Hay
Date
March 19, 2025, 10:35 a.m.

Environment
qemu-arm64
qemu-x86_64

[   39.286388] ==================================================================
[   39.286537] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3db0/0x4858
[   39.286683] Read of size 8 at addr fff00000c5dafcb0 by task kunit_try_catch/267
[   39.286846] 
[   39.286946] CPU: 1 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G    B            N  6.14.0-rc7-next-20250319 #1 PREEMPT 
[   39.287245] Tainted: [B]=BAD_PAGE, [N]=TEST
[   39.287340] Hardware name: linux,dummy-virt (DT)
[   39.287451] Call trace:
[   39.287526]  show_stack+0x20/0x38 (C)
[   39.287687]  dump_stack_lvl+0x8c/0xd0
[   39.287837]  print_report+0x118/0x5f0
[   39.287994]  kasan_report+0xc8/0x118
[   39.288161]  __asan_report_load8_noabort+0x20/0x30
[   39.288358]  kasan_atomics_helper+0x3db0/0x4858
[   39.288620]  kasan_atomics+0x198/0x2e8
[   39.288796]  kunit_try_run_case+0x14c/0x3d0
[   39.288979]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   39.289202]  kthread+0x318/0x618
[   39.289364]  ret_from_fork+0x10/0x20
[   39.289517] 
[   39.289577] Allocated by task 267:
[   39.289670]  kasan_save_stack+0x3c/0x68
[   39.289789]  kasan_save_track+0x20/0x40
[   39.289910]  kasan_save_alloc_info+0x40/0x58
[   39.290041]  __kasan_kmalloc+0xd4/0xd8
[   39.290198]  __kmalloc_cache_noprof+0x15c/0x3c0
[   39.290338]  kasan_atomics+0xb8/0x2e8
[   39.290539]  kunit_try_run_case+0x14c/0x3d0
[   39.290726]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   39.291005]  kthread+0x318/0x618
[   39.291173]  ret_from_fork+0x10/0x20
[   39.291308] 
[   39.291377] The buggy address belongs to the object at fff00000c5dafc80
[   39.291377]  which belongs to the cache kmalloc-64 of size 64
[   39.291581] The buggy address is located 0 bytes to the right of
[   39.291581]  allocated 48-byte region [fff00000c5dafc80, fff00000c5dafcb0)
[   39.291803] 
[   39.291876] The buggy address belongs to the physical page:
[   39.291979] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105daf
[   39.292179] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   39.292333] page_type: f5(slab)
[   39.292451] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   39.292631] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   39.292828] page dumped because: kasan: bad access detected
[   39.292971] 
[   39.293034] Memory state around the buggy address:
[   39.293213]  fff00000c5dafb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   39.293410]  fff00000c5dafc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   39.293578] >fff00000c5dafc80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   39.293732]                                      ^
[   39.293916]  fff00000c5dafd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   39.294135]  fff00000c5dafd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   39.294264] ==================================================================
[   39.295702] ==================================================================
[   39.295872] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1644/0x4858
[   39.296133] Write of size 8 at addr fff00000c5dafcb0 by task kunit_try_catch/267
[   39.296388] 
[   39.296500] CPU: 1 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G    B            N  6.14.0-rc7-next-20250319 #1 PREEMPT 
[   39.296939] Tainted: [B]=BAD_PAGE, [N]=TEST
[   39.297074] Hardware name: linux,dummy-virt (DT)
[   39.297176] Call trace:
[   39.297256]  show_stack+0x20/0x38 (C)
[   39.297405]  dump_stack_lvl+0x8c/0xd0
[   39.297610]  print_report+0x118/0x5f0
[   39.297772]  kasan_report+0xc8/0x118
[   39.297917]  kasan_check_range+0x100/0x1a8
[   39.298084]  __kasan_check_write+0x20/0x30
[   39.298229]  kasan_atomics_helper+0x1644/0x4858
[   39.298395]  kasan_atomics+0x198/0x2e8
[   39.298547]  kunit_try_run_case+0x14c/0x3d0
[   39.298705]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   39.298888]  kthread+0x318/0x618
[   39.299145]  ret_from_fork+0x10/0x20
[   39.299364] 
[   39.299431] Allocated by task 267:
[   39.299533]  kasan_save_stack+0x3c/0x68
[   39.299664]  kasan_save_track+0x20/0x40
[   39.299792]  kasan_save_alloc_info+0x40/0x58
[   39.299926]  __kasan_kmalloc+0xd4/0xd8
[   39.300071]  __kmalloc_cache_noprof+0x15c/0x3c0
[   39.300217]  kasan_atomics+0xb8/0x2e8
[   39.300337]  kunit_try_run_case+0x14c/0x3d0
[   39.300468]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   39.300644]  kthread+0x318/0x618
[   39.300842]  ret_from_fork+0x10/0x20
[   39.301047] 
[   39.301186] The buggy address belongs to the object at fff00000c5dafc80
[   39.301186]  which belongs to the cache kmalloc-64 of size 64
[   39.301482] The buggy address is located 0 bytes to the right of
[   39.301482]  allocated 48-byte region [fff00000c5dafc80, fff00000c5dafcb0)
[   39.301696] 
[   39.301764] The buggy address belongs to the physical page:
[   39.302363] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105daf
[   39.302738] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   39.303017] page_type: f5(slab)
[   39.303157] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   39.303349] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   39.303518] page dumped because: kasan: bad access detected
[   39.303707] 
[   39.303811] Memory state around the buggy address:
[   39.303978]  fff00000c5dafb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   39.304237]  fff00000c5dafc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   39.304804] >fff00000c5dafc80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   39.304953]                                      ^
[   39.305159]  fff00000c5dafd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   39.305326]  fff00000c5dafd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   39.305476] ==================================================================
[   39.131540] ==================================================================
[   39.131712] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x11f8/0x4858
[   39.131807] Write of size 8 at addr fff00000c5dafcb0 by task kunit_try_catch/267
[   39.131895] 
[   39.131948] CPU: 1 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G    B            N  6.14.0-rc7-next-20250319 #1 PREEMPT 
[   39.132144] Tainted: [B]=BAD_PAGE, [N]=TEST
[   39.132198] Hardware name: linux,dummy-virt (DT)
[   39.132253] Call trace:
[   39.132307]  show_stack+0x20/0x38 (C)
[   39.132531]  dump_stack_lvl+0x8c/0xd0
[   39.132765]  print_report+0x118/0x5f0
[   39.132918]  kasan_report+0xc8/0x118
[   39.133148]  kasan_check_range+0x100/0x1a8
[   39.133898]  __kasan_check_write+0x20/0x30
[   39.134108]  kasan_atomics_helper+0x11f8/0x4858
[   39.134719]  kasan_atomics+0x198/0x2e8
[   39.135144]  kunit_try_run_case+0x14c/0x3d0
[   39.135562]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   39.135771]  kthread+0x318/0x618
[   39.136215]  ret_from_fork+0x10/0x20
[   39.136777] 
[   39.136856] Allocated by task 267:
[   39.137245]  kasan_save_stack+0x3c/0x68
[   39.137393]  kasan_save_track+0x20/0x40
[   39.137523]  kasan_save_alloc_info+0x40/0x58
[   39.137747]  __kasan_kmalloc+0xd4/0xd8
[   39.137890]  __kmalloc_cache_noprof+0x15c/0x3c0
[   39.138032]  kasan_atomics+0xb8/0x2e8
[   39.138172]  kunit_try_run_case+0x14c/0x3d0
