Hay
Date
Dec. 5, 2024, 2:07 p.m.

Environment
qemu-arm64
qemu-x86_64

[   36.586967] ==================================================================
[   36.587901] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x17ec/0x4858
[   36.588701] Write of size 8 at addr fff00000c664f830 by task kunit_try_catch/254
[   36.589496] 
[   36.589821] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241205 #1
[   36.590889] Tainted: [B]=BAD_PAGE, [N]=TEST
[   36.591591] Hardware name: linux,dummy-virt (DT)
[   36.592302] Call trace:
[   36.592694]  show_stack+0x20/0x38 (C)
[   36.593259]  dump_stack_lvl+0x8c/0xd0
[   36.593928]  print_report+0x118/0x5e0
[   36.594609]  kasan_report+0xc8/0x118
[   36.595252]  kasan_check_range+0x100/0x1a8
[   36.595995]  __kasan_check_write+0x20/0x30
[   36.596563]  kasan_atomics_helper+0x17ec/0x4858
[   36.597276]  kasan_atomics+0x198/0x2e8
[   36.597857]  kunit_try_run_case+0x14c/0x3d0
[   36.598589]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.599327]  kthread+0x24c/0x2d0
[   36.599913]  ret_from_fork+0x10/0x20
[   36.600454] 
[   36.600735] Allocated by task 254:
[   36.601326]  kasan_save_stack+0x3c/0x68
[   36.601960]  kasan_save_track+0x20/0x40
[   36.602534]  kasan_save_alloc_info+0x40/0x58
[   36.603096]  __kasan_kmalloc+0xd4/0xd8
[   36.603637]  __kmalloc_cache_noprof+0x15c/0x3c0
[   36.604157]  kasan_atomics+0xb8/0x2e8
[   36.604788]  kunit_try_run_case+0x14c/0x3d0
[   36.605416]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.606109]  kthread+0x24c/0x2d0
[   36.606604]  ret_from_fork+0x10/0x20
[   36.607265] 
[   36.607560] The buggy address belongs to the object at fff00000c664f800
[   36.607560]  which belongs to the cache kmalloc-64 of size 64
[   36.609051] The buggy address is located 0 bytes to the right of
[   36.609051]  allocated 48-byte region [fff00000c664f800, fff00000c664f830)
[   36.610477] 
[   36.610798] The buggy address belongs to the physical page:
[   36.611460] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10664f
[   36.612477] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   36.613256] page_type: f5(slab)
[   36.613773] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   36.614745] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   36.615713] page dumped because: kasan: bad access detected
[   36.616331] 
[   36.616701] Memory state around the buggy address:
[   36.617361]  fff00000c664f700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   36.618261]  fff00000c664f780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   36.619220] >fff00000c664f800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   36.620066]                                      ^
[   36.620716]  fff00000c664f880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.621621]  fff00000c664f900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.622533] ==================================================================
[   35.504552] ==================================================================
[   35.505258] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f58/0x4858
[   35.506270] Read of size 8 at addr fff00000c664f830 by task kunit_try_catch/254
[   35.507126] 
[   35.507440] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241205 #1
[   35.508678] Tainted: [B]=BAD_PAGE, [N]=TEST
[   35.509261] Hardware name: linux,dummy-virt (DT)
[   35.509965] Call trace:
[   35.510311]  show_stack+0x20/0x38 (C)
[   35.510982]  dump_stack_lvl+0x8c/0xd0
[   35.511549]  print_report+0x118/0x5e0
[   35.512191]  kasan_report+0xc8/0x118
[   35.512758]  __asan_report_load8_noabort+0x20/0x30
[   35.513452]  kasan_atomics_helper+0x3f58/0x4858
[   35.514217]  kasan_atomics+0x198/0x2e8
[   35.514790]  kunit_try_run_case+0x14c/0x3d0
[   35.515516]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.516289]  kthread+0x24c/0x2d0
[   35.516829]  ret_from_fork+0x10/0x20
[   35.517478] 
[   35.517900] Allocated by task 254:
[   35.518439]  kasan_save_stack+0x3c/0x68
[   35.519044]  kasan_save_track+0x20/0x40
[   35.519617]  kasan_save_alloc_info+0x40/0x58
[   35.520264]  __kasan_kmalloc+0xd4/0xd8
[   35.520723]  __kmalloc_cache_noprof+0x15c/0x3c0
[   35.521429]  kasan_atomics+0xb8/0x2e8
[   35.521986]  kunit_try_run_case+0x14c/0x3d0
[   35.522715]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.523414]  kthread+0x24c/0x2d0
[   35.524024]  ret_from_fork+0x10/0x20
[   35.524536] 
[   35.524835] The buggy address belongs to the object at fff00000c664f800
[   35.524835]  which belongs to the cache kmalloc-64 of size 64
[   35.526264] The buggy address is located 0 bytes to the right of
[   35.526264]  allocated 48-byte region [fff00000c664f800, fff00000c664f830)
[   35.527570] 
[   35.527955] The buggy address belongs to the physical page:
[   35.528622] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10664f
[   35.529647] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   35.530784] page_type: f5(slab)
[   35.531325] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   35.531774] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   35.532907] page dumped because: kasan: bad access detected
[   35.533680] 
[   35.534026] Memory state around the buggy address:
[   35.534740]  fff00000c664f700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.535818]  fff00000c664f780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.536725] >fff00000c664f800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   35.537679]                                      ^
[   35.538367]  fff00000c664f880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.539275]  fff00000c664f900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.540191] ==================================================================
[   34.136082] ==================================================================
[   34.136926] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1ec/0x4858
[   34.138089] Read of size 4 at addr fff00000c664f830 by task kunit_try_catch/254
[   34.139864] 
[   34.140777] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241205 #1
[   34.142010] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.142589] Hardware name: linux,dummy-virt (DT)
[   34.143365] Call trace:
[   34.144159]  show_stack+0x20/0x38 (C)
[   34.144615]  dump_stack_lvl+0x8c/0xd0
[   34.145199]  print_report+0x118/0x5e0
[   34.145919]  kasan_report+0xc8/0x118
[   34.146986]  kasan_check_range+0x100/0x1a8
[   34.148002]  __kasan_check_read+0x20/0x30
[   34.148568]  kasan_atomics_helper+0x1ec/0x4858
[   34.149301]  kasan_atomics+0x198/0x2e8
[   34.149810]  kunit_try_run_case+0x14c/0x3d0
[   34.150428]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.151161]  kthread+0x24c/0x2d0
[   34.151789]  ret_from_fork+0x10/0x20
[   34.152443] 
[   34.152865] Allocated by task 254:
[   34.153569]  kasan_save_stack+0x3c/0x68
[   34.154349]  kasan_save_track+0x20/0x40
[   34.155941]  kasan_save_alloc_info+0x40/0x58
[   34.156479]  __kasan_kmalloc+0xd4/0xd8
[   34.157080]  __kmalloc_cache_noprof+0x15c/0x3c0
[   34.157726]  kasan_atomics+0xb8/0x2e8
[   34.158368]  kunit_try_run_case+0x14c/0x3d0
[   34.158945]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.159797]  kthread+0x24c/0x2d0
[   34.160759]  ret_from_fork+0x10/0x20
[   34.161681] 
[   34.162297] The buggy address belongs to the object at fff00000c664f800
[   34.162297]  which belongs to the cache kmalloc-64 of size 64
[   34.164162] The buggy address is located 0 bytes to the right of
[   34.164162]  allocated 48-byte region [fff00000c664f800, fff00000c664f830)
[   34.165571] 
[   34.165866] The buggy address belongs to the physical page:
[   34.166785] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10664f
[   34.168016] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   34.168816] page_type: f5(slab)
[   34.169320] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   34.170780] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   34.172289] page dumped because: kasan: bad access detected
[   34.173231] 
[   34.173411] Memory state around the buggy address:
[   34.173717]  fff00000c664f700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   34.174789]  fff00000c664f780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   34.176155] >fff00000c664f800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   34.177377]                                      ^
[   34.178387]  fff00000c664f880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.178944]  fff00000c664f900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.180370] ==================================================================
[   34.648792] ==================================================================
[   34.649598] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x61c/0x4858
[   34.650412] Write of size 4 at addr fff00000c664f830 by task kunit_try_catch/254
[   34.651449] 
[   34.652042] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241205 #1
[   34.653348] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.653779] Hardware name: linux,dummy-virt (DT)
[   34.654507] Call trace:
[   34.654865]  show_stack+0x20/0x38 (C)
[   34.655513]  dump_stack_lvl+0x8c/0xd0
[   34.656266]  print_report+0x118/0x5e0
[   34.656773]  kasan_report+0xc8/0x118
[   34.657446]  kasan_check_range+0x100/0x1a8
[   34.658044]  __kasan_check_write+0x20/0x30
[   34.658715]  kasan_atomics_helper+0x61c/0x4858
[   34.659428]  kasan_atomics+0x198/0x2e8
[   34.660122]  kunit_try_run_case+0x14c/0x3d0
[   34.660759]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.661516]  kthread+0x24c/0x2d0
[   34.662065]  ret_from_fork+0x10/0x20
[   34.662711] 
[   34.663108] Allocated by task 254:
[   34.663591]  kasan_save_stack+0x3c/0x68
[   34.664206]  kasan_save_track+0x20/0x40
[   34.664761]  kasan_save_alloc_info+0x40/0x58
[   34.665483]  __kasan_kmalloc+0xd4/0xd8
[   34.665999]  __kmalloc_cache_noprof+0x15c/0x3c0
[   34.666743]  kasan_atomics+0xb8/0x2e8
[   34.667339]  kunit_try_run_case+0x14c/0x3d0
[   34.668067]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.668889]  kthread+0x24c/0x2d0
[   34.669315]  ret_from_fork+0x10/0x20
[   34.669921] 
[   34.670319] The buggy address belongs to the object at fff00000c664f800
[   34.670319]  which belongs to the cache kmalloc-64 of size 64
[   34.671679] The buggy address is located 0 bytes to the right of
[   34.671679]  allocated 48-byte region [fff00000c664f800, fff00000c664f830)
[   34.673093] 
[   34.673466] The buggy address belongs to the physical page:
[   34.674219] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10664f
[   34.675158] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   34.675965] page_type: f5(slab)
[   34.676422] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   34.677414] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   34.678394] page dumped because: kasan: bad access detected
[   34.679112] 
[   34.679458] Memory state around the buggy address:
[   34.680173]  fff00000c664f700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   34.680982]  fff00000c664f780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   34.681964] >fff00000c664f800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   34.682865]                                      ^
[   34.683520]  fff00000c664f880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.684428]  fff00000c664f900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.685309] ==================================================================
[   34.728077] ==================================================================
[   34.728920] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x6ec/0x4858
[   34.729831] Write of size 4 at addr fff00000c664f830 by task kunit_try_catch/254
[   34.731005] 
[   34.731477] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241205 #1
[   34.733039] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.733704] Hardware name: linux,dummy-virt (DT)
[   34.734418] Call trace:
[   34.734952]  show_stack+0x20/0x38 (C)
[   34.735557]  dump_stack_lvl+0x8c/0xd0
[   34.736289]  print_report+0x118/0x5e0
[   34.736984]  kasan_report+0xc8/0x118
[   34.737611]  kasan_check_range+0x100/0x1a8
[   34.738301]  __kasan_check_write+0x20/0x30
[   34.739005]  kasan_atomics_helper+0x6ec/0x4858
[   34.739801]  kasan_atomics+0x198/0x2e8
[   34.740536]  kunit_try_run_case+0x14c/0x3d0
[   34.741234]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.742108]  kthread+0x24c/0x2d0
[   34.742630]  ret_from_fork+0x10/0x20
[   34.743293] 
[   34.743626] Allocated by task 254:
[   34.744258]  kasan_save_stack+0x3c/0x68
[   34.744964]  kasan_save_track+0x20/0x40
[   34.745713]  kasan_save_alloc_info+0x40/0x58
[   34.746405]  __kasan_kmalloc+0xd4/0xd8
[   34.747074]  __kmalloc_cache_noprof+0x15c/0x3c0
[   34.747765]  kasan_atomics+0xb8/0x2e8
[   34.748388]  kunit_try_run_case+0x14c/0x3d0
[   34.749147]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.749950]  kthread+0x24c/0x2d0
[   34.750568]  ret_from_fork+0x10/0x20
[   34.751321] 
[   34.751772] The buggy address belongs to the object at fff00000c664f800
[   34.751772]  which belongs to the cache kmalloc-64 of size 64
[   34.753239] The buggy address is located 0 bytes to the right of
[   34.753239]  allocated 48-byte region [fff00000c664f800, fff00000c664f830)
[   34.754794] 
[   34.755296] The buggy address belongs to the physical page:
[   34.756113] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10664f
[   34.757109] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   34.757976] page_type: f5(slab)
[   34.758521] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   34.759529] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   34.760476] page dumped because: kasan: bad access detected
[   34.761236] 
[   34.761567] Memory state around the buggy address:
[   34.762343]  fff00000c664f700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   34.763323]  fff00000c664f780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   34.764330] >fff00000c664f800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   34.765246]                                      ^
[   34.765973]  fff00000c664f880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.766984]  fff00000c664f900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.767866] ==================================================================
[   36.273066] ==================================================================
[   36.273892] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x15b4/0x4858
[   36.275764] Write of size 8 at addr fff00000c664f830 by task kunit_try_catch/254
[   36.276734] 
[   36.277236] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241205 #1
[   36.278485] Tainted: [B]=BAD_PAGE, [N]=TEST
[   36.279132] Hardware name: linux,dummy-virt (DT)
[   36.279865] Call trace:
[   36.280443]  show_stack+0x20/0x38 (C)
[   36.281122]  dump_stack_lvl+0x8c/0xd0
[   36.281766]  print_report+0x118/0x5e0
[   36.282423]  kasan_report+0xc8/0x118
[   36.283064]  kasan_check_range+0x100/0x1a8
[   36.283708]  __kasan_check_write+0x20/0x30
[   36.284401]  kasan_atomics_helper+0x15b4/0x4858
[   36.285123]  kasan_atomics+0x198/0x2e8
[   36.285754]  kunit_try_run_case+0x14c/0x3d0
[   36.286450]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.287256]  kthread+0x24c/0x2d0
[   36.287857]  ret_from_fork+0x10/0x20
[   36.288577] 
[   36.288922] Allocated by task 254:
[   36.289509]  kasan_save_stack+0x3c/0x68
[   36.290163]  kasan_save_track+0x20/0x40
[   36.290863]  kasan_save_alloc_info+0x40/0x58
[   36.291596]  __kasan_kmalloc+0xd4/0xd8
[   36.292330]  __kmalloc_cache_noprof+0x15c/0x3c0
[   36.293042]  kasan_atomics+0xb8/0x2e8
[   36.293594]  kunit_try_run_case+0x14c/0x3d0
[   36.294261]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.295100]  kthread+0x24c/0x2d0
[   36.295653]  ret_from_fork+0x10/0x20
[   36.296306] 
[   36.296722] The buggy address belongs to the object at fff00000c664f800
[   36.296722]  which belongs to the cache kmalloc-64 of size 64
[   36.298157] The buggy address is located 0 bytes to the right of
[   36.298157]  allocated 48-byte region [fff00000c664f800, fff00000c664f830)
[   36.299757] 
[   36.300211] The buggy address belongs to the physical page:
[   36.301055] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10664f
[   36.302068] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   36.302945] page_type: f5(slab)
[   36.303522] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   36.304477] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   36.305443] page dumped because: kasan: bad access detected
[   36.306227] 
[   36.306693] Memory state around the buggy address:
[   36.307366]  fff00000c664f700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   36.308385]  fff00000c664f780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   36.309401] >fff00000c664f800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   36.310347]                                      ^
[   36.311099]  fff00000c664f880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.312128]  fff00000c664f900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.313038] ==================================================================
[   34.323497] ==================================================================
[   34.324287] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x32c/0x4858
[   34.326032] Write of size 4 at addr fff00000c664f830 by task kunit_try_catch/254
[   34.327027] 
[   34.327721] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241205 #1
[   34.329042] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.329593] Hardware name: linux,dummy-virt (DT)
[   34.330326] Call trace:
[   34.330772]  show_stack+0x20/0x38 (C)
[   34.331908]  dump_stack_lvl+0x8c/0xd0
[   34.332578]  print_report+0x118/0x5e0
[   34.333319]  kasan_report+0xc8/0x118
[   34.333964]  kasan_check_range+0x100/0x1a8
[   34.334599]  __kasan_check_write+0x20/0x30
[   34.335270]  kasan_atomics_helper+0x32c/0x4858
[   34.336233]  kasan_atomics+0x198/0x2e8
[   34.336892]  kunit_try_run_case+0x14c/0x3d0
[   34.337694]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.338504]  kthread+0x24c/0x2d0
[   34.339141]  ret_from_fork+0x10/0x20
[   34.339930] 
[   34.340616] Allocated by task 254:
[   34.341312]  kasan_save_stack+0x3c/0x68
[   34.341795]  kasan_save_track+0x20/0x40
[   34.342450]  kasan_save_alloc_info+0x40/0x58
[   34.343749]  __kasan_kmalloc+0xd4/0xd8
[   34.344340]  __kmalloc_cache_noprof+0x15c/0x3c0
[   34.344947]  kasan_atomics+0xb8/0x2e8
[   34.345441]  kunit_try_run_case+0x14c/0x3d0
[   34.346080]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.346870]  kthread+0x24c/0x2d0
[   34.347447]  ret_from_fork+0x10/0x20
[   34.347998] 
[   34.348274] The buggy address belongs to the object at fff00000c664f800
[   34.348274]  which belongs to the cache kmalloc-64 of size 64
[   34.351078] The buggy address is located 0 bytes to the right of
[   34.351078]  allocated 48-byte region [fff00000c664f800, fff00000c664f830)
[   34.352442] 
[   34.353250] The buggy address belongs to the physical page:
[   34.354186] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10664f
[   34.355400] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   34.356675] page_type: f5(slab)
[   34.357787] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   34.358902] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   34.359944] page dumped because: kasan: bad access detected
[   34.360689] 
[   34.361370] Memory state around the buggy address:
[   34.361871]  fff00000c664f700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   34.362821]  fff00000c664f780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   34.364150] >fff00000c664f800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   34.364895]                                      ^
[   34.365622]  fff00000c664f880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.366458]  fff00000c664f900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.367357] ==================================================================
[   34.854270] ==================================================================
[   34.854977] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x894/0x4858
[   34.856257] Write of size 4 at addr fff00000c664f830 by task kunit_try_catch/254
[   34.857644] 
[   34.858018] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241205 #1
[   34.859424] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.860190] Hardware name: linux,dummy-virt (DT)
[   34.860751] Call trace:
[   34.861207]  show_stack+0x20/0x38 (C)
[   34.861509]  dump_stack_lvl+0x8c/0xd0
[   34.861806]  print_report+0x118/0x5e0
[   34.862688]  kasan_report+0xc8/0x118
[   34.863509]  kasan_check_range+0x100/0x1a8
[   34.864131]  __kasan_check_write+0x20/0x30
[   34.864746]  kasan_atomics_helper+0x894/0x4858
[   34.865434]  kasan_atomics+0x198/0x2e8
[   34.866006]  kunit_try_run_case+0x14c/0x3d0
[   34.866702]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.867515]  kthread+0x24c/0x2d0
[   34.868011]  ret_from_fork+0x10/0x20
[   34.868518] 
[   34.868861] Allocated by task 254:
[   34.869400]  kasan_save_stack+0x3c/0x68
[   34.870082]  kasan_save_track+0x20/0x40
[   34.870847]  kasan_save_alloc_info+0x40/0x58
[   34.871647]  __kasan_kmalloc+0xd4/0xd8
[   34.872366]  __kmalloc_cache_noprof+0x15c/0x3c0
[   34.873052]  kasan_atomics+0xb8/0x2e8
[   34.873708]  kunit_try_run_case+0x14c/0x3d0
[   34.874488]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.875290]  kthread+0x24c/0x2d0
[   34.875995]  ret_from_fork+0x10/0x20
[   34.876662] 
[   34.877106] The buggy address belongs to the object at fff00000c664f800
[   34.877106]  which belongs to the cache kmalloc-64 of size 64
[   34.878229] The buggy address is located 0 bytes to the right of
[   34.878229]  allocated 48-byte region [fff00000c664f800, fff00000c664f830)
[   34.878936] 
[   34.879314] The buggy address belongs to the physical page:
[   34.880102] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10664f
[   34.880980] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   34.882104] page_type: f5(slab)
[   34.882558] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   34.883572] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   34.884654] page dumped because: kasan: bad access detected
[   34.885456] 
[   34.885934] Memory state around the buggy address:
[   34.886641]  fff00000c664f700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   34.887656]  fff00000c664f780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   34.888562] >fff00000c664f800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   34.889508]                                      ^
[   34.890245]  fff00000c664f880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.891193]  fff00000c664f900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.892199] ==================================================================
[   36.507772] ==================================================================
[   36.508517] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x175c/0x4858
[   36.510446] Write of size 8 at addr fff00000c664f830 by task kunit_try_catch/254
[   36.512569] 
[   36.513176] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241205 #1
[   36.514391] Tainted: [B]=BAD_PAGE, [N]=TEST
[   36.514948] Hardware name: linux,dummy-virt (DT)
[   36.515553] Call trace:
[   36.515959]  show_stack+0x20/0x38 (C)
[   36.516528]  dump_stack_lvl+0x8c/0xd0
[   36.517241]  print_report+0x118/0x5e0
[   36.517803]  kasan_report+0xc8/0x118
[   36.518454]  kasan_check_range+0x100/0x1a8
[   36.519091]  __kasan_check_write+0x20/0x30
[   36.519705]  kasan_atomics_helper+0x175c/0x4858
[   36.520386]  kasan_atomics+0x198/0x2e8
[   36.521040]  kunit_try_run_case+0x14c/0x3d0
[   36.521760]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.522487]  kthread+0x24c/0x2d0
[   36.523028]  ret_from_fork+0x10/0x20
[   36.523523] 
[   36.523977] Allocated by task 254:
[   36.524530]  kasan_save_stack+0x3c/0x68
[   36.525033]  kasan_save_track+0x20/0x40
[   36.525737]  kasan_save_alloc_info+0x40/0x58
[   36.526350]  __kasan_kmalloc+0xd4/0xd8
[   36.527024]  __kmalloc_cache_noprof+0x15c/0x3c0
[   36.527641]  kasan_atomics+0xb8/0x2e8
[   36.528124]  kunit_try_run_case+0x14c/0x3d0
[   36.528808]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.529582]  kthread+0x24c/0x2d0
[   36.530081]  ret_from_fork+0x10/0x20
[   36.530712] 
[   36.531077] The buggy address belongs to the object at fff00000c664f800
[   36.531077]  which belongs to the cache kmalloc-64 of size 64
[   36.532396] The buggy address is located 0 bytes to the right of
[   36.532396]  allocated 48-byte region [fff00000c664f800, fff00000c664f830)
[   36.533840] 
[   36.534236] The buggy address belongs to the physical page:
[   36.535134] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10664f
[   36.536268] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   36.537262] page_type: f5(slab)
[   36.537958] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   36.538846] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   36.539852] page dumped because: kasan: bad access detected
[   36.540552] 
[   36.541105] Memory state around the buggy address:
[   36.541772]  fff00000c664f700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   36.542663]  fff00000c664f780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   36.543546] >fff00000c664f800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   36.544430]                                      ^
[   36.545118]  fff00000c664f880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.546091]  fff00000c664f900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.547024] ==================================================================
[   34.893763] ==================================================================
[   34.894424] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x42d8/0x4858
[   34.896802] Read of size 4 at addr fff00000c664f830 by task kunit_try_catch/254
[   34.897989] 
[   34.898442] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241205 #1
[   34.899560] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.900138] Hardware name: linux,dummy-virt (DT)
[   34.900996] Call trace:
[   34.901603]  show_stack+0x20/0x38 (C)
[   34.902410]  dump_stack_lvl+0x8c/0xd0
[   34.903206]  print_report+0x118/0x5e0
[   34.903818]  kasan_report+0xc8/0x118
[   34.904284]  __asan_report_load4_noabort+0x20/0x30
[   34.905215]  kasan_atomics_helper+0x42d8/0x4858
[   34.905775]  kasan_atomics+0x198/0x2e8
[   34.906349]  kunit_try_run_case+0x14c/0x3d0
[   34.906986]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.907674]  kthread+0x24c/0x2d0
[   34.908264]  ret_from_fork+0x10/0x20
[   34.908779] 
[   34.909138] Allocated by task 254:
[   34.909816]  kasan_save_stack+0x3c/0x68
[   34.910446]  kasan_save_track+0x20/0x40
[   34.911036]  kasan_save_alloc_info+0x40/0x58
[   34.911748]  __kasan_kmalloc+0xd4/0xd8
[   34.912420]  __kmalloc_cache_noprof+0x15c/0x3c0
[   34.912961]  kasan_atomics+0xb8/0x2e8
[   34.913574]  kunit_try_run_case+0x14c/0x3d0
[   34.914273]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.915082]  kthread+0x24c/0x2d0
[   34.915578]  ret_from_fork+0x10/0x20
[   34.916224] 
[   34.916591] The buggy address belongs to the object at fff00000c664f800
[   34.916591]  which belongs to the cache kmalloc-64 of size 64
[   34.918006] The buggy address is located 0 bytes to the right of
[   34.918006]  allocated 48-byte region [fff00000c664f800, fff00000c664f830)
[   34.919445] 
[   34.919726] The buggy address belongs to the physical page:
[   34.920489] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10664f
[   34.921364] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   34.922315] page_type: f5(slab)
[   34.922747] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   34.923705] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   34.924617] page dumped because: kasan: bad access detected
[   34.925318] 
[   34.925627] Memory state around the buggy address:
[   34.926290]  fff00000c664f700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   34.927182]  fff00000c664f780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   34.928125] >fff00000c664f800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   34.928965]                                      ^
[   34.929594]  fff00000c664f880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.930502]  fff00000c664f900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.931325] ==================================================================
[   35.199084] ==================================================================
[   35.200293] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3dbc/0x4858
[   35.201448] Read of size 4 at addr fff00000c664f830 by task kunit_try_catch/254
[   35.202490] 
[   35.202953] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241205 #1
[   35.204337] Tainted: [B]=BAD_PAGE, [N]=TEST
[   35.204912] Hardware name: linux,dummy-virt (DT)
[   35.205509] Call trace:
[   35.206002]  show_stack+0x20/0x38 (C)
[   35.206651]  dump_stack_lvl+0x8c/0xd0
[   35.207289]  print_report+0x118/0x5e0
[   35.207810]  kasan_report+0xc8/0x118
[   35.208453]  __asan_report_load4_noabort+0x20/0x30
[   35.209134]  kasan_atomics_helper+0x3dbc/0x4858
[   35.209761]  kasan_atomics+0x198/0x2e8
[   35.210438]  kunit_try_run_case+0x14c/0x3d0
[   35.211006]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.211841]  kthread+0x24c/0x2d0
[   35.212503]  ret_from_fork+0x10/0x20
[   35.213041] 
[   35.213417] Allocated by task 254:
[   35.213915]  kasan_save_stack+0x3c/0x68
[   35.214436]  kasan_save_track+0x20/0x40
[   35.215203]  kasan_save_alloc_info+0x40/0x58
[   35.215831]  __kasan_kmalloc+0xd4/0xd8
[   35.216333]  __kmalloc_cache_noprof+0x15c/0x3c0
[   35.217111]  kasan_atomics+0xb8/0x2e8
[   35.217649]  kunit_try_run_case+0x14c/0x3d0
[   35.218300]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.219081]  kthread+0x24c/0x2d0
[   35.219702]  ret_from_fork+0x10/0x20
[   35.220333] 
[   35.220642] The buggy address belongs to the object at fff00000c664f800
[   35.220642]  which belongs to the cache kmalloc-64 of size 64
[   35.222088] The buggy address is located 0 bytes to the right of
[   35.222088]  allocated 48-byte region [fff00000c664f800, fff00000c664f830)
[   35.223482] 
[   35.223765] The buggy address belongs to the physical page:
[   35.224523] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10664f
[   35.225601] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   35.226360] page_type: f5(slab)
[   35.226861] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   35.228163] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   35.228900] page dumped because: kasan: bad access detected
[   35.229552] 
[   35.229924] Memory state around the buggy address:
[   35.230630]  fff00000c664f700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.231453]  fff00000c664f780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.232354] >fff00000c664f800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   35.233305]                                      ^
[   35.233920]  fff00000c664f880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.234849]  fff00000c664f900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.235705] ==================================================================
[   34.411566] ==================================================================
[   34.412244] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3ac/0x4858
[   34.414379] Write of size 4 at addr fff00000c664f830 by task kunit_try_catch/254
[   34.415458] 
[   34.415791] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241205 #1
[   34.417032] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.417649] Hardware name: linux,dummy-virt (DT)
[   34.418239] Call trace:
[   34.418630]  show_stack+0x20/0x38 (C)
[   34.419325]  dump_stack_lvl+0x8c/0xd0
[   34.419895]  print_report+0x118/0x5e0
[   34.420454]  kasan_report+0xc8/0x118
[   34.421541]  kasan_check_range+0x100/0x1a8
[   34.422063]  __kasan_check_write+0x20/0x30
[   34.422704]  kasan_atomics_helper+0x3ac/0x4858
[   34.423720]  kasan_atomics+0x198/0x2e8
[   34.424315]  kunit_try_run_case+0x14c/0x3d0
[   34.425003]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.425805]  kthread+0x24c/0x2d0
[   34.426425]  ret_from_fork+0x10/0x20
[   34.427099] 
[   34.427960] Allocated by task 254:
[   34.428611]  kasan_save_stack+0x3c/0x68
[   34.429268]  kasan_save_track+0x20/0x40
[   34.429958]  kasan_save_alloc_info+0x40/0x58
[   34.430847]  __kasan_kmalloc+0xd4/0xd8
[   34.431855]  __kmalloc_cache_noprof+0x15c/0x3c0
[   34.432568]  kasan_atomics+0xb8/0x2e8
[   34.433104]  kunit_try_run_case+0x14c/0x3d0
[   34.433751]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.434356]  kthread+0x24c/0x2d0
[   34.434981]  ret_from_fork+0x10/0x20
[   34.435438] 
[   34.435987] The buggy address belongs to the object at fff00000c664f800
[   34.435987]  which belongs to the cache kmalloc-64 of size 64
[   34.437413] The buggy address is located 0 bytes to the right of
[   34.437413]  allocated 48-byte region [fff00000c664f800, fff00000c664f830)
[   34.438843] 
[   34.439156] The buggy address belongs to the physical page:
[   34.440181] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10664f
[   34.441057] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   34.441923] page_type: f5(slab)
[   34.442569] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   34.443777] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   34.444767] page dumped because: kasan: bad access detected
[   34.445751] 
[   34.446135] Memory state around the buggy address:
[   34.446909]  fff00000c664f700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   34.447698]  fff00000c664f780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   34.448992] >fff00000c664f800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   34.449917]                                      ^
[   34.450664]  fff00000c664f880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.451744]  fff00000c664f900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.452603] ==================================================================
[   35.313851] ==================================================================
[   35.314645] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xca0/0x4858
[   35.315561] Write of size 4 at addr fff00000c664f830 by task kunit_try_catch/254
[   35.316519] 
[   35.316921] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241205 #1
[   35.318029] Tainted: [B]=BAD_PAGE, [N]=TEST
[   35.318697] Hardware name: linux,dummy-virt (DT)
[   35.319328] Call trace:
[   35.319754]  show_stack+0x20/0x38 (C)
[   35.320388]  dump_stack_lvl+0x8c/0xd0
[   35.321118]  print_report+0x118/0x5e0
[   35.321721]  kasan_report+0xc8/0x118
[   35.322366]  kasan_check_range+0x100/0x1a8
[   35.323003]  __kasan_check_write+0x20/0x30
[   35.323697]  kasan_atomics_helper+0xca0/0x4858
[   35.324313]  kasan_atomics+0x198/0x2e8
[   35.324959]  kunit_try_run_case+0x14c/0x3d0
[   35.325758]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.326592]  kthread+0x24c/0x2d0
[   35.327094]  ret_from_fork+0x10/0x20
[   35.327650] 
[   35.328063] Allocated by task 254:
[   35.328529]  kasan_save_stack+0x3c/0x68
[   35.329216]  kasan_save_track+0x20/0x40
[   35.329825]  kasan_save_alloc_info+0x40/0x58
[   35.330463]  __kasan_kmalloc+0xd4/0xd8
[   35.331002]  __kmalloc_cache_noprof+0x15c/0x3c0
[   35.331701]  kasan_atomics+0xb8/0x2e8
[   35.332164]  kunit_try_run_case+0x14c/0x3d0
[   35.332830]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.333600]  kthread+0x24c/0x2d0
[   35.334143]  ret_from_fork+0x10/0x20
[   35.334719] 
[   35.335022] The buggy address belongs to the object at fff00000c664f800
[   35.335022]  which belongs to the cache kmalloc-64 of size 64
[   35.336431] The buggy address is located 0 bytes to the right of
[   35.336431]  allocated 48-byte region [fff00000c664f800, fff00000c664f830)
[   35.337794] 
[   35.338096] The buggy address belongs to the physical page:
[   35.338812] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10664f
[   35.339835] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   35.340750] page_type: f5(slab)
[   35.341332] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   35.342284] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   35.343170] page dumped because: kasan: bad access detected
[   35.343834] 
[   35.344240] Memory state around the buggy address:
[   35.344913]  fff00000c664f700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.345756]  fff00000c664f780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.346729] >fff00000c664f800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   35.347564]                                      ^
[   35.348213]  fff00000c664f880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.349147]  fff00000c664f900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.350026] ==================================================================
[   35.620138] ==================================================================
[   35.621157] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xeb8/0x4858
[   35.621556] Write of size 8 at addr fff00000c664f830 by task kunit_try_catch/254
[   35.622036] 
[   35.622411] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241205 #1
[   35.623767] Tainted: [B]=BAD_PAGE, [N]=TEST
[   35.624340] Hardware name: linux,dummy-virt (DT)
[   35.625126] Call trace:
[   35.625523]  show_stack+0x20/0x38 (C)
[   35.626149]  dump_stack_lvl+0x8c/0xd0
[   35.626802]  print_report+0x118/0x5e0
[   35.627452]  kasan_report+0xc8/0x118
[   35.628131]  kasan_check_range+0x100/0x1a8
[   35.628712]  __kasan_check_write+0x20/0x30
[   35.629438]  kasan_atomics_helper+0xeb8/0x4858
[   35.630052]  kasan_atomics+0x198/0x2e8
[   35.630743]  kunit_try_run_case+0x14c/0x3d0
[   35.631281]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.632150]  kthread+0x24c/0x2d0
[   35.632727]  ret_from_fork+0x10/0x20
[   35.633368] 
[   35.633698] Allocated by task 254:
[   35.634134]  kasan_save_stack+0x3c/0x68
[   35.634828]  kasan_save_track+0x20/0x40
[   35.635499]  kasan_save_alloc_info+0x40/0x58
[   35.636205]  __kasan_kmalloc+0xd4/0xd8
[   35.636776]  __kmalloc_cache_noprof+0x15c/0x3c0
[   35.637333]  kasan_atomics+0xb8/0x2e8
[   35.638013]  kunit_try_run_case+0x14c/0x3d0
[   35.638622]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.639381]  kthread+0x24c/0x2d0
[   35.639860]  ret_from_fork+0x10/0x20
[   35.640417] 
[   35.640757] The buggy address belongs to the object at fff00000c664f800
[   35.640757]  which belongs to the cache kmalloc-64 of size 64
[   35.642185] The buggy address is located 0 bytes to the right of
[   35.642185]  allocated 48-byte region [fff00000c664f800, fff00000c664f830)
[   35.643609] 
[   35.643929] The buggy address belongs to the physical page:
[   35.644862] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10664f
[   35.645782] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   35.646585] page_type: f5(slab)
[   35.647115] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   35.648046] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   35.649049] page dumped because: kasan: bad access detected
[   35.649668] 
[   35.650043] Memory state around the buggy address:
[   35.650572]  fff00000c664f700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.651563]  fff00000c664f780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.652393] >fff00000c664f800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   35.653347]                                      ^
[   35.654010]  fff00000c664f880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.654850]  fff00000c664f900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.655705] ==================================================================
[   35.851988] ==================================================================
[   35.852813] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1128/0x4858
[   35.853620] Write of size 8 at addr fff00000c664f830 by task kunit_try_catch/254
[   35.854401] 
[   35.854810] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241205 #1
[   35.856039] Tainted: [B]=BAD_PAGE, [N]=TEST
[   35.856676] Hardware name: linux,dummy-virt (DT)
[   35.857363] Call trace:
[   35.857840]  show_stack+0x20/0x38 (C)
[   35.858435]  dump_stack_lvl+0x8c/0xd0
[   35.859100]  print_report+0x118/0x5e0
[   35.859772]  kasan_report+0xc8/0x118
[   35.860427]  kasan_check_range+0x100/0x1a8
[   35.861039]  __kasan_check_write+0x20/0x30
[   35.861738]  kasan_atomics_helper+0x1128/0x4858
[   35.862417]  kasan_atomics+0x198/0x2e8
[   35.863038]  kunit_try_run_case+0x14c/0x3d0
[   35.863631]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.864340]  kthread+0x24c/0x2d0
[   35.864921]  ret_from_fork+0x10/0x20
[   35.865493] 
[   35.865769] Allocated by task 254:
[   35.866348]  kasan_save_stack+0x3c/0x68
[   35.866944]  kasan_save_track+0x20/0x40
[   35.867569]  kasan_save_alloc_info+0x40/0x58
[   35.868118]  __kasan_kmalloc+0xd4/0xd8
[   35.868756]  __kmalloc_cache_noprof+0x15c/0x3c0
[   35.869309]  kasan_atomics+0xb8/0x2e8
[   35.870083]  kunit_try_run_case+0x14c/0x3d0
[   35.870594]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.871444]  kthread+0x24c/0x2d0
[   35.871974]  ret_from_fork+0x10/0x20
[   35.872513] 
[   35.872839] The buggy address belongs to the object at fff00000c664f800
[   35.872839]  which belongs to the cache kmalloc-64 of size 64
[   35.874311] The buggy address is located 0 bytes to the right of
[   35.874311]  allocated 48-byte region [fff00000c664f800, fff00000c664f830)
[   35.875763] 
[   35.876129] The buggy address belongs to the physical page:
[   35.876919] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10664f
[   35.877761] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   35.878674] page_type: f5(slab)
[   35.879197] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   35.880131] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   35.881082] page dumped because: kasan: bad access detected
[   35.881731] 
[   35.882111] Memory state around the buggy address:
[   35.882777]  fff00000c664f700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.883628]  fff00000c664f780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.884452] >fff00000c664f800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   35.885374]                                      ^
[   35.885967]  fff00000c664f880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.886860]  fff00000c664f900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.887692] ==================================================================
[   35.657214] ==================================================================
[   35.658033] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf20/0x4858
[   35.659141] Write of size 8 at addr fff00000c664f830 by task kunit_try_catch/254
[   35.660308] 
[   35.660672] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241205 #1
[   35.661868] Tainted: [B]=BAD_PAGE, [N]=TEST
[   35.662525] Hardware name: linux,dummy-virt (DT)
[   35.663141] Call trace:
[   35.663675]  show_stack+0x20/0x38 (C)
[   35.664340]  dump_stack_lvl+0x8c/0xd0
[   35.664947]  print_report+0x118/0x5e0
[   35.665524]  kasan_report+0xc8/0x118
[   35.666088]  kasan_check_range+0x100/0x1a8
[   35.666687]  __kasan_check_write+0x20/0x30
[   35.667458]  kasan_atomics_helper+0xf20/0x4858
[   35.668092]  kasan_atomics+0x198/0x2e8
[   35.668734]  kunit_try_run_case+0x14c/0x3d0
[   35.669390]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.670196]  kthread+0x24c/0x2d0
[   35.670822]  ret_from_fork+0x10/0x20
[   35.671377] 
[   35.671713] Allocated by task 254:
[   35.672205]  kasan_save_stack+0x3c/0x68
[   35.672846]  kasan_save_track+0x20/0x40
[   35.673423]  kasan_save_alloc_info+0x40/0x58
[   35.673972]  __kasan_kmalloc+0xd4/0xd8
[   35.674645]  __kmalloc_cache_noprof+0x15c/0x3c0
[   35.675298]  kasan_atomics+0xb8/0x2e8
[   35.675951]  kunit_try_run_case+0x14c/0x3d0
[   35.676581]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.677437]  kthread+0x24c/0x2d0
[   35.677951]  ret_from_fork+0x10/0x20
[   35.678421] 
[   35.678824] The buggy address belongs to the object at fff00000c664f800
[   35.678824]  which belongs to the cache kmalloc-64 of size 64
[   35.680262] The buggy address is located 0 bytes to the right of
[   35.680262]  allocated 48-byte region [fff00000c664f800, fff00000c664f830)
[   35.681680] 
[   35.682088] The buggy address belongs to the physical page:
[   35.682906] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10664f
[   35.683805] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   35.684607] page_type: f5(slab)
[   35.685182] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   35.686142] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   35.687138] page dumped because: kasan: bad access detected
[   35.687799] 
[   35.688138] Memory state around the buggy address:
[   35.688744]  fff00000c664f700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.689588]  fff00000c664f780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.690457] >fff00000c664f800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   35.691416]                                      ^
[   35.692050]  fff00000c664f880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.692936]  fff00000c664f900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.693758] ==================================================================
[   35.083957] ==================================================================
[   35.084681] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xad4/0x4858
[   35.085662] Write of size 4 at addr fff00000c664f830 by task kunit_try_catch/254
[   35.086505] 
[   35.086899] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241205 #1
[   35.088188] Tainted: [B]=BAD_PAGE, [N]=TEST
[   35.088679] Hardware name: linux,dummy-virt (DT)
[   35.089436] Call trace:
[   35.089867]  show_stack+0x20/0x38 (C)
[   35.090528]  dump_stack_lvl+0x8c/0xd0
[   35.091219]  print_report+0x118/0x5e0
[   35.091762]  kasan_report+0xc8/0x118
[   35.092521]  kasan_check_range+0x100/0x1a8
[   35.093104]  __kasan_check_write+0x20/0x30
[   35.093839]  kasan_atomics_helper+0xad4/0x4858
[   35.094598]  kasan_atomics+0x198/0x2e8
[   35.095156]  kunit_try_run_case+0x14c/0x3d0
[   35.095778]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.096461]  kthread+0x24c/0x2d0
[   35.097110]  ret_from_fork+0x10/0x20
[   35.097695] 
[   35.098053] Allocated by task 254:
[   35.098615]  kasan_save_stack+0x3c/0x68
[   35.099229]  kasan_save_track+0x20/0x40
[   35.099689]  kasan_save_alloc_info+0x40/0x58
[   35.100383]  __kasan_kmalloc+0xd4/0xd8
[   35.100982]  __kmalloc_cache_noprof+0x15c/0x3c0
[   35.101496]  kasan_atomics+0xb8/0x2e8
[   35.102149]  kunit_try_run_case+0x14c/0x3d0
[   35.102772]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.103543]  kthread+0x24c/0x2d0
[   35.104145]  ret_from_fork+0x10/0x20
[   35.104650] 
[   35.104985] The buggy address belongs to the object at fff00000c664f800
[   35.104985]  which belongs to the cache kmalloc-64 of size 64
[   35.106394] The buggy address is located 0 bytes to the right of
[   35.106394]  allocated 48-byte region [fff00000c664f800, fff00000c664f830)
[   35.107827] 
[   35.108196] The buggy address belongs to the physical page:
[   35.109097] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10664f
[   35.109959] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   35.110905] page_type: f5(slab)
[   35.111406] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   35.112362] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   35.113377] page dumped because: kasan: bad access detected
[   35.114058] 
[   35.114424] Memory state around the buggy address:
[   35.115258]  fff00000c664f700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.116043]  fff00000c664f780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.116963] >fff00000c664f800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   35.117797]                                      ^
[   35.118408]  fff00000c664f880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.119344]  fff00000c664f900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.120189] ==================================================================
[   34.368641] ==================================================================
[   34.369533] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f94/0x4858
[   34.370541] Write of size 4 at addr fff00000c664f830 by task kunit_try_catch/254
[   34.372217] 
[   34.372708] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241205 #1
[   34.373842] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.374531] Hardware name: linux,dummy-virt (DT)
[   34.375035] Call trace:
[   34.375626]  show_stack+0x20/0x38 (C)
[   34.376256]  dump_stack_lvl+0x8c/0xd0
[   34.376866]  print_report+0x118/0x5e0
[   34.377441]  kasan_report+0xc8/0x118
[   34.378236]  __asan_report_store4_noabort+0x20/0x30
[   34.378938]  kasan_atomics_helper+0x3f94/0x4858
[   34.380306]  kasan_atomics+0x198/0x2e8
[   34.380866]  kunit_try_run_case+0x14c/0x3d0
[   34.381523]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.382340]  kthread+0x24c/0x2d0
[   34.382994]  ret_from_fork+0x10/0x20
[   34.383824] 
[   34.384260] Allocated by task 254:
[   34.384616]  kasan_save_stack+0x3c/0x68
[   34.385327]  kasan_save_track+0x20/0x40
[   34.385897]  kasan_save_alloc_info+0x40/0x58
[   34.386649]  __kasan_kmalloc+0xd4/0xd8
[   34.387270]  __kmalloc_cache_noprof+0x15c/0x3c0
[   34.388385]  kasan_atomics+0xb8/0x2e8
[   34.389482]  kunit_try_run_case+0x14c/0x3d0
[   34.390080]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.391045]  kthread+0x24c/0x2d0
[   34.391595]  ret_from_fork+0x10/0x20
[   34.392179] 
[   34.392533] The buggy address belongs to the object at fff00000c664f800
[   34.392533]  which belongs to the cache kmalloc-64 of size 64
[   34.394037] The buggy address is located 0 bytes to the right of
[   34.394037]  allocated 48-byte region [fff00000c664f800, fff00000c664f830)
[   34.395916] 
[   34.396630] The buggy address belongs to the physical page:
[   34.397238] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10664f
[   34.398386] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   34.399422] page_type: f5(slab)
[   34.399958] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   34.401461] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   34.402513] page dumped because: kasan: bad access detected
[   34.403657] 
[   34.404074] Memory state around the buggy address:
[   34.405161]  fff00000c664f700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   34.405581]  fff00000c664f780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   34.406386] >fff00000c664f800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   34.407800]                                      ^
[   34.408466]  fff00000c664f880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.409248]  fff00000c664f900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.410138] ==================================================================
[   36.195622] ==================================================================
[   36.196200] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x14e4/0x4858
[   36.197759] Write of size 8 at addr fff00000c664f830 by task kunit_try_catch/254
[   36.198839] 
[   36.199429] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241205 #1
[   36.200679] Tainted: [B]=BAD_PAGE, [N]=TEST
[   36.201327] Hardware name: linux,dummy-virt (DT)
[   36.202042] Call trace:
[   36.202520]  show_stack+0x20/0x38 (C)
[   36.203262]  dump_stack_lvl+0x8c/0xd0
[   36.203896]  print_report+0x118/0x5e0
[   36.204469]  kasan_report+0xc8/0x118
[   36.205103]  kasan_check_range+0x100/0x1a8
[   36.205703]  __kasan_check_write+0x20/0x30
[   36.206426]  kasan_atomics_helper+0x14e4/0x4858
[   36.207042]  kasan_atomics+0x198/0x2e8
[   36.207711]  kunit_try_run_case+0x14c/0x3d0
[   36.208368]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.209026]  kthread+0x24c/0x2d0
[   36.209700]  ret_from_fork+0x10/0x20
[   36.210297] 
[   36.210611] Allocated by task 254:
[   36.211233]  kasan_save_stack+0x3c/0x68
[   36.211738]  kasan_save_track+0x20/0x40
[   36.212398]  kasan_save_alloc_info+0x40/0x58
[   36.212950]  __kasan_kmalloc+0xd4/0xd8
[   36.213644]  __kmalloc_cache_noprof+0x15c/0x3c0
[   36.214243]  kasan_atomics+0xb8/0x2e8
[   36.214946]  kunit_try_run_case+0x14c/0x3d0
[   36.215538]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.216170]  kthread+0x24c/0x2d0
[   36.216717]  ret_from_fork+0x10/0x20
[   36.217278] 
[   36.217602] The buggy address belongs to the object at fff00000c664f800
[   36.217602]  which belongs to the cache kmalloc-64 of size 64
[   36.219056] The buggy address is located 0 bytes to the right of
[   36.219056]  allocated 48-byte region [fff00000c664f800, fff00000c664f830)
[   36.220401] 
[   36.220723] The buggy address belongs to the physical page:
[   36.221556] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10664f
[   36.222439] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   36.223242] page_type: f5(slab)
[   36.223779] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   36.224675] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   36.225633] page dumped because: kasan: bad access detected
[   36.226321] 
[   36.226623] Memory state around the buggy address:
[   36.227283]  fff00000c664f700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   36.228143]  fff00000c664f780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   36.229034] >fff00000c664f800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   36.229897]                                      ^
[   36.230497]  fff00000c664f880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.231480]  fff00000c664f900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.232196] ==================================================================
[   36.470332] ==================================================================
[   36.471422] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e10/0x4858
[   36.472128] Read of size 8 at addr fff00000c664f830 by task kunit_try_catch/254
[   36.472896] 
[   36.473388] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241205 #1
[   36.474475] Tainted: [B]=BAD_PAGE, [N]=TEST
[   36.475164] Hardware name: linux,dummy-virt (DT)
[   36.475796] Call trace:
[   36.476242]  show_stack+0x20/0x38 (C)
[   36.476748]  dump_stack_lvl+0x8c/0xd0
[   36.477414]  print_report+0x118/0x5e0
[   36.477924]  kasan_report+0xc8/0x118
[   36.478586]  __asan_report_load8_noabort+0x20/0x30
[   36.479298]  kasan_atomics_helper+0x3e10/0x4858
[   36.479964]  kasan_atomics+0x198/0x2e8
[   36.480631]  kunit_try_run_case+0x14c/0x3d0
[   36.481165]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.481989]  kthread+0x24c/0x2d0
[   36.482527]  ret_from_fork+0x10/0x20
[   36.483085] 
[   36.483398] Allocated by task 254:
[   36.484013]  kasan_save_stack+0x3c/0x68
[   36.484611]  kasan_save_track+0x20/0x40
[   36.485140]  kasan_save_alloc_info+0x40/0x58
[   36.485849]  __kasan_kmalloc+0xd4/0xd8
[   36.486570]  __kmalloc_cache_noprof+0x15c/0x3c0
[   36.487132]  kasan_atomics+0xb8/0x2e8
[   36.487786]  kunit_try_run_case+0x14c/0x3d0
[   36.488454]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.489221]  kthread+0x24c/0x2d0
[   36.489728]  ret_from_fork+0x10/0x20
[   36.490288] 
[   36.490726] The buggy address belongs to the object at fff00000c664f800
[   36.490726]  which belongs to the cache kmalloc-64 of size 64
