Hay
Date
Dec. 3, 2024, 11:38 p.m.

Environment
qemu-arm64
qemu-x86_64

[   35.024037] ==================================================================
[   35.025024] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4e4/0x4858
[   35.026081] Write of size 4 at addr fff00000c594f1b0 by task kunit_try_catch/254
[   35.027718] 
[   35.028124] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241203 #1
[   35.029251] Tainted: [B]=BAD_PAGE, [N]=TEST
[   35.029771] Hardware name: linux,dummy-virt (DT)
[   35.030402] Call trace:
[   35.030870]  show_stack+0x20/0x38 (C)
[   35.031456]  dump_stack_lvl+0x8c/0xd0
[   35.032121]  print_report+0x118/0x5e0
[   35.032714]  kasan_report+0xc8/0x118
[   35.033184]  kasan_check_range+0x100/0x1a8
[   35.033937]  __kasan_check_write+0x20/0x30
[   35.034531]  kasan_atomics_helper+0x4e4/0x4858
[   35.035185]  kasan_atomics+0x198/0x2e8
[   35.035819]  kunit_try_run_case+0x14c/0x3d0
[   35.036503]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.037272]  kthread+0x24c/0x2d0
[   35.037900]  ret_from_fork+0x10/0x20
[   35.038513] 
[   35.038833] Allocated by task 254:
[   35.039302]  kasan_save_stack+0x3c/0x68
[   35.039866]  kasan_save_track+0x20/0x40
[   35.040530]  kasan_save_alloc_info+0x40/0x58
[   35.041103]  __kasan_kmalloc+0xd4/0xd8
[   35.041808]  __kmalloc_cache_noprof+0x15c/0x3c0
[   35.042490]  kasan_atomics+0xb8/0x2e8
[   35.043027]  kunit_try_run_case+0x14c/0x3d0
[   35.043670]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.044400]  kthread+0x24c/0x2d0
[   35.044859]  ret_from_fork+0x10/0x20
[   35.045461] 
[   35.045852] The buggy address belongs to the object at fff00000c594f180
[   35.045852]  which belongs to the cache kmalloc-64 of size 64
[   35.047378] The buggy address is located 0 bytes to the right of
[   35.047378]  allocated 48-byte region [fff00000c594f180, fff00000c594f1b0)
[   35.048819] 
[   35.049167] The buggy address belongs to the physical page:
[   35.049916] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10594f
[   35.050856] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   35.051687] page_type: f5(slab)
[   35.052246] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   35.053175] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   35.054132] page dumped because: kasan: bad access detected
[   35.054812] 
[   35.055135] Memory state around the buggy address:
[   35.055807]  fff00000c594f080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.056707]  fff00000c594f100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.057563] >fff00000c594f180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   35.058463]                                      ^
[   35.059192]  fff00000c594f200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.060084]  fff00000c594f280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.060964] ==================================================================
[   36.482177] ==================================================================
[   36.483515] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x126c/0x4858
[   36.484102] Write of size 8 at addr fff00000c594f1b0 by task kunit_try_catch/254
[   36.485318] 
[   36.485893] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241203 #1
[   36.487246] Tainted: [B]=BAD_PAGE, [N]=TEST
[   36.488042] Hardware name: linux,dummy-virt (DT)
[   36.488735] Call trace:
[   36.489186]  show_stack+0x20/0x38 (C)
[   36.489900]  dump_stack_lvl+0x8c/0xd0
[   36.490507]  print_report+0x118/0x5e0
[   36.491087]  kasan_report+0xc8/0x118
[   36.491735]  kasan_check_range+0x100/0x1a8
[   36.492431]  __kasan_check_write+0x20/0x30
[   36.493199]  kasan_atomics_helper+0x126c/0x4858
[   36.493952]  kasan_atomics+0x198/0x2e8
[   36.494586]  kunit_try_run_case+0x14c/0x3d0
[   36.495373]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.496155]  kthread+0x24c/0x2d0
[   36.496732]  ret_from_fork+0x10/0x20
[   36.497400] 
[   36.497742] Allocated by task 254:
[   36.498412]  kasan_save_stack+0x3c/0x68
[   36.499056]  kasan_save_track+0x20/0x40
[   36.499758]  kasan_save_alloc_info+0x40/0x58
[   36.500440]  __kasan_kmalloc+0xd4/0xd8
[   36.501074]  __kmalloc_cache_noprof+0x15c/0x3c0
[   36.501813]  kasan_atomics+0xb8/0x2e8
[   36.502437]  kunit_try_run_case+0x14c/0x3d0
[   36.503125]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.503893]  kthread+0x24c/0x2d0
[   36.504467]  ret_from_fork+0x10/0x20
[   36.505169] 
[   36.505573] The buggy address belongs to the object at fff00000c594f180
[   36.505573]  which belongs to the cache kmalloc-64 of size 64
[   36.507053] The buggy address is located 0 bytes to the right of
[   36.507053]  allocated 48-byte region [fff00000c594f180, fff00000c594f1b0)
[   36.509004] 
[   36.509400] The buggy address belongs to the physical page:
[   36.510081] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10594f
[   36.511411] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   36.512430] page_type: f5(slab)
[   36.513135] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   36.514275] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   36.515380] page dumped because: kasan: bad access detected
[   36.516281] 
[   36.516816] Memory state around the buggy address:
[   36.517611]  fff00000c594f080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   36.518228]  fff00000c594f100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   36.518819] >fff00000c594f180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   36.519758]                                      ^
[   36.521228]  fff00000c594f200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.522022]  fff00000c594f280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.523145] ==================================================================
[   37.059861] ==================================================================
[   37.060792] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x175c/0x4858
[   37.062737] Write of size 8 at addr fff00000c594f1b0 by task kunit_try_catch/254
[   37.063849] 
[   37.064388] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241203 #1
[   37.065756] Tainted: [B]=BAD_PAGE, [N]=TEST
[   37.066489] Hardware name: linux,dummy-virt (DT)
[   37.067087] Call trace:
[   37.067759]  show_stack+0x20/0x38 (C)
[   37.068470]  dump_stack_lvl+0x8c/0xd0
[   37.069243]  print_report+0x118/0x5e0
[   37.070031]  kasan_report+0xc8/0x118
[   37.070688]  kasan_check_range+0x100/0x1a8
[   37.071457]  __kasan_check_write+0x20/0x30
[   37.072180]  kasan_atomics_helper+0x175c/0x4858
[   37.073092]  kasan_atomics+0x198/0x2e8
[   37.073876]  kunit_try_run_case+0x14c/0x3d0
[   37.074657]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.075530]  kthread+0x24c/0x2d0
[   37.076031]  ret_from_fork+0x10/0x20
[   37.076619] 
[   37.076944] Allocated by task 254:
[   37.077869]  kasan_save_stack+0x3c/0x68
[   37.078471]  kasan_save_track+0x20/0x40
[   37.079200]  kasan_save_alloc_info+0x40/0x58
[   37.079779]  __kasan_kmalloc+0xd4/0xd8
[   37.080071]  __kmalloc_cache_noprof+0x15c/0x3c0
[   37.080451]  kasan_atomics+0xb8/0x2e8
[   37.081127]  kunit_try_run_case+0x14c/0x3d0
[   37.081876]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.082797]  kthread+0x24c/0x2d0
[   37.083438]  ret_from_fork+0x10/0x20
[   37.084110] 
[   37.084680] The buggy address belongs to the object at fff00000c594f180
[   37.084680]  which belongs to the cache kmalloc-64 of size 64
[   37.086239] The buggy address is located 0 bytes to the right of
[   37.086239]  allocated 48-byte region [fff00000c594f180, fff00000c594f1b0)
[   37.087836] 
[   37.088207] The buggy address belongs to the physical page:
[   37.088985] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10594f
[   37.090125] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   37.091017] page_type: f5(slab)
[   37.091604] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   37.092612] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   37.093580] page dumped because: kasan: bad access detected
[   37.094384] 
[   37.094720] Memory state around the buggy address:
[   37.095447]  fff00000c594f080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   37.096506]  fff00000c594f100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   37.097448] >fff00000c594f180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   37.098432]                                      ^
[   37.099162]  fff00000c594f200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.100047]  fff00000c594f280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.100963] ==================================================================
[   35.255634] ==================================================================
[   35.256414] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x760/0x4858
[   35.257370] Write of size 4 at addr fff00000c594f1b0 by task kunit_try_catch/254
[   35.259180] 
[   35.259541] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241203 #1
[   35.260725] Tainted: [B]=BAD_PAGE, [N]=TEST
[   35.261267] Hardware name: linux,dummy-virt (DT)
[   35.261924] Call trace:
[   35.262360]  show_stack+0x20/0x38 (C)
[   35.262952]  dump_stack_lvl+0x8c/0xd0
[   35.263539]  print_report+0x118/0x5e0
[   35.264127]  kasan_report+0xc8/0x118
[   35.264755]  kasan_check_range+0x100/0x1a8
[   35.265439]  __kasan_check_write+0x20/0x30
[   35.266183]  kasan_atomics_helper+0x760/0x4858
[   35.266868]  kasan_atomics+0x198/0x2e8
[   35.267427]  kunit_try_run_case+0x14c/0x3d0
[   35.268063]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.268794]  kthread+0x24c/0x2d0
[   35.269404]  ret_from_fork+0x10/0x20
[   35.270001] 
[   35.270423] Allocated by task 254:
[   35.270867]  kasan_save_stack+0x3c/0x68
[   35.271597]  kasan_save_track+0x20/0x40
[   35.272136]  kasan_save_alloc_info+0x40/0x58
[   35.272805]  __kasan_kmalloc+0xd4/0xd8
[   35.273384]  __kmalloc_cache_noprof+0x15c/0x3c0
[   35.274043]  kasan_atomics+0xb8/0x2e8
[   35.274667]  kunit_try_run_case+0x14c/0x3d0
[   35.275243]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.276130]  kthread+0x24c/0x2d0
[   35.276633]  ret_from_fork+0x10/0x20
[   35.277214] 
[   35.277574] The buggy address belongs to the object at fff00000c594f180
[   35.277574]  which belongs to the cache kmalloc-64 of size 64
[   35.278920] The buggy address is located 0 bytes to the right of
[   35.278920]  allocated 48-byte region [fff00000c594f180, fff00000c594f1b0)
[   35.280371] 
[   35.280689] The buggy address belongs to the physical page:
[   35.281498] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10594f
[   35.282392] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   35.283262] page_type: f5(slab)
[   35.283842] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   35.284847] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   35.285773] page dumped because: kasan: bad access detected
[   35.286470] 
[   35.286789] Memory state around the buggy address:
[   35.287445]  fff00000c594f080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.288320]  fff00000c594f100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.289292] >fff00000c594f180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   35.290143]                                      ^
[   35.290859]  fff00000c594f200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.291752]  fff00000c594f280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.292612] ==================================================================
[   34.783678] ==================================================================
[   34.784533] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x40fc/0x4858
[   34.785348] Read of size 4 at addr fff00000c594f1b0 by task kunit_try_catch/254
[   34.786262] 
[   34.786580] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241203 #1
[   34.788078] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.788931] Hardware name: linux,dummy-virt (DT)
[   34.789756] Call trace:
[   34.790291]  show_stack+0x20/0x38 (C)
[   34.790860]  dump_stack_lvl+0x8c/0xd0
[   34.791443]  print_report+0x118/0x5e0
[   34.792013]  kasan_report+0xc8/0x118
[   34.792650]  __asan_report_load4_noabort+0x20/0x30
[   34.793387]  kasan_atomics_helper+0x40fc/0x4858
[   34.794171]  kasan_atomics+0x198/0x2e8
[   34.794719]  kunit_try_run_case+0x14c/0x3d0
[   34.795308]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.796077]  kthread+0x24c/0x2d0
[   34.796761]  ret_from_fork+0x10/0x20
[   34.797258] 
[   34.797639] Allocated by task 254:
[   34.798128]  kasan_save_stack+0x3c/0x68
[   34.798979]  kasan_save_track+0x20/0x40
[   34.799565]  kasan_save_alloc_info+0x40/0x58
[   34.800150]  __kasan_kmalloc+0xd4/0xd8
[   34.800700]  __kmalloc_cache_noprof+0x15c/0x3c0
[   34.801356]  kasan_atomics+0xb8/0x2e8
[   34.802095]  kunit_try_run_case+0x14c/0x3d0
[   34.802673]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.803364]  kthread+0x24c/0x2d0
[   34.803838]  ret_from_fork+0x10/0x20
[   34.804381] 
[   34.804686] The buggy address belongs to the object at fff00000c594f180
[   34.804686]  which belongs to the cache kmalloc-64 of size 64
[   34.806148] The buggy address is located 0 bytes to the right of
[   34.806148]  allocated 48-byte region [fff00000c594f180, fff00000c594f1b0)
[   34.807540] 
[   34.807881] The buggy address belongs to the physical page:
[   34.808511] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10594f
[   34.809536] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   34.810388] page_type: f5(slab)
[   34.810883] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   34.811788] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   34.812693] page dumped because: kasan: bad access detected
[   34.813414] 
[   34.813734] Memory state around the buggy address:
[   34.814493]  fff00000c594f080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   34.815357]  fff00000c594f100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   34.816251] >fff00000c594f180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   34.817108]                                      ^
[   34.817737]  fff00000c594f200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.818632]  fff00000c594f280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.819454] ==================================================================
[   35.138676] ==================================================================
[   35.139839] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x61c/0x4858
[   35.141046] Write of size 4 at addr fff00000c594f1b0 by task kunit_try_catch/254
[   35.142126] 
[   35.142506] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241203 #1
[   35.143786] Tainted: [B]=BAD_PAGE, [N]=TEST
[   35.144465] Hardware name: linux,dummy-virt (DT)
[   35.144984] Call trace:
[   35.145490]  show_stack+0x20/0x38 (C)
[   35.146078]  dump_stack_lvl+0x8c/0xd0
[   35.146739]  print_report+0x118/0x5e0
[   35.147407]  kasan_report+0xc8/0x118
[   35.148011]  kasan_check_range+0x100/0x1a8
[   35.148611]  __kasan_check_write+0x20/0x30
[   35.149252]  kasan_atomics_helper+0x61c/0x4858
[   35.149919]  kasan_atomics+0x198/0x2e8
[   35.150690]  kunit_try_run_case+0x14c/0x3d0
[   35.151309]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.152109]  kthread+0x24c/0x2d0
[   35.152633]  ret_from_fork+0x10/0x20
[   35.153225] 
[   35.153601] Allocated by task 254:
[   35.154102]  kasan_save_stack+0x3c/0x68
[   35.154639]  kasan_save_track+0x20/0x40
[   35.155301]  kasan_save_alloc_info+0x40/0x58
[   35.155920]  __kasan_kmalloc+0xd4/0xd8
[   35.156570]  __kmalloc_cache_noprof+0x15c/0x3c0
[   35.157192]  kasan_atomics+0xb8/0x2e8
[   35.157799]  kunit_try_run_case+0x14c/0x3d0
[   35.158449]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.159073]  kthread+0x24c/0x2d0
[   35.159684]  ret_from_fork+0x10/0x20
[   35.160214] 
[   35.160564] The buggy address belongs to the object at fff00000c594f180
[   35.160564]  which belongs to the cache kmalloc-64 of size 64
[   35.161976] The buggy address is located 0 bytes to the right of
[   35.161976]  allocated 48-byte region [fff00000c594f180, fff00000c594f1b0)
[   35.163376] 
[   35.163696] The buggy address belongs to the physical page:
[   35.164568] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10594f
[   35.165457] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   35.166449] page_type: f5(slab)
[   35.166926] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   35.167883] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   35.168794] page dumped because: kasan: bad access detected
[   35.169493] 
[   35.169808] Memory state around the buggy address:
[   35.170438]  fff00000c594f080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.171296]  fff00000c594f100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.172208] >fff00000c594f180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   35.173152]                                      ^
[   35.173850]  fff00000c594f200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.174757]  fff00000c594f280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.175623] ==================================================================
[   35.887924] ==================================================================
[   35.888666] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xd3c/0x4858
[   35.889577] Write of size 4 at addr fff00000c594f1b0 by task kunit_try_catch/254
[   35.890655] 
[   35.891015] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241203 #1
[   35.892477] Tainted: [B]=BAD_PAGE, [N]=TEST
[   35.893085] Hardware name: linux,dummy-virt (DT)
[   35.893819] Call trace:
[   35.894356]  show_stack+0x20/0x38 (C)
[   35.894952]  dump_stack_lvl+0x8c/0xd0
[   35.895506]  print_report+0x118/0x5e0
[   35.896122]  kasan_report+0xc8/0x118
[   35.896689]  kasan_check_range+0x100/0x1a8
[   35.897265]  __kasan_check_write+0x20/0x30
[   35.897910]  kasan_atomics_helper+0xd3c/0x4858
[   35.898459]  kasan_atomics+0x198/0x2e8
[   35.899208]  kunit_try_run_case+0x14c/0x3d0
[   35.899916]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.900829]  kthread+0x24c/0x2d0
[   35.901383]  ret_from_fork+0x10/0x20
[   35.901955] 
[   35.902305] Allocated by task 254:
[   35.902730]  kasan_save_stack+0x3c/0x68
[   35.903436]  kasan_save_track+0x20/0x40
[   35.904095]  kasan_save_alloc_info+0x40/0x58
[   35.904772]  __kasan_kmalloc+0xd4/0xd8
[   35.905363]  __kmalloc_cache_noprof+0x15c/0x3c0
[   35.906027]  kasan_atomics+0xb8/0x2e8
[   35.906560]  kunit_try_run_case+0x14c/0x3d0
[   35.907279]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.908030]  kthread+0x24c/0x2d0
[   35.908546]  ret_from_fork+0x10/0x20
[   35.909074] 
[   35.909429] The buggy address belongs to the object at fff00000c594f180
[   35.909429]  which belongs to the cache kmalloc-64 of size 64
[   35.910865] The buggy address is located 0 bytes to the right of
[   35.910865]  allocated 48-byte region [fff00000c594f180, fff00000c594f1b0)
[   35.912289] 
[   35.912605] The buggy address belongs to the physical page:
[   35.913431] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10594f
[   35.914390] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   35.915248] page_type: f5(slab)
[   35.915843] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   35.916786] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   35.917724] page dumped because: kasan: bad access detected
[   35.918435] 
[   35.918749] Memory state around the buggy address:
[   35.919390]  fff00000c594f080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.920215]  fff00000c594f100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.921101] >fff00000c594f180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   35.921979]                                      ^
[   35.922636]  fff00000c594f200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.923519]  fff00000c594f280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.924303] ==================================================================
[   36.119499] ==================================================================
[   36.120352] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xeb8/0x4858
[   36.121308] Write of size 8 at addr fff00000c594f1b0 by task kunit_try_catch/254
[   36.122728] 
[   36.123095] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241203 #1
[   36.124173] Tainted: [B]=BAD_PAGE, [N]=TEST
[   36.124945] Hardware name: linux,dummy-virt (DT)
[   36.125600] Call trace:
[   36.126053]  show_stack+0x20/0x38 (C)
[   36.126671]  dump_stack_lvl+0x8c/0xd0
[   36.127171]  print_report+0x118/0x5e0
[   36.127959]  kasan_report+0xc8/0x118
[   36.128655]  kasan_check_range+0x100/0x1a8
[   36.129248]  __kasan_check_write+0x20/0x30
[   36.129901]  kasan_atomics_helper+0xeb8/0x4858
[   36.130600]  kasan_atomics+0x198/0x2e8
[   36.131173]  kunit_try_run_case+0x14c/0x3d0
[   36.131861]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.132671]  kthread+0x24c/0x2d0
[   36.133174]  ret_from_fork+0x10/0x20
[   36.133816] 
[   36.134132] Allocated by task 254:
[   36.134670]  kasan_save_stack+0x3c/0x68
[   36.135263]  kasan_save_track+0x20/0x40
[   36.135938]  kasan_save_alloc_info+0x40/0x58
[   36.136544]  __kasan_kmalloc+0xd4/0xd8
[   36.137186]  __kmalloc_cache_noprof+0x15c/0x3c0
[   36.137703]  kasan_atomics+0xb8/0x2e8
[   36.138376]  kunit_try_run_case+0x14c/0x3d0
[   36.139026]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.140015]  kthread+0x24c/0x2d0
[   36.140762]  ret_from_fork+0x10/0x20
[   36.141384] 
[   36.141845] The buggy address belongs to the object at fff00000c594f180
[   36.141845]  which belongs to the cache kmalloc-64 of size 64
[   36.143369] The buggy address is located 0 bytes to the right of
[   36.143369]  allocated 48-byte region [fff00000c594f180, fff00000c594f1b0)
[   36.144713] 
[   36.145011] The buggy address belongs to the physical page:
[   36.145878] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10594f
[   36.146891] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   36.147750] page_type: f5(slab)
[   36.148654] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   36.149600] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   36.150576] page dumped because: kasan: bad access detected
[   36.151364] 
[   36.151822] Memory state around the buggy address:
[   36.152496]  fff00000c594f080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   36.153431]  fff00000c594f100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   36.154443] >fff00000c594f180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   36.155359]                                      ^
[   36.156086]  fff00000c594f200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.157066]  fff00000c594f280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.157930] ==================================================================
[   37.142408] ==================================================================
[   37.143406] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x17ec/0x4858
[   37.144231] Write of size 8 at addr fff00000c594f1b0 by task kunit_try_catch/254
[   37.145118] 
[   37.145477] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241203 #1
[   37.146842] Tainted: [B]=BAD_PAGE, [N]=TEST
[   37.147381] Hardware name: linux,dummy-virt (DT)
[   37.148046] Call trace:
[   37.148469]  show_stack+0x20/0x38 (C)
[   37.149133]  dump_stack_lvl+0x8c/0xd0
[   37.149666]  print_report+0x118/0x5e0
[   37.150347]  kasan_report+0xc8/0x118
[   37.150916]  kasan_check_range+0x100/0x1a8
[   37.151551]  __kasan_check_write+0x20/0x30
[   37.152155]  kasan_atomics_helper+0x17ec/0x4858
[   37.152912]  kasan_atomics+0x198/0x2e8
[   37.153552]  kunit_try_run_case+0x14c/0x3d0
[   37.154163]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.154976]  kthread+0x24c/0x2d0
[   37.155465]  ret_from_fork+0x10/0x20
[   37.156108] 
[   37.156496] Allocated by task 254:
[   37.156981]  kasan_save_stack+0x3c/0x68
[   37.157680]  kasan_save_track+0x20/0x40
[   37.158255]  kasan_save_alloc_info+0x40/0x58
[   37.158883]  __kasan_kmalloc+0xd4/0xd8
[   37.159452]  __kmalloc_cache_noprof+0x15c/0x3c0
[   37.160065]  kasan_atomics+0xb8/0x2e8
[   37.160618]  kunit_try_run_case+0x14c/0x3d0
[   37.161295]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.162013]  kthread+0x24c/0x2d0
[   37.162478]  ret_from_fork+0x10/0x20
[   37.163180] 
[   37.163548] The buggy address belongs to the object at fff00000c594f180
[   37.163548]  which belongs to the cache kmalloc-64 of size 64
[   37.164945] The buggy address is located 0 bytes to the right of
[   37.164945]  allocated 48-byte region [fff00000c594f180, fff00000c594f1b0)
[   37.166377] 
[   37.166801] The buggy address belongs to the physical page:
[   37.167515] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10594f
[   37.168430] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   37.169416] page_type: f5(slab)
[   37.169904] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   37.170780] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   37.171809] page dumped because: kasan: bad access detected
[   37.172504] 
[   37.172856] Memory state around the buggy address:
[   37.173559]  fff00000c594f080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   37.174421]  fff00000c594f100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   37.175347] >fff00000c594f180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   37.176227]                                      ^
[   37.176964]  fff00000c594f200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.177778]  fff00000c594f280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.178713] ==================================================================
[   34.904169] ==================================================================
[   34.905002] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3ac/0x4858
[   34.906473] Write of size 4 at addr fff00000c594f1b0 by task kunit_try_catch/254
[   34.908209] 
[   34.909131] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241203 #1
[   34.910312] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.910843] Hardware name: linux,dummy-virt (DT)
[   34.911513] Call trace:
[   34.911961]  show_stack+0x20/0x38 (C)
[   34.912566]  dump_stack_lvl+0x8c/0xd0
[   34.913175]  print_report+0x118/0x5e0
[   34.913897]  kasan_report+0xc8/0x118
[   34.914457]  kasan_check_range+0x100/0x1a8
[   34.915130]  __kasan_check_write+0x20/0x30
[   34.915719]  kasan_atomics_helper+0x3ac/0x4858
[   34.916464]  kasan_atomics+0x198/0x2e8
[   34.917109]  kunit_try_run_case+0x14c/0x3d0
[   34.917779]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.918598]  kthread+0x24c/0x2d0
[   34.919140]  ret_from_fork+0x10/0x20
[   34.919754] 
[   34.920103] Allocated by task 254:
[   34.920722]  kasan_save_stack+0x3c/0x68
[   34.921236]  kasan_save_track+0x20/0x40
[   34.921933]  kasan_save_alloc_info+0x40/0x58
[   34.922596]  __kasan_kmalloc+0xd4/0xd8
[   34.923258]  __kmalloc_cache_noprof+0x15c/0x3c0
[   34.923875]  kasan_atomics+0xb8/0x2e8
[   34.924496]  kunit_try_run_case+0x14c/0x3d0
[   34.925203]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.925948]  kthread+0x24c/0x2d0
[   34.926567]  ret_from_fork+0x10/0x20
[   34.927153] 
[   34.927572] The buggy address belongs to the object at fff00000c594f180
[   34.927572]  which belongs to the cache kmalloc-64 of size 64
[   34.928923] The buggy address is located 0 bytes to the right of
[   34.928923]  allocated 48-byte region [fff00000c594f180, fff00000c594f1b0)
[   34.930384] 
[   34.930694] The buggy address belongs to the physical page:
[   34.931377] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10594f
[   34.932284] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   34.933213] page_type: f5(slab)
[   34.933751] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   34.934719] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   34.935588] page dumped because: kasan: bad access detected
[   34.936197] 
[   34.936574] Memory state around the buggy address:
[   34.937120]  fff00000c594f080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   34.937997]  fff00000c594f100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   34.938914] >fff00000c594f180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   34.939829]                                      ^
[   34.940541]  fff00000c594f200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.941357]  fff00000c594f280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.942236] ==================================================================
[   36.322192] ==================================================================
[   36.323532] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x10c0/0x4858
[   36.324620] Write of size 8 at addr fff00000c594f1b0 by task kunit_try_catch/254
[   36.326291] 
[   36.326831] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241203 #1
[   36.328120] Tainted: [B]=BAD_PAGE, [N]=TEST
[   36.328988] Hardware name: linux,dummy-virt (DT)
[   36.329638] Call trace:
[   36.330086]  show_stack+0x20/0x38 (C)
[   36.330887]  dump_stack_lvl+0x8c/0xd0
[   36.331609]  print_report+0x118/0x5e0
[   36.332314]  kasan_report+0xc8/0x118
[   36.333023]  kasan_check_range+0x100/0x1a8
[   36.333764]  __kasan_check_write+0x20/0x30
[   36.334546]  kasan_atomics_helper+0x10c0/0x4858
[   36.335310]  kasan_atomics+0x198/0x2e8
[   36.336015]  kunit_try_run_case+0x14c/0x3d0
[   36.336801]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.337639]  kthread+0x24c/0x2d0
[   36.338426]  ret_from_fork+0x10/0x20
[   36.339160] 
[   36.339587] Allocated by task 254:
[   36.340112]  kasan_save_stack+0x3c/0x68
[   36.340840]  kasan_save_track+0x20/0x40
[   36.341497]  kasan_save_alloc_info+0x40/0x58
[   36.342155]  __kasan_kmalloc+0xd4/0xd8
[   36.342773]  __kmalloc_cache_noprof+0x15c/0x3c0
[   36.343515]  kasan_atomics+0xb8/0x2e8
[   36.344140]  kunit_try_run_case+0x14c/0x3d0
[   36.344875]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.345532]  kthread+0x24c/0x2d0
[   36.346017]  ret_from_fork+0x10/0x20
[   36.346525] 
[   36.346865] The buggy address belongs to the object at fff00000c594f180
[   36.346865]  which belongs to the cache kmalloc-64 of size 64
[   36.348125] The buggy address is located 0 bytes to the right of
[   36.348125]  allocated 48-byte region [fff00000c594f180, fff00000c594f1b0)
[   36.349575] 
[   36.349930] The buggy address belongs to the physical page:
[   36.350762] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10594f
[   36.351691] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   36.352524] page_type: f5(slab)
[   36.353064] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   36.354115] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   36.355024] page dumped because: kasan: bad access detected
[   36.355834] 
[   36.356153] Memory state around the buggy address:
[   36.356792]  fff00000c594f080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   36.357666]  fff00000c594f100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   36.358584] >fff00000c594f180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   36.359421]                                      ^
[   36.360016]  fff00000c594f200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.361140]  fff00000c594f280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.362134] ==================================================================
[   36.850258] ==================================================================
[   36.851073] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3db0/0x4858
[   36.852345] Read of size 8 at addr fff00000c594f1b0 by task kunit_try_catch/254
[   36.853206] 
[   36.853620] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241203 #1
[   36.855344] Tainted: [B]=BAD_PAGE, [N]=TEST
[   36.856045] Hardware name: linux,dummy-virt (DT)
[   36.856740] Call trace:
[   36.857288]  show_stack+0x20/0x38 (C)
[   36.858080]  dump_stack_lvl+0x8c/0xd0
[   36.858766]  print_report+0x118/0x5e0
[   36.859497]  kasan_report+0xc8/0x118
[   36.860070]  __asan_report_load8_noabort+0x20/0x30
[   36.861016]  kasan_atomics_helper+0x3db0/0x4858
[   36.861688]  kasan_atomics+0x198/0x2e8
[   36.862413]  kunit_try_run_case+0x14c/0x3d0
[   36.863068]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.863972]  kthread+0x24c/0x2d0
[   36.864649]  ret_from_fork+0x10/0x20
[   36.865344] 
[   36.865776] Allocated by task 254:
[   36.866443]  kasan_save_stack+0x3c/0x68
[   36.867073]  kasan_save_track+0x20/0x40
[   36.867724]  kasan_save_alloc_info+0x40/0x58
[   36.868419]  __kasan_kmalloc+0xd4/0xd8
[   36.868962]  __kmalloc_cache_noprof+0x15c/0x3c0
[   36.869792]  kasan_atomics+0xb8/0x2e8
[   36.870459]  kunit_try_run_case+0x14c/0x3d0
[   36.871122]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.872008]  kthread+0x24c/0x2d0
[   36.872732]  ret_from_fork+0x10/0x20
[   36.873359] 
[   36.873845] The buggy address belongs to the object at fff00000c594f180
[   36.873845]  which belongs to the cache kmalloc-64 of size 64
[   36.875319] The buggy address is located 0 bytes to the right of
[   36.875319]  allocated 48-byte region [fff00000c594f180, fff00000c594f1b0)
[   36.876742] 
[   36.877023] The buggy address belongs to the physical page:
[   36.877727] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10594f
[   36.879016] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   36.879914] page_type: f5(slab)
[   36.880472] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   36.881407] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   36.882473] page dumped because: kasan: bad access detected
[   36.883282] 
[   36.883683] Memory state around the buggy address:
[   36.884438]  fff00000c594f080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   36.885406]  fff00000c594f100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   36.886431] >fff00000c594f180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   36.887357]                                      ^
[   36.888018]  fff00000c594f200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.889002]  fff00000c594f280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.889909] ==================================================================
[   34.705810] ==================================================================
[   34.706633] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x24c/0x4858
[   34.707467] Write of size 4 at addr fff00000c594f1b0 by task kunit_try_catch/254
[   34.708321] 
[   34.708763] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241203 #1
[   34.710077] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.710720] Hardware name: linux,dummy-virt (DT)
[   34.711264] Call trace:
[   34.711821]  show_stack+0x20/0x38 (C)
[   34.712439]  dump_stack_lvl+0x8c/0xd0
[   34.712948]  print_report+0x118/0x5e0
[   34.713636]  kasan_report+0xc8/0x118
[   34.714283]  kasan_check_range+0x100/0x1a8
[   34.714947]  __kasan_check_write+0x20/0x30
[   34.715583]  kasan_atomics_helper+0x24c/0x4858
[   34.716321]  kasan_atomics+0x198/0x2e8
[   34.716893]  kunit_try_run_case+0x14c/0x3d0
[   34.717560]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.718392]  kthread+0x24c/0x2d0
[   34.718900]  ret_from_fork+0x10/0x20
[   34.719503] 
[   34.719856] Allocated by task 254:
[   34.720415]  kasan_save_stack+0x3c/0x68
[   34.721018]  kasan_save_track+0x20/0x40
[   34.721596]  kasan_save_alloc_info+0x40/0x58
[   34.722234]  __kasan_kmalloc+0xd4/0xd8
[   34.722818]  __kmalloc_cache_noprof+0x15c/0x3c0
[   34.723383]  kasan_atomics+0xb8/0x2e8
[   34.724016]  kunit_try_run_case+0x14c/0x3d0
[   34.724684]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.725516]  kthread+0x24c/0x2d0
[   34.726036]  ret_from_fork+0x10/0x20
[   34.726636] 
[   34.726956] The buggy address belongs to the object at fff00000c594f180
[   34.726956]  which belongs to the cache kmalloc-64 of size 64
[   34.728378] The buggy address is located 0 bytes to the right of
[   34.728378]  allocated 48-byte region [fff00000c594f180, fff00000c594f1b0)
[   34.729748] 
[   34.730045] The buggy address belongs to the physical page:
[   34.730801] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10594f
[   34.731742] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   34.732656] page_type: f5(slab)
[   34.733242] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   34.734213] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   34.735126] page dumped because: kasan: bad access detected
[   34.735826] 
[   34.736149] Memory state around the buggy address:
[   34.736802]  fff00000c594f080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   34.737615]  fff00000c594f100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   34.738494] >fff00000c594f180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   34.739376]                                      ^
[   34.740016]  fff00000c594f200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.740906]  fff00000c594f280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.741824] ==================================================================
[   34.623642] ==================================================================
[   34.625094] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f7c/0x4858
[   34.626117] Write of size 4 at addr fff00000c594f1b0 by task kunit_try_catch/254
[   34.627433] 
[   34.627760] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241203 #1
[   34.628926] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.629672] Hardware name: linux,dummy-virt (DT)
[   34.630160] Call trace:
[   34.630532]  show_stack+0x20/0x38 (C)
[   34.631192]  dump_stack_lvl+0x8c/0xd0
[   34.631920]  print_report+0x118/0x5e0
[   34.632707]  kasan_report+0xc8/0x118
[   34.633317]  __asan_report_store4_noabort+0x20/0x30
[   34.634091]  kasan_atomics_helper+0x3f7c/0x4858
[   34.634823]  kasan_atomics+0x198/0x2e8
[   34.635457]  kunit_try_run_case+0x14c/0x3d0
[   34.636178]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.637126]  kthread+0x24c/0x2d0
[   34.637650]  ret_from_fork+0x10/0x20
[   34.638278] 
[   34.638873] Allocated by task 254:
[   34.639544]  kasan_save_stack+0x3c/0x68
[   34.640206]  kasan_save_track+0x20/0x40
[   34.640984]  kasan_save_alloc_info+0x40/0x58
[   34.641724]  __kasan_kmalloc+0xd4/0xd8
[   34.642556]  __kmalloc_cache_noprof+0x15c/0x3c0
[   34.643130]  kasan_atomics+0xb8/0x2e8
[   34.643723]  kunit_try_run_case+0x14c/0x3d0
[   34.644351]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.645174]  kthread+0x24c/0x2d0
[   34.645740]  ret_from_fork+0x10/0x20
[   34.646389] 
[   34.646672] The buggy address belongs to the object at fff00000c594f180
[   34.646672]  which belongs to the cache kmalloc-64 of size 64
[   34.648095] The buggy address is located 0 bytes to the right of
[   34.648095]  allocated 48-byte region [fff00000c594f180, fff00000c594f1b0)
[   34.649525] 
[   34.649810] The buggy address belongs to the physical page:
[   34.650633] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10594f
[   34.651502] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   34.652422] page_type: f5(slab)
[   34.652929] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   34.653862] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   34.654888] page dumped because: kasan: bad access detected
[   34.655516] 
[   34.655873] Memory state around the buggy address:
[   34.656543]  fff00000c594f080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   34.657438]  fff00000c594f100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   34.658346] >fff00000c594f180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   34.659182]                                      ^
[   34.659848]  fff00000c594f200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.660781]  fff00000c594f280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.661753] ==================================================================
[   35.573235] ==================================================================
[   35.574142] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xad4/0x4858
[   35.575194] Write of size 4 at addr fff00000c594f1b0 by task kunit_try_catch/254
[   35.576193] 
[   35.576742] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241203 #1
[   35.578210] Tainted: [B]=BAD_PAGE, [N]=TEST
[   35.578814] Hardware name: linux,dummy-virt (DT)
[   35.579506] Call trace:
[   35.580075]  show_stack+0x20/0x38 (C)
[   35.580742]  dump_stack_lvl+0x8c/0xd0
[   35.581389]  print_report+0x118/0x5e0
[   35.582046]  kasan_report+0xc8/0x118
[   35.582708]  kasan_check_range+0x100/0x1a8
[   35.583408]  __kasan_check_write+0x20/0x30
[   35.584061]  kasan_atomics_helper+0xad4/0x4858
[   35.584797]  kasan_atomics+0x198/0x2e8
[   35.585448]  kunit_try_run_case+0x14c/0x3d0
[   35.586150]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.586944]  kthread+0x24c/0x2d0
[   35.587555]  ret_from_fork+0x10/0x20
[   35.588131] 
[   35.588495] Allocated by task 254:
[   35.589145]  kasan_save_stack+0x3c/0x68
[   35.589914]  kasan_save_track+0x20/0x40
[   35.590528]  kasan_save_alloc_info+0x40/0x58
[   35.591260]  __kasan_kmalloc+0xd4/0xd8
[   35.591993]  __kmalloc_cache_noprof+0x15c/0x3c0
[   35.592751]  kasan_atomics+0xb8/0x2e8
[   35.593380]  kunit_try_run_case+0x14c/0x3d0
[   35.594058]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.594865]  kthread+0x24c/0x2d0
[   35.595634]  ret_from_fork+0x10/0x20
[   35.596256] 
[   35.596607] The buggy address belongs to the object at fff00000c594f180
[   35.596607]  which belongs to the cache kmalloc-64 of size 64
[   35.598183] The buggy address is located 0 bytes to the right of
[   35.598183]  allocated 48-byte region [fff00000c594f180, fff00000c594f1b0)
[   35.599766] 
[   35.600224] The buggy address belongs to the physical page:
[   35.601026] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10594f
[   35.602061] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   35.603000] page_type: f5(slab)
[   35.603605] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   35.604634] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   35.605495] page dumped because: kasan: bad access detected
[   35.606213] 
[   35.606513] Memory state around the buggy address:
[   35.607149]  fff00000c594f080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.608032]  fff00000c594f100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.608823] >fff00000c594f180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   35.609759]                                      ^
[   35.610413]  fff00000c594f200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.611297]  fff00000c594f280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.612166] ==================================================================
[   35.413019] ==================================================================
[   35.413856] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x934/0x4858
[   35.415376] Write of size 4 at addr fff00000c594f1b0 by task kunit_try_catch/254
[   35.416249] 
[   35.416624] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241203 #1
[   35.417856] Tainted: [B]=BAD_PAGE, [N]=TEST
[   35.418422] Hardware name: linux,dummy-virt (DT)
[   35.418995] Call trace:
[   35.419477]  show_stack+0x20/0x38 (C)
[   35.420089]  dump_stack_lvl+0x8c/0xd0
[   35.420674]  print_report+0x118/0x5e0
[   35.421279]  kasan_report+0xc8/0x118
[   35.421976]  kasan_check_range+0x100/0x1a8
[   35.422703]  __kasan_check_write+0x20/0x30
[   35.423314]  kasan_atomics_helper+0x934/0x4858
[   35.424069]  kasan_atomics+0x198/0x2e8
[   35.424595]  kunit_try_run_case+0x14c/0x3d0
[   35.425316]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.426038]  kthread+0x24c/0x2d0
[   35.426682]  ret_from_fork+0x10/0x20
[   35.427235] 
[   35.427592] Allocated by task 254:
[   35.428091]  kasan_save_stack+0x3c/0x68
[   35.428635]  kasan_save_track+0x20/0x40
[   35.429244]  kasan_save_alloc_info+0x40/0x58
[   35.429952]  __kasan_kmalloc+0xd4/0xd8
[   35.430549]  __kmalloc_cache_noprof+0x15c/0x3c0
[   35.431202]  kasan_atomics+0xb8/0x2e8
[   35.431732]  kunit_try_run_case+0x14c/0x3d0
[   35.432382]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.433093]  kthread+0x24c/0x2d0
[   35.433580]  ret_from_fork+0x10/0x20
[   35.434198] 
[   35.434655] The buggy address belongs to the object at fff00000c594f180
[   35.434655]  which belongs to the cache kmalloc-64 of size 64
[   35.436152] The buggy address is located 0 bytes to the right of
[   35.436152]  allocated 48-byte region [fff00000c594f180, fff00000c594f1b0)
[   35.437713] 
[   35.438011] The buggy address belongs to the physical page:
[   35.438603] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10594f
[   35.439643] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   35.440521] page_type: f5(slab)
[   35.441094] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   35.442076] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   35.443047] page dumped because: kasan: bad access detected
[   35.443780] 
[   35.444149] Memory state around the buggy address:
[   35.444791]  fff00000c594f080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.445632]  fff00000c594f100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.446463] >fff00000c594f180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   35.447411]                                      ^
[   35.448032]  fff00000c594f200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.448959]  fff00000c594f280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.449803] ==================================================================
[   36.934447] ==================================================================
[   36.935919] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3df4/0x4858
[   36.936882] Read of size 8 at addr fff00000c594f1b0 by task kunit_try_catch/254
[   36.938501] 
[   36.939015] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241203 #1
[   36.940083] Tainted: [B]=BAD_PAGE, [N]=TEST
[   36.940951] Hardware name: linux,dummy-virt (DT)
[   36.941628] Call trace:
[   36.942294]  show_stack+0x20/0x38 (C)
[   36.943182]  dump_stack_lvl+0x8c/0xd0
[   36.943633]  print_report+0x118/0x5e0
[   36.944386]  kasan_report+0xc8/0x118
[   36.944988]  __asan_report_load8_noabort+0x20/0x30
[   36.945754]  kasan_atomics_helper+0x3df4/0x4858
[   36.946513]  kasan_atomics+0x198/0x2e8
[   36.947235]  kunit_try_run_case+0x14c/0x3d0
[   36.947963]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.948719]  kthread+0x24c/0x2d0
[   36.949370]  ret_from_fork+0x10/0x20
[   36.950060] 
[   36.950426] Allocated by task 254:
[   36.951104]  kasan_save_stack+0x3c/0x68
[   36.951824]  kasan_save_track+0x20/0x40
[   36.952484]  kasan_save_alloc_info+0x40/0x58
[   36.953153]  __kasan_kmalloc+0xd4/0xd8
[   36.953868]  __kmalloc_cache_noprof+0x15c/0x3c0
[   36.954608]  kasan_atomics+0xb8/0x2e8
[   36.955247]  kunit_try_run_case+0x14c/0x3d0
[   36.955909]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.956688]  kthread+0x24c/0x2d0
[   36.957268]  ret_from_fork+0x10/0x20
[   36.957905] 
[   36.958264] The buggy address belongs to the object at fff00000c594f180
[   36.958264]  which belongs to the cache kmalloc-64 of size 64
[   36.959812] The buggy address is located 0 bytes to the right of
[   36.959812]  allocated 48-byte region [fff00000c594f180, fff00000c594f1b0)
[   36.961310] 
[   36.961750] The buggy address belongs to the physical page:
[   36.962569] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10594f
[   36.963579] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   36.964485] page_type: f5(slab)
[   36.965065] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   36.966098] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   36.967078] page dumped because: kasan: bad access detected
[   36.967856] 
[   36.968234] Memory state around the buggy address:
[   36.968977]  fff00000c594f080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   36.969947]  fff00000c594f100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   36.970908] >fff00000c594f180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   36.971891]                                      ^
[   36.972676]  fff00000c594f200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.973591]  fff00000c594f280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.974547] ==================================================================
[   37.102775] ==================================================================
[   37.103819] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e20/0x4858
[   37.104783] Read of size 8 at addr fff00000c594f1b0 by task kunit_try_catch/254
[   37.105749] 
[   37.106139] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241203 #1
[   37.107429] Tainted: [B]=BAD_PAGE, [N]=TEST
[   37.108181] Hardware name: linux,dummy-virt (DT)
[   37.108940] Call trace:
[   37.109533]  show_stack+0x20/0x38 (C)
[   37.110190]  dump_stack_lvl+0x8c/0xd0
[   37.110865]  print_report+0x118/0x5e0
[   37.111654]  kasan_report+0xc8/0x118
[   37.112433]  __asan_report_load8_noabort+0x20/0x30
[   37.113293]  kasan_atomics_helper+0x3e20/0x4858
[   37.114178]  kasan_atomics+0x198/0x2e8
[   37.114820]  kunit_try_run_case+0x14c/0x3d0
[   37.115617]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.116421]  kthread+0x24c/0x2d0
[   37.116913]  ret_from_fork+0x10/0x20
[   37.117590] 
[   37.117900] Allocated by task 254:
[   37.118486]  kasan_save_stack+0x3c/0x68
[   37.119148]  kasan_save_track+0x20/0x40
[   37.119741]  kasan_save_alloc_info+0x40/0x58
[   37.120376]  __kasan_kmalloc+0xd4/0xd8
[   37.120943]  __kmalloc_cache_noprof+0x15c/0x3c0
[   37.121507]  kasan_atomics+0xb8/0x2e8
[   37.122168]  kunit_try_run_case+0x14c/0x3d0
[   37.122969]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.123743]  kthread+0x24c/0x2d0
[   37.124227]  ret_from_fork+0x10/0x20
[   37.124814] 
[   37.125115] The buggy address belongs to the object at fff00000c594f180
[   37.125115]  which belongs to the cache kmalloc-64 of size 64
[   37.126461] The buggy address is located 0 bytes to the right of
[   37.126461]  allocated 48-byte region [fff00000c594f180, fff00000c594f1b0)
[   37.127949] 
[   37.128259] The buggy address belongs to the physical page:
[   37.129161] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10594f
[   37.130151] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   37.131088] page_type: f5(slab)
[   37.131786] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   37.132846] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   37.133811] page dumped because: kasan: bad access detected
[   37.134513] 
[   37.134814] Memory state around the buggy address:
[   37.135477]  fff00000c594f080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   37.136279]  fff00000c594f100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   37.137414] >fff00000c594f180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   37.138243]                                      ^
[   37.138791]  fff00000c594f200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.139593]  fff00000c594f280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.140315] ==================================================================
[   36.651369] ==================================================================
[   36.652242] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1414/0x4858
[   36.653290] Write of size 8 at addr fff00000c594f1b0 by task kunit_try_catch/254
[   36.654143] 
[   36.654521] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241203 #1
[   36.655800] Tainted: [B]=BAD_PAGE, [N]=TEST
[   36.656379] Hardware name: linux,dummy-virt (DT)
[   36.656936] Call trace:
[   36.657447]  show_stack+0x20/0x38 (C)
[   36.658128]  dump_stack_lvl+0x8c/0xd0
[   36.658803]  print_report+0x118/0x5e0
[   36.659313]  kasan_report+0xc8/0x118
[   36.659976]  kasan_check_range+0x100/0x1a8
[   36.660767]  __kasan_check_write+0x20/0x30
[   36.661400]  kasan_atomics_helper+0x1414/0x4858
[   36.662138]  kasan_atomics+0x198/0x2e8
[   36.662682]  kunit_try_run_case+0x14c/0x3d0
[   36.663401]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.664095]  kthread+0x24c/0x2d0
[   36.664715]  ret_from_fork+0x10/0x20
[   36.665280] 
[   36.665617] Allocated by task 254:
[   36.666092]  kasan_save_stack+0x3c/0x68
[   36.666739]  kasan_save_track+0x20/0x40
[   36.667254]  kasan_save_alloc_info+0x40/0x58
[   36.667968]  __kasan_kmalloc+0xd4/0xd8
[   36.668476]  __kmalloc_cache_noprof+0x15c/0x3c0
[   36.669206]  kasan_atomics+0xb8/0x2e8
[   36.669782]  kunit_try_run_case+0x14c/0x3d0
[   36.670482]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.671225]  kthread+0x24c/0x2d0
[   36.671802]  ret_from_fork+0x10/0x20
[   36.672359] 
[   36.672668] The buggy address belongs to the object at fff00000c594f180
[   36.672668]  which belongs to the cache kmalloc-64 of size 64
[   36.674098] The buggy address is located 0 bytes to the right of
[   36.674098]  allocated 48-byte region [fff00000c594f180, fff00000c594f1b0)
[   36.675513] 
[   36.675834] The buggy address belongs to the physical page:
[   36.676612] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10594f
[   36.677614] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   36.678388] page_type: f5(slab)
[   36.678999] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   36.679960] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   36.680820] page dumped because: kasan: bad access detected
[   36.681500] 
[   36.681856] Memory state around the buggy address:
[   36.682512]  fff00000c594f080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   36.683378]  fff00000c594f100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   36.684358] >fff00000c594f180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   36.685200]                                      ^
[   36.685842]  fff00000c594f200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.686841]  fff00000c594f280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.687696] ==================================================================
[   36.893034] ==================================================================
[   36.894499] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1644/0x4858
[   36.895664] Write of size 8 at addr fff00000c594f1b0 by task kunit_try_catch/254
[   36.897048] 
[   36.897433] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241203 #1
[   36.898857] Tainted: [B]=BAD_PAGE, [N]=TEST
[   36.899634] Hardware name: linux,dummy-virt (DT)
[   36.900360] Call trace:
[   36.900965]  show_stack+0x20/0x38 (C)
[   36.901776]  dump_stack_lvl+0x8c/0xd0
[   36.902602]  print_report+0x118/0x5e0
[   36.903401]  kasan_report+0xc8/0x118
[   36.903999]  kasan_check_range+0x100/0x1a8
[   36.904641]  __kasan_check_write+0x20/0x30
[   36.905165]  kasan_atomics_helper+0x1644/0x4858
[   36.905914]  kasan_atomics+0x198/0x2e8
[   36.906705]  kunit_try_run_case+0x14c/0x3d0
[   36.907529]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.908363]  kthread+0x24c/0x2d0
[   36.908999]  ret_from_fork+0x10/0x20
[   36.909619] 
[   36.909896] Allocated by task 254:
[   36.910426]  kasan_save_stack+0x3c/0x68
[   36.911068]  kasan_save_track+0x20/0x40
[   36.911650]  kasan_save_alloc_info+0x40/0x58
[   36.912383]  __kasan_kmalloc+0xd4/0xd8
[   36.912971]  __kmalloc_cache_noprof+0x15c/0x3c0
[   36.913625]  kasan_atomics+0xb8/0x2e8
[   36.914188]  kunit_try_run_case+0x14c/0x3d0
[   36.914870]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.915578]  kthread+0x24c/0x2d0
[   36.916101]  ret_from_fork+0x10/0x20
[   36.916669] 
[   36.917015] The buggy address belongs to the object at fff00000c594f180
[   36.917015]  which belongs to the cache kmalloc-64 of size 64
[   36.918522] The buggy address is located 0 bytes to the right of