[   39.138299]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   39.138452]  kthread+0x318/0x618
[   39.138578]  ret_from_fork+0x10/0x20
[   39.138705] 
[   39.138831] The buggy address belongs to the object at fff00000c5dafc80
[   39.138831]  which belongs to the cache kmalloc-64 of size 64
[   39.139174] The buggy address is located 0 bytes to the right of
[   39.139174]  allocated 48-byte region [fff00000c5dafc80, fff00000c5dafcb0)
[   39.139518] 
[   39.139606] The buggy address belongs to the physical page:
[   39.139713] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105daf
[   39.139890] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   39.140044] page_type: f5(slab)
[   39.140172] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   39.140336] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   39.140482] page dumped because: kasan: bad access detected
[   39.140616] 
[   39.140708] Memory state around the buggy address:
[   39.140818]  fff00000c5dafb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   39.140970]  fff00000c5dafc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   39.141147] >fff00000c5dafc80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   39.141340]                                      ^
[   39.141661]  fff00000c5dafd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   39.141825]  fff00000c5dafd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   39.142006] ==================================================================
[   39.270530] ==================================================================
[   39.270676] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x15b4/0x4858
[   39.270829] Write of size 8 at addr fff00000c5dafcb0 by task kunit_try_catch/267
[   39.271006] 
[   39.271448] CPU: 1 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G    B            N  6.14.0-rc7-next-20250319 #1 PREEMPT 
[   39.271748] Tainted: [B]=BAD_PAGE, [N]=TEST
[   39.271842] Hardware name: linux,dummy-virt (DT)
[   39.272411] Call trace:
[   39.272525]  show_stack+0x20/0x38 (C)
[   39.272710]  dump_stack_lvl+0x8c/0xd0
[   39.272854]  print_report+0x118/0x5f0
[   39.273021]  kasan_report+0xc8/0x118
[   39.273198]  kasan_check_range+0x100/0x1a8
[   39.273861]  __kasan_check_write+0x20/0x30
[   39.274192]  kasan_atomics_helper+0x15b4/0x4858
[   39.274590]  kasan_atomics+0x198/0x2e8
[   39.274784]  kunit_try_run_case+0x14c/0x3d0
[   39.274954]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   39.275655]  kthread+0x318/0x618
[   39.275840]  ret_from_fork+0x10/0x20
[   39.276005] 
[   39.276093] Allocated by task 267:
[   39.276193]  kasan_save_stack+0x3c/0x68
[   39.276342]  kasan_save_track+0x20/0x40
[   39.277147]  kasan_save_alloc_info+0x40/0x58
[   39.277536]  __kasan_kmalloc+0xd4/0xd8
[   39.277860]  __kmalloc_cache_noprof+0x15c/0x3c0
[   39.278340]  kasan_atomics+0xb8/0x2e8
[   39.278525]  kunit_try_run_case+0x14c/0x3d0
[   39.278860]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   39.279651]  kthread+0x318/0x618
[   39.279822]  ret_from_fork+0x10/0x20
[   39.280086] 
[   39.280277] The buggy address belongs to the object at fff00000c5dafc80
[   39.280277]  which belongs to the cache kmalloc-64 of size 64
[   39.280768] The buggy address is located 0 bytes to the right of
[   39.280768]  allocated 48-byte region [fff00000c5dafc80, fff00000c5dafcb0)
[   39.281179] 
[   39.281370] The buggy address belongs to the physical page:
[   39.281528] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105daf
[   39.281939] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   39.282377] page_type: f5(slab)
[   39.282525] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   39.283014] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   39.283348] page dumped because: kasan: bad access detected
[   39.283852] 
[   39.284011] Memory state around the buggy address:
[   39.284379]  fff00000c5dafb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   39.284580]  fff00000c5dafc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   39.284736] >fff00000c5dafc80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   39.284874]                                      ^
[   39.285662]  fff00000c5dafd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   39.285769]  fff00000c5dafd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   39.285885] ==================================================================
[   38.727139] ==================================================================
[   38.727294] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x99c/0x4858
[   38.727451] Write of size 4 at addr fff00000c5dafcb0 by task kunit_try_catch/267
[   38.727620] 
[   38.727715] CPU: 1 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G    B            N  6.14.0-rc7-next-20250319 #1 PREEMPT 
[   38.727992] Tainted: [B]=BAD_PAGE, [N]=TEST
[   38.729739] Hardware name: linux,dummy-virt (DT)
[   38.729966] Call trace:
[   38.730535]  show_stack+0x20/0x38 (C)
[   38.730958]  dump_stack_lvl+0x8c/0xd0
[   38.731260]  print_report+0x118/0x5f0
[   38.731884]  kasan_report+0xc8/0x118
[   38.732179]  kasan_check_range+0x100/0x1a8
[   38.732356]  __kasan_check_write+0x20/0x30
[   38.732957]  kasan_atomics_helper+0x99c/0x4858
[   38.733429]  kasan_atomics+0x198/0x2e8
[   38.733659]  kunit_try_run_case+0x14c/0x3d0
[   38.733926]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   38.734450]  kthread+0x318/0x618
[   38.734877]  ret_from_fork+0x10/0x20
[   38.735047] 
[   38.735141] Allocated by task 267:
[   38.735241]  kasan_save_stack+0x3c/0x68
[   38.735373]  kasan_save_track+0x20/0x40
[   38.735493]  kasan_save_alloc_info+0x40/0x58
[   38.735639]  __kasan_kmalloc+0xd4/0xd8
[   38.735754]  __kmalloc_cache_noprof+0x15c/0x3c0
[   38.735893]  kasan_atomics+0xb8/0x2e8
[   38.736029]  kunit_try_run_case+0x14c/0x3d0
[   38.736183]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   38.736333]  kthread+0x318/0x618
[   38.736925]  ret_from_fork+0x10/0x20
[   38.737098] 
[   38.737165] The buggy address belongs to the object at fff00000c5dafc80
[   38.737165]  which belongs to the cache kmalloc-64 of size 64
[   38.737628] The buggy address is located 0 bytes to the right of
[   38.737628]  allocated 48-byte region [fff00000c5dafc80, fff00000c5dafcb0)
[   38.737867] 
[   38.737950] The buggy address belongs to the physical page:
[   38.738070] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105daf
[   38.738250] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   38.738423] page_type: f5(slab)
[   38.738595] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   38.738822] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   38.738989] page dumped because: kasan: bad access detected
[   38.739166] 
[   38.739251] Memory state around the buggy address:
[   38.739393]  fff00000c5dafb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   38.739539]  fff00000c5dafc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   38.739717] >fff00000c5dafc80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   38.740104]                                      ^
[   38.740312]  fff00000c5dafd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   38.740488]  fff00000c5dafd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   38.740585] ==================================================================
