x310
[   29.489453]  ? __pfx_kasan_atomics+0x10/0x10
[   29.489918]  ? __pfx_read_tsc+0x10/0x10
[   29.490652]  ? ktime_get_ts64+0x86/0x230
[   29.491128]  kunit_try_run_case+0x1b3/0x490
[   29.491702]  ? __pfx_kunit_try_run_case+0x10/0x10
[   29.492344]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   29.492801]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   29.493302]  ? __kthread_parkme+0x82/0x160
[   29.493926]  ? preempt_count_sub+0x50/0x80
[   29.494390]  ? __pfx_kunit_try_run_case+0x10/0x10
[   29.495025]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   29.495838]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   29.496345]  kthread+0x257/0x310
[   29.496863]  ? __pfx_kthread+0x10/0x10
[   29.497334]  ret_from_fork+0x41/0x80
[   29.497716]  ? __pfx_kthread+0x10/0x10
[   29.498688]  ret_from_fork_asm+0x1a/0x30
[   29.499247]  </TASK>
[   29.499518] 
[   29.499794] Allocated by task 272:
[   29.500064]  kasan_save_stack+0x3d/0x60
[   29.500631]  kasan_save_track+0x18/0x40
[   29.500963]  kasan_save_alloc_info+0x3b/0x50
[   29.501646]  __kasan_kmalloc+0xb7/0xc0
[   29.501974]  __kmalloc_cache_noprof+0x184/0x410
[   29.502528]  kasan_atomics+0x96/0x310
[   29.503048]  kunit_try_run_case+0x1b3/0x490
[   29.503389]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   29.504053]  kthread+0x257/0x310
[   29.504570]  ret_from_fork+0x41/0x80
[   29.504961]  ret_from_fork_asm+0x1a/0x30
[   29.505271] 
[   29.505619] The buggy address belongs to the object at ffff888102969600
[   29.505619]  which belongs to the cache kmalloc-64 of size 64
[   29.506891] The buggy address is located 0 bytes to the right of
[   29.506891]  allocated 48-byte region [ffff888102969600, ffff888102969630)
[   29.507627] 
[   29.508011] The buggy address belongs to the physical page:
[   29.508707] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102969
[   29.509400] flags: 0x200000000000000(node=0|zone=2)
[   29.510203] page_type: f5(slab)
[   29.510565] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   29.511480] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   29.511951] page dumped because: kasan: bad access detected
[   29.512600] 
[   29.513043] Memory state around the buggy address:
[   29.513413]  ffff888102969500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.514219]  ffff888102969580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.515020] >ffff888102969600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   29.515452]                                      ^
[   29.516033]  ffff888102969680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.516615]  ffff888102969700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.517458] ==================================================================
[   31.494042] ==================================================================
[   31.495659] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4f9a/0x5450
[   31.496616] Read of size 8 at addr ffff888102969630 by task kunit_try_catch/272
[   31.497186] 
[   31.498110] CPU: 0 UID: 0 PID: 272 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc2-next-20241209 #1
[   31.499443] Tainted: [B]=BAD_PAGE, [N]=TEST
[   31.500155] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   31.500856] Call Trace:
[   31.501386]  <TASK>
[   31.501671]  dump_stack_lvl+0x73/0xb0
[   31.502172]  print_report+0xd1/0x640
[   31.502511]  ? __virt_addr_valid+0x1db/0x2d0
[   31.503019]  ? kasan_complete_mode_report_info+0x2a/0x200
[   31.503427]  kasan_report+0x102/0x140
[   31.503944]  ? kasan_atomics_helper+0x4f9a/0x5450
[   31.504520]  ? kasan_atomics_helper+0x4f9a/0x5450
[   31.505092]  __asan_report_load8_noabort+0x18/0x20
[   31.505689]  kasan_atomics_helper+0x4f9a/0x5450
[   31.506307]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   31.507153]  ? __kmalloc_cache_noprof+0x184/0x410
[   31.507988]  ? kasan_atomics+0x153/0x310
[   31.508460]  kasan_atomics+0x1dd/0x310
[   31.509532]  ? __pfx_kasan_atomics+0x10/0x10
[   31.509926]  ? __pfx_read_tsc+0x10/0x10
[   31.510123]  ? ktime_get_ts64+0x86/0x230
[   31.510417]  kunit_try_run_case+0x1b3/0x490
[   31.511186]  ? __pfx_kunit_try_run_case+0x10/0x10
[   31.512275]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   31.513012]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   31.513729]  ? __kthread_parkme+0x82/0x160
[   31.514496]  ? preempt_count_sub+0x50/0x80
[   31.514955]  ? __pfx_kunit_try_run_case+0x10/0x10
[   31.515643]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   31.516818]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   31.517848]  kthread+0x257/0x310
[   31.518118]  ? __pfx_kthread+0x10/0x10
[   31.518647]  ret_from_fork+0x41/0x80
[   31.519186]  ? __pfx_kthread+0x10/0x10
[   31.519715]  ret_from_fork_asm+0x1a/0x30
[   31.520121]  </TASK>
[   31.520512] 
[   31.520777] Allocated by task 272:
[   31.521219]  kasan_save_stack+0x3d/0x60
[   31.522385]  kasan_save_track+0x18/0x40
[   31.522666]  kasan_save_alloc_info+0x3b/0x50
[   31.523478]  __kasan_kmalloc+0xb7/0xc0
[   31.524269]  __kmalloc_cache_noprof+0x184/0x410
[   31.524693]  kasan_atomics+0x96/0x310
[   31.525168]  kunit_try_run_case+0x1b3/0x490
[   31.525578]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   31.526501]  kthread+0x257/0x310
[   31.526824]  ret_from_fork+0x41/0x80
[   31.527400]  ret_from_fork_asm+0x1a/0x30
[   31.527896] 
[   31.528018] The buggy address belongs to the object at ffff888102969600
[   31.528018]  which belongs to the cache kmalloc-64 of size 64
[   31.528485] The buggy address is located 0 bytes to the right of
[   31.528485]  allocated 48-byte region [ffff888102969600, ffff888102969630)
[   31.529113] 
[   31.529301] The buggy address belongs to the physical page:
[   31.529915] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102969
[   31.531595] flags: 0x200000000000000(node=0|zone=2)
[   31.532115] page_type: f5(slab)
[   31.532516] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   31.533133] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   31.534030] page dumped because: kasan: bad access detected
[   31.534583] 
[   31.534807] Memory state around the buggy address:
[   31.535401]  ffff888102969500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   31.536120]  ffff888102969580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   31.536844] >ffff888102969600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   31.537524]                                      ^
[   31.537983]  ffff888102969680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.538688]  ffff888102969700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.539474] ==================================================================
[   29.200635] ==================================================================
[   29.202736] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x861/0x5450
[   29.203510] Write of size 4 at addr ffff888102969630 by task kunit_try_catch/272
[   29.203947] 
[   29.205358] CPU: 0 UID: 0 PID: 272 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc2-next-20241209 #1
[   29.206166] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.207126] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   29.208362] Call Trace:
[   29.208787]  <TASK>
[   29.209979]  dump_stack_lvl+0x73/0xb0
[   29.210580]  print_report+0xd1/0x640
[   29.210979]  ? __virt_addr_valid+0x1db/0x2d0
[   29.211837]  ? kasan_complete_mode_report_info+0x2a/0x200
[   29.212377]  kasan_report+0x102/0x140
[   29.212673]  ? kasan_atomics_helper+0x861/0x5450
[   29.214216]  ? kasan_atomics_helper+0x861/0x5450
[   29.214752]  kasan_check_range+0x10c/0x1c0
[   29.215812]  __kasan_check_write+0x18/0x20
[   29.216196]  kasan_atomics_helper+0x861/0x5450
[   29.216693]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   29.216994]  ? __kmalloc_cache_noprof+0x184/0x410
[   29.217745]  ? kasan_atomics+0x153/0x310
[   29.218189]  kasan_atomics+0x1dd/0x310
[   29.219855]  ? __pfx_kasan_atomics+0x10/0x10
[   29.221075]  ? __pfx_read_tsc+0x10/0x10
[   29.221534]  ? ktime_get_ts64+0x86/0x230
[   29.222432]  kunit_try_run_case+0x1b3/0x490
[   29.222788]  ? __pfx_kunit_try_run_case+0x10/0x10
[   29.223910]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   29.225022]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   29.225742]  ? __kthread_parkme+0x82/0x160
[   29.226514]  ? preempt_count_sub+0x50/0x80
[   29.226827]  ? __pfx_kunit_try_run_case+0x10/0x10
[   29.227774]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   29.228761]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   29.229862]  kthread+0x257/0x310
[   29.230472]  ? __pfx_kthread+0x10/0x10
[   29.231108]  ret_from_fork+0x41/0x80
[   29.232176]  ? __pfx_kthread+0x10/0x10
[   29.232629]  ret_from_fork_asm+0x1a/0x30
[   29.233330]  </TASK>
[   29.233849] 
[   29.234021] Allocated by task 272:
[   29.234884]  kasan_save_stack+0x3d/0x60
[   29.235925]  kasan_save_track+0x18/0x40
[   29.236196]  kasan_save_alloc_info+0x3b/0x50
[   29.237430]  __kasan_kmalloc+0xb7/0xc0
[   29.237780]  __kmalloc_cache_noprof+0x184/0x410
[   29.238482]  kasan_atomics+0x96/0x310
[   29.238769]  kunit_try_run_case+0x1b3/0x490
[   29.239066]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   29.240355]  kthread+0x257/0x310
[   29.240719]  ret_from_fork+0x41/0x80
[   29.241130]  ret_from_fork_asm+0x1a/0x30
[   29.241839] 
[   29.243160] The buggy address belongs to the object at ffff888102969600
[   29.243160]  which belongs to the cache kmalloc-64 of size 64
[   29.245960] The buggy address is located 0 bytes to the right of
[   29.245960]  allocated 48-byte region [ffff888102969600, ffff888102969630)
[   29.247473] 
[   29.248434] The buggy address belongs to the physical page:
[   29.248857] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102969
[   29.250937] flags: 0x200000000000000(node=0|zone=2)
[   29.251532] page_type: f5(slab)
[   29.251785] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   29.252583] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   29.253627] page dumped because: kasan: bad access detected
[   29.255340] 
[   29.255542] Memory state around the buggy address:
[   29.255885]  ffff888102969500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.257822]  ffff888102969580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.259245] >ffff888102969600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   29.260402]                                      ^
[   29.260704]  ffff888102969680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.262002]  ffff888102969700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.262824] ==================================================================
[   30.664681] ==================================================================
[   30.667313] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x16e8/0x5450
[   30.668028] Write of size 8 at addr ffff888102969630 by task kunit_try_catch/272
[   30.669358] 
[   30.669712] CPU: 0 UID: 0 PID: 272 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc2-next-20241209 #1
[   30.670962] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.671515] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   30.672241] Call Trace:
[   30.672564]  <TASK>
[   30.672799]  dump_stack_lvl+0x73/0xb0
[   30.673121]  print_report+0xd1/0x640
[   30.673622]  ? __virt_addr_valid+0x1db/0x2d0
[   30.674126]  ? kasan_complete_mode_report_info+0x2a/0x200
[   30.674596]  kasan_report+0x102/0x140
[   30.675298]  ? kasan_atomics_helper+0x16e8/0x5450
[   30.675732]  ? kasan_atomics_helper+0x16e8/0x5450
[   30.676341]  kasan_check_range+0x10c/0x1c0
[   30.676741]  __kasan_check_write+0x18/0x20
[   30.677194]  kasan_atomics_helper+0x16e8/0x5450
[   30.677819]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   30.678304]  ? __kmalloc_cache_noprof+0x184/0x410
[   30.678690]  ? kasan_atomics+0x153/0x310
[   30.679181]  kasan_atomics+0x1dd/0x310
[   30.679671]  ? __pfx_kasan_atomics+0x10/0x10
[   30.680043]  ? __pfx_read_tsc+0x10/0x10
[   30.680496]  ? ktime_get_ts64+0x86/0x230
[   30.681176]  kunit_try_run_case+0x1b3/0x490
[   30.681610]  ? __pfx_kunit_try_run_case+0x10/0x10
[   30.682079]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   30.682788]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   30.683237]  ? __kthread_parkme+0x82/0x160
[   30.683619]  ? preempt_count_sub+0x50/0x80
[   30.684004]  ? __pfx_kunit_try_run_case+0x10/0x10
[   30.684407]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   30.685529]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   30.686194]  kthread+0x257/0x310
[   30.686522]  ? __pfx_kthread+0x10/0x10
[   30.687117]  ret_from_fork+0x41/0x80
[   30.687547]  ? __pfx_kthread+0x10/0x10
[   30.687837]  ret_from_fork_asm+0x1a/0x30
[   30.688389]  </TASK>
[   30.688686] 
[   30.688977] Allocated by task 272:
[   30.689500]  kasan_save_stack+0x3d/0x60
[   30.689962]  kasan_save_track+0x18/0x40
[   30.690272]  kasan_save_alloc_info+0x3b/0x50
[   30.690657]  __kasan_kmalloc+0xb7/0xc0
[   30.691110]  __kmalloc_cache_noprof+0x184/0x410
[   30.691858]  kasan_atomics+0x96/0x310
[   30.692311]  kunit_try_run_case+0x1b3/0x490
[   30.692695]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   30.693191]  kthread+0x257/0x310
[   30.693482]  ret_from_fork+0x41/0x80
[   30.693748]  ret_from_fork_asm+0x1a/0x30
[   30.694249] 
[   30.694552] The buggy address belongs to the object at ffff888102969600
[   30.694552]  which belongs to the cache kmalloc-64 of size 64
[   30.695835] The buggy address is located 0 bytes to the right of
[   30.695835]  allocated 48-byte region [ffff888102969600, ffff888102969630)
[   30.698893] 
[   30.699076] The buggy address belongs to the physical page:
[   30.699426] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102969
[   30.700364] flags: 0x200000000000000(node=0|zone=2)
[   30.701326] page_type: f5(slab)
[   30.701670] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   30.702426] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   30.703358] page dumped because: kasan: bad access detected
[   30.704010] 
[   30.704335] Memory state around the buggy address:
[   30.705139]  ffff888102969500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   30.705972]  ffff888102969580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   30.706587] >ffff888102969600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   30.707756]                                      ^
[   30.708219]  ffff888102969680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.709068]  ffff888102969700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.709854] ==================================================================
[   29.827048] ==================================================================
[   29.828575] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xfaa/0x5450
[   29.830239] Write of size 4 at addr ffff888102969630 by task kunit_try_catch/272
[   29.830774] 
[   29.830964] CPU: 0 UID: 0 PID: 272 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc2-next-20241209 #1
[   29.832659] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.833231] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   29.834099] Call Trace:
[   29.834542]  <TASK>
[   29.834823]  dump_stack_lvl+0x73/0xb0
[   29.835526]  print_report+0xd1/0x640
[   29.836114]  ? __virt_addr_valid+0x1db/0x2d0
[   29.836587]  ? kasan_complete_mode_report_info+0x2a/0x200
[   29.837633]  kasan_report+0x102/0x140
[   29.838114]  ? kasan_atomics_helper+0xfaa/0x5450
[   29.838615]  ? kasan_atomics_helper+0xfaa/0x5450
[   29.839420]  kasan_check_range+0x10c/0x1c0
[   29.839758]  __kasan_check_write+0x18/0x20
[   29.840201]  kasan_atomics_helper+0xfaa/0x5450
[   29.841121]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   29.841681]  ? __kmalloc_cache_noprof+0x184/0x410
[   29.842721]  ? kasan_atomics+0x153/0x310
[   29.843471]  kasan_atomics+0x1dd/0x310
[   29.843976]  ? __pfx_kasan_atomics+0x10/0x10
[   29.844839]  ? __pfx_read_tsc+0x10/0x10
[   29.845427]  ? ktime_get_ts64+0x86/0x230
[   29.846157]  kunit_try_run_case+0x1b3/0x490
[   29.846655]  ? __pfx_kunit_try_run_case+0x10/0x10
[   29.847651]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   29.848192]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   29.848903]  ? __kthread_parkme+0x82/0x160
[   29.849524]  ? preempt_count_sub+0x50/0x80
[   29.850200]  ? __pfx_kunit_try_run_case+0x10/0x10
[   29.850965]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   29.851540]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   29.852158]  kthread+0x257/0x310
[   29.852964]  ? __pfx_kthread+0x10/0x10
[   29.853509]  ret_from_fork+0x41/0x80
[   29.854137]  ? __pfx_kthread+0x10/0x10
[   29.854729]  ret_from_fork_asm+0x1a/0x30
[   29.855495]  </TASK>
[   29.856099] 
[   29.856307] Allocated by task 272:
[   29.856719]  kasan_save_stack+0x3d/0x60
[   29.857092]  kasan_save_track+0x18/0x40
[   29.857672]  kasan_save_alloc_info+0x3b/0x50
[   29.858132]  __kasan_kmalloc+0xb7/0xc0
[   29.858562]  __kmalloc_cache_noprof+0x184/0x410
[   29.859081]  kasan_atomics+0x96/0x310
[   29.859404]  kunit_try_run_case+0x1b3/0x490
[   29.859853]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   29.860974]  kthread+0x257/0x310
[   29.861228]  ret_from_fork+0x41/0x80
[   29.861523]  ret_from_fork_asm+0x1a/0x30
[   29.861816] 
[   29.862135] The buggy address belongs to the object at ffff888102969600
[   29.862135]  which belongs to the cache kmalloc-64 of size 64
[   29.864124] The buggy address is located 0 bytes to the right of
[   29.864124]  allocated 48-byte region [ffff888102969600, ffff888102969630)
[   29.866281] 
[   29.866702] The buggy address belongs to the physical page:
[   29.867185] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102969
[   29.867561] flags: 0x200000000000000(node=0|zone=2)
[   29.867849] page_type: f5(slab)
[   29.868401] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   29.869476] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   29.870137] page dumped because: kasan: bad access detected
[   29.870748] 
[   29.871049] Memory state around the buggy address:
[   29.871519]  ffff888102969500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.872099]  ffff888102969580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.872921] >ffff888102969600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   29.874237]                                      ^
[   29.875294]  ffff888102969680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.875853]  ffff888102969700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.876667] ==================================================================
[   30.365006] ==================================================================
[   30.366854] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4eb0/0x5450
[   30.368153] Read of size 8 at addr ffff888102969630 by task kunit_try_catch/272
[   30.369659] 
[   30.369900] CPU: 0 UID: 0 PID: 272 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc2-next-20241209 #1
[   30.370974] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.371433] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   30.372495] Call Trace:
[   30.372955]  <TASK>
[   30.373629]  dump_stack_lvl+0x73/0xb0
[   30.374085]  print_report+0xd1/0x640
[   30.374629]  ? __virt_addr_valid+0x1db/0x2d0
[   30.375169]  ? kasan_complete_mode_report_info+0x2a/0x200
[   30.375875]  kasan_report+0x102/0x140
[   30.376524]  ? kasan_atomics_helper+0x4eb0/0x5450
[   30.377688]  ? kasan_atomics_helper+0x4eb0/0x5450
[   30.378206]  __asan_report_load8_noabort+0x18/0x20
[   30.378925]  kasan_atomics_helper+0x4eb0/0x5450
[   30.379485]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   30.380029]  ? __kmalloc_cache_noprof+0x184/0x410
[   30.381227]  ? kasan_atomics+0x153/0x310
[   30.381662]  kasan_atomics+0x1dd/0x310
[   30.382425]  ? __pfx_kasan_atomics+0x10/0x10
[   30.383031]  ? __pfx_read_tsc+0x10/0x10
[   30.383599]  ? ktime_get_ts64+0x86/0x230
[   30.384573]  kunit_try_run_case+0x1b3/0x490
[   30.385182]  ? __pfx_kunit_try_run_case+0x10/0x10
[   30.385703]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   30.386572]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   30.387342]  ? __kthread_parkme+0x82/0x160
[   30.388026]  ? preempt_count_sub+0x50/0x80
[   30.388488]  ? __pfx_kunit_try_run_case+0x10/0x10
[   30.389565]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   30.390323]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   30.391110]  kthread+0x257/0x310
[   30.391771]  ? __pfx_kthread+0x10/0x10
[   30.392444]  ret_from_fork+0x41/0x80
[   30.393159]  ? __pfx_kthread+0x10/0x10
[   30.393756]  ret_from_fork_asm+0x1a/0x30
[   30.394540]  </TASK>
[   30.395226] 
[   30.395448] Allocated by task 272:
[   30.395693]  kasan_save_stack+0x3d/0x60
[   30.396629]  kasan_save_track+0x18/0x40
[   30.397426]  kasan_save_alloc_info+0x3b/0x50
[   30.398295]  __kasan_kmalloc+0xb7/0xc0
[   30.399048]  __kmalloc_cache_noprof+0x184/0x410
[   30.399605]  kasan_atomics+0x96/0x310
[   30.400119]  kunit_try_run_case+0x1b3/0x490
[   30.400554]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   30.401438]  kthread+0x257/0x310
[   30.401688]  ret_from_fork+0x41/0x80
[   30.401964]  ret_from_fork_asm+0x1a/0x30
[   30.402240] 
[   30.402446] The buggy address belongs to the object at ffff888102969600
[   30.402446]  which belongs to the cache kmalloc-64 of size 64
[   30.403063] The buggy address is located 0 bytes to the right of
[   30.403063]  allocated 48-byte region [ffff888102969600, ffff888102969630)
[   30.407362] 
[   30.407628] The buggy address belongs to the physical page:
[   30.408566] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102969
[   30.409539] flags: 0x200000000000000(node=0|zone=2)
[   30.410604] page_type: f5(slab)
[   30.410940] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   30.411588] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   30.412714] page dumped because: kasan: bad access detected
[   30.413704] 
[   30.413935] Memory state around the buggy address:
[   30.414869]  ffff888102969500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   30.415617]  ffff888102969580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   30.416478] >ffff888102969600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   30.416860]                                      ^
[   30.417318]  ffff888102969680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.418598]  ffff888102969700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.419548] ==================================================================
[   30.910111] ==================================================================