[   36.918522]  allocated 48-byte region [fff00000c594f180, fff00000c594f1b0)
[   36.919930] 
[   36.920237] The buggy address belongs to the physical page:
[   36.921075] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10594f
[   36.921994] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   36.922896] page_type: f5(slab)
[   36.923459] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   36.924520] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   36.925523] page dumped because: kasan: bad access detected
[   36.926217] 
[   36.926561] Memory state around the buggy address:
[   36.927160]  fff00000c594f080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   36.928048]  fff00000c594f100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   36.929084] >fff00000c594f180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   36.929973]                                      ^
[   36.930814]  fff00000c594f200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.931727]  fff00000c594f280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.932651] ==================================================================
[   36.238513] ==================================================================
[   36.239525] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xff0/0x4858
[   36.240359] Write of size 8 at addr fff00000c594f1b0 by task kunit_try_catch/254
[   36.241429] 
[   36.241953] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241203 #1
[   36.243267] Tainted: [B]=BAD_PAGE, [N]=TEST
[   36.244011] Hardware name: linux,dummy-virt (DT)
[   36.244849] Call trace:
[   36.245419]  show_stack+0x20/0x38 (C)
[   36.246142]  dump_stack_lvl+0x8c/0xd0
[   36.246773]  print_report+0x118/0x5e0
[   36.247433]  kasan_report+0xc8/0x118
[   36.248080]  kasan_check_range+0x100/0x1a8
[   36.248775]  __kasan_check_write+0x20/0x30
[   36.249566]  kasan_atomics_helper+0xff0/0x4858
[   36.250278]  kasan_atomics+0x198/0x2e8
[   36.250939]  kunit_try_run_case+0x14c/0x3d0
[   36.251649]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.252478]  kthread+0x24c/0x2d0
[   36.253101]  ret_from_fork+0x10/0x20
[   36.253753] 
[   36.254093] Allocated by task 254:
[   36.254679]  kasan_save_stack+0x3c/0x68
[   36.255343]  kasan_save_track+0x20/0x40
[   36.256013]  kasan_save_alloc_info+0x40/0x58
[   36.256736]  __kasan_kmalloc+0xd4/0xd8
[   36.257466]  __kmalloc_cache_noprof+0x15c/0x3c0
[   36.258122]  kasan_atomics+0xb8/0x2e8
[   36.258752]  kunit_try_run_case+0x14c/0x3d0
[   36.259476]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.260267]  kthread+0x24c/0x2d0
[   36.260930]  ret_from_fork+0x10/0x20
[   36.261656] 
[   36.262053] The buggy address belongs to the object at fff00000c594f180
[   36.262053]  which belongs to the cache kmalloc-64 of size 64
[   36.263601] The buggy address is located 0 bytes to the right of
[   36.263601]  allocated 48-byte region [fff00000c594f180, fff00000c594f1b0)
[   36.265099] 
[   36.265568] The buggy address belongs to the physical page:
[   36.266383] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10594f
[   36.267433] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   36.268297] page_type: f5(slab)
[   36.268902] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   36.269927] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   36.270881] page dumped because: kasan: bad access detected
[   36.271649] 
[   36.272000] Memory state around the buggy address:
[   36.272684]  fff00000c594f080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   36.273725]  fff00000c594f100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   36.274641] >fff00000c594f180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   36.275655]                                      ^
[   36.276394]  fff00000c594f200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.277320]  fff00000c594f280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.278238] ==================================================================
[   34.744000] ==================================================================
[   34.745480] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x2b0/0x4858
[   34.746861] Read of size 4 at addr fff00000c594f1b0 by task kunit_try_catch/254
[   34.747831] 
[   34.748147] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241203 #1
[   34.749492] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.750013] Hardware name: linux,dummy-virt (DT)
[   34.750667] Call trace:
[   34.751140]  show_stack+0x20/0x38 (C)
[   34.751761]  dump_stack_lvl+0x8c/0xd0
[   34.752365]  print_report+0x118/0x5e0
[   34.753004]  kasan_report+0xc8/0x118
[   34.753579]  kasan_check_range+0x100/0x1a8
[   34.754233]  __kasan_check_read+0x20/0x30
[   34.754885]  kasan_atomics_helper+0x2b0/0x4858
[   34.755519]  kasan_atomics+0x198/0x2e8
[   34.756145]  kunit_try_run_case+0x14c/0x3d0
[   34.756819]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.757605]  kthread+0x24c/0x2d0
[   34.758169]  ret_from_fork+0x10/0x20
[   34.758797] 
[   34.759076] Allocated by task 254:
[   34.759689]  kasan_save_stack+0x3c/0x68
[   34.760319]  kasan_save_track+0x20/0x40
[   34.760879]  kasan_save_alloc_info+0x40/0x58
[   34.761543]  __kasan_kmalloc+0xd4/0xd8
[   34.762223]  __kmalloc_cache_noprof+0x15c/0x3c0
[   34.762792]  kasan_atomics+0xb8/0x2e8
[   34.763451]  kunit_try_run_case+0x14c/0x3d0
[   34.764016]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.764755]  kthread+0x24c/0x2d0
[   34.765317]  ret_from_fork+0x10/0x20
[   34.765922] 
[   34.766283] The buggy address belongs to the object at fff00000c594f180
[   34.766283]  which belongs to the cache kmalloc-64 of size 64
[   34.767660] The buggy address is located 0 bytes to the right of
[   34.767660]  allocated 48-byte region [fff00000c594f180, fff00000c594f1b0)
[   34.769047] 
[   34.769426] The buggy address belongs to the physical page:
[   34.770099] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10594f
[   34.771044] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   34.771818] page_type: f5(slab)
[   34.772367] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   34.773293] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   34.774255] page dumped because: kasan: bad access detected
[   34.774975] 
[   34.775283] Memory state around the buggy address:
[   34.775894]  fff00000c594f080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   34.776743]  fff00000c594f100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   34.777606] >fff00000c594f180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   34.778496]                                      ^
[   34.779152]  fff00000c594f200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.780061]  fff00000c594f280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.780903] ==================================================================
[   35.374665] ==================================================================
[   35.375272] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x42d8/0x4858
[   35.376908] Read of size 4 at addr fff00000c594f1b0 by task kunit_try_catch/254
[   35.378045] 
[   35.378529] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241203 #1
[   35.379946] Tainted: [B]=BAD_PAGE, [N]=TEST
[   35.380472] Hardware name: linux,dummy-virt (DT)
[   35.381085] Call trace:
[   35.381664]  show_stack+0x20/0x38 (C)
[   35.382193]  dump_stack_lvl+0x8c/0xd0
[   35.382878]  print_report+0x118/0x5e0
[   35.383538]  kasan_report+0xc8/0x118
[   35.384094]  __asan_report_load4_noabort+0x20/0x30
[   35.384783]  kasan_atomics_helper+0x42d8/0x4858
[   35.385449]  kasan_atomics+0x198/0x2e8
[   35.386086]  kunit_try_run_case+0x14c/0x3d0
[   35.386721]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.387518]  kthread+0x24c/0x2d0
[   35.388113]  ret_from_fork+0x10/0x20
[   35.388807] 
[   35.389145] Allocated by task 254:
[   35.389773]  kasan_save_stack+0x3c/0x68
[   35.390415]  kasan_save_track+0x20/0x40
[   35.390968]  kasan_save_alloc_info+0x40/0x58
[   35.391705]  __kasan_kmalloc+0xd4/0xd8
[   35.392319]  __kmalloc_cache_noprof+0x15c/0x3c0
[   35.393091]  kasan_atomics+0xb8/0x2e8
[   35.393614]  kunit_try_run_case+0x14c/0x3d0
[   35.394316]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.395089]  kthread+0x24c/0x2d0
[   35.395690]  ret_from_fork+0x10/0x20
[   35.396247] 
[   35.396575] The buggy address belongs to the object at fff00000c594f180
[   35.396575]  which belongs to the cache kmalloc-64 of size 64
[   35.398007] The buggy address is located 0 bytes to the right of
[   35.398007]  allocated 48-byte region [fff00000c594f180, fff00000c594f1b0)
[   35.399440] 
[   35.399752] The buggy address belongs to the physical page:
[   35.400437] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10594f
[   35.401523] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   35.402362] page_type: f5(slab)
[   35.402868] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   35.403804] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   35.404751] page dumped because: kasan: bad access detected
[   35.405470] 
[   35.405762] Memory state around the buggy address:
[   35.406433]  fff00000c594f080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.407275]  fff00000c594f100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.408132] >fff00000c594f180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   35.409088]                                      ^
[   35.409744]  fff00000c594f200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.410658]  fff00000c594f280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.411538] ==================================================================
[   36.566133] ==================================================================
[   36.567413] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1384/0x4858
[   36.568424] Write of size 8 at addr fff00000c594f1b0 by task kunit_try_catch/254
[   36.569386] 
[   36.569762] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241203 #1
[   36.571085] Tainted: [B]=BAD_PAGE, [N]=TEST
[   36.571812] Hardware name: linux,dummy-virt (DT)
[   36.572566] Call trace:
[   36.573133]  show_stack+0x20/0x38 (C)
[   36.573913]  dump_stack_lvl+0x8c/0xd0
[   36.574646]  print_report+0x118/0x5e0
[   36.575284]  kasan_report+0xc8/0x118
[   36.575947]  kasan_check_range+0x100/0x1a8
[   36.576653]  __kasan_check_write+0x20/0x30
[   36.577359]  kasan_atomics_helper+0x1384/0x4858
[   36.578092]  kasan_atomics+0x198/0x2e8
[   36.578756]  kunit_try_run_case+0x14c/0x3d0
[   36.579457]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.580179]  kthread+0x24c/0x2d0
[   36.580897]  ret_from_fork+0x10/0x20
[   36.581564] 
[   36.581938] Allocated by task 254:
[   36.582565]  kasan_save_stack+0x3c/0x68
[   36.583361]  kasan_save_track+0x20/0x40
[   36.583959]  kasan_save_alloc_info+0x40/0x58
[   36.584706]  __kasan_kmalloc+0xd4/0xd8
[   36.585367]  __kmalloc_cache_noprof+0x15c/0x3c0
[   36.586063]  kasan_atomics+0xb8/0x2e8
[   36.586746]  kunit_try_run_case+0x14c/0x3d0
[   36.587415]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.588217]  kthread+0x24c/0x2d0
[   36.588860]  ret_from_fork+0x10/0x20
[   36.589516] 
[   36.589875] The buggy address belongs to the object at fff00000c594f180
[   36.589875]  which belongs to the cache kmalloc-64 of size 64
[   36.591534] The buggy address is located 0 bytes to the right of
[   36.591534]  allocated 48-byte region [fff00000c594f180, fff00000c594f1b0)
[   36.592991] 
[   36.593306] The buggy address belongs to the physical page:
[   36.594049] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10594f
[   36.595212] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   36.596094] page_type: f5(slab)
[   36.596700] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   36.597700] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   36.598654] page dumped because: kasan: bad access detected
[   36.599424] 
[   36.599757] Memory state around the buggy address:
[   36.600603]  fff00000c594f080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   36.601611]  fff00000c594f100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   36.602537] >fff00000c594f180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   36.603425]                                      ^
[   36.604134]  fff00000c594f200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.605074]  fff00000c594f280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.606011] ==================================================================
[   35.062939] ==================================================================
[   35.063706] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x54c/0x4858
[   35.064561] Write of size 4 at addr fff00000c594f1b0 by task kunit_try_catch/254
[   35.065434] 
[   35.065820] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241203 #1
[   35.066907] Tainted: [B]=BAD_PAGE, [N]=TEST
[   35.067575] Hardware name: linux,dummy-virt (DT)
[   35.068069] Call trace:
[   35.068554]  show_stack+0x20/0x38 (C)
[   35.069201]  dump_stack_lvl+0x8c/0xd0
[   35.069850]  print_report+0x118/0x5e0
[   35.070435]  kasan_report+0xc8/0x118
[   35.071018]  kasan_check_range+0x100/0x1a8
[   35.071634]  __kasan_check_write+0x20/0x30
[   35.072300]  kasan_atomics_helper+0x54c/0x4858
[   35.073073]  kasan_atomics+0x198/0x2e8
[   35.073636]  kunit_try_run_case+0x14c/0x3d0
[   35.074304]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.075094]  kthread+0x24c/0x2d0
[   35.075702]  ret_from_fork+0x10/0x20
[   35.076274] 
[   35.076639] Allocated by task 254:
[   35.077057]  kasan_save_stack+0x3c/0x68
[   35.077823]  kasan_save_track+0x20/0x40
[   35.078356]  kasan_save_alloc_info+0x40/0x58
[   35.079047]  __kasan_kmalloc+0xd4/0xd8
[   35.079565]  __kmalloc_cache_noprof+0x15c/0x3c0
[   35.080227]  kasan_atomics+0xb8/0x2e8
[   35.080807]  kunit_try_run_case+0x14c/0x3d0
[   35.081308]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.082220]  kthread+0x24c/0x2d0
[   35.082691]  ret_from_fork+0x10/0x20
[   35.083251] 
[   35.083643] The buggy address belongs to the object at fff00000c594f180
[   35.083643]  which belongs to the cache kmalloc-64 of size 64
[   35.084959] The buggy address is located 0 bytes to the right of
[   35.084959]  allocated 48-byte region [fff00000c594f180, fff00000c594f1b0)
[   35.086399] 
[   35.086733] The buggy address belongs to the physical page:
[   35.087493] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10594f
[   35.088452] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   35.089351] page_type: f5(slab)
[   35.089882] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   35.090820] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   35.091835] page dumped because: kasan: bad access detected
[   35.092508] 
[   35.092827] Memory state around the buggy address:
[   35.093537]  fff00000c594f080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.094397]  fff00000c594f100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.095201] >fff00000c594f180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   35.096120]                                      ^
[   35.096742]  fff00000c594f200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.097660]  fff00000c594f280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.098527] ==================================================================
[   35.216860] ==================================================================
[   35.217617] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x6ec/0x4858
[   35.218694] Write of size 4 at addr fff00000c594f1b0 by task kunit_try_catch/254
[   35.219708] 
[   35.220065] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241203 #1
[   35.221361] Tainted: [B]=BAD_PAGE, [N]=TEST
[   35.221997] Hardware name: linux,dummy-virt (DT)
[   35.222684] Call trace:
[   35.223113]  show_stack+0x20/0x38 (C)
[   35.223722]  dump_stack_lvl+0x8c/0xd0
[   35.224312]  print_report+0x118/0x5e0
[   35.224904]  kasan_report+0xc8/0x118
[   35.225596]  kasan_check_range+0x100/0x1a8
[   35.226270]  __kasan_check_write+0x20/0x30
[   35.227085]  kasan_atomics_helper+0x6ec/0x4858
[   35.227777]  kasan_atomics+0x198/0x2e8
[   35.228477]  kunit_try_run_case+0x14c/0x3d0
[   35.229002]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.229901]  kthread+0x24c/0x2d0
[   35.230520]  ret_from_fork+0x10/0x20
[   35.231097] 
[   35.231433] Allocated by task 254:
[   35.231983]  kasan_save_stack+0x3c/0x68
[   35.232608]  kasan_save_track+0x20/0x40
[   35.233067]  kasan_save_alloc_info+0x40/0x58
[   35.233805]  __kasan_kmalloc+0xd4/0xd8
[   35.234322]  __kmalloc_cache_noprof+0x15c/0x3c0
[   35.235129]  kasan_atomics+0xb8/0x2e8
[   35.235699]  kunit_try_run_case+0x14c/0x3d0
[   35.236427]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.237078]  kthread+0x24c/0x2d0
[   35.237700]  ret_from_fork+0x10/0x20
[   35.238277] 
[   35.238754] The buggy address belongs to the object at fff00000c594f180
[   35.238754]  which belongs to the cache kmalloc-64 of size 64
[   35.240106] The buggy address is located 0 bytes to the right of
[   35.240106]  allocated 48-byte region [fff00000c594f180, fff00000c594f1b0)
[   35.241527] 
[   35.241861] The buggy address belongs to the physical page:
[   35.242609] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10594f
[   35.243534] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   35.244391] page_type: f5(slab)
[   35.244966] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   35.245964] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   35.246854] page dumped because: kasan: bad access detected
[   35.247583] 
[   35.247939] Memory state around the buggy address:
[   35.248610]  fff00000c594f080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.249464]  fff00000c594f100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.250284] >fff00000c594f180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   35.251212]                                      ^
[   35.251850]  fff00000c594f200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.252777]  fff00000c594f280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.253654] ==================================================================
[   35.533108] ==================================================================
[   35.533796] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa6c/0x4858
[   35.535573] Write of size 4 at addr fff00000c594f1b0 by task kunit_try_catch/254
[   35.536598] 
[   35.536973] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241203 #1
[   35.538188] Tainted: [B]=BAD_PAGE, [N]=TEST
[   35.538759] Hardware name: linux,dummy-virt (DT)
[   35.539349] Call trace:
[   35.539824]  show_stack+0x20/0x38 (C)
[   35.540431]  dump_stack_lvl+0x8c/0xd0
[   35.541021]  print_report+0x118/0x5e0
[   35.541601]  kasan_report+0xc8/0x118
[   35.542237]  kasan_check_range+0x100/0x1a8
[   35.542805]  __kasan_check_write+0x20/0x30
[   35.543482]  kasan_atomics_helper+0xa6c/0x4858
[   35.544221]  kasan_atomics+0x198/0x2e8
[   35.544803]  kunit_try_run_case+0x14c/0x3d0
[   35.545459]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.546218]  kthread+0x24c/0x2d0
[   35.546734]  ret_from_fork+0x10/0x20
[   35.547318] 
[   35.547697] Allocated by task 254:
[   35.548227]  kasan_save_stack+0x3c/0x68
[   35.548817]  kasan_save_track+0x20/0x40
[   35.549402]  kasan_save_alloc_info+0x40/0x58
[   35.550048]  __kasan_kmalloc+0xd4/0xd8
[   35.550617]  __kmalloc_cache_noprof+0x15c/0x3c0
[   35.551234]  kasan_atomics+0xb8/0x2e8
[   35.551894]  kunit_try_run_case+0x14c/0x3d0
[   35.552467]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.553286]  kthread+0x24c/0x2d0
[   35.554006]  ret_from_fork+0x10/0x20
[   35.554626] 
[   35.555003] The buggy address belongs to the object at fff00000c594f180
[   35.555003]  which belongs to the cache kmalloc-64 of size 64
[   35.556461] The buggy address is located 0 bytes to the right of
[   35.556461]  allocated 48-byte region [fff00000c594f180, fff00000c594f1b0)
[   35.558014] 
[   35.558432] The buggy address belongs to the physical page:
[   35.559190] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10594f
[   35.560238] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   35.561104] page_type: f5(slab)
[   35.561647] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   35.562710] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   35.563673] page dumped because: kasan: bad access detected
[   35.564447] 
[   35.564798] Memory state around the buggy address:
[   35.565548]  fff00000c594f080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.566586]  fff00000c594f100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.567518] >fff00000c594f180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   35.568457]                                      ^
[   35.569151]  fff00000c594f200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.570129]  fff00000c594f280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.571012] ==================================================================
[   36.081268] ==================================================================
[   36.081928] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e5c/0x4858
[   36.082976] Write of size 8 at addr fff00000c594f1b0 by task kunit_try_catch/254
[   36.084047] 
[   36.084458] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241203 #1
[   36.086288] Tainted: [B]=BAD_PAGE, [N]=TEST
[   36.087034] Hardware name: linux,dummy-virt (DT)
[   36.087748] Call trace:
[   36.088276]  show_stack+0x20/0x38 (C)
[   36.088931]  dump_stack_lvl+0x8c/0xd0
[   36.089523]  print_report+0x118/0x5e0
[   36.090174]  kasan_report+0xc8/0x118
[   36.090751]  __asan_report_store8_noabort+0x20/0x30
[   36.091428]  kasan_atomics_helper+0x3e5c/0x4858
[   36.092052]  kasan_atomics+0x198/0x2e8
[   36.092700]  kunit_try_run_case+0x14c/0x3d0
[   36.093370]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.094120]  kthread+0x24c/0x2d0
[   36.094733]  ret_from_fork+0x10/0x20
[   36.095341] 
[   36.095716] Allocated by task 254:
[   36.096237]  kasan_save_stack+0x3c/0x68
[   36.096887]  kasan_save_track+0x20/0x40
[   36.097497]  kasan_save_alloc_info+0x40/0x58
[   36.098040]  __kasan_kmalloc+0xd4/0xd8
[   36.098684]  __kmalloc_cache_noprof+0x15c/0x3c0
[   36.099234]  kasan_atomics+0xb8/0x2e8
[   36.099943]  kunit_try_run_case+0x14c/0x3d0
[   36.100636]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.101456]  kthread+0x24c/0x2d0
[   36.101978]  ret_from_fork+0x10/0x20
[   36.102455] 
[   36.102817] The buggy address belongs to the object at fff00000c594f180
[   36.102817]  which belongs to the cache kmalloc-64 of size 64
[   36.104297] The buggy address is located 0 bytes to the right of
[   36.104297]  allocated 48-byte region [fff00000c594f180, fff00000c594f1b0)
[   36.105724] 
[   36.106071] The buggy address belongs to the physical page:
[   36.106739] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10594f
[   36.107945] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   36.108671] page_type: f5(slab)
[   36.109225] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   36.110088] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   36.110997] page dumped because: kasan: bad access detected
[   36.111817] 
[   36.112116] Memory state around the buggy address:
[   36.112718]  fff00000c594f080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   36.113660]  fff00000c594f100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   36.114479] >fff00000c594f180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   36.115399]                                      ^
[   36.115982]  fff00000c594f200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.116970]  fff00000c594f280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.117890] ==================================================================
[   36.443584] ==================================================================
[   36.444439] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x11f8/0x4858
[   36.445248] Write of size 8 at addr fff00000c594f1b0 by task kunit_try_catch/254
[   36.446536] 
[   36.446925] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241203 #1
[   36.448311] Tainted: [B]=BAD_PAGE, [N]=TEST
[   36.448863] Hardware name: linux,dummy-virt (DT)
[   36.449429] Call trace:
[   36.449922]  show_stack+0x20/0x38 (C)
[   36.450607]  dump_stack_lvl+0x8c/0xd0
[   36.451194]  print_report+0x118/0x5e0
[   36.451850]  kasan_report+0xc8/0x118
[   36.452448]  kasan_check_range+0x100/0x1a8
[   36.453028]  __kasan_check_write+0x20/0x30
[   36.453693]  kasan_atomics_helper+0x11f8/0x4858
[   36.454303]  kasan_atomics+0x198/0x2e8
[   36.454932]  kunit_try_run_case+0x14c/0x3d0
[   36.455663]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.456520]  kthread+0x24c/0x2d0
[   36.457025]  ret_from_fork+0x10/0x20
[   36.457596] 
[   36.457973] Allocated by task 254:
[   36.458508]  kasan_save_stack+0x3c/0x68
[   36.458987]  kasan_save_track+0x20/0x40
[   36.459665]  kasan_save_alloc_info+0x40/0x58
[   36.460356]  __kasan_kmalloc+0xd4/0xd8
[   36.461006]  __kmalloc_cache_noprof+0x15c/0x3c0
[   36.461620]  kasan_atomics+0xb8/0x2e8
[   36.462282]  kunit_try_run_case+0x14c/0x3d0
[   36.462967]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.463758]  kthread+0x24c/0x2d0
[   36.464253]  ret_from_fork+0x10/0x20
[   36.464893] 
[   36.465189] The buggy address belongs to the object at fff00000c594f180
[   36.465189]  which belongs to the cache kmalloc-64 of size 64
[   36.466625] The buggy address is located 0 bytes to the right of
[   36.466625]  allocated 48-byte region [fff00000c594f180, fff00000c594f1b0)
[   36.468032] 
[   36.468433] The buggy address belongs to the physical page:
[   36.469153] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10594f
[   36.470093] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   36.471127] page_type: f5(slab)
[   36.471674] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   36.472655] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   36.473555] page dumped because: kasan: bad access detected
[   36.474272] 
[   36.474666] Memory state around the buggy address:
[   36.475535]  fff00000c594f080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   36.476450]  fff00000c594f100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   36.477314] >fff00000c594f180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   36.478160]                                      ^
[   36.478836]  fff00000c594f200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.479702]  fff00000c594f280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.480533] ==================================================================
[   36.769172] ==================================================================
[   36.770616] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x154c/0x4858
[   36.771938] Write of size 8 at addr fff00000c594f1b0 by task kunit_try_catch/254
[   36.773016] 
[   36.773495] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241203 #1
[   36.774750] Tainted: [B]=BAD_PAGE, [N]=TEST
[   36.775319] Hardware name: linux,dummy-virt (DT)
[   36.776002] Call trace:
[   36.776532]  show_stack+0x20/0x38 (C)
[   36.777074]  dump_stack_lvl+0x8c/0xd0
[   36.777731]  print_report+0x118/0x5e0
[   36.778304]  kasan_report+0xc8/0x118
[   36.778880]  kasan_check_range+0x100/0x1a8
[   36.779512]  __kasan_check_write+0x20/0x30
[   36.780216]  kasan_atomics_helper+0x154c/0x4858
[   36.780931]  kasan_atomics+0x198/0x2e8
[   36.781518]  kunit_try_run_case+0x14c/0x3d0
[   36.782204]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.782995]  kthread+0x24c/0x2d0
[   36.783594]  ret_from_fork+0x10/0x20
[   36.784200] 
[   36.784615] Allocated by task 254:
[   36.785053]  kasan_save_stack+0x3c/0x68
[   36.785743]  kasan_save_track+0x20/0x40
[   36.786374]  kasan_save_alloc_info+0x40/0x58
[   36.787084]  __kasan_kmalloc+0xd4/0xd8
[   36.787602]  __kmalloc_cache_noprof+0x15c/0x3c0
[   36.788344]  kasan_atomics+0xb8/0x2e8
[   36.788812]  kunit_try_run_case+0x14c/0x3d0
[   36.789609]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.790351]  kthread+0x24c/0x2d0
[   36.790866]  ret_from_fork+0x10/0x20
[   36.791476] 
[   36.791776] The buggy address belongs to the object at fff00000c594f180
[   36.791776]  which belongs to the cache kmalloc-64 of size 64
[   36.793163] The buggy address is located 0 bytes to the right of
[   36.793163]  allocated 48-byte region [fff00000c594f180, fff00000c594f1b0)
[   36.794645] 
[   36.794961] The buggy address belongs to the physical page:
[   36.795709] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10594f
[   36.796669] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   36.797501] page_type: f5(slab)
[   36.797971] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   36.799013] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   36.799910] page dumped because: kasan: bad access detected
[   36.800575] 
[   36.800907] Memory state around the buggy address:
[   36.801579]  fff00000c594f080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   36.802363]  fff00000c594f100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   36.803257] >fff00000c594f180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   36.804122]                                      ^
[   36.804801]  fff00000c594f200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.805715]  fff00000c594f280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.806714] ==================================================================
[   37.018270] ==================================================================
[   37.018973] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e10/0x4858
[   37.020626] Read of size 8 at addr fff00000c594f1b0 by task kunit_try_catch/254
[   37.021752] 
[   37.022287] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241203 #1
[   37.023636] Tainted: [B]=BAD_PAGE, [N]=TEST
[   37.024248] Hardware name: linux,dummy-virt (DT)
[   37.024954] Call trace:
[   37.025554]  show_stack+0x20/0x38 (C)
[   37.026209]  dump_stack_lvl+0x8c/0xd0
[   37.026900]  print_report+0x118/0x5e0
[   37.027537]  kasan_report+0xc8/0x118
[   37.028162]  __asan_report_load8_noabort+0x20/0x30
[   37.028892]  kasan_atomics_helper+0x3e10/0x4858
[   37.029631]  kasan_atomics+0x198/0x2e8
[   37.030260]  kunit_try_run_case+0x14c/0x3d0
[   37.031006]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.031823]  kthread+0x24c/0x2d0
[   37.032435]  ret_from_fork+0x10/0x20
[   37.033061] 
[   37.033448] Allocated by task 254:
[   37.034080]  kasan_save_stack+0x3c/0x68
[   37.034806]  kasan_save_track+0x20/0x40
[   37.035588]  kasan_save_alloc_info+0x40/0x58
[   37.036263]  __kasan_kmalloc+0xd4/0xd8
[   37.036946]  __kmalloc_cache_noprof+0x15c/0x3c0
[   37.037671]  kasan_atomics+0xb8/0x2e8
[   37.038292]  kunit_try_run_case+0x14c/0x3d0
[   37.038974]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.039765]  kthread+0x24c/0x2d0
[   37.040500]  ret_from_fork+0x10/0x20
[   37.041104] 
[   37.041457] The buggy address belongs to the object at fff00000c594f180
[   37.041457]  which belongs to the cache kmalloc-64 of size 64
[   37.042997] The buggy address is located 0 bytes to the right of
[   37.042997]  allocated 48-byte region [fff00000c594f180, fff00000c594f1b0)
[   37.044492] 
[   37.044902] The buggy address belongs to the physical page:
[   37.045678] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10594f
[   37.046796] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   37.047695] page_type: f5(slab)
[   37.048265] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   37.049297] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   37.050260] page dumped because: kasan: bad access detected
[   37.051044] 
[   37.051560] Memory state around the buggy address:
[   37.052209]  fff00000c594f080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   37.053177]  fff00000c594f100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   37.054085] >fff00000c594f180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   37.054999]                                      ^
[   37.055733]  fff00000c594f200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.056667]  fff00000c594f280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.057697] ==================================================================
[   34.862156] ==================================================================
[   34.863009] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f94/0x4858
[   34.863975] Write of size 4 at addr fff00000c594f1b0 by task kunit_try_catch/254
[   34.865573] 
[   34.865988] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241203 #1
[   34.867452] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.867985] Hardware name: linux,dummy-virt (DT)
[   34.868748] Call trace:
[   34.869185]  show_stack+0x20/0x38 (C)
[   34.869870]  dump_stack_lvl+0x8c/0xd0
[   34.870590]  print_report+0x118/0x5e0
[   34.871359]  kasan_report+0xc8/0x118
[   34.871971]  __asan_report_store4_noabort+0x20/0x30
[   34.872729]  kasan_atomics_helper+0x3f94/0x4858
[   34.873441]  kasan_atomics+0x198/0x2e8
[   34.874161]  kunit_try_run_case+0x14c/0x3d0
[   34.874807]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.875568]  kthread+0x24c/0x2d0
[   34.876106]  ret_from_fork+0x10/0x20
[   34.876781] 
[   34.877119] Allocated by task 254:
[   34.877735]  kasan_save_stack+0x3c/0x68
[   34.878531]  kasan_save_track+0x20/0x40
[   34.879264]  kasan_save_alloc_info+0x40/0x58
[   34.879963]  __kasan_kmalloc+0xd4/0xd8
[   34.880623]  __kmalloc_cache_noprof+0x15c/0x3c0
[   34.881309]  kasan_atomics+0xb8/0x2e8
[   34.882019]  kunit_try_run_case+0x14c/0x3d0
[   34.882724]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.883597]  kthread+0x24c/0x2d0
[   34.884165]  ret_from_fork+0x10/0x20
[   34.884809] 
[   34.885341] The buggy address belongs to the object at fff00000c594f180
[   34.885341]  which belongs to the cache kmalloc-64 of size 64
[   34.886840] The buggy address is located 0 bytes to the right of
[   34.886840]  allocated 48-byte region [fff00000c594f180, fff00000c594f1b0)
[   34.888271] 
[   34.888696] The buggy address belongs to the physical page:
[   34.889571] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10594f
[   34.890710] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   34.891605] page_type: f5(slab)
[   34.892209] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   34.893234] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   34.894218] page dumped because: kasan: bad access detected
[   34.895022] 
[   34.895562] Memory state around the buggy address:
[   34.896301]  fff00000c594f080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   34.897228]  fff00000c594f100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   34.898180] >fff00000c594f180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   34.899163]                                      ^
[   34.899855]  fff00000c594f200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.901083]  fff00000c594f280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.902044] ==================================================================
[   34.982941] ==================================================================
[   34.983861] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x47c/0x4858
[   34.985746] Write of size 4 at addr fff00000c594f1b0 by task kunit_try_catch/254
[   34.987188] 
[   34.987623] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241203 #1
[   34.989178] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.989746] Hardware name: linux,dummy-virt (DT)
[   34.990348] Call trace:
[   34.990867]  show_stack+0x20/0x38 (C)
[   34.991570]  dump_stack_lvl+0x8c/0xd0
[   34.992354]  print_report+0x118/0x5e0
[   34.993115]  kasan_report+0xc8/0x118
[   34.993690]  kasan_check_range+0x100/0x1a8
[   34.994297]  __kasan_check_write+0x20/0x30
[   34.995243]  kasan_atomics_helper+0x47c/0x4858
[   34.995946]  kasan_atomics+0x198/0x2e8
[   34.996525]  kunit_try_run_case+0x14c/0x3d0
[   34.996998]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.997816]  kthread+0x24c/0x2d0
[   34.998470]  ret_from_fork+0x10/0x20
[   34.998940] 
[   34.999218] Allocated by task 254:
[   34.999818]  kasan_save_stack+0x3c/0x68
[   35.000450]  kasan_save_track+0x20/0x40
[   35.001042]  kasan_save_alloc_info+0x40/0x58
[   35.001670]  __kasan_kmalloc+0xd4/0xd8
[   35.002279]  __kmalloc_cache_noprof+0x15c/0x3c0
[   35.002957]  kasan_atomics+0xb8/0x2e8
[   35.003543]  kunit_try_run_case+0x14c/0x3d0
[   35.004162]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.004837]  kthread+0x24c/0x2d0
[   35.005450]  ret_from_fork+0x10/0x20
[   35.005973] 
[   35.006374] The buggy address belongs to the object at fff00000c594f180
[   35.006374]  which belongs to the cache kmalloc-64 of size 64
[   35.007839] The buggy address is located 0 bytes to the right of
[   35.007839]  allocated 48-byte region [fff00000c594f180, fff00000c594f1b0)
[   35.009274] 
[   35.009633] The buggy address belongs to the physical page:
[   35.010310] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10594f
[   35.011418] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   35.012302] page_type: f5(slab)
[   35.012816] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   35.013820] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   35.014748] page dumped because: kasan: bad access detected
[   35.015437] 
[   35.015667] Memory state around the buggy address:
[   35.016429]  fff00000c594f080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.017267]  fff00000c594f100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.018084] >fff00000c594f180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   35.019035]                                      ^
[   35.019678]  fff00000c594f200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.020634]  fff00000c594f280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.021603] ==================================================================
[   35.844979] ==================================================================
[   35.845814] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3dd8/0x4858
[   35.847556] Read of size 4 at addr fff00000c594f1b0 by task kunit_try_catch/254
[   35.848779] 
[   35.849574] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241203 #1
[   35.850996] Tainted: [B]=BAD_PAGE, [N]=TEST
[   35.851580] Hardware name: linux,dummy-virt (DT)
[   35.852398] Call trace:
[   35.852759]  show_stack+0x20/0x38 (C)
[   35.853366]  dump_stack_lvl+0x8c/0xd0
[   35.854219]  print_report+0x118/0x5e0
[   35.854832]  kasan_report+0xc8/0x118
[   35.855530]  __asan_report_load4_noabort+0x20/0x30
[   35.856249]  kasan_atomics_helper+0x3dd8/0x4858
[   35.856941]  kasan_atomics+0x198/0x2e8
[   35.857552]  kunit_try_run_case+0x14c/0x3d0
[   35.858269]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.859121]  kthread+0x24c/0x2d0
[   35.859713]  ret_from_fork+0x10/0x20
[   35.860355] 
[   35.860763] Allocated by task 254:
[   35.861385]  kasan_save_stack+0x3c/0x68
[   35.862033]  kasan_save_track+0x20/0x40
[   35.863180]  kasan_save_alloc_info+0x40/0x58
[   35.863852]  __kasan_kmalloc+0xd4/0xd8
[   35.864803]  __kmalloc_cache_noprof+0x15c/0x3c0
[   35.865679]  kasan_atomics+0xb8/0x2e8
[   35.866266]  kunit_try_run_case+0x14c/0x3d0
[   35.867175]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.868062]  kthread+0x24c/0x2d0
[   35.868671]  ret_from_fork+0x10/0x20
[   35.869264] 
[   35.869736] The buggy address belongs to the object at fff00000c594f180
[   35.869736]  which belongs to the cache kmalloc-64 of size 64
[   35.871254] The buggy address is located 0 bytes to the right of
[   35.871254]  allocated 48-byte region [fff00000c594f180, fff00000c594f1b0)
[   35.872772] 
[   35.873133] The buggy address belongs to the physical page:
[   35.874072] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10594f
[   35.875153] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   35.876067] page_type: f5(slab)
[   35.876652] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   35.877717] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   35.878669] page dumped because: kasan: bad access detected
[   35.879455] 
[   35.879834] Memory state around the buggy address:
[   35.880526]  fff00000c594f080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.881458]  fff00000c594f100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.882398] >fff00000c594f180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   35.883279]                                      ^
[   35.883994]  fff00000c594f200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.885038]  fff00000c594f280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.885959] ==================================================================
[   36.043366] ==================================================================
[   36.044539] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xe44/0x4858
[   36.045172] Write of size 8 at addr fff00000c594f1b0 by task kunit_try_catch/254
[   36.045931] 
[   36.046280] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241203 #1
[   36.047396] Tainted: [B]=BAD_PAGE, [N]=TEST
[   36.047977] Hardware name: linux,dummy-virt (DT)
[   36.048732] Call trace:
[   36.049154]  show_stack+0x20/0x38 (C)
[   36.049938]  dump_stack_lvl+0x8c/0xd0
[   36.050645]  print_report+0x118/0x5e0
[   36.051201]  kasan_report+0xc8/0x118
[   36.051804]  kasan_check_range+0x100/0x1a8
[   36.052460]  __kasan_check_write+0x20/0x30
[   36.053036]  kasan_atomics_helper+0xe44/0x4858
[   36.053775]  kasan_atomics+0x198/0x2e8
[   36.054407]  kunit_try_run_case+0x14c/0x3d0
[   36.055027]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.055797]  kthread+0x24c/0x2d0
[   36.056428]  ret_from_fork+0x10/0x20
[   36.057090] 
[   36.057444] Allocated by task 254:
[   36.057888]  kasan_save_stack+0x3c/0x68
[   36.058534]  kasan_save_track+0x20/0x40
[   36.059102]  kasan_save_alloc_info+0x40/0x58
[   36.059820]  __kasan_kmalloc+0xd4/0xd8
[   36.060395]  __kmalloc_cache_noprof+0x15c/0x3c0
[   36.060962]  kasan_atomics+0xb8/0x2e8
[   36.061676]  kunit_try_run_case+0x14c/0x3d0
[   36.062307]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.063061]  kthread+0x24c/0x2d0
[   36.063561]  ret_from_fork+0x10/0x20
[   36.064115] 
[   36.064519] The buggy address belongs to the object at fff00000c594f180
[   36.064519]  which belongs to the cache kmalloc-64 of size 64
[   36.065921] The buggy address is located 0 bytes to the right of
[   36.065921]  allocated 48-byte region [fff00000c594f180, fff00000c594f1b0)
[   36.067310] 
[   36.067613] The buggy address belongs to the physical page:
[   36.068344] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10594f
[   36.069248] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   36.070168] page_type: f5(slab)
[   36.070705] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   36.071641] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   36.072589] page dumped because: kasan: bad access detected
[   36.073353] 
[   36.073677] Memory state around the buggy address:
[   36.074355]  fff00000c594f080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   36.075238]  fff00000c594f100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   36.076026] >fff00000c594f180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   36.076960]                                      ^
[   36.077589]  fff00000c594f200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.078493]  fff00000c594f280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.079370] ==================================================================
[   34.583862] ==================================================================
[   34.585662] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x40a8/0x4858
[   34.586757] Read of size 4 at addr fff00000c594f1b0 by task kunit_try_catch/254
[   34.587396] 
[   34.587715] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241203 #1
[   34.588949] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.589532] Hardware name: linux,dummy-virt (DT)
[   34.590246] Call trace:
[   34.590680]  show_stack+0x20/0x38 (C)
[   34.591389]  dump_stack_lvl+0x8c/0xd0
[   34.592024]  print_report+0x118/0x5e0
[   34.592714]  kasan_report+0xc8/0x118
[   34.593281]  __asan_report_load4_noabort+0x20/0x30
[   34.594191]  kasan_atomics_helper+0x40a8/0x4858
[   34.594877]  kasan_atomics+0x198/0x2e8
[   34.595424]  kunit_try_run_case+0x14c/0x3d0
[   34.596210]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.597002]  kthread+0x24c/0x2d0
[   34.597654]  ret_from_fork+0x10/0x20
[   34.598362] 
[   34.598763] Allocated by task 254:
[   34.599241]  kasan_save_stack+0x3c/0x68
[   34.599819]  kasan_save_track+0x20/0x40
[   34.600414]  kasan_save_alloc_info+0x40/0x58
[   34.601008]  __kasan_kmalloc+0xd4/0xd8
[   34.601668]  __kmalloc_cache_noprof+0x15c/0x3c0
[   34.602365]  kasan_atomics+0xb8/0x2e8
[   34.602991]  kunit_try_run_case+0x14c/0x3d0
[   34.603628]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.604366]  kthread+0x24c/0x2d0
[   34.604809]  ret_from_fork+0x10/0x20
[   34.605481] 
[   34.605852] The buggy address belongs to the object at fff00000c594f180
[   34.605852]  which belongs to the cache kmalloc-64 of size 64
[   34.607185] The buggy address is located 0 bytes to the right of
[   34.607185]  allocated 48-byte region [fff00000c594f180, fff00000c594f1b0)
[   34.608622] 
[   34.608927] The buggy address belongs to the physical page:
[   34.609789] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10594f
[   34.610784] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   34.611503] page_type: f5(slab)
[   34.612096] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   34.613086] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   34.614060] page dumped because: kasan: bad access detected
[   34.615011] 
[   34.615535] Memory state around the buggy address:
[   34.616300]  fff00000c594f080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   34.617262]  fff00000c594f100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   34.618141] >fff00000c594f180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   34.619063]                                      ^
[   34.619781]  fff00000c594f200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.620730]  fff00000c594f280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.621655] ==================================================================
[   35.725812] ==================================================================
[   35.726540] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xc08/0x4858
[   35.727475] Write of size 4 at addr fff00000c594f1b0 by task kunit_try_catch/254
[   35.728405] 
[   35.728715] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241203 #1
[   35.729957] Tainted: [B]=BAD_PAGE, [N]=TEST
[   35.730766] Hardware name: linux,dummy-virt (DT)
[   35.731499] Call trace:
[   35.731905]  show_stack+0x20/0x38 (C)
[   35.732671]  dump_stack_lvl+0x8c/0xd0
[   35.733284]  print_report+0x118/0x5e0
[   35.734220]  kasan_report+0xc8/0x118
[   35.734901]  kasan_check_range+0x100/0x1a8
[   35.735792]  __kasan_check_write+0x20/0x30
[   35.736608]  kasan_atomics_helper+0xc08/0x4858
[   35.737427]  kasan_atomics+0x198/0x2e8
[   35.738210]  kunit_try_run_case+0x14c/0x3d0
[   35.738859]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.739822]  kthread+0x24c/0x2d0
[   35.740527]  ret_from_fork+0x10/0x20
[   35.741109] 
[   35.741432] Allocated by task 254:
[   35.741940]  kasan_save_stack+0x3c/0x68
[   35.742551]  kasan_save_track+0x20/0x40
[   35.743138]  kasan_save_alloc_info+0x40/0x58
[   35.743752]  __kasan_kmalloc+0xd4/0xd8
[   35.744408]  __kmalloc_cache_noprof+0x15c/0x3c0
[   35.745035]  kasan_atomics+0xb8/0x2e8
[   35.745582]  kunit_try_run_case+0x14c/0x3d0
[   35.746248]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.747035]  kthread+0x24c/0x2d0
[   35.747541]  ret_from_fork+0x10/0x20
[   35.748047] 
[   35.748514] The buggy address belongs to the object at fff00000c594f180
[   35.748514]  which belongs to the cache kmalloc-64 of size 64
[   35.749968] The buggy address is located 0 bytes to the right of
[   35.749968]  allocated 48-byte region [fff00000c594f180, fff00000c594f1b0)
[   35.751383] 
[   35.751670] The buggy address belongs to the physical page:
[   35.752319] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10594f
[   35.753344] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   35.754176] page_type: f5(slab)
[   35.754727] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   35.755673] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   35.756590] page dumped because: kasan: bad access detected
[   35.757310] 
[   35.757640] Memory state around the buggy address:
[   35.758319]  fff00000c594f080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.759217]  fff00000c594f100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.760089] >fff00000c594f180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   35.760964]                                      ^
[   35.761631]  fff00000c594f200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.762580]  fff00000c594f280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.763471] ==================================================================
[   35.806844] ==================================================================
[   35.807704] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xca0/0x4858
[   35.808596] Write of size 4 at addr fff00000c594f1b0 by task kunit_try_catch/254
[   35.809456] 
[   35.809969] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241203 #1
[   35.811155] Tainted: [B]=BAD_PAGE, [N]=TEST
[   35.811780] Hardware name: linux,dummy-virt (DT)
[   35.812557] Call trace:
[   35.812953]  show_stack+0x20/0x38 (C)
[   35.813595]  dump_stack_lvl+0x8c/0xd0
[   35.814153]  print_report+0x118/0x5e0
[   35.814830]  kasan_report+0xc8/0x118
[   35.815521]  kasan_check_range+0x100/0x1a8
[   35.816079]  __kasan_check_write+0x20/0x30
[   35.816700]  kasan_atomics_helper+0xca0/0x4858
[   35.817293]  kasan_atomics+0x198/0x2e8
[   35.817749]  kunit_try_run_case+0x14c/0x3d0
[   35.818241]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.818824]  kthread+0x24c/0x2d0
[   35.819401]  ret_from_fork+0x10/0x20
[   35.820122] 
[   35.820534] Allocated by task 254:
[   35.821194]  kasan_save_stack+0x3c/0x68
[   35.821791]  kasan_save_track+0x20/0x40
[   35.822423]  kasan_save_alloc_info+0x40/0x58
[   35.822967]  __kasan_kmalloc+0xd4/0xd8
[   35.823713]  __kmalloc_cache_noprof+0x15c/0x3c0
[   35.824470]  kasan_atomics+0xb8/0x2e8
[   35.824928]  kunit_try_run_case+0x14c/0x3d0
[   35.825723]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.826530]  kthread+0x24c/0x2d0
[   35.827077]  ret_from_fork+0x10/0x20
[   35.827630] 
[   35.827988] The buggy address belongs to the object at fff00000c594f180
[   35.827988]  which belongs to the cache kmalloc-64 of size 64
[   35.829434] The buggy address is located 0 bytes to the right of
[   35.829434]  allocated 48-byte region [fff00000c594f180, fff00000c594f1b0)
[   35.830866] 
[   35.831194] The buggy address belongs to the physical page:
[   35.832151] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10594f
[   35.833040] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   35.833669] page_type: f5(slab)
[   35.834095] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   35.834853] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   35.836310] page dumped because: kasan: bad access detected
[   35.836985] 
[   35.837372] Memory state around the buggy address:
[   35.837987]  fff00000c594f080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.838900]  fff00000c594f100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.839808] >fff00000c594f180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   35.840643]                                      ^
[   35.841275]  fff00000c594f200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.842196]  fff00000c594f280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.843050] ==================================================================
[   36.403890] ==================================================================
[   36.404670] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1190/0x4858
[   36.405956] Write of size 8 at addr fff00000c594f1b0 by task kunit_try_catch/254
[   36.406738] 
[   36.407217] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241203 #1
[   36.408514] Tainted: [B]=BAD_PAGE, [N]=TEST
[   36.409086] Hardware name: linux,dummy-virt (DT)
[   36.409821] Call trace:
[   36.410314]  show_stack+0x20/0x38 (C)
[   36.410912]  dump_stack_lvl+0x8c/0xd0
[   36.411497]  print_report+0x118/0x5e0
[   36.412080]  kasan_report+0xc8/0x118
[   36.412770]  kasan_check_range+0x100/0x1a8
[   36.413344]  __kasan_check_write+0x20/0x30
[   36.414120]  kasan_atomics_helper+0x1190/0x4858
[   36.414868]  kasan_atomics+0x198/0x2e8
[   36.415528]  kunit_try_run_case+0x14c/0x3d0
[   36.416221]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.416988]  kthread+0x24c/0x2d0
[   36.417627]  ret_from_fork+0x10/0x20
[   36.418236] 
[   36.418610] Allocated by task 254:
[   36.419175]  kasan_save_stack+0x3c/0x68
[   36.419750]  kasan_save_track+0x20/0x40
[   36.420359]  kasan_save_alloc_info+0x40/0x58
[   36.420980]  __kasan_kmalloc+0xd4/0xd8
[   36.421543]  __kmalloc_cache_noprof+0x15c/0x3c0
[   36.422293]  kasan_atomics+0xb8/0x2e8
[   36.422811]  kunit_try_run_case+0x14c/0x3d0
[   36.423523]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.424227]  kthread+0x24c/0x2d0
[   36.424779]  ret_from_fork+0x10/0x20
[   36.425371] 
[   36.425672] The buggy address belongs to the object at fff00000c594f180
[   36.425672]  which belongs to the cache kmalloc-64 of size 64
[   36.427050] The buggy address is located 0 bytes to the right of
[   36.427050]  allocated 48-byte region [fff00000c594f180, fff00000c594f1b0)
[   36.428468] 
[   36.428823] The buggy address belongs to the physical page:
[   36.429565] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10594f
[   36.430559] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   36.431352] page_type: f5(slab)
[   36.431952] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   36.432834] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   36.433877] page dumped because: kasan: bad access detected
[   36.434567] 
[   36.434939] Memory state around the buggy address:
[   36.435615]  fff00000c594f080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   36.436462]  fff00000c594f100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   36.437411] >fff00000c594f180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   36.438392]                                      ^
[   36.438977]  fff00000c594f200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.439906]  fff00000c594f280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.440756] ==================================================================
[   34.663860] ==================================================================
[   34.664704] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1ec/0x4858
[   34.665513] Read of size 4 at addr fff00000c594f1b0 by task kunit_try_catch/254
[   34.666247] 
[   34.666704] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241203 #1
[   34.668861] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.669456] Hardware name: linux,dummy-virt (DT)
[   34.670057] Call trace:
[   34.670768]  show_stack+0x20/0x38 (C)
[   34.671589]  dump_stack_lvl+0x8c/0xd0
[   34.672135]  print_report+0x118/0x5e0
[   34.672691]  kasan_report+0xc8/0x118
[   34.673227]  kasan_check_range+0x100/0x1a8
[   34.673869]  __kasan_check_read+0x20/0x30
[   34.674483]  kasan_atomics_helper+0x1ec/0x4858