[   38.912813] ==================================================================
[   38.912951] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xdd4/0x4858
[   38.913122] Read of size 8 at addr fff00000c5dafcb0 by task kunit_try_catch/267
[   38.913283] 
[   38.913383] CPU: 1 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G    B            N  6.14.0-rc7-next-20250319 #1 PREEMPT 
[   38.913667] Tainted: [B]=BAD_PAGE, [N]=TEST
[   38.913769] Hardware name: linux,dummy-virt (DT)
[   38.913869] Call trace:
[   38.913937]  show_stack+0x20/0x38 (C)
[   38.914110]  dump_stack_lvl+0x8c/0xd0
[   38.914256]  print_report+0x118/0x5f0
[   38.914435]  kasan_report+0xc8/0x118
[   38.914593]  kasan_check_range+0x100/0x1a8
[   38.914752]  __kasan_check_read+0x20/0x30
[   38.914911]  kasan_atomics_helper+0xdd4/0x4858
[   38.915135]  kasan_atomics+0x198/0x2e8
[   38.915472]  kunit_try_run_case+0x14c/0x3d0
[   38.915665]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   38.915851]  kthread+0x318/0x618
[   38.916005]  ret_from_fork+0x10/0x20
[   38.918378] 
[   38.918479] Allocated by task 267:
[   38.918612]  kasan_save_stack+0x3c/0x68
[   38.918775]  kasan_save_track+0x20/0x40
[   38.918917]  kasan_save_alloc_info+0x40/0x58
[   38.919082]  __kasan_kmalloc+0xd4/0xd8
[   38.919738]  __kmalloc_cache_noprof+0x15c/0x3c0
[   38.920521]  kasan_atomics+0xb8/0x2e8
[   38.920733]  kunit_try_run_case+0x14c/0x3d0
[   38.920886]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   38.921041]  kthread+0x318/0x618
[   38.921732]  ret_from_fork+0x10/0x20
[   38.922441] 
[   38.922551] The buggy address belongs to the object at fff00000c5dafc80
[   38.922551]  which belongs to the cache kmalloc-64 of size 64
[   38.922752] The buggy address is located 0 bytes to the right of
[   38.922752]  allocated 48-byte region [fff00000c5dafc80, fff00000c5dafcb0)
[   38.923690] 
[   38.924204] The buggy address belongs to the physical page:
[   38.924438] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105daf
[   38.925026] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   38.925502] page_type: f5(slab)
[   38.925853] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   38.926045] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   38.926206] page dumped because: kasan: bad access detected
[   38.926319] 
[   38.926860] Memory state around the buggy address:
[   38.927440]  fff00000c5dafb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   38.927917]  fff00000c5dafc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   38.928479] >fff00000c5dafc80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   38.929042]                                      ^
[   38.929655]  fff00000c5dafd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   38.929831]  fff00000c5dafd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   38.929972] ==================================================================
[   39.229611] ==================================================================
[   39.230010] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x147c/0x4858
[   39.230398] Write of size 8 at addr fff00000c5dafcb0 by task kunit_try_catch/267
[   39.230803] 
[   39.230963] CPU: 1 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G    B            N  6.14.0-rc7-next-20250319 #1 PREEMPT 
[   39.231353] Tainted: [B]=BAD_PAGE, [N]=TEST
[   39.231439] Hardware name: linux,dummy-virt (DT)
[   39.231546] Call trace:
[   39.231619]  show_stack+0x20/0x38 (C)
[   39.231850]  dump_stack_lvl+0x8c/0xd0
[   39.232129]  print_report+0x118/0x5f0
[   39.232482]  kasan_report+0xc8/0x118
[   39.233296]  kasan_check_range+0x100/0x1a8
[   39.233561]  __kasan_check_write+0x20/0x30
[   39.233829]  kasan_atomics_helper+0x147c/0x4858
[   39.234007]  kasan_atomics+0x198/0x2e8
[   39.234188]  kunit_try_run_case+0x14c/0x3d0
[   39.234353]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   39.234576]  kthread+0x318/0x618
[   39.234730]  ret_from_fork+0x10/0x20
[   39.236251] 
[   39.236356] Allocated by task 267:
[   39.236990]  kasan_save_stack+0x3c/0x68
[   39.237555]  kasan_save_track+0x20/0x40
[   39.237690]  kasan_save_alloc_info+0x40/0x58
[   39.238044]  __kasan_kmalloc+0xd4/0xd8
[   39.238344]  __kmalloc_cache_noprof+0x15c/0x3c0
[   39.239296]  kasan_atomics+0xb8/0x2e8
[   39.239675]  kunit_try_run_case+0x14c/0x3d0
[   39.239848]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   39.240073]  kthread+0x318/0x618
[   39.240205]  ret_from_fork+0x10/0x20
[   39.240327] 
[   39.240674] The buggy address belongs to the object at fff00000c5dafc80
[   39.240674]  which belongs to the cache kmalloc-64 of size 64
[   39.240901] The buggy address is located 0 bytes to the right of
[   39.240901]  allocated 48-byte region [fff00000c5dafc80, fff00000c5dafcb0)
[   39.241162] 
[   39.241250] The buggy address belongs to the physical page:
[   39.241429] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105daf
[   39.241701] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   39.241941] page_type: f5(slab)
[   39.242069] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   39.242238] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   39.242390] page dumped because: kasan: bad access detected
[   39.242542] 
[   39.242610] Memory state around the buggy address:
[   39.242722]  fff00000c5dafb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   39.242877]  fff00000c5dafc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   39.243113] >fff00000c5dafc80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   39.243248]                                      ^
[   39.243369]  fff00000c5dafd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   39.243522]  fff00000c5dafd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   39.243754] ==================================================================
[   39.041858] ==================================================================
[   39.042015] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xff0/0x4858
[   39.042193] Write of size 8 at addr fff00000c5dafcb0 by task kunit_try_catch/267
[   39.044822] 
[   39.044931] CPU: 1 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G    B            N  6.14.0-rc7-next-20250319 #1 PREEMPT 
[   39.045929] Tainted: [B]=BAD_PAGE, [N]=TEST
[   39.046233] Hardware name: linux,dummy-virt (DT)
[   39.046342] Call trace:
[   39.046919]  show_stack+0x20/0x38 (C)
[   39.048017]  dump_stack_lvl+0x8c/0xd0
[   39.048665]  print_report+0x118/0x5f0
[   39.048825]  kasan_report+0xc8/0x118
[   39.048970]  kasan_check_range+0x100/0x1a8
[   39.049566]  __kasan_check_write+0x20/0x30
[   39.050165]  kasan_atomics_helper+0xff0/0x4858
[   39.050347]  kasan_atomics+0x198/0x2e8
[   39.051068]  kunit_try_run_case+0x14c/0x3d0
[   39.051245]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   39.051433]  kthread+0x318/0x618
[   39.051581]  ret_from_fork+0x10/0x20
[   39.051740] 
[   39.052391] Allocated by task 267:
[   39.052678]  kasan_save_stack+0x3c/0x68
[   39.052936]  kasan_save_track+0x20/0x40
[   39.053547]  kasan_save_alloc_info+0x40/0x58
[   39.054103]  __kasan_kmalloc+0xd4/0xd8
[   39.054244]  __kmalloc_cache_noprof+0x15c/0x3c0
[   39.054389]  kasan_atomics+0xb8/0x2e8
[   39.054557]  kunit_try_run_case+0x14c/0x3d0
[   39.055586]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   39.056244]  kthread+0x318/0x618