[   36.492095] The buggy address is located 0 bytes to the right of
[   36.492095]  allocated 48-byte region [fff00000c664f800, fff00000c664f830)
[   36.493543] 
[   36.493946] The buggy address belongs to the physical page:
[   36.494535] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10664f
[   36.495645] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   36.496512] page_type: f5(slab)
[   36.496956] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   36.497966] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   36.498942] page dumped because: kasan: bad access detected
[   36.499552] 
[   36.499921] Memory state around the buggy address:
[   36.500569]  fff00000c664f700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   36.501431]  fff00000c664f780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   36.502258] >fff00000c664f800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   36.503214]                                      ^
[   36.503932]  fff00000c664f880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.504847]  fff00000c664f900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.505703] ==================================================================
[   35.046785] ==================================================================
[   35.047482] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa6c/0x4858
[   35.048634] Write of size 4 at addr fff00000c664f830 by task kunit_try_catch/254
[   35.049557] 
[   35.050042] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241205 #1
[   35.051093] Tainted: [B]=BAD_PAGE, [N]=TEST
[   35.051440] Hardware name: linux,dummy-virt (DT)
[   35.051744] Call trace:
[   35.052141]  show_stack+0x20/0x38 (C)
[   35.052953]  dump_stack_lvl+0x8c/0xd0
[   35.053766]  print_report+0x118/0x5e0
[   35.054383]  kasan_report+0xc8/0x118
[   35.055005]  kasan_check_range+0x100/0x1a8
[   35.055702]  __kasan_check_write+0x20/0x30
[   35.056381]  kasan_atomics_helper+0xa6c/0x4858
[   35.057148]  kasan_atomics+0x198/0x2e8
[   35.057820]  kunit_try_run_case+0x14c/0x3d0
[   35.058453]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.059220]  kthread+0x24c/0x2d0
[   35.059845]  ret_from_fork+0x10/0x20
[   35.060403] 
[   35.060747] Allocated by task 254:
[   35.061223]  kasan_save_stack+0x3c/0x68
[   35.061839]  kasan_save_track+0x20/0x40
[   35.062420]  kasan_save_alloc_info+0x40/0x58
[   35.063062]  __kasan_kmalloc+0xd4/0xd8
[   35.063576]  __kmalloc_cache_noprof+0x15c/0x3c0
[   35.064279]  kasan_atomics+0xb8/0x2e8
[   35.064752]  kunit_try_run_case+0x14c/0x3d0
[   35.065490]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.066131]  kthread+0x24c/0x2d0
[   35.066693]  ret_from_fork+0x10/0x20
[   35.067200] 
[   35.067594] The buggy address belongs to the object at fff00000c664f800
[   35.067594]  which belongs to the cache kmalloc-64 of size 64
[   35.069063] The buggy address is located 0 bytes to the right of
[   35.069063]  allocated 48-byte region [fff00000c664f800, fff00000c664f830)
[   35.070494] 
[   35.070814] The buggy address belongs to the physical page:
[   35.071456] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10664f
[   35.072476] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   35.073319] page_type: f5(slab)
[   35.073845] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   35.074832] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   35.075763] page dumped because: kasan: bad access detected
[   35.076472] 
[   35.076837] Memory state around the buggy address:
[   35.077445]  fff00000c664f700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.078192]  fff00000c664f780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.079268] >fff00000c664f800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   35.080091]                                      ^
[   35.080700]  fff00000c664f880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.081591]  fff00000c664f900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.082498] ==================================================================
[   35.122200] ==================================================================
[   35.122922] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3dcc/0x4858
[   35.123969] Read of size 4 at addr fff00000c664f830 by task kunit_try_catch/254
[   35.125148] 
[   35.125524] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241205 #1
[   35.126983] Tainted: [B]=BAD_PAGE, [N]=TEST
[   35.127600] Hardware name: linux,dummy-virt (DT)
[   35.128163] Call trace:
[   35.128379]  show_stack+0x20/0x38 (C)
[   35.128672]  dump_stack_lvl+0x8c/0xd0
[   35.129053]  print_report+0x118/0x5e0
[   35.129995]  kasan_report+0xc8/0x118
[   35.130627]  __asan_report_load4_noabort+0x20/0x30
[   35.131400]  kasan_atomics_helper+0x3dcc/0x4858
[   35.132195]  kasan_atomics+0x198/0x2e8
[   35.132722]  kunit_try_run_case+0x14c/0x3d0
[   35.133514]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.134342]  kthread+0x24c/0x2d0
[   35.134976]  ret_from_fork+0x10/0x20
[   35.135605] 
[   35.136010] Allocated by task 254:
[   35.136600]  kasan_save_stack+0x3c/0x68
[   35.137293]  kasan_save_track+0x20/0x40
[   35.138019]  kasan_save_alloc_info+0x40/0x58
[   35.138710]  __kasan_kmalloc+0xd4/0xd8
[   35.139373]  __kmalloc_cache_noprof+0x15c/0x3c0
[   35.140079]  kasan_atomics+0xb8/0x2e8
[   35.140682]  kunit_try_run_case+0x14c/0x3d0
[   35.141326]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.142135]  kthread+0x24c/0x2d0
[   35.142680]  ret_from_fork+0x10/0x20
[   35.143297] 
[   35.143702] The buggy address belongs to the object at fff00000c664f800
[   35.143702]  which belongs to the cache kmalloc-64 of size 64
[   35.145215] The buggy address is located 0 bytes to the right of
[   35.145215]  allocated 48-byte region [fff00000c664f800, fff00000c664f830)
[   35.146824] 
[   35.147256] The buggy address belongs to the physical page:
[   35.147980] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10664f
[   35.149054] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   35.149938] page_type: f5(slab)
[   35.150524] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   35.151492] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   35.152433] page dumped because: kasan: bad access detected
[   35.153214] 
[   35.153545] Memory state around the buggy address:
[   35.154341]  fff00000c664f700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.155244]  fff00000c664f780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.156203] >fff00000c664f800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   35.156969]                                      ^
[   35.157555]  fff00000c664f880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.158706]  fff00000c664f900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.159574] ==================================================================
[   35.733422] ==================================================================
[   35.734196] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xff0/0x4858
[   35.735134] Write of size 8 at addr fff00000c664f830 by task kunit_try_catch/254
[   35.736522] 
[   35.736909] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241205 #1
[   35.738110] Tainted: [B]=BAD_PAGE, [N]=TEST
[   35.738639] Hardware name: linux,dummy-virt (DT)
[   35.739244] Call trace:
[   35.739708]  show_stack+0x20/0x38 (C)
[   35.740280]  dump_stack_lvl+0x8c/0xd0
[   35.740762]  print_report+0x118/0x5e0
[   35.741444]  kasan_report+0xc8/0x118
[   35.742034]  kasan_check_range+0x100/0x1a8
[   35.742637]  __kasan_check_write+0x20/0x30
[   35.743222]  kasan_atomics_helper+0xff0/0x4858
[   35.743926]  kasan_atomics+0x198/0x2e8
[   35.744595]  kunit_try_run_case+0x14c/0x3d0
[   35.745160]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.746047]  kthread+0x24c/0x2d0
[   35.746649]  ret_from_fork+0x10/0x20
[   35.747244] 
[   35.747555] Allocated by task 254:
[   35.748144]  kasan_save_stack+0x3c/0x68
[   35.748658]  kasan_save_track+0x20/0x40
[   35.749289]  kasan_save_alloc_info+0x40/0x58
[   35.749903]  __kasan_kmalloc+0xd4/0xd8
[   35.750489]  __kmalloc_cache_noprof+0x15c/0x3c0
[   35.751112]  kasan_atomics+0xb8/0x2e8
[   35.751635]  kunit_try_run_case+0x14c/0x3d0
[   35.752240]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.752976]  kthread+0x24c/0x2d0
[   35.753488]  ret_from_fork+0x10/0x20
[   35.754037] 
[   35.754351] The buggy address belongs to the object at fff00000c664f800
[   35.754351]  which belongs to the cache kmalloc-64 of size 64
[   35.755750] The buggy address is located 0 bytes to the right of
[   35.755750]  allocated 48-byte region [fff00000c664f800, fff00000c664f830)
[   35.757235] 
[   35.757564] The buggy address belongs to the physical page:
[   35.758281] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10664f
[   35.759252] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   35.760186] page_type: f5(slab)
[   35.760739] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   35.761657] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   35.762604] page dumped because: kasan: bad access detected
[   35.763282] 
[   35.763617] Memory state around the buggy address:
[   35.764268]  fff00000c664f700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.765074]  fff00000c664f780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.766000] >fff00000c664f800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   35.766861]                                      ^
[   35.767510]  fff00000c664f880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.768415]  fff00000c664f900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.769308] ==================================================================
[   36.119828] ==================================================================
[   36.120465] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1414/0x4858
[   36.121609] Write of size 8 at addr fff00000c664f830 by task kunit_try_catch/254
[   36.122458] 
[   36.122767] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241205 #1
[   36.124027] Tainted: [B]=BAD_PAGE, [N]=TEST
[   36.124586] Hardware name: linux,dummy-virt (DT)
[   36.125269] Call trace:
[   36.125794]  show_stack+0x20/0x38 (C)
[   36.126389]  dump_stack_lvl+0x8c/0xd0
[   36.127126]  print_report+0x118/0x5e0
[   36.127673]  kasan_report+0xc8/0x118
[   36.128274]  kasan_check_range+0x100/0x1a8
[   36.128826]  __kasan_check_write+0x20/0x30
[   36.129578]  kasan_atomics_helper+0x1414/0x4858
[   36.130329]  kasan_atomics+0x198/0x2e8
[   36.130914]  kunit_try_run_case+0x14c/0x3d0
[   36.131564]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.132221]  kthread+0x24c/0x2d0
[   36.132862]  ret_from_fork+0x10/0x20
[   36.133391] 
[   36.133761] Allocated by task 254:
[   36.134321]  kasan_save_stack+0x3c/0x68
[   36.134893]  kasan_save_track+0x20/0x40
[   36.135426]  kasan_save_alloc_info+0x40/0x58
[   36.136112]  __kasan_kmalloc+0xd4/0xd8
[   36.136665]  __kmalloc_cache_noprof+0x15c/0x3c0
[   36.137576]  kasan_atomics+0xb8/0x2e8
[   36.138339]  kunit_try_run_case+0x14c/0x3d0
[   36.139253]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.139948]  kthread+0x24c/0x2d0
[   36.140404]  ret_from_fork+0x10/0x20
[   36.141002] 
[   36.141361] The buggy address belongs to the object at fff00000c664f800
[   36.141361]  which belongs to the cache kmalloc-64 of size 64
[   36.142746] The buggy address is located 0 bytes to the right of
[   36.142746]  allocated 48-byte region [fff00000c664f800, fff00000c664f830)
[   36.144159] 
[   36.144458] The buggy address belongs to the physical page:
[   36.145175] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10664f
[   36.146249] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   36.146960] page_type: f5(slab)
[   36.147524] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   36.148443] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   36.149358] page dumped because: kasan: bad access detected
[   36.150045] 
[   36.150339] Memory state around the buggy address:
[   36.151023]  fff00000c664f700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   36.151832]  fff00000c664f780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   36.152664] >fff00000c664f800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   36.153535]                                      ^
[   36.154202]  fff00000c664f880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.155084]  fff00000c664f900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.155936] ==================================================================
[   36.157729] ==================================================================
[   36.158473] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x147c/0x4858
[   36.160311] Write of size 8 at addr fff00000c664f830 by task kunit_try_catch/254
[   36.161166] 
[   36.161556] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241205 #1
[   36.162778] Tainted: [B]=BAD_PAGE, [N]=TEST
[   36.163321] Hardware name: linux,dummy-virt (DT)
[   36.163917] Call trace:
[   36.164320]  show_stack+0x20/0x38 (C)
[   36.164929]  dump_stack_lvl+0x8c/0xd0
[   36.165495]  print_report+0x118/0x5e0
[   36.166110]  kasan_report+0xc8/0x118
[   36.166768]  kasan_check_range+0x100/0x1a8
[   36.167339]  __kasan_check_write+0x20/0x30
[   36.168111]  kasan_atomics_helper+0x147c/0x4858
[   36.168668]  kasan_atomics+0x198/0x2e8
[   36.169070]  kunit_try_run_case+0x14c/0x3d0
[   36.169747]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.170503]  kthread+0x24c/0x2d0
[   36.171038]  ret_from_fork+0x10/0x20
[   36.171510] 
[   36.171892] Allocated by task 254:
[   36.172524]  kasan_save_stack+0x3c/0x68
[   36.173108]  kasan_save_track+0x20/0x40
[   36.173621]  kasan_save_alloc_info+0x40/0x58
[   36.174355]  __kasan_kmalloc+0xd4/0xd8
[   36.174947]  __kmalloc_cache_noprof+0x15c/0x3c0
[   36.175531]  kasan_atomics+0xb8/0x2e8
[   36.176126]  kunit_try_run_case+0x14c/0x3d0
[   36.176730]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.177492]  kthread+0x24c/0x2d0
[   36.178068]  ret_from_fork+0x10/0x20
[   36.178595] 
[   36.178978] The buggy address belongs to the object at fff00000c664f800
[   36.178978]  which belongs to the cache kmalloc-64 of size 64
[   36.180347] The buggy address is located 0 bytes to the right of
[   36.180347]  allocated 48-byte region [fff00000c664f800, fff00000c664f830)
[   36.181852] 
[   36.182201] The buggy address belongs to the physical page:
[   36.183105] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10664f
[   36.183927] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   36.184793] page_type: f5(slab)
[   36.185311] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   36.186216] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   36.187172] page dumped because: kasan: bad access detected
[   36.187854] 
[   36.188208] Memory state around the buggy address:
[   36.188944]  fff00000c664f700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   36.189786]  fff00000c664f780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   36.190620] >fff00000c664f800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   36.191529]                                      ^
[   36.192299]  fff00000c664f880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.193168]  fff00000c664f900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.194039] ==================================================================
[   36.082083] ==================================================================
[   36.082947] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f04/0x4858
[   36.084074] Read of size 8 at addr fff00000c664f830 by task kunit_try_catch/254
[   36.084892] 
[   36.085283] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241205 #1
[   36.086498] Tainted: [B]=BAD_PAGE, [N]=TEST
[   36.087065] Hardware name: linux,dummy-virt (DT)
[   36.087791] Call trace:
[   36.088317]  show_stack+0x20/0x38 (C)
[   36.088824]  dump_stack_lvl+0x8c/0xd0
[   36.089553]  print_report+0x118/0x5e0
[   36.090150]  kasan_report+0xc8/0x118
[   36.090891]  __asan_report_load8_noabort+0x20/0x30
[   36.091562]  kasan_atomics_helper+0x3f04/0x4858
[   36.092297]  kasan_atomics+0x198/0x2e8
[   36.092900]  kunit_try_run_case+0x14c/0x3d0
[   36.093592]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.094362]  kthread+0x24c/0x2d0
[   36.095032]  ret_from_fork+0x10/0x20
[   36.095671] 
[   36.096100] Allocated by task 254:
[   36.096533]  kasan_save_stack+0x3c/0x68
[   36.097259]  kasan_save_track+0x20/0x40
[   36.097801]  kasan_save_alloc_info+0x40/0x58
[   36.098385]  __kasan_kmalloc+0xd4/0xd8
[   36.099041]  __kmalloc_cache_noprof+0x15c/0x3c0
[   36.099833]  kasan_atomics+0xb8/0x2e8
[   36.100362]  kunit_try_run_case+0x14c/0x3d0
[   36.101065]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.101814]  kthread+0x24c/0x2d0
[   36.102331]  ret_from_fork+0x10/0x20
[   36.102844] 
[   36.103219] The buggy address belongs to the object at fff00000c664f800
[   36.103219]  which belongs to the cache kmalloc-64 of size 64
[   36.104684] The buggy address is located 0 bytes to the right of
[   36.104684]  allocated 48-byte region [fff00000c664f800, fff00000c664f830)
[   36.106067] 
[   36.106393] The buggy address belongs to the physical page:
[   36.107078] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10664f
[   36.108021] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   36.108965] page_type: f5(slab)
[   36.109506] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   36.110529] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   36.111457] page dumped because: kasan: bad access detected
[   36.112228] 
[   36.112535] Memory state around the buggy address:
[   36.113190]  fff00000c664f700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   36.114094]  fff00000c664f780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   36.115018] >fff00000c664f800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   36.115819]                                      ^
[   36.116489]  fff00000c664f880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.117358]  fff00000c664f900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.118203] ==================================================================
[   34.686837] ==================================================================
[   34.687661] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x684/0x4858
[   34.688511] Write of size 4 at addr fff00000c664f830 by task kunit_try_catch/254
[   34.689418] 
[   34.689917] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241205 #1
[   34.691470] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.692137] Hardware name: linux,dummy-virt (DT)
[   34.692796] Call trace:
[   34.693270]  show_stack+0x20/0x38 (C)
[   34.693983]  dump_stack_lvl+0x8c/0xd0
[   34.694665]  print_report+0x118/0x5e0
[   34.695340]  kasan_report+0xc8/0x118
[   34.695972]  kasan_check_range+0x100/0x1a8
[   34.696665]  __kasan_check_write+0x20/0x30
[   34.697357]  kasan_atomics_helper+0x684/0x4858
[   34.698064]  kasan_atomics+0x198/0x2e8
[   34.698735]  kunit_try_run_case+0x14c/0x3d0
[   34.699488]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.700297]  kthread+0x24c/0x2d0
[   34.700977]  ret_from_fork+0x10/0x20
[   34.701607] 
[   34.701901] Allocated by task 254:
[   34.702459]  kasan_save_stack+0x3c/0x68
[   34.703157]  kasan_save_track+0x20/0x40
[   34.703791]  kasan_save_alloc_info+0x40/0x58
[   34.704455]  __kasan_kmalloc+0xd4/0xd8
[   34.705155]  __kmalloc_cache_noprof+0x15c/0x3c0
[   34.705864]  kasan_atomics+0xb8/0x2e8
[   34.706487]  kunit_try_run_case+0x14c/0x3d0
[   34.707145]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.707951]  kthread+0x24c/0x2d0
[   34.708509]  ret_from_fork+0x10/0x20
[   34.709126] 
[   34.709570] The buggy address belongs to the object at fff00000c664f800
[   34.709570]  which belongs to the cache kmalloc-64 of size 64
[   34.710985] The buggy address is located 0 bytes to the right of
[   34.710985]  allocated 48-byte region [fff00000c664f800, fff00000c664f830)
[   34.712506] 
[   34.712953] The buggy address belongs to the physical page:
[   34.713756] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10664f
[   34.714813] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   34.715743] page_type: f5(slab)
[   34.716287] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   34.717337] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   34.718277] page dumped because: kasan: bad access detected
[   34.719112] 
[   34.719464] Memory state around the buggy address:
[   34.720215]  fff00000c664f700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   34.721257]  fff00000c664f780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   34.722165] >fff00000c664f800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   34.723041]                                      ^
[   34.723793]  fff00000c664f880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.724825]  fff00000c664f900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.725712] ==================================================================
[   34.932776] ==================================================================
[   34.933406] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x934/0x4858
[   34.934523] Write of size 4 at addr fff00000c664f830 by task kunit_try_catch/254
[   34.935655] 
[   34.936122] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241205 #1
[   34.937314] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.937855] Hardware name: linux,dummy-virt (DT)
[   34.938442] Call trace:
[   34.938946]  show_stack+0x20/0x38 (C)
[   34.939510]  dump_stack_lvl+0x8c/0xd0
[   34.940081]  print_report+0x118/0x5e0
[   34.940743]  kasan_report+0xc8/0x118
[   34.941254]  kasan_check_range+0x100/0x1a8
[   34.941918]  __kasan_check_write+0x20/0x30
[   34.942580]  kasan_atomics_helper+0x934/0x4858
[   34.943261]  kasan_atomics+0x198/0x2e8
[   34.943785]  kunit_try_run_case+0x14c/0x3d0
[   34.944533]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.945330]  kthread+0x24c/0x2d0
[   34.945925]  ret_from_fork+0x10/0x20
[   34.946514] 
[   34.946847] Allocated by task 254:
[   34.947369]  kasan_save_stack+0x3c/0x68
[   34.947942]  kasan_save_track+0x20/0x40
[   34.948669]  kasan_save_alloc_info+0x40/0x58
[   34.949249]  __kasan_kmalloc+0xd4/0xd8
[   34.949897]  __kmalloc_cache_noprof+0x15c/0x3c0
[   34.950525]  kasan_atomics+0xb8/0x2e8
[   34.951107]  kunit_try_run_case+0x14c/0x3d0
[   34.951707]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.952386]  kthread+0x24c/0x2d0
[   34.952980]  ret_from_fork+0x10/0x20
[   34.953542] 
[   34.953863] The buggy address belongs to the object at fff00000c664f800
[   34.953863]  which belongs to the cache kmalloc-64 of size 64
[   34.955168] The buggy address is located 0 bytes to the right of
[   34.955168]  allocated 48-byte region [fff00000c664f800, fff00000c664f830)
[   34.956581] 
[   34.956899] The buggy address belongs to the physical page:
[   34.957594] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10664f
[   34.958662] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   34.959565] page_type: f5(slab)
[   34.960059] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   34.960950] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   34.961753] page dumped because: kasan: bad access detected
[   34.962588] 
[   34.962957] Memory state around the buggy address:
[   34.963607]  fff00000c664f700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   34.964508]  fff00000c664f780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   34.965437] >fff00000c664f800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   34.966233]                                      ^
[   34.966931]  fff00000c664f880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.967832]  fff00000c664f900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.968741] ==================================================================
[   35.277352] ==================================================================
[   35.278142] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3de4/0x4858
[   35.279025] Read of size 4 at addr fff00000c664f830 by task kunit_try_catch/254
[   35.279952] 
[   35.280327] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241205 #1
[   35.281689] Tainted: [B]=BAD_PAGE, [N]=TEST
[   35.282310] Hardware name: linux,dummy-virt (DT)
[   35.283018] Call trace:
[   35.283411]  show_stack+0x20/0x38 (C)
[   35.283992]  dump_stack_lvl+0x8c/0xd0
[   35.284546]  print_report+0x118/0x5e0
[   35.285220]  kasan_report+0xc8/0x118
[   35.285835]  __asan_report_load4_noabort+0x20/0x30
[   35.286582]  kasan_atomics_helper+0x3de4/0x4858
[   35.287313]  kasan_atomics+0x198/0x2e8
[   35.287899]  kunit_try_run_case+0x14c/0x3d0
[   35.288520]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.289241]  kthread+0x24c/0x2d0
[   35.289793]  ret_from_fork+0x10/0x20
[   35.290448] 
[   35.290821] Allocated by task 254:
[   35.291323]  kasan_save_stack+0x3c/0x68
[   35.291996]  kasan_save_track+0x20/0x40
[   35.292569]  kasan_save_alloc_info+0x40/0x58
[   35.293192]  __kasan_kmalloc+0xd4/0xd8
[   35.293664]  __kmalloc_cache_noprof+0x15c/0x3c0
[   35.294393]  kasan_atomics+0xb8/0x2e8
[   35.295014]  kunit_try_run_case+0x14c/0x3d0
[   35.295620]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.296403]  kthread+0x24c/0x2d0
[   35.296900]  ret_from_fork+0x10/0x20
[   35.297423] 
[   35.297769] The buggy address belongs to the object at fff00000c664f800
[   35.297769]  which belongs to the cache kmalloc-64 of size 64
[   35.299216] The buggy address is located 0 bytes to the right of
[   35.299216]  allocated 48-byte region [fff00000c664f800, fff00000c664f830)
[   35.300626] 
[   35.300943] The buggy address belongs to the physical page:
[   35.301504] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10664f
[   35.302632] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   35.303558] page_type: f5(slab)
[   35.304042] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   35.304956] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   35.305852] page dumped because: kasan: bad access detected
[   35.306553] 
[   35.306900] Memory state around the buggy address:
[   35.307497]  fff00000c664f700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.308396]  fff00000c664f780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.309268] >fff00000c664f800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   35.310128]                                      ^
[   35.310765]  fff00000c664f880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.311682]  fff00000c664f900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.312600] ==================================================================
[   35.928980] ==================================================================
[   35.929801] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x11f8/0x4858
[   35.930492] Write of size 8 at addr fff00000c664f830 by task kunit_try_catch/254
[   35.932429] 
[   35.932802] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241205 #1
[   35.934077] Tainted: [B]=BAD_PAGE, [N]=TEST
[   35.934700] Hardware name: linux,dummy-virt (DT)
[   35.935386] Call trace:
[   35.935905]  show_stack+0x20/0x38 (C)
[   35.936486]  dump_stack_lvl+0x8c/0xd0
[   35.937079]  print_report+0x118/0x5e0
[   35.937591]  kasan_report+0xc8/0x118
[   35.938252]  kasan_check_range+0x100/0x1a8
[   35.938857]  __kasan_check_write+0x20/0x30
[   35.939416]  kasan_atomics_helper+0x11f8/0x4858
[   35.940201]  kasan_atomics+0x198/0x2e8
[   35.940774]  kunit_try_run_case+0x14c/0x3d0
[   35.941462]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.942261]  kthread+0x24c/0x2d0
[   35.942905]  ret_from_fork+0x10/0x20
[   35.943491] 
[   35.943850] Allocated by task 254:
[   35.944319]  kasan_save_stack+0x3c/0x68
[   35.944962]  kasan_save_track+0x20/0x40
[   35.945517]  kasan_save_alloc_info+0x40/0x58
[   35.946131]  __kasan_kmalloc+0xd4/0xd8
[   35.946617]  __kmalloc_cache_noprof+0x15c/0x3c0
[   35.947341]  kasan_atomics+0xb8/0x2e8
[   35.947847]  kunit_try_run_case+0x14c/0x3d0
[   35.948504]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.949197]  kthread+0x24c/0x2d0
[   35.949790]  ret_from_fork+0x10/0x20
[   35.950434] 
[   35.950715] The buggy address belongs to the object at fff00000c664f800
[   35.950715]  which belongs to the cache kmalloc-64 of size 64
[   35.952203] The buggy address is located 0 bytes to the right of
[   35.952203]  allocated 48-byte region [fff00000c664f800, fff00000c664f830)
[   35.953603] 
[   35.953953] The buggy address belongs to the physical page:
[   35.954643] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10664f
[   35.955651] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   35.956575] page_type: f5(slab)
[   35.957054] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   35.958049] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   35.958986] page dumped because: kasan: bad access detected
[   35.959716] 
[   35.960101] Memory state around the buggy address:
[   35.960758]  fff00000c664f700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.961585]  fff00000c664f780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.962464] >fff00000c664f800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   35.963430]                                      ^
[   35.964146]  fff00000c664f880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.965060]  fff00000c664f900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.965892] ==================================================================
[   34.046355] ==================================================================
[   34.048029] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x40a8/0x4858
[   34.049160] Read of size 4 at addr fff00000c664f830 by task kunit_try_catch/254
[   34.050084] 
[   34.050574] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241205 #1
[   34.052284] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.053129] Hardware name: linux,dummy-virt (DT)
[   34.053928] Call trace:
[   34.054546]  show_stack+0x20/0x38 (C)
[   34.055382]  dump_stack_lvl+0x8c/0xd0
[   34.056230]  print_report+0x118/0x5e0
[   34.056530]  kasan_report+0xc8/0x118
[   34.056813]  __asan_report_load4_noabort+0x20/0x30
[   34.057181]  kasan_atomics_helper+0x40a8/0x4858
[   34.057503]  kasan_atomics+0x198/0x2e8
[   34.057793]  kunit_try_run_case+0x14c/0x3d0
[   34.059468]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.060294]  kthread+0x24c/0x2d0
[   34.060919]  ret_from_fork+0x10/0x20
[   34.061372] 
[   34.061757] Allocated by task 254:
[   34.062480]  kasan_save_stack+0x3c/0x68
[   34.063046]  kasan_save_track+0x20/0x40
[   34.064104]  kasan_save_alloc_info+0x40/0x58
[   34.064710]  __kasan_kmalloc+0xd4/0xd8
[   34.065258]  __kmalloc_cache_noprof+0x15c/0x3c0
[   34.065808]  kasan_atomics+0xb8/0x2e8
[   34.066494]  kunit_try_run_case+0x14c/0x3d0
[   34.067040]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.068174]  kthread+0x24c/0x2d0
[   34.068664]  ret_from_fork+0x10/0x20
[   34.069229] 
[   34.069548] The buggy address belongs to the object at fff00000c664f800
[   34.069548]  which belongs to the cache kmalloc-64 of size 64
[   34.070936] The buggy address is located 0 bytes to the right of
[   34.070936]  allocated 48-byte region [fff00000c664f800, fff00000c664f830)
[   34.072576] 
[   34.072946] The buggy address belongs to the physical page:
[   34.073627] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10664f
[   34.074817] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   34.075942] page_type: f5(slab)
[   34.076389] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   34.077382] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   34.078327] page dumped because: kasan: bad access detected
[   34.079017] 
[   34.079708] Memory state around the buggy address:
[   34.080183]  fff00000c664f700: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   34.081399]  fff00000c664f780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   34.082318] >fff00000c664f800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   34.083146]                                      ^
[   34.083896]  fff00000c664f880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.084841]  fff00000c664f900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.086074] ==================================================================
[   34.089158] ==================================================================
[   34.090114] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f7c/0x4858
[   34.090953] Write of size 4 at addr fff00000c664f830 by task kunit_try_catch/254
[   34.092319] 
[   34.092603] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241205 #1
[   34.094493] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.095778] Hardware name: linux,dummy-virt (DT)
[   34.096817] Call trace:
[   34.097159]  show_stack+0x20/0x38 (C)
[   34.098059]  dump_stack_lvl+0x8c/0xd0
[   34.098752]  print_report+0x118/0x5e0
[   34.099706]  kasan_report+0xc8/0x118
[   34.100275]  __asan_report_store4_noabort+0x20/0x30
[   34.100894]  kasan_atomics_helper+0x3f7c/0x4858
[   34.101623]  kasan_atomics+0x198/0x2e8
[   34.102271]  kunit_try_run_case+0x14c/0x3d0
[   34.102992]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.103748]  kthread+0x24c/0x2d0
[   34.104294]  ret_from_fork+0x10/0x20
[   34.104903] 
[   34.105195] Allocated by task 254:
[   34.106127]  kasan_save_stack+0x3c/0x68
[   34.106733]  kasan_save_track+0x20/0x40
[   34.107378]  kasan_save_alloc_info+0x40/0x58
[   34.108055]  __kasan_kmalloc+0xd4/0xd8
[   34.108722]  __kmalloc_cache_noprof+0x15c/0x3c0
[   34.109288]  kasan_atomics+0xb8/0x2e8
[   34.110054]  kunit_try_run_case+0x14c/0x3d0
[   34.110710]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.111693]  kthread+0x24c/0x2d0
[   34.112185]  ret_from_fork+0x10/0x20
[   34.112772] 
[   34.113063] The buggy address belongs to the object at fff00000c664f800
[   34.113063]  which belongs to the cache kmalloc-64 of size 64
[   34.115594] The buggy address is located 0 bytes to the right of
[   34.115594]  allocated 48-byte region [fff00000c664f800, fff00000c664f830)
[   34.117154] 
[   34.117560] The buggy address belongs to the physical page:
[   34.118462] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10664f
[   34.119823] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   34.121144] page_type: f5(slab)
[   34.121678] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   34.122655] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   34.124053] page dumped because: kasan: bad access detected
[   34.124985] 
[   34.125325] Memory state around the buggy address:
[   34.126390]  fff00000c664f700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   34.127350]  fff00000c664f780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   34.129287] >fff00000c664f800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   34.131002]                                      ^
[   34.132128]  fff00000c664f880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.133224]  fff00000c664f900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.134358] ==================================================================
[   35.580670] ==================================================================
[   35.582072] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e5c/0x4858
[   35.583737] Write of size 8 at addr fff00000c664f830 by task kunit_try_catch/254
[   35.584974] 
[   35.585645] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241205 #1
[   35.587053] Tainted: [B]=BAD_PAGE, [N]=TEST
[   35.587705] Hardware name: linux,dummy-virt (DT)
[   35.588412] Call trace:
[   35.588841]  show_stack+0x20/0x38 (C)
[   35.589408]  dump_stack_lvl+0x8c/0xd0
[   35.589954]  print_report+0x118/0x5e0
[   35.590493]  kasan_report+0xc8/0x118
[   35.591101]  __asan_report_store8_noabort+0x20/0x30
[   35.591855]  kasan_atomics_helper+0x3e5c/0x4858
[   35.592828]  kasan_atomics+0x198/0x2e8
[   35.593562]  kunit_try_run_case+0x14c/0x3d0
[   35.594196]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.594696]  kthread+0x24c/0x2d0
[   35.595597]  ret_from_fork+0x10/0x20
[   35.596132] 
[   35.596554] Allocated by task 254:
[   35.597281]  kasan_save_stack+0x3c/0x68
[   35.597914]  kasan_save_track+0x20/0x40
[   35.598439]  kasan_save_alloc_info+0x40/0x58
[   35.599084]  __kasan_kmalloc+0xd4/0xd8
[   35.599639]  __kmalloc_cache_noprof+0x15c/0x3c0
[   35.600279]  kasan_atomics+0xb8/0x2e8
[   35.600856]  kunit_try_run_case+0x14c/0x3d0
[   35.601464]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.602193]  kthread+0x24c/0x2d0
[   35.602695]  ret_from_fork+0x10/0x20
[   35.603301] 
[   35.603642] The buggy address belongs to the object at fff00000c664f800
[   35.603642]  which belongs to the cache kmalloc-64 of size 64
[   35.605098] The buggy address is located 0 bytes to the right of
[   35.605098]  allocated 48-byte region [fff00000c664f800, fff00000c664f830)
[   35.606494] 
[   35.606846] The buggy address belongs to the physical page:
[   35.607432] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10664f
[   35.608495] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   35.609293] page_type: f5(slab)
[   35.609854] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   35.610756] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   35.611757] page dumped because: kasan: bad access detected
[   35.612427] 
[   35.612754] Memory state around the buggy address:
[   35.613380]  fff00000c664f700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.614228]  fff00000c664f780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.615102] >fff00000c664f800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   35.616111]                                      ^
[   35.616721]  fff00000c664f880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.617610]  fff00000c664f900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.618605] ==================================================================
[   36.350307] ==================================================================
[   36.351161] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1644/0x4858
[   36.352008] Write of size 8 at addr fff00000c664f830 by task kunit_try_catch/254
[   36.353588] 
[   36.354108] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241205 #1
[   36.355373] Tainted: [B]=BAD_PAGE, [N]=TEST
[   36.355997] Hardware name: linux,dummy-virt (DT)
[   36.356653] Call trace:
[   36.357026]  show_stack+0x20/0x38 (C)
[   36.357742]  dump_stack_lvl+0x8c/0xd0
[   36.358395]  print_report+0x118/0x5e0
[   36.359041]  kasan_report+0xc8/0x118
[   36.359669]  kasan_check_range+0x100/0x1a8
[   36.360362]  __kasan_check_write+0x20/0x30
[   36.361053]  kasan_atomics_helper+0x1644/0x4858
[   36.361776]  kasan_atomics+0x198/0x2e8
[   36.362442]  kunit_try_run_case+0x14c/0x3d0
[   36.363143]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.363951]  kthread+0x24c/0x2d0
[   36.364545]  ret_from_fork+0x10/0x20
[   36.365204] 
[   36.365544] Allocated by task 254:
[   36.366168]  kasan_save_stack+0x3c/0x68
[   36.366854]  kasan_save_track+0x20/0x40
[   36.367570]  kasan_save_alloc_info+0x40/0x58
[   36.368350]  __kasan_kmalloc+0xd4/0xd8
[   36.369033]  __kmalloc_cache_noprof+0x15c/0x3c0
[   36.369709]  kasan_atomics+0xb8/0x2e8
[   36.370307]  kunit_try_run_case+0x14c/0x3d0
[   36.371019]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.371783]  kthread+0x24c/0x2d0
[   36.372459]  ret_from_fork+0x10/0x20
[   36.373100] 
[   36.373442] The buggy address belongs to the object at fff00000c664f800
[   36.373442]  which belongs to the cache kmalloc-64 of size 64
[   36.375044] The buggy address is located 0 bytes to the right of
[   36.375044]  allocated 48-byte region [fff00000c664f800, fff00000c664f830)
[   36.376515] 
[   36.376957] The buggy address belongs to the physical page:
[   36.377659] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10664f
[   36.378785] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   36.379655] page_type: f5(slab)
[   36.380192] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   36.381294] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   36.382435] page dumped because: kasan: bad access detected
[   36.383269] 
[   36.383567] Memory state around the buggy address:
[   36.384170]  fff00000c664f700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   36.385107]  fff00000c664f780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   36.386395] >fff00000c664f800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   36.387449]                                      ^
[   36.388131]  fff00000c664f880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.389077]  fff00000c664f900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.389973] ==================================================================
[   35.541467] ==================================================================
[   35.542645] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xe44/0x4858
[   35.543731] Write of size 8 at addr fff00000c664f830 by task kunit_try_catch/254
[   35.544620] 
[   35.544961] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241205 #1
[   35.546008] Tainted: [B]=BAD_PAGE, [N]=TEST
[   35.546659] Hardware name: linux,dummy-virt (DT)
[   35.547379] Call trace:
[   35.547815]  show_stack+0x20/0x38 (C)
[   35.548301]  dump_stack_lvl+0x8c/0xd0
[   35.549120]  print_report+0x118/0x5e0
[   35.549722]  kasan_report+0xc8/0x118
[   35.550305]  kasan_check_range+0x100/0x1a8
[   35.551021]  __kasan_check_write+0x20/0x30
[   35.551695]  kasan_atomics_helper+0xe44/0x4858
[   35.552425]  kasan_atomics+0x198/0x2e8
[   35.552923]  kunit_try_run_case+0x14c/0x3d0
[   35.553669]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.554448]  kthread+0x24c/0x2d0
[   35.555025]  ret_from_fork+0x10/0x20
[   35.555632] 
[   35.555962] Allocated by task 254:
[   35.556456]  kasan_save_stack+0x3c/0x68
[   35.557042]  kasan_save_track+0x20/0x40
[   35.557612]  kasan_save_alloc_info+0x40/0x58
[   35.558347]  __kasan_kmalloc+0xd4/0xd8
[   35.558807]  __kmalloc_cache_noprof+0x15c/0x3c0
[   35.559584]  kasan_atomics+0xb8/0x2e8
[   35.560282]  kunit_try_run_case+0x14c/0x3d0
[   35.560775]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.561533]  kthread+0x24c/0x2d0
[   35.562078]  ret_from_fork+0x10/0x20
[   35.562610] 
[   35.562973] The buggy address belongs to the object at fff00000c664f800
[   35.562973]  which belongs to the cache kmalloc-64 of size 64
[   35.564416] The buggy address is located 0 bytes to the right of
[   35.564416]  allocated 48-byte region [fff00000c664f800, fff00000c664f830)
[   35.565839] 
[   35.566157] The buggy address belongs to the physical page:
[   35.566947] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10664f
[   35.567862] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   35.568685] page_type: f5(slab)
[   35.569238] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   35.570262] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   35.571369] page dumped because: kasan: bad access detected
[   35.572129] 
[   35.572452] Memory state around the buggy address:
[   35.573096]  fff00000c664f700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.574180]  fff00000c664f780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.575243] >fff00000c664f800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   35.576314]                                      ^
[   35.577140]  fff00000c664f880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.578225]  fff00000c664f900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.579273] ==================================================================
[   34.228623] ==================================================================
[   34.229660] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x2b0/0x4858
[   34.230903] Read of size 4 at addr fff00000c664f830 by task kunit_try_catch/254
[   34.232559] 
[   34.233363] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241205 #1
[   34.234784] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.235663] Hardware name: linux,dummy-virt (DT)
[   34.236344] Call trace:
[   34.236730]  show_stack+0x20/0x38 (C)
[   34.237177]  dump_stack_lvl+0x8c/0xd0
[   34.238326]  print_report+0x118/0x5e0
[   34.239150]  kasan_report+0xc8/0x118
[   34.240448]  kasan_check_range+0x100/0x1a8
[   34.241385]  __kasan_check_read+0x20/0x30
[   34.242036]  kasan_atomics_helper+0x2b0/0x4858
[   34.242752]  kasan_atomics+0x198/0x2e8
[   34.243684]  kunit_try_run_case+0x14c/0x3d0
[   34.244504]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.245213]  kthread+0x24c/0x2d0
[   34.245949]  ret_from_fork+0x10/0x20
[   34.246670] 
[   34.247164] Allocated by task 254:
[   34.248020]  kasan_save_stack+0x3c/0x68
[   34.248493]  kasan_save_track+0x20/0x40
[   34.249408]  kasan_save_alloc_info+0x40/0x58
[   34.250132]  __kasan_kmalloc+0xd4/0xd8
[   34.250957]  __kmalloc_cache_noprof+0x15c/0x3c0
[   34.251963]  kasan_atomics+0xb8/0x2e8
[   34.252493]  kunit_try_run_case+0x14c/0x3d0
[   34.253202]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.254026]  kthread+0x24c/0x2d0
[   34.254649]  ret_from_fork+0x10/0x20
[   34.255594] 
[   34.256265] The buggy address belongs to the object at fff00000c664f800
[   34.256265]  which belongs to the cache kmalloc-64 of size 64
[   34.257729] The buggy address is located 0 bytes to the right of
[   34.257729]  allocated 48-byte region [fff00000c664f800, fff00000c664f830)
[   34.259224] 
[   34.259507] The buggy address belongs to the physical page:
[   34.261018] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10664f
[   34.261922] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   34.262688] page_type: f5(slab)
[   34.263604] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   34.264891] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   34.266141] page dumped because: kasan: bad access detected
[   34.266954] 
[   34.267705] Memory state around the buggy address:
[   34.268508]  fff00000c664f700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   34.269429]  fff00000c664f780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   34.270349] >fff00000c664f800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   34.271600]                                      ^
[   34.272547]  fff00000c664f880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.273667]  fff00000c664f900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.274474] ==================================================================
[   34.811130] ==================================================================
[   34.812831] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x7cc/0x4858
[   34.813921] Write of size 4 at addr fff00000c664f830 by task kunit_try_catch/254
[   34.815289] 
[   34.815832] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241205 #1
[   34.817264] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.817819] Hardware name: linux,dummy-virt (DT)
[   34.818713] Call trace:
[   34.819172]  show_stack+0x20/0x38 (C)
[   34.820005]  dump_stack_lvl+0x8c/0xd0
[   34.820791]  print_report+0x118/0x5e0
[   34.821595]  kasan_report+0xc8/0x118
[   34.822232]  kasan_check_range+0x100/0x1a8
[   34.823066]  __kasan_check_write+0x20/0x30
[   34.823387]  kasan_atomics_helper+0x7cc/0x4858
[   34.823838]  kasan_atomics+0x198/0x2e8
[   34.825011]  kunit_try_run_case+0x14c/0x3d0
[   34.825650]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.826671]  kthread+0x24c/0x2d0
[   34.827385]  ret_from_fork+0x10/0x20
[   34.827987] 
[   34.828365] Allocated by task 254:
[   34.828897]  kasan_save_stack+0x3c/0x68
[   34.829696]  kasan_save_track+0x20/0x40
[   34.830275]  kasan_save_alloc_info+0x40/0x58
[   34.830959]  __kasan_kmalloc+0xd4/0xd8
[   34.831673]  __kmalloc_cache_noprof+0x15c/0x3c0
[   34.832348]  kasan_atomics+0xb8/0x2e8
[   34.832994]  kunit_try_run_case+0x14c/0x3d0
[   34.833657]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.834459]  kthread+0x24c/0x2d0
[   34.835033]  ret_from_fork+0x10/0x20
[   34.835626] 
[   34.835998] The buggy address belongs to the object at fff00000c664f800
[   34.835998]  which belongs to the cache kmalloc-64 of size 64
[   34.837545] The buggy address is located 0 bytes to the right of
[   34.837545]  allocated 48-byte region [fff00000c664f800, fff00000c664f830)
[   34.839122] 
[   34.839571] The buggy address belongs to the physical page:
[   34.840450] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10664f
[   34.841515] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   34.842483] page_type: f5(slab)
[   34.843079] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   34.844083] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   34.845136] page dumped because: kasan: bad access detected
[   34.845869] 
[   34.846369] Memory state around the buggy address:
[   34.847055]  fff00000c664f700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   34.848071]  fff00000c664f780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   34.849005] >fff00000c664f800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   34.849939]                                      ^
[   34.850651]  fff00000c664f880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.851631]  fff00000c664f900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.852554] ==================================================================
[   35.427670] ==================================================================
[   35.428506] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e04/0x4858
[   35.429280] Read of size 4 at addr fff00000c664f830 by task kunit_try_catch/254
[   35.430155] 
[   35.430604] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241205 #1
[   35.431892] Tainted: [B]=BAD_PAGE, [N]=TEST
[   35.432506] Hardware name: linux,dummy-virt (DT)
[   35.433178] Call trace:
[   35.433591]  show_stack+0x20/0x38 (C)
[   35.434226]  dump_stack_lvl+0x8c/0xd0
[   35.434909]  print_report+0x118/0x5e0
[   35.435464]  kasan_report+0xc8/0x118
[   35.435988]  __asan_report_load4_noabort+0x20/0x30
[   35.436816]  kasan_atomics_helper+0x3e04/0x4858
[   35.437485]  kasan_atomics+0x198/0x2e8
[   35.438129]  kunit_try_run_case+0x14c/0x3d0
[   35.438755]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.439605]  kthread+0x24c/0x2d0
[   35.440455]  ret_from_fork+0x10/0x20
[   35.441203] 
[   35.441660] Allocated by task 254:
[   35.442503]  kasan_save_stack+0x3c/0x68
[   35.443074]  kasan_save_track+0x20/0x40
[   35.443631]  kasan_save_alloc_info+0x40/0x58
[   35.444257]  __kasan_kmalloc+0xd4/0xd8
[   35.444710]  __kmalloc_cache_noprof+0x15c/0x3c0
[   35.445490]  kasan_atomics+0xb8/0x2e8
[   35.446051]  kunit_try_run_case+0x14c/0x3d0
[   35.446665]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.447407]  kthread+0x24c/0x2d0
[   35.448012]  ret_from_fork+0x10/0x20
[   35.448645] 
[   35.449040] The buggy address belongs to the object at fff00000c664f800
[   35.449040]  which belongs to the cache kmalloc-64 of size 64
[   35.450394] The buggy address is located 0 bytes to the right of
[   35.450394]  allocated 48-byte region [fff00000c664f800, fff00000c664f830)
[   35.451773] 
[   35.452105] The buggy address belongs to the physical page:
[   35.452832] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10664f
[   35.453751] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   35.454560] page_type: f5(slab)
[   35.455113] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   35.456079] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   35.456968] page dumped because: kasan: bad access detected
[   35.457665] 
[   35.458049] Memory state around the buggy address:
[   35.458576]  fff00000c664f700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.459635]  fff00000c664f780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.460559] >fff00000c664f800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   35.461419]                                      ^
[   35.462017]  fff00000c664f880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.462827]  fff00000c664f900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.463797] ==================================================================
[   35.695173] ==================================================================
[   35.696121] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf88/0x4858
[   35.697171] Write of size 8 at addr fff00000c664f830 by task kunit_try_catch/254
[   35.698615] 
[   35.699728] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241205 #1
[   35.700856] Tainted: [B]=BAD_PAGE, [N]=TEST
[   35.701562] Hardware name: linux,dummy-virt (DT)
[   35.702192] Call trace:
[   35.702612]  show_stack+0x20/0x38 (C)
[   35.703164]  dump_stack_lvl+0x8c/0xd0
[   35.703830]  print_report+0x118/0x5e0
[   35.704617]  kasan_report+0xc8/0x118
[   35.705269]  kasan_check_range+0x100/0x1a8
[   35.705863]  __kasan_check_write+0x20/0x30
[   35.706492]  kasan_atomics_helper+0xf88/0x4858
[   35.707218]  kasan_atomics+0x198/0x2e8
[   35.707524]  kunit_try_run_case+0x14c/0x3d0
[   35.707837]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.708533]  kthread+0x24c/0x2d0
[   35.709049]  ret_from_fork+0x10/0x20
[   35.709749] 
[   35.710052] Allocated by task 254:
[   35.710656]  kasan_save_stack+0x3c/0x68
[   35.711248]  kasan_save_track+0x20/0x40
[   35.711900]  kasan_save_alloc_info+0x40/0x58
[   35.712579]  __kasan_kmalloc+0xd4/0xd8
[   35.713285]  __kmalloc_cache_noprof+0x15c/0x3c0
[   35.713907]  kasan_atomics+0xb8/0x2e8
[   35.714397]  kunit_try_run_case+0x14c/0x3d0
[   35.715164]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.715955]  kthread+0x24c/0x2d0
[   35.716386]  ret_from_fork+0x10/0x20
[   35.717031] 
[   35.717352] The buggy address belongs to the object at fff00000c664f800
[   35.717352]  which belongs to the cache kmalloc-64 of size 64
[   35.718684] The buggy address is located 0 bytes to the right of
[   35.718684]  allocated 48-byte region [fff00000c664f800, fff00000c664f830)
[   35.720001] 
[   35.720450] The buggy address belongs to the physical page:
[   35.721132] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10664f
[   35.722236] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   35.723096] page_type: f5(slab)
[   35.723568] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   35.724557] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   35.725476] page dumped because: kasan: bad access detected
[   35.726109] 
[   35.726458] Memory state around the buggy address:
[   35.727071]  fff00000c664f700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.727986]  fff00000c664f780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.728760] >fff00000c664f800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   35.729655]                                      ^
[   35.730242]  fff00000c664f880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.731144]  fff00000c664f900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.732055] ==================================================================
[   34.454540] ==================================================================
[   34.455368] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x414/0x4858
[   34.457083] Write of size 4 at addr fff00000c664f830 by task kunit_try_catch/254
[   34.457866] 
[   34.458272] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241205 #1
[   34.460357] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.460949] Hardware name: linux,dummy-virt (DT)
[   34.461562] Call trace:
[   34.462014]  show_stack+0x20/0x38 (C)
[   34.462605]  dump_stack_lvl+0x8c/0xd0
[   34.463182]  print_report+0x118/0x5e0
[   34.463844]  kasan_report+0xc8/0x118
[   34.464485]  kasan_check_range+0x100/0x1a8