[   34.675243]  kasan_atomics+0x198/0x2e8
[   34.675848]  kunit_try_run_case+0x14c/0x3d0
[   34.676447]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.677298]  kthread+0x24c/0x2d0
[   34.677876]  ret_from_fork+0x10/0x20
[   34.678389] 
[   34.678740] Allocated by task 254:
[   34.679358]  kasan_save_stack+0x3c/0x68
[   34.679946]  kasan_save_track+0x20/0x40
[   34.680501]  kasan_save_alloc_info+0x40/0x58
[   34.681098]  __kasan_kmalloc+0xd4/0xd8
[   34.681795]  __kmalloc_cache_noprof+0x15c/0x3c0
[   34.682462]  kasan_atomics+0xb8/0x2e8
[   34.683077]  kunit_try_run_case+0x14c/0x3d0
[   34.683631]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.684442]  kthread+0x24c/0x2d0
[   34.684945]  ret_from_fork+0x10/0x20
[   34.685459] 
[   34.685917] The buggy address belongs to the object at fff00000c594f180
[   34.685917]  which belongs to the cache kmalloc-64 of size 64
[   34.687339] The buggy address is located 0 bytes to the right of
[   34.687339]  allocated 48-byte region [fff00000c594f180, fff00000c594f1b0)
[   34.688766] 
[   34.689117] The buggy address belongs to the physical page:
[   34.689865] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10594f
[   34.690878] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   34.691681] page_type: f5(slab)
[   34.692139] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   34.693162] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   34.694088] page dumped because: kasan: bad access detected
[   34.694827] 
[   34.695148] Memory state around the buggy address:
[   34.695749]  fff00000c594f080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   34.696666]  fff00000c594f100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   34.697552] >fff00000c594f180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   34.698477]                                      ^
[   34.699063]  fff00000c594f200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.699945]  fff00000c594f280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.700809] ==================================================================
[   35.177764] ==================================================================
[   35.178792] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x684/0x4858
[   35.179752] Write of size 4 at addr fff00000c594f1b0 by task kunit_try_catch/254
[   35.180547] 
[   35.180962] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241203 #1
[   35.182238] Tainted: [B]=BAD_PAGE, [N]=TEST
[   35.182721] Hardware name: linux,dummy-virt (DT)
[   35.183512] Call trace:
[   35.183894]  show_stack+0x20/0x38 (C)
[   35.184685]  dump_stack_lvl+0x8c/0xd0
[   35.185493]  print_report+0x118/0x5e0
[   35.186139]  kasan_report+0xc8/0x118
[   35.186751]  kasan_check_range+0x100/0x1a8
[   35.187410]  __kasan_check_write+0x20/0x30
[   35.188082]  kasan_atomics_helper+0x684/0x4858
[   35.188751]  kasan_atomics+0x198/0x2e8
[   35.189366]  kunit_try_run_case+0x14c/0x3d0
[   35.190035]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.190804]  kthread+0x24c/0x2d0
[   35.191490]  ret_from_fork+0x10/0x20
[   35.192046] 
[   35.192420] Allocated by task 254:
[   35.192927]  kasan_save_stack+0x3c/0x68
[   35.193436]  kasan_save_track+0x20/0x40
[   35.194065]  kasan_save_alloc_info+0x40/0x58
[   35.194694]  __kasan_kmalloc+0xd4/0xd8
[   35.195227]  __kmalloc_cache_noprof+0x15c/0x3c0
[   35.195920]  kasan_atomics+0xb8/0x2e8
[   35.196516]  kunit_try_run_case+0x14c/0x3d0
[   35.197035]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.197891]  kthread+0x24c/0x2d0
[   35.198419]  ret_from_fork+0x10/0x20
[   35.198928] 
[   35.199354] The buggy address belongs to the object at fff00000c594f180
[   35.199354]  which belongs to the cache kmalloc-64 of size 64
[   35.200775] The buggy address is located 0 bytes to the right of
[   35.200775]  allocated 48-byte region [fff00000c594f180, fff00000c594f1b0)
[   35.202121] 
[   35.202474] The buggy address belongs to the physical page:
[   35.203117] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10594f
[   35.204143] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   35.204875] page_type: f5(slab)
[   35.205423] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   35.206346] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   35.207288] page dumped because: kasan: bad access detected
[   35.208085] 
[   35.208456] Memory state around the buggy address:
[   35.209148]  fff00000c594f080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.210160]  fff00000c594f100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.211106] >fff00000c594f180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   35.212048]                                      ^
[   35.212895]  fff00000c594f200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.213806]  fff00000c594f280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.214810] ==================================================================
[   35.614004] ==================================================================
[   35.615896] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3dcc/0x4858
[   35.616914] Read of size 4 at addr fff00000c594f1b0 by task kunit_try_catch/254
[   35.617855] 
[   35.618241] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241203 #1
[   35.619538] Tainted: [B]=BAD_PAGE, [N]=TEST
[   35.620204] Hardware name: linux,dummy-virt (DT)
[   35.620810] Call trace:
[   35.621225]  show_stack+0x20/0x38 (C)
[   35.621856]  dump_stack_lvl+0x8c/0xd0
[   35.622443]  print_report+0x118/0x5e0
[   35.622952]  kasan_report+0xc8/0x118
[   35.623661]  __asan_report_load4_noabort+0x20/0x30
[   35.624353]  kasan_atomics_helper+0x3dcc/0x4858
[   35.625105]  kasan_atomics+0x198/0x2e8
[   35.625757]  kunit_try_run_case+0x14c/0x3d0
[   35.626476]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.627285]  kthread+0x24c/0x2d0
[   35.627865]  ret_from_fork+0x10/0x20
[   35.628423] 
[   35.628808] Allocated by task 254:
[   35.629282]  kasan_save_stack+0x3c/0x68
[   35.630017]  kasan_save_track+0x20/0x40
[   35.630528]  kasan_save_alloc_info+0x40/0x58
[   35.631217]  __kasan_kmalloc+0xd4/0xd8
[   35.631772]  __kmalloc_cache_noprof+0x15c/0x3c0
[   35.632423]  kasan_atomics+0xb8/0x2e8
[   35.632964]  kunit_try_run_case+0x14c/0x3d0
[   35.633605]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.634210]  kthread+0x24c/0x2d0
[   35.634812]  ret_from_fork+0x10/0x20
[   35.635421] 
[   35.635768] The buggy address belongs to the object at fff00000c594f180
[   35.635768]  which belongs to the cache kmalloc-64 of size 64
[   35.637250] The buggy address is located 0 bytes to the right of
[   35.637250]  allocated 48-byte region [fff00000c594f180, fff00000c594f1b0)
[   35.638618] 
[   35.639081] The buggy address belongs to the physical page:
[   35.639792] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10594f
[   35.640886] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   35.641699] page_type: f5(slab)
[   35.642284] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   35.643164] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   35.644126] page dumped because: kasan: bad access detected
[   35.644796] 
[   35.645102] Memory state around the buggy address:
[   35.645718]  fff00000c594f080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.646526]  fff00000c594f100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.646948] >fff00000c594f180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   35.647381]                                      ^
[   35.647702]  fff00000c594f200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.648118]  fff00000c594f280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.648678] ==================================================================
[   36.279955] ==================================================================
[   36.280735] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1058/0x4858
[   36.282257] Write of size 8 at addr fff00000c594f1b0 by task kunit_try_catch/254
[   36.283251] 
[   36.283660] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241203 #1
[   36.285068] Tainted: [B]=BAD_PAGE, [N]=TEST
[   36.285784] Hardware name: linux,dummy-virt (DT)
[   36.286634] Call trace:
[   36.287138]  show_stack+0x20/0x38 (C)
[   36.287904]  dump_stack_lvl+0x8c/0xd0
[   36.288596]  print_report+0x118/0x5e0
[   36.289222]  kasan_report+0xc8/0x118
[   36.289879]  kasan_check_range+0x100/0x1a8
[   36.290572]  __kasan_check_write+0x20/0x30
[   36.291253]  kasan_atomics_helper+0x1058/0x4858
[   36.292048]  kasan_atomics+0x198/0x2e8
[   36.292704]  kunit_try_run_case+0x14c/0x3d0
[   36.293441]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.294183]  kthread+0x24c/0x2d0
[   36.294853]  ret_from_fork+0x10/0x20
[   36.295490] 
[   36.295968] Allocated by task 254:
[   36.296509]  kasan_save_stack+0x3c/0x68
[   36.297197]  kasan_save_track+0x20/0x40
[   36.297885]  kasan_save_alloc_info+0x40/0x58
[   36.298589]  __kasan_kmalloc+0xd4/0xd8
[   36.299213]  __kmalloc_cache_noprof+0x15c/0x3c0
[   36.299950]  kasan_atomics+0xb8/0x2e8
[   36.300533]  kunit_try_run_case+0x14c/0x3d0
[   36.301160]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.301988]  kthread+0x24c/0x2d0
[   36.302604]  ret_from_fork+0x10/0x20
[   36.303265] 
[   36.303653] The buggy address belongs to the object at fff00000c594f180
[   36.303653]  which belongs to the cache kmalloc-64 of size 64
[   36.305099] The buggy address is located 0 bytes to the right of
[   36.305099]  allocated 48-byte region [fff00000c594f180, fff00000c594f1b0)
[   36.306699] 
[   36.307205] The buggy address belongs to the physical page:
[   36.308029] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10594f
[   36.309043] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   36.309936] page_type: f5(slab)
[   36.310546] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   36.311545] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   36.312518] page dumped because: kasan: bad access detected
[   36.313316] 
[   36.313795] Memory state around the buggy address:
[   36.314494]  fff00000c594f080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   36.315581]  fff00000c594f100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   36.316491] >fff00000c594f180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   36.317396]                                      ^
[   36.318188]  fff00000c594f200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.319084]  fff00000c594f280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.320105] ==================================================================
[   35.689147] ==================================================================
[   35.689879] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3dbc/0x4858
[   35.690655] Read of size 4 at addr fff00000c594f1b0 by task kunit_try_catch/254
[   35.691679] 
[   35.692003] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241203 #1
[   35.693241] Tainted: [B]=BAD_PAGE, [N]=TEST
[   35.693791] Hardware name: linux,dummy-virt (DT)
[   35.694396] Call trace:
[   35.694891]  show_stack+0x20/0x38 (C)
[   35.695408]  dump_stack_lvl+0x8c/0xd0
[   35.696087]  print_report+0x118/0x5e0
[   35.696668]  kasan_report+0xc8/0x118
[   35.697199]  __asan_report_load4_noabort+0x20/0x30
[   35.697917]  kasan_atomics_helper+0x3dbc/0x4858
[   35.698557]  kasan_atomics+0x198/0x2e8
[   35.699132]  kunit_try_run_case+0x14c/0x3d0
[   35.699803]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.700476]  kthread+0x24c/0x2d0
[   35.701095]  ret_from_fork+0x10/0x20
[   35.701713] 
[   35.702089] Allocated by task 254:
[   35.702612]  kasan_save_stack+0x3c/0x68
[   35.703201]  kasan_save_track+0x20/0x40
[   35.703798]  kasan_save_alloc_info+0x40/0x58
[   35.704346]  __kasan_kmalloc+0xd4/0xd8
[   35.704940]  __kmalloc_cache_noprof+0x15c/0x3c0
[   35.705624]  kasan_atomics+0xb8/0x2e8
[   35.706178]  kunit_try_run_case+0x14c/0x3d0
[   35.706725]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.707540]  kthread+0x24c/0x2d0
[   35.708013]  ret_from_fork+0x10/0x20
[   35.708693] 
[   35.709057] The buggy address belongs to the object at fff00000c594f180
[   35.709057]  which belongs to the cache kmalloc-64 of size 64
[   35.710498] The buggy address is located 0 bytes to the right of
[   35.710498]  allocated 48-byte region [fff00000c594f180, fff00000c594f1b0)
[   35.711953] 
[   35.712257] The buggy address belongs to the physical page:
[   35.712997] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10594f
[   35.713977] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   35.714804] page_type: f5(slab)
[   35.715373] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   35.716369] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   35.717305] page dumped because: kasan: bad access detected
[   35.718010] 
[   35.718317] Memory state around the buggy address:
[   35.718882]  fff00000c594f080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.719827]  fff00000c594f100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.720703] >fff00000c594f180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   35.721592]                                      ^
[   35.722144]  fff00000c594f200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.723066]  fff00000c594f280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.723941] ==================================================================
[   35.765266] ==================================================================
[   35.766357] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3de4/0x4858
[   35.767865] Read of size 4 at addr fff00000c594f1b0 by task kunit_try_catch/254
[   35.768943] 
[   35.769344] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241203 #1
[   35.770626] Tainted: [B]=BAD_PAGE, [N]=TEST
[   35.771498] Hardware name: linux,dummy-virt (DT)
[   35.772254] Call trace:
[   35.772877]  show_stack+0x20/0x38 (C)
[   35.773661]  dump_stack_lvl+0x8c/0xd0
[   35.774222]  print_report+0x118/0x5e0
[   35.774870]  kasan_report+0xc8/0x118
[   35.775447]  __asan_report_load4_noabort+0x20/0x30
[   35.776346]  kasan_atomics_helper+0x3de4/0x4858
[   35.777139]  kasan_atomics+0x198/0x2e8
[   35.777723]  kunit_try_run_case+0x14c/0x3d0
[   35.778484]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.779279]  kthread+0x24c/0x2d0
[   35.779881]  ret_from_fork+0x10/0x20
[   35.780544] 
[   35.780859] Allocated by task 254:
[   35.781518]  kasan_save_stack+0x3c/0x68
[   35.782142]  kasan_save_track+0x20/0x40
[   35.782906]  kasan_save_alloc_info+0x40/0x58
[   35.783597]  __kasan_kmalloc+0xd4/0xd8
[   35.784305]  __kmalloc_cache_noprof+0x15c/0x3c0
[   35.784986]  kasan_atomics+0xb8/0x2e8
[   35.785597]  kunit_try_run_case+0x14c/0x3d0
[   35.786299]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.787079]  kthread+0x24c/0x2d0
[   35.787693]  ret_from_fork+0x10/0x20
[   35.788315] 
[   35.788702] The buggy address belongs to the object at fff00000c594f180
[   35.788702]  which belongs to the cache kmalloc-64 of size 64
[   35.790375] The buggy address is located 0 bytes to the right of
[   35.790375]  allocated 48-byte region [fff00000c594f180, fff00000c594f1b0)
[   35.791965] 
[   35.792414] The buggy address belongs to the physical page:
[   35.793188] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10594f
[   35.794204] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   35.795124] page_type: f5(slab)
[   35.795772] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   35.796772] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   35.797728] page dumped because: kasan: bad access detected
[   35.798569] 
[   35.798902] Memory state around the buggy address:
[   35.799766]  fff00000c594f080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.800843]  fff00000c594f100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.801899] >fff00000c594f180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   35.802776]                                      ^
[   35.803355]  fff00000c594f200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.804050]  fff00000c594f280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.804823] ==================================================================
[   36.730681] ==================================================================
[   36.731392] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x14e4/0x4858
[   36.732837] Write of size 8 at addr fff00000c594f1b0 by task kunit_try_catch/254
[   36.733808] 
[   36.734213] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241203 #1
[   36.735462] Tainted: [B]=BAD_PAGE, [N]=TEST
[   36.736034] Hardware name: linux,dummy-virt (DT)
[   36.736702] Call trace:
[   36.737174]  show_stack+0x20/0x38 (C)
[   36.737788]  dump_stack_lvl+0x8c/0xd0
[   36.738409]  print_report+0x118/0x5e0
[   36.739000]  kasan_report+0xc8/0x118
[   36.739616]  kasan_check_range+0x100/0x1a8
[   36.740221]  __kasan_check_write+0x20/0x30
[   36.740877]  kasan_atomics_helper+0x14e4/0x4858
[   36.741463]  kasan_atomics+0x198/0x2e8
[   36.742117]  kunit_try_run_case+0x14c/0x3d0
[   36.742687]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.743568]  kthread+0x24c/0x2d0
[   36.744158]  ret_from_fork+0x10/0x20
[   36.744815] 
[   36.745092] Allocated by task 254:
[   36.745714]  kasan_save_stack+0x3c/0x68
[   36.746322]  kasan_save_track+0x20/0x40
[   36.746873]  kasan_save_alloc_info+0x40/0x58
[   36.747497]  __kasan_kmalloc+0xd4/0xd8
[   36.748060]  __kmalloc_cache_noprof+0x15c/0x3c0
[   36.748831]  kasan_atomics+0xb8/0x2e8
[   36.749361]  kunit_try_run_case+0x14c/0x3d0
[   36.750083]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.750846]  kthread+0x24c/0x2d0
[   36.751388]  ret_from_fork+0x10/0x20
[   36.751982] 
[   36.752279] The buggy address belongs to the object at fff00000c594f180
[   36.752279]  which belongs to the cache kmalloc-64 of size 64
[   36.753664] The buggy address is located 0 bytes to the right of
[   36.753664]  allocated 48-byte region [fff00000c594f180, fff00000c594f1b0)
[   36.755167] 
[   36.755534] The buggy address belongs to the physical page:
[   36.756155] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10594f
[   36.757217] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   36.758156] page_type: f5(slab)
[   36.758635] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   36.759643] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   36.760640] page dumped because: kasan: bad access detected
[   36.761408] 
[   36.761704] Memory state around the buggy address:
[   36.762270]  fff00000c594f080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   36.763241]  fff00000c594f100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   36.764097] >fff00000c594f180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   36.764972]                                      ^
[   36.765619]  fff00000c594f200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.766500]  fff00000c594f280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.767415] ==================================================================
[   36.363842] ==================================================================
[   36.365703] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1128/0x4858
[   36.366555] Write of size 8 at addr fff00000c594f1b0 by task kunit_try_catch/254
[   36.366981] 
[   36.367661] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241203 #1
[   36.369298] Tainted: [B]=BAD_PAGE, [N]=TEST
[   36.369821] Hardware name: linux,dummy-virt (DT)
[   36.370594] Call trace:
[   36.371043]  show_stack+0x20/0x38 (C)
[   36.371662]  dump_stack_lvl+0x8c/0xd0
[   36.372175]  print_report+0x118/0x5e0
[   36.372878]  kasan_report+0xc8/0x118
[   36.373506]  kasan_check_range+0x100/0x1a8
[   36.374091]  __kasan_check_write+0x20/0x30
[   36.374847]  kasan_atomics_helper+0x1128/0x4858
[   36.375516]  kasan_atomics+0x198/0x2e8
[   36.376060]  kunit_try_run_case+0x14c/0x3d0
[   36.376725]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.377526]  kthread+0x24c/0x2d0
[   36.378091]  ret_from_fork+0x10/0x20
[   36.378688] 
[   36.379049] Allocated by task 254:
[   36.379625]  kasan_save_stack+0x3c/0x68
[   36.380147]  kasan_save_track+0x20/0x40
[   36.380763]  kasan_save_alloc_info+0x40/0x58
[   36.381401]  __kasan_kmalloc+0xd4/0xd8
[   36.381908]  __kmalloc_cache_noprof+0x15c/0x3c0
[   36.382597]  kasan_atomics+0xb8/0x2e8
[   36.383239]  kunit_try_run_case+0x14c/0x3d0
[   36.383947]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.384955]  kthread+0x24c/0x2d0
[   36.385622]  ret_from_fork+0x10/0x20
[   36.386151] 
[   36.386532] The buggy address belongs to the object at fff00000c594f180
[   36.386532]  which belongs to the cache kmalloc-64 of size 64
[   36.388130] The buggy address is located 0 bytes to the right of
[   36.388130]  allocated 48-byte region [fff00000c594f180, fff00000c594f1b0)
[   36.389599] 
[   36.389930] The buggy address belongs to the physical page:
[   36.390756] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10594f
[   36.391677] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   36.392598] page_type: f5(slab)
[   36.393034] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   36.394101] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   36.394995] page dumped because: kasan: bad access detected
[   36.395857] 
[   36.396295] Memory state around the buggy address:
[   36.396874]  fff00000c594f080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   36.397782]  fff00000c594f100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   36.398674] >fff00000c594f180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   36.399591]                                      ^
[   36.400344]  fff00000c594f200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.401196]  fff00000c594f280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.402205] ==================================================================
[   36.808987] ==================================================================
[   36.809691] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x15b4/0x4858
[   36.811250] Write of size 8 at addr fff00000c594f1b0 by task kunit_try_catch/254
[   36.812681] 
[   36.813291] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241203 #1
[   36.815188] Tainted: [B]=BAD_PAGE, [N]=TEST
[   36.815908] Hardware name: linux,dummy-virt (DT)
[   36.816489] Call trace:
[   36.816925]  show_stack+0x20/0x38 (C)
[   36.817614]  dump_stack_lvl+0x8c/0xd0
[   36.818492]  print_report+0x118/0x5e0
[   36.819233]  kasan_report+0xc8/0x118
[   36.819776]  kasan_check_range+0x100/0x1a8
[   36.820405]  __kasan_check_write+0x20/0x30
[   36.821064]  kasan_atomics_helper+0x15b4/0x4858
[   36.821890]  kasan_atomics+0x198/0x2e8
[   36.822491]  kunit_try_run_case+0x14c/0x3d0
[   36.823081]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.824003]  kthread+0x24c/0x2d0
[   36.824644]  ret_from_fork+0x10/0x20
[   36.825157] 
[   36.825545] Allocated by task 254:
[   36.826123]  kasan_save_stack+0x3c/0x68
[   36.826720]  kasan_save_track+0x20/0x40
[   36.827279]  kasan_save_alloc_info+0x40/0x58
[   36.827949]  __kasan_kmalloc+0xd4/0xd8
[   36.828614]  __kmalloc_cache_noprof+0x15c/0x3c0
[   36.829234]  kasan_atomics+0xb8/0x2e8
[   36.829786]  kunit_try_run_case+0x14c/0x3d0
[   36.830437]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.831131]  kthread+0x24c/0x2d0
[   36.831594]  ret_from_fork+0x10/0x20
[   36.832188] 
[   36.832559] The buggy address belongs to the object at fff00000c594f180
[   36.832559]  which belongs to the cache kmalloc-64 of size 64
[   36.833890] The buggy address is located 0 bytes to the right of
[   36.833890]  allocated 48-byte region [fff00000c594f180, fff00000c594f1b0)
[   36.835394] 
[   36.835676] The buggy address belongs to the physical page:
[   36.836492] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10594f
[   36.837665] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   36.839148] page_type: f5(slab)
[   36.839615] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   36.840644] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   36.841824] page dumped because: kasan: bad access detected
[   36.842689] 
[   36.843244] Memory state around the buggy address:
[   36.843882]  fff00000c594f080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   36.844795]  fff00000c594f100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   36.845690] >fff00000c594f180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   36.846464]                                      ^
[   36.847077]  fff00000c594f200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.848100]  fff00000c594f280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.848991] ==================================================================
[   35.451717] ==================================================================
[   35.452492] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x99c/0x4858
[   35.453366] Write of size 4 at addr fff00000c594f1b0 by task kunit_try_catch/254
[   35.454355] 
[   35.454707] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241203 #1
[   35.456255] Tainted: [B]=BAD_PAGE, [N]=TEST
[   35.457320] Hardware name: linux,dummy-virt (DT)
[   35.457970] Call trace:
[   35.458408]  show_stack+0x20/0x38 (C)
[   35.458944]  dump_stack_lvl+0x8c/0xd0
[   35.459576]  print_report+0x118/0x5e0
[   35.460475]  kasan_report+0xc8/0x118
[   35.461169]  kasan_check_range+0x100/0x1a8
[   35.461952]  __kasan_check_write+0x20/0x30
[   35.462585]  kasan_atomics_helper+0x99c/0x4858
[   35.462922]  kasan_atomics+0x198/0x2e8
[   35.463215]  kunit_try_run_case+0x14c/0x3d0
[   35.464278]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.465135]  kthread+0x24c/0x2d0
[   35.465849]  ret_from_fork+0x10/0x20
[   35.466676] 
[   35.467079] Allocated by task 254:
[   35.467730]  kasan_save_stack+0x3c/0x68
[   35.468410]  kasan_save_track+0x20/0x40
[   35.469096]  kasan_save_alloc_info+0x40/0x58
[   35.469899]  __kasan_kmalloc+0xd4/0xd8
[   35.470482]  __kmalloc_cache_noprof+0x15c/0x3c0
[   35.471149]  kasan_atomics+0xb8/0x2e8
[   35.471762]  kunit_try_run_case+0x14c/0x3d0
[   35.472430]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.473208]  kthread+0x24c/0x2d0
[   35.473784]  ret_from_fork+0x10/0x20
[   35.474431] 
[   35.474798] The buggy address belongs to the object at fff00000c594f180
[   35.474798]  which belongs to the cache kmalloc-64 of size 64
[   35.476376] The buggy address is located 0 bytes to the right of
[   35.476376]  allocated 48-byte region [fff00000c594f180, fff00000c594f1b0)
[   35.477969] 
[   35.478260] The buggy address belongs to the physical page:
[   35.479165] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10594f
[   35.480251] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   35.481166] page_type: f5(slab)
[   35.481741] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   35.482854] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   35.483906] page dumped because: kasan: bad access detected
[   35.484712] 
[   35.485234] Memory state around the buggy address:
[   35.485810]  fff00000c594f080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.486876]  fff00000c594f100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.487747] >fff00000c594f180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   35.488642]                                      ^
[   35.489263]  fff00000c594f200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.490159]  fff00000c594f280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.491213] ==================================================================
[   34.821604] ==================================================================
[   34.822348] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x32c/0x4858
[   34.823931] Write of size 4 at addr fff00000c594f1b0 by task kunit_try_catch/254
[   34.825863] 
[   34.826510] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241203 #1
[   34.827736] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.828279] Hardware name: linux,dummy-virt (DT)
[   34.829176] Call trace:
[   34.829779]  show_stack+0x20/0x38 (C)
[   34.830530]  dump_stack_lvl+0x8c/0xd0
[   34.831088]  print_report+0x118/0x5e0
[   34.831870]  kasan_report+0xc8/0x118
[   34.832411]  kasan_check_range+0x100/0x1a8
[   34.833093]  __kasan_check_write+0x20/0x30
[   34.833736]  kasan_atomics_helper+0x32c/0x4858
[   34.834489]  kasan_atomics+0x198/0x2e8
[   34.834985]  kunit_try_run_case+0x14c/0x3d0
[   34.835762]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.836605]  kthread+0x24c/0x2d0
[   34.837129]  ret_from_fork+0x10/0x20
[   34.837718] 
[   34.838073] Allocated by task 254:
[   34.838570]  kasan_save_stack+0x3c/0x68
[   34.839213]  kasan_save_track+0x20/0x40
[   34.839746]  kasan_save_alloc_info+0x40/0x58
[   34.840472]  __kasan_kmalloc+0xd4/0xd8
[   34.840947]  __kmalloc_cache_noprof+0x15c/0x3c0
[   34.841675]  kasan_atomics+0xb8/0x2e8
[   34.842261]  kunit_try_run_case+0x14c/0x3d0
[   34.842877]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.843575]  kthread+0x24c/0x2d0
[   34.844182]  ret_from_fork+0x10/0x20
[   34.844781] 
[   34.845077] The buggy address belongs to the object at fff00000c594f180
[   34.845077]  which belongs to the cache kmalloc-64 of size 64
[   34.846606] The buggy address is located 0 bytes to the right of
[   34.846606]  allocated 48-byte region [fff00000c594f180, fff00000c594f1b0)
[   34.847999] 
[   34.848345] The buggy address belongs to the physical page:
[   34.849039] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10594f
[   34.849988] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   34.850834] page_type: f5(slab)
[   34.851298] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   34.852547] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   34.853421] page dumped because: kasan: bad access detected
[   34.854088] 
[   34.854441] Memory state around the buggy address:
[   34.855093]  fff00000c594f080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   34.855958]  fff00000c594f100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   34.856863] >fff00000c594f180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   34.857700]                                      ^
[   34.858295]  fff00000c594f200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.859235]  fff00000c594f280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.860062] ==================================================================
[   35.100157] ==================================================================
[   35.100813] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x5b4/0x4858
[   35.101968] Write of size 4 at addr fff00000c594f1b0 by task kunit_try_catch/254
[   35.102821] 
[   35.103348] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241203 #1
[   35.104571] Tainted: [B]=BAD_PAGE, [N]=TEST
[   35.105279] Hardware name: linux,dummy-virt (DT)
[   35.106061] Call trace:
[   35.106476]  show_stack+0x20/0x38 (C)
[   35.107048]  dump_stack_lvl+0x8c/0xd0
[   35.107626]  print_report+0x118/0x5e0
[   35.108227]  kasan_report+0xc8/0x118
[   35.109097]  kasan_check_range+0x100/0x1a8
[   35.109703]  __kasan_check_write+0x20/0x30
[   35.110410]  kasan_atomics_helper+0x5b4/0x4858
[   35.111013]  kasan_atomics+0x198/0x2e8
[   35.111705]  kunit_try_run_case+0x14c/0x3d0
[   35.112368]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.113042]  kthread+0x24c/0x2d0
[   35.113700]  ret_from_fork+0x10/0x20
[   35.114288] 
[   35.114712] Allocated by task 254:
[   35.115259]  kasan_save_stack+0x3c/0x68
[   35.115843]  kasan_save_track+0x20/0x40
[   35.116387]  kasan_save_alloc_info+0x40/0x58
[   35.117018]  __kasan_kmalloc+0xd4/0xd8
[   35.117621]  __kmalloc_cache_noprof+0x15c/0x3c0
[   35.118177]  kasan_atomics+0xb8/0x2e8
[   35.118826]  kunit_try_run_case+0x14c/0x3d0
[   35.119462]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.120196]  kthread+0x24c/0x2d0
[   35.120805]  ret_from_fork+0x10/0x20
[   35.121367] 
[   35.121656] The buggy address belongs to the object at fff00000c594f180
[   35.121656]  which belongs to the cache kmalloc-64 of size 64
[   35.123135] The buggy address is located 0 bytes to the right of
[   35.123135]  allocated 48-byte region [fff00000c594f180, fff00000c594f1b0)
[   35.124486] 
[   35.124791] The buggy address belongs to the physical page:
[   35.125628] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10594f
[   35.126540] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   35.127485] page_type: f5(slab)
[   35.127956] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   35.128995] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   35.129912] page dumped because: kasan: bad access detected
[   35.130668] 
[   35.131007] Memory state around the buggy address:
[   35.131635]  fff00000c594f080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.132462]  fff00000c594f100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.133369] >fff00000c594f180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   35.134211]                                      ^
[   35.134899]  fff00000c594f200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.135803]  fff00000c594f280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.136733] ==================================================================
[   36.607937] ==================================================================
[   36.608849] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f04/0x4858
[   36.609780] Read of size 8 at addr fff00000c594f1b0 by task kunit_try_catch/254
[   36.610776] 
[   36.611178] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241203 #1
[   36.612103] Tainted: [B]=BAD_PAGE, [N]=TEST
[   36.612515] Hardware name: linux,dummy-virt (DT)
[   36.612940] Call trace:
[   36.613233]  show_stack+0x20/0x38 (C)
[   36.613689]  dump_stack_lvl+0x8c/0xd0
[   36.614620]  print_report+0x118/0x5e0
[   36.615494]  kasan_report+0xc8/0x118
[   36.616154]  __asan_report_load8_noabort+0x20/0x30
[   36.616920]  kasan_atomics_helper+0x3f04/0x4858
[   36.617397]  kasan_atomics+0x198/0x2e8
[   36.617798]  kunit_try_run_case+0x14c/0x3d0
[   36.619395]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.620568]  kthread+0x24c/0x2d0
[   36.620974]  ret_from_fork+0x10/0x20
[   36.621940] 
[   36.622966] Allocated by task 254:
[   36.623971]  kasan_save_stack+0x3c/0x68
[   36.624560]  kasan_save_track+0x20/0x40
[   36.625030]  kasan_save_alloc_info+0x40/0x58
[   36.625970]  __kasan_kmalloc+0xd4/0xd8
[   36.626611]  __kmalloc_cache_noprof+0x15c/0x3c0
[   36.627070]  kasan_atomics+0xb8/0x2e8
[   36.628165]  kunit_try_run_case+0x14c/0x3d0
[   36.629306]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.630030]  kthread+0x24c/0x2d0
[   36.630485]  ret_from_fork+0x10/0x20
[   36.630973] 
[   36.631377] The buggy address belongs to the object at fff00000c594f180
[   36.631377]  which belongs to the cache kmalloc-64 of size 64
[   36.632980] The buggy address is located 0 bytes to the right of
[   36.632980]  allocated 48-byte region [fff00000c594f180, fff00000c594f1b0)
[   36.634105] 
[   36.634722] The buggy address belongs to the physical page:
[   36.635213] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10594f
[   36.637076] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   36.639172] page_type: f5(slab)
[   36.640017] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   36.641506] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   36.642395] page dumped because: kasan: bad access detected
[   36.643033] 
[   36.643442] Memory state around the buggy address:
[   36.644152]  fff00000c594f080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   36.644955]  fff00000c594f100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   36.645905] >fff00000c594f180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   36.646789]                                      ^
[   36.647563]  fff00000c594f200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.648381]  fff00000c594f280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.649367] ==================================================================
[   35.650612] ==================================================================
[   35.651520] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xb70/0x4858
[   35.652438] Write of size 4 at addr fff00000c594f1b0 by task kunit_try_catch/254
[   35.653298] 
[   35.653715] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241203 #1
[   35.655140] Tainted: [B]=BAD_PAGE, [N]=TEST
[   35.655652] Hardware name: linux,dummy-virt (DT)
[   35.656502] Call trace:
[   35.656940]  show_stack+0x20/0x38 (C)
[   35.657640]  dump_stack_lvl+0x8c/0xd0
[   35.658226]  print_report+0x118/0x5e0
[   35.658919]  kasan_report+0xc8/0x118
[   35.659536]  kasan_check_range+0x100/0x1a8
[   35.660187]  __kasan_check_write+0x20/0x30
[   35.660817]  kasan_atomics_helper+0xb70/0x4858
[   35.661374]  kasan_atomics+0x198/0x2e8
[   35.662037]  kunit_try_run_case+0x14c/0x3d0
[   35.662649]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.663517]  kthread+0x24c/0x2d0
[   35.664083]  ret_from_fork+0x10/0x20
[   35.664616] 
[   35.664993] Allocated by task 254:
[   35.665571]  kasan_save_stack+0x3c/0x68
[   35.666061]  kasan_save_track+0x20/0x40
[   35.666833]  kasan_save_alloc_info+0x40/0x58
[   35.667342]  __kasan_kmalloc+0xd4/0xd8
[   35.668079]  __kmalloc_cache_noprof+0x15c/0x3c0
[   35.668704]  kasan_atomics+0xb8/0x2e8
[   35.669220]  kunit_try_run_case+0x14c/0x3d0
[   35.670013]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.670630]  kthread+0x24c/0x2d0
[   35.671253]  ret_from_fork+0x10/0x20
[   35.671858] 
[   35.672238] The buggy address belongs to the object at fff00000c594f180
[   35.672238]  which belongs to the cache kmalloc-64 of size 64
[   35.673685] The buggy address is located 0 bytes to the right of
[   35.673685]  allocated 48-byte region [fff00000c594f180, fff00000c594f1b0)
[   35.675087] 
[   35.675449] The buggy address belongs to the physical page:
[   35.676084] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10594f
[   35.677097] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   35.677965] page_type: f5(slab)
[   35.678464] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   35.679465] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   35.680377] page dumped because: kasan: bad access detected
[   35.681042] 
[   35.681379] Memory state around the buggy address:
[   35.682004]  fff00000c594f080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.682904]  fff00000c594f100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.683778] >fff00000c594f180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   35.684707]                                      ^
[   35.685353]  fff00000c594f200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.686237]  fff00000c594f280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.687128] ==================================================================
[   35.964775] ==================================================================
[   35.965677] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xdd4/0x4858
[   35.966267] Read of size 8 at addr fff00000c594f1b0 by task kunit_try_catch/254
[   35.967196] 
[   35.967525] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241203 #1
[   35.968997] Tainted: [B]=BAD_PAGE, [N]=TEST
[   35.969659] Hardware name: linux,dummy-virt (DT)
[   35.970267] Call trace:
[   35.970700]  show_stack+0x20/0x38 (C)
[   35.971316]  dump_stack_lvl+0x8c/0xd0
[   35.971837]  print_report+0x118/0x5e0
[   35.972508]  kasan_report+0xc8/0x118
[   35.973115]  kasan_check_range+0x100/0x1a8
[   35.973738]  __kasan_check_read+0x20/0x30
[   35.974297]  kasan_atomics_helper+0xdd4/0x4858
[   35.975020]  kasan_atomics+0x198/0x2e8
[   35.975594]  kunit_try_run_case+0x14c/0x3d0
[   35.976218]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.976982]  kthread+0x24c/0x2d0
[   35.977649]  ret_from_fork+0x10/0x20
[   35.978232] 
[   35.978615] Allocated by task 254:
[   35.979152]  kasan_save_stack+0x3c/0x68
[   35.979898]  kasan_save_track+0x20/0x40
[   35.980494]  kasan_save_alloc_info+0x40/0x58
[   35.981237]  __kasan_kmalloc+0xd4/0xd8
[   35.981822]  __kmalloc_cache_noprof+0x15c/0x3c0
[   35.982565]  kasan_atomics+0xb8/0x2e8
[   35.983069]  kunit_try_run_case+0x14c/0x3d0
[   35.983779]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.984492]  kthread+0x24c/0x2d0
[   35.985110]  ret_from_fork+0x10/0x20
[   35.985629] 
[   35.986097] The buggy address belongs to the object at fff00000c594f180
[   35.986097]  which belongs to the cache kmalloc-64 of size 64
[   35.987566] The buggy address is located 0 bytes to the right of
[   35.987566]  allocated 48-byte region [fff00000c594f180, fff00000c594f1b0)
[   35.988952] 
[   35.989238] The buggy address belongs to the physical page:
[   35.990073] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10594f
[   35.990991] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   35.991839] page_type: f5(slab)
[   35.992410] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   35.993376] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   35.994289] page dumped because: kasan: bad access detected
[   35.995000] 
[   35.995312] Memory state around the buggy address:
[   35.996006]  fff00000c594f080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.996836]  fff00000c594f100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.997774] >fff00000c594f180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   35.998647]                                      ^
[   35.999278]  fff00000c594f200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.000236]  fff00000c594f280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.001188] ==================================================================
[   36.159798] ==================================================================
[   36.160553] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf20/0x4858
[   36.161467] Write of size 8 at addr fff00000c594f1b0 by task kunit_try_catch/254
[   36.162253] 
[   36.162702] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241203 #1
[   36.163966] Tainted: [B]=BAD_PAGE, [N]=TEST
[   36.164686] Hardware name: linux,dummy-virt (DT)
[   36.165353] Call trace:
[   36.165736]  show_stack+0x20/0x38 (C)
[   36.166473]  dump_stack_lvl+0x8c/0xd0
[   36.167147]  print_report+0x118/0x5e0
[   36.167832]  kasan_report+0xc8/0x118
[   36.168469]  kasan_check_range+0x100/0x1a8
[   36.169006]  __kasan_check_write+0x20/0x30
[   36.169745]  kasan_atomics_helper+0xf20/0x4858
[   36.170490]  kasan_atomics+0x198/0x2e8
[   36.170972]  kunit_try_run_case+0x14c/0x3d0
[   36.171713]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.172410]  kthread+0x24c/0x2d0
[   36.173119]  ret_from_fork+0x10/0x20
[   36.173675] 
[   36.174039] Allocated by task 254:
[   36.174556]  kasan_save_stack+0x3c/0x68
[   36.175187]  kasan_save_track+0x20/0x40
[   36.175772]  kasan_save_alloc_info+0x40/0x58
[   36.176417]  __kasan_kmalloc+0xd4/0xd8
[   36.176967]  __kmalloc_cache_noprof+0x15c/0x3c0
[   36.177632]  kasan_atomics+0xb8/0x2e8
[   36.178184]  kunit_try_run_case+0x14c/0x3d0
[   36.178813]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.179661]  kthread+0x24c/0x2d0
[   36.180154]  ret_from_fork+0x10/0x20
[   36.180742] 
[   36.181022] The buggy address belongs to the object at fff00000c594f180
[   36.181022]  which belongs to the cache kmalloc-64 of size 64
[   36.182509] The buggy address is located 0 bytes to the right of
[   36.182509]  allocated 48-byte region [fff00000c594f180, fff00000c594f1b0)
[   36.183866] 
[   36.184209] The buggy address belongs to the physical page:
[   36.185033] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10594f
[   36.185985] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   36.186907] page_type: f5(slab)
[   36.187418] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   36.188304] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   36.189393] page dumped because: kasan: bad access detected
[   36.190117] 
[   36.190620] Memory state around the buggy address:
[   36.191286]  fff00000c594f080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   36.192158]  fff00000c594f100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   36.193075] >fff00000c594f180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   36.193913]                                      ^
[   36.194614]  fff00000c594f200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.195451]  fff00000c594f280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.196407] ==================================================================
[   36.524707] ==================================================================
[   36.526394] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x12d8/0x4858
[   36.527528] Write of size 8 at addr fff00000c594f1b0 by task kunit_try_catch/254
[   36.528894] 
[   36.529385] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241203 #1
[   36.530702] Tainted: [B]=BAD_PAGE, [N]=TEST
[   36.531271] Hardware name: linux,dummy-virt (DT)
[   36.531937] Call trace:
[   36.532433]  show_stack+0x20/0x38 (C)
[   36.532995]  dump_stack_lvl+0x8c/0xd0
[   36.533757]  print_report+0x118/0x5e0
[   36.534454]  kasan_report+0xc8/0x118
[   36.535067]  kasan_check_range+0x100/0x1a8
[   36.535836]  __kasan_check_write+0x20/0x30
[   36.536443]  kasan_atomics_helper+0x12d8/0x4858
[   36.537262]  kasan_atomics+0x198/0x2e8
[   36.537968]  kunit_try_run_case+0x14c/0x3d0
[   36.538725]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.539590]  kthread+0x24c/0x2d0
[   36.540238]  ret_from_fork+0x10/0x20
[   36.541018] 
[   36.541362] Allocated by task 254:
[   36.541975]  kasan_save_stack+0x3c/0x68
[   36.542507]  kasan_save_track+0x20/0x40
[   36.543046]  kasan_save_alloc_info+0x40/0x58
[   36.543681]  __kasan_kmalloc+0xd4/0xd8
[   36.544143]  __kmalloc_cache_noprof+0x15c/0x3c0
[   36.544866]  kasan_atomics+0xb8/0x2e8
[   36.545433]  kunit_try_run_case+0x14c/0x3d0
[   36.546203]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.547219]  kthread+0x24c/0x2d0
[   36.547944]  ret_from_fork+0x10/0x20
[   36.548358] 
[   36.548761] The buggy address belongs to the object at fff00000c594f180
[   36.548761]  which belongs to the cache kmalloc-64 of size 64
[   36.550204] The buggy address is located 0 bytes to the right of
[   36.550204]  allocated 48-byte region [fff00000c594f180, fff00000c594f1b0)
[   36.551677] 
[   36.551968] The buggy address belongs to the physical page:
[   36.552764] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10594f
[   36.553688] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   36.554472] page_type: f5(slab)
[   36.555032] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   36.556015] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   36.556980] page dumped because: kasan: bad access detected
[   36.557659] 
[   36.558107] Memory state around the buggy address:
[   36.558848]  fff00000c594f080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   36.559962]  fff00000c594f100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   36.560982] >fff00000c594f180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   36.561700]                                      ^
[   36.562035]  fff00000c594f200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.562601]  fff00000c594f280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.563696] ==================================================================
[   36.976557] ==================================================================
[   36.977433] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x16d0/0x4858
[   36.978273] Write of size 8 at addr fff00000c594f1b0 by task kunit_try_catch/254
[   36.979567] 
[   36.980143] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241203 #1
[   36.981594] Tainted: [B]=BAD_PAGE, [N]=TEST
[   36.982257] Hardware name: linux,dummy-virt (DT)
[   36.983062] Call trace:
[   36.983637]  show_stack+0x20/0x38 (C)
[   36.984405]  dump_stack_lvl+0x8c/0xd0
[   36.985171]  print_report+0x118/0x5e0
[   36.985774]  kasan_report+0xc8/0x118
[   36.986525]  kasan_check_range+0x100/0x1a8
[   36.987207]  __kasan_check_write+0x20/0x30
[   36.987915]  kasan_atomics_helper+0x16d0/0x4858
[   36.988654]  kasan_atomics+0x198/0x2e8
[   36.989320]  kunit_try_run_case+0x14c/0x3d0
[   36.990047]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.990859]  kthread+0x24c/0x2d0
[   36.991489]  ret_from_fork+0x10/0x20
[   36.992122] 
[   36.992460] Allocated by task 254:
[   36.993117]  kasan_save_stack+0x3c/0x68
[   36.993791]  kasan_save_track+0x20/0x40
[   36.994496]  kasan_save_alloc_info+0x40/0x58
[   36.995116]  __kasan_kmalloc+0xd4/0xd8
[   36.995900]  __kmalloc_cache_noprof+0x15c/0x3c0
[   36.996647]  kasan_atomics+0xb8/0x2e8
[   36.997247]  kunit_try_run_case+0x14c/0x3d0
[   36.997944]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.998759]  kthread+0x24c/0x2d0
[   36.999372]  ret_from_fork+0x10/0x20
[   37.000029] 
[   37.000385] The buggy address belongs to the object at fff00000c594f180
[   37.000385]  which belongs to the cache kmalloc-64 of size 64
[   37.001920] The buggy address is located 0 bytes to the right of
[   37.001920]  allocated 48-byte region [fff00000c594f180, fff00000c594f1b0)
[   37.003402] 
[   37.003932] The buggy address belongs to the physical page:
[   37.004713] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10594f
[   37.005763] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   37.006679] page_type: f5(slab)
[   37.007256] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   37.008273] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   37.009264] page dumped because: kasan: bad access detected
[   37.010045] 
[   37.010560] Memory state around the buggy address:
[   37.011223]  fff00000c594f080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   37.012192]  fff00000c594f100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   37.013118] >fff00000c594f180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   37.014052]                                      ^
[   37.014784]  fff00000c594f200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.015753]  fff00000c594f280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.016646] ==================================================================
[   35.294405] ==================================================================
[   35.295381] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x7cc/0x4858
[   35.296419] Write of size 4 at addr fff00000c594f1b0 by task kunit_try_catch/254
[   35.297657] 
[   35.298135] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241203 #1
[   35.299556] Tainted: [B]=BAD_PAGE, [N]=TEST
[   35.300213] Hardware name: linux,dummy-virt (DT)
[   35.300845] Call trace:
[   35.301269]  show_stack+0x20/0x38 (C)
[   35.301886]  dump_stack_lvl+0x8c/0xd0
[   35.302388]  print_report+0x118/0x5e0
[   35.303036]  kasan_report+0xc8/0x118
[   35.303553]  kasan_check_range+0x100/0x1a8
[   35.304266]  __kasan_check_write+0x20/0x30
[   35.304981]  kasan_atomics_helper+0x7cc/0x4858
[   35.305745]  kasan_atomics+0x198/0x2e8
[   35.306497]  kunit_try_run_case+0x14c/0x3d0
[   35.307109]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.307818]  kthread+0x24c/0x2d0
[   35.308563]  ret_from_fork+0x10/0x20
[   35.308977] 
[   35.309431] Allocated by task 254:
[   35.309988]  kasan_save_stack+0x3c/0x68
[   35.310565]  kasan_save_track+0x20/0x40
[   35.311184]  kasan_save_alloc_info+0x40/0x58
[   35.311883]  __kasan_kmalloc+0xd4/0xd8
[   35.312552]  __kmalloc_cache_noprof+0x15c/0x3c0
[   35.313227]  kasan_atomics+0xb8/0x2e8
[   35.313775]  kunit_try_run_case+0x14c/0x3d0
[   35.314431]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.315099]  kthread+0x24c/0x2d0
[   35.315633]  ret_from_fork+0x10/0x20
[   35.316176] 
[   35.316557] The buggy address belongs to the object at fff00000c594f180
[   35.316557]  which belongs to the cache kmalloc-64 of size 64
[   35.318006] The buggy address is located 0 bytes to the right of
[   35.318006]  allocated 48-byte region [fff00000c594f180, fff00000c594f1b0)
[   35.319438] 
[   35.319739] The buggy address belongs to the physical page:
[   35.320452] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10594f
[   35.321457] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   35.322349] page_type: f5(slab)
[   35.322928] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   35.323829] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   35.324830] page dumped because: kasan: bad access detected
[   35.325514] 
[   35.325846] Memory state around the buggy address:
[   35.326481]  fff00000c594f080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.327360]  fff00000c594f100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.328272] >fff00000c594f180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   35.329142]                                      ^
[   35.329901]  fff00000c594f200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.330773]  fff00000c594f280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.331670] ==================================================================
[   36.199843] ==================================================================
[   36.200729] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf88/0x4858
[   36.201483] Write of size 8 at addr fff00000c594f1b0 by task kunit_try_catch/254
[   36.202295] 
[   36.202796] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241203 #1
[   36.204253] Tainted: [B]=BAD_PAGE, [N]=TEST
[   36.204810] Hardware name: linux,dummy-virt (DT)
[   36.205417] Call trace:
[   36.205849]  show_stack+0x20/0x38 (C)
[   36.207115]  dump_stack_lvl+0x8c/0xd0
[   36.207649]  print_report+0x118/0x5e0
[   36.208196]  kasan_report+0xc8/0x118
[   36.208713]  kasan_check_range+0x100/0x1a8
[   36.209397]  __kasan_check_write+0x20/0x30
[   36.210107]  kasan_atomics_helper+0xf88/0x4858
[   36.210839]  kasan_atomics+0x198/0x2e8
[   36.211439]  kunit_try_run_case+0x14c/0x3d0
[   36.212044]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.212814]  kthread+0x24c/0x2d0
[   36.213377]  ret_from_fork+0x10/0x20
[   36.213991] 
[   36.214322] Allocated by task 254:
[   36.214815]  kasan_save_stack+0x3c/0x68
[   36.215588]  kasan_save_track+0x20/0x40
[   36.216108]  kasan_save_alloc_info+0x40/0x58
[   36.216815]  __kasan_kmalloc+0xd4/0xd8
[   36.217390]  __kmalloc_cache_noprof+0x15c/0x3c0
[   36.218138]  kasan_atomics+0xb8/0x2e8
[   36.218729]  kunit_try_run_case+0x14c/0x3d0
[   36.219431]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.220127]  kthread+0x24c/0x2d0
[   36.220582]  ret_from_fork+0x10/0x20
[   36.221155] 
[   36.221474] The buggy address belongs to the object at fff00000c594f180
[   36.221474]  which belongs to the cache kmalloc-64 of size 64
[   36.222913] The buggy address is located 0 bytes to the right of
[   36.222913]  allocated 48-byte region [fff00000c594f180, fff00000c594f1b0)
[   36.224470] 
[   36.224801] The buggy address belongs to the physical page:
[   36.225505] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10594f
[   36.226468] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   36.227273] page_type: f5(slab)
[   36.227887] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   36.228849] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   36.229851] page dumped because: kasan: bad access detected
[   36.230677] 
[   36.230984] Memory state around the buggy address:
[   36.231541]  fff00000c594f080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   36.232209]  fff00000c594f100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   36.233149] >fff00000c594f180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   36.234261]                                      ^