[   39.056550]  ret_from_fork+0x10/0x20
[   39.056953] 
[   39.057211] The buggy address belongs to the object at fff00000c5dafc80
[   39.057211]  which belongs to the cache kmalloc-64 of size 64
[   39.057826] The buggy address is located 0 bytes to the right of
[   39.057826]  allocated 48-byte region [fff00000c5dafc80, fff00000c5dafcb0)
[   39.058069] 
[   39.058384] The buggy address belongs to the physical page:
[   39.058669] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105daf
[   39.058990] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   39.059513] page_type: f5(slab)
[   39.059644] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   39.060462] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   39.060619] page dumped because: kasan: bad access detected
[   39.060756] 
[   39.060870] Memory state around the buggy address:
[   39.060989]  fff00000c5dafb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   39.061176]  fff00000c5dafc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   39.061361] >fff00000c5dafc80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   39.061502]                                      ^
[   39.061619]  fff00000c5dafd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   39.061771]  fff00000c5dafd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   39.061910] ==================================================================
[   38.903471] ==================================================================
[   38.903701] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e04/0x4858
[   38.903941] Read of size 4 at addr fff00000c5dafcb0 by task kunit_try_catch/267
[   38.904137] 
[   38.904243] CPU: 1 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G    B            N  6.14.0-rc7-next-20250319 #1 PREEMPT 
[   38.904588] Tainted: [B]=BAD_PAGE, [N]=TEST
[   38.904720] Hardware name: linux,dummy-virt (DT)
[   38.904828] Call trace:
[   38.904905]  show_stack+0x20/0x38 (C)
[   38.905095]  dump_stack_lvl+0x8c/0xd0
[   38.905434]  print_report+0x118/0x5f0
[   38.905698]  kasan_report+0xc8/0x118
[   38.905938]  __asan_report_load4_noabort+0x20/0x30
[   38.906136]  kasan_atomics_helper+0x3e04/0x4858
[   38.906303]  kasan_atomics+0x198/0x2e8
[   38.906458]  kunit_try_run_case+0x14c/0x3d0
[   38.906636]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   38.906855]  kthread+0x318/0x618
[   38.907046]  ret_from_fork+0x10/0x20
[   38.907229] 
[   38.907297] Allocated by task 267:
[   38.907407]  kasan_save_stack+0x3c/0x68
[   38.907597]  kasan_save_track+0x20/0x40
[   38.907718]  kasan_save_alloc_info+0x40/0x58
[   38.907886]  __kasan_kmalloc+0xd4/0xd8
[   38.908091]  __kmalloc_cache_noprof+0x15c/0x3c0
[   38.908244]  kasan_atomics+0xb8/0x2e8
[   38.908415]  kunit_try_run_case+0x14c/0x3d0
[   38.908541]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   38.908723]  kthread+0x318/0x618
[   38.908860]  ret_from_fork+0x10/0x20
[   38.909009] 
[   38.909144] The buggy address belongs to the object at fff00000c5dafc80
[   38.909144]  which belongs to the cache kmalloc-64 of size 64
[   38.909352] The buggy address is located 0 bytes to the right of
[   38.909352]  allocated 48-byte region [fff00000c5dafc80, fff00000c5dafcb0)
[   38.909574] 
[   38.909650] The buggy address belongs to the physical page:
[   38.909747] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105daf
[   38.910163] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   38.910281] page_type: f5(slab)
[   38.910351] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   38.910508] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   38.910653] page dumped because: kasan: bad access detected
[   38.910760] 
[   38.910826] Memory state around the buggy address:
[   38.910992]  fff00000c5dafb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   38.911166]  fff00000c5dafc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   38.911352] >fff00000c5dafc80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   38.911571]                                      ^
[   38.911699]  fff00000c5dafd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   38.911852]  fff00000c5dafd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   38.911993] ==================================================================
[   38.850904] ==================================================================
[   38.851075] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3de4/0x4858
[   38.851420] Read of size 4 at addr fff00000c5dafcb0 by task kunit_try_catch/267
[   38.852608] Tainted: [B]=BAD_PAGE, [N]=TEST
[   38.852917]  show_stack+0x20/0x38 (C)
[   38.853851]  kasan_atomics_helper+0x3de4/0x4858
[   38.855564]  kasan_save_stack+0x3c/0x68
[   38.856416]  kunit_try_run_case+0x14c/0x3d0
[   38.858562] The buggy address is located 0 bytes to the right of
[   38.858562]  allocated 48-byte region [fff00000c5dafc80, fff00000c5dafcb0)
[   38.860215] page dumped because: kasan: bad access detected
[   38.860546]  fff00000c5dafb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   38.861888]  fff00000c5dafd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   38.863413] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xca0/0x4858
[   38.864219] Hardware name: linux,dummy-virt (DT)
[   38.870524]  kasan_save_alloc_info+0x40/0x58
[   38.872417] The buggy address is located 0 bytes to the right of
[   38.872417]  allocated 48-byte region [fff00000c5dafc80, fff00000c5dafcb0)
[   38.873766] page dumped because: kasan: bad access detected
[   38.873888] 
[   38.874004] Memory state around the buggy address:
[   38.874166]  fff00000c5dafb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   38.874552]  fff00000c5dafc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   38.874795] >fff00000c5dafc80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   38.875018]                                      ^
[   38.875221]  fff00000c5dafd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   38.875466]  fff00000c5dafd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   38.875673] ==================================================================
[   39.245848] ==================================================================
[   39.246001] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x14e4/0x4858
[   39.246174] Write of size 8 at addr fff00000c5dafcb0 by task kunit_try_catch/267
[   39.246338] 
[   39.246433] CPU: 1 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G    B            N  6.14.0-rc7-next-20250319 #1 PREEMPT 
[   39.246719] Tainted: [B]=BAD_PAGE, [N]=TEST
[   39.246811] Hardware name: linux,dummy-virt (DT)
[   39.246922] Call trace:
[   39.247007]  show_stack+0x20/0x38 (C)
[   39.247187]  dump_stack_lvl+0x8c/0xd0
[   39.247335]  print_report+0x118/0x5f0
[   39.247491]  kasan_report+0xc8/0x118
[   39.247656]  kasan_check_range+0x100/0x1a8
[   39.247804]  __kasan_check_write+0x20/0x30
[   39.248026]  kasan_atomics_helper+0x14e4/0x4858
[   39.248233]  kasan_atomics+0x198/0x2e8
[   39.248618]  kunit_try_run_case+0x14c/0x3d0
[   39.249531]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   39.249800]  kthread+0x318/0x618
[   39.249992]  ret_from_fork+0x10/0x20
[   39.250182] 
[   39.250314] Allocated by task 267:
[   39.250508]  kasan_save_stack+0x3c/0x68
[   39.250692]  kasan_save_track+0x20/0x40