[   30.910686] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x19e4/0x5450
[   30.911562] Write of size 8 at addr ffff888102969630 by task kunit_try_catch/272
[   30.912205] 
[   30.912679] CPU: 0 UID: 0 PID: 272 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc2-next-20241209 #1
[   30.913705] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.914176] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   30.915030] Call Trace:
[   30.915279]  <TASK>
[   30.915666]  dump_stack_lvl+0x73/0xb0
[   30.916393]  print_report+0xd1/0x640
[   30.916942]  ? __virt_addr_valid+0x1db/0x2d0
[   30.917395]  ? kasan_complete_mode_report_info+0x2a/0x200
[   30.918072]  kasan_report+0x102/0x140
[   30.918720]  ? kasan_atomics_helper+0x19e4/0x5450
[   30.919079]  ? kasan_atomics_helper+0x19e4/0x5450
[   30.919637]  kasan_check_range+0x10c/0x1c0
[   30.920310]  __kasan_check_write+0x18/0x20
[   30.920922]  kasan_atomics_helper+0x19e4/0x5450
[   30.921429]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   30.921981]  ? __kmalloc_cache_noprof+0x184/0x410
[   30.922705]  ? kasan_atomics+0x153/0x310
[   30.923224]  kasan_atomics+0x1dd/0x310
[   30.923696]  ? __pfx_kasan_atomics+0x10/0x10
[   30.924315]  ? __pfx_read_tsc+0x10/0x10
[   30.924723]  ? ktime_get_ts64+0x86/0x230
[   30.925222]  kunit_try_run_case+0x1b3/0x490
[   30.925733]  ? __pfx_kunit_try_run_case+0x10/0x10
[   30.926378]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   30.926894]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   30.927307]  ? __kthread_parkme+0x82/0x160
[   30.927856]  ? preempt_count_sub+0x50/0x80
[   30.928167]  ? __pfx_kunit_try_run_case+0x10/0x10
[   30.928510]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   30.929003]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   30.929746]  kthread+0x257/0x310
[   30.930491]  ? __pfx_kthread+0x10/0x10
[   30.930837]  ret_from_fork+0x41/0x80
[   30.931278]  ? __pfx_kthread+0x10/0x10
[   30.931743]  ret_from_fork_asm+0x1a/0x30
[   30.932277]  </TASK>
[   30.932615] 
[   30.932832] Allocated by task 272:
[   30.933172]  kasan_save_stack+0x3d/0x60
[   30.933546]  kasan_save_track+0x18/0x40
[   30.934428]  kasan_save_alloc_info+0x3b/0x50
[   30.934966]  __kasan_kmalloc+0xb7/0xc0
[   30.935459]  __kmalloc_cache_noprof+0x184/0x410
[   30.936184]  kasan_atomics+0x96/0x310
[   30.936588]  kunit_try_run_case+0x1b3/0x490
[   30.937192]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   30.937798]  kthread+0x257/0x310
[   30.938213]  ret_from_fork+0x41/0x80
[   30.938530]  ret_from_fork_asm+0x1a/0x30
[   30.938885] 
[   30.939184] The buggy address belongs to the object at ffff888102969600
[   30.939184]  which belongs to the cache kmalloc-64 of size 64
[   30.941937] The buggy address is located 0 bytes to the right of
[   30.941937]  allocated 48-byte region [ffff888102969600, ffff888102969630)
[   30.943431] 
[   30.943773] The buggy address belongs to the physical page:
[   30.944938] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102969
[   30.945614] flags: 0x200000000000000(node=0|zone=2)
[   30.946438] page_type: f5(slab)
[   30.946851] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   30.947927] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   30.948907] page dumped because: kasan: bad access detected
[   30.949645] 
[   30.950176] Memory state around the buggy address:
[   30.950543]  ffff888102969500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   30.951457]  ffff888102969580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   30.952284] >ffff888102969600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   30.953189]                                      ^
[   30.953819]  ffff888102969680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.954520]  ffff888102969700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.955156] ==================================================================
[   31.540728] ==================================================================
[   31.541665] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x20c9/0x5450
[   31.542456] Write of size 8 at addr ffff888102969630 by task kunit_try_catch/272
[   31.543290] 
[   31.543545] CPU: 0 UID: 0 PID: 272 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc2-next-20241209 #1
[   31.544619] Tainted: [B]=BAD_PAGE, [N]=TEST
[   31.545080] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   31.545871] Call Trace:
[   31.546237]  <TASK>
[   31.546530]  dump_stack_lvl+0x73/0xb0
[   31.546972]  print_report+0xd1/0x640
[   31.547482]  ? __virt_addr_valid+0x1db/0x2d0
[   31.547926]  ? kasan_complete_mode_report_info+0x2a/0x200
[   31.548513]  kasan_report+0x102/0x140
[   31.548863]  ? kasan_atomics_helper+0x20c9/0x5450
[   31.549396]  ? kasan_atomics_helper+0x20c9/0x5450
[   31.550171]  kasan_check_range+0x10c/0x1c0
[   31.550783]  __kasan_check_write+0x18/0x20
[   31.551222]  kasan_atomics_helper+0x20c9/0x5450
[   31.551846]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   31.552499]  ? __kmalloc_cache_noprof+0x184/0x410
[   31.553022]  ? kasan_atomics+0x153/0x310
[   31.553570]  kasan_atomics+0x1dd/0x310
[   31.554058]  ? __pfx_kasan_atomics+0x10/0x10
[   31.554569]  ? __pfx_read_tsc+0x10/0x10
[   31.555089]  ? ktime_get_ts64+0x86/0x230
[   31.555491]  kunit_try_run_case+0x1b3/0x490
[   31.556092]  ? __pfx_kunit_try_run_case+0x10/0x10
[   31.556703]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   31.557820]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   31.558302]  ? __kthread_parkme+0x82/0x160
[   31.559123]  ? preempt_count_sub+0x50/0x80
[   31.559751]  ? __pfx_kunit_try_run_case+0x10/0x10
[   31.560238]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   31.560953]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   31.561595]  kthread+0x257/0x310
[   31.562223]  ? __pfx_kthread+0x10/0x10
[   31.562652]  ret_from_fork+0x41/0x80
[   31.563037]  ? __pfx_kthread+0x10/0x10
[   31.563449]  ret_from_fork_asm+0x1a/0x30
[   31.563873]  </TASK>
[   31.564152] 
[   31.564413] Allocated by task 272:
[   31.564768]  kasan_save_stack+0x3d/0x60
[   31.565160]  kasan_save_track+0x18/0x40
[   31.566451]  kasan_save_alloc_info+0x3b/0x50
[   31.566833]  __kasan_kmalloc+0xb7/0xc0
[   31.567513]  __kmalloc_cache_noprof+0x184/0x410
[   31.568242]  kasan_atomics+0x96/0x310
[   31.569003]  kunit_try_run_case+0x1b3/0x490
[   31.569585]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   31.570657]  kthread+0x257/0x310
[   31.571221]  ret_from_fork+0x41/0x80
[   31.571489]  ret_from_fork_asm+0x1a/0x30
[   31.572019] 
[   31.572236] The buggy address belongs to the object at ffff888102969600
[   31.572236]  which belongs to the cache kmalloc-64 of size 64
[   31.573694] The buggy address is located 0 bytes to the right of
[   31.573694]  allocated 48-byte region [ffff888102969600, ffff888102969630)
[   31.575550] 
[   31.576097] The buggy address belongs to the physical page:
[   31.576594] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102969
[   31.577642] flags: 0x200000000000000(node=0|zone=2)
[   31.578536] page_type: f5(slab)
[   31.579028] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   31.579873] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   31.580943] page dumped because: kasan: bad access detected
[   31.581513] 
[   31.581713] Memory state around the buggy address:
[   31.582708]  ffff888102969500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   31.583316]  ffff888102969580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   31.583800] >ffff888102969600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   31.584596]                                      ^
[   31.585157]  ffff888102969680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.585655]  ffff888102969700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.586691] ==================================================================
[   29.930828] ==================================================================
[   29.932272] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x107a/0x5450
[   29.933549] Write of size 4 at addr ffff888102969630 by task kunit_try_catch/272
[   29.934690] 
[   29.935518] CPU: 0 UID: 0 PID: 272 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc2-next-20241209 #1
[   29.936731] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.937468] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   29.938528] Call Trace:
[   29.939006]  <TASK>
[   29.939319]  dump_stack_lvl+0x73/0xb0
[   29.939761]  print_report+0xd1/0x640
[   29.940875]  ? __virt_addr_valid+0x1db/0x2d0
[   29.941396]  ? kasan_complete_mode_report_info+0x2a/0x200
[   29.942354]  kasan_report+0x102/0x140
[   29.942943]  ? kasan_atomics_helper+0x107a/0x5450
[   29.943433]  ? kasan_atomics_helper+0x107a/0x5450
[   29.944049]  kasan_check_range+0x10c/0x1c0
[   29.944589]  __kasan_check_write+0x18/0x20
[   29.945358]  kasan_atomics_helper+0x107a/0x5450
[   29.946110]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   29.946484]  ? __kmalloc_cache_noprof+0x184/0x410
[   29.946993]  ? kasan_atomics+0x153/0x310
[   29.947566]  kasan_atomics+0x1dd/0x310
[   29.948315]  ? __pfx_kasan_atomics+0x10/0x10
[   29.949051]  ? __pfx_read_tsc+0x10/0x10
[   29.949617]  ? ktime_get_ts64+0x86/0x230
[   29.950099]  kunit_try_run_case+0x1b3/0x490
[   29.950556]  ? __pfx_kunit_try_run_case+0x10/0x10
[   29.951474]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   29.952236]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   29.952741]  ? __kthread_parkme+0x82/0x160
[   29.953200]  ? preempt_count_sub+0x50/0x80
[   29.953683]  ? __pfx_kunit_try_run_case+0x10/0x10
[   29.954639]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   29.955211]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   29.955651]  kthread+0x257/0x310
[   29.956372]  ? __pfx_kthread+0x10/0x10
[   29.956786]  ret_from_fork+0x41/0x80
[   29.957526]  ? __pfx_kthread+0x10/0x10
[   29.958138]  ret_from_fork_asm+0x1a/0x30
[   29.959422]  </TASK>
[   29.960053] 
[   29.960234] Allocated by task 272:
[   29.960673]  kasan_save_stack+0x3d/0x60
[   29.961041]  kasan_save_track+0x18/0x40
[   29.961677]  kasan_save_alloc_info+0x3b/0x50
[   29.962173]  __kasan_kmalloc+0xb7/0xc0
[   29.962737]  __kmalloc_cache_noprof+0x184/0x410
[   29.963107]  kasan_atomics+0x96/0x310
[   29.963515]  kunit_try_run_case+0x1b3/0x490
[   29.963964]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   29.964630]  kthread+0x257/0x310
[   29.964980]  ret_from_fork+0x41/0x80
[   29.965438]  ret_from_fork_asm+0x1a/0x30
[   29.965739] 
[   29.965922] The buggy address belongs to the object at ffff888102969600
[   29.965922]  which belongs to the cache kmalloc-64 of size 64
[   29.967187] The buggy address is located 0 bytes to the right of
[   29.967187]  allocated 48-byte region [ffff888102969600, ffff888102969630)
[   29.969215] 
[   29.969530] The buggy address belongs to the physical page:
[   29.970166] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102969
[   29.971338] flags: 0x200000000000000(node=0|zone=2)
[   29.971790] page_type: f5(slab)
[   29.972796] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   29.973291] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   29.974463] page dumped because: kasan: bad access detected
[   29.975159] 
[   29.975515] Memory state around the buggy address:
[   29.976339]  ffff888102969500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.976985]  ffff888102969580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.977829] >ffff888102969600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   29.978674]                                      ^
[   29.979334]  ffff888102969680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.980189]  ffff888102969700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.981064] ==================================================================
[   30.035198] ==================================================================
[   30.036559] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1149/0x5450
[   30.037438] Write of size 4 at addr ffff888102969630 by task kunit_try_catch/272
[   30.038698] 
[   30.039119] CPU: 0 UID: 0 PID: 272 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc2-next-20241209 #1
[   30.040222] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.041087] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   30.042342] Call Trace:
[   30.042581]  <TASK>
[   30.042734]  dump_stack_lvl+0x73/0xb0
[   30.043071]  print_report+0xd1/0x640
[   30.043430]  ? __virt_addr_valid+0x1db/0x2d0
[   30.043740]  ? kasan_complete_mode_report_info+0x2a/0x200
[   30.044491]  kasan_report+0x102/0x140
[   30.045148]  ? kasan_atomics_helper+0x1149/0x5450
[   30.045664]  ? kasan_atomics_helper+0x1149/0x5450
[   30.046037]  kasan_check_range+0x10c/0x1c0
[   30.046381]  __kasan_check_write+0x18/0x20
[   30.046868]  kasan_atomics_helper+0x1149/0x5450
[   30.047290]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   30.047735]  ? __kmalloc_cache_noprof+0x184/0x410
[   30.048320]  ? kasan_atomics+0x153/0x310
[   30.048627]  kasan_atomics+0x1dd/0x310
[   30.049100]  ? __pfx_kasan_atomics+0x10/0x10
[   30.049497]  ? __pfx_read_tsc+0x10/0x10
[   30.049969]  ? ktime_get_ts64+0x86/0x230
[   30.050566]  kunit_try_run_case+0x1b3/0x490
[   30.051011]  ? __pfx_kunit_try_run_case+0x10/0x10
[   30.051640]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   30.052103]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   30.052568]  ? __kthread_parkme+0x82/0x160
[   30.053076]  ? preempt_count_sub+0x50/0x80
[   30.053542]  ? __pfx_kunit_try_run_case+0x10/0x10
[   30.053930]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   30.054576]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   30.055123]  kthread+0x257/0x310
[   30.055427]  ? __pfx_kthread+0x10/0x10
[   30.055976]  ret_from_fork+0x41/0x80
[   30.056313]  ? __pfx_kthread+0x10/0x10
[   30.056637]  ret_from_fork_asm+0x1a/0x30
[   30.057325]  </TASK>
[   30.057718] 
[   30.057946] Allocated by task 272:
[   30.058197]  kasan_save_stack+0x3d/0x60
[   30.058737]  kasan_save_track+0x18/0x40
[   30.059307]  kasan_save_alloc_info+0x3b/0x50
[   30.059732]  __kasan_kmalloc+0xb7/0xc0
[   30.060066]  __kmalloc_cache_noprof+0x184/0x410
[   30.060476]  kasan_atomics+0x96/0x310
[   30.060753]  kunit_try_run_case+0x1b3/0x490
[   30.061309]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   30.062166]  kthread+0x257/0x310
[   30.062494]  ret_from_fork+0x41/0x80
[   30.062982]  ret_from_fork_asm+0x1a/0x30
[   30.063371] 
[   30.063539] The buggy address belongs to the object at ffff888102969600
[   30.063539]  which belongs to the cache kmalloc-64 of size 64
[   30.064659] The buggy address is located 0 bytes to the right of
[   30.064659]  allocated 48-byte region [ffff888102969600, ffff888102969630)
[   30.065953] 
[   30.066157] The buggy address belongs to the physical page:
[   30.066531] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102969
[   30.067431] flags: 0x200000000000000(node=0|zone=2)
[   30.068036] page_type: f5(slab)
[   30.068471] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   30.069156] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   30.069609] page dumped because: kasan: bad access detected
[   30.070149] 
[   30.070548] Memory state around the buggy address:
[   30.071083]  ffff888102969500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   30.071525]  ffff888102969580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   30.072408] >ffff888102969600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   30.073089]                                      ^
[   30.073543]  ffff888102969680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.074165]  ffff888102969700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.074609] ==================================================================
[   29.726840] ==================================================================
[   29.727477] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xe79/0x5450
[   29.728179] Write of size 4 at addr ffff888102969630 by task kunit_try_catch/272
[   29.728765] 
[   29.729047] CPU: 0 UID: 0 PID: 272 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc2-next-20241209 #1
[   29.729870] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.730597] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   29.732459] Call Trace:
[   29.732878]  <TASK>
[   29.733220]  dump_stack_lvl+0x73/0xb0
[   29.733765]  print_report+0xd1/0x640
[   29.734144]  ? __virt_addr_valid+0x1db/0x2d0
[   29.734648]  ? kasan_complete_mode_report_info+0x2a/0x200
[   29.735399]  kasan_report+0x102/0x140
[   29.735789]  ? kasan_atomics_helper+0xe79/0x5450
[   29.736300]  ? kasan_atomics_helper+0xe79/0x5450
[   29.737033]  kasan_check_range+0x10c/0x1c0
[   29.737511]  __kasan_check_write+0x18/0x20
[   29.737994]  kasan_atomics_helper+0xe79/0x5450
[   29.738729]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   29.739167]  ? __kmalloc_cache_noprof+0x184/0x410
[   29.739741]  ? kasan_atomics+0x153/0x310
[   29.740450]  kasan_atomics+0x1dd/0x310
[   29.740828]  ? __pfx_kasan_atomics+0x10/0x10
[   29.741620]  ? __pfx_read_tsc+0x10/0x10
[   29.741963]  ? ktime_get_ts64+0x86/0x230
[   29.742551]  kunit_try_run_case+0x1b3/0x490
[   29.742923]  ? __pfx_kunit_try_run_case+0x10/0x10
[   29.743601]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   29.744297]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   29.744841]  ? __kthread_parkme+0x82/0x160
[   29.745409]  ? preempt_count_sub+0x50/0x80
[   29.745951]  ? __pfx_kunit_try_run_case+0x10/0x10
[   29.746438]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   29.747041]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   29.747587]  kthread+0x257/0x310
[   29.748099]  ? __pfx_kthread+0x10/0x10
[   29.748476]  ret_from_fork+0x41/0x80
[   29.749160]  ? __pfx_kthread+0x10/0x10
[   29.749566]  ret_from_fork_asm+0x1a/0x30
[   29.750235]  </TASK>
[   29.750483] 
[   29.750833] Allocated by task 272:
[   29.751308]  kasan_save_stack+0x3d/0x60
[   29.751820]  kasan_save_track+0x18/0x40
[   29.752283]  kasan_save_alloc_info+0x3b/0x50
[   29.752801]  __kasan_kmalloc+0xb7/0xc0
[   29.753401]  __kmalloc_cache_noprof+0x184/0x410
[   29.753792]  kasan_atomics+0x96/0x310
[   29.754558]  kunit_try_run_case+0x1b3/0x490
[   29.755044]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   29.755657]  kthread+0x257/0x310
[   29.756331]  ret_from_fork+0x41/0x80
[   29.756789]  ret_from_fork_asm+0x1a/0x30
[   29.757447] 
[   29.757798] The buggy address belongs to the object at ffff888102969600
[   29.757798]  which belongs to the cache kmalloc-64 of size 64
[   29.758516] The buggy address is located 0 bytes to the right of
[   29.758516]  allocated 48-byte region [ffff888102969600, ffff888102969630)
[   29.759709] 
[   29.759934] The buggy address belongs to the physical page:
[   29.760636] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102969
[   29.761500] flags: 0x200000000000000(node=0|zone=2)
[   29.762209] page_type: f5(slab)
[   29.763324] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   29.764084] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   29.764744] page dumped because: kasan: bad access detected
[   29.766070] 
[   29.766279] Memory state around the buggy address:
[   29.767191]  ffff888102969500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.767791]  ffff888102969580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.768895] >ffff888102969600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   29.769544]                                      ^
[   29.770587]  ffff888102969680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.771476]  ffff888102969700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.772485] ==================================================================
[   28.448006] ==================================================================
[   28.449700] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4bbe/0x5450
[   28.451115] Read of size 4 at addr ffff888102969630 by task kunit_try_catch/272
[   28.451561] 
[   28.452156] CPU: 0 UID: 0 PID: 272 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc2-next-20241209 #1
[   28.453850] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.454157] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   28.455493] Call Trace:
[   28.455688]  <TASK>
[   28.456134]  dump_stack_lvl+0x73/0xb0
[   28.457533]  print_report+0xd1/0x640
[   28.458613]  ? __virt_addr_valid+0x1db/0x2d0
[   28.459109]  ? kasan_complete_mode_report_info+0x2a/0x200
[   28.459832]  kasan_report+0x102/0x140
[   28.460684]  ? kasan_atomics_helper+0x4bbe/0x5450
[   28.461706]  ? kasan_atomics_helper+0x4bbe/0x5450
[   28.462202]  __asan_report_load4_noabort+0x18/0x20
[   28.463226]  kasan_atomics_helper+0x4bbe/0x5450
[   28.463669]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   28.465454]  ? __kmalloc_cache_noprof+0x184/0x410
[   28.465960]  ? kasan_atomics+0x153/0x310
[   28.466892]  kasan_atomics+0x1dd/0x310
[   28.467556]  ? __pfx_kasan_atomics+0x10/0x10
[   28.468531]  ? __pfx_read_tsc+0x10/0x10
[   28.469340]  ? ktime_get_ts64+0x86/0x230
[   28.469643]  kunit_try_run_case+0x1b3/0x490
[   28.470141]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.470570]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   28.471007]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   28.472117]  ? __kthread_parkme+0x82/0x160
[   28.473141]  ? preempt_count_sub+0x50/0x80
[   28.473608]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.474360]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   28.475023]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.475907]  kthread+0x257/0x310
[   28.476492]  ? __pfx_kthread+0x10/0x10
[   28.476850]  ret_from_fork+0x41/0x80
[   28.477405]  ? __pfx_kthread+0x10/0x10
[   28.478312]  ret_from_fork_asm+0x1a/0x30
[   28.479108]  </TASK>
[   28.479599] 
[   28.480075] Allocated by task 272:
[   28.480484]  kasan_save_stack+0x3d/0x60
[   28.481499]  kasan_save_track+0x18/0x40
[   28.482011]  kasan_save_alloc_info+0x3b/0x50
[   28.482555]  __kasan_kmalloc+0xb7/0xc0
[   28.483194]  __kmalloc_cache_noprof+0x184/0x410
[   28.483849]  kasan_atomics+0x96/0x310
[   28.484657]  kunit_try_run_case+0x1b3/0x490
[   28.485021]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.486120]  kthread+0x257/0x310
[   28.486679]  ret_from_fork+0x41/0x80
[   28.487235]  ret_from_fork_asm+0x1a/0x30
[   28.487902] 
[   28.488249] The buggy address belongs to the object at ffff888102969600
[   28.488249]  which belongs to the cache kmalloc-64 of size 64
[   28.489584] The buggy address is located 0 bytes to the right of
[   28.489584]  allocated 48-byte region [ffff888102969600, ffff888102969630)