[   36.234881]  fff00000c594f200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.235836]  fff00000c594f280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.236709] ==================================================================
[   36.002739] ==================================================================
[   36.004253] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f58/0x4858
[   36.005413] Read of size 8 at addr fff00000c594f1b0 by task kunit_try_catch/254
[   36.006356] 
[   36.006835] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241203 #1
[   36.008204] Tainted: [B]=BAD_PAGE, [N]=TEST
[   36.008737] Hardware name: linux,dummy-virt (DT)
[   36.009520] Call trace:
[   36.010072]  show_stack+0x20/0x38 (C)
[   36.010819]  dump_stack_lvl+0x8c/0xd0
[   36.011428]  print_report+0x118/0x5e0
[   36.012064]  kasan_report+0xc8/0x118
[   36.012889]  __asan_report_load8_noabort+0x20/0x30
[   36.013705]  kasan_atomics_helper+0x3f58/0x4858
[   36.014358]  kasan_atomics+0x198/0x2e8
[   36.014919]  kunit_try_run_case+0x14c/0x3d0
[   36.015653]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.016502]  kthread+0x24c/0x2d0
[   36.017184]  ret_from_fork+0x10/0x20
[   36.017825] 
[   36.018200] Allocated by task 254:
[   36.018763]  kasan_save_stack+0x3c/0x68
[   36.019483]  kasan_save_track+0x20/0x40
[   36.020170]  kasan_save_alloc_info+0x40/0x58
[   36.020988]  __kasan_kmalloc+0xd4/0xd8
[   36.021552]  __kmalloc_cache_noprof+0x15c/0x3c0
[   36.022311]  kasan_atomics+0xb8/0x2e8
[   36.022889]  kunit_try_run_case+0x14c/0x3d0
[   36.023512]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.024189]  kthread+0x24c/0x2d0
[   36.024840]  ret_from_fork+0x10/0x20
[   36.025411] 
[   36.025800] The buggy address belongs to the object at fff00000c594f180
[   36.025800]  which belongs to the cache kmalloc-64 of size 64
[   36.027209] The buggy address is located 0 bytes to the right of
[   36.027209]  allocated 48-byte region [fff00000c594f180, fff00000c594f1b0)
[   36.028657] 
[   36.028998] The buggy address belongs to the physical page:
[   36.029719] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10594f
[   36.030804] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   36.031652] page_type: f5(slab)
[   36.032242] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   36.033196] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   36.034172] page dumped because: kasan: bad access detected
[   36.034859] 
[   36.035209] Memory state around the buggy address:
[   36.035949]  fff00000c594f080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   36.036757]  fff00000c594f100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   36.037783] >fff00000c594f180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   36.038783]                                      ^
[   36.039448]  fff00000c594f200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.040321]  fff00000c594f280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.041290] ==================================================================
[   36.689530] ==================================================================
[   36.690263] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x147c/0x4858
[   36.692243] Write of size 8 at addr fff00000c594f1b0 by task kunit_try_catch/254
[   36.693194] 
[   36.693948] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241203 #1
[   36.695143] Tainted: [B]=BAD_PAGE, [N]=TEST
[   36.695725] Hardware name: linux,dummy-virt (DT)
[   36.696298] Call trace:
[   36.696794]  show_stack+0x20/0x38 (C)
[   36.697396]  dump_stack_lvl+0x8c/0xd0
[   36.698107]  print_report+0x118/0x5e0
[   36.698618]  kasan_report+0xc8/0x118
[   36.699294]  kasan_check_range+0x100/0x1a8
[   36.699933]  __kasan_check_write+0x20/0x30
[   36.700576]  kasan_atomics_helper+0x147c/0x4858
[   36.701228]  kasan_atomics+0x198/0x2e8
[   36.701943]  kunit_try_run_case+0x14c/0x3d0
[   36.702558]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.703359]  kthread+0x24c/0x2d0
[   36.703943]  ret_from_fork+0x10/0x20
[   36.704527] 
[   36.704897] Allocated by task 254:
[   36.705432]  kasan_save_stack+0x3c/0x68
[   36.706055]  kasan_save_track+0x20/0x40
[   36.706646]  kasan_save_alloc_info+0x40/0x58
[   36.707254]  __kasan_kmalloc+0xd4/0xd8
[   36.707946]  __kmalloc_cache_noprof+0x15c/0x3c0
[   36.708499]  kasan_atomics+0xb8/0x2e8
[   36.709124]  kunit_try_run_case+0x14c/0x3d0
[   36.709707]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.710555]  kthread+0x24c/0x2d0
[   36.711071]  ret_from_fork+0x10/0x20
[   36.711669] 
[   36.712011] The buggy address belongs to the object at fff00000c594f180
[   36.712011]  which belongs to the cache kmalloc-64 of size 64
[   36.713923] The buggy address is located 0 bytes to the right of
[   36.713923]  allocated 48-byte region [fff00000c594f180, fff00000c594f1b0)
[   36.715344] 
[   36.715877] The buggy address belongs to the physical page:
[   36.716727] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10594f
[   36.717870] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   36.718858] page_type: f5(slab)
[   36.719551] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   36.720679] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   36.721764] page dumped because: kasan: bad access detected
[   36.722629] 
[   36.723101] Memory state around the buggy address:
[   36.723709]  fff00000c594f080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   36.724778]  fff00000c594f100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   36.725912] >fff00000c594f180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   36.726726]                                      ^
[   36.727309]  fff00000c594f200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.727987]  fff00000c594f280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.729022] ==================================================================
[   35.926459] ==================================================================
[   35.927286] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e04/0x4858
[   35.928179] Read of size 4 at addr fff00000c594f1b0 by task kunit_try_catch/254
[   35.929027] 
[   35.929412] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241203 #1
[   35.930595] Tainted: [B]=BAD_PAGE, [N]=TEST
[   35.931125] Hardware name: linux,dummy-virt (DT)
[   35.931711] Call trace:
[   35.932215]  show_stack+0x20/0x38 (C)
[   35.932872]  dump_stack_lvl+0x8c/0xd0
[   35.933456]  print_report+0x118/0x5e0
[   35.934037]  kasan_report+0xc8/0x118
[   35.934637]  __asan_report_load4_noabort+0x20/0x30
[   35.935360]  kasan_atomics_helper+0x3e04/0x4858
[   35.935954]  kasan_atomics+0x198/0x2e8
[   35.936630]  kunit_try_run_case+0x14c/0x3d0
[   35.937343]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.938050]  kthread+0x24c/0x2d0
[   35.938701]  ret_from_fork+0x10/0x20
[   35.939224] 
[   35.939603] Allocated by task 254:
[   35.940085]  kasan_save_stack+0x3c/0x68
[   35.940768]  kasan_save_track+0x20/0x40
[   35.941318]  kasan_save_alloc_info+0x40/0x58
[   35.942130]  __kasan_kmalloc+0xd4/0xd8
[   35.942694]  __kmalloc_cache_noprof+0x15c/0x3c0
[   35.943374]  kasan_atomics+0xb8/0x2e8
[   35.943906]  kunit_try_run_case+0x14c/0x3d0
[   35.944489]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.945340]  kthread+0x24c/0x2d0
[   35.945858]  ret_from_fork+0x10/0x20
[   35.946511] 
[   35.946920] The buggy address belongs to the object at fff00000c594f180
[   35.946920]  which belongs to the cache kmalloc-64 of size 64
[   35.948245] The buggy address is located 0 bytes to the right of
[   35.948245]  allocated 48-byte region [fff00000c594f180, fff00000c594f1b0)
[   35.949664] 
[   35.950045] The buggy address belongs to the physical page:
[   35.950778] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10594f
[   35.951772] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   35.952599] page_type: f5(slab)
[   35.953212] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   35.954185] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   35.955101] page dumped because: kasan: bad access detected
[   35.955743] 
[   35.956055] Memory state around the buggy address:
[   35.956691]  fff00000c594f080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.957614]  fff00000c594f100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.958479] >fff00000c594f180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   35.959310]                                      ^
[   35.959958]  fff00000c594f200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.960864]  fff00000c594f280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.961734] ==================================================================
[   34.945024] ==================================================================
[   34.945962] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x414/0x4858
[   34.946733] Write of size 4 at addr fff00000c594f1b0 by task kunit_try_catch/254
[   34.947706] 
[   34.948166] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241203 #1
[   34.949275] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.950070] Hardware name: linux,dummy-virt (DT)
[   34.950691] Call trace:
[   34.951027]  show_stack+0x20/0x38 (C)
[   34.951708]  dump_stack_lvl+0x8c/0xd0
[   34.952393]  print_report+0x118/0x5e0
[   34.952951]  kasan_report+0xc8/0x118
[   34.953553]  kasan_check_range+0x100/0x1a8
[   34.954187]  __kasan_check_write+0x20/0x30
[   34.954912]  kasan_atomics_helper+0x414/0x4858
[   34.955458]  kasan_atomics+0x198/0x2e8
[   34.956154]  kunit_try_run_case+0x14c/0x3d0
[   34.956746]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.957528]  kthread+0x24c/0x2d0
[   34.958136]  ret_from_fork+0x10/0x20
[   34.958710] 
[   34.959049] Allocated by task 254:
[   34.959519]  kasan_save_stack+0x3c/0x68
[   34.960131]  kasan_save_track+0x20/0x40
[   34.960805]  kasan_save_alloc_info+0x40/0x58
[   34.961407]  __kasan_kmalloc+0xd4/0xd8
[   34.962008]  __kmalloc_cache_noprof+0x15c/0x3c0
[   34.962635]  kasan_atomics+0xb8/0x2e8
[   34.963105]  kunit_try_run_case+0x14c/0x3d0
[   34.963809]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.964455]  kthread+0x24c/0x2d0
[   34.965085]  ret_from_fork+0x10/0x20
[   34.965680] 
[   34.965996] The buggy address belongs to the object at fff00000c594f180
[   34.965996]  which belongs to the cache kmalloc-64 of size 64
[   34.967458] The buggy address is located 0 bytes to the right of
[   34.967458]  allocated 48-byte region [fff00000c594f180, fff00000c594f1b0)
[   34.968861] 
[   34.969205] The buggy address belongs to the physical page:
[   34.970062] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10594f
[   34.971009] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   34.971868] page_type: f5(slab)
[   34.972346] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   34.973197] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   34.974191] page dumped because: kasan: bad access detected
[   34.974808] 
[   34.975146] Memory state around the buggy address:
[   34.975850]  fff00000c594f080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   34.976675]  fff00000c594f100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   34.977504] >fff00000c594f180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   34.978410]                                      ^
[   34.979029]  fff00000c594f200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.979962]  fff00000c594f280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.980789] ==================================================================
[   35.334052] ==================================================================
[   35.334765] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x894/0x4858
[   35.336267] Write of size 4 at addr fff00000c594f1b0 by task kunit_try_catch/254
[   35.337808] 
[   35.338123] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241203 #1
[   35.339856] Tainted: [B]=BAD_PAGE, [N]=TEST
[   35.340562] Hardware name: linux,dummy-virt (DT)
[   35.341317] Call trace:
[   35.341746]  show_stack+0x20/0x38 (C)
[   35.342485]  dump_stack_lvl+0x8c/0xd0
[   35.343099]  print_report+0x118/0x5e0
[   35.343581]  kasan_report+0xc8/0x118
[   35.344419]  kasan_check_range+0x100/0x1a8
[   35.345241]  __kasan_check_write+0x20/0x30
[   35.345872]  kasan_atomics_helper+0x894/0x4858
[   35.346505]  kasan_atomics+0x198/0x2e8
[   35.347097]  kunit_try_run_case+0x14c/0x3d0
[   35.347745]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.348441]  kthread+0x24c/0x2d0
[   35.349023]  ret_from_fork+0x10/0x20
[   35.349668] 
[   35.350056] Allocated by task 254:
[   35.350641]  kasan_save_stack+0x3c/0x68
[   35.351152]  kasan_save_track+0x20/0x40
[   35.351870]  kasan_save_alloc_info+0x40/0x58
[   35.352535]  __kasan_kmalloc+0xd4/0xd8
[   35.353276]  __kmalloc_cache_noprof+0x15c/0x3c0
[   35.353892]  kasan_atomics+0xb8/0x2e8
[   35.354620]  kunit_try_run_case+0x14c/0x3d0
[   35.355154]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.355995]  kthread+0x24c/0x2d0
[   35.356528]  ret_from_fork+0x10/0x20
[   35.357103] 
[   35.357496] The buggy address belongs to the object at fff00000c594f180
[   35.357496]  which belongs to the cache kmalloc-64 of size 64
[   35.358842] The buggy address is located 0 bytes to the right of
[   35.358842]  allocated 48-byte region [fff00000c594f180, fff00000c594f1b0)
[   35.360296] 
[   35.360719] The buggy address belongs to the physical page:
[   35.361462] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10594f
[   35.362480] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   35.363295] page_type: f5(slab)
[   35.363942] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   35.364959] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   35.365863] page dumped because: kasan: bad access detected
[   35.366599] 
[   35.366984] Memory state around the buggy address:
[   35.367744]  fff00000c594f080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.368610]  fff00000c594f100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.369480] >fff00000c594f180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   35.370355]                                      ^
[   35.370938]  fff00000c594f200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.371864]  fff00000c594f280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.372794] ==================================================================
[   35.492815] ==================================================================
[   35.493821] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa04/0x4858
[   35.494864] Write of size 4 at addr fff00000c594f1b0 by task kunit_try_catch/254
[   35.497020] 
[   35.497553] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241203 #1
[   35.498972] Tainted: [B]=BAD_PAGE, [N]=TEST
[   35.499646] Hardware name: linux,dummy-virt (DT)
[   35.500464] Call trace:
[   35.501065]  show_stack+0x20/0x38 (C)
[   35.501869]  dump_stack_lvl+0x8c/0xd0
[   35.502531]  print_report+0x118/0x5e0
[   35.503043]  kasan_report+0xc8/0x118
[   35.503689]  kasan_check_range+0x100/0x1a8
[   35.504192]  __kasan_check_write+0x20/0x30
[   35.504903]  kasan_atomics_helper+0xa04/0x4858
[   35.505648]  kasan_atomics+0x198/0x2e8
[   35.506259]  kunit_try_run_case+0x14c/0x3d0
[   35.506847]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.507698]  kthread+0x24c/0x2d0
[   35.508211]  ret_from_fork+0x10/0x20
[   35.508837] 
[   35.509167] Allocated by task 254:
[   35.509734]  kasan_save_stack+0x3c/0x68
[   35.510230]  kasan_save_track+0x20/0x40
[   35.510883]  kasan_save_alloc_info+0x40/0x58
[   35.511612]  __kasan_kmalloc+0xd4/0xd8
[   35.512136]  __kmalloc_cache_noprof+0x15c/0x3c0
[   35.512923]  kasan_atomics+0xb8/0x2e8
[   35.513496]  kunit_try_run_case+0x14c/0x3d0
[   35.514073]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.514867]  kthread+0x24c/0x2d0
[   35.515402]  ret_from_fork+0x10/0x20
[   35.515936] 
[   35.516405] The buggy address belongs to the object at fff00000c594f180
[   35.516405]  which belongs to the cache kmalloc-64 of size 64
[   35.517792] The buggy address is located 0 bytes to the right of
[   35.517792]  allocated 48-byte region [fff00000c594f180, fff00000c594f1b0)
[   35.519084] 
[   35.519572] The buggy address belongs to the physical page:
[   35.520164] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10594f
[   35.521230] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   35.522152] page_type: f5(slab)
[   35.522650] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   35.523653] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   35.524598] page dumped because: kasan: bad access detected
[   35.525279] 
[   35.525622] Memory state around the buggy address:
[   35.526366]  fff00000c594f080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.527129]  fff00000c594f100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.528051] >fff00000c594f180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   35.529000]                                      ^
[   35.529674]  fff00000c594f200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.530528]  fff00000c594f280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.531433] ==================================================================

[   31.642018] ==================================================================
[   31.642422] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1a80/0x5450
[   31.643221] Write of size 8 at addr ffff888102a59bb0 by task kunit_try_catch/274
[   31.643638] 
[   31.643815] CPU: 1 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241203 #1
[   31.644903] Tainted: [B]=BAD_PAGE, [N]=TEST
[   31.645300] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   31.645880] Call Trace:
[   31.646069]  <TASK>
[   31.646228]  dump_stack_lvl+0x73/0xb0
[   31.646587]  print_report+0xd1/0x640
[   31.646976]  ? __virt_addr_valid+0x1db/0x2d0
[   31.647494]  ? kasan_complete_mode_report_info+0x2a/0x200
[   31.648009]  kasan_report+0x102/0x140
[   31.648502]  ? kasan_atomics_helper+0x1a80/0x5450
[   31.648974]  ? kasan_atomics_helper+0x1a80/0x5450
[   31.649511]  kasan_check_range+0x10c/0x1c0
[   31.649966]  __kasan_check_write+0x18/0x20
[   31.650265]  kasan_atomics_helper+0x1a80/0x5450
[   31.650770]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   31.651306]  ? ret_from_fork_asm+0x1a/0x30
[   31.651816]  ? ret_from_fork+0x41/0x80
[   31.652267]  ? kthread+0x257/0x310
[   31.652666]  kasan_atomics+0x1dd/0x310
[   31.652947]  ? __pfx_kasan_atomics+0x10/0x10
[   31.653394]  ? __pfx_read_tsc+0x10/0x10
[   31.653901]  ? ktime_get_ts64+0x86/0x230
[   31.654370]  kunit_try_run_case+0x1b3/0x490
[   31.654910]  ? __pfx_kunit_try_run_case+0x10/0x10
[   31.655237]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   31.655588]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   31.655898]  ? __kthread_parkme+0x82/0x160
[   31.656284]  ? preempt_count_sub+0x50/0x80
[   31.656803]  ? __pfx_kunit_try_run_case+0x10/0x10
[   31.657289]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   31.657889]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   31.658403]  kthread+0x257/0x310
[   31.658846]  ? __pfx_kthread+0x10/0x10
[   31.659260]  ret_from_fork+0x41/0x80
[   31.659709]  ? __pfx_kthread+0x10/0x10
[   31.660043]  ret_from_fork_asm+0x1a/0x30
[   31.660362]  </TASK>
[   31.660598] 
[   31.660750] Allocated by task 274:
[   31.661106]  kasan_save_stack+0x3d/0x60
[   31.661608]  kasan_save_track+0x18/0x40
[   31.662067]  kasan_save_alloc_info+0x3b/0x50
[   31.662571]  __kasan_kmalloc+0xb7/0xc0
[   31.662994]  __kmalloc_cache_noprof+0x184/0x410
[   31.666429]  kasan_atomics+0x96/0x310
[   31.666819]  kunit_try_run_case+0x1b3/0x490
[   31.667080]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   31.668307]  kthread+0x257/0x310
[   31.668671]  ret_from_fork+0x41/0x80
[   31.669644]  ret_from_fork_asm+0x1a/0x30
[   31.669927] 
[   31.670163] The buggy address belongs to the object at ffff888102a59b80
[   31.670163]  which belongs to the cache kmalloc-64 of size 64
[   31.671072] The buggy address is located 0 bytes to the right of
[   31.671072]  allocated 48-byte region [ffff888102a59b80, ffff888102a59bb0)
[   31.672520] 
[   31.673241] The buggy address belongs to the physical page:
[   31.673922] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a59
[   31.674745] flags: 0x200000000000000(node=0|zone=2)
[   31.675139] page_type: f5(slab)
[   31.675405] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   31.676801] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   31.677304] page dumped because: kasan: bad access detected
[   31.678206] 
[   31.678358] Memory state around the buggy address:
[   31.678645]  ffff888102a59a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   31.679628]  ffff888102a59b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   31.680583] >ffff888102a59b80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   31.681129]                                      ^
[   31.681496]  ffff888102a59c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.682532]  ffff888102a59c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.682859] ==================================================================
[   30.384560] ==================================================================
[   30.385049] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa2c/0x5450
[   30.385738] Write of size 4 at addr ffff888102a59bb0 by task kunit_try_catch/274
[   30.386255] 
[   30.386502] CPU: 1 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241203 #1
[   30.387227] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.388462] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   30.389325] Call Trace:
[   30.389533]  <TASK>
[   30.390831]  dump_stack_lvl+0x73/0xb0
[   30.391198]  print_report+0xd1/0x640
[   30.391569]  ? __virt_addr_valid+0x1db/0x2d0
[   30.391961]  ? kasan_complete_mode_report_info+0x2a/0x200
[   30.392489]  kasan_report+0x102/0x140
[   30.393484]  ? kasan_atomics_helper+0xa2c/0x5450
[   30.393851]  ? kasan_atomics_helper+0xa2c/0x5450
[   30.394419]  kasan_check_range+0x10c/0x1c0
[   30.395023]  __kasan_check_write+0x18/0x20
[   30.395304]  kasan_atomics_helper+0xa2c/0x5450
[   30.395938]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   30.396361]  ? ret_from_fork_asm+0x1a/0x30
[   30.397200]  ? ret_from_fork+0x41/0x80
[   30.397785]  ? kthread+0x257/0x310
[   30.398202]  kasan_atomics+0x1dd/0x310
[   30.398895]  ? __pfx_kasan_atomics+0x10/0x10
[   30.399361]  ? __pfx_read_tsc+0x10/0x10
[   30.400076]  ? ktime_get_ts64+0x86/0x230
[   30.400662]  kunit_try_run_case+0x1b3/0x490
[   30.401127]  ? __pfx_kunit_try_run_case+0x10/0x10
[   30.401843]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   30.402470]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   30.402921]  ? __kthread_parkme+0x82/0x160
[   30.403285]  ? preempt_count_sub+0x50/0x80
[   30.404082]  ? __pfx_kunit_try_run_case+0x10/0x10
[   30.404903]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   30.405351]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   30.406270]  kthread+0x257/0x310
[   30.406571]  ? __pfx_kthread+0x10/0x10
[   30.406879]  ret_from_fork+0x41/0x80
[   30.407499]  ? __pfx_kthread+0x10/0x10
[   30.407902]  ret_from_fork_asm+0x1a/0x30
[   30.408553]  </TASK>
[   30.408828] 
[   30.409025] Allocated by task 274:
[   30.409321]  kasan_save_stack+0x3d/0x60
[   30.409698]  kasan_save_track+0x18/0x40
[   30.410696]  kasan_save_alloc_info+0x3b/0x50
[   30.411414]  __kasan_kmalloc+0xb7/0xc0
[   30.411779]  __kmalloc_cache_noprof+0x184/0x410
[   30.412190]  kasan_atomics+0x96/0x310
[   30.412943]  kunit_try_run_case+0x1b3/0x490
[   30.413319]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   30.413732]  kthread+0x257/0x310
[   30.414080]  ret_from_fork+0x41/0x80
[   30.414390]  ret_from_fork_asm+0x1a/0x30
[   30.415240] 
[   30.415408] The buggy address belongs to the object at ffff888102a59b80
[   30.415408]  which belongs to the cache kmalloc-64 of size 64
[   30.416395] The buggy address is located 0 bytes to the right of
[   30.416395]  allocated 48-byte region [ffff888102a59b80, ffff888102a59bb0)
[   30.417810] 
[   30.417971] The buggy address belongs to the physical page:
[   30.418824] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a59
[   30.419509] flags: 0x200000000000000(node=0|zone=2)
[   30.420184] page_type: f5(slab)
[   30.420541] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   30.421257] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   30.422212] page dumped because: kasan: bad access detected
[   30.422577] 
[   30.422812] Memory state around the buggy address:
[   30.423238]  ffff888102a59a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   30.423901]  ffff888102a59b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   30.424367] >ffff888102a59b80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   30.425678]                                      ^
[   30.426019]  ffff888102a59c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.426649]  ffff888102a59c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.427427] ==================================================================
[   30.586328] ==================================================================
[   30.587420] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xd48/0x5450
[   30.588522] Write of size 4 at addr ffff888102a59bb0 by task kunit_try_catch/274
[   30.589197] 
[   30.589486] CPU: 1 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241203 #1
[   30.590371] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.590802] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   30.591683] Call Trace:
[   30.592032]  <TASK>
[   30.592592]  dump_stack_lvl+0x73/0xb0
[   30.593026]  print_report+0xd1/0x640
[   30.593322]  ? __virt_addr_valid+0x1db/0x2d0
[   30.593672]  ? kasan_complete_mode_report_info+0x2a/0x200
[   30.594151]  kasan_report+0x102/0x140
[   30.594597]  ? kasan_atomics_helper+0xd48/0x5450
[   30.595122]  ? kasan_atomics_helper+0xd48/0x5450
[   30.595693]  kasan_check_range+0x10c/0x1c0
[   30.596140]  __kasan_check_write+0x18/0x20
[   30.596646]  kasan_atomics_helper+0xd48/0x5450
[   30.597148]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   30.597690]  ? ret_from_fork_asm+0x1a/0x30
[   30.598176]  ? ret_from_fork+0x41/0x80
[   30.598637]  ? kthread+0x257/0x310
[   30.598978]  kasan_atomics+0x1dd/0x310
[   30.599468]  ? __pfx_kasan_atomics+0x10/0x10
[   30.599916]  ? __pfx_read_tsc+0x10/0x10
[   30.600253]  ? ktime_get_ts64+0x86/0x230
[   30.600594]  kunit_try_run_case+0x1b3/0x490
[   30.600891]  ? __pfx_kunit_try_run_case+0x10/0x10
[   30.601296]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   30.601791]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   30.602307]  ? __kthread_parkme+0x82/0x160
[   30.602819]  ? preempt_count_sub+0x50/0x80
[   30.603272]  ? __pfx_kunit_try_run_case+0x10/0x10
[   30.603809]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   30.604421]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   30.604989]  kthread+0x257/0x310
[   30.605345]  ? __pfx_kthread+0x10/0x10
[   30.605781]  ret_from_fork+0x41/0x80
[   30.606220]  ? __pfx_kthread+0x10/0x10
[   30.606694]  ret_from_fork_asm+0x1a/0x30
[   30.607017]  </TASK>
[   30.607254] 
[   30.607561] Allocated by task 274:
[   30.607919]  kasan_save_stack+0x3d/0x60
[   30.608376]  kasan_save_track+0x18/0x40
[   30.608772]  kasan_save_alloc_info+0x3b/0x50
[   30.609256]  __kasan_kmalloc+0xb7/0xc0
[   30.609595]  __kmalloc_cache_noprof+0x184/0x410
[   30.610042]  kasan_atomics+0x96/0x310
[   30.610331]  kunit_try_run_case+0x1b3/0x490
[   30.610766]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   30.611134]  kthread+0x257/0x310
[   30.611381]  ret_from_fork+0x41/0x80
[   30.611679]  ret_from_fork_asm+0x1a/0x30
[   30.611950] 
[   30.612127] The buggy address belongs to the object at ffff888102a59b80
[   30.612127]  which belongs to the cache kmalloc-64 of size 64
[   30.613177] The buggy address is located 0 bytes to the right of
[   30.613177]  allocated 48-byte region [ffff888102a59b80, ffff888102a59bb0)
[   30.614238] 
[   30.614501] The buggy address belongs to the physical page:
[   30.615221] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a59
[   30.616853] flags: 0x200000000000000(node=0|zone=2)
[   30.617961] page_type: f5(slab)
[   30.619743] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   30.620378] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   30.620758] page dumped because: kasan: bad access detected
[   30.621099] 
[   30.621253] Memory state around the buggy address:
[   30.622151]  ffff888102a59a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   30.622877]  ffff888102a59b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   30.623428] >ffff888102a59b80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   30.623934]                                      ^
[   30.624283]  ffff888102a59c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.624899]  ffff888102a59c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.625423] ==================================================================
[   31.155012] ==================================================================
[   31.155689] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4eb0/0x5450
[   31.156273] Read of size 8 at addr ffff888102a59bb0 by task kunit_try_catch/274
[   31.157520] 
[   31.157776] CPU: 1 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241203 #1
[   31.158503] Tainted: [B]=BAD_PAGE, [N]=TEST
[   31.158900] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   31.159473] Call Trace:
[   31.159784]  <TASK>
[   31.160029]  dump_stack_lvl+0x73/0xb0
[   31.160527]  print_report+0xd1/0x640
[   31.160928]  ? __virt_addr_valid+0x1db/0x2d0
[   31.161302]  ? kasan_complete_mode_report_info+0x2a/0x200
[   31.161805]  kasan_report+0x102/0x140
[   31.162091]  ? kasan_atomics_helper+0x4eb0/0x5450
[   31.162393]  ? kasan_atomics_helper+0x4eb0/0x5450
[   31.162782]  __asan_report_load8_noabort+0x18/0x20
[   31.163115]  kasan_atomics_helper+0x4eb0/0x5450
[   31.163603]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   31.164107]  ? ret_from_fork_asm+0x1a/0x30
[   31.164585]  ? ret_from_fork+0x41/0x80
[   31.164993]  ? kthread+0x257/0x310
[   31.165375]  kasan_atomics+0x1dd/0x310
[   31.165810]  ? __pfx_kasan_atomics+0x10/0x10
[   31.166262]  ? __pfx_read_tsc+0x10/0x10
[   31.166690]  ? ktime_get_ts64+0x86/0x230
[   31.167021]  kunit_try_run_case+0x1b3/0x490
[   31.167514]  ? __pfx_kunit_try_run_case+0x10/0x10
[   31.167921]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   31.168361]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   31.168751]  ? __kthread_parkme+0x82/0x160
[   31.169178]  ? preempt_count_sub+0x50/0x80
[   31.169649]  ? __pfx_kunit_try_run_case+0x10/0x10
[   31.170140]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   31.171230]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   31.172184]  kthread+0x257/0x310
[   31.173679]  ? __pfx_kthread+0x10/0x10
[   31.174087]  ret_from_fork+0x41/0x80
[   31.174509]  ? __pfx_kthread+0x10/0x10
[   31.174810]  ret_from_fork_asm+0x1a/0x30
[   31.175175]  </TASK>
[   31.175408] 
[   31.176247] Allocated by task 274:
[   31.177068]  kasan_save_stack+0x3d/0x60
[   31.177698]  kasan_save_track+0x18/0x40
[   31.178068]  kasan_save_alloc_info+0x3b/0x50
[   31.178486]  __kasan_kmalloc+0xb7/0xc0
[   31.178880]  __kmalloc_cache_noprof+0x184/0x410
[   31.179243]  kasan_atomics+0x96/0x310
[   31.179620]  kunit_try_run_case+0x1b3/0x490
[   31.179999]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   31.180544]  kthread+0x257/0x310
[   31.180821]  ret_from_fork+0x41/0x80
[   31.181137]  ret_from_fork_asm+0x1a/0x30
[   31.181583] 
[   31.181796] The buggy address belongs to the object at ffff888102a59b80
[   31.181796]  which belongs to the cache kmalloc-64 of size 64
[   31.182654] The buggy address is located 0 bytes to the right of
[   31.182654]  allocated 48-byte region [ffff888102a59b80, ffff888102a59bb0)
[   31.183375] 
[   31.183653] The buggy address belongs to the physical page:
[   31.184157] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a59
[   31.184735] flags: 0x200000000000000(node=0|zone=2)
[   31.185092] page_type: f5(slab)
[   31.185332] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   31.186005] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   31.186672] page dumped because: kasan: bad access detected
[   31.187045] 
[   31.187259] Memory state around the buggy address:
[   31.187678]  ffff888102a59a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   31.188175]  ffff888102a59b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   31.188599] >ffff888102a59b80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   31.188968]                                      ^
[   31.189414]  ffff888102a59c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.190066]  ffff888102a59c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.190673] ==================================================================
[   31.775369] ==================================================================
[   31.775869] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4f32/0x5450
[   31.776535] Read of size 8 at addr ffff888102a59bb0 by task kunit_try_catch/274
[   31.777200] 
[   31.777447] CPU: 1 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241203 #1
[   31.778044] Tainted: [B]=BAD_PAGE, [N]=TEST
[   31.778426] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   31.779411] Call Trace:
[   31.780022]  <TASK>
[   31.780246]  dump_stack_lvl+0x73/0xb0
[   31.780809]  print_report+0xd1/0x640
[   31.781238]  ? __virt_addr_valid+0x1db/0x2d0
[   31.781758]  ? kasan_complete_mode_report_info+0x2a/0x200
[   31.782346]  kasan_report+0x102/0x140
[   31.782892]  ? kasan_atomics_helper+0x4f32/0x5450
[   31.783343]  ? kasan_atomics_helper+0x4f32/0x5450
[   31.783945]  __asan_report_load8_noabort+0x18/0x20
[   31.784385]  kasan_atomics_helper+0x4f32/0x5450
[   31.785090]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   31.785611]  ? ret_from_fork_asm+0x1a/0x30
[   31.786006]  ? ret_from_fork+0x41/0x80
[   31.786535]  ? kthread+0x257/0x310
[   31.787013]  kasan_atomics+0x1dd/0x310
[   31.787366]  ? __pfx_kasan_atomics+0x10/0x10
[   31.787788]  ? __pfx_read_tsc+0x10/0x10
[   31.788171]  ? ktime_get_ts64+0x86/0x230
[   31.788556]  kunit_try_run_case+0x1b3/0x490
[   31.788995]  ? __pfx_kunit_try_run_case+0x10/0x10
[   31.789603]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   31.790185]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   31.790689]  ? __kthread_parkme+0x82/0x160
[   31.791126]  ? preempt_count_sub+0x50/0x80
[   31.791686]  ? __pfx_kunit_try_run_case+0x10/0x10
[   31.792245]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   31.792856]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   31.793289]  kthread+0x257/0x310
[   31.794192]  ? __pfx_kthread+0x10/0x10
[   31.794696]  ret_from_fork+0x41/0x80
[   31.795110]  ? __pfx_kthread+0x10/0x10
[   31.795497]  ret_from_fork_asm+0x1a/0x30
[   31.795878]  </TASK>
[   31.796657] 
[   31.797176] Allocated by task 274:
[   31.797419]  kasan_save_stack+0x3d/0x60
[   31.797894]  kasan_save_track+0x18/0x40
[   31.798830]  kasan_save_alloc_info+0x3b/0x50
[   31.799393]  __kasan_kmalloc+0xb7/0xc0
[   31.800033]  __kmalloc_cache_noprof+0x184/0x410
[   31.800420]  kasan_atomics+0x96/0x310
[   31.801385]  kunit_try_run_case+0x1b3/0x490
[   31.801765]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   31.802380]  kthread+0x257/0x310
[   31.802857]  ret_from_fork+0x41/0x80
[   31.803360]  ret_from_fork_asm+0x1a/0x30
[   31.803674] 
[   31.803884] The buggy address belongs to the object at ffff888102a59b80
[   31.803884]  which belongs to the cache kmalloc-64 of size 64
[   31.804760] The buggy address is located 0 bytes to the right of
[   31.804760]  allocated 48-byte region [ffff888102a59b80, ffff888102a59bb0)
[   31.806378] 
[   31.807162] The buggy address belongs to the physical page:
[   31.807516] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a59
[   31.808231] flags: 0x200000000000000(node=0|zone=2)
[   31.808983] page_type: f5(slab)
[   31.809241] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   31.810308] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   31.810804] page dumped because: kasan: bad access detected
[   31.811269] 
[   31.811445] Memory state around the buggy address:
[   31.812318]  ffff888102a59a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   31.813090]  ffff888102a59b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   31.813505] >ffff888102a59b80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   31.814423]                                      ^
[   31.814863]  ffff888102a59c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.815666]  ffff888102a59c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.816446] ==================================================================
[   30.030198] ==================================================================
[   30.031126] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b3c/0x5450
[   30.031742] Write of size 4 at addr ffff888102a59bb0 by task kunit_try_catch/274
[   30.032581] 
[   30.032762] CPU: 1 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241203 #1
[   30.033507] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.034105] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   30.034637] Call Trace:
[   30.034897]  <TASK>
[   30.035319]  dump_stack_lvl+0x73/0xb0
[   30.035972]  print_report+0xd1/0x640
[   30.036781]  ? __virt_addr_valid+0x1db/0x2d0
[   30.037559]  ? kasan_complete_mode_report_info+0x2a/0x200
[   30.037945]  kasan_report+0x102/0x140
[   30.038232]  ? kasan_atomics_helper+0x4b3c/0x5450
[   30.038803]  ? kasan_atomics_helper+0x4b3c/0x5450
[   30.039478]  __asan_report_store4_noabort+0x1b/0x30
[   30.039999]  kasan_atomics_helper+0x4b3c/0x5450
[   30.040501]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   30.040982]  ? ret_from_fork_asm+0x1a/0x30
[   30.041406]  ? ret_from_fork+0x41/0x80
[   30.041885]  ? kthread+0x257/0x310
[   30.042248]  kasan_atomics+0x1dd/0x310
[   30.042724]  ? __pfx_kasan_atomics+0x10/0x10
[   30.043107]  ? __pfx_read_tsc+0x10/0x10
[   30.043596]  ? ktime_get_ts64+0x86/0x230
[   30.044033]  kunit_try_run_case+0x1b3/0x490
[   30.044355]  ? __pfx_kunit_try_run_case+0x10/0x10
[   30.044935]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   30.045523]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   30.046106]  ? __kthread_parkme+0x82/0x160
[   30.046607]  ? preempt_count_sub+0x50/0x80
[   30.047139]  ? __pfx_kunit_try_run_case+0x10/0x10
[   30.047702]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   30.047916]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   30.048166]  kthread+0x257/0x310
[   30.048602]  ? __pfx_kthread+0x10/0x10
[   30.048914]  ret_from_fork+0x41/0x80
[   30.049346]  ? __pfx_kthread+0x10/0x10
[   30.049682]  ret_from_fork_asm+0x1a/0x30
[   30.050139]  </TASK>
[   30.050414] 
[   30.050654] Allocated by task 274:
[   30.050995]  kasan_save_stack+0x3d/0x60
[   30.051363]  kasan_save_track+0x18/0x40
[   30.051824]  kasan_save_alloc_info+0x3b/0x50
[   30.052245]  __kasan_kmalloc+0xb7/0xc0
[   30.052673]  __kmalloc_cache_noprof+0x184/0x410
[   30.053064]  kasan_atomics+0x96/0x310
[   30.053390]  kunit_try_run_case+0x1b3/0x490
[   30.053818]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   30.054226]  kthread+0x257/0x310
[   30.054576]  ret_from_fork+0x41/0x80
[   30.054888]  ret_from_fork_asm+0x1a/0x30
[   30.055232] 
[   30.055382] The buggy address belongs to the object at ffff888102a59b80
[   30.055382]  which belongs to the cache kmalloc-64 of size 64
[   30.056355] The buggy address is located 0 bytes to the right of
[   30.056355]  allocated 48-byte region [ffff888102a59b80, ffff888102a59bb0)
[   30.057229] 
[   30.057514] The buggy address belongs to the physical page:
[   30.057995] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a59
[   30.058393] flags: 0x200000000000000(node=0|zone=2)
[   30.058921] page_type: f5(slab)
[   30.059288] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   30.060000] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   30.060521] page dumped because: kasan: bad access detected
[   30.060815] 
[   30.060958] Memory state around the buggy address:
[   30.061378]  ffff888102a59a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   30.062067]  ffff888102a59b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   30.062722] >ffff888102a59b80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   30.063341]                                      ^
[   30.063840]  ffff888102a59c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.064301]  ffff888102a59c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.064828] ==================================================================
[   29.987572] ==================================================================
[   29.989803] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a1/0x5450
[   29.992438] Write of size 4 at addr ffff888102a59bb0 by task kunit_try_catch/274
[   29.993091] 
[   29.993332] CPU: 1 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241203 #1
[   29.995212] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.995646] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   29.996331] Call Trace:
[   29.997031]  <TASK>
[   29.997408]  dump_stack_lvl+0x73/0xb0
[   29.997965]  print_report+0xd1/0x640
[   29.998534]  ? __virt_addr_valid+0x1db/0x2d0
[   29.999135]  ? kasan_complete_mode_report_info+0x2a/0x200
[   29.999773]  kasan_report+0x102/0x140
[   30.000243]  ? kasan_atomics_helper+0x4a1/0x5450
[   30.000830]  ? kasan_atomics_helper+0x4a1/0x5450
[   30.001260]  kasan_check_range+0x10c/0x1c0
[   30.001665]  __kasan_check_write+0x18/0x20
[   30.002100]  kasan_atomics_helper+0x4a1/0x5450
[   30.002620]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   30.003165]  ? ret_from_fork_asm+0x1a/0x30
[   30.003734]  ? ret_from_fork+0x41/0x80
[   30.004101]  ? kthread+0x257/0x310
[   30.004545]  kasan_atomics+0x1dd/0x310
[   30.005039]  ? __pfx_kasan_atomics+0x10/0x10
[   30.005430]  ? __pfx_read_tsc+0x10/0x10
[   30.005892]  ? ktime_get_ts64+0x86/0x230
[   30.006314]  kunit_try_run_case+0x1b3/0x490
[   30.006793]  ? __pfx_kunit_try_run_case+0x10/0x10
[   30.007260]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   30.007668]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   30.008143]  ? __kthread_parkme+0x82/0x160
[   30.008611]  ? preempt_count_sub+0x50/0x80
[   30.008895]  ? __pfx_kunit_try_run_case+0x10/0x10
[   30.009390]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   30.009979]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   30.010520]  kthread+0x257/0x310
[   30.010888]  ? __pfx_kthread+0x10/0x10
[   30.011326]  ret_from_fork+0x41/0x80
[   30.011692]  ? __pfx_kthread+0x10/0x10
[   30.011958]  ret_from_fork_asm+0x1a/0x30
[   30.012507]  </TASK>
[   30.012785] 
[   30.013025] Allocated by task 274:
[   30.013377]  kasan_save_stack+0x3d/0x60
[   30.013765]  kasan_save_track+0x18/0x40
[   30.014019]  kasan_save_alloc_info+0x3b/0x50
[   30.014311]  __kasan_kmalloc+0xb7/0xc0
[   30.014775]  __kmalloc_cache_noprof+0x184/0x410
[   30.015238]  kasan_atomics+0x96/0x310
[   30.015617]  kunit_try_run_case+0x1b3/0x490
[   30.016036]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   30.016638]  kthread+0x257/0x310
[   30.016954]  ret_from_fork+0x41/0x80
[   30.017226]  ret_from_fork_asm+0x1a/0x30
[   30.017529] 
[   30.017738] The buggy address belongs to the object at ffff888102a59b80
[   30.017738]  which belongs to the cache kmalloc-64 of size 64
[   30.018757] The buggy address is located 0 bytes to the right of
[   30.018757]  allocated 48-byte region [ffff888102a59b80, ffff888102a59bb0)
[   30.019802] 
[   30.020005] The buggy address belongs to the physical page:
[   30.020312] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a59
[   30.020849] flags: 0x200000000000000(node=0|zone=2)
[   30.021326] page_type: f5(slab)
[   30.021729] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   30.022400] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   30.023005] page dumped because: kasan: bad access detected
[   30.023579] 
[   30.023786] Memory state around the buggy address:
[   30.024066]  ffff888102a59a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   30.024808]  ffff888102a59b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   30.025189] >ffff888102a59b80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   30.025553]                                      ^
[   30.026169]  ffff888102a59c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.027770]  ffff888102a59c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.028855] ==================================================================
[   31.601257] ==================================================================
[   31.601778] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x19e4/0x5450
[   31.602567] Write of size 8 at addr ffff888102a59bb0 by task kunit_try_catch/274
[   31.603147] 
[   31.603407] CPU: 1 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241203 #1
[   31.604000] Tainted: [B]=BAD_PAGE, [N]=TEST
[   31.604481] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   31.605231] Call Trace:
[   31.605439]  <TASK>
[   31.605782]  dump_stack_lvl+0x73/0xb0
[   31.606278]  print_report+0xd1/0x640
[   31.606780]  ? __virt_addr_valid+0x1db/0x2d0
[   31.607227]  ? kasan_complete_mode_report_info+0x2a/0x200
[   31.607707]  kasan_report+0x102/0x140
[   31.608185]  ? kasan_atomics_helper+0x19e4/0x5450
[   31.608765]  ? kasan_atomics_helper+0x19e4/0x5450
[   31.609233]  kasan_check_range+0x10c/0x1c0
[   31.609713]  __kasan_check_write+0x18/0x20
[   31.609989]  kasan_atomics_helper+0x19e4/0x5450
[   31.610489]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   31.610961]  ? ret_from_fork_asm+0x1a/0x30
[   31.611446]  ? ret_from_fork+0x41/0x80
[   31.611895]  ? kthread+0x257/0x310
[   31.612223]  kasan_atomics+0x1dd/0x310
[   31.612532]  ? __pfx_kasan_atomics+0x10/0x10
[   31.613168]  ? __pfx_read_tsc+0x10/0x10
[   31.613602]  ? ktime_get_ts64+0x86/0x230
[   31.613954]  kunit_try_run_case+0x1b3/0x490
[   31.614359]  ? __pfx_kunit_try_run_case+0x10/0x10
[   31.614904]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   31.615386]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   31.615889]  ? __kthread_parkme+0x82/0x160
[   31.616314]  ? preempt_count_sub+0x50/0x80
[   31.616688]  ? __pfx_kunit_try_run_case+0x10/0x10
[   31.617039]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   31.617606]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   31.618191]  kthread+0x257/0x310
[   31.618593]  ? __pfx_kthread+0x10/0x10
[   31.618995]  ret_from_fork+0x41/0x80
[   31.619402]  ? __pfx_kthread+0x10/0x10
[   31.619804]  ret_from_fork_asm+0x1a/0x30
[   31.620266]  </TASK>
[   31.620572] 
[   31.620732] Allocated by task 274:
[   31.621017]  kasan_save_stack+0x3d/0x60
[   31.621407]  kasan_save_track+0x18/0x40
[   31.621855]  kasan_save_alloc_info+0x3b/0x50
[   31.622300]  __kasan_kmalloc+0xb7/0xc0
[   31.622841]  __kmalloc_cache_noprof+0x184/0x410
[   31.623340]  kasan_atomics+0x96/0x310
[   31.623884]  kunit_try_run_case+0x1b3/0x490
[   31.624354]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   31.624885]  kthread+0x257/0x310
[   31.625248]  ret_from_fork+0x41/0x80
[   31.625593]  ret_from_fork_asm+0x1a/0x30
[   31.625945] 
[   31.626192] The buggy address belongs to the object at ffff888102a59b80
[   31.626192]  which belongs to the cache kmalloc-64 of size 64
[   31.627644] The buggy address is located 0 bytes to the right of
[   31.627644]  allocated 48-byte region [ffff888102a59b80, ffff888102a59bb0)
[   31.629161] 
[   31.629326] The buggy address belongs to the physical page:
[   31.632405] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a59
[   31.633827] flags: 0x200000000000000(node=0|zone=2)
[   31.634514] page_type: f5(slab)
[   31.634934] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   31.635452] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   31.636071] page dumped because: kasan: bad access detected
[   31.636417] 
[   31.636569] Memory state around the buggy address:
[   31.637010]  ffff888102a59a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   31.637779]  ffff888102a59b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   31.638246] >ffff888102a59b80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   31.638898]                                      ^
[   31.639229]  ffff888102a59c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.639901]  ffff888102a59c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.640574] ==================================================================
[   31.118418] ==================================================================
[   31.119166] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x13b6/0x5450
[   31.119754] Read of size 8 at addr ffff888102a59bb0 by task kunit_try_catch/274
[   31.120323] 
[   31.120610] CPU: 1 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241203 #1
[   31.121363] Tainted: [B]=BAD_PAGE, [N]=TEST
[   31.121691] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   31.122337] Call Trace:
[   31.122618]  <TASK>
[   31.122898]  dump_stack_lvl+0x73/0xb0
[   31.123317]  print_report+0xd1/0x640
[   31.123760]  ? __virt_addr_valid+0x1db/0x2d0
[   31.124144]  ? kasan_complete_mode_report_info+0x2a/0x200
[   31.124533]  kasan_report+0x102/0x140
[   31.124817]  ? kasan_atomics_helper+0x13b6/0x5450
[   31.125286]  ? kasan_atomics_helper+0x13b6/0x5450
[   31.125792]  kasan_check_range+0x10c/0x1c0
[   31.126244]  __kasan_check_read+0x15/0x20
[   31.126590]  kasan_atomics_helper+0x13b6/0x5450
[   31.127028]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   31.127566]  ? ret_from_fork_asm+0x1a/0x30
[   31.127912]  ? ret_from_fork+0x41/0x80
[   31.128324]  ? kthread+0x257/0x310
[   31.128660]  kasan_atomics+0x1dd/0x310
[   31.128944]  ? __pfx_kasan_atomics+0x10/0x10
[   31.129387]  ? __pfx_read_tsc+0x10/0x10
[   31.129831]  ? ktime_get_ts64+0x86/0x230
[   31.130267]  kunit_try_run_case+0x1b3/0x490
[   31.130750]  ? __pfx_kunit_try_run_case+0x10/0x10
[   31.131187]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   31.131611]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   31.132095]  ? __kthread_parkme+0x82/0x160
[   31.132554]  ? preempt_count_sub+0x50/0x80
[   31.132867]  ? __pfx_kunit_try_run_case+0x10/0x10
[   31.133333]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   31.133822]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   31.134308]  kthread+0x257/0x310
[   31.134610]  ? __pfx_kthread+0x10/0x10
[   31.134873]  ret_from_fork+0x41/0x80
[   31.135208]  ? __pfx_kthread+0x10/0x10
[   31.135640]  ret_from_fork_asm+0x1a/0x30
[   31.136086]  </TASK>
[   31.136368] 
[   31.136625] Allocated by task 274:
[   31.136975]  kasan_save_stack+0x3d/0x60
[   31.137392]  kasan_save_track+0x18/0x40
[   31.137823]  kasan_save_alloc_info+0x3b/0x50
[   31.138262]  __kasan_kmalloc+0xb7/0xc0
[   31.138670]  __kmalloc_cache_noprof+0x184/0x410
[   31.138987]  kasan_atomics+0x96/0x310
[   31.139397]  kunit_try_run_case+0x1b3/0x490
[   31.139820]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   31.140284]  kthread+0x257/0x310
[   31.140595]  ret_from_fork+0x41/0x80
[   31.140915]  ret_from_fork_asm+0x1a/0x30
[   31.142870] 
[   31.143116] The buggy address belongs to the object at ffff888102a59b80
[   31.143116]  which belongs to the cache kmalloc-64 of size 64
[   31.145073] The buggy address is located 0 bytes to the right of
[   31.145073]  allocated 48-byte region [ffff888102a59b80, ffff888102a59bb0)
[   31.145909] 
[   31.146140] The buggy address belongs to the physical page:
[   31.146601] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a59
[   31.147303] flags: 0x200000000000000(node=0|zone=2)
[   31.147728] page_type: f5(slab)
[   31.147967] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   31.148364] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   31.149036] page dumped because: kasan: bad access detected
[   31.149561] 
[   31.149764] Memory state around the buggy address:
[   31.150211]  ffff888102a59a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   31.150816]  ffff888102a59b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   31.151353] >ffff888102a59b80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   31.151798]                                      ^
[   31.152237]  ffff888102a59c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.152660]  ffff888102a59c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.153232] ==================================================================
[   32.159847] ==================================================================
[   32.160549] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4fb4/0x5450
[   32.161209] Read of size 8 at addr ffff888102a59bb0 by task kunit_try_catch/274
[   32.161760] 
[   32.162035] CPU: 1 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241203 #1
[   32.162766] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.163016] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   32.163831] Call Trace:
[   32.164143]  <TASK>
[   32.164477]  dump_stack_lvl+0x73/0xb0
[   32.164886]  print_report+0xd1/0x640
[   32.165304]  ? __virt_addr_valid+0x1db/0x2d0
[   32.165729]  ? kasan_complete_mode_report_info+0x2a/0x200
[   32.166190]  kasan_report+0x102/0x140
[   32.166672]  ? kasan_atomics_helper+0x4fb4/0x5450
[   32.167178]  ? kasan_atomics_helper+0x4fb4/0x5450
[   32.167696]  __asan_report_load8_noabort+0x18/0x20
[   32.168130]  kasan_atomics_helper+0x4fb4/0x5450
[   32.168631]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   32.169162]  ? ret_from_fork_asm+0x1a/0x30
[   32.169584]  ? ret_from_fork+0x41/0x80
[   32.169927]  ? kthread+0x257/0x310
[   32.170351]  kasan_atomics+0x1dd/0x310
[   32.170800]  ? __pfx_kasan_atomics+0x10/0x10
[   32.171206]  ? __pfx_read_tsc+0x10/0x10
[   32.171693]  ? ktime_get_ts64+0x86/0x230
[   32.172307]  kunit_try_run_case+0x1b3/0x490
[   32.172875]  ? __pfx_kunit_try_run_case+0x10/0x10
[   32.173318]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   32.173916]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   32.174561]  ? __kthread_parkme+0x82/0x160
[   32.175152]  ? preempt_count_sub+0x50/0x80
[   32.175764]  ? __pfx_kunit_try_run_case+0x10/0x10
[   32.176336]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   32.176850]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   32.177578]  kthread+0x257/0x310
[   32.178040]  ? __pfx_kthread+0x10/0x10
[   32.178674]  ret_from_fork+0x41/0x80
[   32.179148]  ? __pfx_kthread+0x10/0x10
[   32.179681]  ret_from_fork_asm+0x1a/0x30
[   32.180292]  </TASK>
[   32.180613] 
[   32.180865] Allocated by task 274:
[   32.181377]  kasan_save_stack+0x3d/0x60
[   32.181852]  kasan_save_track+0x18/0x40
[   32.182176]  kasan_save_alloc_info+0x3b/0x50
[   32.182659]  __kasan_kmalloc+0xb7/0xc0
[   32.183129]  __kmalloc_cache_noprof+0x184/0x410
[   32.183587]  kasan_atomics+0x96/0x310
[   32.184084]  kunit_try_run_case+0x1b3/0x490
[   32.184552]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   32.185232]  kthread+0x257/0x310
[   32.185636]  ret_from_fork+0x41/0x80
[   32.186045]  ret_from_fork_asm+0x1a/0x30
[   32.186558] 
[   32.186776] The buggy address belongs to the object at ffff888102a59b80
[   32.186776]  which belongs to the cache kmalloc-64 of size 64
[   32.187690] The buggy address is located 0 bytes to the right of