[   39.250838]  kasan_save_alloc_info+0x40/0x58
[   39.251086]  __kasan_kmalloc+0xd4/0xd8
[   39.251288]  __kmalloc_cache_noprof+0x15c/0x3c0
[   39.251482]  kasan_atomics+0xb8/0x2e8
[   39.251612]  kunit_try_run_case+0x14c/0x3d0
[   39.251792]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   39.252029]  kthread+0x318/0x618
[   39.252259]  ret_from_fork+0x10/0x20
[   39.252657] 
[   39.252740] The buggy address belongs to the object at fff00000c5dafc80
[   39.252740]  which belongs to the cache kmalloc-64 of size 64
[   39.252931] The buggy address is located 0 bytes to the right of
[   39.252931]  allocated 48-byte region [fff00000c5dafc80, fff00000c5dafcb0)
[   39.253987] 
[   39.254083] The buggy address belongs to the physical page:
[   39.254185] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105daf
[   39.254335] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   39.254474] page_type: f5(slab)
[   39.254579] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   39.254716] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   39.254853] page dumped because: kasan: bad access detected
[   39.254965] 
[   39.255021] Memory state around the buggy address:
[   39.255146]  fff00000c5dafb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   39.255275]  fff00000c5dafc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   39.255418] >fff00000c5dafc80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   39.255538]                                      ^
[   39.255642]  fff00000c5dafd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   39.255781]  fff00000c5dafd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   39.255904] ==================================================================
[   39.011336] ==================================================================
[   39.011575] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf20/0x4858
[   39.011818] Write of size 8 at addr fff00000c5dafcb0 by task kunit_try_catch/267
[   39.012526] 
[   39.012679] CPU: 1 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G    B            N  6.14.0-rc7-next-20250319 #1 PREEMPT 
[   39.013044] Tainted: [B]=BAD_PAGE, [N]=TEST
[   39.013160] Hardware name: linux,dummy-virt (DT)
[   39.013323] Call trace:
[   39.013398]  show_stack+0x20/0x38 (C)
[   39.013608]  dump_stack_lvl+0x8c/0xd0
[   39.013760]  print_report+0x118/0x5f0
[   39.014009]  kasan_report+0xc8/0x118
[   39.014185]  kasan_check_range+0x100/0x1a8
[   39.014647]  __kasan_check_write+0x20/0x30
[   39.015232]  kasan_atomics_helper+0xf20/0x4858
[   39.015511]  kasan_atomics+0x198/0x2e8
[   39.015771]  kunit_try_run_case+0x14c/0x3d0
[   39.015978]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   39.016302]  kthread+0x318/0x618
[   39.016466]  ret_from_fork+0x10/0x20
[   39.016677] 
[   39.016789] Allocated by task 267:
[   39.016889]  kasan_save_stack+0x3c/0x68
[   39.017022]  kasan_save_track+0x20/0x40
[   39.017159]  kasan_save_alloc_info+0x40/0x58
[   39.017281]  __kasan_kmalloc+0xd4/0xd8
[   39.017774]  __kmalloc_cache_noprof+0x15c/0x3c0
[   39.017947]  kasan_atomics+0xb8/0x2e8
[   39.018518]  kunit_try_run_case+0x14c/0x3d0
[   39.018853]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   39.019113]  kthread+0x318/0x618
[   39.019250]  ret_from_fork+0x10/0x20
[   39.019422] 
[   39.019492] The buggy address belongs to the object at fff00000c5dafc80
[   39.019492]  which belongs to the cache kmalloc-64 of size 64
[   39.019834] The buggy address is located 0 bytes to the right of
[   39.019834]  allocated 48-byte region [fff00000c5dafc80, fff00000c5dafcb0)
[   39.020240] 
[   39.020366] The buggy address belongs to the physical page:
[   39.020484] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105daf
[   39.020652] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   39.020810] page_type: f5(slab)
[   39.020924] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   39.021118] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   39.021265] page dumped because: kasan: bad access detected
[   39.021379] 
[   39.021445] Memory state around the buggy address:
[   39.021583]  fff00000c5dafb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   39.021769]  fff00000c5dafc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   39.021932] >fff00000c5dafc80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   39.022127]                                      ^
[   39.022239]  fff00000c5dafd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   39.022705]  fff00000c5dafd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   39.023070] ==================================================================
[   39.112194] ==================================================================
[   39.112349] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1190/0x4858
[   39.113446] Write of size 8 at addr fff00000c5dafcb0 by task kunit_try_catch/267
[   39.114342] 
[   39.114449] CPU: 1 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G    B            N  6.14.0-rc7-next-20250319 #1 PREEMPT 
[   39.114744] Tainted: [B]=BAD_PAGE, [N]=TEST
[   39.114836] Hardware name: linux,dummy-virt (DT)
[   39.114957] Call trace:
[   39.116313]  show_stack+0x20/0x38 (C)
[   39.117294]  dump_stack_lvl+0x8c/0xd0
[   39.117755]  print_report+0x118/0x5f0
[   39.118449]  kasan_report+0xc8/0x118
[   39.118935]  kasan_check_range+0x100/0x1a8
[   39.119297]  __kasan_check_write+0x20/0x30
[   39.119452]  kasan_atomics_helper+0x1190/0x4858
[   39.119682]  kasan_atomics+0x198/0x2e8
[   39.119858]  kunit_try_run_case+0x14c/0x3d0
[   39.120023]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   39.120436]  kthread+0x318/0x618
[   39.120639]  ret_from_fork+0x10/0x20
[   39.120941] 
[   39.121021] Allocated by task 267:
[   39.121437]  kasan_save_stack+0x3c/0x68
[   39.121584]  kasan_save_track+0x20/0x40
[   39.121703]  kasan_save_alloc_info+0x40/0x58
[   39.122219]  __kasan_kmalloc+0xd4/0xd8
[   39.122627]  __kmalloc_cache_noprof+0x15c/0x3c0
[   39.122787]  kasan_atomics+0xb8/0x2e8
[   39.122914]  kunit_try_run_case+0x14c/0x3d0
[   39.123085]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   39.123380]  kthread+0x318/0x618
[   39.123545]  ret_from_fork+0x10/0x20
[   39.123969] 
[   39.124626] The buggy address belongs to the object at fff00000c5dafc80
[   39.124626]  which belongs to the cache kmalloc-64 of size 64
[   39.125126] The buggy address is located 0 bytes to the right of
[   39.125126]  allocated 48-byte region [fff00000c5dafc80, fff00000c5dafcb0)
[   39.126098] 
[   39.126220] The buggy address belongs to the physical page:
[   39.126339] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105daf
[   39.126532] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   39.126703] page_type: f5(slab)
[   39.126826] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   39.127020] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   39.127339] page dumped because: kasan: bad access detected
[   39.127681] 
[   39.127772] Memory state around the buggy address:
[   39.127889]  fff00000c5dafb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   39.128041]  fff00000c5dafc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   39.128204] >fff00000c5dafc80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   39.128439]                                      ^