[   34.465199]  __kasan_check_write+0x20/0x30
[   34.465815]  kasan_atomics_helper+0x414/0x4858
[   34.466477]  kasan_atomics+0x198/0x2e8
[   34.467013]  kunit_try_run_case+0x14c/0x3d0
[   34.467751]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.468527]  kthread+0x24c/0x2d0
[   34.469152]  ret_from_fork+0x10/0x20
[   34.469799] 
[   34.470300] Allocated by task 254:
[   34.471078]  kasan_save_stack+0x3c/0x68
[   34.471672]  kasan_save_track+0x20/0x40
[   34.472237]  kasan_save_alloc_info+0x40/0x58
[   34.472784]  __kasan_kmalloc+0xd4/0xd8
[   34.473392]  __kmalloc_cache_noprof+0x15c/0x3c0
[   34.473964]  kasan_atomics+0xb8/0x2e8
[   34.474678]  kunit_try_run_case+0x14c/0x3d0
[   34.475345]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.476195]  kthread+0x24c/0x2d0
[   34.476848]  ret_from_fork+0x10/0x20
[   34.477596] 
[   34.478117] The buggy address belongs to the object at fff00000c664f800
[   34.478117]  which belongs to the cache kmalloc-64 of size 64
[   34.479523] The buggy address is located 0 bytes to the right of
[   34.479523]  allocated 48-byte region [fff00000c664f800, fff00000c664f830)
[   34.481059] 
[   34.481635] The buggy address belongs to the physical page:
[   34.482505] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10664f
[   34.483526] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   34.484433] page_type: f5(slab)
[   34.485004] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   34.485923] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   34.486905] page dumped because: kasan: bad access detected
[   34.487563] 
[   34.487923] Memory state around the buggy address:
[   34.488489]  fff00000c664f700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   34.489397]  fff00000c664f780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   34.490342] >fff00000c664f800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   34.491273]                                      ^
[   34.491902]  fff00000c664f880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.492762]  fff00000c664f900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.493640] ==================================================================
[   34.495355] ==================================================================
[   34.496917] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x47c/0x4858
[   34.497793] Write of size 4 at addr fff00000c664f830 by task kunit_try_catch/254
[   34.498750] 
[   34.499094] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241205 #1
[   34.500539] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.501127] Hardware name: linux,dummy-virt (DT)
[   34.501795] Call trace:
[   34.502203]  show_stack+0x20/0x38 (C)
[   34.502952]  dump_stack_lvl+0x8c/0xd0
[   34.503384]  print_report+0x118/0x5e0
[   34.504011]  kasan_report+0xc8/0x118
[   34.504653]  kasan_check_range+0x100/0x1a8
[   34.505372]  __kasan_check_write+0x20/0x30
[   34.506079]  kasan_atomics_helper+0x47c/0x4858
[   34.506758]  kasan_atomics+0x198/0x2e8
[   34.507411]  kunit_try_run_case+0x14c/0x3d0
[   34.508134]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.508900]  kthread+0x24c/0x2d0
[   34.509514]  ret_from_fork+0x10/0x20
[   34.510122] 
[   34.510460] Allocated by task 254:
[   34.510909]  kasan_save_stack+0x3c/0x68
[   34.511551]  kasan_save_track+0x20/0x40
[   34.512339]  kasan_save_alloc_info+0x40/0x58
[   34.512923]  __kasan_kmalloc+0xd4/0xd8
[   34.513558]  __kmalloc_cache_noprof+0x15c/0x3c0
[   34.514187]  kasan_atomics+0xb8/0x2e8
[   34.514807]  kunit_try_run_case+0x14c/0x3d0
[   34.515414]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.516210]  kthread+0x24c/0x2d0
[   34.516800]  ret_from_fork+0x10/0x20
[   34.517356] 
[   34.517658] The buggy address belongs to the object at fff00000c664f800
[   34.517658]  which belongs to the cache kmalloc-64 of size 64
[   34.519174] The buggy address is located 0 bytes to the right of
[   34.519174]  allocated 48-byte region [fff00000c664f800, fff00000c664f830)
[   34.520547] 
[   34.520870] The buggy address belongs to the physical page:
[   34.521696] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10664f
[   34.522669] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   34.523442] page_type: f5(slab)
[   34.523982] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   34.524978] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   34.525848] page dumped because: kasan: bad access detected
[   34.526540] 
[   34.526865] Memory state around the buggy address:
[   34.527513]  fff00000c664f700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   34.528330]  fff00000c664f780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   34.529289] >fff00000c664f800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   34.530168]                                      ^
[   34.530797]  fff00000c664f880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.531696]  fff00000c664f900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.532568] ==================================================================
[   34.770511] ==================================================================
[   34.771393] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x760/0x4858
[   34.772371] Write of size 4 at addr fff00000c664f830 by task kunit_try_catch/254
[   34.773313] 
[   34.773684] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241205 #1
[   34.775017] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.775670] Hardware name: linux,dummy-virt (DT)
[   34.776324] Call trace:
[   34.776923]  show_stack+0x20/0x38 (C)
[   34.777764]  dump_stack_lvl+0x8c/0xd0
[   34.778420]  print_report+0x118/0x5e0
[   34.779144]  kasan_report+0xc8/0x118
[   34.779766]  kasan_check_range+0x100/0x1a8
[   34.780462]  __kasan_check_write+0x20/0x30
[   34.781141]  kasan_atomics_helper+0x760/0x4858
[   34.781926]  kasan_atomics+0x198/0x2e8
[   34.782552]  kunit_try_run_case+0x14c/0x3d0
[   34.783261]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.784077]  kthread+0x24c/0x2d0
[   34.784672]  ret_from_fork+0x10/0x20
[   34.785308] 
[   34.785739] Allocated by task 254:
[   34.786252]  kasan_save_stack+0x3c/0x68
[   34.786820]  kasan_save_track+0x20/0x40
[   34.787323]  kasan_save_alloc_info+0x40/0x58
[   34.788152]  __kasan_kmalloc+0xd4/0xd8
[   34.788749]  __kmalloc_cache_noprof+0x15c/0x3c0
[   34.789430]  kasan_atomics+0xb8/0x2e8
[   34.790044]  kunit_try_run_case+0x14c/0x3d0
[   34.790707]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.791494]  kthread+0x24c/0x2d0
[   34.792104]  ret_from_fork+0x10/0x20
[   34.792717] 
[   34.793112] The buggy address belongs to the object at fff00000c664f800
[   34.793112]  which belongs to the cache kmalloc-64 of size 64
[   34.794557] The buggy address is located 0 bytes to the right of
[   34.794557]  allocated 48-byte region [fff00000c664f800, fff00000c664f830)
[   34.796199] 
[   34.796596] The buggy address belongs to the physical page:
[   34.797364] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10664f
[   34.798413] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   34.799297] page_type: f5(slab)
[   34.799870] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   34.800892] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   34.801806] page dumped because: kasan: bad access detected
[   34.802571] 
[   34.803074] Memory state around the buggy address:
[   34.803794]  fff00000c664f700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   34.804796]  fff00000c664f780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   34.805713] >fff00000c664f800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   34.806620]                                      ^
[   34.807362]  fff00000c664f880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.808302]  fff00000c664f900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.809154] ==================================================================
[   35.237325] ==================================================================
[   35.238106] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xc08/0x4858
[   35.239484] Write of size 4 at addr fff00000c664f830 by task kunit_try_catch/254
[   35.241400] 
[   35.241840] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241205 #1
[   35.243470] Tainted: [B]=BAD_PAGE, [N]=TEST
[   35.244002] Hardware name: linux,dummy-virt (DT)
[   35.244567] Call trace:
[   35.245038]  show_stack+0x20/0x38 (C)
[   35.245851]  dump_stack_lvl+0x8c/0xd0
[   35.246688]  print_report+0x118/0x5e0
[   35.247214]  kasan_report+0xc8/0x118
[   35.247868]  kasan_check_range+0x100/0x1a8
[   35.248486]  __kasan_check_write+0x20/0x30
[   35.249165]  kasan_atomics_helper+0xc08/0x4858
[   35.249936]  kasan_atomics+0x198/0x2e8
[   35.250452]  kunit_try_run_case+0x14c/0x3d0
[   35.251123]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.251888]  kthread+0x24c/0x2d0
[   35.252459]  ret_from_fork+0x10/0x20
[   35.253149] 
[   35.253463] Allocated by task 254:
[   35.254020]  kasan_save_stack+0x3c/0x68
[   35.254571]  kasan_save_track+0x20/0x40
[   35.255505]  kasan_save_alloc_info+0x40/0x58
[   35.256113]  __kasan_kmalloc+0xd4/0xd8
[   35.256664]  __kmalloc_cache_noprof+0x15c/0x3c0
[   35.257324]  kasan_atomics+0xb8/0x2e8
[   35.257941]  kunit_try_run_case+0x14c/0x3d0
[   35.258594]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.259295]  kthread+0x24c/0x2d0
[   35.259903]  ret_from_fork+0x10/0x20
[   35.260485] 
[   35.260834] The buggy address belongs to the object at fff00000c664f800
[   35.260834]  which belongs to the cache kmalloc-64 of size 64
[   35.262300] The buggy address is located 0 bytes to the right of
[   35.262300]  allocated 48-byte region [fff00000c664f800, fff00000c664f830)
[   35.263699] 
[   35.264058] The buggy address belongs to the physical page:
[   35.264662] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10664f
[   35.265624] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   35.266515] page_type: f5(slab)
[   35.267074] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   35.267967] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   35.268959] page dumped because: kasan: bad access detected
[   35.269652] 
[   35.269992] Memory state around the buggy address:
[   35.270625]  fff00000c664f700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.271442]  fff00000c664f780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.272269] >fff00000c664f800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   35.273128]                                      ^
[   35.273916]  fff00000c664f880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.274801]  fff00000c664f900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.275651] ==================================================================
[   36.233535] ==================================================================
[   36.234432] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x154c/0x4858
[   36.235459] Write of size 8 at addr fff00000c664f830 by task kunit_try_catch/254
[   36.236595] 
[   36.237004] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241205 #1
[   36.238496] Tainted: [B]=BAD_PAGE, [N]=TEST
[   36.239074] Hardware name: linux,dummy-virt (DT)
[   36.239937] Call trace:
[   36.240360]  show_stack+0x20/0x38 (C)
[   36.241056]  dump_stack_lvl+0x8c/0xd0
[   36.241776]  print_report+0x118/0x5e0
[   36.242505]  kasan_report+0xc8/0x118
[   36.243139]  kasan_check_range+0x100/0x1a8
[   36.243819]  __kasan_check_write+0x20/0x30
[   36.244533]  kasan_atomics_helper+0x154c/0x4858
[   36.245247]  kasan_atomics+0x198/0x2e8
[   36.245897]  kunit_try_run_case+0x14c/0x3d0
[   36.246588]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.247408]  kthread+0x24c/0x2d0
[   36.248017]  ret_from_fork+0x10/0x20
[   36.248649] 
[   36.249013] Allocated by task 254:
[   36.249650]  kasan_save_stack+0x3c/0x68
[   36.250287]  kasan_save_track+0x20/0x40
[   36.251014]  kasan_save_alloc_info+0x40/0x58
[   36.251697]  __kasan_kmalloc+0xd4/0xd8
[   36.252318]  __kmalloc_cache_noprof+0x15c/0x3c0
[   36.252994]  kasan_atomics+0xb8/0x2e8
[   36.253583]  kunit_try_run_case+0x14c/0x3d0
[   36.254263]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.255095]  kthread+0x24c/0x2d0
[   36.255801]  ret_from_fork+0x10/0x20
[   36.256496] 
[   36.257014] The buggy address belongs to the object at fff00000c664f800
[   36.257014]  which belongs to the cache kmalloc-64 of size 64
[   36.258362] The buggy address is located 0 bytes to the right of
[   36.258362]  allocated 48-byte region [fff00000c664f800, fff00000c664f830)
[   36.259947] 
[   36.260450] The buggy address belongs to the physical page:
[   36.261157] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10664f
[   36.262347] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   36.262763] page_type: f5(slab)
[   36.263050] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   36.263494] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   36.264024] page dumped because: kasan: bad access detected
[   36.265120] 
[   36.265618] Memory state around the buggy address:
[   36.266282]  fff00000c664f700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   36.267223]  fff00000c664f780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   36.268127] >fff00000c664f800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   36.269030]                                      ^
[   36.269705]  fff00000c664f880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.270617]  fff00000c664f900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.271526] ==================================================================
[   36.043925] ==================================================================
[   36.044687] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1384/0x4858
[   36.045490] Write of size 8 at addr fff00000c664f830 by task kunit_try_catch/254
[   36.046586] 
[   36.047031] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241205 #1
[   36.048288] Tainted: [B]=BAD_PAGE, [N]=TEST
[   36.048868] Hardware name: linux,dummy-virt (DT)
[   36.049556] Call trace:
[   36.049970]  show_stack+0x20/0x38 (C)
[   36.050571]  dump_stack_lvl+0x8c/0xd0
[   36.051097]  print_report+0x118/0x5e0
[   36.051765]  kasan_report+0xc8/0x118
[   36.052298]  kasan_check_range+0x100/0x1a8
[   36.052986]  __kasan_check_write+0x20/0x30
[   36.053686]  kasan_atomics_helper+0x1384/0x4858
[   36.054304]  kasan_atomics+0x198/0x2e8
[   36.055002]  kunit_try_run_case+0x14c/0x3d0
[   36.055631]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.056409]  kthread+0x24c/0x2d0
[   36.057013]  ret_from_fork+0x10/0x20
[   36.057621] 
[   36.057917] Allocated by task 254:
[   36.058477]  kasan_save_stack+0x3c/0x68
[   36.059088]  kasan_save_track+0x20/0x40
[   36.059678]  kasan_save_alloc_info+0x40/0x58
[   36.060186]  __kasan_kmalloc+0xd4/0xd8
[   36.060825]  __kmalloc_cache_noprof+0x15c/0x3c0
[   36.061370]  kasan_atomics+0xb8/0x2e8
[   36.062003]  kunit_try_run_case+0x14c/0x3d0
[   36.062637]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.063434]  kthread+0x24c/0x2d0
[   36.063947]  ret_from_fork+0x10/0x20
[   36.064570] 
[   36.064866] The buggy address belongs to the object at fff00000c664f800
[   36.064866]  which belongs to the cache kmalloc-64 of size 64
[   36.066417] The buggy address is located 0 bytes to the right of
[   36.066417]  allocated 48-byte region [fff00000c664f800, fff00000c664f830)
[   36.067852] 
[   36.068186] The buggy address belongs to the physical page:
[   36.068897] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10664f
[   36.069784] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   36.070692] page_type: f5(slab)
[   36.071146] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   36.072148] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   36.073014] page dumped because: kasan: bad access detected
[   36.073679] 
[   36.074023] Memory state around the buggy address:
[   36.074753]  fff00000c664f700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   36.075620]  fff00000c664f780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   36.076947] >fff00000c664f800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   36.077911]                                      ^
[   36.078745]  fff00000c664f880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.079687]  fff00000c664f900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.080540] ==================================================================
[   34.572991] ==================================================================
[   34.573605] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x54c/0x4858
[   34.574659] Write of size 4 at addr fff00000c664f830 by task kunit_try_catch/254
[   34.575627] 
[   34.576148] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241205 #1
[   34.577226] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.577701] Hardware name: linux,dummy-virt (DT)
[   34.578481] Call trace:
[   34.578900]  show_stack+0x20/0x38 (C)
[   34.579475]  dump_stack_lvl+0x8c/0xd0
[   34.580039]  print_report+0x118/0x5e0
[   34.580588]  kasan_report+0xc8/0x118
[   34.581096]  kasan_check_range+0x100/0x1a8
[   34.581804]  __kasan_check_write+0x20/0x30
[   34.582499]  kasan_atomics_helper+0x54c/0x4858
[   34.583252]  kasan_atomics+0x198/0x2e8
[   34.583821]  kunit_try_run_case+0x14c/0x3d0
[   34.584427]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.585200]  kthread+0x24c/0x2d0
[   34.585806]  ret_from_fork+0x10/0x20
[   34.586403] 
[   34.586794] Allocated by task 254:
[   34.587362]  kasan_save_stack+0x3c/0x68
[   34.587952]  kasan_save_track+0x20/0x40
[   34.588494]  kasan_save_alloc_info+0x40/0x58
[   34.589173]  __kasan_kmalloc+0xd4/0xd8
[   34.589715]  __kmalloc_cache_noprof+0x15c/0x3c0
[   34.590361]  kasan_atomics+0xb8/0x2e8
[   34.590927]  kunit_try_run_case+0x14c/0x3d0
[   34.591556]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.592274]  kthread+0x24c/0x2d0
[   34.592774]  ret_from_fork+0x10/0x20
[   34.593410] 
[   34.593743] The buggy address belongs to the object at fff00000c664f800
[   34.593743]  which belongs to the cache kmalloc-64 of size 64
[   34.595140] The buggy address is located 0 bytes to the right of
[   34.595140]  allocated 48-byte region [fff00000c664f800, fff00000c664f830)
[   34.596738] 
[   34.597042] The buggy address belongs to the physical page:
[   34.597841] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10664f
[   34.598821] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   34.599675] page_type: f5(slab)
[   34.600211] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   34.601113] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   34.602087] page dumped because: kasan: bad access detected
[   34.602753] 
[   34.603138] Memory state around the buggy address:
[   34.603810]  fff00000c664f700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   34.604642]  fff00000c664f780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   34.605508] >fff00000c664f800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   34.606356]                                      ^
[   34.607117]  fff00000c664f880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.607968]  fff00000c664f900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.608809] ==================================================================
[   35.889413] ==================================================================
[   35.890044] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1190/0x4858
[   35.891290] Write of size 8 at addr fff00000c664f830 by task kunit_try_catch/254
[   35.892472] 
[   35.892976] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241205 #1
[   35.894736] Tainted: [B]=BAD_PAGE, [N]=TEST
[   35.895610] Hardware name: linux,dummy-virt (DT)
[   35.896492] Call trace:
[   35.897125]  show_stack+0x20/0x38 (C)
[   35.897936]  dump_stack_lvl+0x8c/0xd0
[   35.898518]  print_report+0x118/0x5e0
[   35.899310]  kasan_report+0xc8/0x118
[   35.900052]  kasan_check_range+0x100/0x1a8
[   35.900647]  __kasan_check_write+0x20/0x30
[   35.901434]  kasan_atomics_helper+0x1190/0x4858
[   35.902098]  kasan_atomics+0x198/0x2e8
[   35.902669]  kunit_try_run_case+0x14c/0x3d0
[   35.903483]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.904301]  kthread+0x24c/0x2d0
[   35.904827]  ret_from_fork+0x10/0x20
[   35.905432] 
[   35.905804] Allocated by task 254:
[   35.906422]  kasan_save_stack+0x3c/0x68
[   35.906961]  kasan_save_track+0x20/0x40
[   35.907540]  kasan_save_alloc_info+0x40/0x58
[   35.908230]  __kasan_kmalloc+0xd4/0xd8
[   35.908777]  __kmalloc_cache_noprof+0x15c/0x3c0
[   35.909410]  kasan_atomics+0xb8/0x2e8
[   35.909898]  kunit_try_run_case+0x14c/0x3d0
[   35.910585]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.911383]  kthread+0x24c/0x2d0
[   35.911985]  ret_from_fork+0x10/0x20
[   35.912524] 
[   35.912864] The buggy address belongs to the object at fff00000c664f800
[   35.912864]  which belongs to the cache kmalloc-64 of size 64
[   35.914244] The buggy address is located 0 bytes to the right of
[   35.914244]  allocated 48-byte region [fff00000c664f800, fff00000c664f830)
[   35.915570] 
[   35.915994] The buggy address belongs to the physical page:
[   35.916660] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10664f
[   35.917776] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   35.918526] page_type: f5(slab)
[   35.919114] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   35.920063] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   35.921015] page dumped because: kasan: bad access detected
[   35.921670] 
[   35.921989] Memory state around the buggy address:
[   35.922619]  fff00000c664f700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.923427]  fff00000c664f780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.924361] >fff00000c664f800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   35.925204]                                      ^
[   35.925801]  fff00000c664f880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.926703]  fff00000c664f900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.927526] ==================================================================
[   35.770693] ==================================================================
[   35.771679] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1058/0x4858
[   35.772848] Write of size 8 at addr fff00000c664f830 by task kunit_try_catch/254
[   35.774001] 
[   35.774457] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241205 #1
[   35.775688] Tainted: [B]=BAD_PAGE, [N]=TEST
[   35.776370] Hardware name: linux,dummy-virt (DT)
[   35.776964] Call trace:
[   35.777570]  show_stack+0x20/0x38 (C)
[   35.778296]  dump_stack_lvl+0x8c/0xd0
[   35.778968]  print_report+0x118/0x5e0
[   35.779588]  kasan_report+0xc8/0x118
[   35.780219]  kasan_check_range+0x100/0x1a8
[   35.780902]  __kasan_check_write+0x20/0x30
[   35.781522]  kasan_atomics_helper+0x1058/0x4858
[   35.782230]  kasan_atomics+0x198/0x2e8
[   35.782895]  kunit_try_run_case+0x14c/0x3d0
[   35.783580]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.784387]  kthread+0x24c/0x2d0
[   35.785007]  ret_from_fork+0x10/0x20
[   35.785655] 
[   35.786028] Allocated by task 254:
[   35.786631]  kasan_save_stack+0x3c/0x68
[   35.787360]  kasan_save_track+0x20/0x40
[   35.787981]  kasan_save_alloc_info+0x40/0x58
[   35.788643]  __kasan_kmalloc+0xd4/0xd8
[   35.789252]  __kmalloc_cache_noprof+0x15c/0x3c0
[   35.789974]  kasan_atomics+0xb8/0x2e8
[   35.790593]  kunit_try_run_case+0x14c/0x3d0
[   35.791323]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.792114]  kthread+0x24c/0x2d0
[   35.792666]  ret_from_fork+0x10/0x20
[   35.793292] 
[   35.793634] The buggy address belongs to the object at fff00000c664f800
[   35.793634]  which belongs to the cache kmalloc-64 of size 64
[   35.795141] The buggy address is located 0 bytes to the right of
[   35.795141]  allocated 48-byte region [fff00000c664f800, fff00000c664f830)
[   35.796506] 
[   35.796923] The buggy address belongs to the physical page:
[   35.797596] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10664f
[   35.798658] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   35.799524] page_type: f5(slab)
[   35.800066] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   35.801123] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   35.802106] page dumped because: kasan: bad access detected
[   35.802806] 
[   35.803132] Memory state around the buggy address:
[   35.803834]  fff00000c664f700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.804638]  fff00000c664f780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.805484] >fff00000c664f800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   35.806333]                                      ^
[   35.807026]  fff00000c664f880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.808119]  fff00000c664f900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.808982] ==================================================================
[   35.465277] ==================================================================
[   35.466282] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xdd4/0x4858
[   35.468175] Read of size 8 at addr fff00000c664f830 by task kunit_try_catch/254
[   35.469376] 
[   35.469697] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241205 #1
[   35.471303] Tainted: [B]=BAD_PAGE, [N]=TEST
[   35.471899] Hardware name: linux,dummy-virt (DT)
[   35.472535] Call trace:
[   35.473040]  show_stack+0x20/0x38 (C)
[   35.473723]  dump_stack_lvl+0x8c/0xd0
[   35.474452]  print_report+0x118/0x5e0
[   35.474969]  kasan_report+0xc8/0x118
[   35.475507]  kasan_check_range+0x100/0x1a8
[   35.476170]  __kasan_check_read+0x20/0x30
[   35.476752]  kasan_atomics_helper+0xdd4/0x4858
[   35.477396]  kasan_atomics+0x198/0x2e8
[   35.478113]  kunit_try_run_case+0x14c/0x3d0
[   35.478782]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.479485]  kthread+0x24c/0x2d0
[   35.480090]  ret_from_fork+0x10/0x20
[   35.480572] 
[   35.480944] Allocated by task 254:
[   35.481446]  kasan_save_stack+0x3c/0x68
[   35.482122]  kasan_save_track+0x20/0x40
[   35.482700]  kasan_save_alloc_info+0x40/0x58
[   35.483744]  __kasan_kmalloc+0xd4/0xd8
[   35.484328]  __kmalloc_cache_noprof+0x15c/0x3c0
[   35.485025]  kasan_atomics+0xb8/0x2e8
[   35.485594]  kunit_try_run_case+0x14c/0x3d0
[   35.486276]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.486985]  kthread+0x24c/0x2d0
[   35.487545]  ret_from_fork+0x10/0x20
[   35.488089] 
[   35.488380] The buggy address belongs to the object at fff00000c664f800
[   35.488380]  which belongs to the cache kmalloc-64 of size 64
[   35.489783] The buggy address is located 0 bytes to the right of
[   35.489783]  allocated 48-byte region [fff00000c664f800, fff00000c664f830)
[   35.491190] 
[   35.491472] The buggy address belongs to the physical page:
[   35.492247] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10664f
[   35.493154] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   35.493953] page_type: f5(slab)
[   35.494497] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   35.495489] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   35.496390] page dumped because: kasan: bad access detected
[   35.497055] 
[   35.497384] Memory state around the buggy address:
[   35.497949]  fff00000c664f700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.498870]  fff00000c664f780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.499760] >fff00000c664f800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   35.500621]                                      ^
[   35.501319]  fff00000c664f880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.502183]  fff00000c664f900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.503008] ==================================================================
[   34.181635] ==================================================================
[   34.182575] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x24c/0x4858
[   34.184543] Write of size 4 at addr fff00000c664f830 by task kunit_try_catch/254
[   34.185559] 
[   34.185926] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241205 #1
[   34.187212] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.187983] Hardware name: linux,dummy-virt (DT)
[   34.188849] Call trace:
[   34.189452]  show_stack+0x20/0x38 (C)
[   34.190246]  dump_stack_lvl+0x8c/0xd0
[   34.190980]  print_report+0x118/0x5e0
[   34.191772]  kasan_report+0xc8/0x118
[   34.192663]  kasan_check_range+0x100/0x1a8
[   34.193168]  __kasan_check_write+0x20/0x30
[   34.194029]  kasan_atomics_helper+0x24c/0x4858
[   34.194891]  kasan_atomics+0x198/0x2e8
[   34.195986]  kunit_try_run_case+0x14c/0x3d0
[   34.196779]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.197578]  kthread+0x24c/0x2d0
[   34.198197]  ret_from_fork+0x10/0x20
[   34.198846] 
[   34.199225] Allocated by task 254:
[   34.199932]  kasan_save_stack+0x3c/0x68
[   34.200595]  kasan_save_track+0x20/0x40
[   34.201260]  kasan_save_alloc_info+0x40/0x58
[   34.201911]  __kasan_kmalloc+0xd4/0xd8
[   34.202537]  __kmalloc_cache_noprof+0x15c/0x3c0
[   34.203324]  kasan_atomics+0xb8/0x2e8
[   34.204422]  kunit_try_run_case+0x14c/0x3d0
[   34.205162]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.205991]  kthread+0x24c/0x2d0
[   34.206632]  ret_from_fork+0x10/0x20
[   34.207254] 
[   34.207758] The buggy address belongs to the object at fff00000c664f800
[   34.207758]  which belongs to the cache kmalloc-64 of size 64
[   34.209862] The buggy address is located 0 bytes to the right of
[   34.209862]  allocated 48-byte region [fff00000c664f800, fff00000c664f830)
[   34.211510] 
[   34.212154] The buggy address belongs to the physical page:
[   34.212913] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10664f
[   34.214031] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   34.214897] page_type: f5(slab)
[   34.215977] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   34.217127] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   34.218166] page dumped because: kasan: bad access detected
[   34.219158] 
[   34.219907] Memory state around the buggy address:
[   34.220576]  fff00000c664f700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   34.221648]  fff00000c664f780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   34.222681] >fff00000c664f800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   34.223917]                                      ^
[   34.224559]  fff00000c664f880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.225370]  fff00000c664f900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.226534] ==================================================================
[   34.610009] ==================================================================
[   34.610761] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x5b4/0x4858
[   34.612080] Write of size 4 at addr fff00000c664f830 by task kunit_try_catch/254
[   34.612978] 
[   34.613357] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241205 #1
[   34.614500] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.615267] Hardware name: linux,dummy-virt (DT)
[   34.615810] Call trace:
[   34.616307]  show_stack+0x20/0x38 (C)
[   34.617052]  dump_stack_lvl+0x8c/0xd0
[   34.617682]  print_report+0x118/0x5e0
[   34.618278]  kasan_report+0xc8/0x118
[   34.618815]  kasan_check_range+0x100/0x1a8
[   34.619541]  __kasan_check_write+0x20/0x30
[   34.620165]  kasan_atomics_helper+0x5b4/0x4858
[   34.620669]  kasan_atomics+0x198/0x2e8
[   34.621342]  kunit_try_run_case+0x14c/0x3d0
[   34.622065]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.622930]  kthread+0x24c/0x2d0
[   34.623469]  ret_from_fork+0x10/0x20
[   34.624136] 
[   34.624412] Allocated by task 254:
[   34.625197]  kasan_save_stack+0x3c/0x68
[   34.625912]  kasan_save_track+0x20/0x40
[   34.626510]  kasan_save_alloc_info+0x40/0x58
[   34.627108]  __kasan_kmalloc+0xd4/0xd8
[   34.627726]  __kmalloc_cache_noprof+0x15c/0x3c0
[   34.628394]  kasan_atomics+0xb8/0x2e8
[   34.628971]  kunit_try_run_case+0x14c/0x3d0
[   34.629620]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.630325]  kthread+0x24c/0x2d0
[   34.630947]  ret_from_fork+0x10/0x20
[   34.631476] 
[   34.631892] The buggy address belongs to the object at fff00000c664f800
[   34.631892]  which belongs to the cache kmalloc-64 of size 64
[   34.633323] The buggy address is located 0 bytes to the right of
[   34.633323]  allocated 48-byte region [fff00000c664f800, fff00000c664f830)
[   34.634695] 
[   34.635034] The buggy address belongs to the physical page:
[   34.635753] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10664f
[   34.636699] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   34.637488] page_type: f5(slab)
[   34.638093] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   34.638982] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   34.639902] page dumped because: kasan: bad access detected
[   34.640571] 
[   34.640863] Memory state around the buggy address:
[   34.641501]  fff00000c664f700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   34.642366]  fff00000c664f780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   34.643244] >fff00000c664f800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   34.644115]                                      ^
[   34.644630]  fff00000c664f880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.645609]  fff00000c664f900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.646475] ==================================================================
[   35.008161] ==================================================================
[   35.008839] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa04/0x4858
[   35.010366] Write of size 4 at addr fff00000c664f830 by task kunit_try_catch/254
[   35.011319] 
[   35.011755] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241205 #1
[   35.013054] Tainted: [B]=BAD_PAGE, [N]=TEST
[   35.013738] Hardware name: linux,dummy-virt (DT)
[   35.014294] Call trace:
[   35.014852]  show_stack+0x20/0x38 (C)
[   35.015422]  dump_stack_lvl+0x8c/0xd0
[   35.016016]  print_report+0x118/0x5e0
[   35.016660]  kasan_report+0xc8/0x118
[   35.017255]  kasan_check_range+0x100/0x1a8
[   35.017783]  __kasan_check_write+0x20/0x30
[   35.018504]  kasan_atomics_helper+0xa04/0x4858
[   35.019185]  kasan_atomics+0x198/0x2e8
[   35.019855]  kunit_try_run_case+0x14c/0x3d0
[   35.020508]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.021232]  kthread+0x24c/0x2d0
[   35.021787]  ret_from_fork+0x10/0x20
[   35.022496] 
[   35.022823] Allocated by task 254:
[   35.023295]  kasan_save_stack+0x3c/0x68
[   35.023917]  kasan_save_track+0x20/0x40
[   35.024450]  kasan_save_alloc_info+0x40/0x58
[   35.025147]  __kasan_kmalloc+0xd4/0xd8
[   35.025651]  __kmalloc_cache_noprof+0x15c/0x3c0
[   35.026323]  kasan_atomics+0xb8/0x2e8
[   35.027054]  kunit_try_run_case+0x14c/0x3d0
[   35.027642]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.028319]  kthread+0x24c/0x2d0
[   35.028929]  ret_from_fork+0x10/0x20
[   35.029505] 
[   35.029957] The buggy address belongs to the object at fff00000c664f800
[   35.029957]  which belongs to the cache kmalloc-64 of size 64
[   35.031340] The buggy address is located 0 bytes to the right of
[   35.031340]  allocated 48-byte region [fff00000c664f800, fff00000c664f830)
[   35.032764] 
[   35.033111] The buggy address belongs to the physical page:
[   35.033793] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10664f
[   35.035020] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   35.036036] page_type: f5(slab)
[   35.036513] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   35.037398] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   35.038474] page dumped because: kasan: bad access detected
[   35.039188] 
[   35.039520] Memory state around the buggy address:
[   35.040175]  fff00000c664f700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.040989]  fff00000c664f780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.041823] >fff00000c664f800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   35.042752]                                      ^
[   35.043394]  fff00000c664f880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.044253]  fff00000c664f900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.045163] ==================================================================
[   35.161581] ==================================================================
[   35.162320] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xb70/0x4858
[   35.163382] Write of size 4 at addr fff00000c664f830 by task kunit_try_catch/254
[   35.164219] 
[   35.164599] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241205 #1
[   35.165642] Tainted: [B]=BAD_PAGE, [N]=TEST
[   35.166424] Hardware name: linux,dummy-virt (DT)
[   35.167077] Call trace:
[   35.167470]  show_stack+0x20/0x38 (C)
[   35.168053]  dump_stack_lvl+0x8c/0xd0
[   35.168687]  print_report+0x118/0x5e0
[   35.169231]  kasan_report+0xc8/0x118
[   35.169700]  kasan_check_range+0x100/0x1a8
[   35.170655]  __kasan_check_write+0x20/0x30
[   35.171314]  kasan_atomics_helper+0xb70/0x4858
[   35.171942]  kasan_atomics+0x198/0x2e8
[   35.172668]  kunit_try_run_case+0x14c/0x3d0
[   35.173323]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.174099]  kthread+0x24c/0x2d0
[   35.174616]  ret_from_fork+0x10/0x20
[   35.175184] 
[   35.175602] Allocated by task 254:
[   35.176114]  kasan_save_stack+0x3c/0x68
[   35.176665]  kasan_save_track+0x20/0x40
[   35.177229]  kasan_save_alloc_info+0x40/0x58
[   35.177901]  __kasan_kmalloc+0xd4/0xd8
[   35.178440]  __kmalloc_cache_noprof+0x15c/0x3c0
[   35.179113]  kasan_atomics+0xb8/0x2e8
[   35.179598]  kunit_try_run_case+0x14c/0x3d0
[   35.180266]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.181089]  kthread+0x24c/0x2d0
[   35.181663]  ret_from_fork+0x10/0x20
[   35.182129] 
[   35.182529] The buggy address belongs to the object at fff00000c664f800
[   35.182529]  which belongs to the cache kmalloc-64 of size 64
[   35.183913] The buggy address is located 0 bytes to the right of
[   35.183913]  allocated 48-byte region [fff00000c664f800, fff00000c664f830)
[   35.185617] 
[   35.185911] The buggy address belongs to the physical page:
[   35.186769] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10664f
[   35.187594] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   35.188670] page_type: f5(slab)
[   35.189127] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   35.190027] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   35.191052] page dumped because: kasan: bad access detected
[   35.191712] 
[   35.192075] Memory state around the buggy address:
[   35.192709]  fff00000c664f700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.193579]  fff00000c664f780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.194445] >fff00000c664f800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   35.195267]                                      ^
[   35.195962]  fff00000c664f880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.196837]  fff00000c664f900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.197716] ==================================================================
[   34.276127] ==================================================================
[   34.276715] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x40fc/0x4858
[   34.278698] Read of size 4 at addr fff00000c664f830 by task kunit_try_catch/254
[   34.280430] 
[   34.280975] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241205 #1
[   34.282251] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.282870] Hardware name: linux,dummy-virt (DT)
[   34.283687] Call trace:
[   34.284790]  show_stack+0x20/0x38 (C)
[   34.285671]  dump_stack_lvl+0x8c/0xd0
[   34.286339]  print_report+0x118/0x5e0
[   34.287003]  kasan_report+0xc8/0x118
[   34.287694]  __asan_report_load4_noabort+0x20/0x30
[   34.288650]  kasan_atomics_helper+0x40fc/0x4858
[   34.289372]  kasan_atomics+0x198/0x2e8
[   34.290028]  kunit_try_run_case+0x14c/0x3d0
[   34.290693]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.291520]  kthread+0x24c/0x2d0
[   34.292287]  ret_from_fork+0x10/0x20
[   34.292851] 
[   34.293153] Allocated by task 254:
[   34.293680]  kasan_save_stack+0x3c/0x68
[   34.294724]  kasan_save_track+0x20/0x40
[   34.295758]  kasan_save_alloc_info+0x40/0x58
[   34.296651]  __kasan_kmalloc+0xd4/0xd8
[   34.297305]  __kmalloc_cache_noprof+0x15c/0x3c0
[   34.298013]  kasan_atomics+0xb8/0x2e8
[   34.298629]  kunit_try_run_case+0x14c/0x3d0
[   34.299323]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.300166]  kthread+0x24c/0x2d0
[   34.301348]  ret_from_fork+0x10/0x20
[   34.301902] 
[   34.302232] The buggy address belongs to the object at fff00000c664f800
[   34.302232]  which belongs to the cache kmalloc-64 of size 64
[   34.304485] The buggy address is located 0 bytes to the right of
[   34.304485]  allocated 48-byte region [fff00000c664f800, fff00000c664f830)
[   34.306108] 
[   34.306573] The buggy address belongs to the physical page:
[   34.307473] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10664f
[   34.309166] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   34.310065] page_type: f5(slab)
[   34.310639] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   34.311758] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   34.313260] page dumped because: kasan: bad access detected
[   34.314090] 
[   34.314448] Memory state around the buggy address:
[   34.315156]  fff00000c664f700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   34.316732]  fff00000c664f780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   34.317631] >fff00000c664f800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   34.318621]                                      ^
[   34.319334]  fff00000c664f880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.320770]  fff00000c664f900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.321682] ==================================================================
[   35.390416] ==================================================================
[   35.391089] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xd3c/0x4858
[   35.392090] Write of size 4 at addr fff00000c664f830 by task kunit_try_catch/254
[   35.392924] 
[   35.393239] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241205 #1
[   35.394685] Tainted: [B]=BAD_PAGE, [N]=TEST
[   35.395225] Hardware name: linux,dummy-virt (DT)
[   35.396191] Call trace:
[   35.396641]  show_stack+0x20/0x38 (C)
[   35.397214]  dump_stack_lvl+0x8c/0xd0
[   35.397827]  print_report+0x118/0x5e0
[   35.398465]  kasan_report+0xc8/0x118
[   35.399025]  kasan_check_range+0x100/0x1a8
[   35.399700]  __kasan_check_write+0x20/0x30
[   35.400363]  kasan_atomics_helper+0xd3c/0x4858
[   35.401056]  kasan_atomics+0x198/0x2e8
[   35.401619]  kunit_try_run_case+0x14c/0x3d0
[   35.402203]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.402987]  kthread+0x24c/0x2d0
[   35.403481]  ret_from_fork+0x10/0x20
[   35.404119] 
[   35.404474] Allocated by task 254:
[   35.404967]  kasan_save_stack+0x3c/0x68
[   35.405563]  kasan_save_track+0x20/0x40
[   35.406203]  kasan_save_alloc_info+0x40/0x58
[   35.406822]  __kasan_kmalloc+0xd4/0xd8
[   35.407431]  __kmalloc_cache_noprof+0x15c/0x3c0
[   35.408126]  kasan_atomics+0xb8/0x2e8
[   35.408658]  kunit_try_run_case+0x14c/0x3d0
[   35.409360]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.409988]  kthread+0x24c/0x2d0
[   35.410589]  ret_from_fork+0x10/0x20
[   35.411154] 
[   35.411460] The buggy address belongs to the object at fff00000c664f800
[   35.411460]  which belongs to the cache kmalloc-64 of size 64
[   35.412894] The buggy address is located 0 bytes to the right of
[   35.412894]  allocated 48-byte region [fff00000c664f800, fff00000c664f830)
[   35.414237] 
[   35.414607] The buggy address belongs to the physical page:
[   35.415323] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10664f
[   35.416214] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   35.417110] page_type: f5(slab)
[   35.417690] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   35.418594] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   35.419586] page dumped because: kasan: bad access detected
[   35.420400] 
[   35.420681] Memory state around the buggy address:
[   35.421372]  fff00000c664f700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.422215]  fff00000c664f780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.423048] >fff00000c664f800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   35.423916]                                      ^
[   35.424534]  fff00000c664f880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.425441]  fff00000c664f900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.426336] ==================================================================
[   36.432764] ==================================================================
[   36.433695] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x16d0/0x4858
[   36.434324] Write of size 8 at addr fff00000c664f830 by task kunit_try_catch/254
[   36.435059] 
[   36.435359] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241205 #1
[   36.436748] Tainted: [B]=BAD_PAGE, [N]=TEST
[   36.437313] Hardware name: linux,dummy-virt (DT)
[   36.437939] Call trace:
[   36.438469]  show_stack+0x20/0x38 (C)
[   36.439241]  dump_stack_lvl+0x8c/0xd0
[   36.440009]  print_report+0x118/0x5e0
[   36.440781]  kasan_report+0xc8/0x118
[   36.441356]  kasan_check_range+0x100/0x1a8
[   36.442024]  __kasan_check_write+0x20/0x30
[   36.442659]  kasan_atomics_helper+0x16d0/0x4858
[   36.443358]  kasan_atomics+0x198/0x2e8
[   36.443996]  kunit_try_run_case+0x14c/0x3d0
[   36.444601]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.445321]  kthread+0x24c/0x2d0
[   36.445898]  ret_from_fork+0x10/0x20
[   36.446563] 
[   36.446910] Allocated by task 254:
[   36.447594]  kasan_save_stack+0x3c/0x68
[   36.448193]  kasan_save_track+0x20/0x40
[   36.448706]  kasan_save_alloc_info+0x40/0x58
[   36.449463]  __kasan_kmalloc+0xd4/0xd8
[   36.450094]  __kmalloc_cache_noprof+0x15c/0x3c0
[   36.450710]  kasan_atomics+0xb8/0x2e8
[   36.451250]  kunit_try_run_case+0x14c/0x3d0
[   36.451771]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.452657]  kthread+0x24c/0x2d0
[   36.453184]  ret_from_fork+0x10/0x20
[   36.453698] 
[   36.454060] The buggy address belongs to the object at fff00000c664f800
[   36.454060]  which belongs to the cache kmalloc-64 of size 64
[   36.455352] The buggy address is located 0 bytes to the right of
[   36.455352]  allocated 48-byte region [fff00000c664f800, fff00000c664f830)
[   36.456912] 
[   36.457215] The buggy address belongs to the physical page:
[   36.458018] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10664f
[   36.458994] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   36.459804] page_type: f5(slab)
[   36.460379] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   36.461312] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   36.462228] page dumped because: kasan: bad access detected
[   36.462938] 
[   36.463306] Memory state around the buggy address:
[   36.464082]  fff00000c664f700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   36.464896]  fff00000c664f780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   36.465724] >fff00000c664f800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   36.466707]                                      ^
[   36.467364]  fff00000c664f880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.468241]  fff00000c664f900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.469189] ==================================================================
[   35.352187] ==================================================================
[   35.352960] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3dd8/0x4858
[   35.353770] Read of size 4 at addr fff00000c664f830 by task kunit_try_catch/254
[   35.354725] 
[   35.355273] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241205 #1
[   35.356692] Tainted: [B]=BAD_PAGE, [N]=TEST
[   35.357335] Hardware name: linux,dummy-virt (DT)
[   35.358474] Call trace:
[   35.358983]  show_stack+0x20/0x38 (C)
[   35.359695]  dump_stack_lvl+0x8c/0xd0
[   35.360294]  print_report+0x118/0x5e0
[   35.360867]  kasan_report+0xc8/0x118
[   35.361464]  __asan_report_load4_noabort+0x20/0x30
[   35.362029]  kasan_atomics_helper+0x3dd8/0x4858
[   35.362768]  kasan_atomics+0x198/0x2e8
[   35.363451]  kunit_try_run_case+0x14c/0x3d0
[   35.364185]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.364924]  kthread+0x24c/0x2d0
[   35.365538]  ret_from_fork+0x10/0x20
[   35.366138] 
[   35.366430] Allocated by task 254:
[   35.367123]  kasan_save_stack+0x3c/0x68
[   35.367794]  kasan_save_track+0x20/0x40
[   35.368445]  kasan_save_alloc_info+0x40/0x58
[   35.369091]  __kasan_kmalloc+0xd4/0xd8
[   35.369646]  __kmalloc_cache_noprof+0x15c/0x3c0
[   35.370336]  kasan_atomics+0xb8/0x2e8
[   35.370861]  kunit_try_run_case+0x14c/0x3d0
[   35.371579]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.372273]  kthread+0x24c/0x2d0
[   35.372867]  ret_from_fork+0x10/0x20
[   35.373499] 
[   35.373791] The buggy address belongs to the object at fff00000c664f800
[   35.373791]  which belongs to the cache kmalloc-64 of size 64
[   35.375254] The buggy address is located 0 bytes to the right of
[   35.375254]  allocated 48-byte region [fff00000c664f800, fff00000c664f830)
[   35.376633] 
[   35.377107] The buggy address belongs to the physical page:
[   35.377851] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10664f
[   35.379104] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   35.379897] page_type: f5(slab)
[   35.380502] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   35.381357] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   35.382367] page dumped because: kasan: bad access detected
[   35.383056] 
[   35.383353] Memory state around the buggy address:
[   35.384046]  fff00000c664f700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.384903]  fff00000c664f780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.385768] >fff00000c664f800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   35.386648]                                      ^
[   35.387264]  fff00000c664f880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.388184]  fff00000c664f900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.389026] ==================================================================
[   35.967570] ==================================================================
[   35.968495] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x126c/0x4858
[   35.969323] Write of size 8 at addr fff00000c664f830 by task kunit_try_catch/254
[   35.970199] 
[   35.970577] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241205 #1
[   35.971889] Tainted: [B]=BAD_PAGE, [N]=TEST
[   35.972390] Hardware name: linux,dummy-virt (DT)
[   35.973026] Call trace:
[   35.973519]  show_stack+0x20/0x38 (C)
[   35.974188]  dump_stack_lvl+0x8c/0xd0
[   35.974771]  print_report+0x118/0x5e0
[   35.975429]  kasan_report+0xc8/0x118
[   35.976108]  kasan_check_range+0x100/0x1a8
[   35.976597]  __kasan_check_write+0x20/0x30
[   35.977260]  kasan_atomics_helper+0x126c/0x4858
[   35.977914]  kasan_atomics+0x198/0x2e8
[   35.978592]  kunit_try_run_case+0x14c/0x3d0
[   35.979303]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.980026]  kthread+0x24c/0x2d0
[   35.980548]  ret_from_fork+0x10/0x20
[   35.981179] 
[   35.981504] Allocated by task 254:
[   35.982079]  kasan_save_stack+0x3c/0x68
[   35.982604]  kasan_save_track+0x20/0x40
[   35.983289]  kasan_save_alloc_info+0x40/0x58
[   35.983910]  __kasan_kmalloc+0xd4/0xd8
[   35.984377]  __kmalloc_cache_noprof+0x15c/0x3c0
[   35.985129]  kasan_atomics+0xb8/0x2e8
[   35.985743]  kunit_try_run_case+0x14c/0x3d0
[   35.986404]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.987134]  kthread+0x24c/0x2d0
[   35.987607]  ret_from_fork+0x10/0x20
[   35.988219] 
[   35.988521] The buggy address belongs to the object at fff00000c664f800
[   35.988521]  which belongs to the cache kmalloc-64 of size 64
[   35.989851] The buggy address is located 0 bytes to the right of
[   35.989851]  allocated 48-byte region [fff00000c664f800, fff00000c664f830)
[   35.991308] 
[   35.991592] The buggy address belongs to the physical page:
[   35.992381] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10664f
[   35.993237] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   35.994215] page_type: f5(slab)
[   35.994690] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   35.995660] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   35.996565] page dumped because: kasan: bad access detected
[   35.997365] 
[   35.997703] Memory state around the buggy address:
[   35.998422]  fff00000c664f700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.999291]  fff00000c664f780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   36.000197] >fff00000c664f800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   36.001058]                                      ^
[   36.001695]  fff00000c664f880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.002631]  fff00000c664f900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.003552] ==================================================================
[   34.534916] ==================================================================
[   34.535793] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4e4/0x4858
[   34.536667] Write of size 4 at addr fff00000c664f830 by task kunit_try_catch/254
[   34.537690] 
[   34.538043] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241205 #1
[   34.539311] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.539953] Hardware name: linux,dummy-virt (DT)
[   34.540579] Call trace:
[   34.541012]  show_stack+0x20/0x38 (C)
[   34.541587]  dump_stack_lvl+0x8c/0xd0
[   34.542158]  print_report+0x118/0x5e0
[   34.542849]  kasan_report+0xc8/0x118
[   34.543389]  kasan_check_range+0x100/0x1a8
[   34.544094]  __kasan_check_write+0x20/0x30
[   34.544633]  kasan_atomics_helper+0x4e4/0x4858
[   34.545381]  kasan_atomics+0x198/0x2e8
[   34.546046]  kunit_try_run_case+0x14c/0x3d0
[   34.546698]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.547521]  kthread+0x24c/0x2d0
[   34.548152]  ret_from_fork+0x10/0x20
[   34.548716] 
[   34.549184] Allocated by task 254:
[   34.549688]  kasan_save_stack+0x3c/0x68
[   34.550254]  kasan_save_track+0x20/0x40
[   34.550925]  kasan_save_alloc_info+0x40/0x58
[   34.551514]  __kasan_kmalloc+0xd4/0xd8
[   34.552026]  __kmalloc_cache_noprof+0x15c/0x3c0
[   34.552688]  kasan_atomics+0xb8/0x2e8
[   34.553179]  kunit_try_run_case+0x14c/0x3d0
[   34.553870]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.554608]  kthread+0x24c/0x2d0
[   34.555225]  ret_from_fork+0x10/0x20
[   34.555711] 
[   34.556113] The buggy address belongs to the object at fff00000c664f800
[   34.556113]  which belongs to the cache kmalloc-64 of size 64
[   34.557493] The buggy address is located 0 bytes to the right of
[   34.557493]  allocated 48-byte region [fff00000c664f800, fff00000c664f830)
[   34.558937] 
[   34.559341] The buggy address belongs to the physical page:
[   34.559905] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10664f
[   34.560931] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   34.561789] page_type: f5(slab)
[   34.562270] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   34.563282] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   34.564134] page dumped because: kasan: bad access detected
[   34.564951] 
[   34.565310] Memory state around the buggy address:
[   34.565968]  fff00000c664f700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   34.566974]  fff00000c664f780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   34.567814] >fff00000c664f800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   34.568616]                                      ^
[   34.569388]  fff00000c664f880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.570355]  fff00000c664f900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.571221] ==================================================================
[   36.548452] ==================================================================
[   36.549547] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e20/0x4858
[   36.550471] Read of size 8 at addr fff00000c664f830 by task kunit_try_catch/254
[   36.551385] 
[   36.551804] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241205 #1
[   36.553121] Tainted: [B]=BAD_PAGE, [N]=TEST
[   36.553648] Hardware name: linux,dummy-virt (DT)
[   36.554238] Call trace:
[   36.554703]  show_stack+0x20/0x38 (C)
[   36.555290]  dump_stack_lvl+0x8c/0xd0
[   36.555901]  print_report+0x118/0x5e0
[   36.556666]  kasan_report+0xc8/0x118
[   36.557381]  __asan_report_load8_noabort+0x20/0x30
[   36.558127]  kasan_atomics_helper+0x3e20/0x4858
[   36.558894]  kasan_atomics+0x198/0x2e8
[   36.559490]  kunit_try_run_case+0x14c/0x3d0
[   36.560003]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.560787]  kthread+0x24c/0x2d0
[   36.561411]  ret_from_fork+0x10/0x20
[   36.562070] 
[   36.562445] Allocated by task 254:
[   36.563116]  kasan_save_stack+0x3c/0x68
[   36.563632]  kasan_save_track+0x20/0x40
[   36.564274]  kasan_save_alloc_info+0x40/0x58
[   36.564933]  __kasan_kmalloc+0xd4/0xd8
[   36.565921]  __kmalloc_cache_noprof+0x15c/0x3c0
[   36.566505]  kasan_atomics+0xb8/0x2e8
[   36.567118]  kunit_try_run_case+0x14c/0x3d0
[   36.567826]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.568596]  kthread+0x24c/0x2d0
[   36.569121]  ret_from_fork+0x10/0x20
[   36.569604] 
[   36.570064] The buggy address belongs to the object at fff00000c664f800
[   36.570064]  which belongs to the cache kmalloc-64 of size 64
[   36.571444] The buggy address is located 0 bytes to the right of
[   36.571444]  allocated 48-byte region [fff00000c664f800, fff00000c664f830)
[   36.573102] 
[   36.573377] The buggy address belongs to the physical page:
[   36.574424] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10664f
[   36.575578] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   36.576502] page_type: f5(slab)
[   36.576972] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   36.577967] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   36.578826] page dumped because: kasan: bad access detected
[   36.579469] 
[   36.579778] Memory state around the buggy address:
[   36.580348]  fff00000c664f700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   36.581255]  fff00000c664f780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   36.582129] >fff00000c664f800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   36.583039]                                      ^
[   36.583675]  fff00000c664f880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.584532]  fff00000c664f900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.585433] ==================================================================
[   35.812098] ==================================================================
[   35.812870] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x10c0/0x4858
[   35.813698] Write of size 8 at addr fff00000c664f830 by task kunit_try_catch/254
[   35.815103] 
[   35.815479] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241205 #1
[   35.816714] Tainted: [B]=BAD_PAGE, [N]=TEST
[   35.817296] Hardware name: linux,dummy-virt (DT)
[   35.817850] Call trace:
[   35.818326]  show_stack+0x20/0x38 (C)
[   35.819004]  dump_stack_lvl+0x8c/0xd0
[   35.819516]  print_report+0x118/0x5e0
[   35.820198]  kasan_report+0xc8/0x118
[   35.820705]  kasan_check_range+0x100/0x1a8
[   35.821494]  __kasan_check_write+0x20/0x30
[   35.822211]  kasan_atomics_helper+0x10c0/0x4858
[   35.822896]  kasan_atomics+0x198/0x2e8
[   35.823465]  kunit_try_run_case+0x14c/0x3d0
[   35.824118]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.824940]  kthread+0x24c/0x2d0
[   35.825571]  ret_from_fork+0x10/0x20
[   35.826129] 
[   35.826445] Allocated by task 254:
[   35.826970]  kasan_save_stack+0x3c/0x68
[   35.827699]  kasan_save_track+0x20/0x40
[   35.828253]  kasan_save_alloc_info+0x40/0x58
[   35.828964]  __kasan_kmalloc+0xd4/0xd8
[   35.829556]  __kmalloc_cache_noprof+0x15c/0x3c0
[   35.830271]  kasan_atomics+0xb8/0x2e8
[   35.830857]  kunit_try_run_case+0x14c/0x3d0
[   35.831480]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.832254]  kthread+0x24c/0x2d0
[   35.832848]  ret_from_fork+0x10/0x20
[   35.833366] 
[   35.833717] The buggy address belongs to the object at fff00000c664f800
[   35.833717]  which belongs to the cache kmalloc-64 of size 64
[   35.835131] The buggy address is located 0 bytes to the right of
[   35.835131]  allocated 48-byte region [fff00000c664f800, fff00000c664f830)
[   35.836547] 
[   35.836890] The buggy address belongs to the physical page:
[   35.837528] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10664f
[   35.838546] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   35.839474] page_type: f5(slab)
[   35.840296] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   35.841214] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   35.842298] page dumped because: kasan: bad access detected
[   35.843117] 
[   35.843630] Memory state around the buggy address:
[   35.844419]  fff00000c664f700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.845523]  fff00000c664f780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.846488] >fff00000c664f800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   35.847455]                                      ^
[   35.848069]  fff00000c664f880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.848995]  fff00000c664f900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.849834] ==================================================================
[   36.392384] ==================================================================
[   36.393748] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3df4/0x4858
[   36.394707] Read of size 8 at addr fff00000c664f830 by task kunit_try_catch/254
[   36.396059] 
[   36.396431] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241205 #1
[   36.397999] Tainted: [B]=BAD_PAGE, [N]=TEST
[   36.398860] Hardware name: linux,dummy-virt (DT)
[   36.399491] Call trace:
[   36.399911]  show_stack+0x20/0x38 (C)
[   36.400453]  dump_stack_lvl+0x8c/0xd0
[   36.401357]  print_report+0x118/0x5e0
[   36.402152]  kasan_report+0xc8/0x118
[   36.402980]  __asan_report_load8_noabort+0x20/0x30
[   36.403718]  kasan_atomics_helper+0x3df4/0x4858
[   36.404340]  kasan_atomics+0x198/0x2e8
[   36.404943]  kunit_try_run_case+0x14c/0x3d0
[   36.405552]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.406469]  kthread+0x24c/0x2d0
[   36.406962]  ret_from_fork+0x10/0x20
[   36.407663] 
[   36.408053] Allocated by task 254:
[   36.408565]  kasan_save_stack+0x3c/0x68
[   36.409292]  kasan_save_track+0x20/0x40
[   36.409857]  kasan_save_alloc_info+0x40/0x58
[   36.410667]  __kasan_kmalloc+0xd4/0xd8
[   36.411313]  __kmalloc_cache_noprof+0x15c/0x3c0
[   36.411973]  kasan_atomics+0xb8/0x2e8
[   36.412594]  kunit_try_run_case+0x14c/0x3d0
[   36.413302]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.414121]  kthread+0x24c/0x2d0
[   36.414769]  ret_from_fork+0x10/0x20
[   36.415395] 
[   36.415851] The buggy address belongs to the object at fff00000c664f800
[   36.415851]  which belongs to the cache kmalloc-64 of size 64
[   36.417291] The buggy address is located 0 bytes to the right of
[   36.417291]  allocated 48-byte region [fff00000c664f800, fff00000c664f830)
[   36.418032] 
[   36.418543] The buggy address belongs to the physical page:
[   36.419425] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10664f
[   36.420540] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   36.421373] page_type: f5(slab)
[   36.422061] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   36.423128] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   36.424188] page dumped because: kasan: bad access detected
[   36.424956] 
[   36.425291] Memory state around the buggy address:
[   36.426113]  fff00000c664f700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   36.427049]  fff00000c664f780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   36.427963] >fff00000c664f800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   36.428812]                                      ^
[   36.429402]  fff00000c664f880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.430343]  fff00000c664f900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.431201] ==================================================================
[   34.970251] ==================================================================
[   34.971041] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x99c/0x4858
[   34.972225] Write of size 4 at addr fff00000c664f830 by task kunit_try_catch/254
[   34.973155] 
[   34.973540] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241205 #1
[   34.974723] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.975389] Hardware name: linux,dummy-virt (DT)
[   34.976014] Call trace:
[   34.976362]  show_stack+0x20/0x38 (C)
[   34.977055]  dump_stack_lvl+0x8c/0xd0
[   34.977625]  print_report+0x118/0x5e0
[   34.978234]  kasan_report+0xc8/0x118
[   34.978843]  kasan_check_range+0x100/0x1a8
[   34.979475]  __kasan_check_write+0x20/0x30
[   34.980217]  kasan_atomics_helper+0x99c/0x4858
[   34.980756]  kasan_atomics+0x198/0x2e8
[   34.981483]  kunit_try_run_case+0x14c/0x3d0
[   34.982170]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.982947]  kthread+0x24c/0x2d0
[   34.983592]  ret_from_fork+0x10/0x20
[   34.984166] 
[   34.984461] Allocated by task 254:
[   34.984995]  kasan_save_stack+0x3c/0x68
[   34.985640]  kasan_save_track+0x20/0x40
[   34.986418]  kasan_save_alloc_info+0x40/0x58
[   34.986979]  __kasan_kmalloc+0xd4/0xd8
[   34.987633]  __kmalloc_cache_noprof+0x15c/0x3c0
[   34.988309]  kasan_atomics+0xb8/0x2e8
[   34.988842]  kunit_try_run_case+0x14c/0x3d0
[   34.989487]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.990188]  kthread+0x24c/0x2d0
[   34.990718]  ret_from_fork+0x10/0x20
[   34.991248] 
[   34.991614] The buggy address belongs to the object at fff00000c664f800
[   34.991614]  which belongs to the cache kmalloc-64 of size 64
[   34.993018] The buggy address is located 0 bytes to the right of
[   34.993018]  allocated 48-byte region [fff00000c664f800, fff00000c664f830)
[   34.994396] 
[   34.994697] The buggy address belongs to the physical page:
[   34.995537] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10664f
[   34.996467] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   34.997355] page_type: f5(slab)
[   34.997940] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   34.998895] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   34.999767] page dumped because: kasan: bad access detected
[   35.000548] 
[   35.000871] Memory state around the buggy address:
[   35.001507]  fff00000c664f700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.002361]  fff00000c664f780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.003159] >fff00000c664f800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   35.004019]                                      ^
[   35.004641]  fff00000c664f880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.005609]  fff00000c664f900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.006417] ==================================================================
[   36.004975] ==================================================================
[   36.005718] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x12d8/0x4858
[   36.006716] Write of size 8 at addr fff00000c664f830 by task kunit_try_catch/254
[   36.007633] 
[   36.008042] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241205 #1
[   36.009362] Tainted: [B]=BAD_PAGE, [N]=TEST
[   36.010028] Hardware name: linux,dummy-virt (DT)
[   36.010531] Call trace:
[   36.011060]  show_stack+0x20/0x38 (C)
[   36.011644]  dump_stack_lvl+0x8c/0xd0
[   36.012418]  print_report+0x118/0x5e0
[   36.012934]  kasan_report+0xc8/0x118
[   36.013589]  kasan_check_range+0x100/0x1a8
[   36.014424]  __kasan_check_write+0x20/0x30
[   36.014992]  kasan_atomics_helper+0x12d8/0x4858
[   36.015727]  kasan_atomics+0x198/0x2e8
[   36.016216]  kunit_try_run_case+0x14c/0x3d0
[   36.016990]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.017734]  kthread+0x24c/0x2d0
[   36.018308]  ret_from_fork+0x10/0x20
[   36.018933] 
[   36.019315] Allocated by task 254:
[   36.019737]  kasan_save_stack+0x3c/0x68
[   36.020423]  kasan_save_track+0x20/0x40
[   36.020989]  kasan_save_alloc_info+0x40/0x58
[   36.021634]  __kasan_kmalloc+0xd4/0xd8
[   36.022132]  __kmalloc_cache_noprof+0x15c/0x3c0
[   36.022897]  kasan_atomics+0xb8/0x2e8
[   36.023409]  kunit_try_run_case+0x14c/0x3d0
[   36.024016]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.024781]  kthread+0x24c/0x2d0
[   36.025303]  ret_from_fork+0x10/0x20
[   36.025784] 
[   36.026213] The buggy address belongs to the object at fff00000c664f800
[   36.026213]  which belongs to the cache kmalloc-64 of size 64
[   36.027593] The buggy address is located 0 bytes to the right of
[   36.027593]  allocated 48-byte region [fff00000c664f800, fff00000c664f830)
[   36.028978] 
[   36.029285] The buggy address belongs to the physical page:
[   36.030396] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10664f
[   36.031369] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   36.032228] page_type: f5(slab)
[   36.032726] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   36.033646] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   36.034621] page dumped because: kasan: bad access detected
[   36.035331] 
[   36.035712] Memory state around the buggy address:
[   36.036234]  fff00000c664f700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   36.037189]  fff00000c664f780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   36.037993] >fff00000c664f800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   36.038961]                                      ^
[   36.039563]  fff00000c664f880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.040432]  fff00000c664f900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.041299] ==================================================================
[   36.314445] ==================================================================
[   36.315076] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3db0/0x4858
[   36.316473] Read of size 8 at addr fff00000c664f830 by task kunit_try_catch/254
[   36.317200] 
[   36.317495] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241205 #1
[   36.318485] Tainted: [B]=BAD_PAGE, [N]=TEST
[   36.319009] Hardware name: linux,dummy-virt (DT)
[   36.319661] Call trace:
[   36.320097]  show_stack+0x20/0x38 (C)
[   36.320731]  dump_stack_lvl+0x8c/0xd0
[   36.321349]  print_report+0x118/0x5e0
[   36.321927]  kasan_report+0xc8/0x118
[   36.322460]  __asan_report_load8_noabort+0x20/0x30
[   36.323230]  kasan_atomics_helper+0x3db0/0x4858
[   36.323768]  kasan_atomics+0x198/0x2e8
[   36.324439]  kunit_try_run_case+0x14c/0x3d0
[   36.325143]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.326020]  kthread+0x24c/0x2d0
[   36.326544]  ret_from_fork+0x10/0x20
[   36.327217] 
[   36.327547] Allocated by task 254:
[   36.328002]  kasan_save_stack+0x3c/0x68
[   36.328598]  kasan_save_track+0x20/0x40
[   36.329115]  kasan_save_alloc_info+0x40/0x58
[   36.329831]  __kasan_kmalloc+0xd4/0xd8
[   36.330454]  __kmalloc_cache_noprof+0x15c/0x3c0
[   36.331080]  kasan_atomics+0xb8/0x2e8
[   36.331609]  kunit_try_run_case+0x14c/0x3d0
[   36.332247]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.333002]  kthread+0x24c/0x2d0
[   36.333511]  ret_from_fork+0x10/0x20
[   36.334034] 
[   36.334474] The buggy address belongs to the object at fff00000c664f800
[   36.334474]  which belongs to the cache kmalloc-64 of size 64
[   36.335922] The buggy address is located 0 bytes to the right of
[   36.335922]  allocated 48-byte region [fff00000c664f800, fff00000c664f830)
[   36.337208] 
[   36.337599] The buggy address belongs to the physical page:
[   36.338179] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10664f
[   36.339220] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   36.340119] page_type: f5(slab)
[   36.340650] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   36.341564] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   36.342520] page dumped because: kasan: bad access detected
[   36.343184] 
[   36.343503] Memory state around the buggy address:
[   36.344136]  fff00000c664f700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   36.344958]  fff00000c664f780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   36.345768] >fff00000c664f800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   36.346677]                                      ^
[   36.347316]  fff00000c664f880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.348222]  fff00000c664f900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.349089] ==================================================================

[   32.206918] ==================================================================
[   32.207537] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e0/0x5450
[   32.209014] Read of size 4 at addr ffff888102a0ec30 by task kunit_try_catch/272
[   32.210125] 
[   32.210341] CPU: 1 UID: 0 PID: 272 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241205 #1
[   32.211226] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.211530] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   32.212278] Call Trace:
[   32.212673]  <TASK>
[   32.213036]  dump_stack_lvl+0x73/0xb0
[   32.213364]  print_report+0xd1/0x640
[   32.213879]  ? __virt_addr_valid+0x1db/0x2d0
[   32.214395]  ? kasan_complete_mode_report_info+0x2a/0x200
[   32.214921]  kasan_report+0x102/0x140
[   32.215315]  ? kasan_atomics_helper+0x3e0/0x5450
[   32.215825]  ? kasan_atomics_helper+0x3e0/0x5450
[   32.216310]  kasan_check_range+0x10c/0x1c0
[   32.216841]  __kasan_check_read+0x15/0x20
[   32.217219]  kasan_atomics_helper+0x3e0/0x5450
[   32.217676]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   32.218105]  ? __kmalloc_cache_noprof+0x184/0x410
[   32.218656]  ? kasan_atomics+0x153/0x310
[   32.219168]  kasan_atomics+0x1dd/0x310
[   32.219733]  ? __pfx_kasan_atomics+0x10/0x10
[   32.220141]  ? __pfx_read_tsc+0x10/0x10
[   32.220534]  ? ktime_get_ts64+0x86/0x230
[   32.221284]  kunit_try_run_case+0x1b3/0x490
[   32.221638]  ? __pfx_kunit_try_run_case+0x10/0x10
[   32.222228]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   32.222742]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   32.223293]  ? __kthread_parkme+0x82/0x160
[   32.223736]  ? preempt_count_sub+0x50/0x80
[   32.224193]  ? __pfx_kunit_try_run_case+0x10/0x10
[   32.224629]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   32.225399]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   32.226020]  kthread+0x257/0x310
[   32.226370]  ? __pfx_kthread+0x10/0x10
[   32.226776]  ret_from_fork+0x41/0x80
[   32.227330]  ? __pfx_kthread+0x10/0x10
[   32.227673]  ret_from_fork_asm+0x1a/0x30
[   32.228181]  </TASK>
[   32.228488] 
[   32.228651] Allocated by task 272:
[   32.228925]  kasan_save_stack+0x3d/0x60
[   32.229445]  kasan_save_track+0x18/0x40
[   32.229979]  kasan_save_alloc_info+0x3b/0x50
[   32.230518]  __kasan_kmalloc+0xb7/0xc0
[   32.230863]  __kmalloc_cache_noprof+0x184/0x410
[   32.231335]  kasan_atomics+0x96/0x310
[   32.231915]  kunit_try_run_case+0x1b3/0x490
[   32.232226]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   32.232962]  kthread+0x257/0x310
[   32.233419]  ret_from_fork+0x41/0x80
[   32.234383]  ret_from_fork_asm+0x1a/0x30
[   32.234752] 
[   32.235047] The buggy address belongs to the object at ffff888102a0ec00
[   32.235047]  which belongs to the cache kmalloc-64 of size 64
[   32.237306] The buggy address is located 0 bytes to the right of
[   32.237306]  allocated 48-byte region [ffff888102a0ec00, ffff888102a0ec30)
[   32.238975] 
[   32.239197] The buggy address belongs to the physical page:
[   32.239755] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a0e
[   32.240486] flags: 0x200000000000000(node=0|zone=2)
[   32.241890] page_type: f5(slab)
[   32.242635] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   32.243422] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   32.243960] page dumped because: kasan: bad access detected
[   32.244535] 
[   32.244735] Memory state around the buggy address:
[   32.245230]  ffff888102a0eb00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.245811]  ffff888102a0eb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.246474] >ffff888102a0ec00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   32.246942]                                      ^
[   32.247506]  ffff888102a0ec80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.248221]  ffff888102a0ed00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.248809] ==================================================================
[   32.726850] ==================================================================
[   32.727729] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa2c/0x5450
[   32.728448] Write of size 4 at addr ffff888102a0ec30 by task kunit_try_catch/272
[   32.729127] 
[   32.729317] CPU: 1 UID: 0 PID: 272 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241205 #1
[   32.730096] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.730649] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   32.731612] Call Trace:
[   32.731963]  <TASK>
[   32.732336]  dump_stack_lvl+0x73/0xb0
[   32.732856]  print_report+0xd1/0x640
[   32.733312]  ? __virt_addr_valid+0x1db/0x2d0
[   32.733775]  ? kasan_complete_mode_report_info+0x2a/0x200
[   32.734452]  kasan_report+0x102/0x140
[   32.735119]  ? kasan_atomics_helper+0xa2c/0x5450
[   32.735604]  ? kasan_atomics_helper+0xa2c/0x5450
[   32.736547]  kasan_check_range+0x10c/0x1c0
[   32.737209]  __kasan_check_write+0x18/0x20
[   32.738041]  kasan_atomics_helper+0xa2c/0x5450
[   32.738559]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   32.739270]  ? __kmalloc_cache_noprof+0x184/0x410
[   32.739664]  ? kasan_atomics+0x153/0x310
[   32.740292]  kasan_atomics+0x1dd/0x310
[   32.740762]  ? __pfx_kasan_atomics+0x10/0x10
[   32.741248]  ? __pfx_read_tsc+0x10/0x10
[   32.741786]  ? ktime_get_ts64+0x86/0x230
[   32.742250]  kunit_try_run_case+0x1b3/0x490
[   32.742919]  ? __pfx_kunit_try_run_case+0x10/0x10
[   32.743525]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   32.744052]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   32.744622]  ? __kthread_parkme+0x82/0x160
[   32.745151]  ? preempt_count_sub+0x50/0x80
[   32.745696]  ? __pfx_kunit_try_run_case+0x10/0x10
[   32.746335]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   32.746773]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   32.747496]  kthread+0x257/0x310
[   32.748091]  ? __pfx_kthread+0x10/0x10
[   32.748539]  ret_from_fork+0x41/0x80
[   32.748869]  ? __pfx_kthread+0x10/0x10
[   32.749427]  ret_from_fork_asm+0x1a/0x30
[   32.750098]  </TASK>
[   32.750351] 
[   32.750555] Allocated by task 272:
[   32.751218]  kasan_save_stack+0x3d/0x60
[   32.751560]  kasan_save_track+0x18/0x40
[   32.752248]  kasan_save_alloc_info+0x3b/0x50
[   32.752801]  __kasan_kmalloc+0xb7/0xc0
[   32.753196]  __kmalloc_cache_noprof+0x184/0x410
[   32.753674]  kasan_atomics+0x96/0x310
[   32.754225]  kunit_try_run_case+0x1b3/0x490
[   32.754650]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   32.755481]  kthread+0x257/0x310
[   32.756295]  ret_from_fork+0x41/0x80
[   32.756975]  ret_from_fork_asm+0x1a/0x30
[   32.757607] 
[   32.757773] The buggy address belongs to the object at ffff888102a0ec00
[   32.757773]  which belongs to the cache kmalloc-64 of size 64
[   32.759815] The buggy address is located 0 bytes to the right of
[   32.759815]  allocated 48-byte region [ffff888102a0ec00, ffff888102a0ec30)
[   32.760725] 
[   32.761359] The buggy address belongs to the physical page:
[   32.762177] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a0e
[   32.762835] flags: 0x200000000000000(node=0|zone=2)
[   32.763594] page_type: f5(slab)
[   32.764231] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   32.765399] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   32.766565] page dumped because: kasan: bad access detected
[   32.767078] 
[   32.767286] Memory state around the buggy address:
[   32.768145]  ffff888102a0eb00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.769357]  ffff888102a0eb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.770353] >ffff888102a0ec00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   32.771319]                                      ^
[   32.771829]  ffff888102a0ec80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.772434]  ffff888102a0ed00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.773402] ==================================================================
[   33.894220] ==================================================================
[   33.894958] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x16e8/0x5450
[   33.895556] Write of size 8 at addr ffff888102a0ec30 by task kunit_try_catch/272
[   33.896261] 
[   33.896496] CPU: 1 UID: 0 PID: 272 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241205 #1
[   33.897427] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.897791] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   33.898597] Call Trace:
[   33.899000]  <TASK>
[   33.899296]  dump_stack_lvl+0x73/0xb0
[   33.899740]  print_report+0xd1/0x640
[   33.900119]  ? __virt_addr_valid+0x1db/0x2d0
[   33.900592]  ? kasan_complete_mode_report_info+0x2a/0x200
[   33.901189]  kasan_report+0x102/0x140
[   33.901668]  ? kasan_atomics_helper+0x16e8/0x5450
[   33.902229]  ? kasan_atomics_helper+0x16e8/0x5450
[   33.902697]  kasan_check_range+0x10c/0x1c0
[   33.903195]  __kasan_check_write+0x18/0x20
[   33.903724]  kasan_atomics_helper+0x16e8/0x5450
[   33.904155]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   33.904752]  ? __kmalloc_cache_noprof+0x184/0x410
[   33.905223]  ? kasan_atomics+0x153/0x310
[   33.905675]  kasan_atomics+0x1dd/0x310
[   33.906085]  ? __pfx_kasan_atomics+0x10/0x10
[   33.906603]  ? __pfx_read_tsc+0x10/0x10
[   33.907052]  ? ktime_get_ts64+0x86/0x230
[   33.907550]  kunit_try_run_case+0x1b3/0x490
[   33.908096]  ? __pfx_kunit_try_run_case+0x10/0x10
[   33.908483]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   33.909032]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   33.909700]  ? __kthread_parkme+0x82/0x160
[   33.910149]  ? preempt_count_sub+0x50/0x80
[   33.910514]  ? __pfx_kunit_try_run_case+0x10/0x10
[   33.911089]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   33.911500]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   33.912148]  kthread+0x257/0x310
[   33.912595]  ? __pfx_kthread+0x10/0x10
[   33.912977]  ret_from_fork+0x41/0x80
[   33.913483]  ? __pfx_kthread+0x10/0x10
[   33.914188]  ret_from_fork_asm+0x1a/0x30
[   33.914815]  </TASK>
[   33.915179] 
[   33.915372] Allocated by task 272:
[   33.915861]  kasan_save_stack+0x3d/0x60
[   33.916168]  kasan_save_track+0x18/0x40
[   33.916802]  kasan_save_alloc_info+0x3b/0x50
[   33.917314]  __kasan_kmalloc+0xb7/0xc0
[   33.917696]  __kmalloc_cache_noprof+0x184/0x410
[   33.918357]  kasan_atomics+0x96/0x310
[   33.918884]  kunit_try_run_case+0x1b3/0x490
[   33.919333]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   33.919846]  kthread+0x257/0x310
[   33.920285]  ret_from_fork+0x41/0x80
[   33.920819]  ret_from_fork_asm+0x1a/0x30
[   33.921135] 
[   33.921305] The buggy address belongs to the object at ffff888102a0ec00
[   33.921305]  which belongs to the cache kmalloc-64 of size 64
[   33.922318] The buggy address is located 0 bytes to the right of
[   33.922318]  allocated 48-byte region [ffff888102a0ec00, ffff888102a0ec30)
[   33.923536] 
[   33.923862] The buggy address belongs to the physical page:
[   33.924352] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a0e
[   33.924970] flags: 0x200000000000000(node=0|zone=2)
[   33.925573] page_type: f5(slab)
[   33.926111] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   33.926671] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   33.927186] page dumped because: kasan: bad access detected
[   33.927898] 
[   33.928165] Memory state around the buggy address:
[   33.928757]  ffff888102a0eb00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.929545]  ffff888102a0eb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.930188] >ffff888102a0ec00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   33.930801]                                      ^
[   33.931118]  ffff888102a0ec80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.932006]  ffff888102a0ed00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.932655] ==================================================================
[   34.759613] ==================================================================
[   34.760285] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4fb4/0x5450
[   34.761745] Read of size 8 at addr ffff888102a0ec30 by task kunit_try_catch/272
[   34.762581] 
[   34.763134] CPU: 1 UID: 0 PID: 272 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241205 #1
[   34.764113] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.764521] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   34.765448] Call Trace:
[   34.765744]  <TASK>
[   34.766239]  dump_stack_lvl+0x73/0xb0
[   34.766867]  print_report+0xd1/0x640
[   34.767520]  ? __virt_addr_valid+0x1db/0x2d0
[   34.768060]  ? kasan_complete_mode_report_info+0x2a/0x200
[   34.769113]  kasan_report+0x102/0x140
[   34.769565]  ? kasan_atomics_helper+0x4fb4/0x5450
[   34.770553]  ? kasan_atomics_helper+0x4fb4/0x5450
[   34.771197]  __asan_report_load8_noabort+0x18/0x20
[   34.771438]  kasan_atomics_helper+0x4fb4/0x5450
[   34.771662]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   34.772048]  ? __kmalloc_cache_noprof+0x184/0x410
[   34.773202]  ? kasan_atomics+0x153/0x310
[   34.773636]  kasan_atomics+0x1dd/0x310
[   34.774278]  ? __pfx_kasan_atomics+0x10/0x10
[   34.774843]  ? __pfx_read_tsc+0x10/0x10
[   34.775319]  ? ktime_get_ts64+0x86/0x230
[   34.775887]  kunit_try_run_case+0x1b3/0x490
[   34.776272]  ? __pfx_kunit_try_run_case+0x10/0x10
[   34.776877]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   34.777257]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   34.778047]  ? __kthread_parkme+0x82/0x160
[   34.778532]  ? preempt_count_sub+0x50/0x80
[   34.779183]  ? __pfx_kunit_try_run_case+0x10/0x10
[   34.779796]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   34.780402]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   34.781329]  kthread+0x257/0x310
[   34.781829]  ? __pfx_kthread+0x10/0x10
[   34.782540]  ret_from_fork+0x41/0x80
[   34.783150]  ? __pfx_kthread+0x10/0x10
[   34.783733]  ret_from_fork_asm+0x1a/0x30
[   34.784237]  </TASK>
[   34.784704] 
[   34.785032] Allocated by task 272:
[   34.785419]  kasan_save_stack+0x3d/0x60
[   34.786187]  kasan_save_track+0x18/0x40
[   34.786748]  kasan_save_alloc_info+0x3b/0x50
[   34.787210]  __kasan_kmalloc+0xb7/0xc0
[   34.787960]  __kmalloc_cache_noprof+0x184/0x410
[   34.788324]  kasan_atomics+0x96/0x310
[   34.789338]  kunit_try_run_case+0x1b3/0x490
[   34.790371]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   34.791202]  kthread+0x257/0x310
[   34.791477]  ret_from_fork+0x41/0x80
[   34.792060]  ret_from_fork_asm+0x1a/0x30
[   34.792485] 
[   34.792733] The buggy address belongs to the object at ffff888102a0ec00
[   34.792733]  which belongs to the cache kmalloc-64 of size 64
[   34.793647] The buggy address is located 0 bytes to the right of
[   34.793647]  allocated 48-byte region [ffff888102a0ec00, ffff888102a0ec30)
[   34.794551] 
[   34.794921] The buggy address belongs to the physical page:
[   34.795567] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a0e
[   34.796461] flags: 0x200000000000000(node=0|zone=2)
[   34.796857] page_type: f5(slab)
[   34.797567] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   34.798653] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   34.799414] page dumped because: kasan: bad access detected
[   34.799956] 
[   34.800210] Memory state around the buggy address:
[   34.800708]  ffff888102a0eb00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   34.801466]  ffff888102a0eb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   34.802187] >ffff888102a0ec00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   34.802969]                                      ^
[   34.803377]  ffff888102a0ec80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.804171]  ffff888102a0ed00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.804934] ==================================================================
[   31.998490] ==================================================================
[   32.000767] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4bbe/0x5450
[   32.001501] Read of size 4 at addr ffff888102a0ec30 by task kunit_try_catch/272
[   32.003108] 
[   32.003333] CPU: 1 UID: 0 PID: 272 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241205 #1
[   32.004757] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.005709] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   32.006662] Call Trace:
[   32.007027]  <TASK>
[   32.007726]  dump_stack_lvl+0x73/0xb0
[   32.008279]  print_report+0xd1/0x640
[   32.009117]  ? __virt_addr_valid+0x1db/0x2d0
[   32.009811]  ? kasan_complete_mode_report_info+0x2a/0x200
[   32.010666]  kasan_report+0x102/0x140
[   32.011384]  ? kasan_atomics_helper+0x4bbe/0x5450
[   32.012428]  ? kasan_atomics_helper+0x4bbe/0x5450
[   32.013112]  __asan_report_load4_noabort+0x18/0x20
[   32.013779]  kasan_atomics_helper+0x4bbe/0x5450
[   32.014389]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   32.015202]  ? __kmalloc_cache_noprof+0x184/0x410
[   32.015966]  ? kasan_atomics+0x153/0x310
[   32.016453]  kasan_atomics+0x1dd/0x310
[   32.016910]  ? __pfx_kasan_atomics+0x10/0x10
[   32.018378]  ? __pfx_read_tsc+0x10/0x10
[   32.018910]  ? ktime_get_ts64+0x86/0x230
[   32.019607]  kunit_try_run_case+0x1b3/0x490
[   32.020248]  ? __pfx_kunit_try_run_case+0x10/0x10
[   32.020911]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   32.022095]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   32.022561]  ? __kthread_parkme+0x82/0x160
[   32.023543]  ? preempt_count_sub+0x50/0x80
[   32.024170]  ? __pfx_kunit_try_run_case+0x10/0x10
[   32.024872]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   32.025457]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   32.025909]  kthread+0x257/0x310
[   32.026335]  ? __pfx_kthread+0x10/0x10
[   32.027092]  ret_from_fork+0x41/0x80
[   32.027881]  ? __pfx_kthread+0x10/0x10
[   32.028817]  ret_from_fork_asm+0x1a/0x30
[   32.029241]  </TASK>
[   32.029868] 
[   32.030027] Allocated by task 272:
[   32.031162]  kasan_save_stack+0x3d/0x60
[   32.031861]  kasan_save_track+0x18/0x40
[   32.032321]  kasan_save_alloc_info+0x3b/0x50
[   32.033380]  __kasan_kmalloc+0xb7/0xc0
[   32.034024]  __kmalloc_cache_noprof+0x184/0x410
[   32.034722]  kasan_atomics+0x96/0x310
[   32.035493]  kunit_try_run_case+0x1b3/0x490
[   32.036355]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   32.037198]  kthread+0x257/0x310
[   32.037642]  ret_from_fork+0x41/0x80
[   32.038443]  ret_from_fork_asm+0x1a/0x30
[   32.039358] 
[   32.039526] The buggy address belongs to the object at ffff888102a0ec00
[   32.039526]  which belongs to the cache kmalloc-64 of size 64
[   32.041516] The buggy address is located 0 bytes to the right of
[   32.041516]  allocated 48-byte region [ffff888102a0ec00, ffff888102a0ec30)
[   32.043204] 
[   32.043384] The buggy address belongs to the physical page:
[   32.044041] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a0e
[   32.045108] flags: 0x200000000000000(node=0|zone=2)
[   32.046231] page_type: f5(slab)
[   32.046596] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   32.047248] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   32.049174] page dumped because: kasan: bad access detected
[   32.050413] 
[   32.050626] Memory state around the buggy address:
[   32.051395]  ffff888102a0eb00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.052281]  ffff888102a0eb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.053035] >ffff888102a0ec00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   32.053787]                                      ^
[   32.054668]  ffff888102a0ec80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.055564]  ffff888102a0ed00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.056607] ==================================================================
[   33.627907] ==================================================================
[   33.628501] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4eb0/0x5450
[   33.629230] Read of size 8 at addr ffff888102a0ec30 by task kunit_try_catch/272
[   33.629879] 
[   33.630158] CPU: 1 UID: 0 PID: 272 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241205 #1
[   33.631130] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.631889] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   33.632708] Call Trace:
[   33.633197]  <TASK>
[   33.633473]  dump_stack_lvl+0x73/0xb0
[   33.634058]  print_report+0xd1/0x640
[   33.634506]  ? __virt_addr_valid+0x1db/0x2d0
[   33.635156]  ? kasan_complete_mode_report_info+0x2a/0x200
[   33.635912]  kasan_report+0x102/0x140
[   33.636299]  ? kasan_atomics_helper+0x4eb0/0x5450
[   33.636942]  ? kasan_atomics_helper+0x4eb0/0x5450
[   33.637420]  __asan_report_load8_noabort+0x18/0x20
[   33.638088]  kasan_atomics_helper+0x4eb0/0x5450
[   33.638463]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   33.639211]  ? __kmalloc_cache_noprof+0x184/0x410
[   33.639735]  ? kasan_atomics+0x153/0x310
[   33.640427]  kasan_atomics+0x1dd/0x310
[   33.640838]  ? __pfx_kasan_atomics+0x10/0x10
[   33.641177]  ? __pfx_read_tsc+0x10/0x10
[   33.641995]  ? ktime_get_ts64+0x86/0x230
[   33.642653]  kunit_try_run_case+0x1b3/0x490
[   33.643120]  ? __pfx_kunit_try_run_case+0x10/0x10
[   33.643542]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   33.644402]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   33.645750]  ? __kthread_parkme+0x82/0x160
[   33.646149]  ? preempt_count_sub+0x50/0x80
[   33.646607]  ? __pfx_kunit_try_run_case+0x10/0x10
[   33.647337]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   33.648211]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   33.649329]  kthread+0x257/0x310
[   33.649693]  ? __pfx_kthread+0x10/0x10
[   33.650424]  ret_from_fork+0x41/0x80
[   33.651153]  ? __pfx_kthread+0x10/0x10
[   33.651540]  ret_from_fork_asm+0x1a/0x30
[   33.652328]  </TASK>
[   33.652542] 
[   33.652818] Allocated by task 272:
[   33.653636]  kasan_save_stack+0x3d/0x60
[   33.654424]  kasan_save_track+0x18/0x40
[   33.655135]  kasan_save_alloc_info+0x3b/0x50
[   33.656133]  __kasan_kmalloc+0xb7/0xc0
[   33.656490]  __kmalloc_cache_noprof+0x184/0x410
[   33.657283]  kasan_atomics+0x96/0x310
[   33.657998]  kunit_try_run_case+0x1b3/0x490
[   33.658508]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   33.659312]  kthread+0x257/0x310
[   33.659654]  ret_from_fork+0x41/0x80
[   33.660019]  ret_from_fork_asm+0x1a/0x30
[   33.660459] 
[   33.660697] The buggy address belongs to the object at ffff888102a0ec00
[   33.660697]  which belongs to the cache kmalloc-64 of size 64
[   33.661463] The buggy address is located 0 bytes to the right of
[   33.661463]  allocated 48-byte region [ffff888102a0ec00, ffff888102a0ec30)
[   33.662819] 
[   33.662996] The buggy address belongs to the physical page:
[   33.663728] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a0e
[   33.664393] flags: 0x200000000000000(node=0|zone=2)
[   33.665098] page_type: f5(slab)
[   33.665549] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   33.666362] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   33.667201] page dumped because: kasan: bad access detected
[   33.667924] 
[   33.668069] Memory state around the buggy address:
[   33.668628]  ffff888102a0eb00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.669382]  ffff888102a0eb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.670182] >ffff888102a0ec00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   33.670742]                                      ^
[   33.671380]  ffff888102a0ec80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.672080]  ffff888102a0ed00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.672824] ==================================================================
[   34.256773] ==================================================================
[   34.257384] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1c19/0x5450
[   34.259011] Write of size 8 at addr ffff888102a0ec30 by task kunit_try_catch/272
[   34.259874] 
[   34.260338] CPU: 1 UID: 0 PID: 272 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241205 #1
[   34.261311] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.261856] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   34.262894] Call Trace:
[   34.263358]  <TASK>
[   34.263638]  dump_stack_lvl+0x73/0xb0
[   34.264547]  print_report+0xd1/0x640
[   34.265235]  ? __virt_addr_valid+0x1db/0x2d0
[   34.265710]  ? kasan_complete_mode_report_info+0x2a/0x200
[   34.266566]  kasan_report+0x102/0x140
[   34.267194]  ? kasan_atomics_helper+0x1c19/0x5450
[   34.268040]  ? kasan_atomics_helper+0x1c19/0x5450
[   34.268552]  kasan_check_range+0x10c/0x1c0
[   34.269446]  __kasan_check_write+0x18/0x20
[   34.269770]  kasan_atomics_helper+0x1c19/0x5450
[   34.270560]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   34.271374]  ? __kmalloc_cache_noprof+0x184/0x410
[   34.272186]  ? kasan_atomics+0x153/0x310
[   34.272619]  kasan_atomics+0x1dd/0x310
[   34.273359]  ? __pfx_kasan_atomics+0x10/0x10
[   34.274355]  ? __pfx_read_tsc+0x10/0x10
[   34.274761]  ? ktime_get_ts64+0x86/0x230
[   34.275290]  kunit_try_run_case+0x1b3/0x490
[   34.275790]  ? __pfx_kunit_try_run_case+0x10/0x10
[   34.276283]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   34.277581]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   34.277959]  ? __kthread_parkme+0x82/0x160
[   34.278863]  ? preempt_count_sub+0x50/0x80
[   34.279259]  ? __pfx_kunit_try_run_case+0x10/0x10
[   34.279671]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   34.280341]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   34.281023]  kthread+0x257/0x310
[   34.281594]  ? __pfx_kthread+0x10/0x10
[   34.282231]  ret_from_fork+0x41/0x80
[   34.282642]  ? __pfx_kthread+0x10/0x10
[   34.283378]  ret_from_fork_asm+0x1a/0x30
[   34.284502]  </TASK>
[   34.284768] 
[   34.285220] Allocated by task 272:
[   34.285585]  kasan_save_stack+0x3d/0x60
[   34.286619]  kasan_save_track+0x18/0x40
[   34.287130]  kasan_save_alloc_info+0x3b/0x50
[   34.287714]  __kasan_kmalloc+0xb7/0xc0
[   34.288464]  __kmalloc_cache_noprof+0x184/0x410
[   34.289223]  kasan_atomics+0x96/0x310
[   34.290281]  kunit_try_run_case+0x1b3/0x490
[   34.290666]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   34.291536]  kthread+0x257/0x310
[   34.292160]  ret_from_fork+0x41/0x80
[   34.293144]  ret_from_fork_asm+0x1a/0x30
[   34.293438] 
[   34.293598] The buggy address belongs to the object at ffff888102a0ec00
[   34.293598]  which belongs to the cache kmalloc-64 of size 64
[   34.294246] The buggy address is located 0 bytes to the right of
[   34.294246]  allocated 48-byte region [ffff888102a0ec00, ffff888102a0ec30)
[   34.295539] 
[   34.296061] The buggy address belongs to the physical page:
[   34.296673] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a0e
[   34.298018] flags: 0x200000000000000(node=0|zone=2)
[   34.298633] page_type: f5(slab)
[   34.299042] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   34.300099] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   34.300809] page dumped because: kasan: bad access detected
[   34.301318] 
[   34.301635] Memory state around the buggy address:
[   34.302100]  ffff888102a0eb00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   34.302855]  ffff888102a0eb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   34.303482] >ffff888102a0ec00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   34.304244]                                      ^
[   34.304752]  ffff888102a0ec80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.305426]  ffff888102a0ed00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.306235] ==================================================================
[   32.595803] ==================================================================
[   32.596578] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x861/0x5450
[   32.597382] Write of size 4 at addr ffff888102a0ec30 by task kunit_try_catch/272
[   32.598307] 
[   32.598580] CPU: 1 UID: 0 PID: 272 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241205 #1
[   32.600589] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.601262] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   32.602212] Call Trace:
[   32.602507]  <TASK>
[   32.602772]  dump_stack_lvl+0x73/0xb0
[   32.603198]  print_report+0xd1/0x640
[   32.603604]  ? __virt_addr_valid+0x1db/0x2d0
[   32.603985]  ? kasan_complete_mode_report_info+0x2a/0x200
[   32.604977]  kasan_report+0x102/0x140
[   32.605804]  ? kasan_atomics_helper+0x861/0x5450
[   32.606294]  ? kasan_atomics_helper+0x861/0x5450
[   32.606884]  kasan_check_range+0x10c/0x1c0
[   32.607281]  __kasan_check_write+0x18/0x20
[   32.607902]  kasan_atomics_helper+0x861/0x5450
[   32.608411]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   32.608987]  ? __kmalloc_cache_noprof+0x184/0x410
[   32.609610]  ? kasan_atomics+0x153/0x310
[   32.610281]  kasan_atomics+0x1dd/0x310
[   32.610649]  ? __pfx_kasan_atomics+0x10/0x10
[   32.611235]  ? __pfx_read_tsc+0x10/0x10
[   32.611812]  ? ktime_get_ts64+0x86/0x230
[   32.612228]  kunit_try_run_case+0x1b3/0x490
[   32.612859]  ? __pfx_kunit_try_run_case+0x10/0x10
[   32.613260]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   32.613959]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   32.614415]  ? __kthread_parkme+0x82/0x160
[   32.615068]  ? preempt_count_sub+0x50/0x80
[   32.615652]  ? __pfx_kunit_try_run_case+0x10/0x10
[   32.616222]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   32.616828]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   32.617275]  kthread+0x257/0x310
[   32.617845]  ? __pfx_kthread+0x10/0x10
[   32.618190]  ret_from_fork+0x41/0x80
[   32.618726]  ? __pfx_kthread+0x10/0x10
[   32.619253]  ret_from_fork_asm+0x1a/0x30
[   32.619840]  </TASK>
[   32.620225] 
[   32.620414] Allocated by task 272:
[   32.620866]  kasan_save_stack+0x3d/0x60
[   32.621308]  kasan_save_track+0x18/0x40
[   32.621930]  kasan_save_alloc_info+0x3b/0x50
[   32.622397]  __kasan_kmalloc+0xb7/0xc0
[   32.622840]  __kmalloc_cache_noprof+0x184/0x410
[   32.623231]  kasan_atomics+0x96/0x310
[   32.623852]  kunit_try_run_case+0x1b3/0x490
[   32.624432]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   32.624897]  kthread+0x257/0x310
[   32.625398]  ret_from_fork+0x41/0x80
[   32.625847]  ret_from_fork_asm+0x1a/0x30
[   32.626395] 
[   32.626643] The buggy address belongs to the object at ffff888102a0ec00
[   32.626643]  which belongs to the cache kmalloc-64 of size 64
[   32.627806] The buggy address is located 0 bytes to the right of
[   32.627806]  allocated 48-byte region [ffff888102a0ec00, ffff888102a0ec30)
[   32.629426] 
[   32.630309] The buggy address belongs to the physical page:
[   32.630873] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a0e
[   32.632555] flags: 0x200000000000000(node=0|zone=2)
[   32.633342] page_type: f5(slab)
[   32.633821] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   32.634495] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   32.635053] page dumped because: kasan: bad access detected
[   32.635641] 
[   32.635912] Memory state around the buggy address:
[   32.636257]  ffff888102a0eb00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.637088]  ffff888102a0eb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.637648] >ffff888102a0ec00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   32.638292]                                      ^
[   32.638651]  ffff888102a0ec80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.639415]  ffff888102a0ed00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.640020] ==================================================================
[   33.933653] ==================================================================
[   33.934251] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1780/0x5450
[   33.935197] Write of size 8 at addr ffff888102a0ec30 by task kunit_try_catch/272
[   33.936173] 
[   33.936364] CPU: 1 UID: 0 PID: 272 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241205 #1
[   33.937568] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.938180] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   33.939100] Call Trace:
[   33.939592]  <TASK>
[   33.940134]  dump_stack_lvl+0x73/0xb0
[   33.940769]  print_report+0xd1/0x640
[   33.941308]  ? __virt_addr_valid+0x1db/0x2d0
[   33.941718]  ? kasan_complete_mode_report_info+0x2a/0x200
[   33.942280]  kasan_report+0x102/0x140
[   33.942838]  ? kasan_atomics_helper+0x1780/0x5450
[   33.943296]  ? kasan_atomics_helper+0x1780/0x5450
[   33.943733]  kasan_check_range+0x10c/0x1c0
[   33.944325]  __kasan_check_write+0x18/0x20
[   33.944755]  kasan_atomics_helper+0x1780/0x5450
[   33.945348]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   33.945913]  ? __kmalloc_cache_noprof+0x184/0x410
[   33.946359]  ? kasan_atomics+0x153/0x310
[   33.946715]  kasan_atomics+0x1dd/0x310
[   33.947266]  ? __pfx_kasan_atomics+0x10/0x10
[   33.947745]  ? __pfx_read_tsc+0x10/0x10
[   33.948115]  ? ktime_get_ts64+0x86/0x230
[   33.948610]  kunit_try_run_case+0x1b3/0x490
[   33.949081]  ? __pfx_kunit_try_run_case+0x10/0x10
[   33.949516]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   33.950070]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   33.950647]  ? __kthread_parkme+0x82/0x160
[   33.951096]  ? preempt_count_sub+0x50/0x80
[   33.951478]  ? __pfx_kunit_try_run_case+0x10/0x10
[   33.952023]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   33.952669]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   33.953224]  kthread+0x257/0x310
[   33.953541]  ? __pfx_kthread+0x10/0x10
[   33.954026]  ret_from_fork+0x41/0x80
[   33.954510]  ? __pfx_kthread+0x10/0x10
[   33.954924]  ret_from_fork_asm+0x1a/0x30
[   33.955421]  </TASK>
[   33.955815] 
[   33.956036] Allocated by task 272:
[   33.956313]  kasan_save_stack+0x3d/0x60
[   33.956870]  kasan_save_track+0x18/0x40
[   33.957330]  kasan_save_alloc_info+0x3b/0x50
[   33.957821]  __kasan_kmalloc+0xb7/0xc0
[   33.958196]  __kmalloc_cache_noprof+0x184/0x410
[   33.958726]  kasan_atomics+0x96/0x310
[   33.959252]  kunit_try_run_case+0x1b3/0x490
[   33.959630]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   33.960178]  kthread+0x257/0x310
[   33.960578]  ret_from_fork+0x41/0x80
[   33.961077]  ret_from_fork_asm+0x1a/0x30
[   33.961577] 
[   33.961816] The buggy address belongs to the object at ffff888102a0ec00
[   33.961816]  which belongs to the cache kmalloc-64 of size 64
[   33.962706] The buggy address is located 0 bytes to the right of
[   33.962706]  allocated 48-byte region [ffff888102a0ec00, ffff888102a0ec30)
[   33.963620] 
[   33.963922] The buggy address belongs to the physical page:
[   33.964483] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a0e
[   33.965212] flags: 0x200000000000000(node=0|zone=2)
[   33.965740] page_type: f5(slab)
[   33.966095] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   33.966803] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   33.967386] page dumped because: kasan: bad access detected
[   33.967974] 
[   33.968227] Memory state around the buggy address:
[   33.968849]  ffff888102a0eb00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.969422]  ffff888102a0eb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.970560] >ffff888102a0ec00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   33.971201]                                      ^
[   33.971627]  ffff888102a0ec80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.972421]  ffff888102a0ed00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.972975] ==================================================================
[   34.670860] ==================================================================
[   34.671780] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4f9a/0x5450
[   34.672947] Read of size 8 at addr ffff888102a0ec30 by task kunit_try_catch/272
[   34.673833] 
[   34.674047] CPU: 1 UID: 0 PID: 272 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241205 #1
[   34.674899] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.675459] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   34.676522] Call Trace:
[   34.676903]  <TASK>
[   34.677245]  dump_stack_lvl+0x73/0xb0
[   34.677748]  print_report+0xd1/0x640
[   34.678333]  ? __virt_addr_valid+0x1db/0x2d0
[   34.678924]  ? kasan_complete_mode_report_info+0x2a/0x200
[   34.679469]  kasan_report+0x102/0x140
[   34.680037]  ? kasan_atomics_helper+0x4f9a/0x5450
[   34.680587]  ? kasan_atomics_helper+0x4f9a/0x5450
[   34.681215]  __asan_report_load8_noabort+0x18/0x20
[   34.681842]  kasan_atomics_helper+0x4f9a/0x5450
[   34.682446]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   34.683008]  ? __kmalloc_cache_noprof+0x184/0x410
[   34.683504]  ? kasan_atomics+0x153/0x310
[   34.684073]  kasan_atomics+0x1dd/0x310
[   34.684592]  ? __pfx_kasan_atomics+0x10/0x10
[   34.685087]  ? __pfx_read_tsc+0x10/0x10
[   34.685409]  ? ktime_get_ts64+0x86/0x230
[   34.686020]  kunit_try_run_case+0x1b3/0x490
[   34.686552]  ? __pfx_kunit_try_run_case+0x10/0x10
[   34.687229]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   34.687853]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   34.688419]  ? __kthread_parkme+0x82/0x160
[   34.688872]  ? preempt_count_sub+0x50/0x80
[   34.689444]  ? __pfx_kunit_try_run_case+0x10/0x10
[   34.690142]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   34.690834]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   34.691376]  kthread+0x257/0x310
[   34.691844]  ? __pfx_kthread+0x10/0x10
[   34.692305]  ret_from_fork+0x41/0x80
[   34.692901]  ? __pfx_kthread+0x10/0x10
[   34.693220]  ret_from_fork_asm+0x1a/0x30
[   34.693858]  </TASK>
[   34.694146] 
[   34.694431] Allocated by task 272:
[   34.694905]  kasan_save_stack+0x3d/0x60
[   34.695467]  kasan_save_track+0x18/0x40
[   34.696032]  kasan_save_alloc_info+0x3b/0x50
[   34.696616]  __kasan_kmalloc+0xb7/0xc0
[   34.697155]  __kmalloc_cache_noprof+0x184/0x410
[   34.697587]  kasan_atomics+0x96/0x310
[   34.698381]  kunit_try_run_case+0x1b3/0x490
[   34.698867]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   34.699482]  kthread+0x257/0x310
[   34.699889]  ret_from_fork+0x41/0x80
[   34.700222]  ret_from_fork_asm+0x1a/0x30
[   34.700721] 