[   32.187690]  allocated 48-byte region [ffff888102a59b80, ffff888102a59bb0)
[   32.188724] 
[   32.188903] The buggy address belongs to the physical page:
[   32.189538] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a59
[   32.190189] flags: 0x200000000000000(node=0|zone=2)
[   32.190746] page_type: f5(slab)
[   32.191126] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   32.191616] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   32.192301] page dumped because: kasan: bad access detected
[   32.192827] 
[   32.192997] Memory state around the buggy address:
[   32.193548]  ffff888102a59a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.194095]  ffff888102a59b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.194764] >ffff888102a59b80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   32.195366]                                      ^
[   32.195841]  ffff888102a59c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.196383]  ffff888102a59c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.197115] ==================================================================
[   30.183204] ==================================================================
[   30.184429] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x730/0x5450
[   30.185099] Write of size 4 at addr ffff888102a59bb0 by task kunit_try_catch/274
[   30.185841] 
[   30.186032] CPU: 1 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241203 #1
[   30.186660] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.187283] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   30.188255] Call Trace:
[   30.188558]  <TASK>
[   30.188804]  dump_stack_lvl+0x73/0xb0
[   30.189311]  print_report+0xd1/0x640
[   30.189617]  ? __virt_addr_valid+0x1db/0x2d0
[   30.189921]  ? kasan_complete_mode_report_info+0x2a/0x200
[   30.190968]  kasan_report+0x102/0x140
[   30.191393]  ? kasan_atomics_helper+0x730/0x5450
[   30.191956]  ? kasan_atomics_helper+0x730/0x5450
[   30.192613]  kasan_check_range+0x10c/0x1c0
[   30.193739]  __kasan_check_write+0x18/0x20
[   30.194432]  kasan_atomics_helper+0x730/0x5450
[   30.195411]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   30.196301]  ? ret_from_fork_asm+0x1a/0x30
[   30.196683]  ? ret_from_fork+0x41/0x80
[   30.197078]  ? kthread+0x257/0x310
[   30.197455]  kasan_atomics+0x1dd/0x310
[   30.198319]  ? __pfx_kasan_atomics+0x10/0x10
[   30.198890]  ? __pfx_read_tsc+0x10/0x10
[   30.199441]  ? ktime_get_ts64+0x86/0x230
[   30.199992]  kunit_try_run_case+0x1b3/0x490
[   30.200429]  ? __pfx_kunit_try_run_case+0x10/0x10
[   30.201081]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   30.201486]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   30.202019]  ? __kthread_parkme+0x82/0x160
[   30.202560]  ? preempt_count_sub+0x50/0x80
[   30.202878]  ? __pfx_kunit_try_run_case+0x10/0x10
[   30.203414]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   30.204047]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   30.205093]  kthread+0x257/0x310
[   30.205411]  ? __pfx_kthread+0x10/0x10
[   30.206123]  ret_from_fork+0x41/0x80
[   30.206731]  ? __pfx_kthread+0x10/0x10
[   30.207077]  ret_from_fork_asm+0x1a/0x30
[   30.207456]  </TASK>
[   30.207728] 
[   30.207939] Allocated by task 274:
[   30.209034]  kasan_save_stack+0x3d/0x60
[   30.209378]  kasan_save_track+0x18/0x40
[   30.209919]  kasan_save_alloc_info+0x3b/0x50
[   30.210256]  __kasan_kmalloc+0xb7/0xc0
[   30.210905]  __kmalloc_cache_noprof+0x184/0x410
[   30.211504]  kasan_atomics+0x96/0x310
[   30.212189]  kunit_try_run_case+0x1b3/0x490
[   30.212630]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   30.213215]  kthread+0x257/0x310
[   30.213950]  ret_from_fork+0x41/0x80
[   30.214260]  ret_from_fork_asm+0x1a/0x30
[   30.214756] 
[   30.214919] The buggy address belongs to the object at ffff888102a59b80
[   30.214919]  which belongs to the cache kmalloc-64 of size 64
[   30.215766] The buggy address is located 0 bytes to the right of
[   30.215766]  allocated 48-byte region [ffff888102a59b80, ffff888102a59bb0)
[   30.217203] 
[   30.217794] The buggy address belongs to the physical page:
[   30.218516] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a59
[   30.219024] flags: 0x200000000000000(node=0|zone=2)
[   30.219475] page_type: f5(slab)
[   30.219747] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   30.220782] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   30.221438] page dumped because: kasan: bad access detected
[   30.222260] 
[   30.222444] Memory state around the buggy address:
[   30.222911]  ffff888102a59a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   30.223448]  ffff888102a59b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   30.223911] >ffff888102a59b80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   30.225436]                                      ^
[   30.226139]  ffff888102a59c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.226959]  ffff888102a59c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.227508] ==================================================================
[   31.817798] ==================================================================
[   31.818944] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1ce2/0x5450
[   31.819513] Write of size 8 at addr ffff888102a59bb0 by task kunit_try_catch/274
[   31.820683] 
[   31.820868] CPU: 1 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241203 #1
[   31.822286] Tainted: [B]=BAD_PAGE, [N]=TEST
[   31.823086] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   31.823737] Call Trace:
[   31.823933]  <TASK>
[   31.824221]  dump_stack_lvl+0x73/0xb0
[   31.825150]  print_report+0xd1/0x640
[   31.825760]  ? __virt_addr_valid+0x1db/0x2d0
[   31.826335]  ? kasan_complete_mode_report_info+0x2a/0x200
[   31.826990]  kasan_report+0x102/0x140
[   31.827338]  ? kasan_atomics_helper+0x1ce2/0x5450
[   31.828151]  ? kasan_atomics_helper+0x1ce2/0x5450
[   31.828526]  kasan_check_range+0x10c/0x1c0
[   31.829278]  __kasan_check_write+0x18/0x20
[   31.829676]  kasan_atomics_helper+0x1ce2/0x5450
[   31.830103]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   31.830890]  ? ret_from_fork_asm+0x1a/0x30
[   31.831254]  ? ret_from_fork+0x41/0x80
[   31.831806]  ? kthread+0x257/0x310
[   31.832314]  kasan_atomics+0x1dd/0x310
[   31.833102]  ? __pfx_kasan_atomics+0x10/0x10
[   31.833478]  ? __pfx_read_tsc+0x10/0x10
[   31.834268]  ? ktime_get_ts64+0x86/0x230
[   31.834666]  kunit_try_run_case+0x1b3/0x490
[   31.835373]  ? __pfx_kunit_try_run_case+0x10/0x10
[   31.835829]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   31.836288]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   31.837587]  ? __kthread_parkme+0x82/0x160
[   31.837937]  ? preempt_count_sub+0x50/0x80
[   31.838522]  ? __pfx_kunit_try_run_case+0x10/0x10
[   31.839220]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   31.840007]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   31.840650]  kthread+0x257/0x310
[   31.840993]  ? __pfx_kthread+0x10/0x10
[   31.841706]  ret_from_fork+0x41/0x80
[   31.842311]  ? __pfx_kthread+0x10/0x10
[   31.842682]  ret_from_fork_asm+0x1a/0x30
[   31.843145]  </TASK>
[   31.843416] 
[   31.843719] Allocated by task 274:
[   31.844000]  kasan_save_stack+0x3d/0x60
[   31.844290]  kasan_save_track+0x18/0x40
[   31.844825]  kasan_save_alloc_info+0x3b/0x50
[   31.845454]  __kasan_kmalloc+0xb7/0xc0
[   31.845977]  __kmalloc_cache_noprof+0x184/0x410
[   31.846335]  kasan_atomics+0x96/0x310
[   31.846594]  kunit_try_run_case+0x1b3/0x490
[   31.847091]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   31.847856]  kthread+0x257/0x310
[   31.848301]  ret_from_fork+0x41/0x80
[   31.848725]  ret_from_fork_asm+0x1a/0x30
[   31.849034] 
[   31.849264] The buggy address belongs to the object at ffff888102a59b80
[   31.849264]  which belongs to the cache kmalloc-64 of size 64
[   31.850162] The buggy address is located 0 bytes to the right of
[   31.850162]  allocated 48-byte region [ffff888102a59b80, ffff888102a59bb0)
[   31.851381] 
[   31.851541] The buggy address belongs to the physical page:
[   31.851827] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a59
[   31.852706] flags: 0x200000000000000(node=0|zone=2)
[   31.853254] page_type: f5(slab)
[   31.853599] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   31.854488] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   31.854950] page dumped because: kasan: bad access detected
[   31.855264] 
[   31.855411] Memory state around the buggy address:
[   31.855681]  ffff888102a59a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   31.856359]  ffff888102a59b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   31.857256] >ffff888102a59b80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   31.858103]                                      ^
[   31.858465]  ffff888102a59c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.858973]  ffff888102a59c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.859608] ==================================================================
[   29.830136] ==================================================================
[   29.830738] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b8a/0x5450
[   29.831286] Read of size 4 at addr ffff888102a59bb0 by task kunit_try_catch/274
[   29.831776] 
[   29.831936] CPU: 1 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241203 #1
[   29.833089] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.833465] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   29.834744] Call Trace:
[   29.834945]  <TASK>
[   29.835153]  dump_stack_lvl+0x73/0xb0
[   29.836033]  print_report+0xd1/0x640
[   29.836426]  ? __virt_addr_valid+0x1db/0x2d0
[   29.837141]  ? kasan_complete_mode_report_info+0x2a/0x200
[   29.837450]  kasan_report+0x102/0x140
[   29.837876]  ? kasan_atomics_helper+0x4b8a/0x5450
[   29.838259]  ? kasan_atomics_helper+0x4b8a/0x5450
[   29.839259]  __asan_report_load4_noabort+0x18/0x20
[   29.839930]  kasan_atomics_helper+0x4b8a/0x5450
[   29.840378]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   29.840955]  ? ret_from_fork_asm+0x1a/0x30
[   29.841282]  ? ret_from_fork+0x41/0x80
[   29.841907]  ? kthread+0x257/0x310
[   29.842272]  kasan_atomics+0x1dd/0x310
[   29.842925]  ? __pfx_kasan_atomics+0x10/0x10
[   29.843445]  ? __pfx_read_tsc+0x10/0x10
[   29.844105]  ? ktime_get_ts64+0x86/0x230
[   29.844459]  kunit_try_run_case+0x1b3/0x490
[   29.844738]  ? __pfx_kunit_try_run_case+0x10/0x10
[   29.845133]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   29.846047]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   29.846616]  ? __kthread_parkme+0x82/0x160
[   29.846868]  ? preempt_count_sub+0x50/0x80
[   29.847296]  ? __pfx_kunit_try_run_case+0x10/0x10
[   29.847767]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   29.848388]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   29.849195]  kthread+0x257/0x310
[   29.849816]  ? __pfx_kthread+0x10/0x10
[   29.850249]  ret_from_fork+0x41/0x80
[   29.850769]  ? __pfx_kthread+0x10/0x10
[   29.851479]  ret_from_fork_asm+0x1a/0x30
[   29.851911]  </TASK>
[   29.852141] 
[   29.852280] Allocated by task 274:
[   29.852612]  kasan_save_stack+0x3d/0x60
[   29.853107]  kasan_save_track+0x18/0x40
[   29.853367]  kasan_save_alloc_info+0x3b/0x50
[   29.854266]  __kasan_kmalloc+0xb7/0xc0
[   29.854639]  __kmalloc_cache_noprof+0x184/0x410
[   29.855126]  kasan_atomics+0x96/0x310
[   29.855731]  kunit_try_run_case+0x1b3/0x490
[   29.856010]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   29.856717]  kthread+0x257/0x310
[   29.857167]  ret_from_fork+0x41/0x80
[   29.857423]  ret_from_fork_asm+0x1a/0x30
[   29.858050] 
[   29.858272] The buggy address belongs to the object at ffff888102a59b80
[   29.858272]  which belongs to the cache kmalloc-64 of size 64
[   29.859023] The buggy address is located 0 bytes to the right of
[   29.859023]  allocated 48-byte region [ffff888102a59b80, ffff888102a59bb0)
[   29.860528] 
[   29.860742] The buggy address belongs to the physical page:
[   29.861346] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a59
[   29.862239] flags: 0x200000000000000(node=0|zone=2)
[   29.862915] page_type: f5(slab)
[   29.863215] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   29.864420] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   29.864893] page dumped because: kasan: bad access detected
[   29.865309] 
[   29.865478] Memory state around the buggy address:
[   29.865914]  ffff888102a59a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.867083]  ffff888102a59b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.867798] >ffff888102a59b80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   29.868746]                                      ^
[   29.869171]  ffff888102a59c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.870102]  ffff888102a59c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.870679] ==================================================================
[   30.549874] ==================================================================
[   30.550851] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a86/0x5450
[   30.551579] Read of size 4 at addr ffff888102a59bb0 by task kunit_try_catch/274
[   30.552097] 
[   30.552345] CPU: 1 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241203 #1
[   30.553142] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.553551] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   30.554223] Call Trace:
[   30.554592]  <TASK>
[   30.554930]  dump_stack_lvl+0x73/0xb0
[   30.555362]  print_report+0xd1/0x640
[   30.555835]  ? __virt_addr_valid+0x1db/0x2d0
[   30.556233]  ? kasan_complete_mode_report_info+0x2a/0x200
[   30.556839]  kasan_report+0x102/0x140
[   30.557168]  ? kasan_atomics_helper+0x4a86/0x5450
[   30.557677]  ? kasan_atomics_helper+0x4a86/0x5450
[   30.558143]  __asan_report_load4_noabort+0x18/0x20
[   30.558695]  kasan_atomics_helper+0x4a86/0x5450
[   30.559076]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   30.559631]  ? ret_from_fork_asm+0x1a/0x30
[   30.560034]  ? ret_from_fork+0x41/0x80
[   30.560355]  ? kthread+0x257/0x310
[   30.560810]  kasan_atomics+0x1dd/0x310
[   30.561207]  ? __pfx_kasan_atomics+0x10/0x10
[   30.561706]  ? __pfx_read_tsc+0x10/0x10
[   30.562098]  ? ktime_get_ts64+0x86/0x230
[   30.562415]  kunit_try_run_case+0x1b3/0x490
[   30.562880]  ? __pfx_kunit_try_run_case+0x10/0x10
[   30.563283]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   30.563749]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   30.564153]  ? __kthread_parkme+0x82/0x160
[   30.564622]  ? preempt_count_sub+0x50/0x80
[   30.565114]  ? __pfx_kunit_try_run_case+0x10/0x10
[   30.565513]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   30.566137]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   30.566737]  kthread+0x257/0x310
[   30.567050]  ? __pfx_kthread+0x10/0x10
[   30.567479]  ret_from_fork+0x41/0x80
[   30.567886]  ? __pfx_kthread+0x10/0x10
[   30.568292]  ret_from_fork_asm+0x1a/0x30
[   30.568740]  </TASK>
[   30.569009] 
[   30.569271] Allocated by task 274:
[   30.569618]  kasan_save_stack+0x3d/0x60
[   30.570011]  kasan_save_track+0x18/0x40
[   30.570284]  kasan_save_alloc_info+0x3b/0x50
[   30.570612]  __kasan_kmalloc+0xb7/0xc0
[   30.570869]  __kmalloc_cache_noprof+0x184/0x410
[   30.571260]  kasan_atomics+0x96/0x310
[   30.571721]  kunit_try_run_case+0x1b3/0x490
[   30.572167]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   30.572715]  kthread+0x257/0x310
[   30.573085]  ret_from_fork+0x41/0x80
[   30.573544]  ret_from_fork_asm+0x1a/0x30
[   30.573952] 
[   30.574203] The buggy address belongs to the object at ffff888102a59b80
[   30.574203]  which belongs to the cache kmalloc-64 of size 64
[   30.575275] The buggy address is located 0 bytes to the right of
[   30.575275]  allocated 48-byte region [ffff888102a59b80, ffff888102a59bb0)
[   30.576086] 
[   30.576347] The buggy address belongs to the physical page:
[   30.576894] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a59
[   30.577465] flags: 0x200000000000000(node=0|zone=2)
[   30.577916] page_type: f5(slab)
[   30.578274] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   30.578932] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   30.579413] page dumped because: kasan: bad access detected
[   30.579924] 
[   30.580155] Memory state around the buggy address:
[   30.580573]  ffff888102a59a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   30.581119]  ffff888102a59b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   30.581708] >ffff888102a59b80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   30.582079]                                      ^
[   30.582363]  ffff888102a59c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.582764]  ffff888102a59c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.583157] ==================================================================
[   31.044889] ==================================================================
[   31.045601] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x12e7/0x5450
[   31.046353] Write of size 4 at addr ffff888102a59bb0 by task kunit_try_catch/274
[   31.046840] 
[   31.047025] CPU: 1 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241203 #1
[   31.047838] Tainted: [B]=BAD_PAGE, [N]=TEST
[   31.048276] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   31.049074] Call Trace:
[   31.049377]  <TASK>
[   31.049678]  dump_stack_lvl+0x73/0xb0
[   31.049981]  print_report+0xd1/0x640
[   31.050486]  ? __virt_addr_valid+0x1db/0x2d0
[   31.050945]  ? kasan_complete_mode_report_info+0x2a/0x200
[   31.051513]  kasan_report+0x102/0x140
[   31.051801]  ? kasan_atomics_helper+0x12e7/0x5450
[   31.052166]  ? kasan_atomics_helper+0x12e7/0x5450
[   31.052706]  kasan_check_range+0x10c/0x1c0
[   31.053188]  __kasan_check_write+0x18/0x20
[   31.053689]  kasan_atomics_helper+0x12e7/0x5450
[   31.054068]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   31.054636]  ? ret_from_fork_asm+0x1a/0x30
[   31.054929]  ? ret_from_fork+0x41/0x80
[   31.055219]  ? kthread+0x257/0x310
[   31.055622]  kasan_atomics+0x1dd/0x310
[   31.056024]  ? __pfx_kasan_atomics+0x10/0x10
[   31.056545]  ? __pfx_read_tsc+0x10/0x10
[   31.056950]  ? ktime_get_ts64+0x86/0x230
[   31.057381]  kunit_try_run_case+0x1b3/0x490
[   31.057905]  ? __pfx_kunit_try_run_case+0x10/0x10
[   31.058359]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   31.058799]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   31.059175]  ? __kthread_parkme+0x82/0x160
[   31.059491]  ? preempt_count_sub+0x50/0x80
[   31.059820]  ? __pfx_kunit_try_run_case+0x10/0x10
[   31.060324]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   31.060932]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   31.061531]  kthread+0x257/0x310
[   31.061910]  ? __pfx_kthread+0x10/0x10
[   31.062331]  ret_from_fork+0x41/0x80
[   31.062799]  ? __pfx_kthread+0x10/0x10
[   31.063168]  ret_from_fork_asm+0x1a/0x30
[   31.063619]  </TASK>
[   31.063931] 
[   31.064163] Allocated by task 274:
[   31.064564]  kasan_save_stack+0x3d/0x60
[   31.064926]  kasan_save_track+0x18/0x40
[   31.065296]  kasan_save_alloc_info+0x3b/0x50
[   31.065759]  __kasan_kmalloc+0xb7/0xc0
[   31.066171]  __kmalloc_cache_noprof+0x184/0x410
[   31.066662]  kasan_atomics+0x96/0x310
[   31.067003]  kunit_try_run_case+0x1b3/0x490
[   31.067295]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   31.067657]  kthread+0x257/0x310
[   31.067893]  ret_from_fork+0x41/0x80
[   31.068332]  ret_from_fork_asm+0x1a/0x30
[   31.068791] 
[   31.069005] The buggy address belongs to the object at ffff888102a59b80
[   31.069005]  which belongs to the cache kmalloc-64 of size 64
[   31.070039] The buggy address is located 0 bytes to the right of
[   31.070039]  allocated 48-byte region [ffff888102a59b80, ffff888102a59bb0)
[   31.070922] 
[   31.071108] The buggy address belongs to the physical page:
[   31.071655] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a59
[   31.072123] flags: 0x200000000000000(node=0|zone=2)
[   31.072660] page_type: f5(slab)
[   31.073047] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   31.073526] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   31.073896] page dumped because: kasan: bad access detected
[   31.074202] 
[   31.074349] Memory state around the buggy address:
[   31.074786]  ffff888102a59a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   31.075408]  ffff888102a59b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   31.076113] >ffff888102a59b80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   31.076754]                                      ^
[   31.077256]  ffff888102a59c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.078764]  ffff888102a59c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.080125] ==================================================================
[   30.854492] ==================================================================
[   30.855438] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a1e/0x5450
[   30.855846] Read of size 4 at addr ffff888102a59bb0 by task kunit_try_catch/274
[   30.856432] 
[   30.857082] CPU: 1 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241203 #1
[   30.857987] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.858274] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   30.858910] Call Trace:
[   30.859278]  <TASK>
[   30.859585]  dump_stack_lvl+0x73/0xb0
[   30.860018]  print_report+0xd1/0x640
[   30.860332]  ? __virt_addr_valid+0x1db/0x2d0
[   30.860687]  ? kasan_complete_mode_report_info+0x2a/0x200
[   30.861324]  kasan_report+0x102/0x140
[   30.861736]  ? kasan_atomics_helper+0x4a1e/0x5450
[   30.862095]  ? kasan_atomics_helper+0x4a1e/0x5450
[   30.862543]  __asan_report_load4_noabort+0x18/0x20
[   30.863008]  kasan_atomics_helper+0x4a1e/0x5450
[   30.863423]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   30.863882]  ? ret_from_fork_asm+0x1a/0x30
[   30.864186]  ? ret_from_fork+0x41/0x80
[   30.864587]  ? kthread+0x257/0x310
[   30.865031]  kasan_atomics+0x1dd/0x310
[   30.865441]  ? __pfx_kasan_atomics+0x10/0x10
[   30.865900]  ? __pfx_read_tsc+0x10/0x10
[   30.866324]  ? ktime_get_ts64+0x86/0x230
[   30.866687]  kunit_try_run_case+0x1b3/0x490
[   30.867162]  ? __pfx_kunit_try_run_case+0x10/0x10
[   30.867495]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   30.867959]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   30.868289]  ? __kthread_parkme+0x82/0x160
[   30.868596]  ? preempt_count_sub+0x50/0x80
[   30.869010]  ? __pfx_kunit_try_run_case+0x10/0x10
[   30.869532]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   30.870243]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   30.870851]  kthread+0x257/0x310
[   30.871187]  ? __pfx_kthread+0x10/0x10
[   30.871588]  ret_from_fork+0x41/0x80
[   30.871852]  ? __pfx_kthread+0x10/0x10
[   30.872154]  ret_from_fork_asm+0x1a/0x30
[   30.872598]  </TASK>
[   30.872950] 
[   30.873176] Allocated by task 274:
[   30.873527]  kasan_save_stack+0x3d/0x60
[   30.873922]  kasan_save_track+0x18/0x40
[   30.874327]  kasan_save_alloc_info+0x3b/0x50
[   30.874631]  __kasan_kmalloc+0xb7/0xc0
[   30.875099]  __kmalloc_cache_noprof+0x184/0x410
[   30.875437]  kasan_atomics+0x96/0x310
[   30.875798]  kunit_try_run_case+0x1b3/0x490
[   30.876094]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   30.876443]  kthread+0x257/0x310
[   30.876811]  ret_from_fork+0x41/0x80
[   30.877208]  ret_from_fork_asm+0x1a/0x30
[   30.877668] 
[   30.877862] The buggy address belongs to the object at ffff888102a59b80
[   30.877862]  which belongs to the cache kmalloc-64 of size 64
[   30.878985] The buggy address is located 0 bytes to the right of
[   30.878985]  allocated 48-byte region [ffff888102a59b80, ffff888102a59bb0)
[   30.879747] 
[   30.879903] The buggy address belongs to the physical page:
[   30.880203] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a59
[   30.880604] flags: 0x200000000000000(node=0|zone=2)
[   30.880901] page_type: f5(slab)
[   30.881166] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   30.881927] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   30.882651] page dumped because: kasan: bad access detected
[   30.883163] 
[   30.883370] Memory state around the buggy address:
[   30.884002]  ffff888102a59a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   30.884517]  ffff888102a59b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   30.885105] >ffff888102a59b80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   30.885462]                                      ^
[   30.885903]  ffff888102a59c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.886538]  ffff888102a59c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.887118] ==================================================================
[   29.744463] ==================================================================
[   29.745725] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4bbe/0x5450
[   29.746293] Read of size 4 at addr ffff888102a59bb0 by task kunit_try_catch/274
[   29.747435] 
[   29.748237] CPU: 1 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241203 #1
[   29.748877] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.749266] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   29.749864] Call Trace:
[   29.750672]  <TASK>
[   29.750862]  dump_stack_lvl+0x73/0xb0
[   29.751319]  print_report+0xd1/0x640
[   29.752169]  ? __virt_addr_valid+0x1db/0x2d0
[   29.752529]  ? kasan_complete_mode_report_info+0x2a/0x200
[   29.753297]  kasan_report+0x102/0x140
[   29.754018]  ? kasan_atomics_helper+0x4bbe/0x5450
[   29.754435]  ? kasan_atomics_helper+0x4bbe/0x5450
[   29.755226]  __asan_report_load4_noabort+0x18/0x20
[   29.755937]  kasan_atomics_helper+0x4bbe/0x5450
[   29.756303]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   29.756917]  ? ret_from_fork_asm+0x1a/0x30
[   29.757527]  ? ret_from_fork+0x41/0x80
[   29.757852]  ? kthread+0x257/0x310
[   29.758198]  kasan_atomics+0x1dd/0x310
[   29.759019]  ? __pfx_kasan_atomics+0x10/0x10
[   29.759401]  ? __pfx_read_tsc+0x10/0x10
[   29.760047]  ? ktime_get_ts64+0x86/0x230
[   29.760721]  kunit_try_run_case+0x1b3/0x490
[   29.761098]  ? __pfx_kunit_try_run_case+0x10/0x10
[   29.762116]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   29.762492]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   29.763516]  ? __kthread_parkme+0x82/0x160
[   29.763865]  ? preempt_count_sub+0x50/0x80
[   29.764266]  ? __pfx_kunit_try_run_case+0x10/0x10
[   29.764944]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   29.765450]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   29.766407]  kthread+0x257/0x310
[   29.767035]  ? __pfx_kthread+0x10/0x10
[   29.767424]  ret_from_fork+0x41/0x80
[   29.767707]  ? __pfx_kthread+0x10/0x10
[   29.768028]  ret_from_fork_asm+0x1a/0x30
[   29.768472]  </TASK>
[   29.769258] 
[   29.769393] Allocated by task 274:
[   29.769652]  kasan_save_stack+0x3d/0x60
[   29.770103]  kasan_save_track+0x18/0x40
[   29.771193]  kasan_save_alloc_info+0x3b/0x50
[   29.771532]  __kasan_kmalloc+0xb7/0xc0
[   29.771693]  __kmalloc_cache_noprof+0x184/0x410
[   29.771854]  kasan_atomics+0x96/0x310
[   29.771991]  kunit_try_run_case+0x1b3/0x490
[   29.772224]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   29.772652]  kthread+0x257/0x310
[   29.773024]  ret_from_fork+0x41/0x80
[   29.773951]  ret_from_fork_asm+0x1a/0x30
[   29.774754] 
[   29.774986] The buggy address belongs to the object at ffff888102a59b80
[   29.774986]  which belongs to the cache kmalloc-64 of size 64
[   29.775999] The buggy address is located 0 bytes to the right of
[   29.775999]  allocated 48-byte region [ffff888102a59b80, ffff888102a59bb0)
[   29.776879] 
[   29.777079] The buggy address belongs to the physical page:
[   29.777806] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a59
[   29.778420] flags: 0x200000000000000(node=0|zone=2)
[   29.778904] page_type: f5(slab)
[   29.779269] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   29.779969] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   29.780548] page dumped because: kasan: bad access detected
[   29.780947] 
[   29.781198] Memory state around the buggy address:
[   29.781607]  ffff888102a59a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.782256]  ffff888102a59b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.782876] >ffff888102a59b80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   29.783316]                                      ^
[   29.783822]  ffff888102a59c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.784526]  ffff888102a59c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.784887] ==================================================================
[   31.560857] ==================================================================
[   31.561394] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x194b/0x5450
[   31.562773] Write of size 8 at addr ffff888102a59bb0 by task kunit_try_catch/274
[   31.563539] 
[   31.563746] CPU: 1 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241203 #1
[   31.565023] Tainted: [B]=BAD_PAGE, [N]=TEST
[   31.565377] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   31.566292] Call Trace:
[   31.566600]  <TASK>
[   31.566799]  dump_stack_lvl+0x73/0xb0
[   31.567419]  print_report+0xd1/0x640
[   31.567942]  ? __virt_addr_valid+0x1db/0x2d0
[   31.568503]  ? kasan_complete_mode_report_info+0x2a/0x200
[   31.568954]  kasan_report+0x102/0x140
[   31.569419]  ? kasan_atomics_helper+0x194b/0x5450
[   31.569980]  ? kasan_atomics_helper+0x194b/0x5450
[   31.570667]  kasan_check_range+0x10c/0x1c0
[   31.571086]  __kasan_check_write+0x18/0x20
[   31.571527]  kasan_atomics_helper+0x194b/0x5450
[   31.571993]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   31.572529]  ? ret_from_fork_asm+0x1a/0x30
[   31.572844]  ? ret_from_fork+0x41/0x80
[   31.573342]  ? kthread+0x257/0x310
[   31.573845]  kasan_atomics+0x1dd/0x310
[   31.574377]  ? __pfx_kasan_atomics+0x10/0x10
[   31.575173]  ? __pfx_read_tsc+0x10/0x10
[   31.575703]  ? ktime_get_ts64+0x86/0x230
[   31.576248]  kunit_try_run_case+0x1b3/0x490
[   31.576717]  ? __pfx_kunit_try_run_case+0x10/0x10
[   31.577228]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   31.577965]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   31.578406]  ? __kthread_parkme+0x82/0x160
[   31.578597]  ? preempt_count_sub+0x50/0x80
[   31.578756]  ? __pfx_kunit_try_run_case+0x10/0x10
[   31.578920]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   31.579219]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   31.579839]  kthread+0x257/0x310
[   31.580318]  ? __pfx_kthread+0x10/0x10
[   31.580714]  ret_from_fork+0x41/0x80
[   31.581070]  ? __pfx_kthread+0x10/0x10
[   31.581519]  ret_from_fork_asm+0x1a/0x30
[   31.582185]  </TASK>
[   31.582478] 
[   31.582735] Allocated by task 274:
[   31.583135]  kasan_save_stack+0x3d/0x60
[   31.583507]  kasan_save_track+0x18/0x40
[   31.583982]  kasan_save_alloc_info+0x3b/0x50
[   31.584370]  __kasan_kmalloc+0xb7/0xc0
[   31.584764]  __kmalloc_cache_noprof+0x184/0x410
[   31.585275]  kasan_atomics+0x96/0x310
[   31.585888]  kunit_try_run_case+0x1b3/0x490
[   31.586336]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   31.587041]  kthread+0x257/0x310
[   31.587302]  ret_from_fork+0x41/0x80
[   31.587786]  ret_from_fork_asm+0x1a/0x30
[   31.588234] 
[   31.588520] The buggy address belongs to the object at ffff888102a59b80
[   31.588520]  which belongs to the cache kmalloc-64 of size 64
[   31.589377] The buggy address is located 0 bytes to the right of
[   31.589377]  allocated 48-byte region [ffff888102a59b80, ffff888102a59bb0)
[   31.590755] 
[   31.591045] The buggy address belongs to the physical page:
[   31.591529] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a59
[   31.592204] flags: 0x200000000000000(node=0|zone=2)
[   31.592774] page_type: f5(slab)
[   31.593120] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   31.593799] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   31.594448] page dumped because: kasan: bad access detected
[   31.595023] 
[   31.596102] Memory state around the buggy address:
[   31.596406]  ffff888102a59a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   31.596776]  ffff888102a59b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   31.597516] >ffff888102a59b80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   31.598323]                                      ^
[   31.598890]  ffff888102a59c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.599335]  ffff888102a59c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.599879] ==================================================================
[   31.900724] ==================================================================
[   31.901176] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1e13/0x5450
[   31.902071] Write of size 8 at addr ffff888102a59bb0 by task kunit_try_catch/274
[   31.902464] 
[   31.902679] CPU: 1 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241203 #1
[   31.903635] Tainted: [B]=BAD_PAGE, [N]=TEST
[   31.903884] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   31.904524] Call Trace:
[   31.904761]  <TASK>
[   31.905018]  dump_stack_lvl+0x73/0xb0
[   31.905431]  print_report+0xd1/0x640
[   31.905960]  ? __virt_addr_valid+0x1db/0x2d0
[   31.906413]  ? kasan_complete_mode_report_info+0x2a/0x200
[   31.906875]  kasan_report+0x102/0x140
[   31.907171]  ? kasan_atomics_helper+0x1e13/0x5450
[   31.907474]  ? kasan_atomics_helper+0x1e13/0x5450
[   31.908013]  kasan_check_range+0x10c/0x1c0
[   31.908666]  __kasan_check_write+0x18/0x20
[   31.909113]  kasan_atomics_helper+0x1e13/0x5450
[   31.909604]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   31.910072]  ? ret_from_fork_asm+0x1a/0x30
[   31.910367]  ? ret_from_fork+0x41/0x80
[   31.910628]  ? kthread+0x257/0x310
[   31.910882]  kasan_atomics+0x1dd/0x310
[   31.911329]  ? __pfx_kasan_atomics+0x10/0x10
[   31.911944]  ? __pfx_read_tsc+0x10/0x10
[   31.912435]  ? ktime_get_ts64+0x86/0x230
[   31.912894]  kunit_try_run_case+0x1b3/0x490
[   31.913356]  ? __pfx_kunit_try_run_case+0x10/0x10
[   31.913699]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   31.914011]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   31.914555]  ? __kthread_parkme+0x82/0x160
[   31.914936]  ? preempt_count_sub+0x50/0x80
[   31.915611]  ? __pfx_kunit_try_run_case+0x10/0x10
[   31.916085]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   31.916667]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   31.917001]  kthread+0x257/0x310
[   31.917273]  ? __pfx_kthread+0x10/0x10
[   31.917580]  ret_from_fork+0x41/0x80
[   31.917982]  ? __pfx_kthread+0x10/0x10
[   31.918429]  ret_from_fork_asm+0x1a/0x30
[   31.919137]  </TASK>
[   31.919440] 
[   31.919665] Allocated by task 274:
[   31.919948]  kasan_save_stack+0x3d/0x60
[   31.920369]  kasan_save_track+0x18/0x40
[   31.920810]  kasan_save_alloc_info+0x3b/0x50
[   31.922139]  __kasan_kmalloc+0xb7/0xc0
[   31.922412]  __kmalloc_cache_noprof+0x184/0x410
[   31.922723]  kasan_atomics+0x96/0x310
[   31.922979]  kunit_try_run_case+0x1b3/0x490
[   31.924275]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   31.924942]  kthread+0x257/0x310
[   31.925355]  ret_from_fork+0x41/0x80
[   31.925809]  ret_from_fork_asm+0x1a/0x30
[   31.926294] 
[   31.926656] The buggy address belongs to the object at ffff888102a59b80
[   31.926656]  which belongs to the cache kmalloc-64 of size 64
[   31.928005] The buggy address is located 0 bytes to the right of
[   31.928005]  allocated 48-byte region [ffff888102a59b80, ffff888102a59bb0)
[   31.929276] 
[   31.929563] The buggy address belongs to the physical page:
[   31.929884] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a59
[   31.930767] flags: 0x200000000000000(node=0|zone=2)
[   31.931330] page_type: f5(slab)
[   31.931761] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   31.932367] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   31.933189] page dumped because: kasan: bad access detected
[   31.933815] 
[   31.934284] Memory state around the buggy address:
[   31.934820]  ffff888102a59a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   31.935550]  ffff888102a59b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   31.936026] >ffff888102a59b80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   31.936505]                                      ^
[   31.936798]  ffff888102a59c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.937419]  ffff888102a59c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.938145] ==================================================================
[   30.775383] ==================================================================
[   30.776111] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a38/0x5450
[   30.776717] Read of size 4 at addr ffff888102a59bb0 by task kunit_try_catch/274
[   30.777354] 
[   30.777644] CPU: 1 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241203 #1
[   30.778338] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.778812] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   30.779398] Call Trace:
[   30.779776]  <TASK>
[   30.780041]  dump_stack_lvl+0x73/0xb0
[   30.780520]  print_report+0xd1/0x640
[   30.780906]  ? __virt_addr_valid+0x1db/0x2d0
[   30.781419]  ? kasan_complete_mode_report_info+0x2a/0x200
[   30.781925]  kasan_report+0x102/0x140
[   30.782373]  ? kasan_atomics_helper+0x4a38/0x5450
[   30.782781]  ? kasan_atomics_helper+0x4a38/0x5450
[   30.783227]  __asan_report_load4_noabort+0x18/0x20
[   30.783766]  kasan_atomics_helper+0x4a38/0x5450
[   30.784241]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   30.784758]  ? ret_from_fork_asm+0x1a/0x30
[   30.785230]  ? ret_from_fork+0x41/0x80
[   30.785659]  ? kthread+0x257/0x310
[   30.786019]  kasan_atomics+0x1dd/0x310
[   30.786473]  ? __pfx_kasan_atomics+0x10/0x10
[   30.786891]  ? __pfx_read_tsc+0x10/0x10
[   30.787271]  ? ktime_get_ts64+0x86/0x230
[   30.787755]  kunit_try_run_case+0x1b3/0x490
[   30.788233]  ? __pfx_kunit_try_run_case+0x10/0x10
[   30.788710]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   30.789132]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   30.789712]  ? __kthread_parkme+0x82/0x160
[   30.790172]  ? preempt_count_sub+0x50/0x80
[   30.790709]  ? __pfx_kunit_try_run_case+0x10/0x10
[   30.791047]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   30.791407]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   30.792044]  kthread+0x257/0x310
[   30.792523]  ? __pfx_kthread+0x10/0x10
[   30.792994]  ret_from_fork+0x41/0x80
[   30.793480]  ? __pfx_kthread+0x10/0x10
[   30.793918]  ret_from_fork_asm+0x1a/0x30
[   30.794425]  </TASK>
[   30.794841] 
[   30.795113] Allocated by task 274:
[   30.795580]  kasan_save_stack+0x3d/0x60
[   30.796085]  kasan_save_track+0x18/0x40
[   30.796576]  kasan_save_alloc_info+0x3b/0x50
[   30.797094]  __kasan_kmalloc+0xb7/0xc0
[   30.797649]  __kmalloc_cache_noprof+0x184/0x410
[   30.798188]  kasan_atomics+0x96/0x310
[   30.798557]  kunit_try_run_case+0x1b3/0x490
[   30.799076]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   30.799630]  kthread+0x257/0x310
[   30.799787]  ret_from_fork+0x41/0x80
[   30.799925]  ret_from_fork_asm+0x1a/0x30
[   30.800090] 
[   30.800175] The buggy address belongs to the object at ffff888102a59b80
[   30.800175]  which belongs to the cache kmalloc-64 of size 64
[   30.800592] The buggy address is located 0 bytes to the right of
[   30.800592]  allocated 48-byte region [ffff888102a59b80, ffff888102a59bb0)
[   30.801159] 
[   30.801987] The buggy address belongs to the physical page:
[   30.802812] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a59
[   30.803835] flags: 0x200000000000000(node=0|zone=2)
[   30.804394] page_type: f5(slab)
[   30.804815] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   30.805581] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   30.806308] page dumped because: kasan: bad access detected
[   30.806764] 
[   30.806975] Memory state around the buggy address:
[   30.807507]  ffff888102a59a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   30.808189]  ffff888102a59b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   30.808908] >ffff888102a59b80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   30.809606]                                      ^
[   30.809887]  ffff888102a59c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.810495]  ffff888102a59c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.810851] ==================================================================
[   29.787457] ==================================================================
[   29.788100] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4ba4/0x5450
[   29.788733] Write of size 4 at addr ffff888102a59bb0 by task kunit_try_catch/274
[   29.789387] 
[   29.789626] CPU: 1 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241203 #1
[   29.790870] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.791291] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   29.792227] Call Trace:
[   29.792688]  <TASK>
[   29.793080]  dump_stack_lvl+0x73/0xb0
[   29.793500]  print_report+0xd1/0x640
[   29.793842]  ? __virt_addr_valid+0x1db/0x2d0
[   29.794550]  ? kasan_complete_mode_report_info+0x2a/0x200
[   29.795094]  kasan_report+0x102/0x140
[   29.795408]  ? kasan_atomics_helper+0x4ba4/0x5450
[   29.795770]  ? kasan_atomics_helper+0x4ba4/0x5450
[   29.796263]  __asan_report_store4_noabort+0x1b/0x30
[   29.796783]  kasan_atomics_helper+0x4ba4/0x5450
[   29.797258]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   29.797695]  ? ret_from_fork_asm+0x1a/0x30
[   29.798562]  ? ret_from_fork+0x41/0x80
[   29.798859]  ? kthread+0x257/0x310
[   29.799134]  kasan_atomics+0x1dd/0x310
[   29.800004]  ? __pfx_kasan_atomics+0x10/0x10
[   29.800567]  ? __pfx_read_tsc+0x10/0x10
[   29.801131]  ? ktime_get_ts64+0x86/0x230
[   29.801630]  kunit_try_run_case+0x1b3/0x490
[   29.801981]  ? __pfx_kunit_try_run_case+0x10/0x10
[   29.802504]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   29.802892]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   29.803490]  ? __kthread_parkme+0x82/0x160
[   29.803814]  ? preempt_count_sub+0x50/0x80
[   29.804258]  ? __pfx_kunit_try_run_case+0x10/0x10
[   29.804879]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   29.805678]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   29.806331]  kthread+0x257/0x310
[   29.806695]  ? __pfx_kthread+0x10/0x10
[   29.807380]  ret_from_fork+0x41/0x80
[   29.807947]  ? __pfx_kthread+0x10/0x10
[   29.808451]  ret_from_fork_asm+0x1a/0x30
[   29.809089]  </TASK>
[   29.809518] 
[   29.809935] Allocated by task 274:
[   29.810192]  kasan_save_stack+0x3d/0x60
[   29.810613]  kasan_save_track+0x18/0x40
[   29.810971]  kasan_save_alloc_info+0x3b/0x50
[   29.811838]  __kasan_kmalloc+0xb7/0xc0
[   29.812362]  __kmalloc_cache_noprof+0x184/0x410
[   29.813241]  kasan_atomics+0x96/0x310
[   29.813756]  kunit_try_run_case+0x1b3/0x490
[   29.814034]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   29.814880]  kthread+0x257/0x310
[   29.815161]  ret_from_fork+0x41/0x80
[   29.815932]  ret_from_fork_asm+0x1a/0x30
[   29.816292] 
[   29.816482] The buggy address belongs to the object at ffff888102a59b80
[   29.816482]  which belongs to the cache kmalloc-64 of size 64
[   29.817678] The buggy address is located 0 bytes to the right of
[   29.817678]  allocated 48-byte region [ffff888102a59b80, ffff888102a59bb0)
[   29.818921] 
[   29.819193] The buggy address belongs to the physical page:
[   29.819703] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a59
[   29.821129] flags: 0x200000000000000(node=0|zone=2)
[   29.821520] page_type: f5(slab)
[   29.821823] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   29.822644] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   29.823229] page dumped because: kasan: bad access detected
[   29.823403] 
[   29.823546] Memory state around the buggy address:
[   29.823837]  ffff888102a59a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.824461]  ffff888102a59b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.825157] >ffff888102a59b80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   29.825772]                                      ^
[   29.826438]  ffff888102a59c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.826974]  ffff888102a59c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.827550] ==================================================================
[   31.518780] ==================================================================
[   31.519620] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x18b2/0x5450
[   31.520260] Write of size 8 at addr ffff888102a59bb0 by task kunit_try_catch/274
[   31.520939] 
[   31.521216] CPU: 1 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241203 #1
[   31.522275] Tainted: [B]=BAD_PAGE, [N]=TEST
[   31.522818] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   31.523700] Call Trace:
[   31.523947]  <TASK>
[   31.524255]  dump_stack_lvl+0x73/0xb0
[   31.524829]  print_report+0xd1/0x640
[   31.525293]  ? __virt_addr_valid+0x1db/0x2d0
[   31.525883]  ? kasan_complete_mode_report_info+0x2a/0x200
[   31.526534]  kasan_report+0x102/0x140
[   31.527067]  ? kasan_atomics_helper+0x18b2/0x5450
[   31.527632]  ? kasan_atomics_helper+0x18b2/0x5450
[   31.528046]  kasan_check_range+0x10c/0x1c0
[   31.528609]  __kasan_check_write+0x18/0x20
[   31.528866]  kasan_atomics_helper+0x18b2/0x5450
[   31.529373]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   31.529875]  ? ret_from_fork_asm+0x1a/0x30
[   31.530367]  ? ret_from_fork+0x41/0x80
[   31.530746]  ? kthread+0x257/0x310
[   31.531187]  kasan_atomics+0x1dd/0x310
[   31.531677]  ? __pfx_kasan_atomics+0x10/0x10
[   31.532022]  ? __pfx_read_tsc+0x10/0x10
[   31.532492]  ? ktime_get_ts64+0x86/0x230
[   31.532913]  kunit_try_run_case+0x1b3/0x490
[   31.533353]  ? __pfx_kunit_try_run_case+0x10/0x10
[   31.533828]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   31.534231]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   31.534740]  ? __kthread_parkme+0x82/0x160
[   31.535129]  ? preempt_count_sub+0x50/0x80
[   31.535637]  ? __pfx_kunit_try_run_case+0x10/0x10
[   31.536003]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   31.536615]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   31.537075]  kthread+0x257/0x310
[   31.537337]  ? __pfx_kthread+0x10/0x10
[   31.537802]  ret_from_fork+0x41/0x80
[   31.538221]  ? __pfx_kthread+0x10/0x10
[   31.538733]  ret_from_fork_asm+0x1a/0x30
[   31.539201]  </TASK>
[   31.539488] 
[   31.539645] Allocated by task 274:
[   31.539869]  kasan_save_stack+0x3d/0x60
[   31.540189]  kasan_save_track+0x18/0x40
[   31.540696]  kasan_save_alloc_info+0x3b/0x50
[   31.541201]  __kasan_kmalloc+0xb7/0xc0
[   31.541629]  __kmalloc_cache_noprof+0x184/0x410
[   31.542132]  kasan_atomics+0x96/0x310
[   31.542563]  kunit_try_run_case+0x1b3/0x490
[   31.542927]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   31.543913]  kthread+0x257/0x310
[   31.544289]  ret_from_fork+0x41/0x80
[   31.545713]  ret_from_fork_asm+0x1a/0x30
[   31.546021] 
[   31.546284] The buggy address belongs to the object at ffff888102a59b80
[   31.546284]  which belongs to the cache kmalloc-64 of size 64
[   31.547700] The buggy address is located 0 bytes to the right of
[   31.547700]  allocated 48-byte region [ffff888102a59b80, ffff888102a59bb0)
[   31.549036] 
[   31.549314] The buggy address belongs to the physical page:
[   31.550259] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a59
[   31.551232] flags: 0x200000000000000(node=0|zone=2)
[   31.551615] page_type: f5(slab)
[   31.552088] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   31.553176] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   31.553618] page dumped because: kasan: bad access detected
[   31.554426] 
[   31.554628] Memory state around the buggy address:
[   31.554900]  ffff888102a59a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   31.555462]  ffff888102a59b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   31.556032] >ffff888102a59b80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   31.557040]                                      ^
[   31.557674]  ffff888102a59c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.558247]  ffff888102a59c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.559071] ==================================================================
[   30.428831] ==================================================================
[   30.430156] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xac8/0x5450
[   30.430929] Write of size 4 at addr ffff888102a59bb0 by task kunit_try_catch/274
[   30.431528] 
[   30.431734] CPU: 1 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241203 #1
[   30.432599] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.432977] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   30.433789] Call Trace:
[   30.434004]  <TASK>
[   30.434961]  dump_stack_lvl+0x73/0xb0
[   30.435237]  print_report+0xd1/0x640
[   30.435897]  ? __virt_addr_valid+0x1db/0x2d0
[   30.436472]  ? kasan_complete_mode_report_info+0x2a/0x200
[   30.437120]  kasan_report+0x102/0x140
[   30.437721]  ? kasan_atomics_helper+0xac8/0x5450
[   30.438222]  ? kasan_atomics_helper+0xac8/0x5450
[   30.438413]  kasan_check_range+0x10c/0x1c0
[   30.439036]  __kasan_check_write+0x18/0x20
[   30.439523]  kasan_atomics_helper+0xac8/0x5450
[   30.439937]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   30.440376]  ? ret_from_fork_asm+0x1a/0x30
[   30.440764]  ? ret_from_fork+0x41/0x80
[   30.441710]  ? kthread+0x257/0x310
[   30.441992]  kasan_atomics+0x1dd/0x310
[   30.442310]  ? __pfx_kasan_atomics+0x10/0x10
[   30.442923]  ? __pfx_read_tsc+0x10/0x10
[   30.443800]  ? ktime_get_ts64+0x86/0x230
[   30.444156]  kunit_try_run_case+0x1b3/0x490
[   30.444770]  ? __pfx_kunit_try_run_case+0x10/0x10
[   30.445176]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   30.445573]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   30.446377]  ? __kthread_parkme+0x82/0x160
[   30.447082]  ? preempt_count_sub+0x50/0x80
[   30.447739]  ? __pfx_kunit_try_run_case+0x10/0x10
[   30.448129]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   30.449265]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   30.449985]  kthread+0x257/0x310
[   30.450313]  ? __pfx_kthread+0x10/0x10
[   30.450821]  ret_from_fork+0x41/0x80
[   30.451216]  ? __pfx_kthread+0x10/0x10
[   30.452030]  ret_from_fork_asm+0x1a/0x30
[   30.452395]  </TASK>
[   30.452630] 
[   30.453064] Allocated by task 274:
[   30.453412]  kasan_save_stack+0x3d/0x60
[   30.454259]  kasan_save_track+0x18/0x40
[   30.454845]  kasan_save_alloc_info+0x3b/0x50
[   30.455486]  __kasan_kmalloc+0xb7/0xc0
[   30.456098]  __kmalloc_cache_noprof+0x184/0x410
[   30.456751]  kasan_atomics+0x96/0x310
[   30.457084]  kunit_try_run_case+0x1b3/0x490
[   30.457406]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   30.458423]  kthread+0x257/0x310
[   30.458786]  ret_from_fork+0x41/0x80
[   30.459129]  ret_from_fork_asm+0x1a/0x30
[   30.459521] 
[   30.459696] The buggy address belongs to the object at ffff888102a59b80
[   30.459696]  which belongs to the cache kmalloc-64 of size 64
[   30.460532] The buggy address is located 0 bytes to the right of
[   30.460532]  allocated 48-byte region [ffff888102a59b80, ffff888102a59bb0)
[   30.461558] 
[   30.461722] The buggy address belongs to the physical page:
[   30.462027] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a59
[   30.462908] flags: 0x200000000000000(node=0|zone=2)
[   30.463501] page_type: f5(slab)
[   30.463904] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   30.464772] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   30.465376] page dumped because: kasan: bad access detected
[   30.465713] 
[   30.465991] Memory state around the buggy address:
[   30.466537]  ffff888102a59a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   30.467216]  ffff888102a59b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   30.467867] >ffff888102a59b80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   30.468515]                                      ^
[   30.468976]  ffff888102a59c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.469567]  ffff888102a59c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.470249] ==================================================================
[   32.011381] ==================================================================
[   32.012851] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4f73/0x5450
[   32.013710] Read of size 8 at addr ffff888102a59bb0 by task kunit_try_catch/274
[   32.014216] 
[   32.014399] CPU: 1 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241203 #1
[   32.015071] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.015503] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   32.016229] Call Trace:
[   32.016583]  <TASK>
[   32.016820]  dump_stack_lvl+0x73/0xb0
[   32.017136]  print_report+0xd1/0x640
[   32.017408]  ? __virt_addr_valid+0x1db/0x2d0
[   32.017759]  ? kasan_complete_mode_report_info+0x2a/0x200
[   32.018114]  kasan_report+0x102/0x140
[   32.018548]  ? kasan_atomics_helper+0x4f73/0x5450
[   32.019019]  ? kasan_atomics_helper+0x4f73/0x5450
[   32.019555]  __asan_report_load8_noabort+0x18/0x20
[   32.020040]  kasan_atomics_helper+0x4f73/0x5450
[   32.020569]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   32.021036]  ? ret_from_fork_asm+0x1a/0x30
[   32.021517]  ? ret_from_fork+0x41/0x80
[   32.021922]  ? kthread+0x257/0x310
[   32.022309]  kasan_atomics+0x1dd/0x310
[   32.022766]  ? __pfx_kasan_atomics+0x10/0x10
[   32.023193]  ? __pfx_read_tsc+0x10/0x10
[   32.023620]  ? ktime_get_ts64+0x86/0x230
[   32.024036]  kunit_try_run_case+0x1b3/0x490
[   32.024386]  ? __pfx_kunit_try_run_case+0x10/0x10
[   32.024914]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   32.025341]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   32.025856]  ? __kthread_parkme+0x82/0x160
[   32.026285]  ? preempt_count_sub+0x50/0x80
[   32.026623]  ? __pfx_kunit_try_run_case+0x10/0x10
[   32.027102]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   32.027591]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   32.027982]  kthread+0x257/0x310
[   32.028371]  ? __pfx_kthread+0x10/0x10
[   32.028806]  ret_from_fork+0x41/0x80
[   32.029137]  ? __pfx_kthread+0x10/0x10
[   32.029405]  ret_from_fork_asm+0x1a/0x30
[   32.029744]  </TASK>
[   32.029998] 
[   32.030218] Allocated by task 274:
[   32.030589]  kasan_save_stack+0x3d/0x60
[   32.030987]  kasan_save_track+0x18/0x40
[   32.031400]  kasan_save_alloc_info+0x3b/0x50
[   32.031858]  __kasan_kmalloc+0xb7/0xc0
[   32.032228]  __kmalloc_cache_noprof+0x184/0x410
[   32.032669]  kasan_atomics+0x96/0x310
[   32.032956]  kunit_try_run_case+0x1b3/0x490
[   32.033400]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   32.033813]  kthread+0x257/0x310
[   32.034171]  ret_from_fork+0x41/0x80
[   32.034543]  ret_from_fork_asm+0x1a/0x30
[   32.034876] 
[   32.035030] The buggy address belongs to the object at ffff888102a59b80
[   32.035030]  which belongs to the cache kmalloc-64 of size 64
[   32.035637] The buggy address is located 0 bytes to the right of
[   32.035637]  allocated 48-byte region [ffff888102a59b80, ffff888102a59bb0)
[   32.036317] 
[   32.036567] The buggy address belongs to the physical page:
[   32.037075] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a59
[   32.037758] flags: 0x200000000000000(node=0|zone=2)
[   32.038237] page_type: f5(slab)