[   28.491715] 
[   28.491910] The buggy address belongs to the physical page:
[   28.492651] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102969
[   28.493311] flags: 0x200000000000000(node=0|zone=2)
[   28.493878] page_type: f5(slab)
[   28.494232] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   28.495050] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   28.495690] page dumped because: kasan: bad access detected
[   28.496696] 
[   28.497036] Memory state around the buggy address:
[   28.497393]  ffff888102969500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.498492]  ffff888102969580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.499127] >ffff888102969600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   28.499830]                                      ^
[   28.500239]  ffff888102969680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.500833]  ffff888102969700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.501435] ==================================================================
[   29.429874] ==================================================================
[   29.430868] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xac8/0x5450
[   29.432046] Write of size 4 at addr ffff888102969630 by task kunit_try_catch/272
[   29.432779] 
[   29.432969] CPU: 0 UID: 0 PID: 272 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc2-next-20241209 #1
[   29.433946] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.434470] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   29.435350] Call Trace:
[   29.435681]  <TASK>
[   29.435890]  dump_stack_lvl+0x73/0xb0
[   29.436797]  print_report+0xd1/0x640
[   29.437542]  ? __virt_addr_valid+0x1db/0x2d0
[   29.438584]  ? kasan_complete_mode_report_info+0x2a/0x200
[   29.439461]  kasan_report+0x102/0x140
[   29.439655]  ? kasan_atomics_helper+0xac8/0x5450
[   29.439989]  ? kasan_atomics_helper+0xac8/0x5450
[   29.440957]  kasan_check_range+0x10c/0x1c0
[   29.441722]  __kasan_check_write+0x18/0x20
[   29.442231]  kasan_atomics_helper+0xac8/0x5450
[   29.442725]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   29.443170]  ? __kmalloc_cache_noprof+0x184/0x410
[   29.443726]  ? kasan_atomics+0x153/0x310
[   29.444210]  kasan_atomics+0x1dd/0x310
[   29.444525]  ? __pfx_kasan_atomics+0x10/0x10
[   29.445100]  ? __pfx_read_tsc+0x10/0x10
[   29.445798]  ? ktime_get_ts64+0x86/0x230
[   29.446160]  kunit_try_run_case+0x1b3/0x490
[   29.446722]  ? __pfx_kunit_try_run_case+0x10/0x10
[   29.447224]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   29.447604]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   29.448612]  ? __kthread_parkme+0x82/0x160
[   29.448994]  ? preempt_count_sub+0x50/0x80
[   29.449602]  ? __pfx_kunit_try_run_case+0x10/0x10
[   29.450056]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   29.450629]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   29.451182]  kthread+0x257/0x310
[   29.451700]  ? __pfx_kthread+0x10/0x10
[   29.452172]  ret_from_fork+0x41/0x80
[   29.452594]  ? __pfx_kthread+0x10/0x10
[   29.452931]  ret_from_fork_asm+0x1a/0x30
[   29.453620]  </TASK>
[   29.454033] 
[   29.454219] Allocated by task 272:
[   29.454610]  kasan_save_stack+0x3d/0x60
[   29.455505]  kasan_save_track+0x18/0x40
[   29.455903]  kasan_save_alloc_info+0x3b/0x50
[   29.456279]  __kasan_kmalloc+0xb7/0xc0
[   29.456735]  __kmalloc_cache_noprof+0x184/0x410
[   29.457186]  kasan_atomics+0x96/0x310
[   29.457681]  kunit_try_run_case+0x1b3/0x490
[   29.458037]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   29.458432]  kthread+0x257/0x310
[   29.458853]  ret_from_fork+0x41/0x80
[   29.459455]  ret_from_fork_asm+0x1a/0x30
[   29.460153] 
[   29.460462] The buggy address belongs to the object at ffff888102969600
[   29.460462]  which belongs to the cache kmalloc-64 of size 64
[   29.461595] The buggy address is located 0 bytes to the right of
[   29.461595]  allocated 48-byte region [ffff888102969600, ffff888102969630)
[   29.462662] 
[   29.462837] The buggy address belongs to the physical page:
[   29.463454] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102969
[   29.464189] flags: 0x200000000000000(node=0|zone=2)
[   29.464834] page_type: f5(slab)
[   29.465216] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   29.466002] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   29.466911] page dumped because: kasan: bad access detected
[   29.467418] 
[   29.467525] Memory state around the buggy address:
[   29.467727]  ffff888102969500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.468991]  ffff888102969580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.470189] >ffff888102969600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   29.470797]                                      ^
[   29.471237]  ffff888102969680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.472033]  ffff888102969700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.472891] ==================================================================
[   30.578066] ==================================================================
[   30.578854] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x15b7/0x5450
[   30.580432] Write of size 8 at addr ffff888102969630 by task kunit_try_catch/272
[   30.582150] 
[   30.583215] CPU: 0 UID: 0 PID: 272 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc2-next-20241209 #1
[   30.583952] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.584494] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   30.585505] Call Trace:
[   30.585859]  <TASK>
[   30.586231]  dump_stack_lvl+0x73/0xb0
[   30.586809]  print_report+0xd1/0x640
[   30.587309]  ? __virt_addr_valid+0x1db/0x2d0
[   30.587928]  ? kasan_complete_mode_report_info+0x2a/0x200
[   30.588588]  kasan_report+0x102/0x140
[   30.589139]  ? kasan_atomics_helper+0x15b7/0x5450
[   30.589914]  ? kasan_atomics_helper+0x15b7/0x5450
[   30.590640]  kasan_check_range+0x10c/0x1c0
[   30.591327]  __kasan_check_write+0x18/0x20
[   30.591765]  kasan_atomics_helper+0x15b7/0x5450
[   30.592230]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   30.593199]  ? __kmalloc_cache_noprof+0x184/0x410
[   30.593980]  ? kasan_atomics+0x153/0x310
[   30.594599]  kasan_atomics+0x1dd/0x310
[   30.595323]  ? __pfx_kasan_atomics+0x10/0x10
[   30.596307]  ? __pfx_read_tsc+0x10/0x10
[   30.596708]  ? ktime_get_ts64+0x86/0x230
[   30.597166]  kunit_try_run_case+0x1b3/0x490
[   30.597664]  ? __pfx_kunit_try_run_case+0x10/0x10
[   30.598905]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   30.599892]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   30.600314]  ? __kthread_parkme+0x82/0x160
[   30.600779]  ? preempt_count_sub+0x50/0x80
[   30.601340]  ? __pfx_kunit_try_run_case+0x10/0x10
[   30.601839]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   30.602729]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   30.603336]  kthread+0x257/0x310
[   30.603701]  ? __pfx_kthread+0x10/0x10
[   30.604726]  ret_from_fork+0x41/0x80
[   30.605028]  ? __pfx_kthread+0x10/0x10
[   30.605530]  ret_from_fork_asm+0x1a/0x30
[   30.606036]  </TASK>
[   30.606359] 
[   30.606571] Allocated by task 272:
[   30.606887]  kasan_save_stack+0x3d/0x60
[   30.607455]  kasan_save_track+0x18/0x40
[   30.607761]  kasan_save_alloc_info+0x3b/0x50
[   30.608222]  __kasan_kmalloc+0xb7/0xc0
[   30.608707]  __kmalloc_cache_noprof+0x184/0x410
[   30.609120]  kasan_atomics+0x96/0x310
[   30.609544]  kunit_try_run_case+0x1b3/0x490
[   30.610066]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   30.610474]  kthread+0x257/0x310
[   30.610789]  ret_from_fork+0x41/0x80
[   30.611273]  ret_from_fork_asm+0x1a/0x30
[   30.611711] 
[   30.612003] The buggy address belongs to the object at ffff888102969600
[   30.612003]  which belongs to the cache kmalloc-64 of size 64
[   30.613046] The buggy address is located 0 bytes to the right of
[   30.613046]  allocated 48-byte region [ffff888102969600, ffff888102969630)
[   30.613888] 
[   30.614057] The buggy address belongs to the physical page:
[   30.614683] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102969
[   30.615592] flags: 0x200000000000000(node=0|zone=2)
[   30.616184] page_type: f5(slab)
[   30.616472] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   30.617099] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   30.618299] page dumped because: kasan: bad access detected
[   30.618755] 
[   30.618939] Memory state around the buggy address:
[   30.619273]  ffff888102969500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   30.620019]  ffff888102969580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   30.620576] >ffff888102969600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   30.621676]                                      ^
[   30.622194]  ffff888102969680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.622707]  ffff888102969700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.623298] ==================================================================
[   28.608077] ==================================================================
[   28.608758] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b70/0x5450
[   28.610620] Write of size 4 at addr ffff888102969630 by task kunit_try_catch/272
[   28.611153] 
[   28.611361] CPU: 0 UID: 0 PID: 272 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc2-next-20241209 #1
[   28.613200] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.613517] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   28.614372] Call Trace:
[   28.614661]  <TASK>
[   28.614918]  dump_stack_lvl+0x73/0xb0
[   28.615890]  print_report+0xd1/0x640
[   28.616503]  ? __virt_addr_valid+0x1db/0x2d0
[   28.617009]  ? kasan_complete_mode_report_info+0x2a/0x200
[   28.618164]  kasan_report+0x102/0x140
[   28.618764]  ? kasan_atomics_helper+0x4b70/0x5450
[   28.619569]  ? kasan_atomics_helper+0x4b70/0x5450
[   28.619923]  __asan_report_store4_noabort+0x1b/0x30
[   28.621285]  kasan_atomics_helper+0x4b70/0x5450
[   28.622363]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   28.623198]  ? __kmalloc_cache_noprof+0x184/0x410
[   28.624188]  ? kasan_atomics+0x153/0x310
[   28.624801]  kasan_atomics+0x1dd/0x310
[   28.626014]  ? __pfx_kasan_atomics+0x10/0x10
[   28.626630]  ? __pfx_read_tsc+0x10/0x10
[   28.627543]  ? ktime_get_ts64+0x86/0x230
[   28.627958]  kunit_try_run_case+0x1b3/0x490
[   28.628619]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.629475]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   28.630879]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   28.631432]  ? __kthread_parkme+0x82/0x160
[   28.632370]  ? preempt_count_sub+0x50/0x80
[   28.633253]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.633715]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   28.634333]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.634879]  kthread+0x257/0x310
[   28.635725]  ? __pfx_kthread+0x10/0x10
[   28.635992]  ret_from_fork+0x41/0x80
[   28.636225]  ? __pfx_kthread+0x10/0x10
[   28.636871]  ret_from_fork_asm+0x1a/0x30
[   28.637709]  </TASK>
[   28.638181] 
[   28.638956] Allocated by task 272:
[   28.639714]  kasan_save_stack+0x3d/0x60
[   28.640789]  kasan_save_track+0x18/0x40
[   28.641418]  kasan_save_alloc_info+0x3b/0x50
[   28.642245]  __kasan_kmalloc+0xb7/0xc0
[   28.642719]  __kmalloc_cache_noprof+0x184/0x410
[   28.643678]  kasan_atomics+0x96/0x310
[   28.643944]  kunit_try_run_case+0x1b3/0x490
[   28.644952]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.645503]  kthread+0x257/0x310
[   28.645989]  ret_from_fork+0x41/0x80
[   28.646483]  ret_from_fork_asm+0x1a/0x30
[   28.647438] 
[   28.647635] The buggy address belongs to the object at ffff888102969600
[   28.647635]  which belongs to the cache kmalloc-64 of size 64
[   28.649455] The buggy address is located 0 bytes to the right of
[   28.649455]  allocated 48-byte region [ffff888102969600, ffff888102969630)
[   28.651477] 
[   28.651669] The buggy address belongs to the physical page:
[   28.653056] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102969
[   28.653772] flags: 0x200000000000000(node=0|zone=2)
[   28.654524] page_type: f5(slab)
[   28.655476] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   28.656959] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   28.657951] page dumped because: kasan: bad access detected
[   28.658919] 
[   28.659423] Memory state around the buggy address:
[   28.660143]  ffff888102969500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.661424]  ffff888102969580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.662878] >ffff888102969600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   28.663447]                                      ^
[   28.664397]  ffff888102969680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.665669]  ffff888102969700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.666221] ==================================================================
[   30.624625] ==================================================================
[   30.625840] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1650/0x5450
[   30.626993] Write of size 8 at addr ffff888102969630 by task kunit_try_catch/272
[   30.627700] 
[   30.627887] CPU: 0 UID: 0 PID: 272 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc2-next-20241209 #1
[   30.628924] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.629246] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   30.630095] Call Trace:
[   30.630446]  <TASK>
[   30.630673]  dump_stack_lvl+0x73/0xb0
[   30.631025]  print_report+0xd1/0x640
[   30.631569]  ? __virt_addr_valid+0x1db/0x2d0
[   30.632323]  ? kasan_complete_mode_report_info+0x2a/0x200
[   30.632761]  kasan_report+0x102/0x140
[   30.633051]  ? kasan_atomics_helper+0x1650/0x5450
[   30.633713]  ? kasan_atomics_helper+0x1650/0x5450
[   30.634221]  kasan_check_range+0x10c/0x1c0
[   30.634709]  __kasan_check_write+0x18/0x20
[   30.635084]  kasan_atomics_helper+0x1650/0x5450
[   30.635601]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   30.636130]  ? __kmalloc_cache_noprof+0x184/0x410
[   30.636489]  ? kasan_atomics+0x153/0x310
[   30.636954]  kasan_atomics+0x1dd/0x310
[   30.637479]  ? __pfx_kasan_atomics+0x10/0x10
[   30.638068]  ? __pfx_read_tsc+0x10/0x10
[   30.638480]  ? ktime_get_ts64+0x86/0x230
[   30.638891]  kunit_try_run_case+0x1b3/0x490
[   30.639427]  ? __pfx_kunit_try_run_case+0x10/0x10
[   30.640050]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   30.640511]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   30.641147]  ? __kthread_parkme+0x82/0x160
[   30.641575]  ? preempt_count_sub+0x50/0x80
[   30.642066]  ? __pfx_kunit_try_run_case+0x10/0x10
[   30.642658]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   30.643159]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   30.643850]  kthread+0x257/0x310
[   30.644147]  ? __pfx_kthread+0x10/0x10
[   30.644460]  ret_from_fork+0x41/0x80
[   30.644808]  ? __pfx_kthread+0x10/0x10
[   30.645112]  ret_from_fork_asm+0x1a/0x30
[   30.645612]  </TASK>
[   30.645992] 
[   30.646276] Allocated by task 272:
[   30.646791]  kasan_save_stack+0x3d/0x60
[   30.647290]  kasan_save_track+0x18/0x40
[   30.647850]  kasan_save_alloc_info+0x3b/0x50
[   30.648310]  __kasan_kmalloc+0xb7/0xc0
[   30.648798]  __kmalloc_cache_noprof+0x184/0x410
[   30.649282]  kasan_atomics+0x96/0x310
[   30.649794]  kunit_try_run_case+0x1b3/0x490
[   30.650131]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   30.650705]  kthread+0x257/0x310
[   30.651164]  ret_from_fork+0x41/0x80
[   30.651537]  ret_from_fork_asm+0x1a/0x30
[   30.652014] 
[   30.652291] The buggy address belongs to the object at ffff888102969600
[   30.652291]  which belongs to the cache kmalloc-64 of size 64
[   30.653003] The buggy address is located 0 bytes to the right of
[   30.653003]  allocated 48-byte region [ffff888102969600, ffff888102969630)
[   30.654147] 
[   30.654725] The buggy address belongs to the physical page:
[   30.655377] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102969
[   30.656111] flags: 0x200000000000000(node=0|zone=2)
[   30.656590] page_type: f5(slab)
[   30.656975] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   30.657640] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   30.658362] page dumped because: kasan: bad access detected
[   30.658863] 
[   30.659094] Memory state around the buggy address:
[   30.659599]  ffff888102969500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   30.660250]  ffff888102969580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   30.660890] >ffff888102969600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   30.661510]                                      ^
[   30.661990]  ffff888102969680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.662559]  ffff888102969700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.663311] ==================================================================
[   29.569395] ==================================================================
[   29.570000] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a86/0x5450
[   29.570870] Read of size 4 at addr ffff888102969630 by task kunit_try_catch/272
[   29.571656] 
[   29.571980] CPU: 0 UID: 0 PID: 272 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc2-next-20241209 #1
[   29.573221] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.573548] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   29.574684] Call Trace:
[   29.574963]  <TASK>
[   29.575173]  dump_stack_lvl+0x73/0xb0
[   29.575974]  print_report+0xd1/0x640
[   29.576365]  ? __virt_addr_valid+0x1db/0x2d0
[   29.576693]  ? kasan_complete_mode_report_info+0x2a/0x200
[   29.577451]  kasan_report+0x102/0x140
[   29.577751]  ? kasan_atomics_helper+0x4a86/0x5450
[   29.578458]  ? kasan_atomics_helper+0x4a86/0x5450
[   29.579302]  __asan_report_load4_noabort+0x18/0x20
[   29.579719]  kasan_atomics_helper+0x4a86/0x5450
[   29.580251]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   29.581168]  ? __kmalloc_cache_noprof+0x184/0x410
[   29.581610]  ? kasan_atomics+0x153/0x310
[   29.582149]  kasan_atomics+0x1dd/0x310
[   29.582738]  ? __pfx_kasan_atomics+0x10/0x10
[   29.583483]  ? __pfx_read_tsc+0x10/0x10
[   29.584002]  ? ktime_get_ts64+0x86/0x230
[   29.584384]  kunit_try_run_case+0x1b3/0x490
[   29.584951]  ? __pfx_kunit_try_run_case+0x10/0x10
[   29.585486]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   29.587067]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   29.587827]  ? __kthread_parkme+0x82/0x160
[   29.588481]  ? preempt_count_sub+0x50/0x80
[   29.589355]  ? __pfx_kunit_try_run_case+0x10/0x10
[   29.590080]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   29.590844]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   29.591641]  kthread+0x257/0x310
[   29.592290]  ? __pfx_kthread+0x10/0x10
[   29.592638]  ret_from_fork+0x41/0x80
[   29.593304]  ? __pfx_kthread+0x10/0x10
[   29.593705]  ret_from_fork_asm+0x1a/0x30
[   29.594620]  </TASK>
[   29.595206] 
[   29.595670] Allocated by task 272:
[   29.596226]  kasan_save_stack+0x3d/0x60
[   29.597301]  kasan_save_track+0x18/0x40
[   29.597720]  kasan_save_alloc_info+0x3b/0x50
[   29.598285]  __kasan_kmalloc+0xb7/0xc0
[   29.599044]  __kmalloc_cache_noprof+0x184/0x410
[   29.599432]  kasan_atomics+0x96/0x310
[   29.600223]  kunit_try_run_case+0x1b3/0x490
[   29.601310]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   29.602422]  kthread+0x257/0x310
[   29.602766]  ret_from_fork+0x41/0x80
[   29.603464]  ret_from_fork_asm+0x1a/0x30
[   29.604510] 
[   29.604704] The buggy address belongs to the object at ffff888102969600
[   29.604704]  which belongs to the cache kmalloc-64 of size 64
[   29.606386] The buggy address is located 0 bytes to the right of
[   29.606386]  allocated 48-byte region [ffff888102969600, ffff888102969630)
[   29.608101] 
[   29.608326] The buggy address belongs to the physical page:
[   29.608855] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102969
[   29.609721] flags: 0x200000000000000(node=0|zone=2)
[   29.610539] page_type: f5(slab)
[   29.611142] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   29.611778] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   29.612929] page dumped because: kasan: bad access detected
[   29.613504] 
[   29.613704] Memory state around the buggy address:
[   29.615192]  ffff888102969500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.616516]  ffff888102969580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.617182] >ffff888102969600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   29.618105]                                      ^
[   29.618774]  ffff888102969680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.619482]  ffff888102969700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.620555] ==================================================================
[   30.209947] ==================================================================
[   30.211507] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x12e7/0x5450
[   30.212325] Write of size 4 at addr ffff888102969630 by task kunit_try_catch/272
[   30.213026] 
[   30.213423] CPU: 0 UID: 0 PID: 272 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc2-next-20241209 #1
[   30.214565] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.215208] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   30.216170] Call Trace:
[   30.216614]  <TASK>
[   30.216998]  dump_stack_lvl+0x73/0xb0
[   30.217580]  print_report+0xd1/0x640
[   30.218195]  ? __virt_addr_valid+0x1db/0x2d0
[   30.218647]  ? kasan_complete_mode_report_info+0x2a/0x200
[   30.219517]  kasan_report+0x102/0x140
[   30.219867]  ? kasan_atomics_helper+0x12e7/0x5450
[   30.220570]  ? kasan_atomics_helper+0x12e7/0x5450
[   30.221136]  kasan_check_range+0x10c/0x1c0
[   30.221663]  __kasan_check_write+0x18/0x20
[   30.222229]  kasan_atomics_helper+0x12e7/0x5450
[   30.222879]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   30.223502]  ? __kmalloc_cache_noprof+0x184/0x410
[   30.224095]  ? kasan_atomics+0x153/0x310
[   30.224547]  kasan_atomics+0x1dd/0x310
[   30.225043]  ? __pfx_kasan_atomics+0x10/0x10
[   30.225562]  ? __pfx_read_tsc+0x10/0x10
[   30.226145]  ? ktime_get_ts64+0x86/0x230
[   30.226669]  kunit_try_run_case+0x1b3/0x490
[   30.227245]  ? __pfx_kunit_try_run_case+0x10/0x10
[   30.227911]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   30.228375]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   30.229145]  ? __kthread_parkme+0x82/0x160
[   30.229590]  ? preempt_count_sub+0x50/0x80
[   30.230308]  ? __pfx_kunit_try_run_case+0x10/0x10