[   34.700975] The buggy address belongs to the object at ffff888102a0ec00
[   34.700975]  which belongs to the cache kmalloc-64 of size 64
[   34.701961] The buggy address is located 0 bytes to the right of
[   34.701961]  allocated 48-byte region [ffff888102a0ec00, ffff888102a0ec30)
[   34.702986] 
[   34.703200] The buggy address belongs to the physical page:
[   34.703801] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a0e
[   34.704406] flags: 0x200000000000000(node=0|zone=2)
[   34.704986] page_type: f5(slab)
[   34.705430] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   34.706108] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   34.706701] page dumped because: kasan: bad access detected
[   34.707209] 
[   34.707465] Memory state around the buggy address:
[   34.708046]  ffff888102a0eb00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   34.708535]  ffff888102a0eb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   34.709202] >ffff888102a0ec00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   34.709897]                                      ^
[   34.710375]  ffff888102a0ec80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.711007]  ffff888102a0ed00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.711563] ==================================================================
[   34.890543] ==================================================================
[   34.891421] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x224d/0x5450
[   34.892081] Write of size 8 at addr ffff888102a0ec30 by task kunit_try_catch/272
[   34.892798] 
[   34.893076] CPU: 1 UID: 0 PID: 272 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241205 #1
[   34.893899] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.894342] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   34.895114] Call Trace:
[   34.895446]  <TASK>
[   34.895706]  dump_stack_lvl+0x73/0xb0
[   34.896226]  print_report+0xd1/0x640
[   34.896622]  ? __virt_addr_valid+0x1db/0x2d0
[   34.897041]  ? kasan_complete_mode_report_info+0x2a/0x200
[   34.897672]  kasan_report+0x102/0x140
[   34.898079]  ? kasan_atomics_helper+0x224d/0x5450
[   34.898580]  ? kasan_atomics_helper+0x224d/0x5450
[   34.899180]  kasan_check_range+0x10c/0x1c0
[   34.899539]  __kasan_check_write+0x18/0x20
[   34.900103]  kasan_atomics_helper+0x224d/0x5450
[   34.900639]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   34.901180]  ? __kmalloc_cache_noprof+0x184/0x410
[   34.901562]  ? kasan_atomics+0x153/0x310
[   34.902174]  kasan_atomics+0x1dd/0x310
[   34.902560]  ? __pfx_kasan_atomics+0x10/0x10
[   34.903083]  ? __pfx_read_tsc+0x10/0x10
[   34.903598]  ? ktime_get_ts64+0x86/0x230
[   34.904073]  kunit_try_run_case+0x1b3/0x490
[   34.904439]  ? __pfx_kunit_try_run_case+0x10/0x10
[   34.905049]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   34.905524]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   34.906186]  ? __kthread_parkme+0x82/0x160
[   34.906618]  ? preempt_count_sub+0x50/0x80
[   34.907018]  ? __pfx_kunit_try_run_case+0x10/0x10
[   34.907617]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   34.908214]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   34.908823]  kthread+0x257/0x310
[   34.909116]  ? __pfx_kthread+0x10/0x10
[   34.909596]  ret_from_fork+0x41/0x80
[   34.910133]  ? __pfx_kthread+0x10/0x10
[   34.910629]  ret_from_fork_asm+0x1a/0x30
[   34.911089]  </TASK>
[   34.911389] 
[   34.911645] Allocated by task 272:
[   34.913907]  kasan_save_stack+0x3d/0x60
[   34.914566]  kasan_save_track+0x18/0x40
[   34.915081]  kasan_save_alloc_info+0x3b/0x50
[   34.915524]  __kasan_kmalloc+0xb7/0xc0
[   34.916398]  __kmalloc_cache_noprof+0x184/0x410
[   34.917172]  kasan_atomics+0x96/0x310
[   34.917456]  kunit_try_run_case+0x1b3/0x490
[   34.918191]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   34.918732]  kthread+0x257/0x310
[   34.919464]  ret_from_fork+0x41/0x80
[   34.919665]  ret_from_fork_asm+0x1a/0x30
[   34.920083] 
[   34.920350] The buggy address belongs to the object at ffff888102a0ec00
[   34.920350]  which belongs to the cache kmalloc-64 of size 64
[   34.921111] The buggy address is located 0 bytes to the right of
[   34.921111]  allocated 48-byte region [ffff888102a0ec00, ffff888102a0ec30)
[   34.922469] 
[   34.922967] The buggy address belongs to the physical page:
[   34.923357] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a0e
[   34.924351] flags: 0x200000000000000(node=0|zone=2)
[   34.924869] page_type: f5(slab)
[   34.925408] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   34.926248] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   34.927198] page dumped because: kasan: bad access detected
[   34.927877] 
[   34.928106] Memory state around the buggy address:
[   34.928566]  ffff888102a0eb00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   34.929983]  ffff888102a0eb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   34.930858] >ffff888102a0ec00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   34.931603]                                      ^
[   34.932229]  ffff888102a0ec80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.933124]  ffff888102a0ed00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.934070] ==================================================================
[   34.712783] ==================================================================
[   34.713228] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x20c9/0x5450
[   34.714193] Write of size 8 at addr ffff888102a0ec30 by task kunit_try_catch/272
[   34.714881] 
[   34.715161] CPU: 1 UID: 0 PID: 272 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241205 #1
[   34.716043] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.716397] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   34.717232] Call Trace:
[   34.717524]  <TASK>
[   34.717858]  dump_stack_lvl+0x73/0xb0
[   34.718327]  print_report+0xd1/0x640
[   34.718751]  ? __virt_addr_valid+0x1db/0x2d0
[   34.719184]  ? kasan_complete_mode_report_info+0x2a/0x200
[   34.719914]  kasan_report+0x102/0x140
[   34.720343]  ? kasan_atomics_helper+0x20c9/0x5450
[   34.720833]  ? kasan_atomics_helper+0x20c9/0x5450
[   34.721400]  kasan_check_range+0x10c/0x1c0
[   34.721923]  __kasan_check_write+0x18/0x20
[   34.722408]  kasan_atomics_helper+0x20c9/0x5450
[   34.723031]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   34.723452]  ? __kmalloc_cache_noprof+0x184/0x410
[   34.723963]  ? kasan_atomics+0x153/0x310
[   34.724482]  kasan_atomics+0x1dd/0x310
[   34.725052]  ? __pfx_kasan_atomics+0x10/0x10
[   34.725482]  ? __pfx_read_tsc+0x10/0x10
[   34.726081]  ? ktime_get_ts64+0x86/0x230
[   34.726481]  kunit_try_run_case+0x1b3/0x490
[   34.726995]  ? __pfx_kunit_try_run_case+0x10/0x10
[   34.727383]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   34.728028]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   34.728537]  ? __kthread_parkme+0x82/0x160
[   34.729019]  ? preempt_count_sub+0x50/0x80
[   34.729476]  ? __pfx_kunit_try_run_case+0x10/0x10
[   34.730084]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   34.730597]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   34.731914]  kthread+0x257/0x310
[   34.732513]  ? __pfx_kthread+0x10/0x10
[   34.733427]  ret_from_fork+0x41/0x80
[   34.734028]  ? __pfx_kthread+0x10/0x10
[   34.734327]  ret_from_fork_asm+0x1a/0x30
[   34.734847]  </TASK>
[   34.735131] 
[   34.735370] Allocated by task 272:
[   34.736027]  kasan_save_stack+0x3d/0x60
[   34.736435]  kasan_save_track+0x18/0x40
[   34.736829]  kasan_save_alloc_info+0x3b/0x50
[   34.737844]  __kasan_kmalloc+0xb7/0xc0
[   34.738336]  __kmalloc_cache_noprof+0x184/0x410
[   34.738866]  kasan_atomics+0x96/0x310
[   34.739221]  kunit_try_run_case+0x1b3/0x490
[   34.739612]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   34.740265]  kthread+0x257/0x310
[   34.740560]  ret_from_fork+0x41/0x80
[   34.741244]  ret_from_fork_asm+0x1a/0x30
[   34.741863] 
[   34.742069] The buggy address belongs to the object at ffff888102a0ec00
[   34.742069]  which belongs to the cache kmalloc-64 of size 64
[   34.743242] The buggy address is located 0 bytes to the right of
[   34.743242]  allocated 48-byte region [ffff888102a0ec00, ffff888102a0ec30)
[   34.744600] 
[   34.744785] The buggy address belongs to the physical page:
[   34.745727] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a0e
[   34.746341] flags: 0x200000000000000(node=0|zone=2)
[   34.747894] page_type: f5(slab)
[   34.748517] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   34.749394] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   34.750605] page dumped because: kasan: bad access detected
[   34.750955] 
[   34.751121] Memory state around the buggy address:
[   34.751437]  ffff888102a0eb00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   34.753003]  ffff888102a0eb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   34.753888] >ffff888102a0ec00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   34.754706]                                      ^
[   34.756001]  ffff888102a0ec80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.757105]  ffff888102a0ed00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.758281] ==================================================================
[   34.206898] ==================================================================
[   34.208021] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1b23/0x5450
[   34.208698] Write of size 8 at addr ffff888102a0ec30 by task kunit_try_catch/272
[   34.210066] 
[   34.210485] CPU: 1 UID: 0 PID: 272 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241205 #1
[   34.211290] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.211763] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   34.212437] Call Trace:
[   34.212778]  <TASK>
[   34.213102]  dump_stack_lvl+0x73/0xb0
[   34.213422]  print_report+0xd1/0x640
[   34.213905]  ? __virt_addr_valid+0x1db/0x2d0
[   34.214311]  ? kasan_complete_mode_report_info+0x2a/0x200
[   34.214825]  kasan_report+0x102/0x140
[   34.215330]  ? kasan_atomics_helper+0x1b23/0x5450
[   34.215857]  ? kasan_atomics_helper+0x1b23/0x5450
[   34.216269]  kasan_check_range+0x10c/0x1c0
[   34.216839]  __kasan_check_write+0x18/0x20
[   34.217278]  kasan_atomics_helper+0x1b23/0x5450
[   34.217801]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   34.218236]  ? __kmalloc_cache_noprof+0x184/0x410
[   34.218847]  ? kasan_atomics+0x153/0x310
[   34.219210]  kasan_atomics+0x1dd/0x310
[   34.219606]  ? __pfx_kasan_atomics+0x10/0x10
[   34.220208]  ? __pfx_read_tsc+0x10/0x10
[   34.221106]  ? ktime_get_ts64+0x86/0x230
[   34.221648]  kunit_try_run_case+0x1b3/0x490
[   34.222182]  ? __pfx_kunit_try_run_case+0x10/0x10
[   34.222968]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   34.223207]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   34.223445]  ? __kthread_parkme+0x82/0x160
[   34.223650]  ? preempt_count_sub+0x50/0x80
[   34.224080]  ? __pfx_kunit_try_run_case+0x10/0x10
[   34.224947]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   34.226300]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   34.227339]  kthread+0x257/0x310
[   34.227819]  ? __pfx_kthread+0x10/0x10
[   34.228510]  ret_from_fork+0x41/0x80
[   34.228830]  ? __pfx_kthread+0x10/0x10
[   34.229622]  ret_from_fork_asm+0x1a/0x30
[   34.230263]  </TASK>
[   34.230483] 
[   34.230762] Allocated by task 272:
[   34.231216]  kasan_save_stack+0x3d/0x60
[   34.232101]  kasan_save_track+0x18/0x40
[   34.232737]  kasan_save_alloc_info+0x3b/0x50
[   34.233567]  __kasan_kmalloc+0xb7/0xc0
[   34.234234]  __kmalloc_cache_noprof+0x184/0x410
[   34.234729]  kasan_atomics+0x96/0x310
[   34.235553]  kunit_try_run_case+0x1b3/0x490
[   34.236108]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   34.236613]  kthread+0x257/0x310
[   34.237432]  ret_from_fork+0x41/0x80
[   34.237880]  ret_from_fork_asm+0x1a/0x30
[   34.238550] 
[   34.238865] The buggy address belongs to the object at ffff888102a0ec00
[   34.238865]  which belongs to the cache kmalloc-64 of size 64
[   34.240293] The buggy address is located 0 bytes to the right of
[   34.240293]  allocated 48-byte region [ffff888102a0ec00, ffff888102a0ec30)
[   34.242132] 
[   34.242509] The buggy address belongs to the physical page:
[   34.243478] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a0e
[   34.244857] flags: 0x200000000000000(node=0|zone=2)
[   34.245368] page_type: f5(slab)
[   34.245745] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   34.247066] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   34.248370] page dumped because: kasan: bad access detected
[   34.249353] 
[   34.249601] Memory state around the buggy address:
[   34.249989]  ffff888102a0eb00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   34.250675]  ffff888102a0eb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   34.251837] >ffff888102a0ec00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   34.252668]                                      ^
[   34.253472]  ffff888102a0ec80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.254324]  ffff888102a0ed00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.255488] ==================================================================
[   32.289982] ==================================================================
[   32.290444] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a1/0x5450
[   32.292500] Write of size 4 at addr ffff888102a0ec30 by task kunit_try_catch/272
[   32.293383] 
[   32.293577] CPU: 1 UID: 0 PID: 272 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241205 #1
[   32.294759] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.295160] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   32.296857] Call Trace:
[   32.297147]  <TASK>
[   32.297391]  dump_stack_lvl+0x73/0xb0
[   32.298414]  print_report+0xd1/0x640
[   32.298814]  ? __virt_addr_valid+0x1db/0x2d0
[   32.299430]  ? kasan_complete_mode_report_info+0x2a/0x200
[   32.300648]  kasan_report+0x102/0x140
[   32.301167]  ? kasan_atomics_helper+0x4a1/0x5450
[   32.301571]  ? kasan_atomics_helper+0x4a1/0x5450
[   32.302174]  kasan_check_range+0x10c/0x1c0
[   32.302578]  __kasan_check_write+0x18/0x20
[   32.302995]  kasan_atomics_helper+0x4a1/0x5450
[   32.303477]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   32.303935]  ? __kmalloc_cache_noprof+0x184/0x410
[   32.304381]  ? kasan_atomics+0x153/0x310
[   32.304910]  kasan_atomics+0x1dd/0x310
[   32.305305]  ? __pfx_kasan_atomics+0x10/0x10
[   32.305655]  ? __pfx_read_tsc+0x10/0x10
[   32.306480]  ? ktime_get_ts64+0x86/0x230
[   32.306907]  kunit_try_run_case+0x1b3/0x490
[   32.307319]  ? __pfx_kunit_try_run_case+0x10/0x10
[   32.307812]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   32.308338]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   32.308726]  ? __kthread_parkme+0x82/0x160
[   32.309269]  ? preempt_count_sub+0x50/0x80
[   32.309925]  ? __pfx_kunit_try_run_case+0x10/0x10
[   32.310324]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   32.311045]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   32.311449]  kthread+0x257/0x310
[   32.311762]  ? __pfx_kthread+0x10/0x10
[   32.312257]  ret_from_fork+0x41/0x80
[   32.312760]  ? __pfx_kthread+0x10/0x10
[   32.313080]  ret_from_fork_asm+0x1a/0x30
[   32.313419]  </TASK>
[   32.313749] 
[   32.314014] Allocated by task 272:
[   32.314426]  kasan_save_stack+0x3d/0x60
[   32.315015]  kasan_save_track+0x18/0x40
[   32.315365]  kasan_save_alloc_info+0x3b/0x50
[   32.315799]  __kasan_kmalloc+0xb7/0xc0
[   32.316351]  __kmalloc_cache_noprof+0x184/0x410
[   32.316984]  kasan_atomics+0x96/0x310
[   32.317293]  kunit_try_run_case+0x1b3/0x490
[   32.317827]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   32.318424]  kthread+0x257/0x310
[   32.318716]  ret_from_fork+0x41/0x80
[   32.319200]  ret_from_fork_asm+0x1a/0x30
[   32.319930] 
[   32.320190] The buggy address belongs to the object at ffff888102a0ec00
[   32.320190]  which belongs to the cache kmalloc-64 of size 64
[   32.321405] The buggy address is located 0 bytes to the right of
[   32.321405]  allocated 48-byte region [ffff888102a0ec00, ffff888102a0ec30)
[   32.322162] 
[   32.322333] The buggy address belongs to the physical page:
[   32.323069] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a0e
[   32.323797] flags: 0x200000000000000(node=0|zone=2)
[   32.324133] page_type: f5(slab)
[   32.324405] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   32.325376] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   32.326199] page dumped because: kasan: bad access detected
[   32.326743] 
[   32.327013] Memory state around the buggy address:
[   32.327445]  ffff888102a0eb00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.328841]  ffff888102a0eb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.329261] >ffff888102a0ec00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   32.329590]                                      ^
[   32.330416]  ffff888102a0ec80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.331418]  ffff888102a0ed00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.332404] ==================================================================
[   32.820642] ==================================================================
[   32.821458] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xb6b/0x5450
[   32.822305] Write of size 4 at addr ffff888102a0ec30 by task kunit_try_catch/272
[   32.822992] 
[   32.823286] CPU: 1 UID: 0 PID: 272 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241205 #1
[   32.824360] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.824913] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   32.825630] Call Trace:
[   32.826042]  <TASK>
[   32.826395]  dump_stack_lvl+0x73/0xb0
[   32.826953]  print_report+0xd1/0x640
[   32.827518]  ? __virt_addr_valid+0x1db/0x2d0
[   32.828017]  ? kasan_complete_mode_report_info+0x2a/0x200
[   32.828724]  kasan_report+0x102/0x140
[   32.829276]  ? kasan_atomics_helper+0xb6b/0x5450
[   32.829915]  ? kasan_atomics_helper+0xb6b/0x5450
[   32.830574]  kasan_check_range+0x10c/0x1c0
[   32.831017]  __kasan_check_write+0x18/0x20
[   32.831561]  kasan_atomics_helper+0xb6b/0x5450
[   32.832069]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   32.832484]  ? __kmalloc_cache_noprof+0x184/0x410
[   32.833119]  ? kasan_atomics+0x153/0x310
[   32.833746]  kasan_atomics+0x1dd/0x310
[   32.834168]  ? __pfx_kasan_atomics+0x10/0x10
[   32.834670]  ? __pfx_read_tsc+0x10/0x10
[   32.835201]  ? ktime_get_ts64+0x86/0x230
[   32.835716]  kunit_try_run_case+0x1b3/0x490
[   32.836199]  ? __pfx_kunit_try_run_case+0x10/0x10
[   32.836811]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   32.837474]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   32.838032]  ? __kthread_parkme+0x82/0x160
[   32.838563]  ? preempt_count_sub+0x50/0x80
[   32.839210]  ? __pfx_kunit_try_run_case+0x10/0x10
[   32.839717]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   32.840396]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   32.841107]  kthread+0x257/0x310
[   32.841578]  ? __pfx_kthread+0x10/0x10
[   32.842032]  ret_from_fork+0x41/0x80
[   32.842586]  ? __pfx_kthread+0x10/0x10
[   32.842976]  ret_from_fork_asm+0x1a/0x30
[   32.843613]  </TASK>
[   32.844067] 
[   32.844238] Allocated by task 272:
[   32.844720]  kasan_save_stack+0x3d/0x60
[   32.845207]  kasan_save_track+0x18/0x40
[   32.845735]  kasan_save_alloc_info+0x3b/0x50
[   32.846334]  __kasan_kmalloc+0xb7/0xc0
[   32.846890]  __kmalloc_cache_noprof+0x184/0x410
[   32.847458]  kasan_atomics+0x96/0x310
[   32.847997]  kunit_try_run_case+0x1b3/0x490
[   32.848463]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   32.849067]  kthread+0x257/0x310
[   32.849533]  ret_from_fork+0x41/0x80
[   32.850013]  ret_from_fork_asm+0x1a/0x30
[   32.850451] 
[   32.850810] The buggy address belongs to the object at ffff888102a0ec00
[   32.850810]  which belongs to the cache kmalloc-64 of size 64
[   32.851731] The buggy address is located 0 bytes to the right of
[   32.851731]  allocated 48-byte region [ffff888102a0ec00, ffff888102a0ec30)
[   32.852874] 
[   32.853195] The buggy address belongs to the physical page:
[   32.853758] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a0e
[   32.854480] flags: 0x200000000000000(node=0|zone=2)
[   32.855034] page_type: f5(slab)
[   32.855527] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   32.856281] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   32.857039] page dumped because: kasan: bad access detected
[   32.857634] 
[   32.857886] Memory state around the buggy address:
[   32.858433]  ffff888102a0eb00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.859263]  ffff888102a0eb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.860231] >ffff888102a0ec00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   32.860965]                                      ^
[   32.861296]  ffff888102a0ec80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.861993]  ffff888102a0ed00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.862589] ==================================================================
[   33.410954] ==================================================================
[   33.411619] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1218/0x5450
[   33.412254] Write of size 4 at addr ffff888102a0ec30 by task kunit_try_catch/272
[   33.412845] 
[   33.413118] CPU: 1 UID: 0 PID: 272 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241205 #1
[   33.414079] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.414525] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   33.415170] Call Trace:
[   33.415458]  <TASK>
[   33.415849]  dump_stack_lvl+0x73/0xb0
[   33.416337]  print_report+0xd1/0x640
[   33.416665]  ? __virt_addr_valid+0x1db/0x2d0
[   33.417115]  ? kasan_complete_mode_report_info+0x2a/0x200
[   33.417839]  kasan_report+0x102/0x140
[   33.418322]  ? kasan_atomics_helper+0x1218/0x5450
[   33.418738]  ? kasan_atomics_helper+0x1218/0x5450
[   33.419368]  kasan_check_range+0x10c/0x1c0
[   33.419842]  __kasan_check_write+0x18/0x20
[   33.420241]  kasan_atomics_helper+0x1218/0x5450
[   33.420617]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   33.421303]  ? __kmalloc_cache_noprof+0x184/0x410
[   33.421896]  ? kasan_atomics+0x153/0x310
[   33.422356]  kasan_atomics+0x1dd/0x310
[   33.422867]  ? __pfx_kasan_atomics+0x10/0x10
[   33.423340]  ? __pfx_read_tsc+0x10/0x10
[   33.423754]  ? ktime_get_ts64+0x86/0x230
[   33.424207]  kunit_try_run_case+0x1b3/0x490
[   33.424555]  ? __pfx_kunit_try_run_case+0x10/0x10
[   33.425079]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   33.425602]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   33.426106]  ? __kthread_parkme+0x82/0x160
[   33.426469]  ? preempt_count_sub+0x50/0x80
[   33.427066]  ? __pfx_kunit_try_run_case+0x10/0x10
[   33.427615]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   33.428103]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   33.428744]  kthread+0x257/0x310
[   33.429234]  ? __pfx_kthread+0x10/0x10
[   33.429716]  ret_from_fork+0x41/0x80
[   33.430155]  ? __pfx_kthread+0x10/0x10
[   33.430465]  ret_from_fork_asm+0x1a/0x30
[   33.431081]  </TASK>
[   33.431398] 
[   33.431645] Allocated by task 272:
[   33.432095]  kasan_save_stack+0x3d/0x60
[   33.432401]  kasan_save_track+0x18/0x40
[   33.432838]  kasan_save_alloc_info+0x3b/0x50
[   33.433301]  __kasan_kmalloc+0xb7/0xc0
[   33.433666]  __kmalloc_cache_noprof+0x184/0x410
[   33.434129]  kasan_atomics+0x96/0x310
[   33.434605]  kunit_try_run_case+0x1b3/0x490
[   33.435217]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   33.435655]  kthread+0x257/0x310
[   33.436154]  ret_from_fork+0x41/0x80
[   33.436535]  ret_from_fork_asm+0x1a/0x30
[   33.436982] 
[   33.437240] The buggy address belongs to the object at ffff888102a0ec00
[   33.437240]  which belongs to the cache kmalloc-64 of size 64
[   33.438192] The buggy address is located 0 bytes to the right of
[   33.438192]  allocated 48-byte region [ffff888102a0ec00, ffff888102a0ec30)
[   33.439428] 
[   33.439660] The buggy address belongs to the physical page:
[   33.440219] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a0e
[   33.440697] flags: 0x200000000000000(node=0|zone=2)
[   33.441413] page_type: f5(slab)
[   33.442003] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   33.442839] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   33.443664] page dumped because: kasan: bad access detected
[   33.444341] 
[   33.444974] Memory state around the buggy address:
[   33.445438]  ffff888102a0eb00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.446075]  ffff888102a0eb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.447218] >ffff888102a0ec00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   33.447922]                                      ^
[   33.448751]  ffff888102a0ec80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.449313]  ffff888102a0ed00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.450189] ==================================================================
[   33.497494] ==================================================================
[   33.498018] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x12e7/0x5450
[   33.498648] Write of size 4 at addr ffff888102a0ec30 by task kunit_try_catch/272
[   33.499396] 
[   33.499602] CPU: 1 UID: 0 PID: 272 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241205 #1
[   33.500492] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.500962] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   33.501705] Call Trace:
[   33.502003]  <TASK>
[   33.502320]  dump_stack_lvl+0x73/0xb0
[   33.502667]  print_report+0xd1/0x640
[   33.503201]  ? __virt_addr_valid+0x1db/0x2d0
[   33.503616]  ? kasan_complete_mode_report_info+0x2a/0x200
[   33.504311]  kasan_report+0x102/0x140
[   33.504730]  ? kasan_atomics_helper+0x12e7/0x5450
[   33.505349]  ? kasan_atomics_helper+0x12e7/0x5450
[   33.505755]  kasan_check_range+0x10c/0x1c0
[   33.506334]  __kasan_check_write+0x18/0x20
[   33.506748]  kasan_atomics_helper+0x12e7/0x5450
[   33.507358]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   33.507941]  ? __kmalloc_cache_noprof+0x184/0x410
[   33.508471]  ? kasan_atomics+0x153/0x310
[   33.509066]  kasan_atomics+0x1dd/0x310
[   33.509446]  ? __pfx_kasan_atomics+0x10/0x10
[   33.509976]  ? __pfx_read_tsc+0x10/0x10
[   33.510427]  ? ktime_get_ts64+0x86/0x230
[   33.510979]  kunit_try_run_case+0x1b3/0x490
[   33.511427]  ? __pfx_kunit_try_run_case+0x10/0x10
[   33.512044]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   33.512488]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   33.513133]  ? __kthread_parkme+0x82/0x160
[   33.513475]  ? preempt_count_sub+0x50/0x80
[   33.514051]  ? __pfx_kunit_try_run_case+0x10/0x10
[   33.514574]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   33.515178]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   33.515664]  kthread+0x257/0x310
[   33.516106]  ? __pfx_kthread+0x10/0x10
[   33.516599]  ret_from_fork+0x41/0x80
[   33.516998]  ? __pfx_kthread+0x10/0x10
[   33.517426]  ret_from_fork_asm+0x1a/0x30
[   33.517996]  </TASK>
[   33.518323] 
[   33.518516] Allocated by task 272:
[   33.519426]  kasan_save_stack+0x3d/0x60
[   33.520293]  kasan_save_track+0x18/0x40
[   33.520655]  kasan_save_alloc_info+0x3b/0x50
[   33.521205]  __kasan_kmalloc+0xb7/0xc0
[   33.521614]  __kmalloc_cache_noprof+0x184/0x410
[   33.522346]  kasan_atomics+0x96/0x310
[   33.522869]  kunit_try_run_case+0x1b3/0x490
[   33.523386]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   33.523874]  kthread+0x257/0x310
[   33.524205]  ret_from_fork+0x41/0x80
[   33.524572]  ret_from_fork_asm+0x1a/0x30
[   33.525578] 
[   33.525773] The buggy address belongs to the object at ffff888102a0ec00
[   33.525773]  which belongs to the cache kmalloc-64 of size 64
[   33.527589] The buggy address is located 0 bytes to the right of
[   33.527589]  allocated 48-byte region [ffff888102a0ec00, ffff888102a0ec30)
[   33.529453] 
[   33.529852] The buggy address belongs to the physical page:
[   33.530374] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a0e
[   33.531091] flags: 0x200000000000000(node=0|zone=2)
[   33.531537] page_type: f5(slab)
[   33.532068] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   33.532886] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   33.533650] page dumped because: kasan: bad access detected
[   33.534203] 
[   33.534468] Memory state around the buggy address:
[   33.535019]  ffff888102a0eb00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.535670]  ffff888102a0eb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.536456] >ffff888102a0ec00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   33.537154]                                      ^
[   33.537745]  ffff888102a0ec80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.538437]  ffff888102a0ed00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.539128] ==================================================================
[   34.626381] ==================================================================
[   34.627403] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x2007/0x5450
[   34.628345] Write of size 8 at addr ffff888102a0ec30 by task kunit_try_catch/272
[   34.629366] 
[   34.629700] CPU: 1 UID: 0 PID: 272 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241205 #1
[   34.630632] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.631116] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   34.632085] Call Trace:
[   34.632453]  <TASK>
[   34.632813]  dump_stack_lvl+0x73/0xb0
[   34.633170]  print_report+0xd1/0x640
[   34.633659]  ? __virt_addr_valid+0x1db/0x2d0
[   34.634346]  ? kasan_complete_mode_report_info+0x2a/0x200
[   34.634914]  kasan_report+0x102/0x140
[   34.635493]  ? kasan_atomics_helper+0x2007/0x5450
[   34.636144]  ? kasan_atomics_helper+0x2007/0x5450
[   34.636861]  kasan_check_range+0x10c/0x1c0
[   34.637301]  __kasan_check_write+0x18/0x20
[   34.637709]  kasan_atomics_helper+0x2007/0x5450
[   34.638228]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   34.638671]  ? __kmalloc_cache_noprof+0x184/0x410
[   34.639325]  ? kasan_atomics+0x153/0x310
[   34.639950]  kasan_atomics+0x1dd/0x310
[   34.640428]  ? __pfx_kasan_atomics+0x10/0x10
[   34.641077]  ? __pfx_read_tsc+0x10/0x10
[   34.641514]  ? ktime_get_ts64+0x86/0x230
[   34.642131]  kunit_try_run_case+0x1b3/0x490
[   34.642558]  ? __pfx_kunit_try_run_case+0x10/0x10
[   34.643206]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   34.643841]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   34.644478]  ? __kthread_parkme+0x82/0x160
[   34.645101]  ? preempt_count_sub+0x50/0x80
[   34.645642]  ? __pfx_kunit_try_run_case+0x10/0x10
[   34.646237]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   34.646880]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   34.647457]  kthread+0x257/0x310
[   34.648011]  ? __pfx_kthread+0x10/0x10
[   34.648502]  ret_from_fork+0x41/0x80
[   34.648988]  ? __pfx_kthread+0x10/0x10
[   34.649308]  ret_from_fork_asm+0x1a/0x30
[   34.649908]  </TASK>
[   34.650235] 
[   34.650507] Allocated by task 272:
[   34.650985]  kasan_save_stack+0x3d/0x60
[   34.651376]  kasan_save_track+0x18/0x40
[   34.651947]  kasan_save_alloc_info+0x3b/0x50
[   34.652486]  __kasan_kmalloc+0xb7/0xc0
[   34.652951]  __kmalloc_cache_noprof+0x184/0x410
[   34.653390]  kasan_atomics+0x96/0x310
[   34.653963]  kunit_try_run_case+0x1b3/0x490
[   34.654474]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   34.655140]  kthread+0x257/0x310
[   34.655427]  ret_from_fork+0x41/0x80
[   34.656054]  ret_from_fork_asm+0x1a/0x30
[   34.656461] 
[   34.656624] The buggy address belongs to the object at ffff888102a0ec00
[   34.656624]  which belongs to the cache kmalloc-64 of size 64
[   34.657625] The buggy address is located 0 bytes to the right of
[   34.657625]  allocated 48-byte region [ffff888102a0ec00, ffff888102a0ec30)
[   34.658826] 
[   34.659064] The buggy address belongs to the physical page:
[   34.659651] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a0e
[   34.660359] flags: 0x200000000000000(node=0|zone=2)
[   34.661085] page_type: f5(slab)
[   34.661392] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   34.662199] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   34.663041] page dumped because: kasan: bad access detected
[   34.663522] 
[   34.663847] Memory state around the buggy address:
[   34.664304]  ffff888102a0eb00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   34.665200]  ffff888102a0eb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   34.665900] >ffff888102a0ec00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   34.666541]                                      ^
[   34.667136]  ffff888102a0ec80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.667879]  ffff888102a0ed00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.668559] ==================================================================
[   34.492269] ==================================================================
[   34.493180] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1eab/0x5450
[   34.494054] Write of size 8 at addr ffff888102a0ec30 by task kunit_try_catch/272
[   34.494736] 
[   34.495078] CPU: 1 UID: 0 PID: 272 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241205 #1
[   34.496136] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.496611] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   34.497627] Call Trace:
[   34.497980]  <TASK>
[   34.498309]  dump_stack_lvl+0x73/0xb0
[   34.498800]  print_report+0xd1/0x640
[   34.499369]  ? __virt_addr_valid+0x1db/0x2d0
[   34.499902]  ? kasan_complete_mode_report_info+0x2a/0x200
[   34.500502]  kasan_report+0x102/0x140
[   34.501147]  ? kasan_atomics_helper+0x1eab/0x5450
[   34.501539]  ? kasan_atomics_helper+0x1eab/0x5450
[   34.502279]  kasan_check_range+0x10c/0x1c0
[   34.502659]  __kasan_check_write+0x18/0x20
[   34.503212]  kasan_atomics_helper+0x1eab/0x5450
[   34.503734]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   34.504332]  ? __kmalloc_cache_noprof+0x184/0x410
[   34.504744]  ? kasan_atomics+0x153/0x310
[   34.505290]  kasan_atomics+0x1dd/0x310
[   34.505816]  ? __pfx_kasan_atomics+0x10/0x10
[   34.506410]  ? __pfx_read_tsc+0x10/0x10
[   34.507091]  ? ktime_get_ts64+0x86/0x230
[   34.507560]  kunit_try_run_case+0x1b3/0x490
[   34.508230]  ? __pfx_kunit_try_run_case+0x10/0x10
[   34.508810]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   34.509322]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   34.509931]  ? __kthread_parkme+0x82/0x160
[   34.510458]  ? preempt_count_sub+0x50/0x80
[   34.511023]  ? __pfx_kunit_try_run_case+0x10/0x10
[   34.511530]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   34.512174]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   34.512962]  kthread+0x257/0x310
[   34.513526]  ? __pfx_kthread+0x10/0x10
[   34.514169]  ret_from_fork+0x41/0x80
[   34.514571]  ? __pfx_kthread+0x10/0x10
[   34.514994]  ret_from_fork_asm+0x1a/0x30
[   34.515363]  </TASK>
[   34.515644] 
[   34.515924] Allocated by task 272:
[   34.516312]  kasan_save_stack+0x3d/0x60
[   34.516730]  kasan_save_track+0x18/0x40
[   34.517153]  kasan_save_alloc_info+0x3b/0x50
[   34.517621]  __kasan_kmalloc+0xb7/0xc0
[   34.518182]  __kmalloc_cache_noprof+0x184/0x410
[   34.518748]  kasan_atomics+0x96/0x310
[   34.519247]  kunit_try_run_case+0x1b3/0x490
[   34.519582]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   34.520303]  kthread+0x257/0x310
[   34.520740]  ret_from_fork+0x41/0x80
[   34.521184]  ret_from_fork_asm+0x1a/0x30
[   34.521490] 
[   34.521808] The buggy address belongs to the object at ffff888102a0ec00
[   34.521808]  which belongs to the cache kmalloc-64 of size 64
[   34.522919] The buggy address is located 0 bytes to the right of
[   34.522919]  allocated 48-byte region [ffff888102a0ec00, ffff888102a0ec30)
[   34.523936] 
[   34.524110] The buggy address belongs to the physical page:
[   34.524746] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a0e
[   34.525337] flags: 0x200000000000000(node=0|zone=2)
[   34.525965] page_type: f5(slab)
[   34.526376] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   34.527101] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   34.527714] page dumped because: kasan: bad access detected
[   34.528238] 
[   34.528488] Memory state around the buggy address:
[   34.528962]  ffff888102a0eb00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   34.529576]  ffff888102a0eb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   34.530227] >ffff888102a0ec00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   34.530832]                                      ^
[   34.531156]  ffff888102a0ec80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.531956]  ffff888102a0ed00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.532601] ==================================================================
[   33.586522] ==================================================================
[   33.587329] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x13b6/0x5450
[   33.588059] Read of size 8 at addr ffff888102a0ec30 by task kunit_try_catch/272
[   33.588619] 
[   33.589016] CPU: 1 UID: 0 PID: 272 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241205 #1
[   33.589954] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.590510] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   33.591385] Call Trace:
[   33.591769]  <TASK>
[   33.592122]  dump_stack_lvl+0x73/0xb0
[   33.592516]  print_report+0xd1/0x640
[   33.593181]  ? __virt_addr_valid+0x1db/0x2d0
[   33.593627]  ? kasan_complete_mode_report_info+0x2a/0x200
[   33.594387]  kasan_report+0x102/0x140
[   33.594855]  ? kasan_atomics_helper+0x13b6/0x5450
[   33.595451]  ? kasan_atomics_helper+0x13b6/0x5450
[   33.596036]  kasan_check_range+0x10c/0x1c0
[   33.596620]  __kasan_check_read+0x15/0x20
[   33.597187]  kasan_atomics_helper+0x13b6/0x5450
[   33.597851]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   33.598340]  ? __kmalloc_cache_noprof+0x184/0x410
[   33.598845]  ? kasan_atomics+0x153/0x310
[   33.599435]  kasan_atomics+0x1dd/0x310
[   33.600033]  ? __pfx_kasan_atomics+0x10/0x10
[   33.600518]  ? __pfx_read_tsc+0x10/0x10
[   33.600971]  ? ktime_get_ts64+0x86/0x230
[   33.601347]  kunit_try_run_case+0x1b3/0x490
[   33.602080]  ? __pfx_kunit_try_run_case+0x10/0x10
[   33.602741]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   33.603299]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   33.603707]  ? __kthread_parkme+0x82/0x160
[   33.604316]  ? preempt_count_sub+0x50/0x80
[   33.604858]  ? __pfx_kunit_try_run_case+0x10/0x10
[   33.605321]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   33.605962]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   33.606585]  kthread+0x257/0x310
[   33.606968]  ? __pfx_kthread+0x10/0x10
[   33.607306]  ret_from_fork+0x41/0x80
[   33.607880]  ? __pfx_kthread+0x10/0x10
[   33.608229]  ret_from_fork_asm+0x1a/0x30
[   33.608669]  </TASK>
[   33.609037] 
[   33.609298] Allocated by task 272:
[   33.609607]  kasan_save_stack+0x3d/0x60
[   33.610037]  kasan_save_track+0x18/0x40
[   33.610529]  kasan_save_alloc_info+0x3b/0x50
[   33.611042]  __kasan_kmalloc+0xb7/0xc0
[   33.611427]  __kmalloc_cache_noprof+0x184/0x410
[   33.611896]  kasan_atomics+0x96/0x310
[   33.612498]  kunit_try_run_case+0x1b3/0x490
[   33.613001]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   33.613503]  kthread+0x257/0x310
[   33.613872]  ret_from_fork+0x41/0x80
[   33.614421]  ret_from_fork_asm+0x1a/0x30
[   33.615035] 
[   33.615299] The buggy address belongs to the object at ffff888102a0ec00
[   33.615299]  which belongs to the cache kmalloc-64 of size 64
[   33.616269] The buggy address is located 0 bytes to the right of
[   33.616269]  allocated 48-byte region [ffff888102a0ec00, ffff888102a0ec30)
[   33.617358] 
[   33.617626] The buggy address belongs to the physical page:
[   33.618210] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a0e
[   33.619100] flags: 0x200000000000000(node=0|zone=2)
[   33.619497] page_type: f5(slab)
[   33.620092] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   33.620923] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   33.621508] page dumped because: kasan: bad access detected
[   33.622117] 
[   33.622347] Memory state around the buggy address:
[   33.622900]  ffff888102a0eb00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.623450]  ffff888102a0eb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.624217] >ffff888102a0ec00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   33.625025]                                      ^
[   33.625503]  ffff888102a0ec80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.626235]  ffff888102a0ed00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.626992] ==================================================================
[   33.059297] ==================================================================
[   33.059905] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xe79/0x5450
[   33.061784] Write of size 4 at addr ffff888102a0ec30 by task kunit_try_catch/272
[   33.062297] 
[   33.062765] CPU: 1 UID: 0 PID: 272 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241205 #1
[   33.064364] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.064806] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   33.065743] Call Trace:
[   33.066234]  <TASK>
[   33.066455]  dump_stack_lvl+0x73/0xb0
[   33.066983]  print_report+0xd1/0x640
[   33.067419]  ? __virt_addr_valid+0x1db/0x2d0
[   33.068035]  ? kasan_complete_mode_report_info+0x2a/0x200
[   33.068662]  kasan_report+0x102/0x140
[   33.069190]  ? kasan_atomics_helper+0xe79/0x5450
[   33.069984]  ? kasan_atomics_helper+0xe79/0x5450
[   33.070490]  kasan_check_range+0x10c/0x1c0
[   33.071067]  __kasan_check_write+0x18/0x20
[   33.071579]  kasan_atomics_helper+0xe79/0x5450
[   33.072051]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   33.072477]  ? __kmalloc_cache_noprof+0x184/0x410
[   33.072921]  ? kasan_atomics+0x153/0x310
[   33.073448]  kasan_atomics+0x1dd/0x310
[   33.073923]  ? __pfx_kasan_atomics+0x10/0x10
[   33.074341]  ? __pfx_read_tsc+0x10/0x10
[   33.074927]  ? ktime_get_ts64+0x86/0x230
[   33.075435]  kunit_try_run_case+0x1b3/0x490
[   33.076004]  ? __pfx_kunit_try_run_case+0x10/0x10
[   33.076457]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   33.077050]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   33.077526]  ? __kthread_parkme+0x82/0x160
[   33.078025]  ? preempt_count_sub+0x50/0x80
[   33.078373]  ? __pfx_kunit_try_run_case+0x10/0x10
[   33.079026]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   33.079583]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   33.080087]  kthread+0x257/0x310
[   33.080538]  ? __pfx_kthread+0x10/0x10
[   33.081012]  ret_from_fork+0x41/0x80
[   33.081503]  ? __pfx_kthread+0x10/0x10
[   33.081892]  ret_from_fork_asm+0x1a/0x30
[   33.082441]  </TASK>
[   33.082726] 
[   33.083009] Allocated by task 272:
[   33.083402]  kasan_save_stack+0x3d/0x60
[   33.083952]  kasan_save_track+0x18/0x40
[   33.084343]  kasan_save_alloc_info+0x3b/0x50
[   33.084945]  __kasan_kmalloc+0xb7/0xc0
[   33.085350]  __kmalloc_cache_noprof+0x184/0x410
[   33.085860]  kasan_atomics+0x96/0x310
[   33.086306]  kunit_try_run_case+0x1b3/0x490
[   33.086712]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   33.087268]  kthread+0x257/0x310
[   33.087639]  ret_from_fork+0x41/0x80
[   33.088076]  ret_from_fork_asm+0x1a/0x30
[   33.088611] 
[   33.088964] The buggy address belongs to the object at ffff888102a0ec00
[   33.088964]  which belongs to the cache kmalloc-64 of size 64
[   33.089842] The buggy address is located 0 bytes to the right of
[   33.089842]  allocated 48-byte region [ffff888102a0ec00, ffff888102a0ec30)
[   33.090990] 
[   33.091251] The buggy address belongs to the physical page:
[   33.091671] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a0e
[   33.092471] flags: 0x200000000000000(node=0|zone=2)
[   33.092926] page_type: f5(slab)
[   33.093339] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   33.094083] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   33.094710] page dumped because: kasan: bad access detected
[   33.095359] 
[   33.095619] Memory state around the buggy address:
[   33.096167]  ffff888102a0eb00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.096673]  ffff888102a0eb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.097406] >ffff888102a0ec00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   33.098168]                                      ^
[   33.098492]  ffff888102a0ec80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.099281]  ffff888102a0ed00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.100076] ==================================================================
[   32.551393] ==================================================================
[   32.551956] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x7c8/0x5450
[   32.553019] Write of size 4 at addr ffff888102a0ec30 by task kunit_try_catch/272
[   32.553754] 
[   32.553989] CPU: 1 UID: 0 PID: 272 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241205 #1
[   32.555228] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.555576] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   32.556436] Call Trace:
[   32.556846]  <TASK>
[   32.557223]  dump_stack_lvl+0x73/0xb0
[   32.557643]  print_report+0xd1/0x640
[   32.558270]  ? __virt_addr_valid+0x1db/0x2d0
[   32.558613]  ? kasan_complete_mode_report_info+0x2a/0x200
[   32.559393]  kasan_report+0x102/0x140
[   32.559759]  ? kasan_atomics_helper+0x7c8/0x5450
[   32.560477]  ? kasan_atomics_helper+0x7c8/0x5450
[   32.561085]  kasan_check_range+0x10c/0x1c0
[   32.561576]  __kasan_check_write+0x18/0x20
[   32.562186]  kasan_atomics_helper+0x7c8/0x5450
[   32.562625]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   32.563362]  ? __kmalloc_cache_noprof+0x184/0x410
[   32.563946]  ? kasan_atomics+0x153/0x310
[   32.564452]  kasan_atomics+0x1dd/0x310
[   32.564903]  ? __pfx_kasan_atomics+0x10/0x10
[   32.565469]  ? __pfx_read_tsc+0x10/0x10
[   32.566052]  ? ktime_get_ts64+0x86/0x230
[   32.566433]  kunit_try_run_case+0x1b3/0x490
[   32.567116]  ? __pfx_kunit_try_run_case+0x10/0x10
[   32.567611]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   32.568323]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   32.568745]  ? __kthread_parkme+0x82/0x160
[   32.569482]  ? preempt_count_sub+0x50/0x80
[   32.570336]  ? __pfx_kunit_try_run_case+0x10/0x10
[   32.570809]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   32.571296]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   32.572094]  kthread+0x257/0x310
[   32.572472]  ? __pfx_kthread+0x10/0x10
[   32.573048]  ret_from_fork+0x41/0x80
[   32.573482]  ? __pfx_kthread+0x10/0x10
[   32.573913]  ret_from_fork_asm+0x1a/0x30
[   32.574484]  </TASK>
[   32.574889] 
[   32.575096] Allocated by task 272:
[   32.575523]  kasan_save_stack+0x3d/0x60
[   32.576176]  kasan_save_track+0x18/0x40
[   32.576773]  kasan_save_alloc_info+0x3b/0x50
[   32.577205]  __kasan_kmalloc+0xb7/0xc0
[   32.577751]  __kmalloc_cache_noprof+0x184/0x410
[   32.578219]  kasan_atomics+0x96/0x310
[   32.578745]  kunit_try_run_case+0x1b3/0x490
[   32.579206]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   32.579878]  kthread+0x257/0x310
[   32.580365]  ret_from_fork+0x41/0x80
[   32.580912]  ret_from_fork_asm+0x1a/0x30
[   32.581426] 
[   32.581762] The buggy address belongs to the object at ffff888102a0ec00
[   32.581762]  which belongs to the cache kmalloc-64 of size 64
[   32.582947] The buggy address is located 0 bytes to the right of
[   32.582947]  allocated 48-byte region [ffff888102a0ec00, ffff888102a0ec30)
[   32.584117] 
[   32.584545] The buggy address belongs to the physical page:
[   32.584966] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a0e
[   32.586015] flags: 0x200000000000000(node=0|zone=2)
[   32.586477] page_type: f5(slab)
[   32.586945] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   32.587724] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   32.588540] page dumped because: kasan: bad access detected
[   32.589094] 
[   32.589458] Memory state around the buggy address:
[   32.589925]  ffff888102a0eb00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.590555]  ffff888102a0eb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.591499] >ffff888102a0ec00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   32.592144]                                      ^
[   32.592769]  ffff888102a0ec80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.593569]  ffff888102a0ed00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.594394] ==================================================================
[   34.447259] ==================================================================
[   34.447999] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1e13/0x5450
[   34.448724] Write of size 8 at addr ffff888102a0ec30 by task kunit_try_catch/272
[   34.449290] 
[   34.449599] CPU: 1 UID: 0 PID: 272 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241205 #1
[   34.450850] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.451140] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   34.452312] Call Trace:
[   34.452755]  <TASK>
[   34.452970]  dump_stack_lvl+0x73/0xb0
[   34.453834]  print_report+0xd1/0x640
[   34.454146]  ? __virt_addr_valid+0x1db/0x2d0
[   34.454503]  ? kasan_complete_mode_report_info+0x2a/0x200
[   34.455467]  kasan_report+0x102/0x140
[   34.456082]  ? kasan_atomics_helper+0x1e13/0x5450
[   34.456628]  ? kasan_atomics_helper+0x1e13/0x5450
[   34.457293]  kasan_check_range+0x10c/0x1c0
[   34.457882]  __kasan_check_write+0x18/0x20
[   34.458348]  kasan_atomics_helper+0x1e13/0x5450
[   34.459025]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   34.459522]  ? __kmalloc_cache_noprof+0x184/0x410
[   34.460252]  ? kasan_atomics+0x153/0x310
[   34.460584]  kasan_atomics+0x1dd/0x310
[   34.461228]  ? __pfx_kasan_atomics+0x10/0x10
[   34.461602]  ? __pfx_read_tsc+0x10/0x10
[   34.462193]  ? ktime_get_ts64+0x86/0x230
[   34.462724]  kunit_try_run_case+0x1b3/0x490
[   34.463291]  ? __pfx_kunit_try_run_case+0x10/0x10
[   34.464001]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   34.464666]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   34.465194]  ? __kthread_parkme+0x82/0x160
[   34.465606]  ? preempt_count_sub+0x50/0x80
[   34.466328]  ? __pfx_kunit_try_run_case+0x10/0x10
[   34.466888]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   34.467577]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   34.468335]  kthread+0x257/0x310
[   34.468828]  ? __pfx_kthread+0x10/0x10
[   34.469264]  ret_from_fork+0x41/0x80
[   34.469667]  ? __pfx_kthread+0x10/0x10
[   34.470213]  ret_from_fork_asm+0x1a/0x30
[   34.470541]  </TASK>
[   34.470890] 
[   34.471224] Allocated by task 272:
[   34.471792]  kasan_save_stack+0x3d/0x60
[   34.472397]  kasan_save_track+0x18/0x40
[   34.472876]  kasan_save_alloc_info+0x3b/0x50
[   34.473356]  __kasan_kmalloc+0xb7/0xc0
[   34.473652]  __kmalloc_cache_noprof+0x184/0x410
[   34.474313]  kasan_atomics+0x96/0x310
[   34.474940]  kunit_try_run_case+0x1b3/0x490
[   34.475287]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   34.476044]  kthread+0x257/0x310
[   34.476449]  ret_from_fork+0x41/0x80
[   34.477013]  ret_from_fork_asm+0x1a/0x30
[   34.477432] 
[   34.477604] The buggy address belongs to the object at ffff888102a0ec00
[   34.477604]  which belongs to the cache kmalloc-64 of size 64
[   34.479249] The buggy address is located 0 bytes to the right of
[   34.479249]  allocated 48-byte region [ffff888102a0ec00, ffff888102a0ec30)
[   34.481020] 
[   34.481542] The buggy address belongs to the physical page:
[   34.482216] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a0e
[   34.482530] flags: 0x200000000000000(node=0|zone=2)
[   34.482775] page_type: f5(slab)
[   34.483291] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   34.484539] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   34.485169] page dumped because: kasan: bad access detected
[   34.485936] 
[   34.486231] Memory state around the buggy address:
[   34.486806]  ffff888102a0eb00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   34.487475]  ffff888102a0eb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   34.488373] >ffff888102a0ec00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   34.489269]                                      ^
[   34.489914]  ffff888102a0ec80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.490459]  ffff888102a0ed00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.491263] ==================================================================
[   32.507616] ==================================================================
[   32.508313] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x730/0x5450
[   32.509139] Write of size 4 at addr ffff888102a0ec30 by task kunit_try_catch/272
[   32.510187] 
[   32.510465] CPU: 1 UID: 0 PID: 272 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241205 #1
[   32.511481] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.512106] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   32.513070] Call Trace:
[   32.513424]  <TASK>
[   32.513746]  dump_stack_lvl+0x73/0xb0
[   32.514381]  print_report+0xd1/0x640
[   32.514862]  ? __virt_addr_valid+0x1db/0x2d0
[   32.515484]  ? kasan_complete_mode_report_info+0x2a/0x200
[   32.516149]  kasan_report+0x102/0x140
[   32.516561]  ? kasan_atomics_helper+0x730/0x5450
[   32.517209]  ? kasan_atomics_helper+0x730/0x5450
[   32.517702]  kasan_check_range+0x10c/0x1c0
[   32.518252]  __kasan_check_write+0x18/0x20
[   32.518889]  kasan_atomics_helper+0x730/0x5450
[   32.519411]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   32.520146]  ? __kmalloc_cache_noprof+0x184/0x410
[   32.520551]  ? kasan_atomics+0x153/0x310
[   32.521170]  kasan_atomics+0x1dd/0x310
[   32.521736]  ? __pfx_kasan_atomics+0x10/0x10
[   32.522310]  ? __pfx_read_tsc+0x10/0x10
[   32.522718]  ? ktime_get_ts64+0x86/0x230
[   32.523388]  kunit_try_run_case+0x1b3/0x490
[   32.523965]  ? __pfx_kunit_try_run_case+0x10/0x10
[   32.524610]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   32.525268]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   32.525902]  ? __kthread_parkme+0x82/0x160
[   32.526455]  ? preempt_count_sub+0x50/0x80
[   32.526933]  ? __pfx_kunit_try_run_case+0x10/0x10
[   32.527554]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   32.528193]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   32.528800]  kthread+0x257/0x310
[   32.529254]  ? __pfx_kthread+0x10/0x10
[   32.529617]  ret_from_fork+0x41/0x80
[   32.530147]  ? __pfx_kthread+0x10/0x10
[   32.530513]  ret_from_fork_asm+0x1a/0x30
[   32.531127]  </TASK>
[   32.531515] 
[   32.531844] Allocated by task 272:
[   32.532267]  kasan_save_stack+0x3d/0x60
[   32.532676]  kasan_save_track+0x18/0x40
[   32.533246]  kasan_save_alloc_info+0x3b/0x50
[   32.533593]  __kasan_kmalloc+0xb7/0xc0
[   32.534218]  __kmalloc_cache_noprof+0x184/0x410
[   32.534620]  kasan_atomics+0x96/0x310
[   32.535141]  kunit_try_run_case+0x1b3/0x490
[   32.535583]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   32.536340]  kthread+0x257/0x310
[   32.536727]  ret_from_fork+0x41/0x80
[   32.537216]  ret_from_fork_asm+0x1a/0x30
[   32.537904] 
[   32.538105] The buggy address belongs to the object at ffff888102a0ec00
[   32.538105]  which belongs to the cache kmalloc-64 of size 64
[   32.539265] The buggy address is located 0 bytes to the right of