[   39.128565]  fff00000c5dafd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   39.128925]  fff00000c5dafd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   39.129153] ==================================================================
[   39.198133] ==================================================================
[   39.198572] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f04/0x4858
[   39.199013] Read of size 8 at addr fff00000c5dafcb0 by task kunit_try_catch/267
[   39.199480] 
[   39.199598] CPU: 1 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G    B            N  6.14.0-rc7-next-20250319 #1 PREEMPT 
[   39.200030] Tainted: [B]=BAD_PAGE, [N]=TEST
[   39.200144] Hardware name: linux,dummy-virt (DT)
[   39.200261] Call trace:
[   39.200335]  show_stack+0x20/0x38 (C)
[   39.200511]  dump_stack_lvl+0x8c/0xd0
[   39.200660]  print_report+0x118/0x5f0
[   39.200817]  kasan_report+0xc8/0x118
[   39.200965]  __asan_report_load8_noabort+0x20/0x30
[   39.201150]  kasan_atomics_helper+0x3f04/0x4858
[   39.201325]  kasan_atomics+0x198/0x2e8
[   39.201487]  kunit_try_run_case+0x14c/0x3d0
[   39.203432]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   39.203644]  kthread+0x318/0x618
[   39.203806]  ret_from_fork+0x10/0x20
[   39.204216] 
[   39.204332] Allocated by task 267:
[   39.204458]  kasan_save_stack+0x3c/0x68
[   39.204590]  kasan_save_track+0x20/0x40
[   39.204770]  kasan_save_alloc_info+0x40/0x58
[   39.204987]  __kasan_kmalloc+0xd4/0xd8
[   39.205488]  __kmalloc_cache_noprof+0x15c/0x3c0
[   39.206412]  kasan_atomics+0xb8/0x2e8
[   39.206548]  kunit_try_run_case+0x14c/0x3d0
[   39.206679]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   39.207186]  kthread+0x318/0x618
[   39.207403]  ret_from_fork+0x10/0x20
[   39.207586] 
[   39.207687] The buggy address belongs to the object at fff00000c5dafc80
[   39.207687]  which belongs to the cache kmalloc-64 of size 64
[   39.207968] The buggy address is located 0 bytes to the right of
[   39.207968]  allocated 48-byte region [fff00000c5dafc80, fff00000c5dafcb0)
[   39.208683] 
[   39.208795] The buggy address belongs to the physical page:
[   39.208997] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105daf
[   39.209198] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   39.211411] page_type: f5(slab)
[   39.211541] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   39.211714] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   39.211865] page dumped because: kasan: bad access detected
[   39.211979] 
[   39.212045] Memory state around the buggy address:
[   39.213163]  fff00000c5dafb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   39.213310]  fff00000c5dafc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   39.213444] >fff00000c5dafc80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   39.213585]                                      ^
[   39.213693]  fff00000c5dafd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   39.213824]  fff00000c5dafd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   39.213944] ==================================================================
[   39.025638] ==================================================================
[   39.025725] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf88/0x4858
[   39.025809] Write of size 8 at addr fff00000c5dafcb0 by task kunit_try_catch/267
[   39.025895] 
[   39.025944] CPU: 1 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G    B            N  6.14.0-rc7-next-20250319 #1 PREEMPT 
[   39.026137] Tainted: [B]=BAD_PAGE, [N]=TEST
[   39.026233] Hardware name: linux,dummy-virt (DT)
[   39.026383] Call trace:
[   39.026476]  show_stack+0x20/0x38 (C)
[   39.026629]  dump_stack_lvl+0x8c/0xd0
[   39.026780]  print_report+0x118/0x5f0
[   39.026943]  kasan_report+0xc8/0x118
[   39.027109]  kasan_check_range+0x100/0x1a8
[   39.027279]  __kasan_check_write+0x20/0x30
[   39.027433]  kasan_atomics_helper+0xf88/0x4858
[   39.027720]  kasan_atomics+0x198/0x2e8
[   39.028209]  kunit_try_run_case+0x14c/0x3d0
[   39.028433]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   39.028797]  kthread+0x318/0x618
[   39.029410]  ret_from_fork+0x10/0x20
[   39.029667] 
[   39.029922] Allocated by task 267:
[   39.030699]  kasan_save_stack+0x3c/0x68
[   39.030978]  kasan_save_track+0x20/0x40
[   39.031140]  kasan_save_alloc_info+0x40/0x58
[   39.031308]  __kasan_kmalloc+0xd4/0xd8
[   39.031511]  __kmalloc_cache_noprof+0x15c/0x3c0
[   39.031745]  kasan_atomics+0xb8/0x2e8
[   39.031954]  kunit_try_run_case+0x14c/0x3d0
[   39.032142]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   39.032285]  kthread+0x318/0x618
[   39.032913]  ret_from_fork+0x10/0x20
[   39.033142] 
[   39.033260] The buggy address belongs to the object at fff00000c5dafc80
[   39.033260]  which belongs to the cache kmalloc-64 of size 64
[   39.033493] The buggy address is located 0 bytes to the right of
[   39.033493]  allocated 48-byte region [fff00000c5dafc80, fff00000c5dafcb0)
[   39.033750] 
[   39.033822] The buggy address belongs to the physical page:
[   39.033950] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105daf
[   39.034158] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   39.034332] page_type: f5(slab)
[   39.034448] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   39.034609] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   39.034753] page dumped because: kasan: bad access detected
[   39.034871] 
[   39.035014] Memory state around the buggy address:
[   39.035389]  fff00000c5dafb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   39.036241]  fff00000c5dafc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   39.037074] >fff00000c5dafc80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   39.037295]                                      ^
[   39.037422]  fff00000c5dafd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   39.037566]  fff00000c5dafd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   39.039207] ==================================================================
[   39.412250] ==================================================================
[   39.412512] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x17ec/0x4858
[   39.413015] Write of size 8 at addr fff00000c5dafcb0 by task kunit_try_catch/267
[   39.413295] 
[   39.413700] CPU: 1 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G    B            N  6.14.0-rc7-next-20250319 #1 PREEMPT 
[   39.414225] Tainted: [B]=BAD_PAGE, [N]=TEST
[   39.414839] Hardware name: linux,dummy-virt (DT)
[   39.415180] Call trace:
[   39.415366]  show_stack+0x20/0x38 (C)
[   39.415534]  dump_stack_lvl+0x8c/0xd0
[   39.415677]  print_report+0x118/0x5f0
[   39.415827]  kasan_report+0xc8/0x118
[   39.415977]  kasan_check_range+0x100/0x1a8
[   39.416845]  __kasan_check_write+0x20/0x30
[   39.417257]  kasan_atomics_helper+0x17ec/0x4858
[   39.417418]  kasan_atomics+0x198/0x2e8
[   39.417551]  kunit_try_run_case+0x14c/0x3d0
[   39.417692]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   39.417855]  kthread+0x318/0x618
[   39.418135]  ret_from_fork+0x10/0x20
[   39.418316] 
[   39.418387] Allocated by task 267:
[   39.418489]  kasan_save_stack+0x3c/0x68
[   39.418620]  kasan_save_track+0x20/0x40
[   39.422164]  kasan_save_alloc_info+0x40/0x58
[   39.422318]  __kasan_kmalloc+0xd4/0xd8
[   39.422440]  __kmalloc_cache_noprof+0x15c/0x3c0