[   30.231000]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   30.231746]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   30.232495]  kthread+0x257/0x310
[   30.233001]  ? __pfx_kthread+0x10/0x10
[   30.233520]  ret_from_fork+0x41/0x80
[   30.234010]  ? __pfx_kthread+0x10/0x10
[   30.234598]  ret_from_fork_asm+0x1a/0x30
[   30.235154]  </TASK>
[   30.235635] 
[   30.235862] Allocated by task 272:
[   30.236403]  kasan_save_stack+0x3d/0x60
[   30.237087]  kasan_save_track+0x18/0x40
[   30.237633]  kasan_save_alloc_info+0x3b/0x50
[   30.238166]  __kasan_kmalloc+0xb7/0xc0
[   30.238794]  __kmalloc_cache_noprof+0x184/0x410
[   30.239197]  kasan_atomics+0x96/0x310
[   30.239917]  kunit_try_run_case+0x1b3/0x490
[   30.240239]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   30.240930]  kthread+0x257/0x310
[   30.241388]  ret_from_fork+0x41/0x80
[   30.241977]  ret_from_fork_asm+0x1a/0x30
[   30.242683] 
[   30.243089] The buggy address belongs to the object at ffff888102969600
[   30.243089]  which belongs to the cache kmalloc-64 of size 64
[   30.244768] The buggy address is located 0 bytes to the right of
[   30.244768]  allocated 48-byte region [ffff888102969600, ffff888102969630)
[   30.246452] 
[   30.246623] The buggy address belongs to the physical page:
[   30.247948] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102969
[   30.248806] flags: 0x200000000000000(node=0|zone=2)
[   30.249797] page_type: f5(slab)
[   30.250059] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   30.250792] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   30.252302] page dumped because: kasan: bad access detected
[   30.253525] 
[   30.253736] Memory state around the buggy address:
[   30.254646]  ffff888102969500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   30.255624]  ffff888102969580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   30.256966] >ffff888102969600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   30.257247]                                      ^
[   30.258041]  ffff888102969680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.258630]  ffff888102969700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.259650] ==================================================================
[   31.052056] ==================================================================
[   31.052896] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1c19/0x5450
[   31.053653] Write of size 8 at addr ffff888102969630 by task kunit_try_catch/272
[   31.054501] 
[   31.055660] CPU: 0 UID: 0 PID: 272 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc2-next-20241209 #1
[   31.056363] Tainted: [B]=BAD_PAGE, [N]=TEST
[   31.057239] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   31.058486] Call Trace:
[   31.058804]  <TASK>
[   31.059054]  dump_stack_lvl+0x73/0xb0
[   31.059499]  print_report+0xd1/0x640
[   31.059983]  ? __virt_addr_valid+0x1db/0x2d0
[   31.060506]  ? kasan_complete_mode_report_info+0x2a/0x200
[   31.061145]  kasan_report+0x102/0x140
[   31.061567]  ? kasan_atomics_helper+0x1c19/0x5450
[   31.062169]  ? kasan_atomics_helper+0x1c19/0x5450
[   31.062726]  kasan_check_range+0x10c/0x1c0
[   31.063220]  __kasan_check_write+0x18/0x20
[   31.063820]  kasan_atomics_helper+0x1c19/0x5450
[   31.064376]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   31.064960]  ? __kmalloc_cache_noprof+0x184/0x410
[   31.065457]  ? kasan_atomics+0x153/0x310
[   31.066054]  kasan_atomics+0x1dd/0x310
[   31.066575]  ? __pfx_kasan_atomics+0x10/0x10
[   31.067214]  ? __pfx_read_tsc+0x10/0x10
[   31.067595]  ? ktime_get_ts64+0x86/0x230
[   31.068243]  kunit_try_run_case+0x1b3/0x490
[   31.068827]  ? __pfx_kunit_try_run_case+0x10/0x10
[   31.069339]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   31.069822]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   31.070516]  ? __kthread_parkme+0x82/0x160
[   31.071001]  ? preempt_count_sub+0x50/0x80
[   31.071462]  ? __pfx_kunit_try_run_case+0x10/0x10
[   31.072086]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   31.072699]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   31.073340]  kthread+0x257/0x310
[   31.073898]  ? __pfx_kthread+0x10/0x10
[   31.074206]  ret_from_fork+0x41/0x80
[   31.074715]  ? __pfx_kthread+0x10/0x10
[   31.075187]  ret_from_fork_asm+0x1a/0x30
[   31.075869]  </TASK>
[   31.076115] 
[   31.076303] Allocated by task 272:
[   31.076892]  kasan_save_stack+0x3d/0x60
[   31.077436]  kasan_save_track+0x18/0x40
[   31.077988]  kasan_save_alloc_info+0x3b/0x50
[   31.078576]  __kasan_kmalloc+0xb7/0xc0
[   31.079129]  __kmalloc_cache_noprof+0x184/0x410
[   31.079708]  kasan_atomics+0x96/0x310
[   31.080297]  kunit_try_run_case+0x1b3/0x490
[   31.080864]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   31.081466]  kthread+0x257/0x310
[   31.081967]  ret_from_fork+0x41/0x80
[   31.082477]  ret_from_fork_asm+0x1a/0x30
[   31.083072] 
[   31.083362] The buggy address belongs to the object at ffff888102969600
[   31.083362]  which belongs to the cache kmalloc-64 of size 64
[   31.084486] The buggy address is located 0 bytes to the right of
[   31.084486]  allocated 48-byte region [ffff888102969600, ffff888102969630)
[   31.085544] 
[   31.085751] The buggy address belongs to the physical page:
[   31.086215] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102969
[   31.088585] flags: 0x200000000000000(node=0|zone=2)
[   31.089540] page_type: f5(slab)
[   31.090549] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   31.091537] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   31.092473] page dumped because: kasan: bad access detected
[   31.093120] 
[   31.093346] Memory state around the buggy address:
[   31.094183]  ffff888102969500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   31.095620]  ffff888102969580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   31.096451] >ffff888102969600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   31.097277]                                      ^
[   31.098057]  ffff888102969680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.098961]  ffff888102969700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.099473] ==================================================================
[   31.396476] ==================================================================
[   31.397184] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4f73/0x5450
[   31.397983] Read of size 8 at addr ffff888102969630 by task kunit_try_catch/272
[   31.398818] 
[   31.399109] CPU: 0 UID: 0 PID: 272 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc2-next-20241209 #1
[   31.400394] Tainted: [B]=BAD_PAGE, [N]=TEST
[   31.400806] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   31.401945] Call Trace:
[   31.402182]  <TASK>
[   31.402772]  dump_stack_lvl+0x73/0xb0
[   31.403506]  print_report+0xd1/0x640
[   31.404638]  ? __virt_addr_valid+0x1db/0x2d0
[   31.405547]  ? kasan_complete_mode_report_info+0x2a/0x200
[   31.406427]  kasan_report+0x102/0x140
[   31.406625]  ? kasan_atomics_helper+0x4f73/0x5450
[   31.407121]  ? kasan_atomics_helper+0x4f73/0x5450
[   31.407897]  __asan_report_load8_noabort+0x18/0x20
[   31.408646]  kasan_atomics_helper+0x4f73/0x5450
[   31.408975]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   31.409575]  ? __kmalloc_cache_noprof+0x184/0x410
[   31.410051]  ? kasan_atomics+0x153/0x310
[   31.410583]  kasan_atomics+0x1dd/0x310
[   31.411166]  ? __pfx_kasan_atomics+0x10/0x10
[   31.411603]  ? __pfx_read_tsc+0x10/0x10
[   31.412006]  ? ktime_get_ts64+0x86/0x230
[   31.412569]  kunit_try_run_case+0x1b3/0x490
[   31.412936]  ? __pfx_kunit_try_run_case+0x10/0x10
[   31.413526]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   31.414117]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   31.414563]  ? __kthread_parkme+0x82/0x160
[   31.415302]  ? preempt_count_sub+0x50/0x80
[   31.415658]  ? __pfx_kunit_try_run_case+0x10/0x10
[   31.416196]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   31.416665]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   31.417246]  kthread+0x257/0x310
[   31.417719]  ? __pfx_kthread+0x10/0x10
[   31.418087]  ret_from_fork+0x41/0x80
[   31.418471]  ? __pfx_kthread+0x10/0x10
[   31.418761]  ret_from_fork_asm+0x1a/0x30
[   31.419304]  </TASK>
[   31.419630] 
[   31.420015] Allocated by task 272:
[   31.420381]  kasan_save_stack+0x3d/0x60
[   31.420746]  kasan_save_track+0x18/0x40
[   31.421151]  kasan_save_alloc_info+0x3b/0x50
[   31.421481]  __kasan_kmalloc+0xb7/0xc0
[   31.421768]  __kmalloc_cache_noprof+0x184/0x410
[   31.422363]  kasan_atomics+0x96/0x310
[   31.423077]  kunit_try_run_case+0x1b3/0x490
[   31.423428]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   31.423856]  kthread+0x257/0x310
[   31.424569]  ret_from_fork+0x41/0x80
[   31.425155]  ret_from_fork_asm+0x1a/0x30
[   31.425472] 
[   31.425640] The buggy address belongs to the object at ffff888102969600
[   31.425640]  which belongs to the cache kmalloc-64 of size 64
[   31.426916] The buggy address is located 0 bytes to the right of
[   31.426916]  allocated 48-byte region [ffff888102969600, ffff888102969630)
[   31.428223] 
[   31.428447] The buggy address belongs to the physical page:
[   31.430348] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102969
[   31.431076] flags: 0x200000000000000(node=0|zone=2)
[   31.431730] page_type: f5(slab)
[   31.432080] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   31.432826] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   31.433591] page dumped because: kasan: bad access detected
[   31.434180] 
[   31.434473] Memory state around the buggy address:
[   31.435040]  ffff888102969500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   31.435824]  ffff888102969580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   31.436425] >ffff888102969600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   31.437216]                                      ^
[   31.437697]  ffff888102969680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.438366]  ffff888102969700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.439154] ==================================================================
[   30.714426] ==================================================================
[   30.715175] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1780/0x5450
[   30.716295] Write of size 8 at addr ffff888102969630 by task kunit_try_catch/272
[   30.716794] 
[   30.716997] CPU: 0 UID: 0 PID: 272 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc2-next-20241209 #1
[   30.718196] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.718553] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   30.720984] Call Trace:
[   30.721651]  <TASK>
[   30.721859]  dump_stack_lvl+0x73/0xb0
[   30.722216]  print_report+0xd1/0x640
[   30.723040]  ? __virt_addr_valid+0x1db/0x2d0
[   30.723597]  ? kasan_complete_mode_report_info+0x2a/0x200
[   30.724297]  kasan_report+0x102/0x140
[   30.724621]  ? kasan_atomics_helper+0x1780/0x5450
[   30.725002]  ? kasan_atomics_helper+0x1780/0x5450
[   30.726141]  kasan_check_range+0x10c/0x1c0
[   30.727114]  __kasan_check_write+0x18/0x20
[   30.727981]  kasan_atomics_helper+0x1780/0x5450
[   30.729278]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   30.729725]  ? __kmalloc_cache_noprof+0x184/0x410
[   30.730187]  ? kasan_atomics+0x153/0x310
[   30.731010]  kasan_atomics+0x1dd/0x310
[   30.731419]  ? __pfx_kasan_atomics+0x10/0x10
[   30.731709]  ? __pfx_read_tsc+0x10/0x10
[   30.732035]  ? ktime_get_ts64+0x86/0x230
[   30.732427]  kunit_try_run_case+0x1b3/0x490
[   30.733348]  ? __pfx_kunit_try_run_case+0x10/0x10
[   30.733764]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   30.734965]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   30.735486]  ? __kthread_parkme+0x82/0x160
[   30.736490]  ? preempt_count_sub+0x50/0x80
[   30.737282]  ? __pfx_kunit_try_run_case+0x10/0x10
[   30.737988]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   30.738665]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   30.739359]  kthread+0x257/0x310
[   30.740015]  ? __pfx_kthread+0x10/0x10
[   30.740699]  ret_from_fork+0x41/0x80
[   30.741217]  ? __pfx_kthread+0x10/0x10
[   30.741661]  ret_from_fork_asm+0x1a/0x30
[   30.742172]  </TASK>
[   30.742459] 
[   30.742622] Allocated by task 272:
[   30.743272]  kasan_save_stack+0x3d/0x60
[   30.743957]  kasan_save_track+0x18/0x40
[   30.744451]  kasan_save_alloc_info+0x3b/0x50
[   30.745121]  __kasan_kmalloc+0xb7/0xc0
[   30.745937]  __kmalloc_cache_noprof+0x184/0x410
[   30.746309]  kasan_atomics+0x96/0x310
[   30.746738]  kunit_try_run_case+0x1b3/0x490
[   30.747108]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   30.748156]  kthread+0x257/0x310
[   30.748540]  ret_from_fork+0x41/0x80
[   30.749497]  ret_from_fork_asm+0x1a/0x30
[   30.749771] 
[   30.750240] The buggy address belongs to the object at ffff888102969600
[   30.750240]  which belongs to the cache kmalloc-64 of size 64
[   30.751337] The buggy address is located 0 bytes to the right of
[   30.751337]  allocated 48-byte region [ffff888102969600, ffff888102969630)
[   30.753120] 
[   30.753709] The buggy address belongs to the physical page:
[   30.754577] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102969
[   30.755881] flags: 0x200000000000000(node=0|zone=2)
[   30.756290] page_type: f5(slab)
[   30.756712] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   30.757832] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   30.758736] page dumped because: kasan: bad access detected
[   30.759524] 
[   30.759695] Memory state around the buggy address:
[   30.760333]  ffff888102969500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   30.761591]  ffff888102969580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   30.762848] >ffff888102969600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   30.763489]                                      ^
[   30.764278]  ffff888102969680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.765120]  ffff888102969700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.765783] ==================================================================
[   31.248762] ==================================================================
[   31.249953] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1e13/0x5450
[   31.250623] Write of size 8 at addr ffff888102969630 by task kunit_try_catch/272
[   31.251513] 
[   31.251828] CPU: 0 UID: 0 PID: 272 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc2-next-20241209 #1
[   31.253036] Tainted: [B]=BAD_PAGE, [N]=TEST
[   31.253341] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   31.254495] Call Trace:
[   31.254947]  <TASK>
[   31.255289]  dump_stack_lvl+0x73/0xb0
[   31.255695]  print_report+0xd1/0x640
[   31.256336]  ? __virt_addr_valid+0x1db/0x2d0
[   31.257043]  ? kasan_complete_mode_report_info+0x2a/0x200
[   31.257538]  kasan_report+0x102/0x140
[   31.257830]  ? kasan_atomics_helper+0x1e13/0x5450
[   31.258486]  ? kasan_atomics_helper+0x1e13/0x5450
[   31.259182]  kasan_check_range+0x10c/0x1c0
[   31.259683]  __kasan_check_write+0x18/0x20
[   31.260324]  kasan_atomics_helper+0x1e13/0x5450
[   31.260767]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   31.261320]  ? __kmalloc_cache_noprof+0x184/0x410
[   31.262054]  ? kasan_atomics+0x153/0x310
[   31.262714]  kasan_atomics+0x1dd/0x310
[   31.263231]  ? __pfx_kasan_atomics+0x10/0x10
[   31.263574]  ? __pfx_read_tsc+0x10/0x10
[   31.264358]  ? ktime_get_ts64+0x86/0x230
[   31.264976]  kunit_try_run_case+0x1b3/0x490
[   31.265348]  ? __pfx_kunit_try_run_case+0x10/0x10
[   31.266005]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   31.266876]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   31.267372]  ? __kthread_parkme+0x82/0x160
[   31.267811]  ? preempt_count_sub+0x50/0x80
[   31.268465]  ? __pfx_kunit_try_run_case+0x10/0x10
[   31.268902]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   31.269780]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   31.270609]  kthread+0x257/0x310
[   31.271103]  ? __pfx_kthread+0x10/0x10
[   31.271569]  ret_from_fork+0x41/0x80
[   31.271859]  ? __pfx_kthread+0x10/0x10
[   31.272070]  ret_from_fork_asm+0x1a/0x30
[   31.272305]  </TASK>
[   31.272437] 
[   31.272536] Allocated by task 272:
[   31.272694]  kasan_save_stack+0x3d/0x60
[   31.272885]  kasan_save_track+0x18/0x40
[   31.273067]  kasan_save_alloc_info+0x3b/0x50
[   31.273334]  __kasan_kmalloc+0xb7/0xc0
[   31.273950]  __kmalloc_cache_noprof+0x184/0x410
[   31.274653]  kasan_atomics+0x96/0x310
[   31.275311]  kunit_try_run_case+0x1b3/0x490
[   31.276036]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   31.276926]  kthread+0x257/0x310
[   31.277498]  ret_from_fork+0x41/0x80
[   31.278110]  ret_from_fork_asm+0x1a/0x30
[   31.278752] 
[   31.279129] The buggy address belongs to the object at ffff888102969600
[   31.279129]  which belongs to the cache kmalloc-64 of size 64
[   31.279927] The buggy address is located 0 bytes to the right of
[   31.279927]  allocated 48-byte region [ffff888102969600, ffff888102969630)
[   31.281622] 
[   31.282541] The buggy address belongs to the physical page:
[   31.283370] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102969
[   31.284240] flags: 0x200000000000000(node=0|zone=2)
[   31.284757] page_type: f5(slab)
[   31.285118] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   31.286352] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   31.287543] page dumped because: kasan: bad access detected
[   31.288370] 
[   31.288539] Memory state around the buggy address:
[   31.289054]  ffff888102969500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   31.289823]  ffff888102969580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   31.290450] >ffff888102969600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   31.291209]                                      ^
[   31.291827]  ffff888102969680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.292470]  ffff888102969700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.293683] ==================================================================
[   29.878648] ==================================================================
[   29.879360] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a38/0x5450
[   29.880310] Read of size 4 at addr ffff888102969630 by task kunit_try_catch/272
[   29.881547] 
[   29.881996] CPU: 0 UID: 0 PID: 272 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc2-next-20241209 #1
[   29.883148] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.883763] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   29.884807] Call Trace:
[   29.885204]  <TASK>
[   29.885531]  dump_stack_lvl+0x73/0xb0
[   29.886525]  print_report+0xd1/0x640
[   29.886901]  ? __virt_addr_valid+0x1db/0x2d0
[   29.887653]  ? kasan_complete_mode_report_info+0x2a/0x200
[   29.888546]  kasan_report+0x102/0x140
[   29.889371]  ? kasan_atomics_helper+0x4a38/0x5450
[   29.890318]  ? kasan_atomics_helper+0x4a38/0x5450
[   29.891310]  __asan_report_load4_noabort+0x18/0x20
[   29.891757]  kasan_atomics_helper+0x4a38/0x5450
[   29.892566]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   29.893029]  ? __kmalloc_cache_noprof+0x184/0x410
[   29.893716]  ? kasan_atomics+0x153/0x310
[   29.894429]  kasan_atomics+0x1dd/0x310
[   29.895239]  ? __pfx_kasan_atomics+0x10/0x10
[   29.895694]  ? __pfx_read_tsc+0x10/0x10
[   29.896344]  ? ktime_get_ts64+0x86/0x230
[   29.896948]  kunit_try_run_case+0x1b3/0x490
[   29.897561]  ? __pfx_kunit_try_run_case+0x10/0x10
[   29.898133]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   29.898643]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   29.899272]  ? __kthread_parkme+0x82/0x160
[   29.900229]  ? preempt_count_sub+0x50/0x80
[   29.900921]  ? __pfx_kunit_try_run_case+0x10/0x10
[   29.901604]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   29.902386]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   29.903316]  kthread+0x257/0x310
[   29.904004]  ? __pfx_kthread+0x10/0x10
[   29.904406]  ret_from_fork+0x41/0x80
[   29.905068]  ? __pfx_kthread+0x10/0x10
[   29.905517]  ret_from_fork_asm+0x1a/0x30
[   29.906878]  </TASK>
[   29.907102] 
[   29.907325] Allocated by task 272:
[   29.907867]  kasan_save_stack+0x3d/0x60
[   29.908562]  kasan_save_track+0x18/0x40
[   29.909058]  kasan_save_alloc_info+0x3b/0x50
[   29.909370]  __kasan_kmalloc+0xb7/0xc0
[   29.909793]  __kmalloc_cache_noprof+0x184/0x410
[   29.911211]  kasan_atomics+0x96/0x310
[   29.911591]  kunit_try_run_case+0x1b3/0x490
[   29.912440]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   29.913404]  kthread+0x257/0x310
[   29.913752]  ret_from_fork+0x41/0x80
[   29.914152]  ret_from_fork_asm+0x1a/0x30
[   29.914912] 
[   29.915361] The buggy address belongs to the object at ffff888102969600
[   29.915361]  which belongs to the cache kmalloc-64 of size 64
[   29.916652] The buggy address is located 0 bytes to the right of
[   29.916652]  allocated 48-byte region [ffff888102969600, ffff888102969630)
[   29.918195] 
[   29.918489] The buggy address belongs to the physical page:
[   29.919137] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102969
[   29.920060] flags: 0x200000000000000(node=0|zone=2)
[   29.920591] page_type: f5(slab)
[   29.921383] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   29.922036] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   29.922483] page dumped because: kasan: bad access detected
[   29.922719] 
[   29.923466] Memory state around the buggy address:
[   29.924478]  ffff888102969500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.925492]  ffff888102969580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.926514] >ffff888102969600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   29.927400]                                      ^
[   29.927892]  ffff888102969680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.928646]  ffff888102969700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.929706] ==================================================================
[   31.007031] ==================================================================
[   31.007593] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1b23/0x5450
[   31.009103] Write of size 8 at addr ffff888102969630 by task kunit_try_catch/272
[   31.010188] 
[   31.010425] CPU: 0 UID: 0 PID: 272 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc2-next-20241209 #1
[   31.011838] Tainted: [B]=BAD_PAGE, [N]=TEST
[   31.012242] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   31.012997] Call Trace:
[   31.013458]  <TASK>
[   31.013798]  dump_stack_lvl+0x73/0xb0
[   31.014205]  print_report+0xd1/0x640
[   31.014700]  ? __virt_addr_valid+0x1db/0x2d0