[   32.539265]  allocated 48-byte region [ffff888102a0ec00, ffff888102a0ec30)
[   32.540432] 
[   32.540815] The buggy address belongs to the physical page:
[   32.541375] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a0e
[   32.542186] flags: 0x200000000000000(node=0|zone=2)
[   32.542718] page_type: f5(slab)
[   32.543160] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   32.543974] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   32.544654] page dumped because: kasan: bad access detected
[   32.545299] 
[   32.545600] Memory state around the buggy address:
[   32.546273]  ffff888102a0eb00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.547071]  ffff888102a0eb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.547748] >ffff888102a0ec00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   32.548429]                                      ^
[   32.548974]  ffff888102a0ec80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.549623]  ffff888102a0ed00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.550284] ==================================================================
[   32.160322] ==================================================================
[   32.161930] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b70/0x5450
[   32.162798] Write of size 4 at addr ffff888102a0ec30 by task kunit_try_catch/272
[   32.163841] 
[   32.164108] CPU: 1 UID: 0 PID: 272 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241205 #1
[   32.165212] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.166271] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   32.167233] Call Trace:
[   32.167504]  <TASK>
[   32.167833]  dump_stack_lvl+0x73/0xb0
[   32.168381]  print_report+0xd1/0x640
[   32.168947]  ? __virt_addr_valid+0x1db/0x2d0
[   32.169366]  ? kasan_complete_mode_report_info+0x2a/0x200
[   32.170122]  kasan_report+0x102/0x140
[   32.170507]  ? kasan_atomics_helper+0x4b70/0x5450
[   32.171163]  ? kasan_atomics_helper+0x4b70/0x5450
[   32.171575]  __asan_report_store4_noabort+0x1b/0x30
[   32.172052]  kasan_atomics_helper+0x4b70/0x5450
[   32.172608]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   32.173232]  ? __kmalloc_cache_noprof+0x184/0x410
[   32.173968]  ? kasan_atomics+0x153/0x310
[   32.174340]  kasan_atomics+0x1dd/0x310
[   32.174884]  ? __pfx_kasan_atomics+0x10/0x10
[   32.175301]  ? __pfx_read_tsc+0x10/0x10
[   32.175872]  ? ktime_get_ts64+0x86/0x230
[   32.176298]  kunit_try_run_case+0x1b3/0x490
[   32.176743]  ? __pfx_kunit_try_run_case+0x10/0x10
[   32.177573]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   32.178257]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   32.178744]  ? __kthread_parkme+0x82/0x160
[   32.179220]  ? preempt_count_sub+0x50/0x80
[   32.179628]  ? __pfx_kunit_try_run_case+0x10/0x10
[   32.180371]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   32.181153]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   32.181604]  kthread+0x257/0x310
[   32.182207]  ? __pfx_kthread+0x10/0x10
[   32.182558]  ret_from_fork+0x41/0x80
[   32.183134]  ? __pfx_kthread+0x10/0x10
[   32.183814]  ret_from_fork_asm+0x1a/0x30
[   32.184210]  </TASK>
[   32.184522] 
[   32.184842] Allocated by task 272:
[   32.185124]  kasan_save_stack+0x3d/0x60
[   32.185650]  kasan_save_track+0x18/0x40
[   32.186124]  kasan_save_alloc_info+0x3b/0x50
[   32.186464]  __kasan_kmalloc+0xb7/0xc0
[   32.186861]  __kmalloc_cache_noprof+0x184/0x410
[   32.187714]  kasan_atomics+0x96/0x310
[   32.188175]  kunit_try_run_case+0x1b3/0x490
[   32.188652]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   32.189424]  kthread+0x257/0x310
[   32.189841]  ret_from_fork+0x41/0x80
[   32.190441]  ret_from_fork_asm+0x1a/0x30
[   32.190853] 
[   32.191019] The buggy address belongs to the object at ffff888102a0ec00
[   32.191019]  which belongs to the cache kmalloc-64 of size 64
[   32.192493] The buggy address is located 0 bytes to the right of
[   32.192493]  allocated 48-byte region [ffff888102a0ec00, ffff888102a0ec30)
[   32.193631] 
[   32.194056] The buggy address belongs to the physical page:
[   32.194832] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a0e
[   32.195468] flags: 0x200000000000000(node=0|zone=2)
[   32.195976] page_type: f5(slab)
[   32.196593] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   32.197304] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   32.198171] page dumped because: kasan: bad access detected
[   32.198896] 
[   32.199206] Memory state around the buggy address:
[   32.199666]  ffff888102a0eb00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.200563]  ffff888102a0eb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.201267] >ffff888102a0ec00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   32.202107]                                      ^
[   32.202502]  ffff888102a0ec80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.204099]  ffff888102a0ed00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.204770] ==================================================================
[   33.716649] ==================================================================
[   33.717454] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x50d6/0x5450
[   33.718018] Write of size 8 at addr ffff888102a0ec30 by task kunit_try_catch/272
[   33.718740] 
[   33.718954] CPU: 1 UID: 0 PID: 272 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241205 #1
[   33.720126] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.720587] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   33.722235] Call Trace:
[   33.722569]  <TASK>
[   33.722974]  dump_stack_lvl+0x73/0xb0
[   33.723490]  print_report+0xd1/0x640
[   33.724107]  ? __virt_addr_valid+0x1db/0x2d0
[   33.724575]  ? kasan_complete_mode_report_info+0x2a/0x200
[   33.725223]  kasan_report+0x102/0x140
[   33.725893]  ? kasan_atomics_helper+0x50d6/0x5450
[   33.726295]  ? kasan_atomics_helper+0x50d6/0x5450
[   33.726945]  __asan_report_store8_noabort+0x1b/0x30
[   33.727571]  kasan_atomics_helper+0x50d6/0x5450
[   33.728046]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   33.728723]  ? __kmalloc_cache_noprof+0x184/0x410
[   33.729309]  ? kasan_atomics+0x153/0x310
[   33.729895]  kasan_atomics+0x1dd/0x310
[   33.730423]  ? __pfx_kasan_atomics+0x10/0x10
[   33.730977]  ? __pfx_read_tsc+0x10/0x10
[   33.731462]  ? ktime_get_ts64+0x86/0x230
[   33.731939]  kunit_try_run_case+0x1b3/0x490
[   33.732393]  ? __pfx_kunit_try_run_case+0x10/0x10
[   33.733066]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   33.733487]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   33.734195]  ? __kthread_parkme+0x82/0x160
[   33.734594]  ? preempt_count_sub+0x50/0x80
[   33.735270]  ? __pfx_kunit_try_run_case+0x10/0x10
[   33.735835]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   33.736539]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   33.737088]  kthread+0x257/0x310
[   33.737602]  ? __pfx_kthread+0x10/0x10
[   33.738075]  ret_from_fork+0x41/0x80
[   33.738600]  ? __pfx_kthread+0x10/0x10
[   33.739142]  ret_from_fork_asm+0x1a/0x30
[   33.739583]  </TASK>
[   33.740076] 
[   33.740277] Allocated by task 272:
[   33.740821]  kasan_save_stack+0x3d/0x60
[   33.741254]  kasan_save_track+0x18/0x40
[   33.741713]  kasan_save_alloc_info+0x3b/0x50
[   33.742221]  __kasan_kmalloc+0xb7/0xc0
[   33.742795]  __kmalloc_cache_noprof+0x184/0x410
[   33.743268]  kasan_atomics+0x96/0x310
[   33.743802]  kunit_try_run_case+0x1b3/0x490
[   33.744318]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   33.744824]  kthread+0x257/0x310
[   33.745279]  ret_from_fork+0x41/0x80
[   33.745983]  ret_from_fork_asm+0x1a/0x30
[   33.746391] 
[   33.746562] The buggy address belongs to the object at ffff888102a0ec00
[   33.746562]  which belongs to the cache kmalloc-64 of size 64
[   33.747989] The buggy address is located 0 bytes to the right of
[   33.747989]  allocated 48-byte region [ffff888102a0ec00, ffff888102a0ec30)
[   33.749158] 
[   33.749406] The buggy address belongs to the physical page:
[   33.750033] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a0e
[   33.750852] flags: 0x200000000000000(node=0|zone=2)
[   33.751329] page_type: f5(slab)
[   33.751830] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   33.752608] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   33.753390] page dumped because: kasan: bad access detected
[   33.753995] 
[   33.754170] Memory state around the buggy address:
[   33.754734]  ffff888102a0eb00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.755479]  ffff888102a0eb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.756112] >ffff888102a0ec00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   33.756845]                                      ^
[   33.757405]  ffff888102a0ec80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.758190]  ffff888102a0ed00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.758940] ==================================================================
[   33.673913] ==================================================================
[   33.674470] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1468/0x5450
[   33.675376] Write of size 8 at addr ffff888102a0ec30 by task kunit_try_catch/272
[   33.676133] 
[   33.676428] CPU: 1 UID: 0 PID: 272 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241205 #1
[   33.677387] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.678006] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   33.678945] Call Trace:
[   33.679192]  <TASK>
[   33.679582]  dump_stack_lvl+0x73/0xb0
[   33.680048]  print_report+0xd1/0x640
[   33.680478]  ? __virt_addr_valid+0x1db/0x2d0
[   33.681092]  ? kasan_complete_mode_report_info+0x2a/0x200
[   33.681715]  kasan_report+0x102/0x140
[   33.682137]  ? kasan_atomics_helper+0x1468/0x5450
[   33.682639]  ? kasan_atomics_helper+0x1468/0x5450
[   33.683227]  kasan_check_range+0x10c/0x1c0
[   33.683894]  __kasan_check_write+0x18/0x20
[   33.684413]  kasan_atomics_helper+0x1468/0x5450
[   33.685115]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   33.685573]  ? __kmalloc_cache_noprof+0x184/0x410
[   33.686223]  ? kasan_atomics+0x153/0x310
[   33.686668]  kasan_atomics+0x1dd/0x310
[   33.687290]  ? __pfx_kasan_atomics+0x10/0x10
[   33.687718]  ? __pfx_read_tsc+0x10/0x10
[   33.688227]  ? ktime_get_ts64+0x86/0x230
[   33.688719]  kunit_try_run_case+0x1b3/0x490
[   33.689239]  ? __pfx_kunit_try_run_case+0x10/0x10
[   33.690010]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   33.690553]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   33.691084]  ? __kthread_parkme+0x82/0x160
[   33.691674]  ? preempt_count_sub+0x50/0x80
[   33.692246]  ? __pfx_kunit_try_run_case+0x10/0x10
[   33.692658]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   33.693435]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   33.693914]  kthread+0x257/0x310
[   33.694422]  ? __pfx_kthread+0x10/0x10
[   33.694987]  ret_from_fork+0x41/0x80
[   33.695345]  ? __pfx_kthread+0x10/0x10
[   33.695949]  ret_from_fork_asm+0x1a/0x30
[   33.696330]  </TASK>
[   33.696741] 
[   33.697056] Allocated by task 272:
[   33.697361]  kasan_save_stack+0x3d/0x60
[   33.697986]  kasan_save_track+0x18/0x40
[   33.698356]  kasan_save_alloc_info+0x3b/0x50
[   33.698999]  __kasan_kmalloc+0xb7/0xc0
[   33.699475]  __kmalloc_cache_noprof+0x184/0x410
[   33.699956]  kasan_atomics+0x96/0x310
[   33.700436]  kunit_try_run_case+0x1b3/0x490
[   33.701071]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   33.701708]  kthread+0x257/0x310
[   33.702100]  ret_from_fork+0x41/0x80
[   33.702636]  ret_from_fork_asm+0x1a/0x30
[   33.703058] 
[   33.703383] The buggy address belongs to the object at ffff888102a0ec00
[   33.703383]  which belongs to the cache kmalloc-64 of size 64
[   33.704483] The buggy address is located 0 bytes to the right of
[   33.704483]  allocated 48-byte region [ffff888102a0ec00, ffff888102a0ec30)
[   33.705594] 
[   33.706001] The buggy address belongs to the physical page:
[   33.706407] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a0e
[   33.707224] flags: 0x200000000000000(node=0|zone=2)
[   33.707930] page_type: f5(slab)
[   33.708284] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   33.709116] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   33.709909] page dumped because: kasan: bad access detected
[   33.710434] 
[   33.710718] Memory state around the buggy address:
[   33.711240]  ffff888102a0eb00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.712054]  ffff888102a0eb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.712936] >ffff888102a0ec00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   33.713595]                                      ^
[   33.714077]  ffff888102a0ec80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.714816]  ffff888102a0ed00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.715446] ==================================================================
[   33.327330] ==================================================================
[   33.329039] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1149/0x5450
[   33.330569] Write of size 4 at addr ffff888102a0ec30 by task kunit_try_catch/272
[   33.331917] 
[   33.332202] CPU: 1 UID: 0 PID: 272 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241205 #1
[   33.333281] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.333747] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   33.334583] Call Trace:
[   33.334926]  <TASK>
[   33.335217]  dump_stack_lvl+0x73/0xb0
[   33.335644]  print_report+0xd1/0x640
[   33.336366]  ? __virt_addr_valid+0x1db/0x2d0
[   33.337134]  ? kasan_complete_mode_report_info+0x2a/0x200
[   33.337668]  kasan_report+0x102/0x140
[   33.338289]  ? kasan_atomics_helper+0x1149/0x5450
[   33.338826]  ? kasan_atomics_helper+0x1149/0x5450
[   33.339433]  kasan_check_range+0x10c/0x1c0
[   33.340087]  __kasan_check_write+0x18/0x20
[   33.340517]  kasan_atomics_helper+0x1149/0x5450
[   33.341359]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   33.342195]  ? __kmalloc_cache_noprof+0x184/0x410
[   33.342694]  ? kasan_atomics+0x153/0x310
[   33.343154]  kasan_atomics+0x1dd/0x310
[   33.343562]  ? __pfx_kasan_atomics+0x10/0x10
[   33.344121]  ? __pfx_read_tsc+0x10/0x10
[   33.344608]  ? ktime_get_ts64+0x86/0x230
[   33.345075]  kunit_try_run_case+0x1b3/0x490
[   33.345602]  ? __pfx_kunit_try_run_case+0x10/0x10
[   33.346099]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   33.346595]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   33.347144]  ? __kthread_parkme+0x82/0x160
[   33.347607]  ? preempt_count_sub+0x50/0x80
[   33.348046]  ? __pfx_kunit_try_run_case+0x10/0x10
[   33.348537]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   33.349080]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   33.349741]  kthread+0x257/0x310
[   33.350235]  ? __pfx_kthread+0x10/0x10
[   33.350659]  ret_from_fork+0x41/0x80
[   33.351112]  ? __pfx_kthread+0x10/0x10
[   33.351497]  ret_from_fork_asm+0x1a/0x30
[   33.351936]  </TASK>
[   33.352248] 
[   33.352508] Allocated by task 272:
[   33.352915]  kasan_save_stack+0x3d/0x60
[   33.353282]  kasan_save_track+0x18/0x40
[   33.353653]  kasan_save_alloc_info+0x3b/0x50
[   33.354265]  __kasan_kmalloc+0xb7/0xc0
[   33.354654]  __kmalloc_cache_noprof+0x184/0x410
[   33.355135]  kasan_atomics+0x96/0x310
[   33.355535]  kunit_try_run_case+0x1b3/0x490
[   33.356026]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   33.356642]  kthread+0x257/0x310
[   33.357044]  ret_from_fork+0x41/0x80
[   33.357395]  ret_from_fork_asm+0x1a/0x30
[   33.357847] 
[   33.358106] The buggy address belongs to the object at ffff888102a0ec00
[   33.358106]  which belongs to the cache kmalloc-64 of size 64
[   33.359095] The buggy address is located 0 bytes to the right of
[   33.359095]  allocated 48-byte region [ffff888102a0ec00, ffff888102a0ec30)
[   33.360354] 
[   33.360635] The buggy address belongs to the physical page:
[   33.361190] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a0e
[   33.361663] flags: 0x200000000000000(node=0|zone=2)
[   33.362280] page_type: f5(slab)
[   33.362649] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   33.363478] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   33.364236] page dumped because: kasan: bad access detected
[   33.364859] 
[   33.365057] Memory state around the buggy address:
[   33.365375]  ffff888102a0eb00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.366079]  ffff888102a0eb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.366573] >ffff888102a0ec00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   33.367284]                                      ^
[   33.367807]  ffff888102a0ec80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.368335]  ffff888102a0ed00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.368907] ==================================================================
[   32.109660] ==================================================================
[   32.110370] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b8a/0x5450
[   32.111311] Read of size 4 at addr ffff888102a0ec30 by task kunit_try_catch/272
[   32.112093] 
[   32.112346] CPU: 1 UID: 0 PID: 272 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241205 #1
[   32.113519] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.114148] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   32.115508] Call Trace:
[   32.115843]  <TASK>
[   32.116266]  dump_stack_lvl+0x73/0xb0
[   32.116578]  print_report+0xd1/0x640
[   32.117479]  ? __virt_addr_valid+0x1db/0x2d0
[   32.118328]  ? kasan_complete_mode_report_info+0x2a/0x200
[   32.118774]  kasan_report+0x102/0x140
[   32.119585]  ? kasan_atomics_helper+0x4b8a/0x5450
[   32.120057]  ? kasan_atomics_helper+0x4b8a/0x5450
[   32.120938]  __asan_report_load4_noabort+0x18/0x20
[   32.121612]  kasan_atomics_helper+0x4b8a/0x5450
[   32.122468]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   32.123189]  ? __kmalloc_cache_noprof+0x184/0x410
[   32.123995]  ? kasan_atomics+0x153/0x310
[   32.124817]  kasan_atomics+0x1dd/0x310
[   32.125140]  ? __pfx_kasan_atomics+0x10/0x10
[   32.125849]  ? __pfx_read_tsc+0x10/0x10
[   32.126670]  ? ktime_get_ts64+0x86/0x230
[   32.127038]  kunit_try_run_case+0x1b3/0x490
[   32.127535]  ? __pfx_kunit_try_run_case+0x10/0x10
[   32.128539]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   32.128914]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   32.129871]  ? __kthread_parkme+0x82/0x160
[   32.130583]  ? preempt_count_sub+0x50/0x80
[   32.131187]  ? __pfx_kunit_try_run_case+0x10/0x10
[   32.131719]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   32.132487]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   32.133081]  kthread+0x257/0x310
[   32.133803]  ? __pfx_kthread+0x10/0x10
[   32.134349]  ret_from_fork+0x41/0x80
[   32.134847]  ? __pfx_kthread+0x10/0x10
[   32.135332]  ret_from_fork_asm+0x1a/0x30
[   32.135806]  </TASK>
[   32.136175] 
[   32.136475] Allocated by task 272:
[   32.137276]  kasan_save_stack+0x3d/0x60
[   32.137577]  kasan_save_track+0x18/0x40
[   32.138467]  kasan_save_alloc_info+0x3b/0x50
[   32.139059]  __kasan_kmalloc+0xb7/0xc0
[   32.139430]  __kmalloc_cache_noprof+0x184/0x410
[   32.140309]  kasan_atomics+0x96/0x310
[   32.140744]  kunit_try_run_case+0x1b3/0x490
[   32.141502]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   32.142193]  kthread+0x257/0x310
[   32.142639]  ret_from_fork+0x41/0x80
[   32.143114]  ret_from_fork_asm+0x1a/0x30
[   32.143950] 
[   32.144196] The buggy address belongs to the object at ffff888102a0ec00
[   32.144196]  which belongs to the cache kmalloc-64 of size 64
[   32.145604] The buggy address is located 0 bytes to the right of
[   32.145604]  allocated 48-byte region [ffff888102a0ec00, ffff888102a0ec30)
[   32.146843] 
[   32.147012] The buggy address belongs to the physical page:
[   32.148035] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a0e
[   32.149202] flags: 0x200000000000000(node=0|zone=2)
[   32.149665] page_type: f5(slab)
[   32.150641] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   32.151535] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   32.152839] page dumped because: kasan: bad access detected
[   32.153344] 
[   32.153729] Memory state around the buggy address:
[   32.154272]  ffff888102a0eb00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.155468]  ffff888102a0eb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.156315] >ffff888102a0ec00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   32.156971]                                      ^
[   32.157593]  ffff888102a0ec80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.158281]  ffff888102a0ed00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.158971] ==================================================================
[   34.935304] ==================================================================
[   34.935807] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x5117/0x5450
[   34.938415] Read of size 8 at addr ffff888102a0ec30 by task kunit_try_catch/272
[   34.939290] 
[   34.939489] CPU: 1 UID: 0 PID: 272 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241205 #1
[   34.940671] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.941305] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   34.942026] Call Trace:
[   34.942341]  <TASK>
[   34.942629]  dump_stack_lvl+0x73/0xb0
[   34.943186]  print_report+0xd1/0x640
[   34.943723]  ? __virt_addr_valid+0x1db/0x2d0
[   34.944207]  ? kasan_complete_mode_report_info+0x2a/0x200
[   34.944910]  kasan_report+0x102/0x140
[   34.945322]  ? kasan_atomics_helper+0x5117/0x5450
[   34.945965]  ? kasan_atomics_helper+0x5117/0x5450
[   34.946440]  __asan_report_load8_noabort+0x18/0x20
[   34.946989]  kasan_atomics_helper+0x5117/0x5450
[   34.947421]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   34.947847]  ? __kmalloc_cache_noprof+0x184/0x410
[   34.948503]  ? kasan_atomics+0x153/0x310
[   34.949124]  kasan_atomics+0x1dd/0x310
[   34.949590]  ? __pfx_kasan_atomics+0x10/0x10
[   34.950020]  ? __pfx_read_tsc+0x10/0x10
[   34.950591]  ? ktime_get_ts64+0x86/0x230
[   34.951197]  kunit_try_run_case+0x1b3/0x490
[   34.951869]  ? __pfx_kunit_try_run_case+0x10/0x10
[   34.952410]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   34.952929]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   34.953527]  ? __kthread_parkme+0x82/0x160
[   34.954052]  ? preempt_count_sub+0x50/0x80
[   34.954385]  ? __pfx_kunit_try_run_case+0x10/0x10
[   34.955121]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   34.955965]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   34.956511]  kthread+0x257/0x310
[   34.957098]  ? __pfx_kthread+0x10/0x10
[   34.957473]  ret_from_fork+0x41/0x80
[   34.958026]  ? __pfx_kthread+0x10/0x10
[   34.958431]  ret_from_fork_asm+0x1a/0x30
[   34.958998]  </TASK>
[   34.959308] 
[   34.959477] Allocated by task 272:
[   34.960050]  kasan_save_stack+0x3d/0x60
[   34.960507]  kasan_save_track+0x18/0x40
[   34.961386]  kasan_save_alloc_info+0x3b/0x50
[   34.962289]  __kasan_kmalloc+0xb7/0xc0
[   34.962725]  __kmalloc_cache_noprof+0x184/0x410
[   34.963109]  kasan_atomics+0x96/0x310
[   34.963607]  kunit_try_run_case+0x1b3/0x490
[   34.964267]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   34.965205]  kthread+0x257/0x310
[   34.965809]  ret_from_fork+0x41/0x80
[   34.966232]  ret_from_fork_asm+0x1a/0x30
[   34.966610] 
[   34.966888] The buggy address belongs to the object at ffff888102a0ec00
[   34.966888]  which belongs to the cache kmalloc-64 of size 64
[   34.968207] The buggy address is located 0 bytes to the right of
[   34.968207]  allocated 48-byte region [ffff888102a0ec00, ffff888102a0ec30)
[   34.968664] 
[   34.968840] The buggy address belongs to the physical page:
[   34.969070] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a0e
[   34.969374] flags: 0x200000000000000(node=0|zone=2)
[   34.969591] page_type: f5(slab)
[   34.970088] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   34.971452] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   34.972808] page dumped because: kasan: bad access detected
[   34.973565] 
[   34.974038] Memory state around the buggy address:
[   34.974365]  ffff888102a0eb00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   34.975408]  ffff888102a0eb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   34.976419] >ffff888102a0ec00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   34.977037]                                      ^
[   34.977696]  ffff888102a0ec80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.978838]  ffff888102a0ed00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.979408] ==================================================================
[   32.863944] ==================================================================
[   32.864650] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xc71/0x5450
[   32.865319] Write of size 4 at addr ffff888102a0ec30 by task kunit_try_catch/272
[   32.866385] 
[   32.867061] CPU: 1 UID: 0 PID: 272 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241205 #1
[   32.867972] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.868375] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   32.868909] Call Trace:
[   32.869279]  <TASK>
[   32.869767]  dump_stack_lvl+0x73/0xb0
[   32.870501]  print_report+0xd1/0x640
[   32.870911]  ? __virt_addr_valid+0x1db/0x2d0
[   32.871565]  ? kasan_complete_mode_report_info+0x2a/0x200
[   32.872033]  kasan_report+0x102/0x140
[   32.872618]  ? kasan_atomics_helper+0xc71/0x5450
[   32.873167]  ? kasan_atomics_helper+0xc71/0x5450
[   32.873858]  kasan_check_range+0x10c/0x1c0
[   32.874428]  __kasan_check_write+0x18/0x20
[   32.875155]  kasan_atomics_helper+0xc71/0x5450
[   32.875760]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   32.876271]  ? __kmalloc_cache_noprof+0x184/0x410
[   32.877220]  ? kasan_atomics+0x153/0x310
[   32.877644]  kasan_atomics+0x1dd/0x310
[   32.878255]  ? __pfx_kasan_atomics+0x10/0x10
[   32.879069]  ? __pfx_read_tsc+0x10/0x10
[   32.879750]  ? ktime_get_ts64+0x86/0x230
[   32.880189]  kunit_try_run_case+0x1b3/0x490
[   32.880631]  ? __pfx_kunit_try_run_case+0x10/0x10
[   32.881225]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   32.882055]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   32.882780]  ? __kthread_parkme+0x82/0x160
[   32.883476]  ? preempt_count_sub+0x50/0x80
[   32.884267]  ? __pfx_kunit_try_run_case+0x10/0x10
[   32.885341]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   32.886239]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   32.886735]  kthread+0x257/0x310
[   32.887372]  ? __pfx_kthread+0x10/0x10
[   32.888068]  ret_from_fork+0x41/0x80
[   32.888358]  ? __pfx_kthread+0x10/0x10
[   32.888901]  ret_from_fork_asm+0x1a/0x30
[   32.889763]  </TASK>
[   32.890222] 
[   32.890468] Allocated by task 272:
[   32.891469]  kasan_save_stack+0x3d/0x60
[   32.891851]  kasan_save_track+0x18/0x40
[   32.892337]  kasan_save_alloc_info+0x3b/0x50
[   32.893210]  __kasan_kmalloc+0xb7/0xc0
[   32.893617]  __kmalloc_cache_noprof+0x184/0x410
[   32.894306]  kasan_atomics+0x96/0x310
[   32.894903]  kunit_try_run_case+0x1b3/0x490
[   32.895119]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   32.895354]  kthread+0x257/0x310
[   32.895526]  ret_from_fork+0x41/0x80
[   32.895812]  ret_from_fork_asm+0x1a/0x30
[   32.896523] 
[   32.897116] The buggy address belongs to the object at ffff888102a0ec00
[   32.897116]  which belongs to the cache kmalloc-64 of size 64
[   32.899140] The buggy address is located 0 bytes to the right of
[   32.899140]  allocated 48-byte region [ffff888102a0ec00, ffff888102a0ec30)
[   32.901072] 
[   32.901224] The buggy address belongs to the physical page:
[   32.902244] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a0e
[   32.903130] flags: 0x200000000000000(node=0|zone=2)
[   32.904278] page_type: f5(slab)
[   32.904639] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   32.905986] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   32.906769] page dumped because: kasan: bad access detected
[   32.907162] 
[   32.907410] Memory state around the buggy address:
[   32.908419]  ffff888102a0eb00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.908975]  ffff888102a0eb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.910321] >ffff888102a0ec00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   32.911259]                                      ^
[   32.911646]  ffff888102a0ec80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.912627]  ffff888102a0ed00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.914220] ==================================================================
[   33.370131] ==================================================================
[   33.370568] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a04/0x5450
[   33.372755] Read of size 4 at addr ffff888102a0ec30 by task kunit_try_catch/272
[   33.373395] 
[   33.373588] CPU: 1 UID: 0 PID: 272 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241205 #1
[   33.374399] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.374876] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   33.375616] Call Trace:
[   33.376050]  <TASK>
[   33.376323]  dump_stack_lvl+0x73/0xb0
[   33.376877]  print_report+0xd1/0x640
[   33.377227]  ? __virt_addr_valid+0x1db/0x2d0
[   33.377669]  ? kasan_complete_mode_report_info+0x2a/0x200
[   33.378387]  kasan_report+0x102/0x140
[   33.378836]  ? kasan_atomics_helper+0x4a04/0x5450
[   33.379262]  ? kasan_atomics_helper+0x4a04/0x5450
[   33.379901]  __asan_report_load4_noabort+0x18/0x20
[   33.380410]  kasan_atomics_helper+0x4a04/0x5450
[   33.381040]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   33.381519]  ? __kmalloc_cache_noprof+0x184/0x410
[   33.382083]  ? kasan_atomics+0x153/0x310
[   33.382446]  kasan_atomics+0x1dd/0x310
[   33.383012]  ? __pfx_kasan_atomics+0x10/0x10
[   33.383461]  ? __pfx_read_tsc+0x10/0x10
[   33.383892]  ? ktime_get_ts64+0x86/0x230
[   33.384410]  kunit_try_run_case+0x1b3/0x490
[   33.384874]  ? __pfx_kunit_try_run_case+0x10/0x10
[   33.385382]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   33.386032]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   33.386487]  ? __kthread_parkme+0x82/0x160
[   33.387032]  ? preempt_count_sub+0x50/0x80
[   33.387454]  ? __pfx_kunit_try_run_case+0x10/0x10
[   33.388032]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   33.388595]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   33.389165]  kthread+0x257/0x310
[   33.389476]  ? __pfx_kthread+0x10/0x10
[   33.390027]  ret_from_fork+0x41/0x80
[   33.390386]  ? __pfx_kthread+0x10/0x10
[   33.390909]  ret_from_fork_asm+0x1a/0x30
[   33.391275]  </TASK>
[   33.391576] 
[   33.391841] Allocated by task 272:
[   33.392265]  kasan_save_stack+0x3d/0x60
[   33.392584]  kasan_save_track+0x18/0x40
[   33.393114]  kasan_save_alloc_info+0x3b/0x50
[   33.393530]  __kasan_kmalloc+0xb7/0xc0
[   33.393957]  __kmalloc_cache_noprof+0x184/0x410
[   33.394521]  kasan_atomics+0x96/0x310
[   33.394940]  kunit_try_run_case+0x1b3/0x490
[   33.395411]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   33.396035]  kthread+0x257/0x310
[   33.396369]  ret_from_fork+0x41/0x80
[   33.396929]  ret_from_fork_asm+0x1a/0x30
[   33.397356] 
[   33.397592] The buggy address belongs to the object at ffff888102a0ec00
[   33.397592]  which belongs to the cache kmalloc-64 of size 64
[   33.398497] The buggy address is located 0 bytes to the right of
[   33.398497]  allocated 48-byte region [ffff888102a0ec00, ffff888102a0ec30)
[   33.399555] 
[   33.399886] The buggy address belongs to the physical page:
[   33.400458] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a0e
[   33.401126] flags: 0x200000000000000(node=0|zone=2)
[   33.401623] page_type: f5(slab)
[   33.402121] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   33.403384] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   33.404012] page dumped because: kasan: bad access detected
[   33.404723] 
[   33.405027] Memory state around the buggy address:
[   33.405541]  ffff888102a0eb00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.406282]  ffff888102a0eb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.407019] >ffff888102a0ec00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   33.407739]                                      ^
[   33.408207]  ffff888102a0ec80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.408899]  ffff888102a0ed00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.409538] ==================================================================
[   34.107491] ==================================================================
[   34.108162] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x19e4/0x5450
[   34.108890] Write of size 8 at addr ffff888102a0ec30 by task kunit_try_catch/272
[   34.109940] 
[   34.110131] CPU: 1 UID: 0 PID: 272 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241205 #1
[   34.111631] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.112346] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   34.113482] Call Trace:
[   34.114137]  <TASK>
[   34.114475]  dump_stack_lvl+0x73/0xb0
[   34.114802]  print_report+0xd1/0x640
[   34.115565]  ? __virt_addr_valid+0x1db/0x2d0
[   34.116763]  ? kasan_complete_mode_report_info+0x2a/0x200
[   34.117322]  kasan_report+0x102/0x140
[   34.117718]  ? kasan_atomics_helper+0x19e4/0x5450
[   34.118191]  ? kasan_atomics_helper+0x19e4/0x5450
[   34.118821]  kasan_check_range+0x10c/0x1c0
[   34.119301]  __kasan_check_write+0x18/0x20
[   34.119867]  kasan_atomics_helper+0x19e4/0x5450
[   34.120839]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   34.121308]  ? __kmalloc_cache_noprof+0x184/0x410
[   34.121876]  ? kasan_atomics+0x153/0x310
[   34.122489]  kasan_atomics+0x1dd/0x310
[   34.122964]  ? __pfx_kasan_atomics+0x10/0x10
[   34.123566]  ? __pfx_read_tsc+0x10/0x10
[   34.124012]  ? ktime_get_ts64+0x86/0x230
[   34.124603]  kunit_try_run_case+0x1b3/0x490
[   34.125018]  ? __pfx_kunit_try_run_case+0x10/0x10
[   34.125607]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   34.126171]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   34.126705]  ? __kthread_parkme+0x82/0x160
[   34.127294]  ? preempt_count_sub+0x50/0x80
[   34.127798]  ? __pfx_kunit_try_run_case+0x10/0x10
[   34.128324]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   34.129008]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   34.129605]  kthread+0x257/0x310
[   34.130056]  ? __pfx_kthread+0x10/0x10
[   34.130538]  ret_from_fork+0x41/0x80
[   34.131060]  ? __pfx_kthread+0x10/0x10
[   34.131538]  ret_from_fork_asm+0x1a/0x30
[   34.132111]  </TASK>
[   34.132404] 
[   34.132672] Allocated by task 272:
[   34.133001]  kasan_save_stack+0x3d/0x60
[   34.133486]  kasan_save_track+0x18/0x40
[   34.134090]  kasan_save_alloc_info+0x3b/0x50
[   34.134445]  __kasan_kmalloc+0xb7/0xc0
[   34.134929]  __kmalloc_cache_noprof+0x184/0x410
[   34.135851]  kasan_atomics+0x96/0x310
[   34.136224]  kunit_try_run_case+0x1b3/0x490
[   34.136704]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   34.137323]  kthread+0x257/0x310
[   34.137933]  ret_from_fork+0x41/0x80
[   34.138245]  ret_from_fork_asm+0x1a/0x30
[   34.138550] 
[   34.138840] The buggy address belongs to the object at ffff888102a0ec00
[   34.138840]  which belongs to the cache kmalloc-64 of size 64
[   34.139956] The buggy address is located 0 bytes to the right of
[   34.139956]  allocated 48-byte region [ffff888102a0ec00, ffff888102a0ec30)
[   34.141414] 
[   34.141705] The buggy address belongs to the physical page:
[   34.142052] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a0e
[   34.143147] flags: 0x200000000000000(node=0|zone=2)
[   34.143831] page_type: f5(slab)
[   34.144102] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   34.145064] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   34.145775] page dumped because: kasan: bad access detected
[   34.146527] 
[   34.146763] Memory state around the buggy address:
[   34.147328]  ffff888102a0eb00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   34.149035]  ffff888102a0eb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   34.149572] >ffff888102a0ec00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   34.150380]                                      ^
[   34.150980]  ffff888102a0ec80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.151560]  ffff888102a0ed00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.152563] ==================================================================
[   32.249954] ==================================================================
[   32.251145] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b56/0x5450
[   32.251651] Read of size 4 at addr ffff888102a0ec30 by task kunit_try_catch/272
[   32.252381] 
[   32.252657] CPU: 1 UID: 0 PID: 272 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241205 #1
[   32.253534] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.254211] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   32.254942] Call Trace:
[   32.255250]  <TASK>
[   32.255470]  dump_stack_lvl+0x73/0xb0
[   32.256056]  print_report+0xd1/0x640
[   32.256363]  ? __virt_addr_valid+0x1db/0x2d0
[   32.256751]  ? kasan_complete_mode_report_info+0x2a/0x200
[   32.257439]  kasan_report+0x102/0x140
[   32.257863]  ? kasan_atomics_helper+0x4b56/0x5450
[   32.258294]  ? kasan_atomics_helper+0x4b56/0x5450
[   32.258839]  __asan_report_load4_noabort+0x18/0x20
[   32.259316]  kasan_atomics_helper+0x4b56/0x5450
[   32.259840]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   32.260329]  ? __kmalloc_cache_noprof+0x184/0x410
[   32.260837]  ? kasan_atomics+0x153/0x310
[   32.261183]  kasan_atomics+0x1dd/0x310
[   32.261494]  ? __pfx_kasan_atomics+0x10/0x10
[   32.262067]  ? __pfx_read_tsc+0x10/0x10
[   32.262707]  ? ktime_get_ts64+0x86/0x230
[   32.263031]  kunit_try_run_case+0x1b3/0x490
[   32.263859]  ? __pfx_kunit_try_run_case+0x10/0x10
[   32.264283]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   32.264856]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   32.265368]  ? __kthread_parkme+0x82/0x160
[   32.265696]  ? preempt_count_sub+0x50/0x80
[   32.266347]  ? __pfx_kunit_try_run_case+0x10/0x10
[   32.267188]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   32.268406]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   32.269429]  kthread+0x257/0x310
[   32.269722]  ? __pfx_kthread+0x10/0x10
[   32.270237]  ret_from_fork+0x41/0x80
[   32.270526]  ? __pfx_kthread+0x10/0x10
[   32.271001]  ret_from_fork_asm+0x1a/0x30
[   32.271608]  </TASK>
[   32.271891] 
[   32.272136] Allocated by task 272:
[   32.272412]  kasan_save_stack+0x3d/0x60
[   32.272878]  kasan_save_track+0x18/0x40
[   32.273274]  kasan_save_alloc_info+0x3b/0x50
[   32.273865]  __kasan_kmalloc+0xb7/0xc0
[   32.274264]  __kmalloc_cache_noprof+0x184/0x410
[   32.274597]  kasan_atomics+0x96/0x310
[   32.275101]  kunit_try_run_case+0x1b3/0x490
[   32.275761]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   32.276121]  kthread+0x257/0x310
[   32.276600]  ret_from_fork+0x41/0x80
[   32.277129]  ret_from_fork_asm+0x1a/0x30
[   32.277647] 
[   32.277895] The buggy address belongs to the object at ffff888102a0ec00
[   32.277895]  which belongs to the cache kmalloc-64 of size 64
[   32.278565] The buggy address is located 0 bytes to the right of
[   32.278565]  allocated 48-byte region [ffff888102a0ec00, ffff888102a0ec30)
[   32.279918] 
[   32.280177] The buggy address belongs to the physical page:
[   32.280643] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a0e
[   32.281130] flags: 0x200000000000000(node=0|zone=2)
[   32.281721] page_type: f5(slab)
[   32.282269] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   32.282758] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   32.283539] page dumped because: kasan: bad access detected
[   32.283919] 
[   32.284083] Memory state around the buggy address:
[   32.285009]  ffff888102a0eb00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.285781]  ffff888102a0eb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.286384] >ffff888102a0ec00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   32.286950]                                      ^
[   32.287467]  ffff888102a0ec80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.288096]  ffff888102a0ed00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.288836] ==================================================================
[   33.101298] ==================================================================
[   33.101839] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf11/0x5450
[   33.102495] Write of size 4 at addr ffff888102a0ec30 by task kunit_try_catch/272
[   33.103304] 
[   33.103568] CPU: 1 UID: 0 PID: 272 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241205 #1
[   33.104449] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.104918] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   33.105652] Call Trace:
[   33.106043]  <TASK>
[   33.106328]  dump_stack_lvl+0x73/0xb0
[   33.106834]  print_report+0xd1/0x640
[   33.107285]  ? __virt_addr_valid+0x1db/0x2d0
[   33.108321]  ? kasan_complete_mode_report_info+0x2a/0x200
[   33.108766]  kasan_report+0x102/0x140
[   33.109956]  ? kasan_atomics_helper+0xf11/0x5450
[   33.111010]  ? kasan_atomics_helper+0xf11/0x5450
[   33.111555]  kasan_check_range+0x10c/0x1c0
[   33.112458]  __kasan_check_write+0x18/0x20
[   33.113473]  kasan_atomics_helper+0xf11/0x5450
[   33.114093]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   33.114562]  ? __kmalloc_cache_noprof+0x184/0x410
[   33.115159]  ? kasan_atomics+0x153/0x310
[   33.115740]  kasan_atomics+0x1dd/0x310
[   33.116298]  ? __pfx_kasan_atomics+0x10/0x10
[   33.116782]  ? __pfx_read_tsc+0x10/0x10
[   33.117565]  ? ktime_get_ts64+0x86/0x230
[   33.117942]  kunit_try_run_case+0x1b3/0x490
[   33.118498]  ? __pfx_kunit_try_run_case+0x10/0x10
[   33.118971]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   33.119420]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   33.120219]  ? __kthread_parkme+0x82/0x160
[   33.120972]  ? preempt_count_sub+0x50/0x80
[   33.121538]  ? __pfx_kunit_try_run_case+0x10/0x10
[   33.122176]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   33.122858]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   33.123526]  kthread+0x257/0x310
[   33.124055]  ? __pfx_kthread+0x10/0x10
[   33.124409]  ret_from_fork+0x41/0x80
[   33.125198]  ? __pfx_kthread+0x10/0x10
[   33.125588]  ret_from_fork_asm+0x1a/0x30
[   33.126553]  </TASK>
[   33.127015] 
[   33.127223] Allocated by task 272:
[   33.127566]  kasan_save_stack+0x3d/0x60
[   33.128662]  kasan_save_track+0x18/0x40
[   33.128981]  kasan_save_alloc_info+0x3b/0x50
[   33.129900]  __kasan_kmalloc+0xb7/0xc0
[   33.130281]  __kmalloc_cache_noprof+0x184/0x410
[   33.130744]  kasan_atomics+0x96/0x310
[   33.131115]  kunit_try_run_case+0x1b3/0x490
[   33.131516]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   33.132133]  kthread+0x257/0x310
[   33.132415]  ret_from_fork+0x41/0x80
[   33.132931]  ret_from_fork_asm+0x1a/0x30
[   33.133454] 
[   33.133752] The buggy address belongs to the object at ffff888102a0ec00
[   33.133752]  which belongs to the cache kmalloc-64 of size 64
[   33.134956] The buggy address is located 0 bytes to the right of
[   33.134956]  allocated 48-byte region [ffff888102a0ec00, ffff888102a0ec30)
[   33.135755] 
[   33.136165] The buggy address belongs to the physical page:
[   33.137061] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a0e
[   33.138295] flags: 0x200000000000000(node=0|zone=2)
[   33.138989] page_type: f5(slab)
[   33.139457] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   33.140046] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   33.140893] page dumped because: kasan: bad access detected
[   33.141471] 
[   33.141780] Memory state around the buggy address:
[   33.142304]  ffff888102a0eb00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.142896]  ffff888102a0eb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.144136] >ffff888102a0ec00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   33.144788]                                      ^
[   33.145543]  ffff888102a0ec80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.146195]  ffff888102a0ed00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.146867] ==================================================================
[   33.760132] ==================================================================
[   33.760599] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x151e/0x5450
[   33.761551] Write of size 8 at addr ffff888102a0ec30 by task kunit_try_catch/272
[   33.762258] 
[   33.762549] CPU: 1 UID: 0 PID: 272 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241205 #1
[   33.763519] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.764011] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   33.764927] Call Trace:
[   33.765198]  <TASK>
[   33.765581]  dump_stack_lvl+0x73/0xb0
[   33.766059]  print_report+0xd1/0x640
[   33.766538]  ? __virt_addr_valid+0x1db/0x2d0
[   33.767160]  ? kasan_complete_mode_report_info+0x2a/0x200
[   33.767566]  kasan_report+0x102/0x140
[   33.768091]  ? kasan_atomics_helper+0x151e/0x5450
[   33.768613]  ? kasan_atomics_helper+0x151e/0x5450
[   33.769313]  kasan_check_range+0x10c/0x1c0
[   33.769856]  __kasan_check_write+0x18/0x20
[   33.770421]  kasan_atomics_helper+0x151e/0x5450
[   33.771100]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   33.771589]  ? __kmalloc_cache_noprof+0x184/0x410
[   33.772219]  ? kasan_atomics+0x153/0x310
[   33.772813]  kasan_atomics+0x1dd/0x310
[   33.773317]  ? __pfx_kasan_atomics+0x10/0x10
[   33.773860]  ? __pfx_read_tsc+0x10/0x10
[   33.774363]  ? ktime_get_ts64+0x86/0x230
[   33.774942]  kunit_try_run_case+0x1b3/0x490
[   33.775419]  ? __pfx_kunit_try_run_case+0x10/0x10
[   33.776125]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   33.776653]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   33.777252]  ? __kthread_parkme+0x82/0x160
[   33.777708]  ? preempt_count_sub+0x50/0x80
[   33.778292]  ? __pfx_kunit_try_run_case+0x10/0x10
[   33.778879]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   33.779581]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   33.780306]  kthread+0x257/0x310
[   33.780629]  ? __pfx_kthread+0x10/0x10
[   33.781167]  ret_from_fork+0x41/0x80
[   33.781708]  ? __pfx_kthread+0x10/0x10
[   33.782105]  ret_from_fork_asm+0x1a/0x30
[   33.782751]  </TASK>
[   33.783394] 
[   33.783564] Allocated by task 272:
[   33.784309]  kasan_save_stack+0x3d/0x60
[   33.785117]  kasan_save_track+0x18/0x40
[   33.785796]  kasan_save_alloc_info+0x3b/0x50
[   33.786232]  __kasan_kmalloc+0xb7/0xc0
[   33.786652]  __kmalloc_cache_noprof+0x184/0x410
[   33.787818]  kasan_atomics+0x96/0x310
[   33.788189]  kunit_try_run_case+0x1b3/0x490
[   33.788696]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   33.789712]  kthread+0x257/0x310
[   33.790469]  ret_from_fork+0x41/0x80
[   33.790915]  ret_from_fork_asm+0x1a/0x30
[   33.791594] 
[   33.791946] The buggy address belongs to the object at ffff888102a0ec00
[   33.791946]  which belongs to the cache kmalloc-64 of size 64
[   33.793399] The buggy address is located 0 bytes to the right of
[   33.793399]  allocated 48-byte region [ffff888102a0ec00, ffff888102a0ec30)
[   33.794824] 
[   33.795439] The buggy address belongs to the physical page:
[   33.795949] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a0e
[   33.796589] flags: 0x200000000000000(node=0|zone=2)
[   33.797306] page_type: f5(slab)
[   33.797630] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   33.798572] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   33.799361] page dumped because: kasan: bad access detected
[   33.799830] 
[   33.800202] Memory state around the buggy address:
[   33.800667]  ffff888102a0eb00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.801165]  ffff888102a0eb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.802060] >ffff888102a0ec00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   33.802559]                                      ^
[   33.803479]  ffff888102a0ec80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.804725]  ffff888102a0ed00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.805798] ==================================================================
[   33.851481] ==================================================================
[   33.852442] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1650/0x5450
[   33.853274] Write of size 8 at addr ffff888102a0ec30 by task kunit_try_catch/272
[   33.854341] 
[   33.854562] CPU: 1 UID: 0 PID: 272 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241205 #1
[   33.856099] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.856371] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   33.857194] Call Trace:
[   33.857710]  <TASK>
[   33.858077]  dump_stack_lvl+0x73/0xb0
[   33.858471]  print_report+0xd1/0x640
[   33.858812]  ? __virt_addr_valid+0x1db/0x2d0
[   33.859597]  ? kasan_complete_mode_report_info+0x2a/0x200
[   33.860190]  kasan_report+0x102/0x140
[   33.860592]  ? kasan_atomics_helper+0x1650/0x5450
[   33.861504]  ? kasan_atomics_helper+0x1650/0x5450
[   33.862173]  kasan_check_range+0x10c/0x1c0
[   33.862710]  __kasan_check_write+0x18/0x20
[   33.863137]  kasan_atomics_helper+0x1650/0x5450
[   33.863824]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   33.864411]  ? __kmalloc_cache_noprof+0x184/0x410
[   33.865160]  ? kasan_atomics+0x153/0x310
[   33.865797]  kasan_atomics+0x1dd/0x310
[   33.866520]  ? __pfx_kasan_atomics+0x10/0x10
[   33.867357]  ? __pfx_read_tsc+0x10/0x10
[   33.868152]  ? ktime_get_ts64+0x86/0x230
[   33.868531]  kunit_try_run_case+0x1b3/0x490
[   33.869000]  ? __pfx_kunit_try_run_case+0x10/0x10
[   33.869414]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   33.870004]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   33.870538]  ? __kthread_parkme+0x82/0x160
[   33.870945]  ? preempt_count_sub+0x50/0x80
[   33.871467]  ? __pfx_kunit_try_run_case+0x10/0x10
[   33.871986]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   33.872612]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   33.873281]  kthread+0x257/0x310
[   33.873659]  ? __pfx_kthread+0x10/0x10
[   33.874161]  ret_from_fork+0x41/0x80
[   33.874523]  ? __pfx_kthread+0x10/0x10
[   33.875002]  ret_from_fork_asm+0x1a/0x30
[   33.875502]  </TASK>
[   33.875840] 
[   33.876098] Allocated by task 272:
[   33.876521]  kasan_save_stack+0x3d/0x60
[   33.876990]  kasan_save_track+0x18/0x40
[   33.877399]  kasan_save_alloc_info+0x3b/0x50
[   33.877920]  __kasan_kmalloc+0xb7/0xc0
[   33.878409]  __kmalloc_cache_noprof+0x184/0x410
[   33.878877]  kasan_atomics+0x96/0x310
[   33.879350]  kunit_try_run_case+0x1b3/0x490
[   33.879727]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   33.880297]  kthread+0x257/0x310
[   33.880733]  ret_from_fork+0x41/0x80
[   33.881120]  ret_from_fork_asm+0x1a/0x30
[   33.881569] 
[   33.881882] The buggy address belongs to the object at ffff888102a0ec00
[   33.881882]  which belongs to the cache kmalloc-64 of size 64
[   33.882640] The buggy address is located 0 bytes to the right of
[   33.882640]  allocated 48-byte region [ffff888102a0ec00, ffff888102a0ec30)
[   33.884037] 
[   33.884239] The buggy address belongs to the physical page:
[   33.884656] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a0e
[   33.885417] flags: 0x200000000000000(node=0|zone=2)
[   33.885905] page_type: f5(slab)
[   33.886337] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   33.887188] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   33.888009] page dumped because: kasan: bad access detected
[   33.888478] 
[   33.888674] Memory state around the buggy address:
[   33.889173]  ffff888102a0eb00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.889880]  ffff888102a0eb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.890484] >ffff888102a0ec00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   33.891226]                                      ^
[   33.891605]  ffff888102a0ec80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.892430]  ffff888102a0ed00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.893008] ==================================================================
[   34.851609] ==================================================================
[   34.852314] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4fa7/0x5450
[   34.852839] Read of size 8 at addr ffff888102a0ec30 by task kunit_try_catch/272
[   34.854080] 
[   34.854427] CPU: 1 UID: 0 PID: 272 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241205 #1
[   34.855293] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.855660] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   34.856416] Call Trace:
[   34.856819]  <TASK>
[   34.857132]  dump_stack_lvl+0x73/0xb0
[   34.857593]  print_report+0xd1/0x640
[   34.858147]  ? __virt_addr_valid+0x1db/0x2d0
[   34.858522]  ? kasan_complete_mode_report_info+0x2a/0x200
[   34.859190]  kasan_report+0x102/0x140
[   34.859552]  ? kasan_atomics_helper+0x4fa7/0x5450
[   34.860101]  ? kasan_atomics_helper+0x4fa7/0x5450
[   34.860731]  __asan_report_load8_noabort+0x18/0x20
[   34.861204]  kasan_atomics_helper+0x4fa7/0x5450
[   34.861717]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   34.862264]  ? __kmalloc_cache_noprof+0x184/0x410
[   34.862744]  ? kasan_atomics+0x153/0x310
[   34.863310]  kasan_atomics+0x1dd/0x310
[   34.863654]  ? __pfx_kasan_atomics+0x10/0x10
[   34.864255]  ? __pfx_read_tsc+0x10/0x10
[   34.864671]  ? ktime_get_ts64+0x86/0x230
[   34.865216]  kunit_try_run_case+0x1b3/0x490
[   34.865635]  ? __pfx_kunit_try_run_case+0x10/0x10
[   34.866153]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   34.866734]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   34.867267]  ? __kthread_parkme+0x82/0x160
[   34.867751]  ? preempt_count_sub+0x50/0x80
[   34.868148]  ? __pfx_kunit_try_run_case+0x10/0x10
[   34.868594]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   34.869354]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   34.869924]  kthread+0x257/0x310
[   34.870213]  ? __pfx_kthread+0x10/0x10
[   34.870724]  ret_from_fork+0x41/0x80
[   34.871247]  ? __pfx_kthread+0x10/0x10
[   34.871745]  ret_from_fork_asm+0x1a/0x30
[   34.872197]  </TASK>
[   34.872452] 
[   34.872625] Allocated by task 272:
[   34.873122]  kasan_save_stack+0x3d/0x60
[   34.873591]  kasan_save_track+0x18/0x40
[   34.873980]  kasan_save_alloc_info+0x3b/0x50
[   34.874534]  __kasan_kmalloc+0xb7/0xc0
[   34.874947]  __kmalloc_cache_noprof+0x184/0x410
[   34.875489]  kasan_atomics+0x96/0x310
[   34.876019]  kunit_try_run_case+0x1b3/0x490
[   34.876417]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   34.877090]  kthread+0x257/0x310
[   34.877470]  ret_from_fork+0x41/0x80
[   34.877854]  ret_from_fork_asm+0x1a/0x30
[   34.878395] 
[   34.878645] The buggy address belongs to the object at ffff888102a0ec00
[   34.878645]  which belongs to the cache kmalloc-64 of size 64
[   34.879533] The buggy address is located 0 bytes to the right of
[   34.879533]  allocated 48-byte region [ffff888102a0ec00, ffff888102a0ec30)
[   34.880711] 
[   34.881024] The buggy address belongs to the physical page:
[   34.881513] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a0e
[   34.882263] flags: 0x200000000000000(node=0|zone=2)
[   34.882626] page_type: f5(slab)
[   34.883037] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   34.883868] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   34.884627] page dumped because: kasan: bad access detected