[   39.422571]  kasan_atomics+0xb8/0x2e8
[   39.424036]  kunit_try_run_case+0x14c/0x3d0
[   39.424307]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   39.425048]  kthread+0x318/0x618
[   39.425805]  ret_from_fork+0x10/0x20
[   39.425933] 
[   39.426001] The buggy address belongs to the object at fff00000c5dafc80
[   39.426001]  which belongs to the cache kmalloc-64 of size 64
[   39.428490] The buggy address is located 0 bytes to the right of
[   39.428490]  allocated 48-byte region [fff00000c5dafc80, fff00000c5dafcb0)
[   39.431044] 
[   39.431142] The buggy address belongs to the physical page:
[   39.431251] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105daf
[   39.431417] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   39.431578] page_type: f5(slab)
[   39.434081] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   39.434501] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   39.434677] page dumped because: kasan: bad access detected
[   39.434790] 
[   39.434863] Memory state around the buggy address:
[   39.434983]  fff00000c5dafb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   39.436230]  fff00000c5dafc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   39.436557] >fff00000c5dafc80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   39.436994]                                      ^
[   39.437201]  fff00000c5dafd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   39.437651]  fff00000c5dafd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   39.438118] ==================================================================
[   38.876110] ==================================================================
[   38.876249] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3dd8/0x4858
[   38.876416] Read of size 4 at addr fff00000c5dafcb0 by task kunit_try_catch/267
[   38.876585] 
[   38.876680] CPU: 1 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G    B            N  6.14.0-rc7-next-20250319 #1 PREEMPT 
[   38.876956] Tainted: [B]=BAD_PAGE, [N]=TEST
[   38.877136] Hardware name: linux,dummy-virt (DT)
[   38.877253] Call trace:
[   38.877335]  show_stack+0x20/0x38 (C)
[   38.877496]  dump_stack_lvl+0x8c/0xd0
[   38.877646]  print_report+0x118/0x5f0
[   38.878313]  kasan_report+0xc8/0x118
[   38.878486]  __asan_report_load4_noabort+0x20/0x30
[   38.878669]  kasan_atomics_helper+0x3dd8/0x4858
[   38.878861]  kasan_atomics+0x198/0x2e8
[   38.879152]  kunit_try_run_case+0x14c/0x3d0
[   38.879419]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   38.879628]  kthread+0x318/0x618
[   38.879841]  ret_from_fork+0x10/0x20
[   38.880001] 
[   38.880088] Allocated by task 267:
[   38.880182]  kasan_save_stack+0x3c/0x68
[   38.880308]  kasan_save_track+0x20/0x40
[   38.880433]  kasan_save_alloc_info+0x40/0x58
[   38.880565]  __kasan_kmalloc+0xd4/0xd8
[   38.880690]  __kmalloc_cache_noprof+0x15c/0x3c0
[   38.880834]  kasan_atomics+0xb8/0x2e8
[   38.880984]  kunit_try_run_case+0x14c/0x3d0
[   38.881139]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   38.881292]  kthread+0x318/0x618
[   38.881413]  ret_from_fork+0x10/0x20
[   38.881535] 
[   38.881618] The buggy address belongs to the object at fff00000c5dafc80
[   38.881618]  which belongs to the cache kmalloc-64 of size 64
[   38.881956] The buggy address is located 0 bytes to the right of
[   38.881956]  allocated 48-byte region [fff00000c5dafc80, fff00000c5dafcb0)
[   38.882253] 
[   38.882329] The buggy address belongs to the physical page:
[   38.882426] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105daf
[   38.882613] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   38.882768] page_type: f5(slab)
[   38.882861] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   38.883013] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   38.883153] page dumped because: kasan: bad access detected
[   38.883249] 
[   38.883478] Memory state around the buggy address:
[   38.883594]  fff00000c5dafb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   38.884888]  fff00000c5dafc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   38.885047] >fff00000c5dafc80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   38.885204]                                      ^
[   38.885316]  fff00000c5dafd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   38.885459]  fff00000c5dafd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   38.885579] ==================================================================
[   39.256689] ==================================================================
[   39.256833] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x154c/0x4858
[   39.256983] Write of size 8 at addr fff00000c5dafcb0 by task kunit_try_catch/267
[   39.257189] 
[   39.257298] CPU: 1 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G    B            N  6.14.0-rc7-next-20250319 #1 PREEMPT 
[   39.257674] Tainted: [B]=BAD_PAGE, [N]=TEST
[   39.257811] Hardware name: linux,dummy-virt (DT)
[   39.257958] Call trace:
[   39.258084]  show_stack+0x20/0x38 (C)
[   39.258243]  dump_stack_lvl+0x8c/0xd0
[   39.258431]  print_report+0x118/0x5f0
[   39.258694]  kasan_report+0xc8/0x118
[   39.258918]  kasan_check_range+0x100/0x1a8
[   39.259097]  __kasan_check_write+0x20/0x30
[   39.259262]  kasan_atomics_helper+0x154c/0x4858
[   39.259433]  kasan_atomics+0x198/0x2e8
[   39.259588]  kunit_try_run_case+0x14c/0x3d0
[   39.259746]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   39.259933]  kthread+0x318/0x618
[   39.260576]  ret_from_fork+0x10/0x20
[   39.261007] 
[   39.261206] Allocated by task 267:
[   39.261375]  kasan_save_stack+0x3c/0x68
[   39.261576]  kasan_save_track+0x20/0x40
[   39.261691]  kasan_save_alloc_info+0x40/0x58
[   39.261852]  __kasan_kmalloc+0xd4/0xd8
[   39.261973]  __kmalloc_cache_noprof+0x15c/0x3c0
[   39.262135]  kasan_atomics+0xb8/0x2e8
[   39.262267]  kunit_try_run_case+0x14c/0x3d0
[   39.262676]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   39.262949]  kthread+0x318/0x618
[   39.263187]  ret_from_fork+0x10/0x20
[   39.263396] 
[   39.263517] The buggy address belongs to the object at fff00000c5dafc80
[   39.263517]  which belongs to the cache kmalloc-64 of size 64
[   39.263786] The buggy address is located 0 bytes to the right of
[   39.263786]  allocated 48-byte region [fff00000c5dafc80, fff00000c5dafcb0)
[   39.264133] 
[   39.264208] The buggy address belongs to the physical page:
[   39.264313] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105daf
[   39.264964] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   39.265146] page_type: f5(slab)
[   39.265261] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   39.265414] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   39.265556] page dumped because: kasan: bad access detected
[   39.265662] 
[   39.265726] Memory state around the buggy address:
[   39.265832]  fff00000c5dafb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   39.266680]  fff00000c5dafc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   39.266856] >fff00000c5dafc80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   39.266995]                                      ^
[   39.267162]  fff00000c5dafd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   39.267316]  fff00000c5dafd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   39.267662] ==================================================================