[   31.015186]  ? kasan_complete_mode_report_info+0x2a/0x200
[   31.015780]  kasan_report+0x102/0x140
[   31.016189]  ? kasan_atomics_helper+0x1b23/0x5450
[   31.016756]  ? kasan_atomics_helper+0x1b23/0x5450
[   31.017821]  kasan_check_range+0x10c/0x1c0
[   31.018225]  __kasan_check_write+0x18/0x20
[   31.018658]  kasan_atomics_helper+0x1b23/0x5450
[   31.019173]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   31.019881]  ? __kmalloc_cache_noprof+0x184/0x410
[   31.020232]  ? kasan_atomics+0x153/0x310
[   31.020821]  kasan_atomics+0x1dd/0x310
[   31.021194]  ? __pfx_kasan_atomics+0x10/0x10
[   31.021839]  ? __pfx_read_tsc+0x10/0x10
[   31.022236]  ? ktime_get_ts64+0x86/0x230
[   31.022912]  kunit_try_run_case+0x1b3/0x490
[   31.023409]  ? __pfx_kunit_try_run_case+0x10/0x10
[   31.023991]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   31.024518]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   31.025117]  ? __kthread_parkme+0x82/0x160
[   31.025536]  ? preempt_count_sub+0x50/0x80
[   31.026131]  ? __pfx_kunit_try_run_case+0x10/0x10
[   31.026656]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   31.027279]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   31.027882]  kthread+0x257/0x310
[   31.028412]  ? __pfx_kthread+0x10/0x10
[   31.028794]  ret_from_fork+0x41/0x80
[   31.029324]  ? __pfx_kthread+0x10/0x10
[   31.029933]  ret_from_fork_asm+0x1a/0x30
[   31.030309]  </TASK>
[   31.030719] 
[   31.031034] Allocated by task 272:
[   31.031316]  kasan_save_stack+0x3d/0x60
[   31.031898]  kasan_save_track+0x18/0x40
[   31.032487]  kasan_save_alloc_info+0x3b/0x50
[   31.033025]  __kasan_kmalloc+0xb7/0xc0
[   31.033376]  __kmalloc_cache_noprof+0x184/0x410
[   31.034013]  kasan_atomics+0x96/0x310
[   31.034427]  kunit_try_run_case+0x1b3/0x490
[   31.034914]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   31.035726]  kthread+0x257/0x310
[   31.036191]  ret_from_fork+0x41/0x80
[   31.036587]  ret_from_fork_asm+0x1a/0x30
[   31.036943] 
[   31.037210] The buggy address belongs to the object at ffff888102969600
[   31.037210]  which belongs to the cache kmalloc-64 of size 64
[   31.038485] The buggy address is located 0 bytes to the right of
[   31.038485]  allocated 48-byte region [ffff888102969600, ffff888102969630)
[   31.039681] 
[   31.039949] The buggy address belongs to the physical page:
[   31.040508] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102969
[   31.041349] flags: 0x200000000000000(node=0|zone=2)
[   31.041879] page_type: f5(slab)
[   31.042355] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   31.043171] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   31.043953] page dumped because: kasan: bad access detected
[   31.044502] 
[   31.044841] Memory state around the buggy address:
[   31.045323]  ffff888102969500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   31.046037]  ffff888102969580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   31.046648] >ffff888102969600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   31.047365]                                      ^
[   31.047947]  ffff888102969680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.048686]  ffff888102969700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.049741] ==================================================================
[   31.151561] ==================================================================
[   31.152475] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1ce2/0x5450
[   31.153419] Write of size 8 at addr ffff888102969630 by task kunit_try_catch/272
[   31.154608] 
[   31.155047] CPU: 0 UID: 0 PID: 272 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc2-next-20241209 #1
[   31.156020] Tainted: [B]=BAD_PAGE, [N]=TEST
[   31.156449] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   31.157224] Call Trace:
[   31.157809]  <TASK>
[   31.158329]  dump_stack_lvl+0x73/0xb0
[   31.159165]  print_report+0xd1/0x640
[   31.159591]  ? __virt_addr_valid+0x1db/0x2d0
[   31.160361]  ? kasan_complete_mode_report_info+0x2a/0x200
[   31.160958]  kasan_report+0x102/0x140
[   31.161606]  ? kasan_atomics_helper+0x1ce2/0x5450
[   31.162177]  ? kasan_atomics_helper+0x1ce2/0x5450
[   31.162899]  kasan_check_range+0x10c/0x1c0
[   31.163507]  __kasan_check_write+0x18/0x20
[   31.164191]  kasan_atomics_helper+0x1ce2/0x5450
[   31.164687]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   31.165372]  ? __kmalloc_cache_noprof+0x184/0x410
[   31.165985]  ? kasan_atomics+0x153/0x310
[   31.166624]  kasan_atomics+0x1dd/0x310
[   31.167019]  ? __pfx_kasan_atomics+0x10/0x10
[   31.167658]  ? __pfx_read_tsc+0x10/0x10
[   31.168182]  ? ktime_get_ts64+0x86/0x230
[   31.168833]  kunit_try_run_case+0x1b3/0x490
[   31.169395]  ? __pfx_kunit_try_run_case+0x10/0x10
[   31.169978]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   31.170598]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   31.171285]  ? __kthread_parkme+0x82/0x160
[   31.171830]  ? preempt_count_sub+0x50/0x80
[   31.172463]  ? __pfx_kunit_try_run_case+0x10/0x10
[   31.172984]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   31.173733]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   31.174466]  kthread+0x257/0x310
[   31.175011]  ? __pfx_kthread+0x10/0x10
[   31.175571]  ret_from_fork+0x41/0x80
[   31.176244]  ? __pfx_kthread+0x10/0x10
[   31.176754]  ret_from_fork_asm+0x1a/0x30
[   31.177133]  </TASK>
[   31.177516] 
[   31.177761] Allocated by task 272:
[   31.178065]  kasan_save_stack+0x3d/0x60
[   31.178593]  kasan_save_track+0x18/0x40
[   31.178994]  kasan_save_alloc_info+0x3b/0x50
[   31.179329]  __kasan_kmalloc+0xb7/0xc0
[   31.179612]  __kmalloc_cache_noprof+0x184/0x410
[   31.180355]  kasan_atomics+0x96/0x310
[   31.180808]  kunit_try_run_case+0x1b3/0x490
[   31.181194]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   31.182946]  kthread+0x257/0x310
[   31.183342]  ret_from_fork+0x41/0x80
[   31.183729]  ret_from_fork_asm+0x1a/0x30
[   31.184863] 
[   31.185130] The buggy address belongs to the object at ffff888102969600
[   31.185130]  which belongs to the cache kmalloc-64 of size 64
[   31.187143] The buggy address is located 0 bytes to the right of
[   31.187143]  allocated 48-byte region [ffff888102969600, ffff888102969630)
[   31.188772] 
[   31.189383] The buggy address belongs to the physical page:
[   31.190054] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102969
[   31.191246] flags: 0x200000000000000(node=0|zone=2)
[   31.191709] page_type: f5(slab)
[   31.192380] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   31.193236] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   31.194451] page dumped because: kasan: bad access detected
[   31.195335] 
[   31.195522] Memory state around the buggy address:
[   31.196057]  ffff888102969500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   31.196855]  ffff888102969580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   31.197872] >ffff888102969600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   31.198576]                                      ^
[   31.199052]  ffff888102969680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.200688]  ffff888102969700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.201442] ==================================================================
[   31.348853] ==================================================================
[   31.350350] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1f44/0x5450
[   31.351802] Write of size 8 at addr ffff888102969630 by task kunit_try_catch/272
[   31.352647] 
[   31.353164] CPU: 0 UID: 0 PID: 272 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc2-next-20241209 #1
[   31.354513] Tainted: [B]=BAD_PAGE, [N]=TEST
[   31.355032] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   31.355690] Call Trace:
[   31.356012]  <TASK>
[   31.356419]  dump_stack_lvl+0x73/0xb0
[   31.356744]  print_report+0xd1/0x640
[   31.357200]  ? __virt_addr_valid+0x1db/0x2d0
[   31.357600]  ? kasan_complete_mode_report_info+0x2a/0x200
[   31.358065]  kasan_report+0x102/0x140
[   31.358566]  ? kasan_atomics_helper+0x1f44/0x5450
[   31.359427]  ? kasan_atomics_helper+0x1f44/0x5450
[   31.360081]  kasan_check_range+0x10c/0x1c0
[   31.360639]  __kasan_check_write+0x18/0x20
[   31.361294]  kasan_atomics_helper+0x1f44/0x5450
[   31.362317]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   31.363118]  ? __kmalloc_cache_noprof+0x184/0x410
[   31.363542]  ? kasan_atomics+0x153/0x310
[   31.363953]  kasan_atomics+0x1dd/0x310
[   31.364509]  ? __pfx_kasan_atomics+0x10/0x10
[   31.364944]  ? __pfx_read_tsc+0x10/0x10
[   31.365715]  ? ktime_get_ts64+0x86/0x230
[   31.366642]  kunit_try_run_case+0x1b3/0x490
[   31.367329]  ? __pfx_kunit_try_run_case+0x10/0x10
[   31.368300]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   31.368788]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   31.369250]  ? __kthread_parkme+0x82/0x160
[   31.369672]  ? preempt_count_sub+0x50/0x80
[   31.370083]  ? __pfx_kunit_try_run_case+0x10/0x10
[   31.370614]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   31.371326]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   31.372093]  kthread+0x257/0x310
[   31.372644]  ? __pfx_kthread+0x10/0x10
[   31.373176]  ret_from_fork+0x41/0x80
[   31.373782]  ? __pfx_kthread+0x10/0x10
[   31.374309]  ret_from_fork_asm+0x1a/0x30
[   31.374968]  </TASK>
[   31.375202] 
[   31.375540] Allocated by task 272:
[   31.376175]  kasan_save_stack+0x3d/0x60
[   31.376556]  kasan_save_track+0x18/0x40
[   31.377228]  kasan_save_alloc_info+0x3b/0x50
[   31.377703]  __kasan_kmalloc+0xb7/0xc0
[   31.378280]  __kmalloc_cache_noprof+0x184/0x410
[   31.378890]  kasan_atomics+0x96/0x310
[   31.379146]  kunit_try_run_case+0x1b3/0x490
[   31.379694]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   31.380649]  kthread+0x257/0x310
[   31.381328]  ret_from_fork+0x41/0x80
[   31.381719]  ret_from_fork_asm+0x1a/0x30
[   31.382272] 
[   31.382502] The buggy address belongs to the object at ffff888102969600
[   31.382502]  which belongs to the cache kmalloc-64 of size 64
[   31.383801] The buggy address is located 0 bytes to the right of
[   31.383801]  allocated 48-byte region [ffff888102969600, ffff888102969630)
[   31.384840] 
[   31.385139] The buggy address belongs to the physical page:
[   31.385629] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102969
[   31.386510] flags: 0x200000000000000(node=0|zone=2)
[   31.387048] page_type: f5(slab)
[   31.387413] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   31.388212] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   31.389031] page dumped because: kasan: bad access detected
[   31.389637] 
[   31.389872] Memory state around the buggy address:
[   31.390361]  ffff888102969500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   31.391069]  ffff888102969580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   31.391688] >ffff888102969600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   31.392191]                                      ^
[   31.393002]  ffff888102969680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.393820]  ffff888102969700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.394299] ==================================================================
[   30.867805] ==================================================================
[   30.868595] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x194b/0x5450
[   30.869535] Write of size 8 at addr ffff888102969630 by task kunit_try_catch/272
[   30.870244] 
[   30.870617] CPU: 0 UID: 0 PID: 272 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc2-next-20241209 #1
[   30.871220] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.871797] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   30.872662] Call Trace:
[   30.873175]  <TASK>
[   30.873492]  dump_stack_lvl+0x73/0xb0
[   30.874030]  print_report+0xd1/0x640
[   30.874462]  ? __virt_addr_valid+0x1db/0x2d0
[   30.874991]  ? kasan_complete_mode_report_info+0x2a/0x200
[   30.875576]  kasan_report+0x102/0x140
[   30.876040]  ? kasan_atomics_helper+0x194b/0x5450
[   30.876550]  ? kasan_atomics_helper+0x194b/0x5450
[   30.877105]  kasan_check_range+0x10c/0x1c0
[   30.877603]  __kasan_check_write+0x18/0x20
[   30.878089]  kasan_atomics_helper+0x194b/0x5450
[   30.878846]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   30.879440]  ? __kmalloc_cache_noprof+0x184/0x410
[   30.880013]  ? kasan_atomics+0x153/0x310
[   30.880343]  kasan_atomics+0x1dd/0x310
[   30.880868]  ? __pfx_kasan_atomics+0x10/0x10
[   30.881796]  ? __pfx_read_tsc+0x10/0x10
[   30.882116]  ? ktime_get_ts64+0x86/0x230
[   30.882638]  kunit_try_run_case+0x1b3/0x490
[   30.883274]  ? __pfx_kunit_try_run_case+0x10/0x10
[   30.883825]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   30.884363]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   30.884841]  ? __kthread_parkme+0x82/0x160
[   30.885336]  ? preempt_count_sub+0x50/0x80
[   30.885647]  ? __pfx_kunit_try_run_case+0x10/0x10
[   30.886321]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   30.886920]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   30.887753]  kthread+0x257/0x310
[   30.888236]  ? __pfx_kthread+0x10/0x10
[   30.888645]  ret_from_fork+0x41/0x80
[   30.889170]  ? __pfx_kthread+0x10/0x10
[   30.889686]  ret_from_fork_asm+0x1a/0x30
[   30.890212]  </TASK>
[   30.890634] 
[   30.890906] Allocated by task 272:
[   30.891215]  kasan_save_stack+0x3d/0x60
[   30.891697]  kasan_save_track+0x18/0x40
[   30.892104]  kasan_save_alloc_info+0x3b/0x50
[   30.892527]  __kasan_kmalloc+0xb7/0xc0
[   30.892814]  __kmalloc_cache_noprof+0x184/0x410
[   30.893130]  kasan_atomics+0x96/0x310
[   30.893743]  kunit_try_run_case+0x1b3/0x490
[   30.894325]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   30.895015]  kthread+0x257/0x310
[   30.895304]  ret_from_fork+0x41/0x80
[   30.895805]  ret_from_fork_asm+0x1a/0x30
[   30.896406] 
[   30.896731] The buggy address belongs to the object at ffff888102969600
[   30.896731]  which belongs to the cache kmalloc-64 of size 64
[   30.897985] The buggy address is located 0 bytes to the right of
[   30.897985]  allocated 48-byte region [ffff888102969600, ffff888102969630)
[   30.899205] 
[   30.899427] The buggy address belongs to the physical page:
[   30.899770] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102969
[   30.900594] flags: 0x200000000000000(node=0|zone=2)
[   30.900963] page_type: f5(slab)
[   30.901515] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   30.902491] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   30.903527] page dumped because: kasan: bad access detected
[   30.904050] 
[   30.904331] Memory state around the buggy address:
[   30.904648]  ffff888102969500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   30.905317]  ffff888102969580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   30.906037] >ffff888102969600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   30.906782]                                      ^
[   30.907432]  ffff888102969680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.908217]  ffff888102969700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.908821] ==================================================================
[   30.956680] ==================================================================
[   30.957364] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1a80/0x5450
[   30.959685] Write of size 8 at addr ffff888102969630 by task kunit_try_catch/272
[   30.960585] 
[   30.960826] CPU: 0 UID: 0 PID: 272 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc2-next-20241209 #1
[   30.961657] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.962034] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   30.962853] Call Trace:
[   30.963121]  <TASK>
[   30.963482]  dump_stack_lvl+0x73/0xb0
[   30.964689]  print_report+0xd1/0x640
[   30.965291]  ? __virt_addr_valid+0x1db/0x2d0
[   30.965755]  ? kasan_complete_mode_report_info+0x2a/0x200
[   30.966342]  kasan_report+0x102/0x140
[   30.966558]  ? kasan_atomics_helper+0x1a80/0x5450
[   30.966895]  ? kasan_atomics_helper+0x1a80/0x5450
[   30.968034]  kasan_check_range+0x10c/0x1c0
[   30.968654]  __kasan_check_write+0x18/0x20
[   30.969323]  kasan_atomics_helper+0x1a80/0x5450
[   30.969812]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   30.970329]  ? __kmalloc_cache_noprof+0x184/0x410
[   30.970824]  ? kasan_atomics+0x153/0x310
[   30.971245]  kasan_atomics+0x1dd/0x310
[   30.971580]  ? __pfx_kasan_atomics+0x10/0x10
[   30.971897]  ? __pfx_read_tsc+0x10/0x10
[   30.973190]  ? ktime_get_ts64+0x86/0x230
[   30.973868]  kunit_try_run_case+0x1b3/0x490
[   30.974520]  ? __pfx_kunit_try_run_case+0x10/0x10
[   30.975163]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   30.975646]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   30.976223]  ? __kthread_parkme+0x82/0x160
[   30.976602]  ? preempt_count_sub+0x50/0x80
[   30.977300]  ? __pfx_kunit_try_run_case+0x10/0x10
[   30.978242]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   30.979224]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   30.980014]  kthread+0x257/0x310
[   30.980542]  ? __pfx_kthread+0x10/0x10
[   30.980910]  ret_from_fork+0x41/0x80
[   30.981383]  ? __pfx_kthread+0x10/0x10
[   30.981747]  ret_from_fork_asm+0x1a/0x30
[   30.982241]  </TASK>
[   30.982528] 
[   30.982695] Allocated by task 272:
[   30.983190]  kasan_save_stack+0x3d/0x60
[   30.983647]  kasan_save_track+0x18/0x40
[   30.984119]  kasan_save_alloc_info+0x3b/0x50
[   30.984450]  __kasan_kmalloc+0xb7/0xc0
[   30.984948]  __kmalloc_cache_noprof+0x184/0x410
[   30.986063]  kasan_atomics+0x96/0x310
[   30.986607]  kunit_try_run_case+0x1b3/0x490
[   30.987200]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   30.987785]  kthread+0x257/0x310
[   30.988453]  ret_from_fork+0x41/0x80
[   30.989096]  ret_from_fork_asm+0x1a/0x30
[   30.989626] 
[   30.989870] The buggy address belongs to the object at ffff888102969600
[   30.989870]  which belongs to the cache kmalloc-64 of size 64
[   30.991482] The buggy address is located 0 bytes to the right of
[   30.991482]  allocated 48-byte region [ffff888102969600, ffff888102969630)
[   30.992710] 
[   30.993171] The buggy address belongs to the physical page:
[   30.994194] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102969
[   30.995356] flags: 0x200000000000000(node=0|zone=2)
[   30.996196] page_type: f5(slab)
[   30.996732] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   30.997437] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   30.999083] page dumped because: kasan: bad access detected
[   30.999537] 
[   30.999795] Memory state around the buggy address:
[   31.000338]  ffff888102969500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   31.001738]  ffff888102969580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   31.002433] >ffff888102969600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   31.003324]                                      ^
[   31.003751]  ffff888102969680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.004449]  ffff888102969700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.005577] ==================================================================
[   28.667987] ==================================================================
[   28.668742] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e0/0x5450
[   28.670125] Read of size 4 at addr ffff888102969630 by task kunit_try_catch/272
[   28.671249] 
[   28.671599] CPU: 0 UID: 0 PID: 272 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc2-next-20241209 #1
[   28.672907] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.673596] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   28.674981] Call Trace:
[   28.675489]  <TASK>
[   28.675703]  dump_stack_lvl+0x73/0xb0
[   28.676945]  print_report+0xd1/0x640
[   28.677521]  ? __virt_addr_valid+0x1db/0x2d0
[   28.678636]  ? kasan_complete_mode_report_info+0x2a/0x200
[   28.679245]  kasan_report+0x102/0x140
[   28.680244]  ? kasan_atomics_helper+0x3e0/0x5450
[   28.680686]  ? kasan_atomics_helper+0x3e0/0x5450
[   28.681322]  kasan_check_range+0x10c/0x1c0
[   28.682754]  __kasan_check_read+0x15/0x20
[   28.683186]  kasan_atomics_helper+0x3e0/0x5450
[   28.684123]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   28.684927]  ? __kmalloc_cache_noprof+0x184/0x410
[   28.686282]  ? kasan_atomics+0x153/0x310
[   28.687112]  kasan_atomics+0x1dd/0x310
[   28.687807]  ? __pfx_kasan_atomics+0x10/0x10
[   28.688617]  ? __pfx_read_tsc+0x10/0x10
[   28.689143]  ? ktime_get_ts64+0x86/0x230
[   28.690366]  kunit_try_run_case+0x1b3/0x490
[   28.691009]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.691948]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   28.692698]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   28.693192]  ? __kthread_parkme+0x82/0x160
[   28.694190]  ? preempt_count_sub+0x50/0x80
[   28.695323]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.695856]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   28.696118]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.696444]  kthread+0x257/0x310
[   28.696891]  ? __pfx_kthread+0x10/0x10
[   28.697245]  ret_from_fork+0x41/0x80
[   28.698055]  ? __pfx_kthread+0x10/0x10
[   28.698949]  ret_from_fork_asm+0x1a/0x30
[   28.699592]  </TASK>
[   28.699979] 
[   28.700163] Allocated by task 272:
[   28.700815]  kasan_save_stack+0x3d/0x60
[   28.701845]  kasan_save_track+0x18/0x40
[   28.702631]  kasan_save_alloc_info+0x3b/0x50
[   28.703553]  __kasan_kmalloc+0xb7/0xc0
[   28.704025]  __kmalloc_cache_noprof+0x184/0x410
[   28.704699]  kasan_atomics+0x96/0x310
[   28.705304]  kunit_try_run_case+0x1b3/0x490
[   28.706180]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.707178]  kthread+0x257/0x310
[   28.707881]  ret_from_fork+0x41/0x80
[   28.708724]  ret_from_fork_asm+0x1a/0x30
[   28.709720] 
[   28.709890] The buggy address belongs to the object at ffff888102969600
[   28.709890]  which belongs to the cache kmalloc-64 of size 64
[   28.712183] The buggy address is located 0 bytes to the right of
[   28.712183]  allocated 48-byte region [ffff888102969600, ffff888102969630)
[   28.713923] 
[   28.714165] The buggy address belongs to the physical page:
[   28.715029] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102969
[   28.716452] flags: 0x200000000000000(node=0|zone=2)
[   28.716979] page_type: f5(slab)
[   28.718018] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   28.718963] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   28.720360] page dumped because: kasan: bad access detected
[   28.721174] 
[   28.721638] Memory state around the buggy address:
[   28.723190]  ffff888102969500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.723864]  ffff888102969580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.724672] >ffff888102969600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   28.726078]                                      ^
[   28.727023]  ffff888102969680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.728038]  ffff888102969700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.728828] ==================================================================
[   29.382458] ==================================================================
[   29.384096] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa2c/0x5450
[   29.385310] Write of size 4 at addr ffff888102969630 by task kunit_try_catch/272
[   29.387036] 
[   29.387452] CPU: 0 UID: 0 PID: 272 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc2-next-20241209 #1
[   29.389005] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.389307] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   29.390242] Call Trace:
[   29.390608]  <TASK>
[   29.390846]  dump_stack_lvl+0x73/0xb0
[   29.391337]  print_report+0xd1/0x640
[   29.391789]  ? __virt_addr_valid+0x1db/0x2d0
[   29.392334]  ? kasan_complete_mode_report_info+0x2a/0x200
[   29.393165]  kasan_report+0x102/0x140
[   29.393626]  ? kasan_atomics_helper+0xa2c/0x5450
[   29.394094]  ? kasan_atomics_helper+0xa2c/0x5450
[   29.394639]  kasan_check_range+0x10c/0x1c0
[   29.395003]  __kasan_check_write+0x18/0x20
[   29.395563]  kasan_atomics_helper+0xa2c/0x5450
[   29.395943]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   29.396485]  ? __kmalloc_cache_noprof+0x184/0x410
[   29.396994]  ? kasan_atomics+0x153/0x310
[   29.397469]  kasan_atomics+0x1dd/0x310
[   29.398170]  ? __pfx_kasan_atomics+0x10/0x10
[   29.398613]  ? __pfx_read_tsc+0x10/0x10
[   29.399203]  ? ktime_get_ts64+0x86/0x230
[   29.399562]  kunit_try_run_case+0x1b3/0x490
[   29.400129]  ? __pfx_kunit_try_run_case+0x10/0x10
[   29.400644]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   29.401172]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   29.401610]  ? __kthread_parkme+0x82/0x160
[   29.402370]  ? preempt_count_sub+0x50/0x80
[   29.402858]  ? __pfx_kunit_try_run_case+0x10/0x10
[   29.403231]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   29.404010]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   29.405184]  kthread+0x257/0x310
[   29.405601]  ? __pfx_kthread+0x10/0x10
[   29.406618]  ret_from_fork+0x41/0x80
[   29.407096]  ? __pfx_kthread+0x10/0x10
[   29.407658]  ret_from_fork_asm+0x1a/0x30
[   29.408414]  </TASK>
[   29.408871] 
[   29.409287] Allocated by task 272:
[   29.409661]  kasan_save_stack+0x3d/0x60
[   29.410339]  kasan_save_track+0x18/0x40
[   29.410973]  kasan_save_alloc_info+0x3b/0x50
[   29.411570]  __kasan_kmalloc+0xb7/0xc0
[   29.412341]  __kmalloc_cache_noprof+0x184/0x410
[   29.412802]  kasan_atomics+0x96/0x310
[   29.413298]  kunit_try_run_case+0x1b3/0x490
[   29.413701]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   29.414225]  kthread+0x257/0x310
[   29.414681]  ret_from_fork+0x41/0x80
[   29.415305]  ret_from_fork_asm+0x1a/0x30
[   29.415682] 
[   29.415968] The buggy address belongs to the object at ffff888102969600
[   29.415968]  which belongs to the cache kmalloc-64 of size 64
[   29.417057] The buggy address is located 0 bytes to the right of
[   29.417057]  allocated 48-byte region [ffff888102969600, ffff888102969630)
[   29.418246] 
[   29.418602] The buggy address belongs to the physical page:
[   29.419530] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102969
[   29.420085] flags: 0x200000000000000(node=0|zone=2)
[   29.420625] page_type: f5(slab)
[   29.420898] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   29.421767] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   29.422751] page dumped because: kasan: bad access detected
[   29.423203] 
[   29.423533] Memory state around the buggy address:
[   29.423864]  ffff888102969500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.424828]  ffff888102969580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.425876] >ffff888102969600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   29.426309]                                      ^
[   29.426866]  ffff888102969680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.427820]  ffff888102969700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.428619] ==================================================================
[   29.263833] ==================================================================
[   29.264454] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x8fa/0x5450
[   29.265238] Write of size 4 at addr ffff888102969630 by task kunit_try_catch/272
[   29.266027] 
[   29.266217] CPU: 0 UID: 0 PID: 272 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc2-next-20241209 #1
[   29.268163] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.268566] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   29.269765] Call Trace:
[   29.270019]  <TASK>
[   29.270469]  dump_stack_lvl+0x73/0xb0
[   29.271436]  print_report+0xd1/0x640
[   29.271909]  ? __virt_addr_valid+0x1db/0x2d0
[   29.272413]  ? kasan_complete_mode_report_info+0x2a/0x200
[   29.273522]  kasan_report+0x102/0x140
[   29.274747]  ? kasan_atomics_helper+0x8fa/0x5450
[   29.275541]  ? kasan_atomics_helper+0x8fa/0x5450
[   29.276381]  kasan_check_range+0x10c/0x1c0
[   29.277647]  __kasan_check_write+0x18/0x20
[   29.278519]  kasan_atomics_helper+0x8fa/0x5450
[   29.279195]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   29.280056]  ? __kmalloc_cache_noprof+0x184/0x410
[   29.280669]  ? kasan_atomics+0x153/0x310
[   29.281158]  kasan_atomics+0x1dd/0x310
[   29.281788]  ? __pfx_kasan_atomics+0x10/0x10
[   29.282576]  ? __pfx_read_tsc+0x10/0x10
[   29.283145]  ? ktime_get_ts64+0x86/0x230
[   29.283690]  kunit_try_run_case+0x1b3/0x490
[   29.284394]  ? __pfx_kunit_try_run_case+0x10/0x10
[   29.285094]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   29.285630]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   29.286881]  ? __kthread_parkme+0x82/0x160
[   29.287359]  ? preempt_count_sub+0x50/0x80
[   29.287737]  ? __pfx_kunit_try_run_case+0x10/0x10
[   29.288250]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   29.288694]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   29.289864]  kthread+0x257/0x310
[   29.290550]  ? __pfx_kthread+0x10/0x10
[   29.291087]  ret_from_fork+0x41/0x80
[   29.291550]  ? __pfx_kthread+0x10/0x10
[   29.292049]  ret_from_fork_asm+0x1a/0x30
[   29.293124]  </TASK>
[   29.293747] 
[   29.294037] Allocated by task 272:
[   29.294655]  kasan_save_stack+0x3d/0x60
[   29.295331]  kasan_save_track+0x18/0x40
[   29.295858]  kasan_save_alloc_info+0x3b/0x50
[   29.296174]  __kasan_kmalloc+0xb7/0xc0
[   29.296809]  __kmalloc_cache_noprof+0x184/0x410
[   29.297424]  kasan_atomics+0x96/0x310
[   29.297915]  kunit_try_run_case+0x1b3/0x490
[   29.298513]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   29.299381]  kthread+0x257/0x310
[   29.300406]  ret_from_fork+0x41/0x80
[   29.300929]  ret_from_fork_asm+0x1a/0x30
[   29.301533] 
[   29.301891] The buggy address belongs to the object at ffff888102969600
[   29.301891]  which belongs to the cache kmalloc-64 of size 64
[   29.303157] The buggy address is located 0 bytes to the right of
[   29.303157]  allocated 48-byte region [ffff888102969600, ffff888102969630)
[   29.304478] 
[   29.304695] The buggy address belongs to the physical page:
[   29.305226] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102969
[   29.306175] flags: 0x200000000000000(node=0|zone=2)
[   29.306690] page_type: f5(slab)
[   29.307314] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   29.308636] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   29.309513] page dumped because: kasan: bad access detected
[   29.310104] 
[   29.310579] Memory state around the buggy address:
[   29.311069]  ffff888102969500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.312467]  ffff888102969580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.314151] >ffff888102969600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   29.314746]                                      ^
[   29.315232]  ffff888102969680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.315833]  ffff888102969700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.317686] ==================================================================
[   31.730017] ==================================================================
[   31.730879] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x224d/0x5450
[   31.732998] Write of size 8 at addr ffff888102969630 by task kunit_try_catch/272
[   31.733921] 
[   31.734360] CPU: 0 UID: 0 PID: 272 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc2-next-20241209 #1
[   31.735482] Tainted: [B]=BAD_PAGE, [N]=TEST
[   31.736092] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   31.736847] Call Trace:
[   31.737120]  <TASK>
[   31.737430]  dump_stack_lvl+0x73/0xb0
[   31.737834]  print_report+0xd1/0x640
[   31.738828]  ? __virt_addr_valid+0x1db/0x2d0
[   31.739472]  ? kasan_complete_mode_report_info+0x2a/0x200
[   31.740235]  kasan_report+0x102/0x140
[   31.740844]  ? kasan_atomics_helper+0x224d/0x5450
[   31.741468]  ? kasan_atomics_helper+0x224d/0x5450
[   31.742382]  kasan_check_range+0x10c/0x1c0
[   31.743106]  __kasan_check_write+0x18/0x20
[   31.743706]  kasan_atomics_helper+0x224d/0x5450
[   31.744322]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   31.745118]  ? __kmalloc_cache_noprof+0x184/0x410
[   31.745769]  ? kasan_atomics+0x153/0x310
[   31.746429]  kasan_atomics+0x1dd/0x310
[   31.746999]  ? __pfx_kasan_atomics+0x10/0x10
[   31.747585]  ? __pfx_read_tsc+0x10/0x10
[   31.748467]  ? ktime_get_ts64+0x86/0x230
[   31.748854]  kunit_try_run_case+0x1b3/0x490
[   31.749526]  ? __pfx_kunit_try_run_case+0x10/0x10
[   31.750087]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   31.751071]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   31.751738]  ? __kthread_parkme+0x82/0x160
[   31.752440]  ? preempt_count_sub+0x50/0x80
[   31.753014]  ? __pfx_kunit_try_run_case+0x10/0x10
[   31.753584]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   31.754530]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   31.755478]  kthread+0x257/0x310
[   31.756107]  ? __pfx_kthread+0x10/0x10
[   31.756683]  ret_from_fork+0x41/0x80
[   31.757275]  ? __pfx_kthread+0x10/0x10
[   31.757920]  ret_from_fork_asm+0x1a/0x30
[   31.758354]  </TASK>
[   31.758639] 
[   31.758839] Allocated by task 272:
[   31.759702]  kasan_save_stack+0x3d/0x60
[   31.760300]  kasan_save_track+0x18/0x40
[   31.760900]  kasan_save_alloc_info+0x3b/0x50
[   31.761465]  __kasan_kmalloc+0xb7/0xc0
[   31.762128]  __kmalloc_cache_noprof+0x184/0x410
[   31.762752]  kasan_atomics+0x96/0x310
[   31.763340]  kunit_try_run_case+0x1b3/0x490
[   31.764179]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   31.764683]  kthread+0x257/0x310
[   31.765439]  ret_from_fork+0x41/0x80
[   31.765806]  ret_from_fork_asm+0x1a/0x30
[   31.766299] 
[   31.766577] The buggy address belongs to the object at ffff888102969600
[   31.766577]  which belongs to the cache kmalloc-64 of size 64
[   31.767589] The buggy address is located 0 bytes to the right of
[   31.767589]  allocated 48-byte region [ffff888102969600, ffff888102969630)
[   31.768771] 
[   31.769166] The buggy address belongs to the physical page:
[   31.769646] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102969
[   31.770520] flags: 0x200000000000000(node=0|zone=2)
[   31.770942] page_type: f5(slab)
[   31.771323] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   31.772010] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   31.772535] page dumped because: kasan: bad access detected
[   31.773220] 
[   31.773527] Memory state around the buggy address:
[   31.773965]  ffff888102969500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   31.774847]  ffff888102969580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   31.775570] >ffff888102969600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   31.776372]                                      ^
[   31.777187]  ffff888102969680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.778339]  ffff888102969700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.779304] ==================================================================
[   28.729910] ==================================================================
[   28.731377] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b56/0x5450
[   28.734114] Read of size 4 at addr ffff888102969630 by task kunit_try_catch/272
[   28.735773] 
[   28.735942] CPU: 0 UID: 0 PID: 272 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc2-next-20241209 #1
[   28.736623] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.737988] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   28.739420] Call Trace:
[   28.740189]  <TASK>
[   28.741029]  dump_stack_lvl+0x73/0xb0
[   28.741627]  print_report+0xd1/0x640
[   28.742043]  ? __virt_addr_valid+0x1db/0x2d0
[   28.743054]  ? kasan_complete_mode_report_info+0x2a/0x200
[   28.743613]  kasan_report+0x102/0x140
[   28.744016]  ? kasan_atomics_helper+0x4b56/0x5450
[   28.745846]  ? kasan_atomics_helper+0x4b56/0x5450
[   28.746461]  __asan_report_load4_noabort+0x18/0x20
[   28.747070]  kasan_atomics_helper+0x4b56/0x5450
[   28.747757]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   28.748754]  ? __kmalloc_cache_noprof+0x184/0x410
[   28.749482]  ? kasan_atomics+0x153/0x310
[   28.749819]  kasan_atomics+0x1dd/0x310
[   28.750615]  ? __pfx_kasan_atomics+0x10/0x10
[   28.751365]  ? __pfx_read_tsc+0x10/0x10
[   28.751849]  ? ktime_get_ts64+0x86/0x230
[   28.752317]  kunit_try_run_case+0x1b3/0x490
[   28.753061]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.753734]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   28.754218]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   28.755035]  ? __kthread_parkme+0x82/0x160
[   28.756359]  ? preempt_count_sub+0x50/0x80
[   28.757665]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.758490]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   28.759419]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.760516]  kthread+0x257/0x310
[   28.761058]  ? __pfx_kthread+0x10/0x10
[   28.761440]  ret_from_fork+0x41/0x80
[   28.762486]  ? __pfx_kthread+0x10/0x10
[   28.763653]  ret_from_fork_asm+0x1a/0x30
[   28.764964]  </TASK>
[   28.765395] 
[   28.765616] Allocated by task 272:
[   28.765917]  kasan_save_stack+0x3d/0x60
[   28.767008]  kasan_save_track+0x18/0x40
[   28.767301]  kasan_save_alloc_info+0x3b/0x50
[   28.768386]  __kasan_kmalloc+0xb7/0xc0
[   28.769003]  __kmalloc_cache_noprof+0x184/0x410
[   28.769550]  kasan_atomics+0x96/0x310
[   28.770344]  kunit_try_run_case+0x1b3/0x490
[   28.771140]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.772440]  kthread+0x257/0x310
[   28.772665]  ret_from_fork+0x41/0x80
[   28.773058]  ret_from_fork_asm+0x1a/0x30
[   28.774293] 
[   28.774729] The buggy address belongs to the object at ffff888102969600
[   28.774729]  which belongs to the cache kmalloc-64 of size 64
[   28.777236] The buggy address is located 0 bytes to the right of
[   28.777236]  allocated 48-byte region [ffff888102969600, ffff888102969630)
[   28.778566] 
[   28.779185] The buggy address belongs to the physical page:
[   28.779918] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102969
[   28.781252] flags: 0x200000000000000(node=0|zone=2)
[   28.782610] page_type: f5(slab)
[   28.783088] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   28.784390] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   28.785248] page dumped because: kasan: bad access detected
[   28.785805] 
[   28.786167] Memory state around the buggy address:
[   28.787049]  ffff888102969500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.787606]  ffff888102969580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.789096] >ffff888102969600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   28.789788]                                      ^
[   28.790033]  ffff888102969680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.790819]  ffff888102969700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.792209] ==================================================================
[   29.139738] ==================================================================
[   29.140503] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x7c8/0x5450
[   29.141224] Write of size 4 at addr ffff888102969630 by task kunit_try_catch/272
[   29.142717] 
[   29.143054] CPU: 0 UID: 0 PID: 272 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc2-next-20241209 #1
[   29.143869] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.144833] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   29.146728] Call Trace:
[   29.147409]  <TASK>
[   29.147806]  dump_stack_lvl+0x73/0xb0
[   29.148100]  print_report+0xd1/0x640
[   29.148791]  ? __virt_addr_valid+0x1db/0x2d0
[   29.149623]  ? kasan_complete_mode_report_info+0x2a/0x200
[   29.151034]  kasan_report+0x102/0x140
[   29.151779]  ? kasan_atomics_helper+0x7c8/0x5450
[   29.152424]  ? kasan_atomics_helper+0x7c8/0x5450
[   29.153004]  kasan_check_range+0x10c/0x1c0
[   29.154058]  __kasan_check_write+0x18/0x20
[   29.154643]  kasan_atomics_helper+0x7c8/0x5450
[   29.155580]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   29.156607]  ? __kmalloc_cache_noprof+0x184/0x410
[   29.157545]  ? kasan_atomics+0x153/0x310
[   29.158354]  kasan_atomics+0x1dd/0x310
[   29.158738]  ? __pfx_kasan_atomics+0x10/0x10
[   29.159648]  ? __pfx_read_tsc+0x10/0x10
[   29.160212]  ? ktime_get_ts64+0x86/0x230
[   29.160773]  kunit_try_run_case+0x1b3/0x490
[   29.161371]  ? __pfx_kunit_try_run_case+0x10/0x10
[   29.162126]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   29.163342]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   29.163798]  ? __kthread_parkme+0x82/0x160
[   29.164561]  ? preempt_count_sub+0x50/0x80
[   29.164804]  ? __pfx_kunit_try_run_case+0x10/0x10
[   29.165891]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   29.166893]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   29.167824]  kthread+0x257/0x310
[   29.168168]  ? __pfx_kthread+0x10/0x10
[   29.168582]  ret_from_fork+0x41/0x80
[   29.169482]  ? __pfx_kthread+0x10/0x10
[   29.169783]  ret_from_fork_asm+0x1a/0x30
[   29.170686]  </TASK>
[   29.171348] 
[   29.171865] Allocated by task 272:
[   29.172140]  kasan_save_stack+0x3d/0x60
[   29.172751]  kasan_save_track+0x18/0x40
[   29.173196]  kasan_save_alloc_info+0x3b/0x50
[   29.174443]  __kasan_kmalloc+0xb7/0xc0
[   29.175672]  __kmalloc_cache_noprof+0x184/0x410
[   29.176927]  kasan_atomics+0x96/0x310
[   29.177235]  kunit_try_run_case+0x1b3/0x490
[   29.177628]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   29.178124]  kthread+0x257/0x310
[   29.178506]  ret_from_fork+0x41/0x80
[   29.178948]  ret_from_fork_asm+0x1a/0x30
[   29.180045] 
[   29.180215] The buggy address belongs to the object at ffff888102969600
[   29.180215]  which belongs to the cache kmalloc-64 of size 64
[   29.182463] The buggy address is located 0 bytes to the right of
[   29.182463]  allocated 48-byte region [ffff888102969600, ffff888102969630)
[   29.183674] 
[   29.184859] The buggy address belongs to the physical page:
[   29.185722] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102969
[   29.186761] flags: 0x200000000000000(node=0|zone=2)
[   29.187669] page_type: f5(slab)
[   29.187933] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   29.189450] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   29.190590] page dumped because: kasan: bad access detected
[   29.190927] 
[   29.191093] Memory state around the buggy address:
[   29.192362]  ffff888102969500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.193049]  ffff888102969580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.193737] >ffff888102969600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   29.195873]                                      ^
[   29.196207]  ffff888102969680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.198026]  ffff888102969700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.199065] ==================================================================
[   31.634343] ==================================================================
[   31.635393] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x218b/0x5450
[   31.636705] Write of size 8 at addr ffff888102969630 by task kunit_try_catch/272
[   31.638134] 
[   31.638781] CPU: 0 UID: 0 PID: 272 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc2-next-20241209 #1
[   31.639731] Tainted: [B]=BAD_PAGE, [N]=TEST
[   31.640549] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   31.641887] Call Trace:
[   31.642434]  <TASK>
[   31.642718]  dump_stack_lvl+0x73/0xb0
[   31.643545]  print_report+0xd1/0x640
[   31.644103]  ? __virt_addr_valid+0x1db/0x2d0
[   31.644600]  ? kasan_complete_mode_report_info+0x2a/0x200
[   31.645623]  kasan_report+0x102/0x140
[   31.646160]  ? kasan_atomics_helper+0x218b/0x5450
[   31.646709]  ? kasan_atomics_helper+0x218b/0x5450
[   31.647532]  kasan_check_range+0x10c/0x1c0
[   31.648338]  __kasan_check_write+0x18/0x20
[   31.648762]  kasan_atomics_helper+0x218b/0x5450
[   31.649240]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   31.650240]  ? __kmalloc_cache_noprof+0x184/0x410
[   31.650911]  ? kasan_atomics+0x153/0x310
[   31.651353]  kasan_atomics+0x1dd/0x310
[   31.651707]  ? __pfx_kasan_atomics+0x10/0x10
[   31.652186]  ? __pfx_read_tsc+0x10/0x10
[   31.653149]  ? ktime_get_ts64+0x86/0x230
[   31.653611]  kunit_try_run_case+0x1b3/0x490
[   31.654723]  ? __pfx_kunit_try_run_case+0x10/0x10
[   31.655488]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   31.656150]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   31.656724]  ? __kthread_parkme+0x82/0x160
[   31.657561]  ? preempt_count_sub+0x50/0x80
[   31.658128]  ? __pfx_kunit_try_run_case+0x10/0x10
[   31.658978]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   31.659531]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   31.660300]  kthread+0x257/0x310
[   31.660851]  ? __pfx_kthread+0x10/0x10
[   31.661882]  ret_from_fork+0x41/0x80
[   31.662330]  ? __pfx_kthread+0x10/0x10
[   31.662753]  ret_from_fork_asm+0x1a/0x30
[   31.663195]  </TASK>
[   31.663469] 
[   31.663667] Allocated by task 272:
[   31.665024]  kasan_save_stack+0x3d/0x60
[   31.665554]  kasan_save_track+0x18/0x40
[   31.666122]  kasan_save_alloc_info+0x3b/0x50
[   31.666752]  __kasan_kmalloc+0xb7/0xc0