[   34.885196] 
[   34.885382] Memory state around the buggy address:
[   34.886029]  ffff888102a0eb00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   34.886554]  ffff888102a0eb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   34.887263] >ffff888102a0ec00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   34.887872]                                      ^
[   34.888366]  ffff888102a0ec80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.888939]  ffff888102a0ed00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.889640] ==================================================================
[   32.775367] ==================================================================
[   32.776093] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xac8/0x5450
[   32.777195] Write of size 4 at addr ffff888102a0ec30 by task kunit_try_catch/272
[   32.778317] 
[   32.778503] CPU: 1 UID: 0 PID: 272 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241205 #1
[   32.779471] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.780077] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   32.780956] Call Trace:
[   32.781351]  <TASK>
[   32.781640]  dump_stack_lvl+0x73/0xb0
[   32.782403]  print_report+0xd1/0x640
[   32.782611]  ? __virt_addr_valid+0x1db/0x2d0
[   32.782985]  ? kasan_complete_mode_report_info+0x2a/0x200
[   32.783754]  kasan_report+0x102/0x140
[   32.784247]  ? kasan_atomics_helper+0xac8/0x5450
[   32.784651]  ? kasan_atomics_helper+0xac8/0x5450
[   32.785485]  kasan_check_range+0x10c/0x1c0
[   32.786014]  __kasan_check_write+0x18/0x20
[   32.786653]  kasan_atomics_helper+0xac8/0x5450
[   32.787281]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   32.787990]  ? __kmalloc_cache_noprof+0x184/0x410
[   32.788496]  ? kasan_atomics+0x153/0x310
[   32.789494]  kasan_atomics+0x1dd/0x310
[   32.790003]  ? __pfx_kasan_atomics+0x10/0x10
[   32.790469]  ? __pfx_read_tsc+0x10/0x10
[   32.791259]  ? ktime_get_ts64+0x86/0x230
[   32.791723]  kunit_try_run_case+0x1b3/0x490
[   32.792636]  ? __pfx_kunit_try_run_case+0x10/0x10
[   32.793519]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   32.794352]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   32.795082]  ? __kthread_parkme+0x82/0x160
[   32.795517]  ? preempt_count_sub+0x50/0x80
[   32.796223]  ? __pfx_kunit_try_run_case+0x10/0x10
[   32.796460]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   32.796785]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   32.797450]  kthread+0x257/0x310
[   32.798283]  ? __pfx_kthread+0x10/0x10
[   32.798851]  ret_from_fork+0x41/0x80
[   32.799229]  ? __pfx_kthread+0x10/0x10
[   32.799739]  ret_from_fork_asm+0x1a/0x30
[   32.800283]  </TASK>
[   32.800629] 
[   32.800992] Allocated by task 272:
[   32.801301]  kasan_save_stack+0x3d/0x60
[   32.801635]  kasan_save_track+0x18/0x40
[   32.802160]  kasan_save_alloc_info+0x3b/0x50
[   32.802617]  __kasan_kmalloc+0xb7/0xc0
[   32.803143]  __kmalloc_cache_noprof+0x184/0x410
[   32.803885]  kasan_atomics+0x96/0x310
[   32.804319]  kunit_try_run_case+0x1b3/0x490
[   32.804886]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   32.805479]  kthread+0x257/0x310
[   32.805971]  ret_from_fork+0x41/0x80
[   32.806469]  ret_from_fork_asm+0x1a/0x30
[   32.807046] 
[   32.807315] The buggy address belongs to the object at ffff888102a0ec00
[   32.807315]  which belongs to the cache kmalloc-64 of size 64
[   32.808497] The buggy address is located 0 bytes to the right of
[   32.808497]  allocated 48-byte region [ffff888102a0ec00, ffff888102a0ec30)
[   32.809754] 
[   32.810043] The buggy address belongs to the physical page:
[   32.810609] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a0e
[   32.811452] flags: 0x200000000000000(node=0|zone=2)
[   32.812146] page_type: f5(slab)
[   32.812441] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   32.813291] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   32.814099] page dumped because: kasan: bad access detected
[   32.814635] 
[   32.814949] Memory state around the buggy address:
[   32.815434]  ffff888102a0eb00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.816251]  ffff888102a0eb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.816947] >ffff888102a0ec00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   32.817706]                                      ^
[   32.818266]  ffff888102a0ec80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.818999]  ffff888102a0ed00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.819641] ==================================================================
[   32.966480] ==================================================================
[   32.967394] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xd48/0x5450
[   32.968301] Write of size 4 at addr ffff888102a0ec30 by task kunit_try_catch/272
[   32.968945] 
[   32.969135] CPU: 1 UID: 0 PID: 272 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241205 #1
[   32.970481] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.970982] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   32.972755] Call Trace:
[   32.973100]  <TASK>
[   32.973392]  dump_stack_lvl+0x73/0xb0
[   32.973741]  print_report+0xd1/0x640
[   32.974587]  ? __virt_addr_valid+0x1db/0x2d0
[   32.975294]  ? kasan_complete_mode_report_info+0x2a/0x200
[   32.976060]  kasan_report+0x102/0x140
[   32.976659]  ? kasan_atomics_helper+0xd48/0x5450
[   32.977360]  ? kasan_atomics_helper+0xd48/0x5450
[   32.978125]  kasan_check_range+0x10c/0x1c0
[   32.978614]  __kasan_check_write+0x18/0x20
[   32.979386]  kasan_atomics_helper+0xd48/0x5450
[   32.980220]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   32.981312]  ? __kmalloc_cache_noprof+0x184/0x410
[   32.981729]  ? kasan_atomics+0x153/0x310
[   32.982383]  kasan_atomics+0x1dd/0x310
[   32.983371]  ? __pfx_kasan_atomics+0x10/0x10
[   32.984189]  ? __pfx_read_tsc+0x10/0x10
[   32.984590]  ? ktime_get_ts64+0x86/0x230
[   32.985545]  kunit_try_run_case+0x1b3/0x490
[   32.986175]  ? __pfx_kunit_try_run_case+0x10/0x10
[   32.986700]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   32.987846]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   32.988331]  ? __kthread_parkme+0x82/0x160
[   32.989008]  ? preempt_count_sub+0x50/0x80
[   32.989704]  ? __pfx_kunit_try_run_case+0x10/0x10
[   32.990209]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   32.991024]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   32.991517]  kthread+0x257/0x310
[   32.992071]  ? __pfx_kthread+0x10/0x10
[   32.992514]  ret_from_fork+0x41/0x80
[   32.992960]  ? __pfx_kthread+0x10/0x10
[   32.993494]  ret_from_fork_asm+0x1a/0x30
[   32.994121]  </TASK>
[   32.994612] 
[   32.994995] Allocated by task 272:
[   32.995400]  kasan_save_stack+0x3d/0x60
[   32.996610]  kasan_save_track+0x18/0x40
[   32.997147]  kasan_save_alloc_info+0x3b/0x50
[   32.997764]  __kasan_kmalloc+0xb7/0xc0
[   32.998435]  __kmalloc_cache_noprof+0x184/0x410
[   32.999200]  kasan_atomics+0x96/0x310
[   32.999562]  kunit_try_run_case+0x1b3/0x490
[   33.000102]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   33.000615]  kthread+0x257/0x310
[   33.001161]  ret_from_fork+0x41/0x80
[   33.001540]  ret_from_fork_asm+0x1a/0x30
[   33.002132] 
[   33.002389] The buggy address belongs to the object at ffff888102a0ec00
[   33.002389]  which belongs to the cache kmalloc-64 of size 64
[   33.003483] The buggy address is located 0 bytes to the right of
[   33.003483]  allocated 48-byte region [ffff888102a0ec00, ffff888102a0ec30)
[   33.004706] 
[   33.005046] The buggy address belongs to the physical page:
[   33.005574] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a0e
[   33.006403] flags: 0x200000000000000(node=0|zone=2)
[   33.006957] page_type: f5(slab)
[   33.007369] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   33.008179] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   33.008885] page dumped because: kasan: bad access detected
[   33.009415] 
[   33.009663] Memory state around the buggy address:
[   33.010383]  ffff888102a0eb00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.011184]  ffff888102a0eb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.011859] >ffff888102a0ec00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   33.012485]                                      ^
[   33.012999]  ffff888102a0ec80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.013756]  ffff888102a0ed00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.014393] ==================================================================
[   33.015403] ==================================================================
[   33.016165] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xde1/0x5450
[   33.017101] Write of size 4 at addr ffff888102a0ec30 by task kunit_try_catch/272
[   33.017704] 
[   33.017971] CPU: 1 UID: 0 PID: 272 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241205 #1
[   33.019326] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.019843] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   33.020730] Call Trace:
[   33.021037]  <TASK>
[   33.021407]  dump_stack_lvl+0x73/0xb0
[   33.022021]  print_report+0xd1/0x640
[   33.022404]  ? __virt_addr_valid+0x1db/0x2d0
[   33.022987]  ? kasan_complete_mode_report_info+0x2a/0x200
[   33.023603]  kasan_report+0x102/0x140
[   33.024232]  ? kasan_atomics_helper+0xde1/0x5450
[   33.024950]  ? kasan_atomics_helper+0xde1/0x5450
[   33.025391]  kasan_check_range+0x10c/0x1c0
[   33.025999]  __kasan_check_write+0x18/0x20
[   33.026421]  kasan_atomics_helper+0xde1/0x5450
[   33.026999]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   33.027545]  ? __kmalloc_cache_noprof+0x184/0x410
[   33.028131]  ? kasan_atomics+0x153/0x310
[   33.028707]  kasan_atomics+0x1dd/0x310
[   33.029296]  ? __pfx_kasan_atomics+0x10/0x10
[   33.029716]  ? __pfx_read_tsc+0x10/0x10
[   33.030207]  ? ktime_get_ts64+0x86/0x230
[   33.030833]  kunit_try_run_case+0x1b3/0x490
[   33.031332]  ? __pfx_kunit_try_run_case+0x10/0x10
[   33.031811]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   33.032430]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   33.033043]  ? __kthread_parkme+0x82/0x160
[   33.033531]  ? preempt_count_sub+0x50/0x80
[   33.034179]  ? __pfx_kunit_try_run_case+0x10/0x10
[   33.034843]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   33.035414]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   33.036057]  kthread+0x257/0x310
[   33.036511]  ? __pfx_kthread+0x10/0x10
[   33.037128]  ret_from_fork+0x41/0x80
[   33.037628]  ? __pfx_kthread+0x10/0x10
[   33.038071]  ret_from_fork_asm+0x1a/0x30
[   33.038666]  </TASK>
[   33.039064] 
[   33.039380] Allocated by task 272:
[   33.039891]  kasan_save_stack+0x3d/0x60
[   33.040341]  kasan_save_track+0x18/0x40
[   33.040869]  kasan_save_alloc_info+0x3b/0x50
[   33.041401]  __kasan_kmalloc+0xb7/0xc0
[   33.041852]  __kmalloc_cache_noprof+0x184/0x410
[   33.042413]  kasan_atomics+0x96/0x310
[   33.042837]  kunit_try_run_case+0x1b3/0x490
[   33.043400]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   33.044033]  kthread+0x257/0x310
[   33.044467]  ret_from_fork+0x41/0x80
[   33.044884]  ret_from_fork_asm+0x1a/0x30
[   33.045317] 
[   33.045564] The buggy address belongs to the object at ffff888102a0ec00
[   33.045564]  which belongs to the cache kmalloc-64 of size 64
[   33.046744] The buggy address is located 0 bytes to the right of
[   33.046744]  allocated 48-byte region [ffff888102a0ec00, ffff888102a0ec30)
[   33.047856] 
[   33.048029] The buggy address belongs to the physical page:
[   33.048585] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a0e
[   33.049423] flags: 0x200000000000000(node=0|zone=2)
[   33.049991] page_type: f5(slab)
[   33.050297] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   33.051179] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   33.051991] page dumped because: kasan: bad access detected
[   33.052498] 
[   33.052753] Memory state around the buggy address:
[   33.053253]  ffff888102a0eb00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.054030]  ffff888102a0eb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.054886] >ffff888102a0ec00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   33.055463]                                      ^
[   33.056145]  ffff888102a0ec80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.057324]  ffff888102a0ed00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.058021] ==================================================================
[   34.399418] ==================================================================
[   34.399899] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1d7b/0x5450
[   34.400383] Write of size 8 at addr ffff888102a0ec30 by task kunit_try_catch/272
[   34.401355] 
[   34.401549] CPU: 1 UID: 0 PID: 272 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241205 #1
[   34.402132] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.402967] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   34.404203] Call Trace:
[   34.404429]  <TASK>
[   34.404638]  dump_stack_lvl+0x73/0xb0
[   34.404976]  print_report+0xd1/0x640
[   34.405632]  ? __virt_addr_valid+0x1db/0x2d0
[   34.406184]  ? kasan_complete_mode_report_info+0x2a/0x200
[   34.406950]  kasan_report+0x102/0x140
[   34.407418]  ? kasan_atomics_helper+0x1d7b/0x5450
[   34.407805]  ? kasan_atomics_helper+0x1d7b/0x5450
[   34.408654]  kasan_check_range+0x10c/0x1c0
[   34.409044]  __kasan_check_write+0x18/0x20
[   34.409366]  kasan_atomics_helper+0x1d7b/0x5450
[   34.409736]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   34.410353]  ? __kmalloc_cache_noprof+0x184/0x410
[   34.411111]  ? kasan_atomics+0x153/0x310
[   34.411632]  kasan_atomics+0x1dd/0x310
[   34.412509]  ? __pfx_kasan_atomics+0x10/0x10
[   34.413016]  ? __pfx_read_tsc+0x10/0x10
[   34.413325]  ? ktime_get_ts64+0x86/0x230
[   34.413646]  kunit_try_run_case+0x1b3/0x490
[   34.414241]  ? __pfx_kunit_try_run_case+0x10/0x10
[   34.414838]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   34.415384]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   34.415957]  ? __kthread_parkme+0x82/0x160
[   34.416335]  ? preempt_count_sub+0x50/0x80
[   34.417156]  ? __pfx_kunit_try_run_case+0x10/0x10
[   34.417574]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   34.418565]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   34.421098]  kthread+0x257/0x310
[   34.421648]  ? __pfx_kthread+0x10/0x10
[   34.422182]  ret_from_fork+0x41/0x80
[   34.422639]  ? __pfx_kthread+0x10/0x10
[   34.423188]  ret_from_fork_asm+0x1a/0x30
[   34.423763]  </TASK>
[   34.424240] 
[   34.424568] Allocated by task 272:
[   34.424945]  kasan_save_stack+0x3d/0x60
[   34.425588]  kasan_save_track+0x18/0x40
[   34.426302]  kasan_save_alloc_info+0x3b/0x50
[   34.426815]  __kasan_kmalloc+0xb7/0xc0
[   34.427318]  __kmalloc_cache_noprof+0x184/0x410
[   34.428111]  kasan_atomics+0x96/0x310
[   34.428522]  kunit_try_run_case+0x1b3/0x490
[   34.429155]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   34.429761]  kthread+0x257/0x310
[   34.430405]  ret_from_fork+0x41/0x80
[   34.430741]  ret_from_fork_asm+0x1a/0x30
[   34.431394] 
[   34.431730] The buggy address belongs to the object at ffff888102a0ec00
[   34.431730]  which belongs to the cache kmalloc-64 of size 64
[   34.433081] The buggy address is located 0 bytes to the right of
[   34.433081]  allocated 48-byte region [ffff888102a0ec00, ffff888102a0ec30)
[   34.434835] 
[   34.435046] The buggy address belongs to the physical page:
[   34.435571] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a0e
[   34.436334] flags: 0x200000000000000(node=0|zone=2)
[   34.437758] page_type: f5(slab)
[   34.438061] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   34.438697] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   34.439214] page dumped because: kasan: bad access detected
[   34.440236] 
[   34.440648] Memory state around the buggy address:
[   34.441173]  ffff888102a0eb00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   34.442469]  ffff888102a0eb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   34.443268] >ffff888102a0ec00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   34.443723]                                      ^
[   34.444596]  ffff888102a0ec80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.445574]  ffff888102a0ed00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.446261] ==================================================================
[   32.640863] ==================================================================
[   32.641586] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x8fa/0x5450
[   32.642109] Write of size 4 at addr ffff888102a0ec30 by task kunit_try_catch/272
[   32.642947] 
[   32.643239] CPU: 1 UID: 0 PID: 272 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241205 #1
[   32.644162] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.644618] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   32.645354] Call Trace:
[   32.645596]  <TASK>
[   32.645888]  dump_stack_lvl+0x73/0xb0
[   32.646359]  print_report+0xd1/0x640
[   32.646882]  ? __virt_addr_valid+0x1db/0x2d0
[   32.647287]  ? kasan_complete_mode_report_info+0x2a/0x200
[   32.647845]  kasan_report+0x102/0x140
[   32.648322]  ? kasan_atomics_helper+0x8fa/0x5450
[   32.648918]  ? kasan_atomics_helper+0x8fa/0x5450
[   32.649429]  kasan_check_range+0x10c/0x1c0
[   32.649835]  __kasan_check_write+0x18/0x20
[   32.650295]  kasan_atomics_helper+0x8fa/0x5450
[   32.650821]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   32.651410]  ? __kmalloc_cache_noprof+0x184/0x410
[   32.651855]  ? kasan_atomics+0x153/0x310
[   32.652363]  kasan_atomics+0x1dd/0x310
[   32.652840]  ? __pfx_kasan_atomics+0x10/0x10
[   32.653301]  ? __pfx_read_tsc+0x10/0x10
[   32.653656]  ? ktime_get_ts64+0x86/0x230
[   32.654205]  kunit_try_run_case+0x1b3/0x490
[   32.654554]  ? __pfx_kunit_try_run_case+0x10/0x10
[   32.655129]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   32.655735]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   32.656217]  ? __kthread_parkme+0x82/0x160
[   32.656733]  ? preempt_count_sub+0x50/0x80
[   32.657314]  ? __pfx_kunit_try_run_case+0x10/0x10
[   32.657927]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   32.658525]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   32.659127]  kthread+0x257/0x310
[   32.659477]  ? __pfx_kthread+0x10/0x10
[   32.659916]  ret_from_fork+0x41/0x80
[   32.660537]  ? __pfx_kthread+0x10/0x10
[   32.661802]  ret_from_fork_asm+0x1a/0x30
[   32.662165]  </TASK>
[   32.662611] 
[   32.663033] Allocated by task 272:
[   32.663466]  kasan_save_stack+0x3d/0x60
[   32.663670]  kasan_save_track+0x18/0x40
[   32.664217]  kasan_save_alloc_info+0x3b/0x50
[   32.664721]  __kasan_kmalloc+0xb7/0xc0
[   32.665168]  __kmalloc_cache_noprof+0x184/0x410
[   32.665742]  kasan_atomics+0x96/0x310
[   32.666293]  kunit_try_run_case+0x1b3/0x490
[   32.666739]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   32.667415]  kthread+0x257/0x310
[   32.667787]  ret_from_fork+0x41/0x80
[   32.668269]  ret_from_fork_asm+0x1a/0x30
[   32.668768] 
[   32.669051] The buggy address belongs to the object at ffff888102a0ec00
[   32.669051]  which belongs to the cache kmalloc-64 of size 64
[   32.670035] The buggy address is located 0 bytes to the right of
[   32.670035]  allocated 48-byte region [ffff888102a0ec00, ffff888102a0ec30)
[   32.671351] 
[   32.671599] The buggy address belongs to the physical page:
[   32.672123] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a0e
[   32.672963] flags: 0x200000000000000(node=0|zone=2)
[   32.673532] page_type: f5(slab)
[   32.673852] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   32.674659] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   32.675350] page dumped because: kasan: bad access detected
[   32.676133] 
[   32.676395] Memory state around the buggy address:
[   32.676808]  ffff888102a0eb00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.677771]  ffff888102a0eb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.678337] >ffff888102a0ec00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   32.679017]                                      ^
[   32.679481]  ffff888102a0ec80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.680195]  ffff888102a0ed00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.680854] ==================================================================
[   32.421632] ==================================================================
[   32.422523] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x5ff/0x5450
[   32.423094] Write of size 4 at addr ffff888102a0ec30 by task kunit_try_catch/272
[   32.424094] 
[   32.424350] CPU: 1 UID: 0 PID: 272 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241205 #1
[   32.425234] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.425717] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   32.426406] Call Trace:
[   32.426731]  <TASK>
[   32.427090]  dump_stack_lvl+0x73/0xb0
[   32.427472]  print_report+0xd1/0x640
[   32.428045]  ? __virt_addr_valid+0x1db/0x2d0
[   32.428482]  ? kasan_complete_mode_report_info+0x2a/0x200
[   32.429160]  kasan_report+0x102/0x140
[   32.429468]  ? kasan_atomics_helper+0x5ff/0x5450
[   32.430064]  ? kasan_atomics_helper+0x5ff/0x5450
[   32.430521]  kasan_check_range+0x10c/0x1c0
[   32.430939]  __kasan_check_write+0x18/0x20
[   32.431466]  kasan_atomics_helper+0x5ff/0x5450
[   32.431928]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   32.432413]  ? __kmalloc_cache_noprof+0x184/0x410
[   32.432979]  ? kasan_atomics+0x153/0x310
[   32.433473]  kasan_atomics+0x1dd/0x310
[   32.433850]  ? __pfx_kasan_atomics+0x10/0x10
[   32.434381]  ? __pfx_read_tsc+0x10/0x10
[   32.434942]  ? ktime_get_ts64+0x86/0x230
[   32.435460]  kunit_try_run_case+0x1b3/0x490
[   32.435996]  ? __pfx_kunit_try_run_case+0x10/0x10
[   32.436359]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   32.437018]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   32.437482]  ? __kthread_parkme+0x82/0x160
[   32.437978]  ? preempt_count_sub+0x50/0x80
[   32.438515]  ? __pfx_kunit_try_run_case+0x10/0x10
[   32.438998]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   32.439484]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   32.440193]  kthread+0x257/0x310
[   32.440562]  ? __pfx_kthread+0x10/0x10
[   32.440930]  ret_from_fork+0x41/0x80
[   32.441320]  ? __pfx_kthread+0x10/0x10
[   32.441885]  ret_from_fork_asm+0x1a/0x30
[   32.442379]  </TASK>
[   32.442728] 
[   32.443257] Allocated by task 272:
[   32.443728]  kasan_save_stack+0x3d/0x60
[   32.444262]  kasan_save_track+0x18/0x40
[   32.444567]  kasan_save_alloc_info+0x3b/0x50
[   32.445013]  __kasan_kmalloc+0xb7/0xc0
[   32.445495]  __kmalloc_cache_noprof+0x184/0x410
[   32.446129]  kasan_atomics+0x96/0x310
[   32.446508]  kunit_try_run_case+0x1b3/0x490
[   32.446982]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   32.447448]  kthread+0x257/0x310
[   32.447846]  ret_from_fork+0x41/0x80
[   32.448284]  ret_from_fork_asm+0x1a/0x30
[   32.448803] 
[   32.448980] The buggy address belongs to the object at ffff888102a0ec00
[   32.448980]  which belongs to the cache kmalloc-64 of size 64
[   32.450025] The buggy address is located 0 bytes to the right of
[   32.450025]  allocated 48-byte region [ffff888102a0ec00, ffff888102a0ec30)
[   32.451148] 
[   32.451416] The buggy address belongs to the physical page:
[   32.451878] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a0e
[   32.452539] flags: 0x200000000000000(node=0|zone=2)
[   32.452949] page_type: f5(slab)
[   32.453254] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   32.454200] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   32.455079] page dumped because: kasan: bad access detected
[   32.455618] 
[   32.456059] Memory state around the buggy address:
[   32.456485]  ffff888102a0eb00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.456981]  ffff888102a0eb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.457993] >ffff888102a0ec00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   32.458922]                                      ^
[   32.459538]  ffff888102a0ec80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.460365]  ffff888102a0ed00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.461187] ==================================================================
[   34.534121] ==================================================================
[   34.535466] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1f44/0x5450
[   34.536636] Write of size 8 at addr ffff888102a0ec30 by task kunit_try_catch/272
[   34.537602] 
[   34.538057] CPU: 1 UID: 0 PID: 272 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241205 #1
[   34.538922] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.539245] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   34.540126] Call Trace:
[   34.540485]  <TASK>
[   34.540745]  dump_stack_lvl+0x73/0xb0
[   34.541272]  print_report+0xd1/0x640
[   34.541631]  ? __virt_addr_valid+0x1db/0x2d0
[   34.542137]  ? kasan_complete_mode_report_info+0x2a/0x200
[   34.542583]  kasan_report+0x102/0x140
[   34.543141]  ? kasan_atomics_helper+0x1f44/0x5450
[   34.543653]  ? kasan_atomics_helper+0x1f44/0x5450
[   34.544660]  kasan_check_range+0x10c/0x1c0
[   34.545135]  __kasan_check_write+0x18/0x20
[   34.545727]  kasan_atomics_helper+0x1f44/0x5450
[   34.546412]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   34.546923]  ? __kmalloc_cache_noprof+0x184/0x410
[   34.547410]  ? kasan_atomics+0x153/0x310
[   34.547929]  kasan_atomics+0x1dd/0x310
[   34.548533]  ? __pfx_kasan_atomics+0x10/0x10
[   34.549602]  ? __pfx_read_tsc+0x10/0x10
[   34.550300]  ? ktime_get_ts64+0x86/0x230
[   34.550758]  kunit_try_run_case+0x1b3/0x490
[   34.551230]  ? __pfx_kunit_try_run_case+0x10/0x10
[   34.552538]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   34.553244]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   34.553861]  ? __kthread_parkme+0x82/0x160
[   34.554277]  ? preempt_count_sub+0x50/0x80
[   34.554705]  ? __pfx_kunit_try_run_case+0x10/0x10
[   34.555190]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   34.556086]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   34.556737]  kthread+0x257/0x310
[   34.557174]  ? __pfx_kthread+0x10/0x10
[   34.557743]  ret_from_fork+0x41/0x80
[   34.558169]  ? __pfx_kthread+0x10/0x10
[   34.558775]  ret_from_fork_asm+0x1a/0x30
[   34.559352]  </TASK>
[   34.559783] 
[   34.560095] Allocated by task 272:
[   34.560557]  kasan_save_stack+0x3d/0x60
[   34.561108]  kasan_save_track+0x18/0x40
[   34.561743]  kasan_save_alloc_info+0x3b/0x50
[   34.562334]  __kasan_kmalloc+0xb7/0xc0
[   34.562851]  __kmalloc_cache_noprof+0x184/0x410
[   34.563573]  kasan_atomics+0x96/0x310
[   34.564332]  kunit_try_run_case+0x1b3/0x490
[   34.564950]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   34.565549]  kthread+0x257/0x310
[   34.565969]  ret_from_fork+0x41/0x80
[   34.566490]  ret_from_fork_asm+0x1a/0x30
[   34.567141] 
[   34.567333] The buggy address belongs to the object at ffff888102a0ec00
[   34.567333]  which belongs to the cache kmalloc-64 of size 64
[   34.568652] The buggy address is located 0 bytes to the right of
[   34.568652]  allocated 48-byte region [ffff888102a0ec00, ffff888102a0ec30)
[   34.569705] 
[   34.570068] The buggy address belongs to the physical page:
[   34.570973] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a0e
[   34.571808] flags: 0x200000000000000(node=0|zone=2)
[   34.572222] page_type: f5(slab)
[   34.572843] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   34.573434] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   34.574464] page dumped because: kasan: bad access detected
[   34.574951] 
[   34.575327] Memory state around the buggy address:
[   34.576009]  ffff888102a0eb00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   34.576564]  ffff888102a0eb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   34.577589] >ffff888102a0ec00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   34.578428]                                      ^
[   34.579086]  ffff888102a0ec80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.579763]  ffff888102a0ed00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.580533] ==================================================================
[   32.915401] ==================================================================
[   32.916779] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a86/0x5450
[   32.917953] Read of size 4 at addr ffff888102a0ec30 by task kunit_try_catch/272
[   32.918654] 
[   32.919204] CPU: 1 UID: 0 PID: 272 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241205 #1
[   32.919935] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.920127] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   32.920462] Call Trace:
[   32.920600]  <TASK>
[   32.921108]  dump_stack_lvl+0x73/0xb0
[   32.921817]  print_report+0xd1/0x640
[   32.922513]  ? __virt_addr_valid+0x1db/0x2d0
[   32.923458]  ? kasan_complete_mode_report_info+0x2a/0x200
[   32.924487]  kasan_report+0x102/0x140
[   32.925157]  ? kasan_atomics_helper+0x4a86/0x5450
[   32.926308]  ? kasan_atomics_helper+0x4a86/0x5450
[   32.927146]  __asan_report_load4_noabort+0x18/0x20
[   32.927617]  kasan_atomics_helper+0x4a86/0x5450
[   32.928105]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   32.928618]  ? __kmalloc_cache_noprof+0x184/0x410
[   32.929277]  ? kasan_atomics+0x153/0x310
[   32.929716]  kasan_atomics+0x1dd/0x310
[   32.930221]  ? __pfx_kasan_atomics+0x10/0x10
[   32.931033]  ? __pfx_read_tsc+0x10/0x10
[   32.931635]  ? ktime_get_ts64+0x86/0x230
[   32.932306]  kunit_try_run_case+0x1b3/0x490
[   32.933355]  ? __pfx_kunit_try_run_case+0x10/0x10
[   32.933856]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   32.934558]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   32.935154]  ? __kthread_parkme+0x82/0x160
[   32.936034]  ? preempt_count_sub+0x50/0x80
[   32.936485]  ? __pfx_kunit_try_run_case+0x10/0x10
[   32.937421]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   32.938400]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   32.939253]  kthread+0x257/0x310
[   32.939674]  ? __pfx_kthread+0x10/0x10
[   32.940328]  ret_from_fork+0x41/0x80
[   32.940725]  ? __pfx_kthread+0x10/0x10
[   32.941145]  ret_from_fork_asm+0x1a/0x30
[   32.941621]  </TASK>
[   32.941949] 
[   32.942137] Allocated by task 272:
[   32.942642]  kasan_save_stack+0x3d/0x60
[   32.943038]  kasan_save_track+0x18/0x40
[   32.944209]  kasan_save_alloc_info+0x3b/0x50
[   32.944739]  __kasan_kmalloc+0xb7/0xc0
[   32.945121]  __kmalloc_cache_noprof+0x184/0x410
[   32.945581]  kasan_atomics+0x96/0x310
[   32.946404]  kunit_try_run_case+0x1b3/0x490
[   32.947247]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   32.947753]  kthread+0x257/0x310
[   32.948415]  ret_from_fork+0x41/0x80
[   32.948755]  ret_from_fork_asm+0x1a/0x30
[   32.949497] 
[   32.949723] The buggy address belongs to the object at ffff888102a0ec00
[   32.949723]  which belongs to the cache kmalloc-64 of size 64
[   32.951230] The buggy address is located 0 bytes to the right of
[   32.951230]  allocated 48-byte region [ffff888102a0ec00, ffff888102a0ec30)
[   32.952667] 
[   32.952943] The buggy address belongs to the physical page:
[   32.953833] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a0e
[   32.955113] flags: 0x200000000000000(node=0|zone=2)
[   32.955600] page_type: f5(slab)
[   32.956355] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   32.957375] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   32.958365] page dumped because: kasan: bad access detected
[   32.958999] 
[   32.959226] Memory state around the buggy address:
[   32.959732]  ffff888102a0eb00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.961061]  ffff888102a0eb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.962231] >ffff888102a0ec00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   32.962822]                                      ^
[   32.963441]  ffff888102a0ec80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.964406]  ffff888102a0ed00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.965079] ==================================================================
[   32.682011] ==================================================================
[   32.682653] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x993/0x5450
[   32.684005] Write of size 4 at addr ffff888102a0ec30 by task kunit_try_catch/272
[   32.684887] 
[   32.685205] CPU: 1 UID: 0 PID: 272 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241205 #1
[   32.686328] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.686718] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   32.687567] Call Trace:
[   32.688076]  <TASK>
[   32.688384]  dump_stack_lvl+0x73/0xb0
[   32.688950]  print_report+0xd1/0x640
[   32.689304]  ? __virt_addr_valid+0x1db/0x2d0
[   32.689885]  ? kasan_complete_mode_report_info+0x2a/0x200
[   32.690374]  kasan_report+0x102/0x140
[   32.690859]  ? kasan_atomics_helper+0x993/0x5450
[   32.691387]  ? kasan_atomics_helper+0x993/0x5450
[   32.691924]  kasan_check_range+0x10c/0x1c0
[   32.692472]  __kasan_check_write+0x18/0x20
[   32.693186]  kasan_atomics_helper+0x993/0x5450
[   32.693623]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   32.694209]  ? __kmalloc_cache_noprof+0x184/0x410
[   32.694653]  ? kasan_atomics+0x153/0x310
[   32.695361]  kasan_atomics+0x1dd/0x310
[   32.695961]  ? __pfx_kasan_atomics+0x10/0x10
[   32.696514]  ? __pfx_read_tsc+0x10/0x10
[   32.697154]  ? ktime_get_ts64+0x86/0x230
[   32.697568]  kunit_try_run_case+0x1b3/0x490
[   32.698230]  ? __pfx_kunit_try_run_case+0x10/0x10
[   32.698766]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   32.699447]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   32.700013]  ? __kthread_parkme+0x82/0x160
[   32.700506]  ? preempt_count_sub+0x50/0x80
[   32.701119]  ? __pfx_kunit_try_run_case+0x10/0x10
[   32.701615]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   32.702207]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   32.702984]  kthread+0x257/0x310
[   32.703360]  ? __pfx_kthread+0x10/0x10
[   32.703802]  ret_from_fork+0x41/0x80
[   32.704331]  ? __pfx_kthread+0x10/0x10
[   32.704912]  ret_from_fork_asm+0x1a/0x30
[   32.705456]  </TASK>
[   32.705919] 
[   32.706098] Allocated by task 272:
[   32.706566]  kasan_save_stack+0x3d/0x60
[   32.706985]  kasan_save_track+0x18/0x40
[   32.707428]  kasan_save_alloc_info+0x3b/0x50
[   32.708175]  __kasan_kmalloc+0xb7/0xc0
[   32.708632]  __kmalloc_cache_noprof+0x184/0x410
[   32.709283]  kasan_atomics+0x96/0x310
[   32.709846]  kunit_try_run_case+0x1b3/0x490
[   32.710172]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   32.710820]  kthread+0x257/0x310
[   32.711257]  ret_from_fork+0x41/0x80
[   32.711620]  ret_from_fork_asm+0x1a/0x30
[   32.712215] 
[   32.712500] The buggy address belongs to the object at ffff888102a0ec00
[   32.712500]  which belongs to the cache kmalloc-64 of size 64
[   32.713554] The buggy address is located 0 bytes to the right of
[   32.713554]  allocated 48-byte region [ffff888102a0ec00, ffff888102a0ec30)
[   32.715054] 
[   32.715324] The buggy address belongs to the physical page:
[   32.715785] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a0e
[   32.716555] flags: 0x200000000000000(node=0|zone=2)
[   32.717208] page_type: f5(slab)
[   32.717554] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   32.718420] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   32.719553] page dumped because: kasan: bad access detected
[   32.720338] 
[   32.720560] Memory state around the buggy address:
[   32.721209]  ffff888102a0eb00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.721882]  ffff888102a0eb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.722733] >ffff888102a0ec00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   32.723480]                                      ^
[   32.723965]  ffff888102a0ec80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.724835]  ffff888102a0ed00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.725574] ==================================================================
[   33.451385] ==================================================================
[   33.453026] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x49ea/0x5450
[   33.454181] Read of size 4 at addr ffff888102a0ec30 by task kunit_try_catch/272
[   33.456102] 
[   33.456306] CPU: 1 UID: 0 PID: 272 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241205 #1
[   33.457227] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.457418] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   33.457814] Call Trace:
[   33.458532]  <TASK>
[   33.459011]  dump_stack_lvl+0x73/0xb0
[   33.459712]  print_report+0xd1/0x640
[   33.460086]  ? __virt_addr_valid+0x1db/0x2d0
[   33.460604]  ? kasan_complete_mode_report_info+0x2a/0x200
[   33.461120]  kasan_report+0x102/0x140
[   33.461577]  ? kasan_atomics_helper+0x49ea/0x5450
[   33.462116]  ? kasan_atomics_helper+0x49ea/0x5450
[   33.462748]  __asan_report_load4_noabort+0x18/0x20
[   33.463190]  kasan_atomics_helper+0x49ea/0x5450
[   33.463850]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   33.464302]  ? __kmalloc_cache_noprof+0x184/0x410
[   33.465041]  ? kasan_atomics+0x153/0x310
[   33.465439]  kasan_atomics+0x1dd/0x310
[   33.466013]  ? __pfx_kasan_atomics+0x10/0x10
[   33.466546]  ? __pfx_read_tsc+0x10/0x10
[   33.466924]  ? ktime_get_ts64+0x86/0x230
[   33.467490]  kunit_try_run_case+0x1b3/0x490
[   33.468117]  ? __pfx_kunit_try_run_case+0x10/0x10
[   33.468695]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   33.469252]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   33.469870]  ? __kthread_parkme+0x82/0x160
[   33.470319]  ? preempt_count_sub+0x50/0x80
[   33.470803]  ? __pfx_kunit_try_run_case+0x10/0x10
[   33.471395]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   33.472161]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   33.472722]  kthread+0x257/0x310
[   33.473250]  ? __pfx_kthread+0x10/0x10
[   33.473742]  ret_from_fork+0x41/0x80
[   33.474193]  ? __pfx_kthread+0x10/0x10
[   33.474619]  ret_from_fork_asm+0x1a/0x30
[   33.475280]  </TASK>
[   33.475670] 
[   33.475984] Allocated by task 272:
[   33.476392]  kasan_save_stack+0x3d/0x60
[   33.476727]  kasan_save_track+0x18/0x40
[   33.477220]  kasan_save_alloc_info+0x3b/0x50
[   33.477762]  __kasan_kmalloc+0xb7/0xc0
[   33.478239]  __kmalloc_cache_noprof+0x184/0x410
[   33.478756]  kasan_atomics+0x96/0x310
[   33.479317]  kunit_try_run_case+0x1b3/0x490
[   33.479804]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   33.480489]  kthread+0x257/0x310
[   33.480916]  ret_from_fork+0x41/0x80
[   33.481353]  ret_from_fork_asm+0x1a/0x30
[   33.481909] 
[   33.482233] The buggy address belongs to the object at ffff888102a0ec00
[   33.482233]  which belongs to the cache kmalloc-64 of size 64
[   33.483212] The buggy address is located 0 bytes to the right of
[   33.483212]  allocated 48-byte region [ffff888102a0ec00, ffff888102a0ec30)
[   33.485626] 
[   33.485987] The buggy address belongs to the physical page:
[   33.486497] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a0e
[   33.487816] flags: 0x200000000000000(node=0|zone=2)
[   33.488587] page_type: f5(slab)
[   33.489075] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   33.490399] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   33.491358] page dumped because: kasan: bad access detected
[   33.492013] 
[   33.492123] Memory state around the buggy address:
[   33.492328]  ffff888102a0eb00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.492607]  ffff888102a0eb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.493472] >ffff888102a0ec00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   33.494073]                                      ^
[   33.494625]  ffff888102a0ec80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.495290]  ffff888102a0ed00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.496491] ==================================================================
[   34.154259] ==================================================================
[   34.155455] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1a80/0x5450
[   34.156699] Write of size 8 at addr ffff888102a0ec30 by task kunit_try_catch/272
[   34.157636] 
[   34.158177] CPU: 1 UID: 0 PID: 272 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241205 #1
[   34.159474] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.159933] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   34.160995] Call Trace:
[   34.161222]  <TASK>
[   34.161543]  dump_stack_lvl+0x73/0xb0
[   34.162396]  print_report+0xd1/0x640
[   34.163048]  ? __virt_addr_valid+0x1db/0x2d0
[   34.163494]  ? kasan_complete_mode_report_info+0x2a/0x200
[   34.164419]  kasan_report+0x102/0x140
[   34.164937]  ? kasan_atomics_helper+0x1a80/0x5450
[   34.165573]  ? kasan_atomics_helper+0x1a80/0x5450
[   34.166443]  kasan_check_range+0x10c/0x1c0
[   34.166919]  __kasan_check_write+0x18/0x20
[   34.167378]  kasan_atomics_helper+0x1a80/0x5450
[   34.168194]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   34.168797]  ? __kmalloc_cache_noprof+0x184/0x410
[   34.169497]  ? kasan_atomics+0x153/0x310
[   34.170226]  kasan_atomics+0x1dd/0x310
[   34.170629]  ? __pfx_kasan_atomics+0x10/0x10
[   34.171451]  ? __pfx_read_tsc+0x10/0x10
[   34.172543]  ? ktime_get_ts64+0x86/0x230
[   34.173193]  kunit_try_run_case+0x1b3/0x490
[   34.173646]  ? __pfx_kunit_try_run_case+0x10/0x10
[   34.174377]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   34.175196]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   34.176151]  ? __kthread_parkme+0x82/0x160
[   34.176570]  ? preempt_count_sub+0x50/0x80
[   34.177215]  ? __pfx_kunit_try_run_case+0x10/0x10
[   34.177672]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   34.178588]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   34.179430]  kthread+0x257/0x310
[   34.180394]  ? __pfx_kthread+0x10/0x10
[   34.180801]  ret_from_fork+0x41/0x80
[   34.181817]  ? __pfx_kthread+0x10/0x10
[   34.182234]  ret_from_fork_asm+0x1a/0x30
[   34.182699]  </TASK>
[   34.182907] 
[   34.183222] Allocated by task 272:
[   34.184239]  kasan_save_stack+0x3d/0x60
[   34.184659]  kasan_save_track+0x18/0x40
[   34.185373]  kasan_save_alloc_info+0x3b/0x50
[   34.185832]  __kasan_kmalloc+0xb7/0xc0
[   34.186654]  __kmalloc_cache_noprof+0x184/0x410
[   34.187275]  kasan_atomics+0x96/0x310
[   34.187772]  kunit_try_run_case+0x1b3/0x490
[   34.188453]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   34.189179]  kthread+0x257/0x310
[   34.189594]  ret_from_fork+0x41/0x80
[   34.190280]  ret_from_fork_asm+0x1a/0x30
[   34.190751] 
[   34.191044] The buggy address belongs to the object at ffff888102a0ec00
[   34.191044]  which belongs to the cache kmalloc-64 of size 64
[   34.192622] The buggy address is located 0 bytes to the right of
[   34.192622]  allocated 48-byte region [ffff888102a0ec00, ffff888102a0ec30)
[   34.194071] 
[   34.194304] The buggy address belongs to the physical page:
[   34.195213] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a0e
[   34.195845] flags: 0x200000000000000(node=0|zone=2)
[   34.196325] page_type: f5(slab)
[   34.196729] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   34.197830] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   34.198650] page dumped because: kasan: bad access detected
[   34.199469] 
[   34.199709] Memory state around the buggy address:
[   34.200661]  ffff888102a0eb00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   34.201701]  ffff888102a0eb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   34.202446] >ffff888102a0ec00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   34.203300]                                      ^
[   34.203825]  ffff888102a0ec80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.204416]  ffff888102a0ed00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.205460] ==================================================================
[   33.148648] ==================================================================
[   33.149483] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xfaa/0x5450
[   33.150106] Write of size 4 at addr ffff888102a0ec30 by task kunit_try_catch/272
[   33.150980] 
[   33.151178] CPU: 1 UID: 0 PID: 272 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241205 #1
[   33.152583] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.153329] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   33.154228] Call Trace:
[   33.154564]  <TASK>
[   33.154897]  dump_stack_lvl+0x73/0xb0
[   33.155655]  print_report+0xd1/0x640
[   33.156292]  ? __virt_addr_valid+0x1db/0x2d0
[   33.156890]  ? kasan_complete_mode_report_info+0x2a/0x200
[   33.157535]  kasan_report+0x102/0x140
[   33.158222]  ? kasan_atomics_helper+0xfaa/0x5450
[   33.158872]  ? kasan_atomics_helper+0xfaa/0x5450
[   33.159403]  kasan_check_range+0x10c/0x1c0
[   33.160144]  __kasan_check_write+0x18/0x20
[   33.160932]  kasan_atomics_helper+0xfaa/0x5450
[   33.161428]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   33.161903]  ? __kmalloc_cache_noprof+0x184/0x410
[   33.162843]  ? kasan_atomics+0x153/0x310
[   33.163482]  kasan_atomics+0x1dd/0x310
[   33.164191]  ? __pfx_kasan_atomics+0x10/0x10
[   33.164841]  ? __pfx_read_tsc+0x10/0x10
[   33.165264]  ? ktime_get_ts64+0x86/0x230
[   33.166026]  kunit_try_run_case+0x1b3/0x490
[   33.166712]  ? __pfx_kunit_try_run_case+0x10/0x10
[   33.167239]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   33.168000]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   33.168750]  ? __kthread_parkme+0x82/0x160
[   33.169410]  ? preempt_count_sub+0x50/0x80
[   33.169890]  ? __pfx_kunit_try_run_case+0x10/0x10
[   33.170618]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   33.171664]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   33.172246]  kthread+0x257/0x310
[   33.172622]  ? __pfx_kthread+0x10/0x10
[   33.173501]  ret_from_fork+0x41/0x80
[   33.174237]  ? __pfx_kthread+0x10/0x10
[   33.174945]  ret_from_fork_asm+0x1a/0x30
[   33.175450]  </TASK>
[   33.176102] 
[   33.176258] Allocated by task 272:
[   33.176740]  kasan_save_stack+0x3d/0x60
[   33.177296]  kasan_save_track+0x18/0x40
[   33.178186]  kasan_save_alloc_info+0x3b/0x50
[   33.178408]  __kasan_kmalloc+0xb7/0xc0
[   33.178595]  __kmalloc_cache_noprof+0x184/0x410
[   33.179106]  kasan_atomics+0x96/0x310
[   33.179395]  kunit_try_run_case+0x1b3/0x490
[   33.179899]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   33.180408]  kthread+0x257/0x310
[   33.180728]  ret_from_fork+0x41/0x80
[   33.181450]  ret_from_fork_asm+0x1a/0x30
[   33.181967] 
[   33.182201] The buggy address belongs to the object at ffff888102a0ec00
[   33.182201]  which belongs to the cache kmalloc-64 of size 64
[   33.183180] The buggy address is located 0 bytes to the right of
[   33.183180]  allocated 48-byte region [ffff888102a0ec00, ffff888102a0ec30)
[   33.184461] 
[   33.184775] The buggy address belongs to the physical page:
[   33.185318] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a0e
[   33.186099] flags: 0x200000000000000(node=0|zone=2)
[   33.186468] page_type: f5(slab)
[   33.187031] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   33.187829] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   33.188515] page dumped because: kasan: bad access detected
[   33.188970] 
[   33.189245] Memory state around the buggy address:
[   33.189813]  ffff888102a0eb00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.190389]  ffff888102a0eb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.191073] >ffff888102a0ec00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   33.191901]                                      ^
[   33.192309]  ffff888102a0ec80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.193123]  ffff888102a0ed00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.193720] ==================================================================
[   34.016218] ==================================================================
[   34.016908] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x18b2/0x5450
[   34.017531] Write of size 8 at addr ffff888102a0ec30 by task kunit_try_catch/272
[   34.018371] 
[   34.018561] CPU: 1 UID: 0 PID: 272 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241205 #1
[   34.019752] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.020284] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   34.021106] Call Trace:
[   34.021367]  <TASK>
[   34.021567]  dump_stack_lvl+0x73/0xb0
[   34.021998]  print_report+0xd1/0x640
[   34.022529]  ? __virt_addr_valid+0x1db/0x2d0
[   34.023146]  ? kasan_complete_mode_report_info+0x2a/0x200
[   34.023729]  kasan_report+0x102/0x140
[   34.024229]  ? kasan_atomics_helper+0x18b2/0x5450
[   34.024837]  ? kasan_atomics_helper+0x18b2/0x5450
[   34.025203]  kasan_check_range+0x10c/0x1c0
[   34.025873]  __kasan_check_write+0x18/0x20
[   34.026454]  kasan_atomics_helper+0x18b2/0x5450
[   34.027146]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   34.027719]  ? __kmalloc_cache_noprof+0x184/0x410
[   34.028334]  ? kasan_atomics+0x153/0x310
[   34.028961]  kasan_atomics+0x1dd/0x310
[   34.029410]  ? __pfx_kasan_atomics+0x10/0x10
[   34.029989]  ? __pfx_read_tsc+0x10/0x10
[   34.030362]  ? ktime_get_ts64+0x86/0x230
[   34.030887]  kunit_try_run_case+0x1b3/0x490
[   34.031398]  ? __pfx_kunit_try_run_case+0x10/0x10
[   34.031987]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   34.032387]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   34.033118]  ? __kthread_parkme+0x82/0x160
[   34.033586]  ? preempt_count_sub+0x50/0x80
[   34.034002]  ? __pfx_kunit_try_run_case+0x10/0x10
[   34.034613]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   34.035389]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   34.036045]  kthread+0x257/0x310
[   34.036442]  ? __pfx_kthread+0x10/0x10
[   34.036996]  ret_from_fork+0x41/0x80
[   34.037418]  ? __pfx_kthread+0x10/0x10
[   34.038021]  ret_from_fork_asm+0x1a/0x30
[   34.038572]  </TASK>
[   34.038986] 
[   34.039184] Allocated by task 272:
[   34.039624]  kasan_save_stack+0x3d/0x60
[   34.040023]  kasan_save_track+0x18/0x40
[   34.040538]  kasan_save_alloc_info+0x3b/0x50
[   34.041024]  __kasan_kmalloc+0xb7/0xc0
[   34.041549]  __kmalloc_cache_noprof+0x184/0x410
[   34.042061]  kasan_atomics+0x96/0x310
[   34.042602]  kunit_try_run_case+0x1b3/0x490
[   34.043194]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   34.043839]  kthread+0x257/0x310
[   34.044246]  ret_from_fork+0x41/0x80
[   34.044752]  ret_from_fork_asm+0x1a/0x30
[   34.045158] 
[   34.045463] The buggy address belongs to the object at ffff888102a0ec00
[   34.045463]  which belongs to the cache kmalloc-64 of size 64
[   34.046393] The buggy address is located 0 bytes to the right of
[   34.046393]  allocated 48-byte region [ffff888102a0ec00, ffff888102a0ec30)
[   34.047727] 
[   34.047975] The buggy address belongs to the physical page:
[   34.048614] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a0e
[   34.049368] flags: 0x200000000000000(node=0|zone=2)
[   34.049821] page_type: f5(slab)
[   34.050227] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   34.051001] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   34.051666] page dumped because: kasan: bad access detected
[   34.052297] 
[   34.052555] Memory state around the buggy address:
[   34.053121]  ffff888102a0eb00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   34.053757]  ffff888102a0eb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   34.054276] >ffff888102a0ec00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   34.055019]                                      ^
[   34.055480]  ffff888102a0ec80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.056287]  ffff888102a0ed00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.056990] ==================================================================
[   33.194571] ==================================================================
[   33.195515] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a38/0x5450
[   33.196473] Read of size 4 at addr ffff888102a0ec30 by task kunit_try_catch/272
[   33.196977] 
[   33.197311] CPU: 1 UID: 0 PID: 272 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241205 #1
[   33.198303] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.198921] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   33.199644] Call Trace:
[   33.200108]  <TASK>
[   33.200318]  dump_stack_lvl+0x73/0xb0
[   33.200646]  print_report+0xd1/0x640
[   33.201318]  ? __virt_addr_valid+0x1db/0x2d0
[   33.201862]  ? kasan_complete_mode_report_info+0x2a/0x200
[   33.202582]  kasan_report+0x102/0x140
[   33.203011]  ? kasan_atomics_helper+0x4a38/0x5450
[   33.203628]  ? kasan_atomics_helper+0x4a38/0x5450
[   33.204062]  __asan_report_load4_noabort+0x18/0x20
[   33.204768]  kasan_atomics_helper+0x4a38/0x5450
[   33.205192]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   33.205555]  ? __kmalloc_cache_noprof+0x184/0x410
[   33.206501]  ? kasan_atomics+0x153/0x310
[   33.207202]  kasan_atomics+0x1dd/0x310
[   33.207615]  ? __pfx_kasan_atomics+0x10/0x10
[   33.208315]  ? __pfx_read_tsc+0x10/0x10
[   33.208947]  ? ktime_get_ts64+0x86/0x230
[   33.209275]  kunit_try_run_case+0x1b3/0x490
[   33.210711]  ? __pfx_kunit_try_run_case+0x10/0x10
[   33.211415]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   33.211706]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   33.212534]  ? __kthread_parkme+0x82/0x160
[   33.213353]  ? preempt_count_sub+0x50/0x80
[   33.214077]  ? __pfx_kunit_try_run_case+0x10/0x10
[   33.214577]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   33.215096]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   33.215719]  kthread+0x257/0x310
[   33.216149]  ? __pfx_kthread+0x10/0x10
[   33.216525]  ret_from_fork+0x41/0x80
[   33.217040]  ? __pfx_kthread+0x10/0x10
[   33.217491]  ret_from_fork_asm+0x1a/0x30
[   33.217967]  </TASK>
[   33.218597] 
[   33.219108] Allocated by task 272:
[   33.219354]  kasan_save_stack+0x3d/0x60
[   33.220112]  kasan_save_track+0x18/0x40
[   33.220541]  kasan_save_alloc_info+0x3b/0x50
[   33.221155]  __kasan_kmalloc+0xb7/0xc0
[   33.221511]  __kmalloc_cache_noprof+0x184/0x410
[   33.222094]  kasan_atomics+0x96/0x310
[   33.222432]  kunit_try_run_case+0x1b3/0x490
[   33.223105]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   33.223725]  kthread+0x257/0x310
[   33.224165]  ret_from_fork+0x41/0x80
[   33.224589]  ret_from_fork_asm+0x1a/0x30
[   33.225193] 
[   33.225554] The buggy address belongs to the object at ffff888102a0ec00
[   33.225554]  which belongs to the cache kmalloc-64 of size 64
[   33.226727] The buggy address is located 0 bytes to the right of
[   33.226727]  allocated 48-byte region [ffff888102a0ec00, ffff888102a0ec30)
[   33.227873] 
[   33.228138] The buggy address belongs to the physical page:
[   33.228611] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a0e
[   33.229446] flags: 0x200000000000000(node=0|zone=2)
[   33.230105] page_type: f5(slab)
[   33.230433] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   33.231312] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   33.232001] page dumped because: kasan: bad access detected
[   33.232546] 
[   33.232814] Memory state around the buggy address:
[   33.233317]  ffff888102a0eb00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.234117]  ffff888102a0eb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.234750] >ffff888102a0ec00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   33.235447]                                      ^