[   32.038590] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   32.039268] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   32.039940] page dumped because: kasan: bad access detected
[   32.040377] 
[   32.040626] Memory state around the buggy address:
[   32.040964]  ffff888102a59a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.041537]  ffff888102a59b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.042038] >ffff888102a59b80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   32.042411]                                      ^
[   32.042738]  ffff888102a59c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.043106]  ffff888102a59c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.043754] ==================================================================
[   30.472256] ==================================================================
[   30.472939] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xb6b/0x5450
[   30.474471] Write of size 4 at addr ffff888102a59bb0 by task kunit_try_catch/274
[   30.475037] 
[   30.475294] CPU: 1 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241203 #1
[   30.476393] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.476840] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   30.477494] Call Trace:
[   30.477864]  <TASK>
[   30.478212]  dump_stack_lvl+0x73/0xb0
[   30.478627]  print_report+0xd1/0x640
[   30.479089]  ? __virt_addr_valid+0x1db/0x2d0
[   30.479648]  ? kasan_complete_mode_report_info+0x2a/0x200
[   30.480225]  kasan_report+0x102/0x140
[   30.480717]  ? kasan_atomics_helper+0xb6b/0x5450
[   30.481237]  ? kasan_atomics_helper+0xb6b/0x5450
[   30.481782]  kasan_check_range+0x10c/0x1c0
[   30.482273]  __kasan_check_write+0x18/0x20
[   30.482760]  kasan_atomics_helper+0xb6b/0x5450
[   30.483306]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   30.483727]  ? ret_from_fork_asm+0x1a/0x30
[   30.484260]  ? ret_from_fork+0x41/0x80
[   30.484733]  ? kthread+0x257/0x310
[   30.485204]  kasan_atomics+0x1dd/0x310
[   30.485703]  ? __pfx_kasan_atomics+0x10/0x10
[   30.486212]  ? __pfx_read_tsc+0x10/0x10
[   30.486662]  ? ktime_get_ts64+0x86/0x230
[   30.487107]  kunit_try_run_case+0x1b3/0x490
[   30.487610]  ? __pfx_kunit_try_run_case+0x10/0x10
[   30.488141]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   30.488623]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   30.489189]  ? __kthread_parkme+0x82/0x160
[   30.489676]  ? preempt_count_sub+0x50/0x80
[   30.490130]  ? __pfx_kunit_try_run_case+0x10/0x10
[   30.490678]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   30.491242]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   30.491853]  kthread+0x257/0x310
[   30.492270]  ? __pfx_kthread+0x10/0x10
[   30.492736]  ret_from_fork+0x41/0x80
[   30.492999]  ? __pfx_kthread+0x10/0x10
[   30.493276]  ret_from_fork_asm+0x1a/0x30
[   30.493730]  </TASK>
[   30.494007] 
[   30.494329] Allocated by task 274:
[   30.494817]  kasan_save_stack+0x3d/0x60
[   30.495272]  kasan_save_track+0x18/0x40
[   30.495756]  kasan_save_alloc_info+0x3b/0x50
[   30.496212]  __kasan_kmalloc+0xb7/0xc0
[   30.496527]  __kmalloc_cache_noprof+0x184/0x410
[   30.496819]  kasan_atomics+0x96/0x310
[   30.497288]  kunit_try_run_case+0x1b3/0x490
[   30.497875]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   30.498541]  kthread+0x257/0x310
[   30.498929]  ret_from_fork+0x41/0x80
[   30.499385]  ret_from_fork_asm+0x1a/0x30
[   30.499833] 
[   30.500130] The buggy address belongs to the object at ffff888102a59b80
[   30.500130]  which belongs to the cache kmalloc-64 of size 64
[   30.501122] The buggy address is located 0 bytes to the right of
[   30.501122]  allocated 48-byte region [ffff888102a59b80, ffff888102a59bb0)
[   30.501747] 
[   30.502037] The buggy address belongs to the physical page:
[   30.502708] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a59
[   30.503485] flags: 0x200000000000000(node=0|zone=2)
[   30.504020] page_type: f5(slab)
[   30.504432] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   30.505190] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   30.505703] page dumped because: kasan: bad access detected
[   30.506265] 
[   30.506576] Memory state around the buggy address:
[   30.507018]  ffff888102a59a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   30.507677]  ffff888102a59b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   30.508217] >ffff888102a59b80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   30.508911]                                      ^
[   30.509336]  ffff888102a59c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.510010]  ffff888102a59c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.510621] ==================================================================
[   29.949451] ==================================================================
[   29.950138] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b56/0x5450
[   29.952086] Read of size 4 at addr ffff888102a59bb0 by task kunit_try_catch/274
[   29.952869] 
[   29.953128] CPU: 1 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241203 #1
[   29.954017] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.954367] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   29.954999] Call Trace:
[   29.955223]  <TASK>
[   29.955412]  dump_stack_lvl+0x73/0xb0
[   29.955864]  print_report+0xd1/0x640
[   29.956323]  ? __virt_addr_valid+0x1db/0x2d0
[   29.956796]  ? kasan_complete_mode_report_info+0x2a/0x200
[   29.957407]  kasan_report+0x102/0x140
[   29.957887]  ? kasan_atomics_helper+0x4b56/0x5450
[   29.958412]  ? kasan_atomics_helper+0x4b56/0x5450
[   29.958782]  __asan_report_load4_noabort+0x18/0x20
[   29.959301]  kasan_atomics_helper+0x4b56/0x5450
[   29.959687]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   29.960283]  ? ret_from_fork_asm+0x1a/0x30
[   29.960613]  ? ret_from_fork+0x41/0x80
[   29.961028]  ? kthread+0x257/0x310
[   29.961402]  kasan_atomics+0x1dd/0x310
[   29.961857]  ? __pfx_kasan_atomics+0x10/0x10
[   29.962217]  ? __pfx_read_tsc+0x10/0x10
[   29.962725]  ? ktime_get_ts64+0x86/0x230
[   29.963009]  kunit_try_run_case+0x1b3/0x490
[   29.963322]  ? __pfx_kunit_try_run_case+0x10/0x10
[   29.963617]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   29.963911]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   29.964379]  ? __kthread_parkme+0x82/0x160
[   29.964764]  ? preempt_count_sub+0x50/0x80
[   29.965214]  ? __pfx_kunit_try_run_case+0x10/0x10
[   29.965893]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   29.966482]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   29.967002]  kthread+0x257/0x310
[   29.967380]  ? __pfx_kthread+0x10/0x10
[   29.967830]  ret_from_fork+0x41/0x80
[   29.968271]  ? __pfx_kthread+0x10/0x10
[   29.968868]  ret_from_fork_asm+0x1a/0x30
[   29.969190]  </TASK>
[   29.969370] 
[   29.969593] Allocated by task 274:
[   29.969968]  kasan_save_stack+0x3d/0x60
[   29.970428]  kasan_save_track+0x18/0x40
[   29.970858]  kasan_save_alloc_info+0x3b/0x50
[   29.971200]  __kasan_kmalloc+0xb7/0xc0
[   29.971637]  __kmalloc_cache_noprof+0x184/0x410
[   29.972137]  kasan_atomics+0x96/0x310
[   29.972429]  kunit_try_run_case+0x1b3/0x490
[   29.972879]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   29.973266]  kthread+0x257/0x310
[   29.973737]  ret_from_fork+0x41/0x80
[   29.974080]  ret_from_fork_asm+0x1a/0x30
[   29.974437] 
[   29.974653] The buggy address belongs to the object at ffff888102a59b80
[   29.974653]  which belongs to the cache kmalloc-64 of size 64
[   29.975438] The buggy address is located 0 bytes to the right of
[   29.975438]  allocated 48-byte region [ffff888102a59b80, ffff888102a59bb0)
[   29.976254] 
[   29.976511] The buggy address belongs to the physical page:
[   29.976930] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a59
[   29.977605] flags: 0x200000000000000(node=0|zone=2)
[   29.978014] page_type: f5(slab)
[   29.978375] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   29.978857] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   29.979545] page dumped because: kasan: bad access detected
[   29.979881] 
[   29.980129] Memory state around the buggy address:
[   29.980555]  ffff888102a59a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.980992]  ffff888102a59b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.981372] >ffff888102a59b80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   29.981717]                                      ^
[   29.981989]  ffff888102a59c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.982729]  ffff888102a59c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.983349] ==================================================================
[   30.267619] ==================================================================
[   30.268129] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x861/0x5450
[   30.268654] Write of size 4 at addr ffff888102a59bb0 by task kunit_try_catch/274
[   30.269136] 
[   30.269391] CPU: 1 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241203 #1
[   30.270249] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.270770] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   30.271528] Call Trace:
[   30.271867]  <TASK>
[   30.272188]  dump_stack_lvl+0x73/0xb0
[   30.272685]  print_report+0xd1/0x640
[   30.273104]  ? __virt_addr_valid+0x1db/0x2d0
[   30.273622]  ? kasan_complete_mode_report_info+0x2a/0x200
[   30.274021]  kasan_report+0x102/0x140
[   30.274422]  ? kasan_atomics_helper+0x861/0x5450
[   30.274849]  ? kasan_atomics_helper+0x861/0x5450
[   30.275213]  kasan_check_range+0x10c/0x1c0
[   30.275504]  __kasan_check_write+0x18/0x20
[   30.275771]  kasan_atomics_helper+0x861/0x5450
[   30.276257]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   30.276851]  ? ret_from_fork_asm+0x1a/0x30
[   30.277298]  ? ret_from_fork+0x41/0x80
[   30.277738]  ? kthread+0x257/0x310
[   30.278141]  kasan_atomics+0x1dd/0x310
[   30.278611]  ? __pfx_kasan_atomics+0x10/0x10
[   30.279089]  ? __pfx_read_tsc+0x10/0x10
[   30.279391]  ? ktime_get_ts64+0x86/0x230
[   30.279804]  kunit_try_run_case+0x1b3/0x490
[   30.280259]  ? __pfx_kunit_try_run_case+0x10/0x10
[   30.280891]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   30.281415]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   30.281864]  ? __kthread_parkme+0x82/0x160
[   30.282330]  ? preempt_count_sub+0x50/0x80
[   30.282717]  ? __pfx_kunit_try_run_case+0x10/0x10
[   30.283232]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   30.283921]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   30.284321]  kthread+0x257/0x310
[   30.284720]  ? __pfx_kthread+0x10/0x10
[   30.285246]  ret_from_fork+0x41/0x80
[   30.285790]  ? __pfx_kthread+0x10/0x10
[   30.286166]  ret_from_fork_asm+0x1a/0x30
[   30.286557]  </TASK>
[   30.286832] 
[   30.287029] Allocated by task 274:
[   30.287395]  kasan_save_stack+0x3d/0x60
[   30.288005]  kasan_save_track+0x18/0x40
[   30.288425]  kasan_save_alloc_info+0x3b/0x50
[   30.288818]  __kasan_kmalloc+0xb7/0xc0
[   30.289172]  __kmalloc_cache_noprof+0x184/0x410
[   30.289679]  kasan_atomics+0x96/0x310
[   30.290093]  kunit_try_run_case+0x1b3/0x490
[   30.290517]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   30.290855]  kthread+0x257/0x310
[   30.291222]  ret_from_fork+0x41/0x80
[   30.291683]  ret_from_fork_asm+0x1a/0x30
[   30.292072] 
[   30.292229] The buggy address belongs to the object at ffff888102a59b80
[   30.292229]  which belongs to the cache kmalloc-64 of size 64
[   30.292879] The buggy address is located 0 bytes to the right of
[   30.292879]  allocated 48-byte region [ffff888102a59b80, ffff888102a59bb0)
[   30.294022] 
[   30.294285] The buggy address belongs to the physical page:
[   30.294771] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a59
[   30.295184] flags: 0x200000000000000(node=0|zone=2)
[   30.295590] page_type: f5(slab)
[   30.295951] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   30.296723] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   30.297399] page dumped because: kasan: bad access detected
[   30.297786] 
[   30.297935] Memory state around the buggy address:
[   30.298366]  ffff888102a59a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   30.299023]  ffff888102a59b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   30.299614] >ffff888102a59b80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   30.300231]                                      ^
[   30.300673]  ffff888102a59c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.301118]  ffff888102a59c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.301782] ==================================================================
[   30.066467] ==================================================================
[   30.067007] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x566/0x5450
[   30.067665] Write of size 4 at addr ffff888102a59bb0 by task kunit_try_catch/274
[   30.068167] 
[   30.068424] CPU: 1 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241203 #1
[   30.069189] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.069643] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   30.070193] Call Trace:
[   30.070553]  <TASK>
[   30.070860]  dump_stack_lvl+0x73/0xb0
[   30.071227]  print_report+0xd1/0x640
[   30.071672]  ? __virt_addr_valid+0x1db/0x2d0
[   30.071972]  ? kasan_complete_mode_report_info+0x2a/0x200
[   30.072319]  kasan_report+0x102/0x140
[   30.072794]  ? kasan_atomics_helper+0x566/0x5450
[   30.073282]  ? kasan_atomics_helper+0x566/0x5450
[   30.073795]  kasan_check_range+0x10c/0x1c0
[   30.074239]  __kasan_check_write+0x18/0x20
[   30.074716]  kasan_atomics_helper+0x566/0x5450
[   30.075182]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   30.075728]  ? ret_from_fork_asm+0x1a/0x30
[   30.076211]  ? ret_from_fork+0x41/0x80
[   30.076648]  ? kthread+0x257/0x310
[   30.077047]  kasan_atomics+0x1dd/0x310
[   30.077336]  ? __pfx_kasan_atomics+0x10/0x10
[   30.077830]  ? __pfx_read_tsc+0x10/0x10
[   30.078268]  ? ktime_get_ts64+0x86/0x230
[   30.078770]  kunit_try_run_case+0x1b3/0x490
[   30.079240]  ? __pfx_kunit_try_run_case+0x10/0x10
[   30.079682]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   30.080128]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   30.080659]  ? __kthread_parkme+0x82/0x160
[   30.080892]  ? preempt_count_sub+0x50/0x80
[   30.081292]  ? __pfx_kunit_try_run_case+0x10/0x10
[   30.081789]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   30.082225]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   30.082811]  kthread+0x257/0x310
[   30.083186]  ? __pfx_kthread+0x10/0x10
[   30.083559]  ret_from_fork+0x41/0x80
[   30.083988]  ? __pfx_kthread+0x10/0x10
[   30.084345]  ret_from_fork_asm+0x1a/0x30
[   30.084786]  </TASK>
[   30.085069] 
[   30.085302] Allocated by task 274:
[   30.085680]  kasan_save_stack+0x3d/0x60
[   30.086074]  kasan_save_track+0x18/0x40
[   30.086534]  kasan_save_alloc_info+0x3b/0x50
[   30.086879]  __kasan_kmalloc+0xb7/0xc0
[   30.087307]  __kmalloc_cache_noprof+0x184/0x410
[   30.087711]  kasan_atomics+0x96/0x310
[   30.088131]  kunit_try_run_case+0x1b3/0x490
[   30.088599]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   30.088952]  kthread+0x257/0x310
[   30.089203]  ret_from_fork+0x41/0x80
[   30.089496]  ret_from_fork_asm+0x1a/0x30
[   30.089758] 
[   30.089901] The buggy address belongs to the object at ffff888102a59b80
[   30.089901]  which belongs to the cache kmalloc-64 of size 64
[   30.090887] The buggy address is located 0 bytes to the right of
[   30.090887]  allocated 48-byte region [ffff888102a59b80, ffff888102a59bb0)
[   30.091951] 
[   30.092188] The buggy address belongs to the physical page:
[   30.092713] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a59
[   30.093360] flags: 0x200000000000000(node=0|zone=2)
[   30.093772] page_type: f5(slab)
[   30.094004] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   30.094699] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   30.095371] page dumped because: kasan: bad access detected
[   30.095791] 
[   30.095942] Memory state around the buggy address:
[   30.096340]  ffff888102a59a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   30.097016]  ffff888102a59b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   30.097613] >ffff888102a59b80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   30.097961]                                      ^
[   30.098399]  ffff888102a59c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.099086]  ffff888102a59c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.099753] ==================================================================
[   30.696438] ==================================================================
[   30.698491] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf11/0x5450
[   30.699165] Write of size 4 at addr ffff888102a59bb0 by task kunit_try_catch/274
[   30.700242] 
[   30.701197] CPU: 1 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241203 #1
[   30.702170] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.702662] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   30.703493] Call Trace:
[   30.703866]  <TASK>
[   30.704206]  dump_stack_lvl+0x73/0xb0
[   30.704710]  print_report+0xd1/0x640
[   30.705192]  ? __virt_addr_valid+0x1db/0x2d0
[   30.705741]  ? kasan_complete_mode_report_info+0x2a/0x200
[   30.706329]  kasan_report+0x102/0x140
[   30.706824]  ? kasan_atomics_helper+0xf11/0x5450
[   30.707362]  ? kasan_atomics_helper+0xf11/0x5450
[   30.707931]  kasan_check_range+0x10c/0x1c0
[   30.708388]  __kasan_check_write+0x18/0x20
[   30.708922]  kasan_atomics_helper+0xf11/0x5450
[   30.709388]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   30.709727]  ? ret_from_fork_asm+0x1a/0x30
[   30.710276]  ? ret_from_fork+0x41/0x80
[   30.710723]  ? kthread+0x257/0x310
[   30.711094]  kasan_atomics+0x1dd/0x310
[   30.711605]  ? __pfx_kasan_atomics+0x10/0x10
[   30.712136]  ? __pfx_read_tsc+0x10/0x10
[   30.712572]  ? ktime_get_ts64+0x86/0x230
[   30.712858]  kunit_try_run_case+0x1b3/0x490
[   30.713291]  ? __pfx_kunit_try_run_case+0x10/0x10
[   30.713948]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   30.714520]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   30.714934]  ? __kthread_parkme+0x82/0x160
[   30.715466]  ? preempt_count_sub+0x50/0x80
[   30.715970]  ? __pfx_kunit_try_run_case+0x10/0x10
[   30.716360]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   30.716903]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   30.717580]  kthread+0x257/0x310
[   30.717964]  ? __pfx_kthread+0x10/0x10
[   30.718469]  ret_from_fork+0x41/0x80
[   30.718773]  ? __pfx_kthread+0x10/0x10
[   30.719041]  ret_from_fork_asm+0x1a/0x30
[   30.719517]  </TASK>
[   30.719793] 
[   30.720005] Allocated by task 274:
[   30.720525]  kasan_save_stack+0x3d/0x60
[   30.720978]  kasan_save_track+0x18/0x40
[   30.721388]  kasan_save_alloc_info+0x3b/0x50
[   30.721713]  __kasan_kmalloc+0xb7/0xc0
[   30.721959]  __kmalloc_cache_noprof+0x184/0x410
[   30.722557]  kasan_atomics+0x96/0x310
[   30.723142]  kunit_try_run_case+0x1b3/0x490
[   30.723713]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   30.724230]  kthread+0x257/0x310
[   30.724562]  ret_from_fork+0x41/0x80
[   30.724913]  ret_from_fork_asm+0x1a/0x30
[   30.725397] 
[   30.725669] The buggy address belongs to the object at ffff888102a59b80
[   30.725669]  which belongs to the cache kmalloc-64 of size 64
[   30.726608] The buggy address is located 0 bytes to the right of
[   30.726608]  allocated 48-byte region [ffff888102a59b80, ffff888102a59bb0)
[   30.727581] 
[   30.727824] The buggy address belongs to the physical page:
[   30.728145] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a59
[   30.728875] flags: 0x200000000000000(node=0|zone=2)
[   30.729366] page_type: f5(slab)
[   30.729797] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   30.730345] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   30.731027] page dumped because: kasan: bad access detected
[   30.731615] 
[   30.731838] Memory state around the buggy address:
[   30.732270]  ffff888102a59a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   30.732870]  ffff888102a59b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   30.733546] >ffff888102a59b80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   30.734082]                                      ^
[   30.734628]  ffff888102a59c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.735159]  ffff888102a59c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.735721] ==================================================================
[   30.661313] ==================================================================
[   30.662012] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xe79/0x5450
[   30.662762] Write of size 4 at addr ffff888102a59bb0 by task kunit_try_catch/274
[   30.663395] 
[   30.663669] CPU: 1 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241203 #1
[   30.664590] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.664867] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   30.665316] Call Trace:
[   30.665572]  <TASK>
[   30.665771]  dump_stack_lvl+0x73/0xb0
[   30.666257]  print_report+0xd1/0x640
[   30.666703]  ? __virt_addr_valid+0x1db/0x2d0
[   30.667173]  ? kasan_complete_mode_report_info+0x2a/0x200
[   30.667765]  kasan_report+0x102/0x140
[   30.668208]  ? kasan_atomics_helper+0xe79/0x5450
[   30.668749]  ? kasan_atomics_helper+0xe79/0x5450
[   30.669237]  kasan_check_range+0x10c/0x1c0
[   30.669745]  __kasan_check_write+0x18/0x20
[   30.670189]  kasan_atomics_helper+0xe79/0x5450
[   30.670602]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   30.671027]  ? ret_from_fork_asm+0x1a/0x30
[   30.671595]  ? ret_from_fork+0x41/0x80
[   30.671928]  ? kthread+0x257/0x310
[   30.672209]  kasan_atomics+0x1dd/0x310
[   30.672615]  ? __pfx_kasan_atomics+0x10/0x10
[   30.673071]  ? __pfx_read_tsc+0x10/0x10
[   30.673538]  ? ktime_get_ts64+0x86/0x230
[   30.673968]  kunit_try_run_case+0x1b3/0x490
[   30.674431]  ? __pfx_kunit_try_run_case+0x10/0x10
[   30.674787]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   30.675149]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   30.675684]  ? __kthread_parkme+0x82/0x160
[   30.676131]  ? preempt_count_sub+0x50/0x80
[   30.676641]  ? __pfx_kunit_try_run_case+0x10/0x10
[   30.677121]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   30.677584]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   30.678143]  kthread+0x257/0x310
[   30.678557]  ? __pfx_kthread+0x10/0x10
[   30.678943]  ret_from_fork+0x41/0x80
[   30.679222]  ? __pfx_kthread+0x10/0x10
[   30.679526]  ret_from_fork_asm+0x1a/0x30
[   30.679817]  </TASK>
[   30.680005] 
[   30.680173] Allocated by task 274:
[   30.680408]  kasan_save_stack+0x3d/0x60
[   30.680730]  kasan_save_track+0x18/0x40
[   30.681100]  kasan_save_alloc_info+0x3b/0x50
[   30.681596]  __kasan_kmalloc+0xb7/0xc0
[   30.681991]  __kmalloc_cache_noprof+0x184/0x410
[   30.682488]  kasan_atomics+0x96/0x310
[   30.682879]  kunit_try_run_case+0x1b3/0x490
[   30.683290]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   30.683833]  kthread+0x257/0x310
[   30.684234]  ret_from_fork+0x41/0x80
[   30.684668]  ret_from_fork_asm+0x1a/0x30
[   30.685015] 
[   30.685187] The buggy address belongs to the object at ffff888102a59b80
[   30.685187]  which belongs to the cache kmalloc-64 of size 64
[   30.685771] The buggy address is located 0 bytes to the right of
[   30.685771]  allocated 48-byte region [ffff888102a59b80, ffff888102a59bb0)
[   30.686827] 
[   30.687064] The buggy address belongs to the physical page:
[   30.687601] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a59
[   30.688280] flags: 0x200000000000000(node=0|zone=2)
[   30.688786] page_type: f5(slab)
[   30.689023] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   30.689423] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   30.690027] page dumped because: kasan: bad access detected
[   30.690603] 
[   30.690851] Memory state around the buggy address:
[   30.691271]  ffff888102a59a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   30.691830]  ffff888102a59b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   30.692333] >ffff888102a59b80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   30.694039]                                      ^
[   30.694351]  ffff888102a59c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.694710]  ffff888102a59c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.695074] ==================================================================
[   31.276856] ==================================================================
[   31.277488] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x151e/0x5450
[   31.278593] Write of size 8 at addr ffff888102a59bb0 by task kunit_try_catch/274
[   31.279772] 
[   31.279980] CPU: 1 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241203 #1
[   31.280733] Tainted: [B]=BAD_PAGE, [N]=TEST
[   31.281065] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   31.282046] Call Trace:
[   31.282268]  <TASK>
[   31.282885]  dump_stack_lvl+0x73/0xb0
[   31.283242]  print_report+0xd1/0x640
[   31.284081]  ? __virt_addr_valid+0x1db/0x2d0
[   31.284723]  ? kasan_complete_mode_report_info+0x2a/0x200
[   31.285048]  kasan_report+0x102/0x140
[   31.286076]  ? kasan_atomics_helper+0x151e/0x5450
[   31.286432]  ? kasan_atomics_helper+0x151e/0x5450
[   31.287175]  kasan_check_range+0x10c/0x1c0
[   31.287825]  __kasan_check_write+0x18/0x20
[   31.288167]  kasan_atomics_helper+0x151e/0x5450
[   31.288928]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   31.289330]  ? ret_from_fork_asm+0x1a/0x30
[   31.290134]  ? ret_from_fork+0x41/0x80
[   31.290443]  ? kthread+0x257/0x310
[   31.291023]  kasan_atomics+0x1dd/0x310
[   31.291638]  ? __pfx_kasan_atomics+0x10/0x10
[   31.291954]  ? __pfx_read_tsc+0x10/0x10
[   31.292355]  ? ktime_get_ts64+0x86/0x230
[   31.293267]  kunit_try_run_case+0x1b3/0x490
[   31.293621]  ? __pfx_kunit_try_run_case+0x10/0x10
[   31.294208]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   31.294675]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   31.295069]  ? __kthread_parkme+0x82/0x160
[   31.295427]  ? preempt_count_sub+0x50/0x80
[   31.296430]  ? __pfx_kunit_try_run_case+0x10/0x10
[   31.296838]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   31.297463]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   31.298189]  kthread+0x257/0x310
[   31.299113]  ? __pfx_kthread+0x10/0x10
[   31.299443]  ret_from_fork+0x41/0x80
[   31.299944]  ? __pfx_kthread+0x10/0x10
[   31.300435]  ret_from_fork_asm+0x1a/0x30
[   31.301203]  </TASK>
[   31.301521] 
[   31.301718] Allocated by task 274:
[   31.301975]  kasan_save_stack+0x3d/0x60
[   31.302312]  kasan_save_track+0x18/0x40
[   31.303429]  kasan_save_alloc_info+0x3b/0x50
[   31.303807]  __kasan_kmalloc+0xb7/0xc0
[   31.304487]  __kmalloc_cache_noprof+0x184/0x410
[   31.304811]  kasan_atomics+0x96/0x310
[   31.305040]  kunit_try_run_case+0x1b3/0x490
[   31.305403]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   31.306536]  kthread+0x257/0x310
[   31.306854]  ret_from_fork+0x41/0x80
[   31.307116]  ret_from_fork_asm+0x1a/0x30
[   31.307890] 
[   31.308121] The buggy address belongs to the object at ffff888102a59b80
[   31.308121]  which belongs to the cache kmalloc-64 of size 64
[   31.308923] The buggy address is located 0 bytes to the right of
[   31.308923]  allocated 48-byte region [ffff888102a59b80, ffff888102a59bb0)
[   31.309949] 
[   31.310824] The buggy address belongs to the physical page:
[   31.311154] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a59
[   31.312117] flags: 0x200000000000000(node=0|zone=2)
[   31.312696] page_type: f5(slab)
[   31.313048] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   31.313941] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   31.314642] page dumped because: kasan: bad access detected
[   31.315273] 
[   31.315816] Memory state around the buggy address:
[   31.316135]  ffff888102a59a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   31.317157]  ffff888102a59b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   31.317614] >ffff888102a59b80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   31.318535]                                      ^
[   31.318961]  ffff888102a59c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.319460]  ffff888102a59c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.320605] ==================================================================
[   31.860756] ==================================================================
[   31.861271] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1d7b/0x5450
[   31.862013] Write of size 8 at addr ffff888102a59bb0 by task kunit_try_catch/274
[   31.862432] 
[   31.862610] CPU: 1 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241203 #1
[   31.863573] Tainted: [B]=BAD_PAGE, [N]=TEST
[   31.863971] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   31.864789] Call Trace:
[   31.865012]  <TASK>
[   31.865362]  dump_stack_lvl+0x73/0xb0
[   31.865802]  print_report+0xd1/0x640
[   31.866265]  ? __virt_addr_valid+0x1db/0x2d0
[   31.866961]  ? kasan_complete_mode_report_info+0x2a/0x200
[   31.867386]  kasan_report+0x102/0x140
[   31.867830]  ? kasan_atomics_helper+0x1d7b/0x5450
[   31.868441]  ? kasan_atomics_helper+0x1d7b/0x5450
[   31.868950]  kasan_check_range+0x10c/0x1c0
[   31.869272]  __kasan_check_write+0x18/0x20
[   31.869882]  kasan_atomics_helper+0x1d7b/0x5450
[   31.870317]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   31.871030]  ? ret_from_fork_asm+0x1a/0x30
[   31.871446]  ? ret_from_fork+0x41/0x80
[   31.871892]  ? kthread+0x257/0x310
[   31.872184]  kasan_atomics+0x1dd/0x310
[   31.872467]  ? __pfx_kasan_atomics+0x10/0x10
[   31.872865]  ? __pfx_read_tsc+0x10/0x10
[   31.873367]  ? ktime_get_ts64+0x86/0x230
[   31.873798]  kunit_try_run_case+0x1b3/0x490
[   31.874262]  ? __pfx_kunit_try_run_case+0x10/0x10
[   31.874810]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   31.875378]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   31.875946]  ? __kthread_parkme+0x82/0x160
[   31.876373]  ? preempt_count_sub+0x50/0x80
[   31.876967]  ? __pfx_kunit_try_run_case+0x10/0x10
[   31.877431]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   31.878086]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   31.878580]  kthread+0x257/0x310
[   31.878956]  ? __pfx_kthread+0x10/0x10
[   31.879243]  ret_from_fork+0x41/0x80
[   31.879500]  ? __pfx_kthread+0x10/0x10
[   31.879930]  ret_from_fork_asm+0x1a/0x30
[   31.880539]  </TASK>
[   31.880816] 
[   31.881025] Allocated by task 274:
[   31.881391]  kasan_save_stack+0x3d/0x60
[   31.881891]  kasan_save_track+0x18/0x40
[   31.882270]  kasan_save_alloc_info+0x3b/0x50
[   31.882959]  __kasan_kmalloc+0xb7/0xc0
[   31.883241]  __kmalloc_cache_noprof+0x184/0x410
[   31.883528]  kasan_atomics+0x96/0x310
[   31.883776]  kunit_try_run_case+0x1b3/0x490
[   31.884272]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   31.884873]  kthread+0x257/0x310
[   31.885375]  ret_from_fork+0x41/0x80
[   31.885905]  ret_from_fork_asm+0x1a/0x30
[   31.886341] 
[   31.886695] The buggy address belongs to the object at ffff888102a59b80
[   31.886695]  which belongs to the cache kmalloc-64 of size 64
[   31.887611] The buggy address is located 0 bytes to the right of
[   31.887611]  allocated 48-byte region [ffff888102a59b80, ffff888102a59bb0)
[   31.888288] 
[   31.888458] The buggy address belongs to the physical page:
[   31.888944] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a59
[   31.889909] flags: 0x200000000000000(node=0|zone=2)
[   31.892491] page_type: f5(slab)
[   31.893036] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   31.893508] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   31.893876] page dumped because: kasan: bad access detected
[   31.895023] 
[   31.895244] Memory state around the buggy address:
[   31.895818]  ffff888102a59a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   31.896490]  ffff888102a59b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   31.897114] >ffff888102a59b80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   31.897872]                                      ^
[   31.898333]  ffff888102a59c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.898933]  ffff888102a59c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.899347] ==================================================================
[   31.976579] ==================================================================
[   31.977177] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1f44/0x5450
[   31.977847] Write of size 8 at addr ffff888102a59bb0 by task kunit_try_catch/274
[   31.978331] 
[   31.978622] CPU: 1 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241203 #1
[   31.979524] Tainted: [B]=BAD_PAGE, [N]=TEST
[   31.979915] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   31.980584] Call Trace:
[   31.980791]  <TASK>
[   31.981070]  dump_stack_lvl+0x73/0xb0
[   31.981596]  print_report+0xd1/0x640
[   31.982034]  ? __virt_addr_valid+0x1db/0x2d0
[   31.982572]  ? kasan_complete_mode_report_info+0x2a/0x200
[   31.983099]  kasan_report+0x102/0x140
[   31.983424]  ? kasan_atomics_helper+0x1f44/0x5450
[   31.983906]  ? kasan_atomics_helper+0x1f44/0x5450
[   31.984468]  kasan_check_range+0x10c/0x1c0
[   31.984928]  __kasan_check_write+0x18/0x20
[   31.985373]  kasan_atomics_helper+0x1f44/0x5450
[   31.985903]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   31.986334]  ? ret_from_fork_asm+0x1a/0x30
[   31.986811]  ? ret_from_fork+0x41/0x80
[   31.987206]  ? kthread+0x257/0x310
[   31.987597]  kasan_atomics+0x1dd/0x310
[   31.988029]  ? __pfx_kasan_atomics+0x10/0x10
[   31.988483]  ? __pfx_read_tsc+0x10/0x10
[   31.988939]  ? ktime_get_ts64+0x86/0x230
[   31.989242]  kunit_try_run_case+0x1b3/0x490
[   31.989758]  ? __pfx_kunit_try_run_case+0x10/0x10
[   31.990267]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   31.990697]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   31.991137]  ? __kthread_parkme+0x82/0x160
[   31.991679]  ? preempt_count_sub+0x50/0x80
[   31.992156]  ? __pfx_kunit_try_run_case+0x10/0x10
[   31.992625]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   31.993188]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   31.993701]  kthread+0x257/0x310
[   31.994091]  ? __pfx_kthread+0x10/0x10
[   31.994489]  ret_from_fork+0x41/0x80
[   31.994836]  ? __pfx_kthread+0x10/0x10
[   31.995120]  ret_from_fork_asm+0x1a/0x30
[   31.995419]  </TASK>
[   31.995656] 
[   31.995808] Allocated by task 274:
[   31.996032]  kasan_save_stack+0x3d/0x60
[   31.996509]  kasan_save_track+0x18/0x40
[   31.996914]  kasan_save_alloc_info+0x3b/0x50
[   31.997363]  __kasan_kmalloc+0xb7/0xc0
[   31.997769]  __kmalloc_cache_noprof+0x184/0x410
[   31.998234]  kasan_atomics+0x96/0x310
[   31.998656]  kunit_try_run_case+0x1b3/0x490
[   31.999076]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   31.999601]  kthread+0x257/0x310
[   31.999960]  ret_from_fork+0x41/0x80
[   32.000357]  ret_from_fork_asm+0x1a/0x30
[   32.000815] 
[   32.001019] The buggy address belongs to the object at ffff888102a59b80
[   32.001019]  which belongs to the cache kmalloc-64 of size 64
[   32.002001] The buggy address is located 0 bytes to the right of
[   32.002001]  allocated 48-byte region [ffff888102a59b80, ffff888102a59bb0)
[   32.002870] 
[   32.003022] The buggy address belongs to the physical page:
[   32.003374] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a59
[   32.004076] flags: 0x200000000000000(node=0|zone=2)
[   32.004577] page_type: f5(slab)
[   32.004981] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   32.005408] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   32.005825] page dumped because: kasan: bad access detected
[   32.006154] 
[   32.006367] Memory state around the buggy address:
[   32.006852]  ffff888102a59a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.007510]  ffff888102a59b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.008137] >ffff888102a59b80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   32.008770]                                      ^
[   32.009181]  ffff888102a59c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.009747]  ffff888102a59c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.010118] ==================================================================
[   31.939650] ==================================================================
[   31.940235] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1eab/0x5450
[   31.940792] Write of size 8 at addr ffff888102a59bb0 by task kunit_try_catch/274
[   31.941486] 
[   31.941736] CPU: 1 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241203 #1
[   31.942503] Tainted: [B]=BAD_PAGE, [N]=TEST
[   31.942906] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   31.943612] Call Trace:
[   31.943921]  <TASK>
[   31.944214]  dump_stack_lvl+0x73/0xb0
[   31.944767]  print_report+0xd1/0x640
[   31.945107]  ? __virt_addr_valid+0x1db/0x2d0
[   31.945615]  ? kasan_complete_mode_report_info+0x2a/0x200
[   31.946121]  kasan_report+0x102/0x140
[   31.946601]  ? kasan_atomics_helper+0x1eab/0x5450
[   31.947088]  ? kasan_atomics_helper+0x1eab/0x5450
[   31.947586]  kasan_check_range+0x10c/0x1c0
[   31.948050]  __kasan_check_write+0x18/0x20
[   31.948557]  kasan_atomics_helper+0x1eab/0x5450
[   31.949015]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   31.949387]  ? ret_from_fork_asm+0x1a/0x30
[   31.949836]  ? ret_from_fork+0x41/0x80
[   31.950242]  ? kthread+0x257/0x310
[   31.950628]  kasan_atomics+0x1dd/0x310
[   31.951038]  ? __pfx_kasan_atomics+0x10/0x10
[   31.951624]  ? __pfx_read_tsc+0x10/0x10
[   31.951983]  ? ktime_get_ts64+0x86/0x230
[   31.952284]  kunit_try_run_case+0x1b3/0x490
[   31.952796]  ? __pfx_kunit_try_run_case+0x10/0x10
[   31.953337]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   31.953877]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   31.954419]  ? __kthread_parkme+0x82/0x160
[   31.954855]  ? preempt_count_sub+0x50/0x80
[   31.955330]  ? __pfx_kunit_try_run_case+0x10/0x10
[   31.955866]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   31.956356]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   31.956925]  kthread+0x257/0x310
[   31.957335]  ? __pfx_kthread+0x10/0x10
[   31.957801]  ret_from_fork+0x41/0x80
[   31.958199]  ? __pfx_kthread+0x10/0x10
[   31.958533]  ret_from_fork_asm+0x1a/0x30
[   31.958959]  </TASK>
[   31.959246] 
[   31.959524] Allocated by task 274:
[   31.959902]  kasan_save_stack+0x3d/0x60
[   31.960269]  kasan_save_track+0x18/0x40
[   31.960648]  kasan_save_alloc_info+0x3b/0x50
[   31.961006]  __kasan_kmalloc+0xb7/0xc0
[   31.961380]  __kmalloc_cache_noprof+0x184/0x410
[   31.961874]  kasan_atomics+0x96/0x310
[   31.962282]  kunit_try_run_case+0x1b3/0x490
[   31.962752]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   31.963270]  kthread+0x257/0x310
[   31.963664]  ret_from_fork+0x41/0x80
[   31.964047]  ret_from_fork_asm+0x1a/0x30
[   31.964542] 
[   31.964846] The buggy address belongs to the object at ffff888102a59b80
[   31.964846]  which belongs to the cache kmalloc-64 of size 64
[   31.965835] The buggy address is located 0 bytes to the right of
[   31.965835]  allocated 48-byte region [ffff888102a59b80, ffff888102a59bb0)
[   31.966698] 
[   31.966859] The buggy address belongs to the physical page:
[   31.967384] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a59
[   31.968101] flags: 0x200000000000000(node=0|zone=2)
[   31.968522] page_type: f5(slab)
[   31.968843] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   31.969509] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   31.970149] page dumped because: kasan: bad access detected
[   31.970679] 
[   31.970898] Memory state around the buggy address:
[   31.971334]  ffff888102a59a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   31.972006]  ffff888102a59b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   31.972684] >ffff888102a59b80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   31.973315]                                      ^
[   31.973708]  ffff888102a59c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.974321]  ffff888102a59c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.974993] ==================================================================
[   30.971654] ==================================================================
[   30.972748] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1218/0x5450
[   30.973228] Write of size 4 at addr ffff888102a59bb0 by task kunit_try_catch/274
[   30.973725] 
[   30.973968] CPU: 1 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241203 #1
[   30.974577] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.974896] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   30.975503] Call Trace:
[   30.975806]  <TASK>
[   30.976088]  dump_stack_lvl+0x73/0xb0
[   30.976471]  print_report+0xd1/0x640
[   30.976777]  ? __virt_addr_valid+0x1db/0x2d0
[   30.977223]  ? kasan_complete_mode_report_info+0x2a/0x200
[   30.977763]  kasan_report+0x102/0x140
[   30.978168]  ? kasan_atomics_helper+0x1218/0x5450
[   30.978519]  ? kasan_atomics_helper+0x1218/0x5450
[   30.978999]  kasan_check_range+0x10c/0x1c0
[   30.979363]  __kasan_check_write+0x18/0x20
[   30.979744]  kasan_atomics_helper+0x1218/0x5450
[   30.980203]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   30.980627]  ? ret_from_fork_asm+0x1a/0x30
[   30.981072]  ? ret_from_fork+0x41/0x80
[   30.981475]  ? kthread+0x257/0x310
[   30.981776]  kasan_atomics+0x1dd/0x310
[   30.982190]  ? __pfx_kasan_atomics+0x10/0x10
[   30.982635]  ? __pfx_read_tsc+0x10/0x10
[   30.982965]  ? ktime_get_ts64+0x86/0x230
[   30.983329]  kunit_try_run_case+0x1b3/0x490
[   30.983806]  ? __pfx_kunit_try_run_case+0x10/0x10
[   30.984164]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   30.984576]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   30.984893]  ? __kthread_parkme+0x82/0x160
[   30.985674]  ? preempt_count_sub+0x50/0x80
[   30.986122]  ? __pfx_kunit_try_run_case+0x10/0x10
[   30.986898]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   30.987481]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   30.987990]  kthread+0x257/0x310
[   30.988371]  ? __pfx_kthread+0x10/0x10
[   30.988771]  ret_from_fork+0x41/0x80
[   30.989214]  ? __pfx_kthread+0x10/0x10
[   30.989644]  ret_from_fork_asm+0x1a/0x30
[   30.989985]  </TASK>
[   30.990268] 
[   30.990516] Allocated by task 274:
[   30.990791]  kasan_save_stack+0x3d/0x60
[   30.991194]  kasan_save_track+0x18/0x40
[   30.991561]  kasan_save_alloc_info+0x3b/0x50
[   30.991986]  __kasan_kmalloc+0xb7/0xc0
[   30.992269]  __kmalloc_cache_noprof+0x184/0x410
[   30.992765]  kasan_atomics+0x96/0x310
[   30.993043]  kunit_try_run_case+0x1b3/0x490
[   30.993335]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   30.993689]  kthread+0x257/0x310
[   30.993929]  ret_from_fork+0x41/0x80
[   30.994336]  ret_from_fork_asm+0x1a/0x30
[   30.994744] 
[   30.994956] The buggy address belongs to the object at ffff888102a59b80
[   30.994956]  which belongs to the cache kmalloc-64 of size 64
[   30.995941] The buggy address is located 0 bytes to the right of
[   30.995941]  allocated 48-byte region [ffff888102a59b80, ffff888102a59bb0)
[   30.996990] 
[   30.997216] The buggy address belongs to the physical page:
[   30.997623] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a59
[   30.998182] flags: 0x200000000000000(node=0|zone=2)
[   30.998536] page_type: f5(slab)
[   30.998773] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   30.999216] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   30.999889] page dumped because: kasan: bad access detected
[   31.000384] 
[   31.000639] Memory state around the buggy address:
[   31.001066]  ffff888102a59a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   31.001698]  ffff888102a59b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   31.002301] >ffff888102a59b80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   31.002938]                                      ^
[   31.003374]  ffff888102a59c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.003849]  ffff888102a59c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.004224] ==================================================================
[   30.230412] ==================================================================
[   30.230930] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x7c8/0x5450
[   30.231672] Write of size 4 at addr ffff888102a59bb0 by task kunit_try_catch/274
[   30.232395] 
[   30.232982] CPU: 1 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241203 #1
[   30.233641] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.234285] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   30.234911] Call Trace:
[   30.235473]  <TASK>
[   30.235753]  dump_stack_lvl+0x73/0xb0
[   30.236173]  print_report+0xd1/0x640
[   30.236616]  ? __virt_addr_valid+0x1db/0x2d0
[   30.236997]  ? kasan_complete_mode_report_info+0x2a/0x200
[   30.237540]  kasan_report+0x102/0x140
[   30.237862]  ? kasan_atomics_helper+0x7c8/0x5450
[   30.238367]  ? kasan_atomics_helper+0x7c8/0x5450
[   30.238767]  kasan_check_range+0x10c/0x1c0
[   30.239246]  __kasan_check_write+0x18/0x20
[   30.239541]  kasan_atomics_helper+0x7c8/0x5450
[   30.240166]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   30.240644]  ? ret_from_fork_asm+0x1a/0x30
[   30.241331]  ? ret_from_fork+0x41/0x80
[   30.241633]  ? kthread+0x257/0x310
[   30.241904]  kasan_atomics+0x1dd/0x310
[   30.242456]  ? __pfx_kasan_atomics+0x10/0x10
[   30.243035]  ? __pfx_read_tsc+0x10/0x10
[   30.243459]  ? ktime_get_ts64+0x86/0x230
[   30.243837]  kunit_try_run_case+0x1b3/0x490
[   30.244295]  ? __pfx_kunit_try_run_case+0x10/0x10
[   30.244722]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   30.245386]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   30.245772]  ? __kthread_parkme+0x82/0x160
[   30.246070]  ? preempt_count_sub+0x50/0x80
[   30.246594]  ? __pfx_kunit_try_run_case+0x10/0x10
[   30.247110]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   30.247782]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   30.248260]  kthread+0x257/0x310
[   30.248584]  ? __pfx_kthread+0x10/0x10
[   30.249012]  ret_from_fork+0x41/0x80
[   30.249456]  ? __pfx_kthread+0x10/0x10
[   30.249862]  ret_from_fork_asm+0x1a/0x30
[   30.250282]  </TASK>
[   30.250473] 
[   30.250643] Allocated by task 274:
[   30.251217]  kasan_save_stack+0x3d/0x60
[   30.251671]  kasan_save_track+0x18/0x40
[   30.252083]  kasan_save_alloc_info+0x3b/0x50
[   30.252500]  __kasan_kmalloc+0xb7/0xc0
[   30.252909]  __kmalloc_cache_noprof+0x184/0x410
[   30.253286]  kasan_atomics+0x96/0x310
[   30.253770]  kunit_try_run_case+0x1b3/0x490
[   30.254116]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   30.254522]  kthread+0x257/0x310
[   30.254984]  ret_from_fork+0x41/0x80
[   30.255385]  ret_from_fork_asm+0x1a/0x30
[   30.255716] 
[   30.255922] The buggy address belongs to the object at ffff888102a59b80
[   30.255922]  which belongs to the cache kmalloc-64 of size 64
[   30.257176] The buggy address is located 0 bytes to the right of
[   30.257176]  allocated 48-byte region [ffff888102a59b80, ffff888102a59bb0)
[   30.258381] 
[   30.258627] The buggy address belongs to the physical page:
[   30.258981] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a59
[   30.259609] flags: 0x200000000000000(node=0|zone=2)
[   30.259910] page_type: f5(slab)
[   30.260229] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   30.260962] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   30.261675] page dumped because: kasan: bad access detected
[   30.262151] 
[   30.262361] Memory state around the buggy address:
[   30.262701]  ffff888102a59a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   30.263267]  ffff888102a59b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   30.264161] >ffff888102a59b80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   30.264749]                                      ^
[   30.265036]  ffff888102a59c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.265620]  ffff888102a59c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.266204] ==================================================================
[   32.275912] ==================================================================
[   32.276817] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x224d/0x5450
[   32.277578] Write of size 8 at addr ffff888102a59bb0 by task kunit_try_catch/274
[   32.278517] 
[   32.278785] CPU: 1 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241203 #1
[   32.279914] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.280430] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   32.281432] Call Trace:
[   32.281861]  <TASK>
[   32.282245]  dump_stack_lvl+0x73/0xb0
[   32.282813]  print_report+0xd1/0x640
[   32.283324]  ? __virt_addr_valid+0x1db/0x2d0
[   32.283989]  ? kasan_complete_mode_report_info+0x2a/0x200
[   32.284592]  kasan_report+0x102/0x140
[   32.285192]  ? kasan_atomics_helper+0x224d/0x5450
[   32.285382]  ? kasan_atomics_helper+0x224d/0x5450
[   32.285841]  kasan_check_range+0x10c/0x1c0
[   32.286160]  __kasan_check_write+0x18/0x20
[   32.286602]  kasan_atomics_helper+0x224d/0x5450
[   32.287030]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   32.287357]  ? ret_from_fork_asm+0x1a/0x30
[   32.287761]  ? ret_from_fork+0x41/0x80
[   32.288198]  ? kthread+0x257/0x310
[   32.288614]  kasan_atomics+0x1dd/0x310
[   32.288961]  ? __pfx_kasan_atomics+0x10/0x10
[   32.289417]  ? __pfx_read_tsc+0x10/0x10
[   32.289855]  ? ktime_get_ts64+0x86/0x230
[   32.290209]  kunit_try_run_case+0x1b3/0x490
[   32.290686]  ? __pfx_kunit_try_run_case+0x10/0x10
[   32.291019]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   32.291345]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   32.291856]  ? __kthread_parkme+0x82/0x160
[   32.292296]  ? preempt_count_sub+0x50/0x80
[   32.292765]  ? __pfx_kunit_try_run_case+0x10/0x10
[   32.293228]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   32.293697]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   32.294032]  kthread+0x257/0x310
[   32.294426]  ? __pfx_kthread+0x10/0x10
[   32.294905]  ret_from_fork+0x41/0x80
[   32.295313]  ? __pfx_kthread+0x10/0x10
[   32.295745]  ret_from_fork_asm+0x1a/0x30
[   32.296135]  </TASK>
[   32.296321] 
[   32.296516] Allocated by task 274:
[   32.296740]  kasan_save_stack+0x3d/0x60
[   32.297151]  kasan_save_track+0x18/0x40
[   32.297569]  kasan_save_alloc_info+0x3b/0x50
[   32.297977]  __kasan_kmalloc+0xb7/0xc0
[   32.298379]  __kmalloc_cache_noprof+0x184/0x410
[   32.298872]  kasan_atomics+0x96/0x310
[   32.299272]  kunit_try_run_case+0x1b3/0x490
[   32.299743]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   32.300139]  kthread+0x257/0x310
[   32.300475]  ret_from_fork+0x41/0x80
[   32.300776]  ret_from_fork_asm+0x1a/0x30
[   32.301186] 
[   32.301380] The buggy address belongs to the object at ffff888102a59b80
[   32.301380]  which belongs to the cache kmalloc-64 of size 64
[   32.302628] The buggy address is located 0 bytes to the right of
[   32.302628]  allocated 48-byte region [ffff888102a59b80, ffff888102a59bb0)
[   32.304214] 
[   32.304472] The buggy address belongs to the physical page:
[   32.305014] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a59
[   32.305770] flags: 0x200000000000000(node=0|zone=2)
[   32.306146] page_type: f5(slab)
[   32.306385] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   32.306810] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   32.307325] page dumped because: kasan: bad access detected
[   32.307912] 
[   32.308178] Memory state around the buggy address:
[   32.308725]  ffff888102a59a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.309349]  ffff888102a59b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.310041] >ffff888102a59b80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   32.310708]                                      ^
[   32.311177]  ffff888102a59c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.311644]  ffff888102a59c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.312000] ==================================================================
[   30.341861] ==================================================================
[   30.342867] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x993/0x5450
[   30.343494] Write of size 4 at addr ffff888102a59bb0 by task kunit_try_catch/274
[   30.344138] 
[   30.344378] CPU: 1 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241203 #1
[   30.345192] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.345661] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   30.346274] Call Trace:
[   30.346619]  <TASK>
[   30.346865]  dump_stack_lvl+0x73/0xb0
[   30.347306]  print_report+0xd1/0x640
[   30.347953]  ? __virt_addr_valid+0x1db/0x2d0
[   30.348405]  ? kasan_complete_mode_report_info+0x2a/0x200
[   30.348879]  kasan_report+0x102/0x140
[   30.349249]  ? kasan_atomics_helper+0x993/0x5450
[   30.349642]  ? kasan_atomics_helper+0x993/0x5450
[   30.350045]  kasan_check_range+0x10c/0x1c0
[   30.350640]  __kasan_check_write+0x18/0x20
[   30.351085]  kasan_atomics_helper+0x993/0x5450
[   30.351563]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   30.352050]  ? ret_from_fork_asm+0x1a/0x30
[   30.352531]  ? ret_from_fork+0x41/0x80
[   30.352965]  ? kthread+0x257/0x310
[   30.353367]  kasan_atomics+0x1dd/0x310
[   30.353769]  ? __pfx_kasan_atomics+0x10/0x10
[   30.354079]  ? __pfx_read_tsc+0x10/0x10
[   30.354348]  ? ktime_get_ts64+0x86/0x230
[   30.354908]  kunit_try_run_case+0x1b3/0x490
[   30.355389]  ? __pfx_kunit_try_run_case+0x10/0x10
[   30.355866]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   30.356428]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   30.356971]  ? __kthread_parkme+0x82/0x160
[   30.357413]  ? preempt_count_sub+0x50/0x80
[   30.357756]  ? __pfx_kunit_try_run_case+0x10/0x10
[   30.358067]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   30.358738]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   30.359328]  kthread+0x257/0x310
[   30.359826]  ? __pfx_kthread+0x10/0x10
[   30.360217]  ret_from_fork+0x41/0x80
[   30.360501]  ? __pfx_kthread+0x10/0x10
[   30.360758]  ret_from_fork_asm+0x1a/0x30
[   30.362144]  </TASK>
[   30.362507] 
[   30.362747] Allocated by task 274:
[   30.363154]  kasan_save_stack+0x3d/0x60
[   30.363669]  kasan_save_track+0x18/0x40
[   30.366457]  kasan_save_alloc_info+0x3b/0x50
[   30.367384]  __kasan_kmalloc+0xb7/0xc0
[   30.367705]  __kmalloc_cache_noprof+0x184/0x410
[   30.368167]  kasan_atomics+0x96/0x310
[   30.368550]  kunit_try_run_case+0x1b3/0x490
[   30.368922]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   30.369834]  kthread+0x257/0x310
[   30.370100]  ret_from_fork+0x41/0x80
[   30.370349]  ret_from_fork_asm+0x1a/0x30
[   30.370623] 
[   30.370772] The buggy address belongs to the object at ffff888102a59b80
[   30.370772]  which belongs to the cache kmalloc-64 of size 64
[   30.371331] The buggy address is located 0 bytes to the right of
[   30.371331]  allocated 48-byte region [ffff888102a59b80, ffff888102a59bb0)
[   30.371891] 
[   30.372047] The buggy address belongs to the physical page:
[   30.374360] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a59
[   30.375703] flags: 0x200000000000000(node=0|zone=2)
[   30.376111] page_type: f5(slab)
[   30.376386] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   30.377267] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   30.378246] page dumped because: kasan: bad access detected
[   30.379097] 
[   30.379497] Memory state around the buggy address:
[   30.379785]  ffff888102a59a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   30.380409]  ffff888102a59b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   30.380853] >ffff888102a59b80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   30.381599]                                      ^
[   30.382076]  ffff888102a59c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.382547]  ffff888102a59c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.383150] ==================================================================
[   29.914191] ==================================================================
[   29.914894] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e0/0x5450
[   29.915823] Read of size 4 at addr ffff888102a59bb0 by task kunit_try_catch/274
[   29.916272] 
[   29.916451] CPU: 1 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241203 #1
[   29.917725] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.918150] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   29.918952] Call Trace:
[   29.919716]  <TASK>
[   29.920014]  dump_stack_lvl+0x73/0xb0
[   29.920610]  print_report+0xd1/0x640
[   29.920901]  ? __virt_addr_valid+0x1db/0x2d0
[   29.921369]  ? kasan_complete_mode_report_info+0x2a/0x200
[   29.921801]  kasan_report+0x102/0x140
[   29.922086]  ? kasan_atomics_helper+0x3e0/0x5450
[   29.922512]  ? kasan_atomics_helper+0x3e0/0x5450
[   29.923113]  kasan_check_range+0x10c/0x1c0
[   29.923543]  __kasan_check_read+0x15/0x20
[   29.923907]  kasan_atomics_helper+0x3e0/0x5450
[   29.924218]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   29.924862]  ? ret_from_fork_asm+0x1a/0x30
[   29.925279]  ? ret_from_fork+0x41/0x80
[   29.925652]  ? kthread+0x257/0x310
[   29.926070]  kasan_atomics+0x1dd/0x310
[   29.926397]  ? __pfx_kasan_atomics+0x10/0x10
[   29.926687]  ? __pfx_read_tsc+0x10/0x10
[   29.926949]  ? ktime_get_ts64+0x86/0x230
[   29.927382]  kunit_try_run_case+0x1b3/0x490
[   29.927924]  ? __pfx_kunit_try_run_case+0x10/0x10
[   29.928420]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   29.928902]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   29.929400]  ? __kthread_parkme+0x82/0x160
[   29.929856]  ? preempt_count_sub+0x50/0x80
[   29.930188]  ? __pfx_kunit_try_run_case+0x10/0x10
[   29.930778]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   29.931379]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   29.931877]  kthread+0x257/0x310
[   29.932162]  ? __pfx_kthread+0x10/0x10
[   29.932437]  ret_from_fork+0x41/0x80
[   29.932899]  ? __pfx_kthread+0x10/0x10
[   29.933351]  ret_from_fork_asm+0x1a/0x30
[   29.933972]  </TASK>
[   29.934273] 
[   29.934433] Allocated by task 274:
[   29.934742]  kasan_save_stack+0x3d/0x60
[   29.935013]  kasan_save_track+0x18/0x40
[   29.935273]  kasan_save_alloc_info+0x3b/0x50
[   29.935601]  __kasan_kmalloc+0xb7/0xc0
[   29.936066]  __kmalloc_cache_noprof+0x184/0x410
[   29.936562]  kasan_atomics+0x96/0x310
[   29.936982]  kunit_try_run_case+0x1b3/0x490
[   29.937414]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   29.937797]  kthread+0x257/0x310
[   29.938162]  ret_from_fork+0x41/0x80
[   29.938616]  ret_from_fork_asm+0x1a/0x30
[   29.938884] 
[   29.939032] The buggy address belongs to the object at ffff888102a59b80
[   29.939032]  which belongs to the cache kmalloc-64 of size 64
[   29.939695] The buggy address is located 0 bytes to the right of
[   29.939695]  allocated 48-byte region [ffff888102a59b80, ffff888102a59bb0)
[   29.940789] 
[   29.941011] The buggy address belongs to the physical page:
[   29.941516] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a59
[   29.942010] flags: 0x200000000000000(node=0|zone=2)
[   29.942531] page_type: f5(slab)
[   29.942885] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   29.943370] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   29.944228] page dumped because: kasan: bad access detected
[   29.944916] 
[   29.945087] Memory state around the buggy address:
[   29.945360]  ffff888102a59a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.945986]  ffff888102a59b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.946651] >ffff888102a59b80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   29.947092]                                      ^
[   29.947570]  ffff888102a59c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.948128]  ffff888102a59c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.948489] ==================================================================
[   30.303310] ==================================================================
[   30.304094] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x8fa/0x5450
[   30.304667] Write of size 4 at addr ffff888102a59bb0 by task kunit_try_catch/274
[   30.305114] 
[   30.305435] CPU: 1 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241203 #1
[   30.306786] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.307270] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   30.307888] Call Trace:
[   30.308326]  <TASK>
[   30.308649]  dump_stack_lvl+0x73/0xb0
[   30.309130]  print_report+0xd1/0x640
[   30.309464]  ? __virt_addr_valid+0x1db/0x2d0
[   30.309887]  ? kasan_complete_mode_report_info+0x2a/0x200
[   30.310405]  kasan_report+0x102/0x140
[   30.310779]  ? kasan_atomics_helper+0x8fa/0x5450
[   30.311171]  ? kasan_atomics_helper+0x8fa/0x5450
[   30.311510]  kasan_check_range+0x10c/0x1c0
[   30.311799]  __kasan_check_write+0x18/0x20
[   30.312118]  kasan_atomics_helper+0x8fa/0x5450
[   30.312596]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   30.313075]  ? ret_from_fork_asm+0x1a/0x30
[   30.313521]  ? ret_from_fork+0x41/0x80
[   30.313931]  ? kthread+0x257/0x310
[   30.314330]  kasan_atomics+0x1dd/0x310
[   30.314987]  ? __pfx_kasan_atomics+0x10/0x10
[   30.315440]  ? __pfx_read_tsc+0x10/0x10
[   30.315903]  ? ktime_get_ts64+0x86/0x230
[   30.316368]  kunit_try_run_case+0x1b3/0x490
[   30.316827]  ? __pfx_kunit_try_run_case+0x10/0x10
[   30.317343]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   30.317823]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   30.318351]  ? __kthread_parkme+0x82/0x160
[   30.318804]  ? preempt_count_sub+0x50/0x80
[   30.319182]  ? __pfx_kunit_try_run_case+0x10/0x10
[   30.319661]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   30.320238]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   30.320901]  kthread+0x257/0x310
[   30.321296]  ? __pfx_kthread+0x10/0x10
[   30.321804]  ret_from_fork+0x41/0x80
[   30.322254]  ? __pfx_kthread+0x10/0x10
[   30.322755]  ret_from_fork_asm+0x1a/0x30
[   30.323086]  </TASK>
[   30.323276] 
[   30.323422] Allocated by task 274:
[   30.323831]  kasan_save_stack+0x3d/0x60
[   30.324269]  kasan_save_track+0x18/0x40
[   30.324839]  kasan_save_alloc_info+0x3b/0x50
[   30.325345]  __kasan_kmalloc+0xb7/0xc0
[   30.325896]  __kmalloc_cache_noprof+0x184/0x410
[   30.326288]  kasan_atomics+0x96/0x310
[   30.326716]  kunit_try_run_case+0x1b3/0x490
[   30.327298]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   30.327876]  kthread+0x257/0x310
[   30.328237]  ret_from_fork+0x41/0x80
[   30.328689]  ret_from_fork_asm+0x1a/0x30
[   30.329034] 
[   30.329261] The buggy address belongs to the object at ffff888102a59b80
[   30.329261]  which belongs to the cache kmalloc-64 of size 64
[   30.329956] The buggy address is located 0 bytes to the right of
[   30.329956]  allocated 48-byte region [ffff888102a59b80, ffff888102a59bb0)
[   30.330922] 
[   30.331261] The buggy address belongs to the physical page:
[   30.331912] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a59
[   30.332492] flags: 0x200000000000000(node=0|zone=2)
[   30.332960] page_type: f5(slab)
[   30.333250] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   30.334129] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   30.334513] page dumped because: kasan: bad access detected
[   30.334797] 
[   30.334947] Memory state around the buggy address:
[   30.335349]  ffff888102a59a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   30.336047]  ffff888102a59b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   30.336957] >ffff888102a59b80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   30.337605]                                      ^
[   30.338039]  ffff888102a59c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.338693]  ffff888102a59c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.339047] ==================================================================
[   31.361525] ==================================================================
[   31.363045] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1650/0x5450
[   31.363857] Write of size 8 at addr ffff888102a59bb0 by task kunit_try_catch/274
[   31.364541] 
[   31.364777] CPU: 1 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241203 #1
[   31.365698] Tainted: [B]=BAD_PAGE, [N]=TEST
[   31.366113] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   31.366857] Call Trace:
[   31.367206]  <TASK>
[   31.367526]  dump_stack_lvl+0x73/0xb0
[   31.367904]  print_report+0xd1/0x640
[   31.368353]  ? __virt_addr_valid+0x1db/0x2d0
[   31.368851]  ? kasan_complete_mode_report_info+0x2a/0x200
[   31.369409]  kasan_report+0x102/0x140
[   31.369755]  ? kasan_atomics_helper+0x1650/0x5450
[   31.370247]  ? kasan_atomics_helper+0x1650/0x5450
[   31.370788]  kasan_check_range+0x10c/0x1c0
[   31.371177]  __kasan_check_write+0x18/0x20
[   31.371682]  kasan_atomics_helper+0x1650/0x5450
[   31.372076]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   31.372589]  ? ret_from_fork_asm+0x1a/0x30
[   31.373046]  ? ret_from_fork+0x41/0x80
[   31.373397]  ? kthread+0x257/0x310
[   31.373835]  kasan_atomics+0x1dd/0x310
[   31.374156]  ? __pfx_kasan_atomics+0x10/0x10
[   31.374650]  ? __pfx_read_tsc+0x10/0x10
[   31.375134]  ? ktime_get_ts64+0x86/0x230
[   31.375618]  kunit_try_run_case+0x1b3/0x490
[   31.375915]  ? __pfx_kunit_try_run_case+0x10/0x10
[   31.376236]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   31.376791]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   31.377301]  ? __kthread_parkme+0x82/0x160
[   31.377743]  ? preempt_count_sub+0x50/0x80
[   31.378232]  ? __pfx_kunit_try_run_case+0x10/0x10
[   31.378749]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   31.379312]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   31.379693]  kthread+0x257/0x310
[   31.380026]  ? __pfx_kthread+0x10/0x10
[   31.380498]  ret_from_fork+0x41/0x80
[   31.380911]  ? __pfx_kthread+0x10/0x10
[   31.381332]  ret_from_fork_asm+0x1a/0x30
[   31.381797]  </TASK>
[   31.382084] 
[   31.382322] Allocated by task 274:
[   31.382693]  kasan_save_stack+0x3d/0x60
[   31.383070]  kasan_save_track+0x18/0x40
[   31.383498]  kasan_save_alloc_info+0x3b/0x50
[   31.383914]  __kasan_kmalloc+0xb7/0xc0
[   31.384191]  __kmalloc_cache_noprof+0x184/0x410
[   31.384531]  kasan_atomics+0x96/0x310
[   31.384846]  kunit_try_run_case+0x1b3/0x490
[   31.385297]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   31.385905]  kthread+0x257/0x310
[   31.386323]  ret_from_fork+0x41/0x80
[   31.386771]  ret_from_fork_asm+0x1a/0x30
[   31.387270] 
[   31.387606] The buggy address belongs to the object at ffff888102a59b80
[   31.387606]  which belongs to the cache kmalloc-64 of size 64
[   31.388678] The buggy address is located 0 bytes to the right of
[   31.388678]  allocated 48-byte region [ffff888102a59b80, ffff888102a59bb0)
[   31.389787] 
[   31.390089] The buggy address belongs to the physical page:
[   31.390511] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a59
[   31.391188] flags: 0x200000000000000(node=0|zone=2)
[   31.391730] page_type: f5(slab)
[   31.391973] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   31.392783] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   31.393555] page dumped because: kasan: bad access detected
[   31.394043] 
[   31.394212] Memory state around the buggy address:
[   31.394507]  ffff888102a59a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   31.395125]  ffff888102a59b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   31.395830] >ffff888102a59b80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   31.396493]                                      ^
[   31.396939]  ffff888102a59c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.397418]  ffff888102a59c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.397816] ==================================================================
[   31.321721] ==================================================================
[   31.323167] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x15b7/0x5450
[   31.323717] Write of size 8 at addr ffff888102a59bb0 by task kunit_try_catch/274
[   31.324283] 
[   31.324744] CPU: 1 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241203 #1
[   31.325231] Tainted: [B]=BAD_PAGE, [N]=TEST
[   31.325554] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   31.326123] Call Trace:
[   31.326329]  <TASK>
[   31.326542]  dump_stack_lvl+0x73/0xb0
[   31.327104]  print_report+0xd1/0x640
[   31.327629]  ? __virt_addr_valid+0x1db/0x2d0
[   31.328170]  ? kasan_complete_mode_report_info+0x2a/0x200
[   31.328810]  kasan_report+0x102/0x140
[   31.329163]  ? kasan_atomics_helper+0x15b7/0x5450
[   31.329773]  ? kasan_atomics_helper+0x15b7/0x5450
[   31.330378]  kasan_check_range+0x10c/0x1c0
[   31.330916]  __kasan_check_write+0x18/0x20
[   31.331430]  kasan_atomics_helper+0x15b7/0x5450
[   31.331835]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   31.332326]  ? ret_from_fork_asm+0x1a/0x30
[   31.332918]  ? ret_from_fork+0x41/0x80
[   31.333431]  ? kthread+0x257/0x310
[   31.333986]  kasan_atomics+0x1dd/0x310
[   31.334547]  ? __pfx_kasan_atomics+0x10/0x10
[   31.334993]  ? __pfx_read_tsc+0x10/0x10
[   31.335484]  ? ktime_get_ts64+0x86/0x230
[   31.335958]  kunit_try_run_case+0x1b3/0x490
[   31.336474]  ? __pfx_kunit_try_run_case+0x10/0x10
[   31.337067]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   31.337493]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   31.338044]  ? __kthread_parkme+0x82/0x160
[   31.338524]  ? preempt_count_sub+0x50/0x80
[   31.339030]  ? __pfx_kunit_try_run_case+0x10/0x10
[   31.339547]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   31.340180]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   31.340735]  kthread+0x257/0x310
[   31.341158]  ? __pfx_kthread+0x10/0x10
[   31.341651]  ret_from_fork+0x41/0x80
[   31.342153]  ? __pfx_kthread+0x10/0x10
[   31.342501]  ret_from_fork_asm+0x1a/0x30
[   31.343035]  </TASK>
[   31.343327] 
[   31.343638] Allocated by task 274:
[   31.343951]  kasan_save_stack+0x3d/0x60
[   31.344413]  kasan_save_track+0x18/0x40
[   31.344869]  kasan_save_alloc_info+0x3b/0x50
[   31.345194]  __kasan_kmalloc+0xb7/0xc0
[   31.345601]  __kmalloc_cache_noprof+0x184/0x410
[   31.346049]  kasan_atomics+0x96/0x310
[   31.346504]  kunit_try_run_case+0x1b3/0x490
[   31.346782]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   31.347393]  kthread+0x257/0x310
[   31.347866]  ret_from_fork+0x41/0x80
[   31.348337]  ret_from_fork_asm+0x1a/0x30
[   31.348795] 
[   31.349098] The buggy address belongs to the object at ffff888102a59b80
[   31.349098]  which belongs to the cache kmalloc-64 of size 64
[   31.349845] The buggy address is located 0 bytes to the right of
[   31.349845]  allocated 48-byte region [ffff888102a59b80, ffff888102a59bb0)
[   31.350896] 
[   31.351072] The buggy address belongs to the physical page:
[   31.351692] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a59
[   31.352411] flags: 0x200000000000000(node=0|zone=2)
[   31.352989] page_type: f5(slab)
[   31.353317] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   31.354083] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   31.354804] page dumped because: kasan: bad access detected
[   31.355282] 
[   31.355524] Memory state around the buggy address:
[   31.356111]  ffff888102a59a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   31.356762]  ffff888102a59b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   31.357299] >ffff888102a59b80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   31.357962]                                      ^
[   31.358519]  ffff888102a59c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.359049]  ffff888102a59c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.359738] ==================================================================
[   31.684713] ==================================================================
[   31.685252] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1b23/0x5450
[   31.685983] Write of size 8 at addr ffff888102a59bb0 by task kunit_try_catch/274
[   31.686509] 
[   31.686712] CPU: 1 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241203 #1
[   31.688391] Tainted: [B]=BAD_PAGE, [N]=TEST
[   31.688697] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   31.690109] Call Trace:
[   31.690323]  <TASK>
[   31.690503]  dump_stack_lvl+0x73/0xb0
[   31.691288]  print_report+0xd1/0x640
[   31.692099]  ? __virt_addr_valid+0x1db/0x2d0
[   31.692467]  ? kasan_complete_mode_report_info+0x2a/0x200
[   31.693160]  kasan_report+0x102/0x140
[   31.693536]  ? kasan_atomics_helper+0x1b23/0x5450
[   31.694238]  ? kasan_atomics_helper+0x1b23/0x5450
[   31.694817]  kasan_check_range+0x10c/0x1c0
[   31.695228]  __kasan_check_write+0x18/0x20
[   31.696110]  kasan_atomics_helper+0x1b23/0x5450
[   31.696671]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   31.697066]  ? ret_from_fork_asm+0x1a/0x30
[   31.697351]  ? ret_from_fork+0x41/0x80
[   31.697997]  ? kthread+0x257/0x310
[   31.698899]  kasan_atomics+0x1dd/0x310
[   31.699250]  ? __pfx_kasan_atomics+0x10/0x10
[   31.699874]  ? __pfx_read_tsc+0x10/0x10
[   31.700246]  ? ktime_get_ts64+0x86/0x230
[   31.700601]  kunit_try_run_case+0x1b3/0x490
[   31.701366]  ? __pfx_kunit_try_run_case+0x10/0x10
[   31.702031]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   31.702902]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   31.703288]  ? __kthread_parkme+0x82/0x160
[   31.703669]  ? preempt_count_sub+0x50/0x80
[   31.704067]  ? __pfx_kunit_try_run_case+0x10/0x10
[   31.704515]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   31.704982]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   31.706086]  kthread+0x257/0x310
[   31.706643]  ? __pfx_kthread+0x10/0x10
[   31.707155]  ret_from_fork+0x41/0x80
[   31.707935]  ? __pfx_kthread+0x10/0x10
[   31.708272]  ret_from_fork_asm+0x1a/0x30
[   31.708831]  </TASK>
[   31.709314] 
[   31.709535] Allocated by task 274:
[   31.710037]  kasan_save_stack+0x3d/0x60
[   31.710418]  kasan_save_track+0x18/0x40
[   31.710832]  kasan_save_alloc_info+0x3b/0x50
[   31.711161]  __kasan_kmalloc+0xb7/0xc0
[   31.711604]  __kmalloc_cache_noprof+0x184/0x410
[   31.711995]  kasan_atomics+0x96/0x310
[   31.712393]  kunit_try_run_case+0x1b3/0x490
[   31.712825]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   31.713297]  kthread+0x257/0x310
[   31.713993]  ret_from_fork+0x41/0x80
[   31.714548]  ret_from_fork_asm+0x1a/0x30
[   31.715182] 
[   31.715393] The buggy address belongs to the object at ffff888102a59b80
[   31.715393]  which belongs to the cache kmalloc-64 of size 64
[   31.716854] The buggy address is located 0 bytes to the right of
[   31.716854]  allocated 48-byte region [ffff888102a59b80, ffff888102a59bb0)
[   31.717647] 
[   31.718073] The buggy address belongs to the physical page:
[   31.719042] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a59
[   31.719986] flags: 0x200000000000000(node=0|zone=2)
[   31.720393] page_type: f5(slab)
[   31.720807] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   31.721729] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   31.722382] page dumped because: kasan: bad access detected
[   31.723122] 
[   31.723682] Memory state around the buggy address:
[   31.724090]  ffff888102a59a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   31.724900]  ffff888102a59b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   31.725645] >ffff888102a59b80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   31.726084]                                      ^
[   31.726498]  ffff888102a59c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.727289]  ffff888102a59c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.727859] ==================================================================
[   32.045328] ==================================================================
[   32.046016] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x2007/0x5450
[   32.046714] Write of size 8 at addr ffff888102a59bb0 by task kunit_try_catch/274
[   32.047358] 
[   32.049279] CPU: 1 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241203 #1
[   32.050117] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.050502] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   32.052541] Call Trace:
[   32.052842]  <TASK>
[   32.053131]  dump_stack_lvl+0x73/0xb0
[   32.053606]  print_report+0xd1/0x640
[   32.054011]  ? __virt_addr_valid+0x1db/0x2d0
[   32.054521]  ? kasan_complete_mode_report_info+0x2a/0x200
[   32.055108]  kasan_report+0x102/0x140
[   32.055558]  ? kasan_atomics_helper+0x2007/0x5450
[   32.056021]  ? kasan_atomics_helper+0x2007/0x5450
[   32.056548]  kasan_check_range+0x10c/0x1c0
[   32.056984]  __kasan_check_write+0x18/0x20
[   32.057412]  kasan_atomics_helper+0x2007/0x5450
[   32.057901]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   32.058228]  ? ret_from_fork_asm+0x1a/0x30
[   32.058569]  ? ret_from_fork+0x41/0x80
[   32.058843]  ? kthread+0x257/0x310
[   32.059127]  kasan_atomics+0x1dd/0x310
[   32.059586]  ? __pfx_kasan_atomics+0x10/0x10
[   32.060043]  ? __pfx_read_tsc+0x10/0x10
[   32.060519]  ? ktime_get_ts64+0x86/0x230
[   32.060904]  kunit_try_run_case+0x1b3/0x490
[   32.061360]  ? __pfx_kunit_try_run_case+0x10/0x10
[   32.061862]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   32.062325]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   32.062839]  ? __kthread_parkme+0x82/0x160
[   32.063271]  ? preempt_count_sub+0x50/0x80
[   32.063747]  ? __pfx_kunit_try_run_case+0x10/0x10
[   32.064230]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   32.064818]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   32.065183]  kthread+0x257/0x310
[   32.065592]  ? __pfx_kthread+0x10/0x10
[   32.065954]  ret_from_fork+0x41/0x80
[   32.066354]  ? __pfx_kthread+0x10/0x10
[   32.066786]  ret_from_fork_asm+0x1a/0x30
[   32.067129]  </TASK>
[   32.067321] 
[   32.067509] Allocated by task 274:
[   32.067738]  kasan_save_stack+0x3d/0x60
[   32.068010]  kasan_save_track+0x18/0x40
[   32.068430]  kasan_save_alloc_info+0x3b/0x50
[   32.068902]  __kasan_kmalloc+0xb7/0xc0
[   32.069302]  __kmalloc_cache_noprof+0x184/0x410
[   32.069799]  kasan_atomics+0x96/0x310
[   32.070199]  kunit_try_run_case+0x1b3/0x490
[   32.070650]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   32.071153]  kthread+0x257/0x310
[   32.071553]  ret_from_fork+0x41/0x80
[   32.071934]  ret_from_fork_asm+0x1a/0x30
[   32.072311] 
[   32.072560] The buggy address belongs to the object at ffff888102a59b80
[   32.072560]  which belongs to the cache kmalloc-64 of size 64
[   32.073124] The buggy address is located 0 bytes to the right of
[   32.073124]  allocated 48-byte region [ffff888102a59b80, ffff888102a59bb0)
[   32.074154] 
[   32.074373] The buggy address belongs to the physical page:
[   32.074924] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a59
[   32.075610] flags: 0x200000000000000(node=0|zone=2)
[   32.076009] page_type: f5(slab)
[   32.076366] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   32.076951] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   32.077428] page dumped because: kasan: bad access detected
[   32.077879] 
[   32.078030] Memory state around the buggy address:
[   32.080144]  ffff888102a59a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.080769]  ffff888102a59b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.081257] >ffff888102a59b80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   32.081846]                                      ^
[   32.083643]  ffff888102a59c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.084171]  ffff888102a59c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.084548] ==================================================================
[   29.872491] ==================================================================
[   29.874170] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b70/0x5450
[   29.874724] Write of size 4 at addr ffff888102a59bb0 by task kunit_try_catch/274
[   29.875413] 
[   29.875709] CPU: 1 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241203 #1
[   29.876749] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.877192] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   29.877984] Call Trace:
[   29.878321]  <TASK>
[   29.878785]  dump_stack_lvl+0x73/0xb0
[   29.879100]  print_report+0xd1/0x640
[   29.879703]  ? __virt_addr_valid+0x1db/0x2d0
[   29.880179]  ? kasan_complete_mode_report_info+0x2a/0x200
[   29.880681]  kasan_report+0x102/0x140
[   29.881002]  ? kasan_atomics_helper+0x4b70/0x5450
[   29.881532]  ? kasan_atomics_helper+0x4b70/0x5450
[   29.881948]  __asan_report_store4_noabort+0x1b/0x30
[   29.882401]  kasan_atomics_helper+0x4b70/0x5450
[   29.882865]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   29.883276]  ? ret_from_fork_asm+0x1a/0x30
[   29.883821]  ? ret_from_fork+0x41/0x80
[   29.884300]  ? kthread+0x257/0x310
[   29.884572]  kasan_atomics+0x1dd/0x310
[   29.885296]  ? __pfx_kasan_atomics+0x10/0x10
[   29.885795]  ? __pfx_read_tsc+0x10/0x10
[   29.886420]  ? ktime_get_ts64+0x86/0x230
[   29.887106]  kunit_try_run_case+0x1b3/0x490
[   29.887605]  ? __pfx_kunit_try_run_case+0x10/0x10
[   29.887970]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   29.888347]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   29.888920]  ? __kthread_parkme+0x82/0x160
[   29.889318]  ? preempt_count_sub+0x50/0x80
[   29.889744]  ? __pfx_kunit_try_run_case+0x10/0x10
[   29.890278]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   29.890948]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   29.891404]  kthread+0x257/0x310
[   29.892068]  ? __pfx_kthread+0x10/0x10
[   29.892565]  ret_from_fork+0x41/0x80
[   29.893128]  ? __pfx_kthread+0x10/0x10
[   29.893665]  ret_from_fork_asm+0x1a/0x30
[   29.894153]  </TASK>
[   29.894423] 
[   29.894713] Allocated by task 274:
[   29.894952]  kasan_save_stack+0x3d/0x60
[   29.895439]  kasan_save_track+0x18/0x40
[   29.896281]  kasan_save_alloc_info+0x3b/0x50
[   29.896943]  __kasan_kmalloc+0xb7/0xc0
[   29.897433]  __kmalloc_cache_noprof+0x184/0x410
[   29.898174]  kasan_atomics+0x96/0x310
[   29.898499]  kunit_try_run_case+0x1b3/0x490
[   29.899288]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   29.899769]  kthread+0x257/0x310
[   29.900224]  ret_from_fork+0x41/0x80
[   29.900524]  ret_from_fork_asm+0x1a/0x30
[   29.901007] 
[   29.901232] The buggy address belongs to the object at ffff888102a59b80
[   29.901232]  which belongs to the cache kmalloc-64 of size 64
[   29.901997] The buggy address is located 0 bytes to the right of
[   29.901997]  allocated 48-byte region [ffff888102a59b80, ffff888102a59bb0)
[   29.903138] 
[   29.903287] The buggy address belongs to the physical page:
[   29.904354] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a59
[   29.905120] flags: 0x200000000000000(node=0|zone=2)
[   29.905929] page_type: f5(slab)
[   29.906519] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   29.906940] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   29.907594] page dumped because: kasan: bad access detected
[   29.907970] 
[   29.908171] Memory state around the buggy address:
[   29.908456]  ffff888102a59a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.909018]  ffff888102a59b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.909548] >ffff888102a59b80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   29.910367]                                      ^
[   29.910646]  ffff888102a59c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.911357]  ffff888102a59c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.911919] ==================================================================
[   30.928817] ==================================================================
[   30.929526] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a04/0x5450
[   30.930237] Read of size 4 at addr ffff888102a59bb0 by task kunit_try_catch/274
[   30.931354] 
[   30.932231] CPU: 1 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241203 #1
[   30.933021] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.933425] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   30.934924] Call Trace:
[   30.935548]  <TASK>
[   30.935770]  dump_stack_lvl+0x73/0xb0
[   30.936134]  print_report+0xd1/0x640
[   30.936423]  ? __virt_addr_valid+0x1db/0x2d0
[   30.936849]  ? kasan_complete_mode_report_info+0x2a/0x200
[   30.937609]  kasan_report+0x102/0x140
[   30.937908]  ? kasan_atomics_helper+0x4a04/0x5450
[   30.938383]  ? kasan_atomics_helper+0x4a04/0x5450
[   30.938703]  __asan_report_load4_noabort+0x18/0x20
[   30.939244]  kasan_atomics_helper+0x4a04/0x5450
[   30.939764]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   30.940110]  ? ret_from_fork_asm+0x1a/0x30
[   30.940566]  ? ret_from_fork+0x41/0x80
[   30.940974]  ? kthread+0x257/0x310
[   30.941365]  kasan_atomics+0x1dd/0x310
[   30.941741]  ? __pfx_kasan_atomics+0x10/0x10
[   30.942038]  ? __pfx_read_tsc+0x10/0x10
[   30.942631]  ? ktime_get_ts64+0x86/0x230
[   30.943112]  kunit_try_run_case+0x1b3/0x490
[   30.943638]  ? __pfx_kunit_try_run_case+0x10/0x10
[   30.944153]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   30.944705]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   30.945257]  ? __kthread_parkme+0x82/0x160
[   30.945754]  ? preempt_count_sub+0x50/0x80
[   30.946332]  ? __pfx_kunit_try_run_case+0x10/0x10
[   30.946860]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   30.947528]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   30.948119]  kthread+0x257/0x310
[   30.948537]  ? __pfx_kthread+0x10/0x10
[   30.949036]  ret_from_fork+0x41/0x80
[   30.949524]  ? __pfx_kthread+0x10/0x10
[   30.949945]  ret_from_fork_asm+0x1a/0x30
[   30.950404]  </TASK>
[   30.950699] 
[   30.950905] Allocated by task 274:
[   30.951237]  kasan_save_stack+0x3d/0x60
[   30.952305]  kasan_save_track+0x18/0x40
[   30.952689]  kasan_save_alloc_info+0x3b/0x50
[   30.953108]  __kasan_kmalloc+0xb7/0xc0
[   30.953573]  __kmalloc_cache_noprof+0x184/0x410
[   30.954027]  kasan_atomics+0x96/0x310
[   30.954534]  kunit_try_run_case+0x1b3/0x490
[   30.955102]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   30.955711]  kthread+0x257/0x310
[   30.955953]  ret_from_fork+0x41/0x80
[   30.956393]  ret_from_fork_asm+0x1a/0x30
[   30.957198] 
[   30.957406] The buggy address belongs to the object at ffff888102a59b80
[   30.957406]  which belongs to the cache kmalloc-64 of size 64
[   30.958861] The buggy address is located 0 bytes to the right of
[   30.958861]  allocated 48-byte region [ffff888102a59b80, ffff888102a59bb0)
[   30.959931] 
[   30.960418] The buggy address belongs to the physical page:
[   30.960949] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a59
[   30.962038] flags: 0x200000000000000(node=0|zone=2)
[   30.962410] page_type: f5(slab)
[   30.962874] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   30.963779] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   30.964144] page dumped because: kasan: bad access detected
[   30.964943] 
[   30.965175] Memory state around the buggy address:
[   30.965866]  ffff888102a59a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   30.966427]  ffff888102a59b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   30.967147] >ffff888102a59b80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   30.968109]                                      ^
[   30.968727]  ffff888102a59c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.969412]  ffff888102a59c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.970219] ==================================================================
[   30.888426] ==================================================================
[   30.888905] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1149/0x5450
[   30.889935] Write of size 4 at addr ffff888102a59bb0 by task kunit_try_catch/274
[   30.890639] 
[   30.890900] CPU: 1 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241203 #1
[   30.891875] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.892328] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   30.893184] Call Trace:
[   30.893520]  <TASK>
[   30.893819]  dump_stack_lvl+0x73/0xb0
[   30.894275]  print_report+0xd1/0x640
[   30.894890]  ? __virt_addr_valid+0x1db/0x2d0
[   30.895403]  ? kasan_complete_mode_report_info+0x2a/0x200
[   30.895997]  kasan_report+0x102/0x140
[   30.896478]  ? kasan_atomics_helper+0x1149/0x5450
[   30.896993]  ? kasan_atomics_helper+0x1149/0x5450
[   30.897544]  kasan_check_range+0x10c/0x1c0
[   30.898015]  __kasan_check_write+0x18/0x20
[   30.898502]  kasan_atomics_helper+0x1149/0x5450
[   30.899038]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   30.899668]  ? ret_from_fork_asm+0x1a/0x30
[   30.900154]  ? ret_from_fork+0x41/0x80
[   30.900611]  ? kthread+0x257/0x310
[   30.901096]  kasan_atomics+0x1dd/0x310
[   30.901443]  ? __pfx_kasan_atomics+0x10/0x10
[   30.901765]  ? __pfx_read_tsc+0x10/0x10
[   30.902037]  ? ktime_get_ts64+0x86/0x230
[   30.902340]  kunit_try_run_case+0x1b3/0x490
[   30.902659]  ? __pfx_kunit_try_run_case+0x10/0x10
[   30.902965]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   30.903275]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   30.903580]  ? __kthread_parkme+0x82/0x160
[   30.903853]  ? preempt_count_sub+0x50/0x80
[   30.904230]  ? __pfx_kunit_try_run_case+0x10/0x10
[   30.904833]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   30.905464]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   30.906099]  kthread+0x257/0x310
[   30.906512]  ? __pfx_kthread+0x10/0x10
[   30.906948]  ret_from_fork+0x41/0x80
[   30.907392]  ? __pfx_kthread+0x10/0x10
[   30.907827]  ret_from_fork_asm+0x1a/0x30
[   30.908324]  </TASK>
[   30.908718] 
[   30.908946] Allocated by task 274:
[   30.909724]  kasan_save_stack+0x3d/0x60
[   30.910487]  kasan_save_track+0x18/0x40
[   30.911316]  kasan_save_alloc_info+0x3b/0x50
[   30.911930]  __kasan_kmalloc+0xb7/0xc0
[   30.912109]  __kmalloc_cache_noprof+0x184/0x410
[   30.912273]  kasan_atomics+0x96/0x310
[   30.912424]  kunit_try_run_case+0x1b3/0x490
[   30.913205]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   30.913763]  kthread+0x257/0x310
[   30.914141]  ret_from_fork+0x41/0x80
[   30.914539]  ret_from_fork_asm+0x1a/0x30
[   30.915132] 
[   30.915346] The buggy address belongs to the object at ffff888102a59b80
[   30.915346]  which belongs to the cache kmalloc-64 of size 64
[   30.916905] The buggy address is located 0 bytes to the right of
[   30.916905]  allocated 48-byte region [ffff888102a59b80, ffff888102a59bb0)
[   30.918249] 
[   30.918415] The buggy address belongs to the physical page:
[   30.919115] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a59
[   30.919562] flags: 0x200000000000000(node=0|zone=2)
[   30.920289] page_type: f5(slab)
[   30.920652] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   30.921309] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   30.921817] page dumped because: kasan: bad access detected
[   30.922291] 
[   30.922937] Memory state around the buggy address:
[   30.923402]  ffff888102a59a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   30.924216]  ffff888102a59b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   30.924632] >ffff888102a59b80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   30.925285]                                      ^
[   30.925778]  ffff888102a59c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.926377]  ffff888102a59c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.927349] ==================================================================
[   30.737073] ==================================================================
[   30.737505] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xfaa/0x5450
[   30.738315] Write of size 4 at addr ffff888102a59bb0 by task kunit_try_catch/274
[   30.738967] 
[   30.739277] CPU: 1 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241203 #1
[   30.739881] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.740273] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   30.740906] Call Trace:
[   30.741092]  <TASK>
[   30.741251]  dump_stack_lvl+0x73/0xb0
[   30.741811]  print_report+0xd1/0x640
[   30.742334]  ? __virt_addr_valid+0x1db/0x2d0
[   30.742826]  ? kasan_complete_mode_report_info+0x2a/0x200
[   30.743586]  kasan_report+0x102/0x140
[   30.744025]  ? kasan_atomics_helper+0xfaa/0x5450
[   30.744517]  ? kasan_atomics_helper+0xfaa/0x5450
[   30.745013]  kasan_check_range+0x10c/0x1c0
[   30.745413]  __kasan_check_write+0x18/0x20
[   30.745713]  kasan_atomics_helper+0xfaa/0x5450
[   30.746006]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   30.746640]  ? ret_from_fork_asm+0x1a/0x30
[   30.747048]  ? ret_from_fork+0x41/0x80
[   30.747507]  ? kthread+0x257/0x310
[   30.747952]  kasan_atomics+0x1dd/0x310
[   30.748483]  ? __pfx_kasan_atomics+0x10/0x10
[   30.748991]  ? __pfx_read_tsc+0x10/0x10
[   30.749409]  ? ktime_get_ts64+0x86/0x230
[   30.749878]  kunit_try_run_case+0x1b3/0x490
[   30.750190]  ? __pfx_kunit_try_run_case+0x10/0x10
[   30.750552]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   30.751145]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   30.751731]  ? __kthread_parkme+0x82/0x160
[   30.752231]  ? preempt_count_sub+0x50/0x80
[   30.752765]  ? __pfx_kunit_try_run_case+0x10/0x10
[   30.754246]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   30.754805]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   30.755161]  kthread+0x257/0x310
[   30.755407]  ? __pfx_kthread+0x10/0x10
[   30.755679]  ret_from_fork+0x41/0x80
[   30.756272]  ? __pfx_kthread+0x10/0x10
[   30.756820]  ret_from_fork_asm+0x1a/0x30
[   30.757305]  </TASK>
[   30.757736] 
[   30.757978] Allocated by task 274:
[   30.758524]  kasan_save_stack+0x3d/0x60
[   30.759031]  kasan_save_track+0x18/0x40
[   30.759585]  kasan_save_alloc_info+0x3b/0x50
[   30.760129]  __kasan_kmalloc+0xb7/0xc0
[   30.760651]  __kmalloc_cache_noprof+0x184/0x410
[   30.761191]  kasan_atomics+0x96/0x310
[   30.761689]  kunit_try_run_case+0x1b3/0x490
[   30.762227]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   30.762861]  kthread+0x257/0x310
[   30.763259]  ret_from_fork+0x41/0x80
[   30.763797]  ret_from_fork_asm+0x1a/0x30
[   30.764274] 
[   30.764583] The buggy address belongs to the object at ffff888102a59b80
[   30.764583]  which belongs to the cache kmalloc-64 of size 64
[   30.765688] The buggy address is located 0 bytes to the right of
[   30.765688]  allocated 48-byte region [ffff888102a59b80, ffff888102a59bb0)
[   30.766813] 
[   30.766910] The buggy address belongs to the physical page:
[   30.767121] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a59
[   30.767605] flags: 0x200000000000000(node=0|zone=2)
[   30.768016] page_type: f5(slab)
[   30.768380] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   30.768827] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   30.769480] page dumped because: kasan: bad access detected
[   30.769999] 
[   30.770226] Memory state around the buggy address:
[   30.770617]  ffff888102a59a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   30.771264]  ffff888102a59b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   30.771778] >ffff888102a59b80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   30.772423]                                      ^
[   30.772924]  ffff888102a59c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.773370]  ffff888102a59c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.773787] ==================================================================
[   30.627136] ==================================================================
[   30.627529] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xde1/0x5450
[   30.628263] Write of size 4 at addr ffff888102a59bb0 by task kunit_try_catch/274
[   30.628834] 
[   30.629100] CPU: 1 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241203 #1
[   30.629865] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.630137] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   30.630896] Call Trace:
[   30.631215]  <TASK>
[   30.631557]  dump_stack_lvl+0x73/0xb0
[   30.631981]  print_report+0xd1/0x640
[   30.632405]  ? __virt_addr_valid+0x1db/0x2d0
[   30.632828]  ? kasan_complete_mode_report_info+0x2a/0x200
[   30.633198]  kasan_report+0x102/0x140
[   30.633676]  ? kasan_atomics_helper+0xde1/0x5450
[   30.634157]  ? kasan_atomics_helper+0xde1/0x5450
[   30.634684]  kasan_check_range+0x10c/0x1c0
[   30.635046]  __kasan_check_write+0x18/0x20
[   30.635344]  kasan_atomics_helper+0xde1/0x5450
[   30.635848]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   30.636375]  ? ret_from_fork_asm+0x1a/0x30
[   30.636858]  ? ret_from_fork+0x41/0x80
[   30.637297]  ? kthread+0x257/0x310
[   30.637615]  kasan_atomics+0x1dd/0x310
[   30.637912]  ? __pfx_kasan_atomics+0x10/0x10
[   30.638393]  ? __pfx_read_tsc+0x10/0x10
[   30.638842]  ? ktime_get_ts64+0x86/0x230
[   30.639310]  kunit_try_run_case+0x1b3/0x490
[   30.639702]  ? __pfx_kunit_try_run_case+0x10/0x10
[   30.640011]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   30.640496]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   30.640999]  ? __kthread_parkme+0x82/0x160
[   30.641471]  ? preempt_count_sub+0x50/0x80
[   30.641905]  ? __pfx_kunit_try_run_case+0x10/0x10
[   30.642422]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   30.642971]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   30.643488]  kthread+0x257/0x310
[   30.643868]  ? __pfx_kthread+0x10/0x10
[   30.644232]  ret_from_fork+0x41/0x80
[   30.644558]  ? __pfx_kthread+0x10/0x10
[   30.644901]  ret_from_fork_asm+0x1a/0x30
[   30.645410]  </TASK>
[   30.645716] 
[   30.645939] Allocated by task 274:
[   30.646303]  kasan_save_stack+0x3d/0x60
[   30.646777]  kasan_save_track+0x18/0x40
[   30.647120]  kasan_save_alloc_info+0x3b/0x50
[   30.647539]  __kasan_kmalloc+0xb7/0xc0
[   30.647799]  __kmalloc_cache_noprof+0x184/0x410
[   30.648106]  kasan_atomics+0x96/0x310
[   30.648367]  kunit_try_run_case+0x1b3/0x490
[   30.648814]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   30.649354]  kthread+0x257/0x310
[   30.649746]  ret_from_fork+0x41/0x80
[   30.650148]  ret_from_fork_asm+0x1a/0x30
[   30.650618] 
[   30.650832] The buggy address belongs to the object at ffff888102a59b80
[   30.650832]  which belongs to the cache kmalloc-64 of size 64
[   30.651537] The buggy address is located 0 bytes to the right of
[   30.651537]  allocated 48-byte region [ffff888102a59b80, ffff888102a59bb0)
[   30.652608] 
[   30.652803] The buggy address belongs to the physical page:
[   30.653272] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a59
[   30.653809] flags: 0x200000000000000(node=0|zone=2)
[   30.654137] page_type: f5(slab)
[   30.654519] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   30.655168] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   30.655844] page dumped because: kasan: bad access detected
[   30.656280] 
[   30.656477] Memory state around the buggy address:
[   30.656759]  ffff888102a59a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   30.657149]  ffff888102a59b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   30.657806] >ffff888102a59b80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   30.658467]                                      ^
[   30.658919]  ffff888102a59c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.659545]  ffff888102a59c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.659949] ==================================================================
[   30.141534] ==================================================================
[   30.142477] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x698/0x5450
[   30.143827] Write of size 4 at addr ffff888102a59bb0 by task kunit_try_catch/274
[   30.145712] 
[   30.145969] CPU: 1 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241203 #1
[   30.146813] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.147192] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   30.147802] Call Trace:
[   30.148787]  <TASK>
[   30.148992]  dump_stack_lvl+0x73/0xb0
[   30.149251]  print_report+0xd1/0x640
[   30.149960]  ? __virt_addr_valid+0x1db/0x2d0
[   30.150335]  ? kasan_complete_mode_report_info+0x2a/0x200
[   30.151521]  kasan_report+0x102/0x140
[   30.151835]  ? kasan_atomics_helper+0x698/0x5450
[   30.152241]  ? kasan_atomics_helper+0x698/0x5450
[   30.152986]  kasan_check_range+0x10c/0x1c0
[   30.153347]  __kasan_check_write+0x18/0x20
[   30.154132]  kasan_atomics_helper+0x698/0x5450
[   30.154483]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   30.155173]  ? ret_from_fork_asm+0x1a/0x30
[   30.155696]  ? ret_from_fork+0x41/0x80
[   30.156033]  ? kthread+0x257/0x310
[   30.156387]  kasan_atomics+0x1dd/0x310
[   30.157352]  ? __pfx_kasan_atomics+0x10/0x10
[   30.157735]  ? __pfx_read_tsc+0x10/0x10
[   30.158050]  ? ktime_get_ts64+0x86/0x230
[   30.158704]  kunit_try_run_case+0x1b3/0x490
[   30.159299]  ? __pfx_kunit_try_run_case+0x10/0x10
[   30.159922]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   30.160318]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   30.160764]  ? __kthread_parkme+0x82/0x160
[   30.161205]  ? preempt_count_sub+0x50/0x80
[   30.161651]  ? __pfx_kunit_try_run_case+0x10/0x10
[   30.161947]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   30.162593]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   30.163209]  kthread+0x257/0x310
[   30.163649]  ? __pfx_kthread+0x10/0x10
[   30.164031]  ret_from_fork+0x41/0x80
[   30.164352]  ? __pfx_kthread+0x10/0x10
[   30.164875]  ret_from_fork_asm+0x1a/0x30
[   30.165337]  </TASK>
[   30.165711] 
[   30.165881] Allocated by task 274:
[   30.166276]  kasan_save_stack+0x3d/0x60
[   30.166809]  kasan_save_track+0x18/0x40
[   30.167197]  kasan_save_alloc_info+0x3b/0x50
[   30.167752]  __kasan_kmalloc+0xb7/0xc0
[   30.168150]  __kmalloc_cache_noprof+0x184/0x410
[   30.168631]  kasan_atomics+0x96/0x310
[   30.169075]  kunit_try_run_case+0x1b3/0x490
[   30.169522]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   30.169856]  kthread+0x257/0x310
[   30.170118]  ret_from_fork+0x41/0x80
[   30.170561]  ret_from_fork_asm+0x1a/0x30
[   30.170969] 
[   30.171258] The buggy address belongs to the object at ffff888102a59b80
[   30.171258]  which belongs to the cache kmalloc-64 of size 64
[   30.172455] The buggy address is located 0 bytes to the right of
[   30.172455]  allocated 48-byte region [ffff888102a59b80, ffff888102a59bb0)
[   30.173094] 
[   30.173425] The buggy address belongs to the physical page:
[   30.174157] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a59
[   30.175087] flags: 0x200000000000000(node=0|zone=2)
[   30.175622] page_type: f5(slab)
[   30.175951] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   30.176663] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   30.177323] page dumped because: kasan: bad access detected
[   30.177699] 
[   30.177849] Memory state around the buggy address:
[   30.178152]  ffff888102a59a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   30.179040]  ffff888102a59b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   30.179740] >ffff888102a59b80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   30.180114]                                      ^
[   30.180406]  ffff888102a59c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.181095]  ffff888102a59c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.181680] ==================================================================
[   32.313525] ==================================================================
[   32.314231] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x5117/0x5450
[   32.315019] Read of size 8 at addr ffff888102a59bb0 by task kunit_try_catch/274
[   32.315698] 
[   32.315924] CPU: 1 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241203 #1
[   32.316824] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.317237] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   32.317989] Call Trace:
[   32.318306]  <TASK>
[   32.318598]  dump_stack_lvl+0x73/0xb0
[   32.318888]  print_report+0xd1/0x640
[   32.319222]  ? __virt_addr_valid+0x1db/0x2d0
[   32.319782]  ? kasan_complete_mode_report_info+0x2a/0x200
[   32.320314]  kasan_report+0x102/0x140
[   32.320799]  ? kasan_atomics_helper+0x5117/0x5450
[   32.321135]  ? kasan_atomics_helper+0x5117/0x5450
[   32.321678]  __asan_report_load8_noabort+0x18/0x20
[   32.322200]  kasan_atomics_helper+0x5117/0x5450
[   32.322701]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   32.323123]  ? ret_from_fork_asm+0x1a/0x30
[   32.323502]  ? ret_from_fork+0x41/0x80
[   32.323901]  ? kthread+0x257/0x310
[   32.324309]  kasan_atomics+0x1dd/0x310
[   32.324828]  ? __pfx_kasan_atomics+0x10/0x10
[   32.325284]  ? __pfx_read_tsc+0x10/0x10
[   32.325760]  ? ktime_get_ts64+0x86/0x230
[   32.326231]  kunit_try_run_case+0x1b3/0x490
[   32.326702]  ? __pfx_kunit_try_run_case+0x10/0x10
[   32.327016]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   32.327521]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   32.327902]  ? __kthread_parkme+0x82/0x160
[   32.328367]  ? preempt_count_sub+0x50/0x80
[   32.328856]  ? __pfx_kunit_try_run_case+0x10/0x10
[   32.329376]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   32.329879]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   32.330234]  kthread+0x257/0x310
[   32.330525]  ? __pfx_kthread+0x10/0x10
[   32.330917]  ret_from_fork+0x41/0x80
[   32.331333]  ? __pfx_kthread+0x10/0x10
[   32.331826]  ret_from_fork_asm+0x1a/0x30
[   32.332330]  </TASK>
[   32.332661] 
[   32.332874] Allocated by task 274:
[   32.333433]  kasan_save_stack+0x3d/0x60
[   32.334606]  kasan_save_track+0x18/0x40
[   32.335096]  kasan_save_alloc_info+0x3b/0x50
[   32.335553]  __kasan_kmalloc+0xb7/0xc0
[   32.335937]  __kmalloc_cache_noprof+0x184/0x410
[   32.336278]  kasan_atomics+0x96/0x310
[   32.336545]  kunit_try_run_case+0x1b3/0x490
[   32.336822]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   32.337304]  kthread+0x257/0x310
[   32.337743]  ret_from_fork+0x41/0x80
[   32.338144]  ret_from_fork_asm+0x1a/0x30
[   32.338587] 
[   32.338801] The buggy address belongs to the object at ffff888102a59b80
[   32.338801]  which belongs to the cache kmalloc-64 of size 64
[   32.339839] The buggy address is located 0 bytes to the right of
[   32.339839]  allocated 48-byte region [ffff888102a59b80, ffff888102a59bb0)
[   32.340875] 
[   32.341113] The buggy address belongs to the physical page:
[   32.341520] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a59
[   32.342123] flags: 0x200000000000000(node=0|zone=2)
[   32.342605] page_type: f5(slab)
[   32.342967] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   32.343532] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   32.344123] page dumped because: kasan: bad access detected
[   32.344517] 
[   32.344671] Memory state around the buggy address:
[   32.345007]  ffff888102a59a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.345378]  ffff888102a59b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.346094] >ffff888102a59b80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   32.346775]                                      ^
[   32.347295]  ffff888102a59c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.347968]  ffff888102a59c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.348653] ==================================================================
[   32.123846] ==================================================================
[   32.124382] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x20c9/0x5450
[   32.124852] Write of size 8 at addr ffff888102a59bb0 by task kunit_try_catch/274
[   32.126516] 
[   32.126771] CPU: 1 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241203 #1
[   32.127515] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.127909] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   32.128579] Call Trace:
[   32.128843]  <TASK>
[   32.129133]  dump_stack_lvl+0x73/0xb0
[   32.129570]  print_report+0xd1/0x640
[   32.129906]  ? __virt_addr_valid+0x1db/0x2d0
[   32.130247]  ? kasan_complete_mode_report_info+0x2a/0x200
[   32.130640]  kasan_report+0x102/0x140
[   32.131047]  ? kasan_atomics_helper+0x20c9/0x5450
[   32.131565]  ? kasan_atomics_helper+0x20c9/0x5450
[   32.132048]  kasan_check_range+0x10c/0x1c0
[   32.132529]  __kasan_check_write+0x18/0x20
[   32.132867]  kasan_atomics_helper+0x20c9/0x5450
[   32.133261]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   32.133680]  ? ret_from_fork_asm+0x1a/0x30
[   32.133971]  ? ret_from_fork+0x41/0x80
[   32.134361]  ? kthread+0x257/0x310
[   32.134830]  kasan_atomics+0x1dd/0x310
[   32.135259]  ? __pfx_kasan_atomics+0x10/0x10
[   32.135607]  ? __pfx_read_tsc+0x10/0x10
[   32.136003]  ? ktime_get_ts64+0x86/0x230
[   32.136364]  kunit_try_run_case+0x1b3/0x490
[   32.136713]  ? __pfx_kunit_try_run_case+0x10/0x10
[   32.137012]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   32.137540]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   32.138034]  ? __kthread_parkme+0x82/0x160
[   32.138511]  ? preempt_count_sub+0x50/0x80
[   32.138932]  ? __pfx_kunit_try_run_case+0x10/0x10
[   32.139414]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   32.139973]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   32.141469]  kthread+0x257/0x310
[   32.141734]  ? __pfx_kthread+0x10/0x10
[   32.141994]  ret_from_fork+0x41/0x80
[   32.142270]  ? __pfx_kthread+0x10/0x10
[   32.142671]  ret_from_fork_asm+0x1a/0x30
[   32.143192]  </TASK>
[   32.143393] 
[   32.143581] Allocated by task 274:
[   32.143959]  kasan_save_stack+0x3d/0x60
[   32.144426]  kasan_save_track+0x18/0x40
[   32.144877]  kasan_save_alloc_info+0x3b/0x50
[   32.145333]  __kasan_kmalloc+0xb7/0xc0
[   32.145701]  __kmalloc_cache_noprof+0x184/0x410
[   32.146181]  kasan_atomics+0x96/0x310
[   32.146489]  kunit_try_run_case+0x1b3/0x490
[   32.146777]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   32.147244]  kthread+0x257/0x310
[   32.147649]  ret_from_fork+0x41/0x80
[   32.148026]  ret_from_fork_asm+0x1a/0x30
[   32.148520] 
[   32.148776] The buggy address belongs to the object at ffff888102a59b80
[   32.148776]  which belongs to the cache kmalloc-64 of size 64
[   32.149548] The buggy address is located 0 bytes to the right of
[   32.149548]  allocated 48-byte region [ffff888102a59b80, ffff888102a59bb0)
[   32.150573] 
[   32.150795] The buggy address belongs to the physical page:
[   32.151328] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a59
[   32.151912] flags: 0x200000000000000(node=0|zone=2)
[   32.152414] page_type: f5(slab)
[   32.152806] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   32.153315] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   32.153986] page dumped because: kasan: bad access detected
[   32.154431] 
[   32.154624] Memory state around the buggy address:
[   32.155131]  ffff888102a59a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.155794]  ffff888102a59b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.156289] >ffff888102a59b80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   32.156903]                                      ^