[   31.667360]  __kmalloc_cache_noprof+0x184/0x410
[   31.667831]  kasan_atomics+0x96/0x310
[   31.668582]  kunit_try_run_case+0x1b3/0x490
[   31.669194]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   31.669721]  kthread+0x257/0x310
[   31.670502]  ret_from_fork+0x41/0x80
[   31.670757]  ret_from_fork_asm+0x1a/0x30
[   31.671400] 
[   31.671605] The buggy address belongs to the object at ffff888102969600
[   31.671605]  which belongs to the cache kmalloc-64 of size 64
[   31.672727] The buggy address is located 0 bytes to the right of
[   31.672727]  allocated 48-byte region [ffff888102969600, ffff888102969630)
[   31.673896] 
[   31.674098] The buggy address belongs to the physical page:
[   31.674648] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102969
[   31.675196] flags: 0x200000000000000(node=0|zone=2)
[   31.675550] page_type: f5(slab)
[   31.675935] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   31.676821] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   31.677418] page dumped because: kasan: bad access detected
[   31.677800] 
[   31.678060] Memory state around the buggy address:
[   31.678646]  ffff888102969500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   31.679390]  ffff888102969580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   31.680017] >ffff888102969600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   31.680585]                                      ^
[   31.681163]  ffff888102969680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.681627]  ffff888102969700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.682430] ==================================================================
[   30.767629] ==================================================================
[   30.768734] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1819/0x5450
[   30.769905] Write of size 8 at addr ffff888102969630 by task kunit_try_catch/272
[   30.770538] 
[   30.771440] CPU: 0 UID: 0 PID: 272 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc2-next-20241209 #1
[   30.772392] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.773084] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   30.774356] Call Trace:
[   30.774883]  <TASK>
[   30.775104]  dump_stack_lvl+0x73/0xb0
[   30.775657]  print_report+0xd1/0x640
[   30.776083]  ? __virt_addr_valid+0x1db/0x2d0
[   30.776500]  ? kasan_complete_mode_report_info+0x2a/0x200
[   30.777236]  kasan_report+0x102/0x140
[   30.777747]  ? kasan_atomics_helper+0x1819/0x5450
[   30.778738]  ? kasan_atomics_helper+0x1819/0x5450
[   30.779273]  kasan_check_range+0x10c/0x1c0
[   30.780058]  __kasan_check_write+0x18/0x20
[   30.780512]  kasan_atomics_helper+0x1819/0x5450
[   30.781491]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   30.782230]  ? __kmalloc_cache_noprof+0x184/0x410
[   30.782725]  ? kasan_atomics+0x153/0x310
[   30.783386]  kasan_atomics+0x1dd/0x310
[   30.784227]  ? __pfx_kasan_atomics+0x10/0x10
[   30.785005]  ? __pfx_read_tsc+0x10/0x10
[   30.785468]  ? ktime_get_ts64+0x86/0x230
[   30.786371]  kunit_try_run_case+0x1b3/0x490
[   30.786775]  ? __pfx_kunit_try_run_case+0x10/0x10
[   30.787476]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   30.788235]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   30.789301]  ? __kthread_parkme+0x82/0x160
[   30.789703]  ? preempt_count_sub+0x50/0x80
[   30.790180]  ? __pfx_kunit_try_run_case+0x10/0x10
[   30.790671]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   30.792199]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   30.792801]  kthread+0x257/0x310
[   30.793410]  ? __pfx_kthread+0x10/0x10
[   30.793857]  ret_from_fork+0x41/0x80
[   30.794574]  ? __pfx_kthread+0x10/0x10
[   30.795287]  ret_from_fork_asm+0x1a/0x30
[   30.795714]  </TASK>
[   30.796376] 
[   30.796583] Allocated by task 272:
[   30.797208]  kasan_save_stack+0x3d/0x60
[   30.797612]  kasan_save_track+0x18/0x40
[   30.798406]  kasan_save_alloc_info+0x3b/0x50
[   30.799122]  __kasan_kmalloc+0xb7/0xc0
[   30.799750]  __kmalloc_cache_noprof+0x184/0x410
[   30.800325]  kasan_atomics+0x96/0x310
[   30.801033]  kunit_try_run_case+0x1b3/0x490
[   30.801558]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   30.802557]  kthread+0x257/0x310
[   30.803304]  ret_from_fork+0x41/0x80
[   30.803916]  ret_from_fork_asm+0x1a/0x30
[   30.804553] 
[   30.804840] The buggy address belongs to the object at ffff888102969600
[   30.804840]  which belongs to the cache kmalloc-64 of size 64
[   30.805873] The buggy address is located 0 bytes to the right of
[   30.805873]  allocated 48-byte region [ffff888102969600, ffff888102969630)
[   30.807644] 
[   30.807939] The buggy address belongs to the physical page:
[   30.808551] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102969
[   30.809273] flags: 0x200000000000000(node=0|zone=2)
[   30.810135] page_type: f5(slab)
[   30.810836] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   30.811610] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   30.812426] page dumped because: kasan: bad access detected
[   30.813415] 
[   30.813768] Memory state around the buggy address:
[   30.814427]  ffff888102969500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   30.815441]  ffff888102969580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   30.815734] >ffff888102969600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   30.816735]                                      ^
[   30.817305]  ffff888102969680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.818061]  ffff888102969700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.819006] ==================================================================
[   29.519978] ==================================================================
[   29.521013] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xc71/0x5450
[   29.521632] Write of size 4 at addr ffff888102969630 by task kunit_try_catch/272
[   29.522511] 
[   29.522791] CPU: 0 UID: 0 PID: 272 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc2-next-20241209 #1
[   29.523589] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.524053] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   29.524613] Call Trace:
[   29.525004]  <TASK>
[   29.525374]  dump_stack_lvl+0x73/0xb0
[   29.525872]  print_report+0xd1/0x640
[   29.526279]  ? __virt_addr_valid+0x1db/0x2d0
[   29.526616]  ? kasan_complete_mode_report_info+0x2a/0x200
[   29.527611]  kasan_report+0x102/0x140
[   29.528222]  ? kasan_atomics_helper+0xc71/0x5450
[   29.528801]  ? kasan_atomics_helper+0xc71/0x5450
[   29.530027]  kasan_check_range+0x10c/0x1c0
[   29.530350]  __kasan_check_write+0x18/0x20
[   29.531158]  kasan_atomics_helper+0xc71/0x5450
[   29.531786]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   29.532486]  ? __kmalloc_cache_noprof+0x184/0x410
[   29.533231]  ? kasan_atomics+0x153/0x310
[   29.533890]  kasan_atomics+0x1dd/0x310
[   29.534545]  ? __pfx_kasan_atomics+0x10/0x10
[   29.534981]  ? __pfx_read_tsc+0x10/0x10
[   29.535575]  ? ktime_get_ts64+0x86/0x230
[   29.536290]  kunit_try_run_case+0x1b3/0x490
[   29.536906]  ? __pfx_kunit_try_run_case+0x10/0x10
[   29.537571]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   29.538301]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   29.539033]  ? __kthread_parkme+0x82/0x160
[   29.539659]  ? preempt_count_sub+0x50/0x80
[   29.540428]  ? __pfx_kunit_try_run_case+0x10/0x10
[   29.540883]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   29.542053]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   29.542784]  kthread+0x257/0x310
[   29.543536]  ? __pfx_kthread+0x10/0x10
[   29.544212]  ret_from_fork+0x41/0x80
[   29.544799]  ? __pfx_kthread+0x10/0x10
[   29.545446]  ret_from_fork_asm+0x1a/0x30
[   29.545904]  </TASK>
[   29.546637] 
[   29.546895] Allocated by task 272:
[   29.547160]  kasan_save_stack+0x3d/0x60
[   29.548075]  kasan_save_track+0x18/0x40
[   29.548497]  kasan_save_alloc_info+0x3b/0x50
[   29.549432]  __kasan_kmalloc+0xb7/0xc0
[   29.549718]  __kmalloc_cache_noprof+0x184/0x410
[   29.550588]  kasan_atomics+0x96/0x310
[   29.550935]  kunit_try_run_case+0x1b3/0x490
[   29.551418]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   29.552363]  kthread+0x257/0x310
[   29.552646]  ret_from_fork+0x41/0x80
[   29.553447]  ret_from_fork_asm+0x1a/0x30
[   29.554019] 
[   29.554443] The buggy address belongs to the object at ffff888102969600
[   29.554443]  which belongs to the cache kmalloc-64 of size 64
[   29.555332] The buggy address is located 0 bytes to the right of
[   29.555332]  allocated 48-byte region [ffff888102969600, ffff888102969630)
[   29.556715] 
[   29.557070] The buggy address belongs to the physical page:
[   29.557506] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102969
[   29.558432] flags: 0x200000000000000(node=0|zone=2)
[   29.559007] page_type: f5(slab)
[   29.559532] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   29.561218] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   29.562281] page dumped because: kasan: bad access detected
[   29.562769] 
[   29.563051] Memory state around the buggy address:
[   29.563385]  ffff888102969500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.564249]  ffff888102969580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.564769] >ffff888102969600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   29.565535]                                      ^
[   29.566135]  ffff888102969680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.566986]  ffff888102969700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.567657] ==================================================================
[   31.440641] ==================================================================
[   31.441212] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x2007/0x5450
[   31.442425] Write of size 8 at addr ffff888102969630 by task kunit_try_catch/272
[   31.443154] 
[   31.443544] CPU: 0 UID: 0 PID: 272 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc2-next-20241209 #1
[   31.444537] Tainted: [B]=BAD_PAGE, [N]=TEST
[   31.444722] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   31.445928] Call Trace:
[   31.446231]  <TASK>
[   31.446546]  dump_stack_lvl+0x73/0xb0
[   31.447396]  print_report+0xd1/0x640
[   31.448004]  ? __virt_addr_valid+0x1db/0x2d0
[   31.448629]  ? kasan_complete_mode_report_info+0x2a/0x200
[   31.449270]  kasan_report+0x102/0x140
[   31.450169]  ? kasan_atomics_helper+0x2007/0x5450
[   31.450612]  ? kasan_atomics_helper+0x2007/0x5450
[   31.451418]  kasan_check_range+0x10c/0x1c0
[   31.452487]  __kasan_check_write+0x18/0x20
[   31.452916]  kasan_atomics_helper+0x2007/0x5450
[   31.453562]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   31.454779]  ? __kmalloc_cache_noprof+0x184/0x410
[   31.455228]  ? kasan_atomics+0x153/0x310
[   31.456193]  kasan_atomics+0x1dd/0x310
[   31.456590]  ? __pfx_kasan_atomics+0x10/0x10
[   31.457283]  ? __pfx_read_tsc+0x10/0x10
[   31.457717]  ? ktime_get_ts64+0x86/0x230
[   31.458475]  kunit_try_run_case+0x1b3/0x490
[   31.459200]  ? __pfx_kunit_try_run_case+0x10/0x10
[   31.459797]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   31.460355]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   31.461201]  ? __kthread_parkme+0x82/0x160
[   31.461597]  ? preempt_count_sub+0x50/0x80
[   31.462014]  ? __pfx_kunit_try_run_case+0x10/0x10
[   31.463294]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   31.463831]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   31.464616]  kthread+0x257/0x310
[   31.465200]  ? __pfx_kthread+0x10/0x10
[   31.465717]  ret_from_fork+0x41/0x80
[   31.466436]  ? __pfx_kthread+0x10/0x10
[   31.466991]  ret_from_fork_asm+0x1a/0x30
[   31.467800]  </TASK>
[   31.468182] 
[   31.468391] Allocated by task 272:
[   31.469567]  kasan_save_stack+0x3d/0x60
[   31.469958]  kasan_save_track+0x18/0x40
[   31.470620]  kasan_save_alloc_info+0x3b/0x50
[   31.471113]  __kasan_kmalloc+0xb7/0xc0
[   31.471561]  __kmalloc_cache_noprof+0x184/0x410
[   31.472422]  kasan_atomics+0x96/0x310
[   31.473304]  kunit_try_run_case+0x1b3/0x490
[   31.473726]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   31.474604]  kthread+0x257/0x310
[   31.475378]  ret_from_fork+0x41/0x80
[   31.475728]  ret_from_fork_asm+0x1a/0x30
[   31.476387] 
[   31.476864] The buggy address belongs to the object at ffff888102969600
[   31.476864]  which belongs to the cache kmalloc-64 of size 64
[   31.477797] The buggy address is located 0 bytes to the right of
[   31.477797]  allocated 48-byte region [ffff888102969600, ffff888102969630)
[   31.479576] 
[   31.480348] The buggy address belongs to the physical page:
[   31.481017] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102969
[   31.482323] flags: 0x200000000000000(node=0|zone=2)
[   31.482740] page_type: f5(slab)
[   31.483182] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   31.484461] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   31.485436] page dumped because: kasan: bad access detected
[   31.485767] 
[   31.486507] Memory state around the buggy address:
[   31.487275]  ffff888102969500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   31.488159]  ffff888102969580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   31.488721] >ffff888102969600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   31.489626]                                      ^
[   31.490588]  ffff888102969680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.491365]  ffff888102969700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.492434] ==================================================================
[   30.820020] ==================================================================
[   30.820679] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x18b2/0x5450
[   30.821578] Write of size 8 at addr ffff888102969630 by task kunit_try_catch/272
[   30.822471] 
[   30.822793] CPU: 0 UID: 0 PID: 272 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc2-next-20241209 #1
[   30.824540] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.824952] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   30.825641] Call Trace:
[   30.826307]  <TASK>
[   30.826617]  dump_stack_lvl+0x73/0xb0
[   30.827402]  print_report+0xd1/0x640
[   30.828039]  ? __virt_addr_valid+0x1db/0x2d0
[   30.828428]  ? kasan_complete_mode_report_info+0x2a/0x200
[   30.829239]  kasan_report+0x102/0x140
[   30.829697]  ? kasan_atomics_helper+0x18b2/0x5450
[   30.830597]  ? kasan_atomics_helper+0x18b2/0x5450
[   30.831735]  kasan_check_range+0x10c/0x1c0
[   30.832172]  __kasan_check_write+0x18/0x20
[   30.833144]  kasan_atomics_helper+0x18b2/0x5450
[   30.833599]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   30.834148]  ? __kmalloc_cache_noprof+0x184/0x410
[   30.834618]  ? kasan_atomics+0x153/0x310
[   30.835228]  kasan_atomics+0x1dd/0x310
[   30.835613]  ? __pfx_kasan_atomics+0x10/0x10
[   30.837011]  ? __pfx_read_tsc+0x10/0x10
[   30.837575]  ? ktime_get_ts64+0x86/0x230
[   30.838344]  kunit_try_run_case+0x1b3/0x490
[   30.838724]  ? __pfx_kunit_try_run_case+0x10/0x10
[   30.839426]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   30.840501]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   30.841132]  ? __kthread_parkme+0x82/0x160
[   30.841775]  ? preempt_count_sub+0x50/0x80
[   30.842700]  ? __pfx_kunit_try_run_case+0x10/0x10
[   30.843299]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   30.844096]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   30.844785]  kthread+0x257/0x310
[   30.845589]  ? __pfx_kthread+0x10/0x10
[   30.846039]  ret_from_fork+0x41/0x80
[   30.846383]  ? __pfx_kthread+0x10/0x10
[   30.846793]  ret_from_fork_asm+0x1a/0x30
[   30.847350]  </TASK>
[   30.847813] 
[   30.848124] Allocated by task 272:
[   30.848487]  kasan_save_stack+0x3d/0x60
[   30.848960]  kasan_save_track+0x18/0x40
[   30.849512]  kasan_save_alloc_info+0x3b/0x50
[   30.850030]  __kasan_kmalloc+0xb7/0xc0
[   30.850336]  __kmalloc_cache_noprof+0x184/0x410
[   30.851080]  kasan_atomics+0x96/0x310
[   30.851548]  kunit_try_run_case+0x1b3/0x490
[   30.852238]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   30.852755]  kthread+0x257/0x310
[   30.853167]  ret_from_fork+0x41/0x80
[   30.853585]  ret_from_fork_asm+0x1a/0x30
[   30.854044] 
[   30.854336] The buggy address belongs to the object at ffff888102969600
[   30.854336]  which belongs to the cache kmalloc-64 of size 64
[   30.855571] The buggy address is located 0 bytes to the right of
[   30.855571]  allocated 48-byte region [ffff888102969600, ffff888102969630)
[   30.856697] 
[   30.857010] The buggy address belongs to the physical page:
[   30.857551] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102969
[   30.858188] flags: 0x200000000000000(node=0|zone=2)
[   30.858854] page_type: f5(slab)
[   30.859181] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   30.859991] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   30.860791] page dumped because: kasan: bad access detected
[   30.861132] 
[   30.861361] Memory state around the buggy address:
[   30.861997]  ffff888102969500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   30.863089]  ffff888102969580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   30.863551] >ffff888102969600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   30.864471]                                      ^
[   30.865174]  ffff888102969680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.865707]  ffff888102969700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.866357] ==================================================================
[   31.295046] ==================================================================
[   31.295632] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1eab/0x5450
[   31.297363] Write of size 8 at addr ffff888102969630 by task kunit_try_catch/272
[   31.298201] 
[   31.298424] CPU: 0 UID: 0 PID: 272 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc2-next-20241209 #1
[   31.299755] Tainted: [B]=BAD_PAGE, [N]=TEST
[   31.300097] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   31.301305] Call Trace:
[   31.302453]  <TASK>
[   31.302686]  dump_stack_lvl+0x73/0xb0
[   31.303321]  print_report+0xd1/0x640
[   31.303844]  ? __virt_addr_valid+0x1db/0x2d0
[   31.304600]  ? kasan_complete_mode_report_info+0x2a/0x200
[   31.305241]  kasan_report+0x102/0x140
[   31.305652]  ? kasan_atomics_helper+0x1eab/0x5450
[   31.306810]  ? kasan_atomics_helper+0x1eab/0x5450
[   31.307304]  kasan_check_range+0x10c/0x1c0
[   31.308170]  __kasan_check_write+0x18/0x20
[   31.308643]  kasan_atomics_helper+0x1eab/0x5450
[   31.309470]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   31.310198]  ? __kmalloc_cache_noprof+0x184/0x410
[   31.310800]  ? kasan_atomics+0x153/0x310
[   31.311316]  kasan_atomics+0x1dd/0x310
[   31.312201]  ? __pfx_kasan_atomics+0x10/0x10
[   31.312655]  ? __pfx_read_tsc+0x10/0x10
[   31.313430]  ? ktime_get_ts64+0x86/0x230
[   31.314425]  kunit_try_run_case+0x1b3/0x490
[   31.315200]  ? __pfx_kunit_try_run_case+0x10/0x10
[   31.315617]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   31.316354]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   31.317057]  ? __kthread_parkme+0x82/0x160
[   31.317514]  ? preempt_count_sub+0x50/0x80
[   31.318403]  ? __pfx_kunit_try_run_case+0x10/0x10
[   31.318938]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   31.319574]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   31.320343]  kthread+0x257/0x310
[   31.321144]  ? __pfx_kthread+0x10/0x10
[   31.321527]  ret_from_fork+0x41/0x80
[   31.322543]  ? __pfx_kthread+0x10/0x10
[   31.322935]  ret_from_fork_asm+0x1a/0x30
[   31.323152]  </TASK>
[   31.323319] 
[   31.323482] Allocated by task 272:
[   31.324248]  kasan_save_stack+0x3d/0x60
[   31.325408]  kasan_save_track+0x18/0x40
[   31.325742]  kasan_save_alloc_info+0x3b/0x50
[   31.326762]  __kasan_kmalloc+0xb7/0xc0
[   31.327305]  __kmalloc_cache_noprof+0x184/0x410
[   31.328417]  kasan_atomics+0x96/0x310
[   31.328786]  kunit_try_run_case+0x1b3/0x490
[   31.329668]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   31.330453]  kthread+0x257/0x310
[   31.330702]  ret_from_fork+0x41/0x80
[   31.331239]  ret_from_fork_asm+0x1a/0x30
[   31.331634] 
[   31.331895] The buggy address belongs to the object at ffff888102969600
[   31.331895]  which belongs to the cache kmalloc-64 of size 64
[   31.333779] The buggy address is located 0 bytes to the right of
[   31.333779]  allocated 48-byte region [ffff888102969600, ffff888102969630)
[   31.334804] 
[   31.335478] The buggy address belongs to the physical page:
[   31.336209] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102969
[   31.337127] flags: 0x200000000000000(node=0|zone=2)
[   31.338010] page_type: f5(slab)
[   31.338381] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   31.339565] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   31.340553] page dumped because: kasan: bad access detected
[   31.341313] 
[   31.341421] Memory state around the buggy address:
[   31.341627]  ffff888102969500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   31.342425]  ffff888102969580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   31.343612] >ffff888102969600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   31.344576]                                      ^
[   31.345591]  ffff888102969680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.346595]  ffff888102969700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.347499] ==================================================================
[   30.159037] ==================================================================
[   30.159739] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x49ea/0x5450
[   30.160443] Read of size 4 at addr ffff888102969630 by task kunit_try_catch/272
[   30.160989] 
[   30.161177] CPU: 0 UID: 0 PID: 272 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc2-next-20241209 #1
[   30.162130] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.162503] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   30.163388] Call Trace:
[   30.163611]  <TASK>
[   30.163946]  dump_stack_lvl+0x73/0xb0
[   30.164491]  print_report+0xd1/0x640
[   30.164939]  ? __virt_addr_valid+0x1db/0x2d0
[   30.165456]  ? kasan_complete_mode_report_info+0x2a/0x200
[   30.166100]  kasan_report+0x102/0x140
[   30.166546]  ? kasan_atomics_helper+0x49ea/0x5450
[   30.166973]  ? kasan_atomics_helper+0x49ea/0x5450
[   30.167556]  __asan_report_load4_noabort+0x18/0x20
[   30.167897]  kasan_atomics_helper+0x49ea/0x5450
[   30.168488]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   30.170420]  ? __kmalloc_cache_noprof+0x184/0x410