[   33.236016]  ffff888102a0ec80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.236800]  ffff888102a0ed00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.237506] ==================================================================
[   33.974266] ==================================================================
[   33.974743] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1819/0x5450
[   33.975592] Write of size 8 at addr ffff888102a0ec30 by task kunit_try_catch/272
[   33.976110] 
[   33.976300] CPU: 1 UID: 0 PID: 272 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241205 #1
[   33.977904] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.978361] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   33.979194] Call Trace:
[   33.979469]  <TASK>
[   33.979706]  dump_stack_lvl+0x73/0xb0
[   33.980287]  print_report+0xd1/0x640
[   33.980891]  ? __virt_addr_valid+0x1db/0x2d0
[   33.981370]  ? kasan_complete_mode_report_info+0x2a/0x200
[   33.982110]  kasan_report+0x102/0x140
[   33.982562]  ? kasan_atomics_helper+0x1819/0x5450
[   33.983114]  ? kasan_atomics_helper+0x1819/0x5450
[   33.983730]  kasan_check_range+0x10c/0x1c0
[   33.984189]  __kasan_check_write+0x18/0x20
[   33.984655]  kasan_atomics_helper+0x1819/0x5450
[   33.985296]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   33.985875]  ? __kmalloc_cache_noprof+0x184/0x410
[   33.986522]  ? kasan_atomics+0x153/0x310
[   33.987156]  kasan_atomics+0x1dd/0x310
[   33.987717]  ? __pfx_kasan_atomics+0x10/0x10
[   33.988200]  ? __pfx_read_tsc+0x10/0x10
[   33.988592]  ? ktime_get_ts64+0x86/0x230
[   33.989105]  kunit_try_run_case+0x1b3/0x490
[   33.989568]  ? __pfx_kunit_try_run_case+0x10/0x10
[   33.990216]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   33.990822]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   33.991469]  ? __kthread_parkme+0x82/0x160
[   33.992118]  ? preempt_count_sub+0x50/0x80
[   33.992565]  ? __pfx_kunit_try_run_case+0x10/0x10
[   33.993150]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   33.993660]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   33.994396]  kthread+0x257/0x310
[   33.994844]  ? __pfx_kthread+0x10/0x10
[   33.995171]  ret_from_fork+0x41/0x80
[   33.995714]  ? __pfx_kthread+0x10/0x10
[   33.996140]  ret_from_fork_asm+0x1a/0x30
[   33.996657]  </TASK>
[   33.997093] 
[   33.997274] Allocated by task 272:
[   33.997636]  kasan_save_stack+0x3d/0x60
[   33.998236]  kasan_save_track+0x18/0x40
[   33.998563]  kasan_save_alloc_info+0x3b/0x50
[   33.999170]  __kasan_kmalloc+0xb7/0xc0
[   33.999672]  __kmalloc_cache_noprof+0x184/0x410
[   34.000172]  kasan_atomics+0x96/0x310
[   34.000576]  kunit_try_run_case+0x1b3/0x490
[   34.001101]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   34.001608]  kthread+0x257/0x310
[   34.001979]  ret_from_fork+0x41/0x80
[   34.002345]  ret_from_fork_asm+0x1a/0x30
[   34.002851] 
[   34.003021] The buggy address belongs to the object at ffff888102a0ec00
[   34.003021]  which belongs to the cache kmalloc-64 of size 64
[   34.003887] The buggy address is located 0 bytes to the right of
[   34.003887]  allocated 48-byte region [ffff888102a0ec00, ffff888102a0ec30)
[   34.005340] 
[   34.005597] The buggy address belongs to the physical page:
[   34.006068] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a0e
[   34.006600] flags: 0x200000000000000(node=0|zone=2)
[   34.007345] page_type: f5(slab)
[   34.007866] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   34.008825] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   34.009341] page dumped because: kasan: bad access detected
[   34.010083] 
[   34.010298] Memory state around the buggy address:
[   34.010751]  ffff888102a0eb00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   34.011515]  ffff888102a0eb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   34.012298] >ffff888102a0ec00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   34.013028]                                      ^
[   34.013554]  ffff888102a0ec80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.014270]  ffff888102a0ed00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.015010] ==================================================================
[   34.356353] ==================================================================
[   34.357022] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1ce2/0x5450
[   34.357949] Write of size 8 at addr ffff888102a0ec30 by task kunit_try_catch/272
[   34.358733] 
[   34.359161] CPU: 1 UID: 0 PID: 272 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241205 #1
[   34.360317] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.360845] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   34.362012] Call Trace:
[   34.362249]  <TASK>
[   34.362579]  dump_stack_lvl+0x73/0xb0
[   34.363064]  print_report+0xd1/0x640
[   34.363454]  ? __virt_addr_valid+0x1db/0x2d0
[   34.364091]  ? kasan_complete_mode_report_info+0x2a/0x200
[   34.364564]  kasan_report+0x102/0x140
[   34.364997]  ? kasan_atomics_helper+0x1ce2/0x5450
[   34.365543]  ? kasan_atomics_helper+0x1ce2/0x5450
[   34.366148]  kasan_check_range+0x10c/0x1c0
[   34.366727]  __kasan_check_write+0x18/0x20
[   34.367334]  kasan_atomics_helper+0x1ce2/0x5450
[   34.367836]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   34.368427]  ? __kmalloc_cache_noprof+0x184/0x410
[   34.369093]  ? kasan_atomics+0x153/0x310
[   34.369612]  kasan_atomics+0x1dd/0x310
[   34.370365]  ? __pfx_kasan_atomics+0x10/0x10
[   34.370856]  ? __pfx_read_tsc+0x10/0x10
[   34.371269]  ? ktime_get_ts64+0x86/0x230
[   34.371915]  kunit_try_run_case+0x1b3/0x490
[   34.372369]  ? __pfx_kunit_try_run_case+0x10/0x10
[   34.373041]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   34.373631]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   34.374218]  ? __kthread_parkme+0x82/0x160
[   34.374807]  ? preempt_count_sub+0x50/0x80
[   34.375256]  ? __pfx_kunit_try_run_case+0x10/0x10
[   34.375953]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   34.376635]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   34.377252]  kthread+0x257/0x310
[   34.377821]  ? __pfx_kthread+0x10/0x10
[   34.378279]  ret_from_fork+0x41/0x80
[   34.378849]  ? __pfx_kthread+0x10/0x10
[   34.379216]  ret_from_fork_asm+0x1a/0x30
[   34.379883]  </TASK>
[   34.380180] 
[   34.380469] Allocated by task 272:
[   34.380957]  kasan_save_stack+0x3d/0x60
[   34.381269]  kasan_save_track+0x18/0x40
[   34.381754]  kasan_save_alloc_info+0x3b/0x50
[   34.382242]  __kasan_kmalloc+0xb7/0xc0
[   34.382824]  __kmalloc_cache_noprof+0x184/0x410
[   34.383418]  kasan_atomics+0x96/0x310
[   34.383980]  kunit_try_run_case+0x1b3/0x490
[   34.384355]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   34.385124]  kthread+0x257/0x310
[   34.385616]  ret_from_fork+0x41/0x80
[   34.386411]  ret_from_fork_asm+0x1a/0x30
[   34.386738] 
[   34.386993] The buggy address belongs to the object at ffff888102a0ec00
[   34.386993]  which belongs to the cache kmalloc-64 of size 64
[   34.387929] The buggy address is located 0 bytes to the right of
[   34.387929]  allocated 48-byte region [ffff888102a0ec00, ffff888102a0ec30)
[   34.389012] 
[   34.389266] The buggy address belongs to the physical page:
[   34.389763] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a0e
[   34.390470] flags: 0x200000000000000(node=0|zone=2)
[   34.391070] page_type: f5(slab)
[   34.391478] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   34.392345] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   34.392954] page dumped because: kasan: bad access detected
[   34.393461] 
[   34.393648] Memory state around the buggy address:
[   34.394122]  ffff888102a0eb00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   34.394808]  ffff888102a0eb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   34.395243] >ffff888102a0ec00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   34.396131]                                      ^
[   34.396454]  ffff888102a0ec80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.397641]  ffff888102a0ed00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.398155] ==================================================================
[   34.807165] ==================================================================
[   34.808219] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x218b/0x5450
[   34.809090] Write of size 8 at addr ffff888102a0ec30 by task kunit_try_catch/272
[   34.810471] 
[   34.810719] CPU: 1 UID: 0 PID: 272 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241205 #1
[   34.812043] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.812606] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   34.813508] Call Trace:
[   34.813768]  <TASK>
[   34.814420]  dump_stack_lvl+0x73/0xb0
[   34.815361]  print_report+0xd1/0x640
[   34.815752]  ? __virt_addr_valid+0x1db/0x2d0
[   34.816509]  ? kasan_complete_mode_report_info+0x2a/0x200
[   34.817096]  kasan_report+0x102/0x140
[   34.817303]  ? kasan_atomics_helper+0x218b/0x5450
[   34.817529]  ? kasan_atomics_helper+0x218b/0x5450
[   34.817880]  kasan_check_range+0x10c/0x1c0
[   34.818528]  __kasan_check_write+0x18/0x20
[   34.819287]  kasan_atomics_helper+0x218b/0x5450
[   34.819860]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   34.820546]  ? __kmalloc_cache_noprof+0x184/0x410
[   34.821250]  ? kasan_atomics+0x153/0x310
[   34.821646]  kasan_atomics+0x1dd/0x310
[   34.822275]  ? __pfx_kasan_atomics+0x10/0x10
[   34.822809]  ? __pfx_read_tsc+0x10/0x10
[   34.823204]  ? ktime_get_ts64+0x86/0x230
[   34.823841]  kunit_try_run_case+0x1b3/0x490
[   34.824265]  ? __pfx_kunit_try_run_case+0x10/0x10
[   34.824951]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   34.825524]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   34.826160]  ? __kthread_parkme+0x82/0x160
[   34.826566]  ? preempt_count_sub+0x50/0x80
[   34.827231]  ? __pfx_kunit_try_run_case+0x10/0x10
[   34.827843]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   34.828338]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   34.829037]  kthread+0x257/0x310
[   34.829438]  ? __pfx_kthread+0x10/0x10
[   34.829948]  ret_from_fork+0x41/0x80
[   34.830438]  ? __pfx_kthread+0x10/0x10
[   34.830978]  ret_from_fork_asm+0x1a/0x30
[   34.831361]  </TASK>
[   34.831813] 
[   34.832108] Allocated by task 272:
[   34.832522]  kasan_save_stack+0x3d/0x60
[   34.833062]  kasan_save_track+0x18/0x40
[   34.833497]  kasan_save_alloc_info+0x3b/0x50
[   34.834085]  __kasan_kmalloc+0xb7/0xc0
[   34.834450]  __kmalloc_cache_noprof+0x184/0x410
[   34.835166]  kasan_atomics+0x96/0x310
[   34.835506]  kunit_try_run_case+0x1b3/0x490
[   34.836072]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   34.836742]  kthread+0x257/0x310
[   34.837092]  ret_from_fork+0x41/0x80
[   34.837630]  ret_from_fork_asm+0x1a/0x30
[   34.838067] 
[   34.838376] The buggy address belongs to the object at ffff888102a0ec00
[   34.838376]  which belongs to the cache kmalloc-64 of size 64
[   34.839497] The buggy address is located 0 bytes to the right of
[   34.839497]  allocated 48-byte region [ffff888102a0ec00, ffff888102a0ec30)
[   34.840486] 
[   34.840846] The buggy address belongs to the physical page:
[   34.841411] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a0e
[   34.842289] flags: 0x200000000000000(node=0|zone=2)
[   34.842889] page_type: f5(slab)
[   34.843275] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   34.844149] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   34.844966] page dumped because: kasan: bad access detected
[   34.845477] 
[   34.845828] Memory state around the buggy address:
[   34.846319]  ffff888102a0eb00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   34.846994]  ffff888102a0eb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   34.847672] >ffff888102a0ec00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   34.848328]                                      ^
[   34.849016]  ffff888102a0ec80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.849827]  ffff888102a0ed00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.850568] ==================================================================
[   33.238632] ==================================================================
[   33.239377] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x107a/0x5450
[   33.239954] Write of size 4 at addr ffff888102a0ec30 by task kunit_try_catch/272
[   33.240834] 
[   33.241122] CPU: 1 UID: 0 PID: 272 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241205 #1
[   33.242075] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.242659] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   33.244047] Call Trace:
[   33.244357]  <TASK>
[   33.244713]  dump_stack_lvl+0x73/0xb0
[   33.245104]  print_report+0xd1/0x640
[   33.245613]  ? __virt_addr_valid+0x1db/0x2d0
[   33.246137]  ? kasan_complete_mode_report_info+0x2a/0x200
[   33.246632]  kasan_report+0x102/0x140
[   33.247323]  ? kasan_atomics_helper+0x107a/0x5450
[   33.248000]  ? kasan_atomics_helper+0x107a/0x5450
[   33.248828]  kasan_check_range+0x10c/0x1c0
[   33.249194]  __kasan_check_write+0x18/0x20
[   33.249708]  kasan_atomics_helper+0x107a/0x5450
[   33.250217]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   33.250839]  ? __kmalloc_cache_noprof+0x184/0x410
[   33.251242]  ? kasan_atomics+0x153/0x310
[   33.251779]  kasan_atomics+0x1dd/0x310
[   33.252186]  ? __pfx_kasan_atomics+0x10/0x10
[   33.252660]  ? __pfx_read_tsc+0x10/0x10
[   33.253140]  ? ktime_get_ts64+0x86/0x230
[   33.253656]  kunit_try_run_case+0x1b3/0x490
[   33.254259]  ? __pfx_kunit_try_run_case+0x10/0x10
[   33.254713]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   33.255322]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   33.255861]  ? __kthread_parkme+0x82/0x160
[   33.256337]  ? preempt_count_sub+0x50/0x80
[   33.256773]  ? __pfx_kunit_try_run_case+0x10/0x10
[   33.257151]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   33.257742]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   33.258473]  kthread+0x257/0x310
[   33.258831]  ? __pfx_kthread+0x10/0x10
[   33.259294]  ret_from_fork+0x41/0x80
[   33.259942]  ? __pfx_kthread+0x10/0x10
[   33.260267]  ret_from_fork_asm+0x1a/0x30
[   33.260823]  </TASK>
[   33.261160] 
[   33.261400] Allocated by task 272:
[   33.261746]  kasan_save_stack+0x3d/0x60
[   33.262236]  kasan_save_track+0x18/0x40
[   33.262587]  kasan_save_alloc_info+0x3b/0x50
[   33.262937]  __kasan_kmalloc+0xb7/0xc0
[   33.263560]  __kmalloc_cache_noprof+0x184/0x410
[   33.264158]  kasan_atomics+0x96/0x310
[   33.264455]  kunit_try_run_case+0x1b3/0x490
[   33.265233]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   33.265864]  kthread+0x257/0x310
[   33.266278]  ret_from_fork+0x41/0x80
[   33.266569]  ret_from_fork_asm+0x1a/0x30
[   33.267296] 
[   33.267555] The buggy address belongs to the object at ffff888102a0ec00
[   33.267555]  which belongs to the cache kmalloc-64 of size 64
[   33.268377] The buggy address is located 0 bytes to the right of
[   33.268377]  allocated 48-byte region [ffff888102a0ec00, ffff888102a0ec30)
[   33.269769] 
[   33.269997] The buggy address belongs to the physical page:
[   33.270347] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a0e
[   33.271244] flags: 0x200000000000000(node=0|zone=2)
[   33.271726] page_type: f5(slab)
[   33.272840] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   33.273350] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   33.273938] page dumped because: kasan: bad access detected
[   33.274485] 
[   33.274713] Memory state around the buggy address:
[   33.275234]  ffff888102a0eb00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.276015]  ffff888102a0eb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.276561] >ffff888102a0ec00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   33.277105]                                      ^
[   33.277989]  ffff888102a0ec80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.278486]  ffff888102a0ed00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.279718] ==================================================================
[   33.540109] ==================================================================
[   33.541671] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x49d0/0x5450
[   33.542670] Read of size 4 at addr ffff888102a0ec30 by task kunit_try_catch/272
[   33.543323] 
[   33.543616] CPU: 1 UID: 0 PID: 272 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241205 #1
[   33.544591] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.544961] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   33.545765] Call Trace:
[   33.546053]  <TASK>
[   33.546259]  dump_stack_lvl+0x73/0xb0
[   33.546894]  print_report+0xd1/0x640
[   33.547440]  ? __virt_addr_valid+0x1db/0x2d0
[   33.547976]  ? kasan_complete_mode_report_info+0x2a/0x200
[   33.548570]  kasan_report+0x102/0x140
[   33.549087]  ? kasan_atomics_helper+0x49d0/0x5450
[   33.550382]  ? kasan_atomics_helper+0x49d0/0x5450
[   33.550864]  __asan_report_load4_noabort+0x18/0x20
[   33.551514]  kasan_atomics_helper+0x49d0/0x5450
[   33.552173]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   33.552615]  ? __kmalloc_cache_noprof+0x184/0x410
[   33.553495]  ? kasan_atomics+0x153/0x310
[   33.554148]  kasan_atomics+0x1dd/0x310
[   33.554634]  ? __pfx_kasan_atomics+0x10/0x10
[   33.555157]  ? __pfx_read_tsc+0x10/0x10
[   33.556060]  ? ktime_get_ts64+0x86/0x230
[   33.556638]  kunit_try_run_case+0x1b3/0x490
[   33.557289]  ? __pfx_kunit_try_run_case+0x10/0x10
[   33.557749]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   33.558534]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   33.559325]  ? __kthread_parkme+0x82/0x160
[   33.559773]  ? preempt_count_sub+0x50/0x80
[   33.560633]  ? __pfx_kunit_try_run_case+0x10/0x10
[   33.560960]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   33.561455]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   33.562268]  kthread+0x257/0x310
[   33.562641]  ? __pfx_kthread+0x10/0x10
[   33.563333]  ret_from_fork+0x41/0x80
[   33.564005]  ? __pfx_kthread+0x10/0x10
[   33.564361]  ret_from_fork_asm+0x1a/0x30
[   33.564845]  </TASK>
[   33.565143] 
[   33.565367] Allocated by task 272:
[   33.566340]  kasan_save_stack+0x3d/0x60
[   33.566746]  kasan_save_track+0x18/0x40
[   33.567544]  kasan_save_alloc_info+0x3b/0x50
[   33.568311]  __kasan_kmalloc+0xb7/0xc0
[   33.569007]  __kmalloc_cache_noprof+0x184/0x410
[   33.569287]  kasan_atomics+0x96/0x310
[   33.569505]  kunit_try_run_case+0x1b3/0x490
[   33.570024]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   33.570719]  kthread+0x257/0x310
[   33.571125]  ret_from_fork+0x41/0x80
[   33.571565]  ret_from_fork_asm+0x1a/0x30
[   33.572503] 
[   33.572935] The buggy address belongs to the object at ffff888102a0ec00
[   33.572935]  which belongs to the cache kmalloc-64 of size 64
[   33.574252] The buggy address is located 0 bytes to the right of
[   33.574252]  allocated 48-byte region [ffff888102a0ec00, ffff888102a0ec30)
[   33.575403] 
[   33.575706] The buggy address belongs to the physical page:
[   33.576199] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a0e
[   33.577328] flags: 0x200000000000000(node=0|zone=2)
[   33.577702] page_type: f5(slab)
[   33.578202] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   33.578870] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   33.579653] page dumped because: kasan: bad access detected
[   33.580348] 
[   33.580546] Memory state around the buggy address:
[   33.581234]  ffff888102a0eb00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.581917]  ffff888102a0eb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.582667] >ffff888102a0ec00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   33.583209]                                      ^
[   33.583910]  ffff888102a0ec80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.584493]  ffff888102a0ed00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.585257] ==================================================================
[   33.807156] ==================================================================
[   33.807572] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x15b7/0x5450
[   33.808377] Write of size 8 at addr ffff888102a0ec30 by task kunit_try_catch/272
[   33.809346] 
[   33.809544] CPU: 1 UID: 0 PID: 272 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241205 #1
[   33.810570] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.811014] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   33.811949] Call Trace:
[   33.812288]  <TASK>
[   33.813201]  dump_stack_lvl+0x73/0xb0
[   33.813655]  print_report+0xd1/0x640
[   33.814358]  ? __virt_addr_valid+0x1db/0x2d0
[   33.815050]  ? kasan_complete_mode_report_info+0x2a/0x200
[   33.815627]  kasan_report+0x102/0x140
[   33.816118]  ? kasan_atomics_helper+0x15b7/0x5450
[   33.816716]  ? kasan_atomics_helper+0x15b7/0x5450
[   33.817406]  kasan_check_range+0x10c/0x1c0
[   33.818056]  __kasan_check_write+0x18/0x20
[   33.818514]  kasan_atomics_helper+0x15b7/0x5450
[   33.818871]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   33.819454]  ? __kmalloc_cache_noprof+0x184/0x410
[   33.820125]  ? kasan_atomics+0x153/0x310
[   33.820712]  kasan_atomics+0x1dd/0x310
[   33.821148]  ? __pfx_kasan_atomics+0x10/0x10
[   33.821640]  ? __pfx_read_tsc+0x10/0x10
[   33.822132]  ? ktime_get_ts64+0x86/0x230
[   33.822733]  kunit_try_run_case+0x1b3/0x490
[   33.823236]  ? __pfx_kunit_try_run_case+0x10/0x10
[   33.823917]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   33.824377]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   33.825061]  ? __kthread_parkme+0x82/0x160
[   33.825599]  ? preempt_count_sub+0x50/0x80
[   33.826096]  ? __pfx_kunit_try_run_case+0x10/0x10
[   33.826756]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   33.827438]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   33.828108]  kthread+0x257/0x310
[   33.828514]  ? __pfx_kthread+0x10/0x10
[   33.829036]  ret_from_fork+0x41/0x80
[   33.829524]  ? __pfx_kthread+0x10/0x10
[   33.829949]  ret_from_fork_asm+0x1a/0x30
[   33.830556]  </TASK>
[   33.831011] 
[   33.831175] Allocated by task 272:
[   33.831596]  kasan_save_stack+0x3d/0x60
[   33.831998]  kasan_save_track+0x18/0x40
[   33.832471]  kasan_save_alloc_info+0x3b/0x50
[   33.832992]  __kasan_kmalloc+0xb7/0xc0
[   33.833314]  __kmalloc_cache_noprof+0x184/0x410
[   33.833978]  kasan_atomics+0x96/0x310
[   33.834440]  kunit_try_run_case+0x1b3/0x490
[   33.834992]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   33.835674]  kthread+0x257/0x310
[   33.836112]  ret_from_fork+0x41/0x80
[   33.836563]  ret_from_fork_asm+0x1a/0x30
[   33.837177] 
[   33.837396] The buggy address belongs to the object at ffff888102a0ec00
[   33.837396]  which belongs to the cache kmalloc-64 of size 64
[   33.838526] The buggy address is located 0 bytes to the right of
[   33.838526]  allocated 48-byte region [ffff888102a0ec00, ffff888102a0ec30)
[   33.839911] 
[   33.840084] The buggy address belongs to the physical page:
[   33.840657] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a0e
[   33.841468] flags: 0x200000000000000(node=0|zone=2)
[   33.842082] page_type: f5(slab)
[   33.842543] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   33.843370] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   33.844217] page dumped because: kasan: bad access detected
[   33.844806] 
[   33.845081] Memory state around the buggy address:
[   33.845538]  ffff888102a0eb00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.846276]  ffff888102a0eb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.846971] >ffff888102a0ec00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   33.847631]                                      ^
[   33.848210]  ffff888102a0ec80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.848987]  ffff888102a0ed00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.849617] ==================================================================
[   32.378675] ==================================================================
[   32.379240] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x566/0x5450
[   32.381129] Write of size 4 at addr ffff888102a0ec30 by task kunit_try_catch/272
[   32.381668] 
[   32.381919] CPU: 1 UID: 0 PID: 272 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241205 #1
[   32.383787] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.384190] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   32.385043] Call Trace:
[   32.385367]  <TASK>
[   32.385740]  dump_stack_lvl+0x73/0xb0
[   32.386394]  print_report+0xd1/0x640
[   32.387119]  ? __virt_addr_valid+0x1db/0x2d0
[   32.387637]  ? kasan_complete_mode_report_info+0x2a/0x200
[   32.388369]  kasan_report+0x102/0x140
[   32.388729]  ? kasan_atomics_helper+0x566/0x5450
[   32.389288]  ? kasan_atomics_helper+0x566/0x5450
[   32.389977]  kasan_check_range+0x10c/0x1c0
[   32.390383]  __kasan_check_write+0x18/0x20
[   32.390959]  kasan_atomics_helper+0x566/0x5450
[   32.391463]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   32.392177]  ? __kmalloc_cache_noprof+0x184/0x410
[   32.392586]  ? kasan_atomics+0x153/0x310
[   32.393110]  kasan_atomics+0x1dd/0x310
[   32.393499]  ? __pfx_kasan_atomics+0x10/0x10
[   32.393984]  ? __pfx_read_tsc+0x10/0x10
[   32.394396]  ? ktime_get_ts64+0x86/0x230
[   32.394950]  kunit_try_run_case+0x1b3/0x490
[   32.395463]  ? __pfx_kunit_try_run_case+0x10/0x10
[   32.395963]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   32.396412]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   32.397534]  ? __kthread_parkme+0x82/0x160
[   32.398301]  ? preempt_count_sub+0x50/0x80
[   32.398836]  ? __pfx_kunit_try_run_case+0x10/0x10
[   32.399391]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   32.399993]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   32.400512]  kthread+0x257/0x310
[   32.401006]  ? __pfx_kthread+0x10/0x10
[   32.401365]  ret_from_fork+0x41/0x80
[   32.401928]  ? __pfx_kthread+0x10/0x10
[   32.402311]  ret_from_fork_asm+0x1a/0x30
[   32.402753]  </TASK>
[   32.403114] 
[   32.403339] Allocated by task 272:
[   32.403717]  kasan_save_stack+0x3d/0x60
[   32.404195]  kasan_save_track+0x18/0x40
[   32.404607]  kasan_save_alloc_info+0x3b/0x50
[   32.405130]  __kasan_kmalloc+0xb7/0xc0
[   32.405529]  __kmalloc_cache_noprof+0x184/0x410
[   32.405994]  kasan_atomics+0x96/0x310
[   32.406463]  kunit_try_run_case+0x1b3/0x490
[   32.407022]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   32.407478]  kthread+0x257/0x310
[   32.407864]  ret_from_fork+0x41/0x80
[   32.408319]  ret_from_fork_asm+0x1a/0x30
[   32.408842] 
[   32.409110] The buggy address belongs to the object at ffff888102a0ec00
[   32.409110]  which belongs to the cache kmalloc-64 of size 64
[   32.409989] The buggy address is located 0 bytes to the right of
[   32.409989]  allocated 48-byte region [ffff888102a0ec00, ffff888102a0ec30)
[   32.410900] 
[   32.411163] The buggy address belongs to the physical page:
[   32.411815] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a0e
[   32.412528] flags: 0x200000000000000(node=0|zone=2)
[   32.413054] page_type: f5(slab)
[   32.413483] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   32.414147] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   32.415015] page dumped because: kasan: bad access detected
[   32.415479] 
[   32.415659] Memory state around the buggy address:
[   32.416219]  ffff888102a0eb00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.416814]  ffff888102a0eb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.417569] >ffff888102a0ec00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   32.418152]                                      ^
[   32.418645]  ffff888102a0ec80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.419095]  ffff888102a0ed00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.419999] ==================================================================
[   33.280875] ==================================================================
[   33.281533] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a1e/0x5450
[   33.282834] Read of size 4 at addr ffff888102a0ec30 by task kunit_try_catch/272
[   33.283302] 
[   33.283586] CPU: 1 UID: 0 PID: 272 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241205 #1
[   33.284966] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.285339] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   33.285971] Call Trace:
[   33.286377]  <TASK>
[   33.286664]  dump_stack_lvl+0x73/0xb0
[   33.287168]  print_report+0xd1/0x640
[   33.287817]  ? __virt_addr_valid+0x1db/0x2d0
[   33.288241]  ? kasan_complete_mode_report_info+0x2a/0x200
[   33.289002]  kasan_report+0x102/0x140
[   33.289493]  ? kasan_atomics_helper+0x4a1e/0x5450
[   33.289875]  ? kasan_atomics_helper+0x4a1e/0x5450
[   33.290843]  __asan_report_load4_noabort+0x18/0x20
[   33.291492]  kasan_atomics_helper+0x4a1e/0x5450
[   33.292043]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   33.292445]  ? __kmalloc_cache_noprof+0x184/0x410
[   33.293091]  ? kasan_atomics+0x153/0x310
[   33.293621]  kasan_atomics+0x1dd/0x310
[   33.294213]  ? __pfx_kasan_atomics+0x10/0x10
[   33.294618]  ? __pfx_read_tsc+0x10/0x10
[   33.295443]  ? ktime_get_ts64+0x86/0x230
[   33.295833]  kunit_try_run_case+0x1b3/0x490
[   33.296388]  ? __pfx_kunit_try_run_case+0x10/0x10
[   33.297155]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   33.297605]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   33.298588]  ? __kthread_parkme+0x82/0x160
[   33.298991]  ? preempt_count_sub+0x50/0x80
[   33.299621]  ? __pfx_kunit_try_run_case+0x10/0x10
[   33.300078]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   33.300854]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   33.301460]  kthread+0x257/0x310
[   33.302096]  ? __pfx_kthread+0x10/0x10
[   33.302422]  ret_from_fork+0x41/0x80
[   33.303106]  ? __pfx_kthread+0x10/0x10
[   33.303519]  ret_from_fork_asm+0x1a/0x30
[   33.304076]  </TASK>
[   33.304428] 
[   33.304729] Allocated by task 272:
[   33.305013]  kasan_save_stack+0x3d/0x60
[   33.305524]  kasan_save_track+0x18/0x40
[   33.305952]  kasan_save_alloc_info+0x3b/0x50
[   33.306532]  __kasan_kmalloc+0xb7/0xc0
[   33.307116]  __kmalloc_cache_noprof+0x184/0x410
[   33.307608]  kasan_atomics+0x96/0x310
[   33.308338]  kunit_try_run_case+0x1b3/0x490
[   33.309206]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   33.309712]  kthread+0x257/0x310
[   33.310769]  ret_from_fork+0x41/0x80
[   33.311371]  ret_from_fork_asm+0x1a/0x30
[   33.312132] 
[   33.312325] The buggy address belongs to the object at ffff888102a0ec00
[   33.312325]  which belongs to the cache kmalloc-64 of size 64
[   33.313875] The buggy address is located 0 bytes to the right of
[   33.313875]  allocated 48-byte region [ffff888102a0ec00, ffff888102a0ec30)
[   33.315425] 
[   33.315666] The buggy address belongs to the physical page:
[   33.316715] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a0e
[   33.317402] flags: 0x200000000000000(node=0|zone=2)
[   33.318064] page_type: f5(slab)
[   33.318325] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   33.319478] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   33.320156] page dumped because: kasan: bad access detected
[   33.320938] 
[   33.321419] Memory state around the buggy address:
[   33.321637]  ffff888102a0eb00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.322812]  ffff888102a0eb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.323461] >ffff888102a0ec00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   33.324271]                                      ^
[   33.324747]  ffff888102a0ec80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.325354]  ffff888102a0ed00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.325946] ==================================================================
[   32.058845] ==================================================================
[   32.059904] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4ba4/0x5450
[   32.060759] Write of size 4 at addr ffff888102a0ec30 by task kunit_try_catch/272
[   32.061611] 
[   32.062010] CPU: 1 UID: 0 PID: 272 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241205 #1
[   32.063611] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.064287] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   32.065228] Call Trace:
[   32.065864]  <TASK>
[   32.066395]  dump_stack_lvl+0x73/0xb0
[   32.067039]  print_report+0xd1/0x640
[   32.067661]  ? __virt_addr_valid+0x1db/0x2d0
[   32.068282]  ? kasan_complete_mode_report_info+0x2a/0x200
[   32.069191]  kasan_report+0x102/0x140
[   32.069728]  ? kasan_atomics_helper+0x4ba4/0x5450
[   32.070517]  ? kasan_atomics_helper+0x4ba4/0x5450
[   32.071127]  __asan_report_store4_noabort+0x1b/0x30
[   32.072009]  kasan_atomics_helper+0x4ba4/0x5450
[   32.072718]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   32.073381]  ? __kmalloc_cache_noprof+0x184/0x410
[   32.074021]  ? kasan_atomics+0x153/0x310
[   32.074749]  kasan_atomics+0x1dd/0x310
[   32.075298]  ? __pfx_kasan_atomics+0x10/0x10
[   32.076094]  ? __pfx_read_tsc+0x10/0x10
[   32.076673]  ? ktime_get_ts64+0x86/0x230
[   32.077219]  kunit_try_run_case+0x1b3/0x490
[   32.078224]  ? __pfx_kunit_try_run_case+0x10/0x10
[   32.078735]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   32.079598]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   32.080316]  ? __kthread_parkme+0x82/0x160
[   32.080852]  ? preempt_count_sub+0x50/0x80
[   32.081303]  ? __pfx_kunit_try_run_case+0x10/0x10
[   32.081933]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   32.082770]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   32.083418]  kthread+0x257/0x310
[   32.084028]  ? __pfx_kthread+0x10/0x10
[   32.084752]  ret_from_fork+0x41/0x80
[   32.085175]  ? __pfx_kthread+0x10/0x10
[   32.085788]  ret_from_fork_asm+0x1a/0x30
[   32.086325]  </TASK>
[   32.086703] 
[   32.086942] Allocated by task 272:
[   32.087293]  kasan_save_stack+0x3d/0x60
[   32.088060]  kasan_save_track+0x18/0x40
[   32.088616]  kasan_save_alloc_info+0x3b/0x50
[   32.089387]  __kasan_kmalloc+0xb7/0xc0
[   32.090020]  __kmalloc_cache_noprof+0x184/0x410
[   32.090601]  kasan_atomics+0x96/0x310
[   32.091117]  kunit_try_run_case+0x1b3/0x490
[   32.091729]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   32.092315]  kthread+0x257/0x310
[   32.092901]  ret_from_fork+0x41/0x80
[   32.093533]  ret_from_fork_asm+0x1a/0x30
[   32.094335] 
[   32.094590] The buggy address belongs to the object at ffff888102a0ec00
[   32.094590]  which belongs to the cache kmalloc-64 of size 64
[   32.095984] The buggy address is located 0 bytes to the right of
[   32.095984]  allocated 48-byte region [ffff888102a0ec00, ffff888102a0ec30)
[   32.097211] 
[   32.097383] The buggy address belongs to the physical page:
[   32.098467] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a0e
[   32.099257] flags: 0x200000000000000(node=0|zone=2)
[   32.099993] page_type: f5(slab)
[   32.100459] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   32.101482] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   32.102316] page dumped because: kasan: bad access detected
[   32.102978] 
[   32.103234] Memory state around the buggy address:
[   32.103880]  ffff888102a0eb00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.104594]  ffff888102a0eb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.105660] >ffff888102a0ec00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   32.106513]                                      ^
[   32.106831]  ffff888102a0ec80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.107545]  ffff888102a0ed00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.108563] ==================================================================
[   32.333481] ==================================================================
[   32.334185] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b3c/0x5450
[   32.335257] Write of size 4 at addr ffff888102a0ec30 by task kunit_try_catch/272
[   32.336099] 
[   32.336398] CPU: 1 UID: 0 PID: 272 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241205 #1
[   32.337358] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.337745] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   32.338675] Call Trace:
[   32.338983]  <TASK>
[   32.339361]  dump_stack_lvl+0x73/0xb0
[   32.339945]  print_report+0xd1/0x640
[   32.340487]  ? __virt_addr_valid+0x1db/0x2d0
[   32.340985]  ? kasan_complete_mode_report_info+0x2a/0x200
[   32.341616]  kasan_report+0x102/0x140
[   32.341988]  ? kasan_atomics_helper+0x4b3c/0x5450
[   32.342436]  ? kasan_atomics_helper+0x4b3c/0x5450
[   32.343127]  __asan_report_store4_noabort+0x1b/0x30
[   32.343581]  kasan_atomics_helper+0x4b3c/0x5450
[   32.344309]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   32.344746]  ? __kmalloc_cache_noprof+0x184/0x410
[   32.345460]  ? kasan_atomics+0x153/0x310
[   32.346104]  kasan_atomics+0x1dd/0x310
[   32.346574]  ? __pfx_kasan_atomics+0x10/0x10
[   32.347216]  ? __pfx_read_tsc+0x10/0x10
[   32.347845]  ? ktime_get_ts64+0x86/0x230
[   32.348220]  kunit_try_run_case+0x1b3/0x490
[   32.348820]  ? __pfx_kunit_try_run_case+0x10/0x10
[   32.349403]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   32.349906]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   32.350570]  ? __kthread_parkme+0x82/0x160
[   32.351067]  ? preempt_count_sub+0x50/0x80
[   32.351557]  ? __pfx_kunit_try_run_case+0x10/0x10
[   32.352227]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   32.352919]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   32.353589]  kthread+0x257/0x310
[   32.354014]  ? __pfx_kthread+0x10/0x10
[   32.354482]  ret_from_fork+0x41/0x80
[   32.354999]  ? __pfx_kthread+0x10/0x10
[   32.355514]  ret_from_fork_asm+0x1a/0x30
[   32.356083]  </TASK>
[   32.356377] 
[   32.356708] Allocated by task 272:
[   32.357083]  kasan_save_stack+0x3d/0x60
[   32.357509]  kasan_save_track+0x18/0x40
[   32.358122]  kasan_save_alloc_info+0x3b/0x50
[   32.358513]  __kasan_kmalloc+0xb7/0xc0
[   32.359152]  __kmalloc_cache_noprof+0x184/0x410
[   32.359636]  kasan_atomics+0x96/0x310
[   32.360128]  kunit_try_run_case+0x1b3/0x490
[   32.360641]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   32.361220]  kthread+0x257/0x310
[   32.361700]  ret_from_fork+0x41/0x80
[   32.362225]  ret_from_fork_asm+0x1a/0x30
[   32.362577] 
[   32.363315] The buggy address belongs to the object at ffff888102a0ec00
[   32.363315]  which belongs to the cache kmalloc-64 of size 64
[   32.364508] The buggy address is located 0 bytes to the right of
[   32.364508]  allocated 48-byte region [ffff888102a0ec00, ffff888102a0ec30)
[   32.365749] 
[   32.366216] The buggy address belongs to the physical page:
[   32.366851] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a0e
[   32.367569] flags: 0x200000000000000(node=0|zone=2)
[   32.368098] page_type: f5(slab)
[   32.368395] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   32.369636] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   32.370872] page dumped because: kasan: bad access detected
[   32.371331] 
[   32.371816] Memory state around the buggy address:
[   32.372475]  ffff888102a0eb00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.373251]  ffff888102a0eb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.374108] >ffff888102a0ec00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   32.375108]                                      ^
[   32.375608]  ffff888102a0ec80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.376489]  ffff888102a0ed00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.377580] ==================================================================
[   34.058127] ==================================================================
[   34.059017] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x194b/0x5450
[   34.059880] Write of size 8 at addr ffff888102a0ec30 by task kunit_try_catch/272
[   34.060745] 
[   34.061188] CPU: 1 UID: 0 PID: 272 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241205 #1
[   34.062050] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.062595] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   34.063470] Call Trace:
[   34.064001]  <TASK>
[   34.064267]  dump_stack_lvl+0x73/0xb0
[   34.064677]  print_report+0xd1/0x640
[   34.065055]  ? __virt_addr_valid+0x1db/0x2d0
[   34.065323]  ? kasan_complete_mode_report_info+0x2a/0x200
[   34.065576]  kasan_report+0x102/0x140
[   34.066001]  ? kasan_atomics_helper+0x194b/0x5450
[   34.067652]  ? kasan_atomics_helper+0x194b/0x5450
[   34.068338]  kasan_check_range+0x10c/0x1c0
[   34.068997]  __kasan_check_write+0x18/0x20
[   34.069488]  kasan_atomics_helper+0x194b/0x5450
[   34.070122]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   34.070782]  ? __kmalloc_cache_noprof+0x184/0x410
[   34.071441]  ? kasan_atomics+0x153/0x310
[   34.071906]  kasan_atomics+0x1dd/0x310
[   34.072724]  ? __pfx_kasan_atomics+0x10/0x10
[   34.073375]  ? __pfx_read_tsc+0x10/0x10
[   34.074062]  ? ktime_get_ts64+0x86/0x230
[   34.074531]  kunit_try_run_case+0x1b3/0x490
[   34.075900]  ? __pfx_kunit_try_run_case+0x10/0x10
[   34.076316]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   34.077063]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   34.077694]  ? __kthread_parkme+0x82/0x160
[   34.078550]  ? preempt_count_sub+0x50/0x80
[   34.079225]  ? __pfx_kunit_try_run_case+0x10/0x10
[   34.079741]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   34.080832]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   34.081560]  kthread+0x257/0x310
[   34.082577]  ? __pfx_kthread+0x10/0x10
[   34.082999]  ret_from_fork+0x41/0x80
[   34.083638]  ? __pfx_kthread+0x10/0x10
[   34.084365]  ret_from_fork_asm+0x1a/0x30
[   34.085309]  </TASK>
[   34.085617] 
[   34.085819] Allocated by task 272:
[   34.086410]  kasan_save_stack+0x3d/0x60
[   34.087064]  kasan_save_track+0x18/0x40
[   34.087562]  kasan_save_alloc_info+0x3b/0x50
[   34.088181]  __kasan_kmalloc+0xb7/0xc0
[   34.088662]  __kmalloc_cache_noprof+0x184/0x410
[   34.089323]  kasan_atomics+0x96/0x310
[   34.089829]  kunit_try_run_case+0x1b3/0x490
[   34.090212]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   34.090722]  kthread+0x257/0x310
[   34.091072]  ret_from_fork+0x41/0x80
[   34.091516]  ret_from_fork_asm+0x1a/0x30
[   34.092027] 
[   34.092199] The buggy address belongs to the object at ffff888102a0ec00
[   34.092199]  which belongs to the cache kmalloc-64 of size 64
[   34.093534] The buggy address is located 0 bytes to the right of
[   34.093534]  allocated 48-byte region [ffff888102a0ec00, ffff888102a0ec30)
[   34.094854] 
[   34.095147] The buggy address belongs to the physical page:
[   34.095805] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a0e
[   34.096707] flags: 0x200000000000000(node=0|zone=2)
[   34.097324] page_type: f5(slab)
[   34.097840] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   34.098666] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   34.099479] page dumped because: kasan: bad access detected
[   34.100125] 
[   34.100437] Memory state around the buggy address:
[   34.101107]  ffff888102a0eb00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   34.101847]  ffff888102a0eb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   34.102537] >ffff888102a0ec00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   34.103325]                                      ^
[   34.103854]  ffff888102a0ec80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.104629]  ffff888102a0ed00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.105410] ==================================================================
[   34.307893] ==================================================================
[   34.308620] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4f32/0x5450
[   34.309273] Read of size 8 at addr ffff888102a0ec30 by task kunit_try_catch/272
[   34.309774] 
[   34.310254] CPU: 1 UID: 0 PID: 272 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241205 #1
[   34.312480] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.313560] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   34.315092] Call Trace:
[   34.315403]  <TASK>
[   34.315752]  dump_stack_lvl+0x73/0xb0
[   34.316187]  print_report+0xd1/0x640
[   34.316736]  ? __virt_addr_valid+0x1db/0x2d0
[   34.317437]  ? kasan_complete_mode_report_info+0x2a/0x200
[   34.318066]  kasan_report+0x102/0x140
[   34.318636]  ? kasan_atomics_helper+0x4f32/0x5450
[   34.319225]  ? kasan_atomics_helper+0x4f32/0x5450
[   34.319840]  __asan_report_load8_noabort+0x18/0x20
[   34.320739]  kasan_atomics_helper+0x4f32/0x5450
[   34.321357]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   34.322000]  ? __kmalloc_cache_noprof+0x184/0x410
[   34.322611]  ? kasan_atomics+0x153/0x310
[   34.323367]  kasan_atomics+0x1dd/0x310
[   34.323938]  ? __pfx_kasan_atomics+0x10/0x10
[   34.324534]  ? __pfx_read_tsc+0x10/0x10
[   34.325155]  ? ktime_get_ts64+0x86/0x230
[   34.325699]  kunit_try_run_case+0x1b3/0x490
[   34.326146]  ? __pfx_kunit_try_run_case+0x10/0x10
[   34.326856]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   34.327377]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   34.328106]  ? __kthread_parkme+0x82/0x160
[   34.328727]  ? preempt_count_sub+0x50/0x80
[   34.329236]  ? __pfx_kunit_try_run_case+0x10/0x10
[   34.329937]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   34.330592]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   34.331437]  kthread+0x257/0x310
[   34.332011]  ? __pfx_kthread+0x10/0x10
[   34.332523]  ret_from_fork+0x41/0x80
[   34.333086]  ? __pfx_kthread+0x10/0x10
[   34.333624]  ret_from_fork_asm+0x1a/0x30
[   34.334367]  </TASK>
[   34.334843] 
[   34.335051] Allocated by task 272:
[   34.335508]  kasan_save_stack+0x3d/0x60
[   34.336030]  kasan_save_track+0x18/0x40
[   34.336665]  kasan_save_alloc_info+0x3b/0x50
[   34.337254]  __kasan_kmalloc+0xb7/0xc0
[   34.337670]  __kmalloc_cache_noprof+0x184/0x410
[   34.338244]  kasan_atomics+0x96/0x310
[   34.338954]  kunit_try_run_case+0x1b3/0x490
[   34.339287]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   34.340255]  kthread+0x257/0x310
[   34.340829]  ret_from_fork+0x41/0x80
[   34.341251]  ret_from_fork_asm+0x1a/0x30
[   34.341896] 
[   34.342162] The buggy address belongs to the object at ffff888102a0ec00
[   34.342162]  which belongs to the cache kmalloc-64 of size 64
[   34.343405] The buggy address is located 0 bytes to the right of
[   34.343405]  allocated 48-byte region [ffff888102a0ec00, ffff888102a0ec30)
[   34.344590] 
[   34.345031] The buggy address belongs to the physical page:
[   34.345501] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a0e
[   34.346322] flags: 0x200000000000000(node=0|zone=2)
[   34.346951] page_type: f5(slab)
[   34.347346] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   34.348298] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   34.349089] page dumped because: kasan: bad access detected
[   34.349623] 
[   34.349953] Memory state around the buggy address:
[   34.350571]  ffff888102a0eb00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   34.351386]  ffff888102a0eb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   34.352046] >ffff888102a0ec00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   34.352895]                                      ^
[   34.353371]  ffff888102a0ec80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.354312]  ffff888102a0ed00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.355287] ==================================================================
[   32.462526] ==================================================================
[   32.463425] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x698/0x5450
[   32.464436] Write of size 4 at addr ffff888102a0ec30 by task kunit_try_catch/272
[   32.465316] 
[   32.465606] CPU: 1 UID: 0 PID: 272 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241205 #1
[   32.466594] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.467226] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   32.468180] Call Trace:
[   32.468557]  <TASK>
[   32.469050]  dump_stack_lvl+0x73/0xb0
[   32.469531]  print_report+0xd1/0x640
[   32.470110]  ? __virt_addr_valid+0x1db/0x2d0
[   32.470642]  ? kasan_complete_mode_report_info+0x2a/0x200
[   32.471488]  kasan_report+0x102/0x140
[   32.472054]  ? kasan_atomics_helper+0x698/0x5450
[   32.472577]  ? kasan_atomics_helper+0x698/0x5450
[   32.473225]  kasan_check_range+0x10c/0x1c0
[   32.473711]  __kasan_check_write+0x18/0x20
[   32.474414]  kasan_atomics_helper+0x698/0x5450
[   32.475095]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   32.476143]  ? __kmalloc_cache_noprof+0x184/0x410
[   32.476487]  ? kasan_atomics+0x153/0x310
[   32.477086]  kasan_atomics+0x1dd/0x310
[   32.477496]  ? __pfx_kasan_atomics+0x10/0x10
[   32.477830]  ? __pfx_read_tsc+0x10/0x10
[   32.478326]  ? ktime_get_ts64+0x86/0x230
[   32.478676]  kunit_try_run_case+0x1b3/0x490
[   32.479024]  ? __pfx_kunit_try_run_case+0x10/0x10
[   32.479976]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   32.480397]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   32.480954]  ? __kthread_parkme+0x82/0x160
[   32.481546]  ? preempt_count_sub+0x50/0x80
[   32.482191]  ? __pfx_kunit_try_run_case+0x10/0x10
[   32.482822]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   32.483504]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   32.484142]  kthread+0x257/0x310
[   32.484746]  ? __pfx_kthread+0x10/0x10
[   32.485288]  ret_from_fork+0x41/0x80
[   32.485629]  ? __pfx_kthread+0x10/0x10
[   32.486075]  ret_from_fork_asm+0x1a/0x30
[   32.486486]  </TASK>
[   32.486886] 
[   32.487160] Allocated by task 272:
[   32.488016]  kasan_save_stack+0x3d/0x60
[   32.488477]  kasan_save_track+0x18/0x40
[   32.488953]  kasan_save_alloc_info+0x3b/0x50
[   32.489663]  __kasan_kmalloc+0xb7/0xc0
[   32.490406]  __kmalloc_cache_noprof+0x184/0x410
[   32.491047]  kasan_atomics+0x96/0x310
[   32.491524]  kunit_try_run_case+0x1b3/0x490
[   32.491944]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   32.492487]  kthread+0x257/0x310
[   32.492805]  ret_from_fork+0x41/0x80
[   32.493297]  ret_from_fork_asm+0x1a/0x30
[   32.493650] 
[   32.494059] The buggy address belongs to the object at ffff888102a0ec00
[   32.494059]  which belongs to the cache kmalloc-64 of size 64
[   32.495182] The buggy address is located 0 bytes to the right of
[   32.495182]  allocated 48-byte region [ffff888102a0ec00, ffff888102a0ec30)
[   32.496330] 
[   32.496506] The buggy address belongs to the physical page:
[   32.497247] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a0e
[   32.497971] flags: 0x200000000000000(node=0|zone=2)
[   32.498557] page_type: f5(slab)
[   32.499093] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   32.499966] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   32.500712] page dumped because: kasan: bad access detected
[   32.501351] 
[   32.501610] Memory state around the buggy address:
[   32.502172]  ffff888102a0eb00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.502923]  ffff888102a0eb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.503623] >ffff888102a0ec00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   32.504352]                                      ^
[   32.504947]  ffff888102a0ec80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.505671]  ffff888102a0ed00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.506403] ==================================================================
[   34.581619] ==================================================================
[   34.582210] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4f73/0x5450
[   34.583116] Read of size 8 at addr ffff888102a0ec30 by task kunit_try_catch/272
[   34.583778] 
[   34.584072] CPU: 1 UID: 0 PID: 272 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241205 #1
[   34.585425] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.586023] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   34.586998] Call Trace:
[   34.587384]  <TASK>
[   34.587945]  dump_stack_lvl+0x73/0xb0
[   34.588325]  print_report+0xd1/0x640
[   34.589019]  ? __virt_addr_valid+0x1db/0x2d0
[   34.589632]  ? kasan_complete_mode_report_info+0x2a/0x200
[   34.590441]  kasan_report+0x102/0x140
[   34.591007]  ? kasan_atomics_helper+0x4f73/0x5450
[   34.591742]  ? kasan_atomics_helper+0x4f73/0x5450
[   34.592501]  __asan_report_load8_noabort+0x18/0x20
[   34.593208]  kasan_atomics_helper+0x4f73/0x5450
[   34.593877]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   34.594357]  ? __kmalloc_cache_noprof+0x184/0x410
[   34.595091]  ? kasan_atomics+0x153/0x310
[   34.595821]  kasan_atomics+0x1dd/0x310
[   34.596496]  ? __pfx_kasan_atomics+0x10/0x10
[   34.597047]  ? __pfx_read_tsc+0x10/0x10
[   34.597584]  ? ktime_get_ts64+0x86/0x230
[   34.598224]  kunit_try_run_case+0x1b3/0x490
[   34.598817]  ? __pfx_kunit_try_run_case+0x10/0x10
[   34.599399]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   34.600042]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   34.600717]  ? __kthread_parkme+0x82/0x160
[   34.601243]  ? preempt_count_sub+0x50/0x80
[   34.601765]  ? __pfx_kunit_try_run_case+0x10/0x10
[   34.602461]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   34.603330]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   34.604094]  kthread+0x257/0x310
[   34.604533]  ? __pfx_kthread+0x10/0x10
[   34.604964]  ret_from_fork+0x41/0x80
[   34.605521]  ? __pfx_kthread+0x10/0x10
[   34.605992]  ret_from_fork_asm+0x1a/0x30
[   34.606407]  </TASK>
[   34.606648] 
[   34.607019] Allocated by task 272:
[   34.607549]  kasan_save_stack+0x3d/0x60
[   34.607930]  kasan_save_track+0x18/0x40
[   34.608449]  kasan_save_alloc_info+0x3b/0x50
[   34.609016]  __kasan_kmalloc+0xb7/0xc0
[   34.609476]  __kmalloc_cache_noprof+0x184/0x410
[   34.609854]  kasan_atomics+0x96/0x310
[   34.610519]  kunit_try_run_case+0x1b3/0x490
[   34.610875]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   34.611510]  kthread+0x257/0x310
[   34.612070]  ret_from_fork+0x41/0x80
[   34.612470]  ret_from_fork_asm+0x1a/0x30
[   34.613419] 
[   34.613600] The buggy address belongs to the object at ffff888102a0ec00
[   34.613600]  which belongs to the cache kmalloc-64 of size 64
[   34.614262] The buggy address is located 0 bytes to the right of
[   34.614262]  allocated 48-byte region [ffff888102a0ec00, ffff888102a0ec30)
[   34.615080] 
[   34.615504] The buggy address belongs to the physical page:
[   34.616395] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a0e
[   34.617231] flags: 0x200000000000000(node=0|zone=2)
[   34.617828] page_type: f5(slab)
[   34.618235] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   34.618985] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   34.619729] page dumped because: kasan: bad access detected
[   34.620358] 
[   34.620589] Memory state around the buggy address:
[   34.621160]  ffff888102a0eb00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   34.621897]  ffff888102a0eb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   34.622475] >ffff888102a0ec00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   34.623261]                                      ^
[   34.623806]  ffff888102a0ec80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.624559]  ffff888102a0ed00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.625360] ==================================================================