[   32.157399]  ffff888102a59c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.157848]  ffff888102a59c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.158421] ==================================================================
[   31.477670] ==================================================================
[   31.479676] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1819/0x5450
[   31.480669] Write of size 8 at addr ffff888102a59bb0 by task kunit_try_catch/274
[   31.481190] 
[   31.481485] CPU: 1 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241203 #1
[   31.482619] Tainted: [B]=BAD_PAGE, [N]=TEST
[   31.483127] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   31.484025] Call Trace:
[   31.484483]  <TASK>
[   31.484742]  dump_stack_lvl+0x73/0xb0
[   31.485130]  print_report+0xd1/0x640
[   31.485541]  ? __virt_addr_valid+0x1db/0x2d0
[   31.485914]  ? kasan_complete_mode_report_info+0x2a/0x200
[   31.486545]  kasan_report+0x102/0x140
[   31.486992]  ? kasan_atomics_helper+0x1819/0x5450
[   31.487563]  ? kasan_atomics_helper+0x1819/0x5450
[   31.488033]  kasan_check_range+0x10c/0x1c0
[   31.488583]  __kasan_check_write+0x18/0x20
[   31.489045]  kasan_atomics_helper+0x1819/0x5450
[   31.489631]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   31.490071]  ? ret_from_fork_asm+0x1a/0x30
[   31.490527]  ? ret_from_fork+0x41/0x80
[   31.491021]  ? kthread+0x257/0x310
[   31.491419]  kasan_atomics+0x1dd/0x310
[   31.491924]  ? __pfx_kasan_atomics+0x10/0x10
[   31.492358]  ? __pfx_read_tsc+0x10/0x10
[   31.492714]  ? ktime_get_ts64+0x86/0x230
[   31.493260]  kunit_try_run_case+0x1b3/0x490
[   31.493818]  ? __pfx_kunit_try_run_case+0x10/0x10
[   31.494303]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   31.494814]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   31.495332]  ? __kthread_parkme+0x82/0x160
[   31.495791]  ? preempt_count_sub+0x50/0x80
[   31.496244]  ? __pfx_kunit_try_run_case+0x10/0x10
[   31.496672]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   31.497285]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   31.497908]  kthread+0x257/0x310
[   31.498233]  ? __pfx_kthread+0x10/0x10
[   31.498732]  ret_from_fork+0x41/0x80
[   31.499142]  ? __pfx_kthread+0x10/0x10
[   31.499569]  ret_from_fork_asm+0x1a/0x30
[   31.500019]  </TASK>
[   31.500336] 
[   31.500604] Allocated by task 274:
[   31.501016]  kasan_save_stack+0x3d/0x60
[   31.501493]  kasan_save_track+0x18/0x40
[   31.501952]  kasan_save_alloc_info+0x3b/0x50
[   31.502380]  __kasan_kmalloc+0xb7/0xc0
[   31.502848]  __kmalloc_cache_noprof+0x184/0x410
[   31.503227]  kasan_atomics+0x96/0x310
[   31.503732]  kunit_try_run_case+0x1b3/0x490
[   31.504228]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   31.504761]  kthread+0x257/0x310
[   31.505097]  ret_from_fork+0x41/0x80
[   31.505590]  ret_from_fork_asm+0x1a/0x30
[   31.505920] 
[   31.506154] The buggy address belongs to the object at ffff888102a59b80
[   31.506154]  which belongs to the cache kmalloc-64 of size 64
[   31.507031] The buggy address is located 0 bytes to the right of
[   31.507031]  allocated 48-byte region [ffff888102a59b80, ffff888102a59bb0)
[   31.508090] 
[   31.508370] The buggy address belongs to the physical page:
[   31.508871] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a59
[   31.509599] flags: 0x200000000000000(node=0|zone=2)
[   31.510118] page_type: f5(slab)
[   31.510518] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   31.511002] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   31.511737] page dumped because: kasan: bad access detected
[   31.512197] 
[   31.512350] Memory state around the buggy address:
[   31.512896]  ffff888102a59a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   31.513486]  ffff888102a59b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   31.514021] >ffff888102a59b80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   31.514685]                                      ^
[   31.515083]  ffff888102a59c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.515787]  ffff888102a59c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.516307] ==================================================================
[   31.081181] ==================================================================
[   31.082035] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x49d0/0x5450
[   31.082759] Read of size 4 at addr ffff888102a59bb0 by task kunit_try_catch/274
[   31.083269] 
[   31.083582] CPU: 1 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241203 #1
[   31.084236] Tainted: [B]=BAD_PAGE, [N]=TEST
[   31.084681] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   31.085300] Call Trace:
[   31.085655]  <TASK>
[   31.085907]  dump_stack_lvl+0x73/0xb0
[   31.086340]  print_report+0xd1/0x640
[   31.086800]  ? __virt_addr_valid+0x1db/0x2d0
[   31.087217]  ? kasan_complete_mode_report_info+0x2a/0x200
[   31.087773]  kasan_report+0x102/0x140
[   31.088216]  ? kasan_atomics_helper+0x49d0/0x5450
[   31.088675]  ? kasan_atomics_helper+0x49d0/0x5450
[   31.089180]  __asan_report_load4_noabort+0x18/0x20
[   31.089595]  kasan_atomics_helper+0x49d0/0x5450
[   31.089901]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   31.090340]  ? ret_from_fork_asm+0x1a/0x30
[   31.090854]  ? ret_from_fork+0x41/0x80
[   31.091270]  ? kthread+0x257/0x310
[   31.091729]  kasan_atomics+0x1dd/0x310
[   31.092165]  ? __pfx_kasan_atomics+0x10/0x10
[   31.092698]  ? __pfx_read_tsc+0x10/0x10
[   31.093084]  ? ktime_get_ts64+0x86/0x230
[   31.093407]  kunit_try_run_case+0x1b3/0x490
[   31.093929]  ? __pfx_kunit_try_run_case+0x10/0x10
[   31.094320]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   31.094872]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   31.095213]  ? __kthread_parkme+0x82/0x160
[   31.095706]  ? preempt_count_sub+0x50/0x80
[   31.096161]  ? __pfx_kunit_try_run_case+0x10/0x10
[   31.096669]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   31.097211]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   31.097729]  kthread+0x257/0x310
[   31.098098]  ? __pfx_kthread+0x10/0x10
[   31.098581]  ret_from_fork+0x41/0x80
[   31.098924]  ? __pfx_kthread+0x10/0x10
[   31.099214]  ret_from_fork_asm+0x1a/0x30
[   31.099570]  </TASK>
[   31.099801] 
[   31.099960] Allocated by task 274:
[   31.100204]  kasan_save_stack+0x3d/0x60
[   31.100535]  kasan_save_track+0x18/0x40
[   31.100789]  kasan_save_alloc_info+0x3b/0x50
[   31.101221]  __kasan_kmalloc+0xb7/0xc0
[   31.101623]  __kmalloc_cache_noprof+0x184/0x410
[   31.102072]  kasan_atomics+0x96/0x310
[   31.102479]  kunit_try_run_case+0x1b3/0x490
[   31.102903]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   31.103416]  kthread+0x257/0x310
[   31.103810]  ret_from_fork+0x41/0x80
[   31.104195]  ret_from_fork_asm+0x1a/0x30
[   31.104593] 
[   31.104746] The buggy address belongs to the object at ffff888102a59b80
[   31.104746]  which belongs to the cache kmalloc-64 of size 64
[   31.105386] The buggy address is located 0 bytes to the right of
[   31.105386]  allocated 48-byte region [ffff888102a59b80, ffff888102a59bb0)
[   31.106411] 
[   31.106672] The buggy address belongs to the physical page:
[   31.107153] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a59
[   31.107739] flags: 0x200000000000000(node=0|zone=2)
[   31.108135] page_type: f5(slab)
[   31.108496] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   31.109760] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   31.110871] page dumped because: kasan: bad access detected
[   31.111327] 
[   31.111532] Memory state around the buggy address:
[   31.111881]  ffff888102a59a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   31.114216]  ffff888102a59b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   31.115037] >ffff888102a59b80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   31.115594]                                      ^
[   31.115922]  ffff888102a59c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.116478]  ffff888102a59c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.116934] ==================================================================
[   32.085868] ==================================================================
[   32.086523] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4f9a/0x5450
[   32.087198] Read of size 8 at addr ffff888102a59bb0 by task kunit_try_catch/274
[   32.087849] 
[   32.088101] CPU: 1 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241203 #1
[   32.088967] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.089378] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   32.090138] Call Trace:
[   32.090474]  <TASK>
[   32.090759]  dump_stack_lvl+0x73/0xb0
[   32.091200]  print_report+0xd1/0x640
[   32.091647]  ? __virt_addr_valid+0x1db/0x2d0
[   32.092076]  ? kasan_complete_mode_report_info+0x2a/0x200
[   32.092425]  kasan_report+0x102/0x140
[   32.092734]  ? kasan_atomics_helper+0x4f9a/0x5450
[   32.093121]  ? kasan_atomics_helper+0x4f9a/0x5450
[   32.093640]  __asan_report_load8_noabort+0x18/0x20
[   32.094121]  kasan_atomics_helper+0x4f9a/0x5450
[   32.094615]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   32.095145]  ? ret_from_fork_asm+0x1a/0x30
[   32.095626]  ? ret_from_fork+0x41/0x80
[   32.095959]  ? kthread+0x257/0x310
[   32.096246]  kasan_atomics+0x1dd/0x310
[   32.096573]  ? __pfx_kasan_atomics+0x10/0x10
[   32.096953]  ? __pfx_read_tsc+0x10/0x10
[   32.097364]  ? ktime_get_ts64+0x86/0x230
[   32.097812]  kunit_try_run_case+0x1b3/0x490
[   32.098263]  ? __pfx_kunit_try_run_case+0x10/0x10
[   32.098774]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   32.099263]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   32.099770]  ? __kthread_parkme+0x82/0x160
[   32.100191]  ? preempt_count_sub+0x50/0x80
[   32.100665]  ? __pfx_kunit_try_run_case+0x10/0x10
[   32.101126]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   32.101517]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   32.102024]  kthread+0x257/0x310
[   32.102398]  ? __pfx_kthread+0x10/0x10
[   32.102838]  ret_from_fork+0x41/0x80
[   32.103243]  ? __pfx_kthread+0x10/0x10
[   32.103576]  ret_from_fork_asm+0x1a/0x30
[   32.104017]  </TASK>
[   32.104256] 
[   32.104419] Allocated by task 274:
[   32.104829]  kasan_save_stack+0x3d/0x60
[   32.105240]  kasan_save_track+0x18/0x40
[   32.105661]  kasan_save_alloc_info+0x3b/0x50
[   32.106109]  __kasan_kmalloc+0xb7/0xc0
[   32.106420]  __kmalloc_cache_noprof+0x184/0x410
[   32.106756]  kasan_atomics+0x96/0x310
[   32.107142]  kunit_try_run_case+0x1b3/0x490
[   32.107566]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   32.108081]  kthread+0x257/0x310
[   32.108438]  ret_from_fork+0x41/0x80
[   32.108789]  ret_from_fork_asm+0x1a/0x30
[   32.110695] 
[   32.111676] The buggy address belongs to the object at ffff888102a59b80
[   32.111676]  which belongs to the cache kmalloc-64 of size 64
[   32.113573] The buggy address is located 0 bytes to the right of
[   32.113573]  allocated 48-byte region [ffff888102a59b80, ffff888102a59bb0)
[   32.114500] 
[   32.114668] The buggy address belongs to the physical page:
[   32.115493] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a59
[   32.116123] flags: 0x200000000000000(node=0|zone=2)
[   32.116431] page_type: f5(slab)
[   32.116823] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   32.117389] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   32.117926] page dumped because: kasan: bad access detected
[   32.118277] 
[   32.118526] Memory state around the buggy address:
[   32.118948]  ffff888102a59a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.119491]  ffff888102a59b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.120003] >ffff888102a59b80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   32.120627]                                      ^
[   32.120978]  ffff888102a59c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.121697]  ffff888102a59c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.122165] ==================================================================
[   31.192087] ==================================================================
[   31.192713] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1468/0x5450
[   31.193347] Write of size 8 at addr ffff888102a59bb0 by task kunit_try_catch/274
[   31.193893] 
[   31.194153] CPU: 1 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241203 #1
[   31.194815] Tainted: [B]=BAD_PAGE, [N]=TEST
[   31.195069] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   31.195737] Call Trace:
[   31.196038]  <TASK>
[   31.196325]  dump_stack_lvl+0x73/0xb0
[   31.196682]  print_report+0xd1/0x640
[   31.196961]  ? __virt_addr_valid+0x1db/0x2d0
[   31.197408]  ? kasan_complete_mode_report_info+0x2a/0x200
[   31.197968]  kasan_report+0x102/0x140
[   31.198368]  ? kasan_atomics_helper+0x1468/0x5450
[   31.198860]  ? kasan_atomics_helper+0x1468/0x5450
[   31.199320]  kasan_check_range+0x10c/0x1c0
[   31.199659]  __kasan_check_write+0x18/0x20
[   31.199972]  kasan_atomics_helper+0x1468/0x5450
[   31.200498]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   31.200968]  ? ret_from_fork_asm+0x1a/0x30
[   31.201846]  ? ret_from_fork+0x41/0x80
[   31.202270]  ? kthread+0x257/0x310
[   31.202671]  kasan_atomics+0x1dd/0x310
[   31.203090]  ? __pfx_kasan_atomics+0x10/0x10
[   31.204319]  ? __pfx_read_tsc+0x10/0x10
[   31.204879]  ? ktime_get_ts64+0x86/0x230
[   31.205464]  kunit_try_run_case+0x1b3/0x490
[   31.206033]  ? __pfx_kunit_try_run_case+0x10/0x10
[   31.206567]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   31.206915]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   31.207688]  ? __kthread_parkme+0x82/0x160
[   31.208244]  ? preempt_count_sub+0x50/0x80
[   31.208743]  ? __pfx_kunit_try_run_case+0x10/0x10
[   31.209281]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   31.209660]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   31.210378]  kthread+0x257/0x310
[   31.210875]  ? __pfx_kthread+0x10/0x10
[   31.211393]  ret_from_fork+0x41/0x80
[   31.211901]  ? __pfx_kthread+0x10/0x10
[   31.212363]  ret_from_fork_asm+0x1a/0x30
[   31.212936]  </TASK>
[   31.213172] 
[   31.213343] Allocated by task 274:
[   31.213780]  kasan_save_stack+0x3d/0x60
[   31.214210]  kasan_save_track+0x18/0x40
[   31.214621]  kasan_save_alloc_info+0x3b/0x50
[   31.215029]  __kasan_kmalloc+0xb7/0xc0
[   31.215476]  __kmalloc_cache_noprof+0x184/0x410
[   31.215900]  kasan_atomics+0x96/0x310
[   31.216349]  kunit_try_run_case+0x1b3/0x490
[   31.216770]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   31.217283]  kthread+0x257/0x310
[   31.217672]  ret_from_fork+0x41/0x80
[   31.217933]  ret_from_fork_asm+0x1a/0x30
[   31.218372] 
[   31.218618] The buggy address belongs to the object at ffff888102a59b80
[   31.218618]  which belongs to the cache kmalloc-64 of size 64
[   31.219642] The buggy address is located 0 bytes to the right of
[   31.219642]  allocated 48-byte region [ffff888102a59b80, ffff888102a59bb0)
[   31.220552] 
[   31.220801] The buggy address belongs to the physical page:
[   31.221233] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a59
[   31.221783] flags: 0x200000000000000(node=0|zone=2)
[   31.222301] page_type: f5(slab)
[   31.222689] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   31.223357] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   31.224018] page dumped because: kasan: bad access detected
[   31.224605] 
[   31.224759] Memory state around the buggy address:
[   31.225100]  ffff888102a59a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   31.225763]  ffff888102a59b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   31.226233] >ffff888102a59b80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   31.226897]                                      ^
[   31.227348]  ffff888102a59c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.227867]  ffff888102a59c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.228325] ==================================================================
[   31.229523] ==================================================================
[   31.230509] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x50d6/0x5450
[   31.231091] Write of size 8 at addr ffff888102a59bb0 by task kunit_try_catch/274
[   31.231663] 
[   31.231942] CPU: 1 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241203 #1
[   31.233511] Tainted: [B]=BAD_PAGE, [N]=TEST
[   31.233767] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   31.235847] Call Trace:
[   31.236107]  <TASK>
[   31.236307]  dump_stack_lvl+0x73/0xb0
[   31.237131]  print_report+0xd1/0x640
[   31.237436]  ? __virt_addr_valid+0x1db/0x2d0
[   31.238190]  ? kasan_complete_mode_report_info+0x2a/0x200
[   31.238840]  kasan_report+0x102/0x140
[   31.239207]  ? kasan_atomics_helper+0x50d6/0x5450
[   31.239903]  ? kasan_atomics_helper+0x50d6/0x5450
[   31.240508]  __asan_report_store8_noabort+0x1b/0x30
[   31.241049]  kasan_atomics_helper+0x50d6/0x5450
[   31.241398]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   31.241729]  ? ret_from_fork_asm+0x1a/0x30
[   31.242178]  ? ret_from_fork+0x41/0x80
[   31.242694]  ? kthread+0x257/0x310
[   31.243380]  kasan_atomics+0x1dd/0x310
[   31.243896]  ? __pfx_kasan_atomics+0x10/0x10
[   31.244745]  ? __pfx_read_tsc+0x10/0x10
[   31.245203]  ? ktime_get_ts64+0x86/0x230
[   31.245739]  kunit_try_run_case+0x1b3/0x490
[   31.246156]  ? __pfx_kunit_try_run_case+0x10/0x10
[   31.246953]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   31.247614]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   31.248112]  ? __kthread_parkme+0x82/0x160
[   31.248822]  ? preempt_count_sub+0x50/0x80
[   31.249268]  ? __pfx_kunit_try_run_case+0x10/0x10
[   31.249997]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   31.250862]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   31.251290]  kthread+0x257/0x310
[   31.251834]  ? __pfx_kthread+0x10/0x10
[   31.252153]  ret_from_fork+0x41/0x80
[   31.252813]  ? __pfx_kthread+0x10/0x10
[   31.253240]  ret_from_fork_asm+0x1a/0x30
[   31.253880]  </TASK>
[   31.254208] 
[   31.254688] Allocated by task 274:
[   31.255008]  kasan_save_stack+0x3d/0x60
[   31.255372]  kasan_save_track+0x18/0x40
[   31.256192]  kasan_save_alloc_info+0x3b/0x50
[   31.256913]  __kasan_kmalloc+0xb7/0xc0
[   31.257257]  __kmalloc_cache_noprof+0x184/0x410
[   31.258032]  kasan_atomics+0x96/0x310
[   31.258995]  kunit_try_run_case+0x1b3/0x490
[   31.259383]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   31.260285]  kthread+0x257/0x310
[   31.260839]  ret_from_fork+0x41/0x80
[   31.261241]  ret_from_fork_asm+0x1a/0x30
[   31.262037] 
[   31.262215] The buggy address belongs to the object at ffff888102a59b80
[   31.262215]  which belongs to the cache kmalloc-64 of size 64
[   31.263136] The buggy address is located 0 bytes to the right of
[   31.263136]  allocated 48-byte region [ffff888102a59b80, ffff888102a59bb0)
[   31.264281] 
[   31.265093] The buggy address belongs to the physical page:
[   31.265451] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a59
[   31.266411] flags: 0x200000000000000(node=0|zone=2)
[   31.266868] page_type: f5(slab)
[   31.267147] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   31.268161] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   31.268557] page dumped because: kasan: bad access detected
[   31.269109] 
[   31.269260] Memory state around the buggy address:
[   31.269789]  ffff888102a59a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   31.270268]  ffff888102a59b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   31.271680] >ffff888102a59b80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   31.272142]                                      ^
[   31.273000]  ffff888102a59c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.273478]  ffff888102a59c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.274220] ==================================================================
[   31.005348] ==================================================================
[   31.006047] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x49ea/0x5450
[   31.006746] Read of size 4 at addr ffff888102a59bb0 by task kunit_try_catch/274
[   31.007356] 
[   31.007629] CPU: 1 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241203 #1
[   31.008506] Tainted: [B]=BAD_PAGE, [N]=TEST
[   31.008802] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   31.009250] Call Trace:
[   31.009487]  <TASK>
[   31.009768]  dump_stack_lvl+0x73/0xb0
[   31.010212]  print_report+0xd1/0x640
[   31.010646]  ? __virt_addr_valid+0x1db/0x2d0
[   31.011112]  ? kasan_complete_mode_report_info+0x2a/0x200
[   31.011677]  kasan_report+0x102/0x140
[   31.012090]  ? kasan_atomics_helper+0x49ea/0x5450
[   31.012604]  ? kasan_atomics_helper+0x49ea/0x5450
[   31.012987]  __asan_report_load4_noabort+0x18/0x20
[   31.013319]  kasan_atomics_helper+0x49ea/0x5450
[   31.013666]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   31.014157]  ? ret_from_fork_asm+0x1a/0x30
[   31.014619]  ? ret_from_fork+0x41/0x80
[   31.015022]  ? kthread+0x257/0x310
[   31.017075]  kasan_atomics+0x1dd/0x310
[   31.017514]  ? __pfx_kasan_atomics+0x10/0x10
[   31.017945]  ? __pfx_read_tsc+0x10/0x10
[   31.018374]  ? ktime_get_ts64+0x86/0x230
[   31.018787]  kunit_try_run_case+0x1b3/0x490
[   31.021646]  ? __pfx_kunit_try_run_case+0x10/0x10
[   31.022172]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   31.022645]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   31.023156]  ? __kthread_parkme+0x82/0x160
[   31.023464]  ? preempt_count_sub+0x50/0x80
[   31.023879]  ? __pfx_kunit_try_run_case+0x10/0x10
[   31.024324]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   31.024743]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   31.025179]  kthread+0x257/0x310
[   31.025581]  ? __pfx_kthread+0x10/0x10
[   31.025965]  ret_from_fork+0x41/0x80
[   31.026379]  ? __pfx_kthread+0x10/0x10
[   31.026776]  ret_from_fork_asm+0x1a/0x30
[   31.027096]  </TASK>
[   31.027375] 
[   31.027639] Allocated by task 274:
[   31.027993]  kasan_save_stack+0x3d/0x60
[   31.028496]  kasan_save_track+0x18/0x40
[   31.028877]  kasan_save_alloc_info+0x3b/0x50
[   31.029168]  __kasan_kmalloc+0xb7/0xc0
[   31.029573]  __kmalloc_cache_noprof+0x184/0x410
[   31.030027]  kasan_atomics+0x96/0x310
[   31.030584]  kunit_try_run_case+0x1b3/0x490
[   31.030874]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   31.031210]  kthread+0x257/0x310
[   31.031596]  ret_from_fork+0x41/0x80
[   31.032005]  ret_from_fork_asm+0x1a/0x30
[   31.032475] 
[   31.032695] The buggy address belongs to the object at ffff888102a59b80
[   31.032695]  which belongs to the cache kmalloc-64 of size 64
[   31.033610] The buggy address is located 0 bytes to the right of
[   31.033610]  allocated 48-byte region [ffff888102a59b80, ffff888102a59bb0)
[   31.034258] 
[   31.034522] The buggy address belongs to the physical page:
[   31.035016] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a59
[   31.035738] flags: 0x200000000000000(node=0|zone=2)
[   31.036198] page_type: f5(slab)
[   31.036586] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   31.037136] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   31.037758] page dumped because: kasan: bad access detected
[   31.038218] 
[   31.038372] Memory state around the buggy address:
[   31.038690]  ffff888102a59a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   31.039313]  ffff888102a59b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   31.039962] >ffff888102a59b80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   31.040615]                                      ^
[   31.041076]  ffff888102a59c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.041508]  ffff888102a59c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.041995] ==================================================================
[   30.101010] ==================================================================
[   30.102511] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x5ff/0x5450
[   30.103351] Write of size 4 at addr ffff888102a59bb0 by task kunit_try_catch/274
[   30.104040] 
[   30.104326] CPU: 1 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241203 #1
[   30.105182] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.105651] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   30.106389] Call Trace:
[   30.106725]  <TASK>
[   30.106918]  dump_stack_lvl+0x73/0xb0
[   30.107223]  print_report+0xd1/0x640
[   30.107804]  ? __virt_addr_valid+0x1db/0x2d0
[   30.108278]  ? kasan_complete_mode_report_info+0x2a/0x200
[   30.108956]  kasan_report+0x102/0x140
[   30.109381]  ? kasan_atomics_helper+0x5ff/0x5450
[   30.109877]  ? kasan_atomics_helper+0x5ff/0x5450
[   30.110398]  kasan_check_range+0x10c/0x1c0
[   30.110878]  __kasan_check_write+0x18/0x20
[   30.111374]  kasan_atomics_helper+0x5ff/0x5450
[   30.112632]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   30.113138]  ? ret_from_fork_asm+0x1a/0x30
[   30.113587]  ? ret_from_fork+0x41/0x80
[   30.113989]  ? kthread+0x257/0x310
[   30.116927]  kasan_atomics+0x1dd/0x310
[   30.117380]  ? __pfx_kasan_atomics+0x10/0x10
[   30.117822]  ? __pfx_read_tsc+0x10/0x10
[   30.118209]  ? ktime_get_ts64+0x86/0x230
[   30.118715]  kunit_try_run_case+0x1b3/0x490
[   30.119049]  ? __pfx_kunit_try_run_case+0x10/0x10
[   30.119601]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   30.120034]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   30.120608]  ? __kthread_parkme+0x82/0x160
[   30.120965]  ? preempt_count_sub+0x50/0x80
[   30.121273]  ? __pfx_kunit_try_run_case+0x10/0x10
[   30.121819]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   30.122390]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   30.122932]  kthread+0x257/0x310
[   30.123204]  ? __pfx_kthread+0x10/0x10
[   30.123688]  ret_from_fork+0x41/0x80
[   30.124103]  ? __pfx_kthread+0x10/0x10
[   30.124551]  ret_from_fork_asm+0x1a/0x30
[   30.124911]  </TASK>
[   30.125226] 
[   30.125478] Allocated by task 274:
[   30.125713]  kasan_save_stack+0x3d/0x60
[   30.126151]  kasan_save_track+0x18/0x40
[   30.126639]  kasan_save_alloc_info+0x3b/0x50
[   30.127096]  __kasan_kmalloc+0xb7/0xc0
[   30.127492]  __kmalloc_cache_noprof+0x184/0x410
[   30.127834]  kasan_atomics+0x96/0x310
[   30.128117]  kunit_try_run_case+0x1b3/0x490
[   30.128618]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   30.129139]  kthread+0x257/0x310
[   30.129414]  ret_from_fork+0x41/0x80
[   30.129882]  ret_from_fork_asm+0x1a/0x30
[   30.130214] 
[   30.130369] The buggy address belongs to the object at ffff888102a59b80
[   30.130369]  which belongs to the cache kmalloc-64 of size 64
[   30.131175] The buggy address is located 0 bytes to the right of
[   30.131175]  allocated 48-byte region [ffff888102a59b80, ffff888102a59bb0)
[   30.132227] 
[   30.132520] The buggy address belongs to the physical page:
[   30.132864] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a59
[   30.133507] flags: 0x200000000000000(node=0|zone=2)
[   30.133808] page_type: f5(slab)
[   30.134156] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   30.134947] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   30.135650] page dumped because: kasan: bad access detected
[   30.136132] 
[   30.136284] Memory state around the buggy address:
[   30.136803]  ffff888102a59a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   30.137411]  ffff888102a59b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   30.137855] >ffff888102a59b80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   30.138519]                                      ^
[   30.138908]  ffff888102a59c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.139513]  ffff888102a59c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.139905] ==================================================================
[   32.198934] ==================================================================
[   32.199379] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x218b/0x5450
[   32.200228] Write of size 8 at addr ffff888102a59bb0 by task kunit_try_catch/274
[   32.200832] 
[   32.201141] CPU: 1 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241203 #1
[   32.201895] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.202353] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   32.202988] Call Trace:
[   32.203306]  <TASK>
[   32.203676]  dump_stack_lvl+0x73/0xb0
[   32.204167]  print_report+0xd1/0x640
[   32.204560]  ? __virt_addr_valid+0x1db/0x2d0
[   32.205148]  ? kasan_complete_mode_report_info+0x2a/0x200
[   32.205685]  kasan_report+0x102/0x140
[   32.206109]  ? kasan_atomics_helper+0x218b/0x5450
[   32.206605]  ? kasan_atomics_helper+0x218b/0x5450
[   32.207088]  kasan_check_range+0x10c/0x1c0
[   32.207489]  __kasan_check_write+0x18/0x20
[   32.207912]  kasan_atomics_helper+0x218b/0x5450
[   32.208502]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   32.208966]  ? ret_from_fork_asm+0x1a/0x30
[   32.209479]  ? ret_from_fork+0x41/0x80
[   32.209896]  ? kthread+0x257/0x310
[   32.210305]  kasan_atomics+0x1dd/0x310
[   32.210746]  ? __pfx_kasan_atomics+0x10/0x10
[   32.211233]  ? __pfx_read_tsc+0x10/0x10
[   32.211558]  ? ktime_get_ts64+0x86/0x230
[   32.212086]  kunit_try_run_case+0x1b3/0x490
[   32.212651]  ? __pfx_kunit_try_run_case+0x10/0x10
[   32.213183]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   32.213742]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   32.214167]  ? __kthread_parkme+0x82/0x160
[   32.214486]  ? preempt_count_sub+0x50/0x80
[   32.215013]  ? __pfx_kunit_try_run_case+0x10/0x10
[   32.215591]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   32.216226]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   32.216771]  kthread+0x257/0x310
[   32.217209]  ? __pfx_kthread+0x10/0x10
[   32.217518]  ret_from_fork+0x41/0x80
[   32.217926]  ? __pfx_kthread+0x10/0x10
[   32.218310]  ret_from_fork_asm+0x1a/0x30
[   32.218824]  </TASK>
[   32.219132] 
[   32.219345] Allocated by task 274:
[   32.219739]  kasan_save_stack+0x3d/0x60
[   32.220145]  kasan_save_track+0x18/0x40
[   32.220583]  kasan_save_alloc_info+0x3b/0x50
[   32.221014]  __kasan_kmalloc+0xb7/0xc0
[   32.221424]  __kmalloc_cache_noprof+0x184/0x410
[   32.221988]  kasan_atomics+0x96/0x310
[   32.222398]  kunit_try_run_case+0x1b3/0x490
[   32.222931]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   32.223549]  kthread+0x257/0x310
[   32.223968]  ret_from_fork+0x41/0x80
[   32.224464]  ret_from_fork_asm+0x1a/0x30
[   32.224994] 
[   32.225226] The buggy address belongs to the object at ffff888102a59b80
[   32.225226]  which belongs to the cache kmalloc-64 of size 64
[   32.226285] The buggy address is located 0 bytes to the right of
[   32.226285]  allocated 48-byte region [ffff888102a59b80, ffff888102a59bb0)
[   32.227209] 
[   32.227410] The buggy address belongs to the physical page:
[   32.227720] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a59
[   32.228137] flags: 0x200000000000000(node=0|zone=2)
[   32.228617] page_type: f5(slab)
[   32.228971] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   32.229772] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   32.230423] page dumped because: kasan: bad access detected
[   32.230944] 
[   32.231234] Memory state around the buggy address:
[   32.231638]  ffff888102a59a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.232276]  ffff888102a59b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.232940] >ffff888102a59b80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   32.234405]                                      ^
[   32.234992]  ffff888102a59c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.235376]  ffff888102a59c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.236526] ==================================================================
[   30.812672] ==================================================================
[   30.813127] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x107a/0x5450
[   30.813532] Write of size 4 at addr ffff888102a59bb0 by task kunit_try_catch/274
[   30.814210] 
[   30.814427] CPU: 1 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241203 #1
[   30.816036] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.816433] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   30.817893] Call Trace:
[   30.818180]  <TASK>
[   30.818374]  dump_stack_lvl+0x73/0xb0
[   30.819343]  print_report+0xd1/0x640
[   30.819962]  ? __virt_addr_valid+0x1db/0x2d0
[   30.820343]  ? kasan_complete_mode_report_info+0x2a/0x200
[   30.820955]  kasan_report+0x102/0x140
[   30.821371]  ? kasan_atomics_helper+0x107a/0x5450
[   30.821912]  ? kasan_atomics_helper+0x107a/0x5450
[   30.822386]  kasan_check_range+0x10c/0x1c0
[   30.822715]  __kasan_check_write+0x18/0x20
[   30.823215]  kasan_atomics_helper+0x107a/0x5450
[   30.823845]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   30.824192]  ? ret_from_fork_asm+0x1a/0x30
[   30.824898]  ? ret_from_fork+0x41/0x80
[   30.825337]  ? kthread+0x257/0x310
[   30.825701]  kasan_atomics+0x1dd/0x310
[   30.826048]  ? __pfx_kasan_atomics+0x10/0x10
[   30.826404]  ? __pfx_read_tsc+0x10/0x10
[   30.826939]  ? ktime_get_ts64+0x86/0x230
[   30.827321]  kunit_try_run_case+0x1b3/0x490
[   30.827625]  ? __pfx_kunit_try_run_case+0x10/0x10
[   30.828137]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   30.828653]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   30.829159]  ? __kthread_parkme+0x82/0x160
[   30.829827]  ? preempt_count_sub+0x50/0x80
[   30.830290]  ? __pfx_kunit_try_run_case+0x10/0x10
[   30.831340]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   30.831945]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   30.832387]  kthread+0x257/0x310
[   30.832900]  ? __pfx_kthread+0x10/0x10
[   30.833256]  ret_from_fork+0x41/0x80
[   30.834198]  ? __pfx_kthread+0x10/0x10
[   30.834785]  ret_from_fork_asm+0x1a/0x30
[   30.835261]  </TASK>
[   30.835457] 
[   30.835646] Allocated by task 274:
[   30.835918]  kasan_save_stack+0x3d/0x60
[   30.836232]  kasan_save_track+0x18/0x40
[   30.837164]  kasan_save_alloc_info+0x3b/0x50
[   30.837467]  __kasan_kmalloc+0xb7/0xc0
[   30.838173]  __kmalloc_cache_noprof+0x184/0x410
[   30.838993]  kasan_atomics+0x96/0x310
[   30.839488]  kunit_try_run_case+0x1b3/0x490
[   30.840115]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   30.840759]  kthread+0x257/0x310
[   30.841113]  ret_from_fork+0x41/0x80
[   30.841427]  ret_from_fork_asm+0x1a/0x30
[   30.842106] 
[   30.842267] The buggy address belongs to the object at ffff888102a59b80
[   30.842267]  which belongs to the cache kmalloc-64 of size 64
[   30.843823] The buggy address is located 0 bytes to the right of
[   30.843823]  allocated 48-byte region [ffff888102a59b80, ffff888102a59bb0)
[   30.844802] 
[   30.845331] The buggy address belongs to the physical page:
[   30.845976] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a59
[   30.846957] flags: 0x200000000000000(node=0|zone=2)
[   30.847655] page_type: f5(slab)
[   30.848043] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   30.848793] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   30.849365] page dumped because: kasan: bad access detected
[   30.849635] 
[   30.849829] Memory state around the buggy address:
[   30.850400]  ffff888102a59a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   30.850886]  ffff888102a59b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   30.851420] >ffff888102a59b80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   30.851928]                                      ^
[   30.852291]  ffff888102a59c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.852912]  ffff888102a59c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.853656] ==================================================================
[   31.729043] ==================================================================
[   31.729946] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1c19/0x5450
[   31.731212] Write of size 8 at addr ffff888102a59bb0 by task kunit_try_catch/274
[   31.732439] 
[   31.732913] CPU: 1 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241203 #1
[   31.733762] Tainted: [B]=BAD_PAGE, [N]=TEST
[   31.734118] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   31.735160] Call Trace:
[   31.735397]  <TASK>
[   31.735939]  dump_stack_lvl+0x73/0xb0
[   31.736287]  print_report+0xd1/0x640
[   31.737338]  ? __virt_addr_valid+0x1db/0x2d0
[   31.738025]  ? kasan_complete_mode_report_info+0x2a/0x200
[   31.738440]  kasan_report+0x102/0x140
[   31.739032]  ? kasan_atomics_helper+0x1c19/0x5450
[   31.739432]  ? kasan_atomics_helper+0x1c19/0x5450
[   31.740317]  kasan_check_range+0x10c/0x1c0
[   31.740732]  __kasan_check_write+0x18/0x20
[   31.741150]  kasan_atomics_helper+0x1c19/0x5450
[   31.741797]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   31.742354]  ? ret_from_fork_asm+0x1a/0x30
[   31.742950]  ? ret_from_fork+0x41/0x80
[   31.743267]  ? kthread+0x257/0x310
[   31.743998]  kasan_atomics+0x1dd/0x310
[   31.744340]  ? __pfx_kasan_atomics+0x10/0x10
[   31.744970]  ? __pfx_read_tsc+0x10/0x10
[   31.745323]  ? ktime_get_ts64+0x86/0x230
[   31.746138]  kunit_try_run_case+0x1b3/0x490
[   31.746434]  ? __pfx_kunit_try_run_case+0x10/0x10
[   31.747351]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   31.747788]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   31.748181]  ? __kthread_parkme+0x82/0x160
[   31.748866]  ? preempt_count_sub+0x50/0x80
[   31.749233]  ? __pfx_kunit_try_run_case+0x10/0x10
[   31.749650]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   31.750531]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   31.751181]  kthread+0x257/0x310
[   31.751663]  ? __pfx_kthread+0x10/0x10
[   31.752163]  ret_from_fork+0x41/0x80
[   31.752497]  ? __pfx_kthread+0x10/0x10
[   31.753133]  ret_from_fork_asm+0x1a/0x30
[   31.753687]  </TASK>
[   31.753872] 
[   31.754095] Allocated by task 274:
[   31.754434]  kasan_save_stack+0x3d/0x60
[   31.755405]  kasan_save_track+0x18/0x40
[   31.755731]  kasan_save_alloc_info+0x3b/0x50
[   31.756071]  __kasan_kmalloc+0xb7/0xc0
[   31.756415]  __kmalloc_cache_noprof+0x184/0x410
[   31.757185]  kasan_atomics+0x96/0x310
[   31.757567]  kunit_try_run_case+0x1b3/0x490
[   31.758430]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   31.758881]  kthread+0x257/0x310
[   31.759249]  ret_from_fork+0x41/0x80
[   31.759593]  ret_from_fork_asm+0x1a/0x30
[   31.759957] 
[   31.760592] The buggy address belongs to the object at ffff888102a59b80
[   31.760592]  which belongs to the cache kmalloc-64 of size 64
[   31.761216] The buggy address is located 0 bytes to the right of
[   31.761216]  allocated 48-byte region [ffff888102a59b80, ffff888102a59bb0)
[   31.762593] 
[   31.762817] The buggy address belongs to the physical page:
[   31.763323] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a59
[   31.764359] flags: 0x200000000000000(node=0|zone=2)
[   31.764911] page_type: f5(slab)
[   31.765497] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   31.766255] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   31.767100] page dumped because: kasan: bad access detected
[   31.767717] 
[   31.767901] Memory state around the buggy address:
[   31.768688]  ffff888102a59a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   31.769339]  ffff888102a59b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   31.770385] >ffff888102a59b80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   31.771202]                                      ^
[   31.771583]  ffff888102a59c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.772196]  ffff888102a59c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.773209] ==================================================================
[   32.238604] ==================================================================
[   32.239157] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4fa7/0x5450
[   32.239628] Read of size 8 at addr ffff888102a59bb0 by task kunit_try_catch/274
[   32.239910] 
[   32.240014] CPU: 1 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241203 #1
[   32.240633] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.241157] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   32.242047] Call Trace:
[   32.242468]  <TASK>
[   32.242769]  dump_stack_lvl+0x73/0xb0
[   32.243304]  print_report+0xd1/0x640
[   32.243849]  ? __virt_addr_valid+0x1db/0x2d0
[   32.244305]  ? kasan_complete_mode_report_info+0x2a/0x200
[   32.244997]  kasan_report+0x102/0x140
[   32.245516]  ? kasan_atomics_helper+0x4fa7/0x5450
[   32.246086]  ? kasan_atomics_helper+0x4fa7/0x5450
[   32.246639]  __asan_report_load8_noabort+0x18/0x20
[   32.247182]  kasan_atomics_helper+0x4fa7/0x5450
[   32.247718]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   32.248505]  ? ret_from_fork_asm+0x1a/0x30
[   32.248826]  ? ret_from_fork+0x41/0x80
[   32.249200]  ? kthread+0x257/0x310
[   32.249862]  kasan_atomics+0x1dd/0x310
[   32.250178]  ? __pfx_kasan_atomics+0x10/0x10
[   32.250480]  ? __pfx_read_tsc+0x10/0x10
[   32.250914]  ? ktime_get_ts64+0x86/0x230
[   32.251350]  kunit_try_run_case+0x1b3/0x490
[   32.252035]  ? __pfx_kunit_try_run_case+0x10/0x10
[   32.252363]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   32.252680]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   32.253208]  ? __kthread_parkme+0x82/0x160
[   32.253696]  ? preempt_count_sub+0x50/0x80
[   32.254009]  ? __pfx_kunit_try_run_case+0x10/0x10
[   32.254528]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   32.255076]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   32.255410]  kthread+0x257/0x310
[   32.255807]  ? __pfx_kthread+0x10/0x10
[   32.256286]  ret_from_fork+0x41/0x80
[   32.256776]  ? __pfx_kthread+0x10/0x10
[   32.257226]  ret_from_fork_asm+0x1a/0x30
[   32.257667]  </TASK>
[   32.257938] 
[   32.258190] Allocated by task 274:
[   32.258527]  kasan_save_stack+0x3d/0x60
[   32.258840]  kasan_save_track+0x18/0x40
[   32.259233]  kasan_save_alloc_info+0x3b/0x50
[   32.259604]  __kasan_kmalloc+0xb7/0xc0
[   32.260027]  __kmalloc_cache_noprof+0x184/0x410
[   32.260565]  kasan_atomics+0x96/0x310
[   32.261186]  kunit_try_run_case+0x1b3/0x490
[   32.261683]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   32.262150]  kthread+0x257/0x310
[   32.262393]  ret_from_fork+0x41/0x80
[   32.262784]  ret_from_fork_asm+0x1a/0x30
[   32.263266] 
[   32.263500] The buggy address belongs to the object at ffff888102a59b80
[   32.263500]  which belongs to the cache kmalloc-64 of size 64
[   32.264481] The buggy address is located 0 bytes to the right of
[   32.264481]  allocated 48-byte region [ffff888102a59b80, ffff888102a59bb0)
[   32.265285] 
[   32.265530] The buggy address belongs to the physical page:
[   32.266095] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a59
[   32.266957] flags: 0x200000000000000(node=0|zone=2)
[   32.267362] page_type: f5(slab)
[   32.267694] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   32.268482] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   32.268958] page dumped because: kasan: bad access detected
[   32.269337] 
[   32.269567] Memory state around the buggy address:
[   32.270010]  ffff888102a59a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.270937]  ffff888102a59b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.271583] >ffff888102a59b80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   32.272198]                                      ^
[   32.273261]  ffff888102a59c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.274069]  ffff888102a59c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.274659] ==================================================================
[   30.512854] ==================================================================
[   30.513845] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xc71/0x5450
[   30.514471] Write of size 4 at addr ffff888102a59bb0 by task kunit_try_catch/274
[   30.515001] 
[   30.515271] CPU: 1 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241203 #1
[   30.516210] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.516627] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   30.517343] Call Trace:
[   30.517740]  <TASK>
[   30.518100]  dump_stack_lvl+0x73/0xb0
[   30.518559]  print_report+0xd1/0x640
[   30.518961]  ? __virt_addr_valid+0x1db/0x2d0
[   30.519478]  ? kasan_complete_mode_report_info+0x2a/0x200
[   30.519999]  kasan_report+0x102/0x140
[   30.520486]  ? kasan_atomics_helper+0xc71/0x5450
[   30.520976]  ? kasan_atomics_helper+0xc71/0x5450
[   30.521413]  kasan_check_range+0x10c/0x1c0
[   30.521939]  __kasan_check_write+0x18/0x20
[   30.522390]  kasan_atomics_helper+0xc71/0x5450
[   30.522883]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   30.523524]  ? ret_from_fork_asm+0x1a/0x30
[   30.523950]  ? ret_from_fork+0x41/0x80
[   30.524396]  ? kthread+0x257/0x310
[   30.524932]  kasan_atomics+0x1dd/0x310
[   30.525546]  ? __pfx_kasan_atomics+0x10/0x10
[   30.525927]  ? __pfx_read_tsc+0x10/0x10
[   30.526378]  ? ktime_get_ts64+0x86/0x230
[   30.526910]  kunit_try_run_case+0x1b3/0x490
[   30.527371]  ? __pfx_kunit_try_run_case+0x10/0x10
[   30.527927]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   30.528407]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   30.528955]  ? __kthread_parkme+0x82/0x160
[   30.529394]  ? preempt_count_sub+0x50/0x80
[   30.529911]  ? __pfx_kunit_try_run_case+0x10/0x10
[   30.530424]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   30.531037]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   30.531665]  kthread+0x257/0x310
[   30.532016]  ? __pfx_kthread+0x10/0x10
[   30.532533]  ret_from_fork+0x41/0x80
[   30.532878]  ? __pfx_kthread+0x10/0x10
[   30.533276]  ret_from_fork_asm+0x1a/0x30
[   30.533757]  </TASK>
[   30.533968] 
[   30.534134] Allocated by task 274:
[   30.534359]  kasan_save_stack+0x3d/0x60
[   30.534726]  kasan_save_track+0x18/0x40
[   30.535179]  kasan_save_alloc_info+0x3b/0x50
[   30.535660]  __kasan_kmalloc+0xb7/0xc0
[   30.536068]  __kmalloc_cache_noprof+0x184/0x410
[   30.536590]  kasan_atomics+0x96/0x310
[   30.537021]  kunit_try_run_case+0x1b3/0x490
[   30.537528]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   30.538032]  kthread+0x257/0x310
[   30.538471]  ret_from_fork+0x41/0x80
[   30.538868]  ret_from_fork_asm+0x1a/0x30
[   30.539316] 
[   30.539598] The buggy address belongs to the object at ffff888102a59b80
[   30.539598]  which belongs to the cache kmalloc-64 of size 64
[   30.540343] The buggy address is located 0 bytes to the right of
[   30.540343]  allocated 48-byte region [ffff888102a59b80, ffff888102a59bb0)
[   30.541184] 
[   30.541429] The buggy address belongs to the physical page:
[   30.541983] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a59
[   30.542621] flags: 0x200000000000000(node=0|zone=2)
[   30.543112] page_type: f5(slab)
[   30.543380] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   30.543808] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   30.544198] page dumped because: kasan: bad access detected
[   30.544552] 
[   30.544850] Memory state around the buggy address:
[   30.545312]  ffff888102a59a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   30.545969]  ffff888102a59b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   30.546631] >ffff888102a59b80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   30.547275]                                      ^
[   30.547654]  ffff888102a59c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.548234]  ffff888102a59c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.548759] ==================================================================
[   31.441956] ==================================================================
[   31.442853] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1780/0x5450
[   31.443646] Write of size 8 at addr ffff888102a59bb0 by task kunit_try_catch/274
[   31.444149] 
[   31.444448] CPU: 1 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241203 #1
[   31.445104] Tainted: [B]=BAD_PAGE, [N]=TEST
[   31.445584] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   31.446361] Call Trace:
[   31.446721]  <TASK>
[   31.446933]  dump_stack_lvl+0x73/0xb0
[   31.447925]  print_report+0xd1/0x640
[   31.448312]  ? __virt_addr_valid+0x1db/0x2d0
[   31.448636]  ? kasan_complete_mode_report_info+0x2a/0x200
[   31.449221]  kasan_report+0x102/0x140
[   31.449595]  ? kasan_atomics_helper+0x1780/0x5450
[   31.450111]  ? kasan_atomics_helper+0x1780/0x5450
[   31.450521]  kasan_check_range+0x10c/0x1c0
[   31.450973]  __kasan_check_write+0x18/0x20
[   31.451485]  kasan_atomics_helper+0x1780/0x5450
[   31.451832]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   31.452383]  ? ret_from_fork_asm+0x1a/0x30
[   31.452745]  ? ret_from_fork+0x41/0x80
[   31.453224]  ? kthread+0x257/0x310
[   31.453630]  kasan_atomics+0x1dd/0x310
[   31.453913]  ? __pfx_kasan_atomics+0x10/0x10
[   31.454401]  ? __pfx_read_tsc+0x10/0x10
[   31.454925]  ? ktime_get_ts64+0x86/0x230
[   31.455402]  kunit_try_run_case+0x1b3/0x490
[   31.455798]  ? __pfx_kunit_try_run_case+0x10/0x10
[   31.456298]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   31.456685]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   31.457025]  ? __kthread_parkme+0x82/0x160
[   31.457537]  ? preempt_count_sub+0x50/0x80
[   31.457966]  ? __pfx_kunit_try_run_case+0x10/0x10
[   31.458359]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   31.458878]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   31.459457]  kthread+0x257/0x310
[   31.459830]  ? __pfx_kthread+0x10/0x10
[   31.460301]  ret_from_fork+0x41/0x80
[   31.460689]  ? __pfx_kthread+0x10/0x10
[   31.461117]  ret_from_fork_asm+0x1a/0x30
[   31.461422]  </TASK>
[   31.461741] 
[   31.461996] Allocated by task 274:
[   31.462397]  kasan_save_stack+0x3d/0x60
[   31.462850]  kasan_save_track+0x18/0x40
[   31.463289]  kasan_save_alloc_info+0x3b/0x50
[   31.463666]  __kasan_kmalloc+0xb7/0xc0
[   31.464108]  __kmalloc_cache_noprof+0x184/0x410
[   31.464549]  kasan_atomics+0x96/0x310
[   31.465034]  kunit_try_run_case+0x1b3/0x490
[   31.465497]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   31.465833]  kthread+0x257/0x310
[   31.466089]  ret_from_fork+0x41/0x80
[   31.466537]  ret_from_fork_asm+0x1a/0x30
[   31.466933] 
[   31.467195] The buggy address belongs to the object at ffff888102a59b80
[   31.467195]  which belongs to the cache kmalloc-64 of size 64
[   31.468049] The buggy address is located 0 bytes to the right of
[   31.468049]  allocated 48-byte region [ffff888102a59b80, ffff888102a59bb0)
[   31.469077] 
[   31.469314] The buggy address belongs to the physical page:
[   31.469796] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a59
[   31.470412] flags: 0x200000000000000(node=0|zone=2)
[   31.470866] page_type: f5(slab)
[   31.471256] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   31.471821] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   31.472411] page dumped because: kasan: bad access detected
[   31.472834] 
[   31.473068] Memory state around the buggy address:
[   31.473476]  ffff888102a59a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   31.474120]  ffff888102a59b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   31.474745] >ffff888102a59b80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   31.475122]                                      ^
[   31.475406]  ffff888102a59c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.475902]  ffff888102a59c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.476555] ==================================================================
[   31.399880] ==================================================================
[   31.401218] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x16e8/0x5450
[   31.401896] Write of size 8 at addr ffff888102a59bb0 by task kunit_try_catch/274
[   31.403484] 
[   31.403788] CPU: 1 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241203 #1
[   31.404837] Tainted: [B]=BAD_PAGE, [N]=TEST
[   31.405295] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   31.406046] Call Trace:
[   31.406359]  <TASK>
[   31.406702]  dump_stack_lvl+0x73/0xb0
[   31.407194]  print_report+0xd1/0x640
[   31.407636]  ? __virt_addr_valid+0x1db/0x2d0
[   31.408137]  ? kasan_complete_mode_report_info+0x2a/0x200
[   31.408716]  kasan_report+0x102/0x140
[   31.409197]  ? kasan_atomics_helper+0x16e8/0x5450
[   31.409720]  ? kasan_atomics_helper+0x16e8/0x5450
[   31.410158]  kasan_check_range+0x10c/0x1c0
[   31.410693]  __kasan_check_write+0x18/0x20
[   31.411202]  kasan_atomics_helper+0x16e8/0x5450
[   31.411774]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   31.412243]  ? ret_from_fork_asm+0x1a/0x30
[   31.412828]  ? ret_from_fork+0x41/0x80
[   31.413121]  ? kthread+0x257/0x310
[   31.413382]  kasan_atomics+0x1dd/0x310
[   31.413999]  ? __pfx_kasan_atomics+0x10/0x10
[   31.414554]  ? __pfx_read_tsc+0x10/0x10
[   31.415074]  ? ktime_get_ts64+0x86/0x230
[   31.415593]  kunit_try_run_case+0x1b3/0x490
[   31.416182]  ? __pfx_kunit_try_run_case+0x10/0x10
[   31.417517]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   31.417917]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   31.418253]  ? __kthread_parkme+0x82/0x160
[   31.418636]  ? preempt_count_sub+0x50/0x80
[   31.419034]  ? __pfx_kunit_try_run_case+0x10/0x10
[   31.419775]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   31.420472]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   31.420946]  kthread+0x257/0x310
[   31.421178]  ? __pfx_kthread+0x10/0x10
[   31.421575]  ret_from_fork+0x41/0x80
[   31.422122]  ? __pfx_kthread+0x10/0x10
[   31.422665]  ret_from_fork_asm+0x1a/0x30
[   31.423229]  </TASK>
[   31.423624] 
[   31.423952] Allocated by task 274:
[   31.424469]  kasan_save_stack+0x3d/0x60
[   31.425029]  kasan_save_track+0x18/0x40
[   31.425552]  kasan_save_alloc_info+0x3b/0x50
[   31.426001]  __kasan_kmalloc+0xb7/0xc0
[   31.426304]  __kmalloc_cache_noprof+0x184/0x410
[   31.426852]  kasan_atomics+0x96/0x310
[   31.427174]  kunit_try_run_case+0x1b3/0x490
[   31.427686]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   31.428250]  kthread+0x257/0x310
[   31.428653]  ret_from_fork+0x41/0x80
[   31.429181]  ret_from_fork_asm+0x1a/0x30
[   31.429643] 
[   31.429926] The buggy address belongs to the object at ffff888102a59b80
[   31.429926]  which belongs to the cache kmalloc-64 of size 64
[   31.430805] The buggy address is located 0 bytes to the right of
[   31.430805]  allocated 48-byte region [ffff888102a59b80, ffff888102a59bb0)
[   31.431726] 
[   31.431951] The buggy address belongs to the physical page:
[   31.432616] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a59
[   31.433266] flags: 0x200000000000000(node=0|zone=2)
[   31.433791] page_type: f5(slab)
[   31.434141] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   31.434905] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   31.435483] page dumped because: kasan: bad access detected
[   31.435955] 
[   31.436238] Memory state around the buggy address:
[   31.436629]  ffff888102a59a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   31.437374]  ffff888102a59b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   31.437923] >ffff888102a59b80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   31.438620]                                      ^
[   31.439001]  ffff888102a59c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.439697]  ffff888102a59c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.440211] ==================================================================