[   30.171685]  ? kasan_atomics+0x153/0x310
[   30.172709]  kasan_atomics+0x1dd/0x310
[   30.173134]  ? __pfx_kasan_atomics+0x10/0x10
[   30.173587]  ? __pfx_read_tsc+0x10/0x10
[   30.174184]  ? ktime_get_ts64+0x86/0x230
[   30.174929]  kunit_try_run_case+0x1b3/0x490
[   30.175617]  ? __pfx_kunit_try_run_case+0x10/0x10
[   30.176521]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   30.177112]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   30.177673]  ? __kthread_parkme+0x82/0x160
[   30.178668]  ? preempt_count_sub+0x50/0x80
[   30.179064]  ? __pfx_kunit_try_run_case+0x10/0x10
[   30.179997]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   30.180575]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   30.181596]  kthread+0x257/0x310
[   30.181953]  ? __pfx_kthread+0x10/0x10
[   30.182601]  ret_from_fork+0x41/0x80
[   30.183223]  ? __pfx_kthread+0x10/0x10
[   30.183908]  ret_from_fork_asm+0x1a/0x30
[   30.184612]  </TASK>
[   30.185076] 
[   30.185310] Allocated by task 272:
[   30.185676]  kasan_save_stack+0x3d/0x60
[   30.186911]  kasan_save_track+0x18/0x40
[   30.187213]  kasan_save_alloc_info+0x3b/0x50
[   30.187933]  __kasan_kmalloc+0xb7/0xc0
[   30.188374]  __kmalloc_cache_noprof+0x184/0x410
[   30.189171]  kasan_atomics+0x96/0x310
[   30.189574]  kunit_try_run_case+0x1b3/0x490
[   30.190087]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   30.190855]  kthread+0x257/0x310
[   30.191357]  ret_from_fork+0x41/0x80
[   30.191646]  ret_from_fork_asm+0x1a/0x30
[   30.192177] 
[   30.192938] The buggy address belongs to the object at ffff888102969600
[   30.192938]  which belongs to the cache kmalloc-64 of size 64
[   30.194105] The buggy address is located 0 bytes to the right of
[   30.194105]  allocated 48-byte region [ffff888102969600, ffff888102969630)
[   30.195441] 
[   30.195634] The buggy address belongs to the physical page:
[   30.196733] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102969
[   30.197386] flags: 0x200000000000000(node=0|zone=2)
[   30.198123] page_type: f5(slab)
[   30.198635] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   30.199652] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   30.200387] page dumped because: kasan: bad access detected
[   30.201413] 
[   30.201588] Memory state around the buggy address:
[   30.202460]  ffff888102969500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   30.203362]  ffff888102969580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   30.204560] >ffff888102969600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   30.205639]                                      ^
[   30.206309]  ffff888102969680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.207311]  ffff888102969700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.208067] ==================================================================
[   30.262285] ==================================================================
[   30.263002] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x49d0/0x5450
[   30.264093] Read of size 4 at addr ffff888102969630 by task kunit_try_catch/272
[   30.264576] 
[   30.265416] CPU: 0 UID: 0 PID: 272 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc2-next-20241209 #1
[   30.266809] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.267209] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   30.268239] Call Trace:
[   30.268818]  <TASK>
[   30.269075]  dump_stack_lvl+0x73/0xb0
[   30.269493]  print_report+0xd1/0x640
[   30.270358]  ? __virt_addr_valid+0x1db/0x2d0
[   30.270867]  ? kasan_complete_mode_report_info+0x2a/0x200
[   30.271553]  kasan_report+0x102/0x140
[   30.272205]  ? kasan_atomics_helper+0x49d0/0x5450
[   30.272744]  ? kasan_atomics_helper+0x49d0/0x5450
[   30.273587]  __asan_report_load4_noabort+0x18/0x20
[   30.274062]  kasan_atomics_helper+0x49d0/0x5450
[   30.274832]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   30.275476]  ? __kmalloc_cache_noprof+0x184/0x410
[   30.276190]  ? kasan_atomics+0x153/0x310
[   30.276618]  kasan_atomics+0x1dd/0x310
[   30.277558]  ? __pfx_kasan_atomics+0x10/0x10
[   30.278040]  ? __pfx_read_tsc+0x10/0x10
[   30.278628]  ? ktime_get_ts64+0x86/0x230
[   30.279353]  kunit_try_run_case+0x1b3/0x490
[   30.280000]  ? __pfx_kunit_try_run_case+0x10/0x10
[   30.280633]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   30.281414]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   30.282155]  ? __kthread_parkme+0x82/0x160
[   30.282852]  ? preempt_count_sub+0x50/0x80
[   30.283422]  ? __pfx_kunit_try_run_case+0x10/0x10
[   30.284178]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   30.284951]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   30.285515]  kthread+0x257/0x310
[   30.286184]  ? __pfx_kthread+0x10/0x10
[   30.286758]  ret_from_fork+0x41/0x80
[   30.287394]  ? __pfx_kthread+0x10/0x10
[   30.288003]  ret_from_fork_asm+0x1a/0x30
[   30.288499]  </TASK>
[   30.288771] 
[   30.289439] Allocated by task 272:
[   30.289689]  kasan_save_stack+0x3d/0x60
[   30.290073]  kasan_save_track+0x18/0x40
[   30.290595]  kasan_save_alloc_info+0x3b/0x50
[   30.291047]  __kasan_kmalloc+0xb7/0xc0
[   30.291434]  __kmalloc_cache_noprof+0x184/0x410
[   30.292048]  kasan_atomics+0x96/0x310
[   30.292543]  kunit_try_run_case+0x1b3/0x490
[   30.293167]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   30.293698]  kthread+0x257/0x310
[   30.294161]  ret_from_fork+0x41/0x80
[   30.294615]  ret_from_fork_asm+0x1a/0x30
[   30.295222] 
[   30.295490] The buggy address belongs to the object at ffff888102969600
[   30.295490]  which belongs to the cache kmalloc-64 of size 64
[   30.296501] The buggy address is located 0 bytes to the right of
[   30.296501]  allocated 48-byte region [ffff888102969600, ffff888102969630)
[   30.297895] 
[   30.298096] The buggy address belongs to the physical page:
[   30.298645] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102969
[   30.299592] flags: 0x200000000000000(node=0|zone=2)
[   30.300242] page_type: f5(slab)
[   30.300644] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   30.301575] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   30.302248] page dumped because: kasan: bad access detected
[   30.302898] 
[   30.303171] Memory state around the buggy address:
[   30.303714]  ffff888102969500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   30.304526]  ffff888102969580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   30.305367] >ffff888102969600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   30.306440]                                      ^
[   30.307339]  ffff888102969680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.308031]  ffff888102969700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.308748] ==================================================================
[   29.674757] ==================================================================
[   29.676278] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xde1/0x5450
[   29.677166] Write of size 4 at addr ffff888102969630 by task kunit_try_catch/272
[   29.678811] 
[   29.679069] CPU: 0 UID: 0 PID: 272 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc2-next-20241209 #1
[   29.680499] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.680966] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   29.681548] Call Trace:
[   29.681699]  <TASK>
[   29.682009]  dump_stack_lvl+0x73/0xb0
[   29.682721]  print_report+0xd1/0x640
[   29.683533]  ? __virt_addr_valid+0x1db/0x2d0
[   29.684747]  ? kasan_complete_mode_report_info+0x2a/0x200
[   29.685381]  kasan_report+0x102/0x140
[   29.686086]  ? kasan_atomics_helper+0xde1/0x5450
[   29.686779]  ? kasan_atomics_helper+0xde1/0x5450
[   29.687397]  kasan_check_range+0x10c/0x1c0
[   29.688137]  __kasan_check_write+0x18/0x20
[   29.688676]  kasan_atomics_helper+0xde1/0x5450
[   29.689189]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   29.689802]  ? __kmalloc_cache_noprof+0x184/0x410
[   29.690300]  ? kasan_atomics+0x153/0x310
[   29.690677]  kasan_atomics+0x1dd/0x310
[   29.691228]  ? __pfx_kasan_atomics+0x10/0x10
[   29.691651]  ? __pfx_read_tsc+0x10/0x10
[   29.692096]  ? ktime_get_ts64+0x86/0x230
[   29.692616]  kunit_try_run_case+0x1b3/0x490
[   29.693336]  ? __pfx_kunit_try_run_case+0x10/0x10
[   29.694225]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   29.694900]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   29.695613]  ? __kthread_parkme+0x82/0x160
[   29.696378]  ? preempt_count_sub+0x50/0x80
[   29.697544]  ? __pfx_kunit_try_run_case+0x10/0x10
[   29.698335]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   29.698978]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   29.699629]  kthread+0x257/0x310
[   29.700389]  ? __pfx_kthread+0x10/0x10
[   29.700970]  ret_from_fork+0x41/0x80
[   29.701570]  ? __pfx_kthread+0x10/0x10
[   29.702110]  ret_from_fork_asm+0x1a/0x30
[   29.702531]  </TASK>
[   29.703230] 
[   29.703622] Allocated by task 272:
[   29.704045]  kasan_save_stack+0x3d/0x60
[   29.704747]  kasan_save_track+0x18/0x40
[   29.705305]  kasan_save_alloc_info+0x3b/0x50
[   29.705754]  __kasan_kmalloc+0xb7/0xc0
[   29.706838]  __kmalloc_cache_noprof+0x184/0x410
[   29.707482]  kasan_atomics+0x96/0x310
[   29.708021]  kunit_try_run_case+0x1b3/0x490
[   29.708415]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   29.709323]  kthread+0x257/0x310
[   29.709656]  ret_from_fork+0x41/0x80
[   29.710222]  ret_from_fork_asm+0x1a/0x30
[   29.710674] 
[   29.711297] The buggy address belongs to the object at ffff888102969600
[   29.711297]  which belongs to the cache kmalloc-64 of size 64
[   29.712384] The buggy address is located 0 bytes to the right of
[   29.712384]  allocated 48-byte region [ffff888102969600, ffff888102969630)
[   29.713860] 
[   29.714319] The buggy address belongs to the physical page:
[   29.714912] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102969
[   29.715991] flags: 0x200000000000000(node=0|zone=2)
[   29.716548] page_type: f5(slab)
[   29.717412] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   29.718538] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   29.719028] page dumped because: kasan: bad access detected
[   29.719277] 
[   29.719479] Memory state around the buggy address:
[   29.720534]  ffff888102969500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.721277]  ffff888102969580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.721911] >ffff888102969600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   29.723078]                                      ^
[   29.723571]  ffff888102969680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.724432]  ffff888102969700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.725290] ==================================================================
[   29.622016] ==================================================================
[   29.624065] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xd48/0x5450
[   29.625117] Write of size 4 at addr ffff888102969630 by task kunit_try_catch/272
[   29.625873] 
[   29.626423] CPU: 0 UID: 0 PID: 272 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc2-next-20241209 #1
[   29.628032] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.628672] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   29.629445] Call Trace:
[   29.629750]  <TASK>
[   29.630041]  dump_stack_lvl+0x73/0xb0
[   29.631475]  print_report+0xd1/0x640
[   29.632136]  ? __virt_addr_valid+0x1db/0x2d0
[   29.632637]  ? kasan_complete_mode_report_info+0x2a/0x200
[   29.633048]  kasan_report+0x102/0x140
[   29.633774]  ? kasan_atomics_helper+0xd48/0x5450
[   29.634687]  ? kasan_atomics_helper+0xd48/0x5450
[   29.635409]  kasan_check_range+0x10c/0x1c0
[   29.636163]  __kasan_check_write+0x18/0x20
[   29.636841]  kasan_atomics_helper+0xd48/0x5450
[   29.637324]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   29.637791]  ? __kmalloc_cache_noprof+0x184/0x410
[   29.638301]  ? kasan_atomics+0x153/0x310
[   29.639065]  kasan_atomics+0x1dd/0x310
[   29.639513]  ? __pfx_kasan_atomics+0x10/0x10
[   29.640342]  ? __pfx_read_tsc+0x10/0x10
[   29.641372]  ? ktime_get_ts64+0x86/0x230
[   29.642097]  kunit_try_run_case+0x1b3/0x490
[   29.642699]  ? __pfx_kunit_try_run_case+0x10/0x10
[   29.643517]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   29.643976]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   29.644726]  ? __kthread_parkme+0x82/0x160
[   29.645163]  ? preempt_count_sub+0x50/0x80
[   29.645984]  ? __pfx_kunit_try_run_case+0x10/0x10
[   29.646509]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   29.647412]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   29.647798]  kthread+0x257/0x310
[   29.648278]  ? __pfx_kthread+0x10/0x10
[   29.649133]  ret_from_fork+0x41/0x80
[   29.649540]  ? __pfx_kthread+0x10/0x10
[   29.650193]  ret_from_fork_asm+0x1a/0x30
[   29.650962]  </TASK>
[   29.651224] 
[   29.651461] Allocated by task 272:
[   29.652296]  kasan_save_stack+0x3d/0x60
[   29.652744]  kasan_save_track+0x18/0x40
[   29.653049]  kasan_save_alloc_info+0x3b/0x50
[   29.653547]  __kasan_kmalloc+0xb7/0xc0
[   29.654390]  __kmalloc_cache_noprof+0x184/0x410
[   29.654706]  kasan_atomics+0x96/0x310
[   29.655209]  kunit_try_run_case+0x1b3/0x490
[   29.655585]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   29.656033]  kthread+0x257/0x310
[   29.656679]  ret_from_fork+0x41/0x80
[   29.657287]  ret_from_fork_asm+0x1a/0x30
[   29.658586] 
[   29.658808] The buggy address belongs to the object at ffff888102969600
[   29.658808]  which belongs to the cache kmalloc-64 of size 64
[   29.660063] The buggy address is located 0 bytes to the right of
[   29.660063]  allocated 48-byte region [ffff888102969600, ffff888102969630)
[   29.661734] 
[   29.662025] The buggy address belongs to the physical page:
[   29.662585] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102969
[   29.663784] flags: 0x200000000000000(node=0|zone=2)
[   29.664646] page_type: f5(slab)
[   29.665044] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   29.666135] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   29.667149] page dumped because: kasan: bad access detected
[   29.667493] 
[   29.667950] Memory state around the buggy address:
[   29.668895]  ffff888102969500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.669731]  ffff888102969580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.670470] >ffff888102969600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   29.671302]                                      ^
[   29.671913]  ffff888102969680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.672569]  ffff888102969700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.673468] ==================================================================
[   28.547556] ==================================================================
[   28.548790] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b8a/0x5450
[   28.550009] Read of size 4 at addr ffff888102969630 by task kunit_try_catch/272
[   28.551017] 
[   28.551421] CPU: 0 UID: 0 PID: 272 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc2-next-20241209 #1
[   28.552564] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.552971] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   28.553835] Call Trace:
[   28.554131]  <TASK>
[   28.554968]  dump_stack_lvl+0x73/0xb0
[   28.555680]  print_report+0xd1/0x640
[   28.556149]  ? __virt_addr_valid+0x1db/0x2d0
[   28.556823]  ? kasan_complete_mode_report_info+0x2a/0x200
[   28.557682]  kasan_report+0x102/0x140
[   28.558162]  ? kasan_atomics_helper+0x4b8a/0x5450
[   28.559137]  ? kasan_atomics_helper+0x4b8a/0x5450
[   28.560152]  __asan_report_load4_noabort+0x18/0x20
[   28.561426]  kasan_atomics_helper+0x4b8a/0x5450
[   28.562609]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   28.563131]  ? __kmalloc_cache_noprof+0x184/0x410
[   28.564150]  ? kasan_atomics+0x153/0x310
[   28.565362]  kasan_atomics+0x1dd/0x310
[   28.565908]  ? __pfx_kasan_atomics+0x10/0x10
[   28.567359]  ? __pfx_read_tsc+0x10/0x10
[   28.567843]  ? ktime_get_ts64+0x86/0x230
[   28.568928]  kunit_try_run_case+0x1b3/0x490
[   28.569422]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.569739]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   28.570236]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   28.571532]  ? __kthread_parkme+0x82/0x160
[   28.572008]  ? preempt_count_sub+0x50/0x80
[   28.572849]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.573500]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   28.574566]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.575326]  kthread+0x257/0x310
[   28.576030]  ? __pfx_kthread+0x10/0x10
[   28.576534]  ret_from_fork+0x41/0x80
[   28.577326]  ? __pfx_kthread+0x10/0x10
[   28.577674]  ret_from_fork_asm+0x1a/0x30
[   28.578524]  </TASK>
[   28.579515] 
[   28.579794] Allocated by task 272:
[   28.580748]  kasan_save_stack+0x3d/0x60
[   28.581419]  kasan_save_track+0x18/0x40
[   28.581957]  kasan_save_alloc_info+0x3b/0x50
[   28.582821]  __kasan_kmalloc+0xb7/0xc0
[   28.583440]  __kmalloc_cache_noprof+0x184/0x410
[   28.584426]  kasan_atomics+0x96/0x310
[   28.584821]  kunit_try_run_case+0x1b3/0x490
[   28.585614]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.586718]  kthread+0x257/0x310
[   28.587438]  ret_from_fork+0x41/0x80
[   28.587793]  ret_from_fork_asm+0x1a/0x30
[   28.588527] 
[   28.589159] The buggy address belongs to the object at ffff888102969600
[   28.589159]  which belongs to the cache kmalloc-64 of size 64
[   28.591037] The buggy address is located 0 bytes to the right of
[   28.591037]  allocated 48-byte region [ffff888102969600, ffff888102969630)
[   28.593072] 
[   28.593347] The buggy address belongs to the physical page:
[   28.593828] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102969
[   28.594959] flags: 0x200000000000000(node=0|zone=2)
[   28.595178] page_type: f5(slab)
[   28.595820] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   28.597178] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   28.597765] page dumped because: kasan: bad access detected
[   28.598753] 
[   28.598954] Memory state around the buggy address:
[   28.600030]  ffff888102969500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.601231]  ffff888102969580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.602475] >ffff888102969600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   28.603321]                                      ^
[   28.604471]  ffff888102969680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.605850]  ffff888102969700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.606393] ==================================================================
[   29.083588] ==================================================================
[   29.084303] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x730/0x5450
[   29.084951] Write of size 4 at addr ffff888102969630 by task kunit_try_catch/272
[   29.085694] 
[   29.086003] CPU: 0 UID: 0 PID: 272 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc2-next-20241209 #1
[   29.087420] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.087665] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   29.089554] Call Trace:
[   29.090203]  <TASK>
[   29.090737]  dump_stack_lvl+0x73/0xb0
[   29.091173]  print_report+0xd1/0x640
[   29.092216]  ? __virt_addr_valid+0x1db/0x2d0
[   29.092694]  ? kasan_complete_mode_report_info+0x2a/0x200
[   29.093227]  kasan_report+0x102/0x140
[   29.093650]  ? kasan_atomics_helper+0x730/0x5450
[   29.094144]  ? kasan_atomics_helper+0x730/0x5450
[   29.095337]  kasan_check_range+0x10c/0x1c0
[   29.095896]  __kasan_check_write+0x18/0x20
[   29.096507]  kasan_atomics_helper+0x730/0x5450
[   29.097449]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   29.098654]  ? __kmalloc_cache_noprof+0x184/0x410
[   29.099430]  ? kasan_atomics+0x153/0x310
[   29.100035]  kasan_atomics+0x1dd/0x310
[   29.100942]  ? __pfx_kasan_atomics+0x10/0x10
[   29.101439]  ? __pfx_read_tsc+0x10/0x10
[   29.101975]  ? ktime_get_ts64+0x86/0x230
[   29.102542]  kunit_try_run_case+0x1b3/0x490
[   29.103066]  ? __pfx_kunit_try_run_case+0x10/0x10
[   29.104433]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   29.104667]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   29.105992]  ? __kthread_parkme+0x82/0x160
[   29.106456]  ? preempt_count_sub+0x50/0x80
[   29.107086]  ? __pfx_kunit_try_run_case+0x10/0x10
[   29.108171]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   29.108855]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   29.109572]  kthread+0x257/0x310
[   29.110170]  ? __pfx_kthread+0x10/0x10
[   29.110728]  ret_from_fork+0x41/0x80
[   29.111230]  ? __pfx_kthread+0x10/0x10
[   29.111725]  ret_from_fork_asm+0x1a/0x30
[   29.112879]  </TASK>
[   29.113285] 
[   29.113752] Allocated by task 272:
[   29.114514]  kasan_save_stack+0x3d/0x60
[   29.115062]  kasan_save_track+0x18/0x40
[   29.115478]  kasan_save_alloc_info+0x3b/0x50
[   29.116072]  __kasan_kmalloc+0xb7/0xc0
[   29.117110]  __kmalloc_cache_noprof+0x184/0x410
[   29.117468]  kasan_atomics+0x96/0x310
[   29.117957]  kunit_try_run_case+0x1b3/0x490
[   29.118693]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   29.119061]  kthread+0x257/0x310
[   29.119791]  ret_from_fork+0x41/0x80
[   29.120322]  ret_from_fork_asm+0x1a/0x30
[   29.121310] 
[   29.121502] The buggy address belongs to the object at ffff888102969600
[   29.121502]  which belongs to the cache kmalloc-64 of size 64
[   29.123196] The buggy address is located 0 bytes to the right of
[   29.123196]  allocated 48-byte region [ffff888102969600, ffff888102969630)
[   29.125024] 
[   29.125305] The buggy address belongs to the physical page:
[   29.126047] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102969
[   29.127501] flags: 0x200000000000000(node=0|zone=2)
[   29.128379] page_type: f5(slab)
[   29.128978] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   29.129698] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   29.131349] page dumped because: kasan: bad access detected
[   29.131722] 
[   29.132067] Memory state around the buggy address:
[   29.133432]  ffff888102969500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.134276]  ffff888102969580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.135173] >ffff888102969600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   29.136100]                                      ^
[   29.136728]  ffff888102969680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.137846]  ffff888102969700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.138731] ==================================================================