[   38.993563] ==================================================================
[   38.994151] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xeb8/0x4858
[   38.994839] Write of size 8 at addr fff00000c5dafcb0 by task kunit_try_catch/267
[   38.995316] 
[   38.995435] CPU: 1 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G    B            N  6.14.0-rc7-next-20250319 #1 PREEMPT 
[   38.995725] Tainted: [B]=BAD_PAGE, [N]=TEST
[   38.995814] Hardware name: linux,dummy-virt (DT)
[   38.995921] Call trace:
[   38.995996]  show_stack+0x20/0x38 (C)
[   38.997257]  dump_stack_lvl+0x8c/0xd0
[   38.997616]  print_report+0x118/0x5f0
[   38.997793]  kasan_report+0xc8/0x118
[   38.997938]  kasan_check_range+0x100/0x1a8
[   38.998942]  __kasan_check_write+0x20/0x30
[   38.999473]  kasan_atomics_helper+0xeb8/0x4858
[   38.999665]  kasan_atomics+0x198/0x2e8
[   38.999850]  kunit_try_run_case+0x14c/0x3d0
[   39.000021]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   39.000233]  kthread+0x318/0x618
[   39.001303]  ret_from_fork+0x10/0x20
[   39.001534] 
[   39.002352] Allocated by task 267:
[   39.002498]  kasan_save_stack+0x3c/0x68
[   39.002969]  kasan_save_track+0x20/0x40
[   39.003147]  kasan_save_alloc_info+0x40/0x58
[   39.003316]  __kasan_kmalloc+0xd4/0xd8
[   39.003443]  __kmalloc_cache_noprof+0x15c/0x3c0
[   39.003939]  kasan_atomics+0xb8/0x2e8
[   39.004158]  kunit_try_run_case+0x14c/0x3d0
[   39.004321]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   39.004894]  kthread+0x318/0x618
[   39.005035]  ret_from_fork+0x10/0x20
[   39.005179] 
[   39.005244] The buggy address belongs to the object at fff00000c5dafc80
[   39.005244]  which belongs to the cache kmalloc-64 of size 64
[   39.005473] The buggy address is located 0 bytes to the right of
[   39.005473]  allocated 48-byte region [fff00000c5dafc80, fff00000c5dafcb0)
[   39.005694] 
[   39.006129] The buggy address belongs to the physical page:
[   39.006618] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105daf
[   39.007033] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   39.007233] page_type: f5(slab)
[   39.007393] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   39.007638] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   39.007784] page dumped because: kasan: bad access detected
[   39.007940] 
[   39.008077] Memory state around the buggy address:
[   39.008260]  fff00000c5dafb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   39.008476]  fff00000c5dafc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   39.008656] >fff00000c5dafc80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   39.008799]                                      ^
[   39.008938]  fff00000c5dafd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   39.009109]  fff00000c5dafd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   39.009234] ==================================================================
[   39.370310] ==================================================================
[   39.370834] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x175c/0x4858
[   39.371317] Write of size 8 at addr fff00000c5dafcb0 by task kunit_try_catch/267
[   39.371663] 
[   39.372068] CPU: 1 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G    B            N  6.14.0-rc7-next-20250319 #1 PREEMPT 
[   39.372356] Tainted: [B]=BAD_PAGE, [N]=TEST
[   39.372460] Hardware name: linux,dummy-virt (DT)
[   39.372568] Call trace:
[   39.372842]  show_stack+0x20/0x38 (C)
[   39.373728]  dump_stack_lvl+0x8c/0xd0
[   39.373920]  print_report+0x118/0x5f0
[   39.374095]  kasan_report+0xc8/0x118
[   39.374721]  kasan_check_range+0x100/0x1a8
[   39.375627]  __kasan_check_write+0x20/0x30
[   39.376169]  kasan_atomics_helper+0x175c/0x4858
[   39.377098]  kasan_atomics+0x198/0x2e8
[   39.377750]  kunit_try_run_case+0x14c/0x3d0
[   39.377941]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   39.378478]  kthread+0x318/0x618
[   39.378671]  ret_from_fork+0x10/0x20
[   39.378833] 
[   39.378901] Allocated by task 267:
[   39.379008]  kasan_save_stack+0x3c/0x68
[   39.379153]  kasan_save_track+0x20/0x40
[   39.379276]  kasan_save_alloc_info+0x40/0x58
[   39.379412]  __kasan_kmalloc+0xd4/0xd8
[   39.380339]  __kmalloc_cache_noprof+0x15c/0x3c0
[   39.381084]  kasan_atomics+0xb8/0x2e8
[   39.381404]  kunit_try_run_case+0x14c/0x3d0
[   39.381718]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   39.382321]  kthread+0x318/0x618
[   39.382887]  ret_from_fork+0x10/0x20
[   39.383041] 
[   39.383567] The buggy address belongs to the object at fff00000c5dafc80
[   39.383567]  which belongs to the cache kmalloc-64 of size 64
[   39.384186] The buggy address is located 0 bytes to the right of
[   39.384186]  allocated 48-byte region [fff00000c5dafc80, fff00000c5dafcb0)
[   39.384733] 
[   39.384815] The buggy address belongs to the physical page:
[   39.385342] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105daf
[   39.386178] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   39.386538] page_type: f5(slab)
[   39.386692] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   39.386854] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   39.387005] page dumped because: kasan: bad access detected
[   39.387964] 
[   39.388410] Memory state around the buggy address:
[   39.388599]  fff00000c5dafb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   39.389152]  fff00000c5dafc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   39.389792] >fff00000c5dafc80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   39.390417]                                      ^
[   39.390689]  fff00000c5dafd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   39.390841]  fff00000c5dafd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   39.390985] ==================================================================
[   38.741789] ==================================================================
[   38.741940] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa04/0x4858
[   38.742181] Write of size 4 at addr fff00000c5dafcb0 by task kunit_try_catch/267
[   38.742465] 
[   38.742574] CPU: 1 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G    B            N  6.14.0-rc7-next-20250319 #1 PREEMPT 
[   38.742844] Tainted: [B]=BAD_PAGE, [N]=TEST
[   38.742952] Hardware name: linux,dummy-virt (DT)
[   38.743081] Call trace:
[   38.743163]  show_stack+0x20/0x38 (C)
[   38.743468]  dump_stack_lvl+0x8c/0xd0
[   38.743643]  print_report+0x118/0x5f0
[   38.743813]  kasan_report+0xc8/0x118
[   38.744087]  kasan_check_range+0x100/0x1a8
[   38.744342]  __kasan_check_write+0x20/0x30
[   38.744549]  kasan_atomics_helper+0xa04/0x4858
[   38.744814]  kasan_atomics+0x198/0x2e8
[   38.744973]  kunit_try_run_case+0x14c/0x3d0
[   38.745487]  kthread+0x318/0x618
[   38.747630]  ret_from_fork+0x10/0x20
[   38.748273] 
[   38.748451] The buggy address belongs to the physical page:
[   38.748564] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105daf
[   38.748757] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   38.749010] page_type: f5(slab)
[   38.749154] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   38.749328] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   38.749462] page dumped because: kasan: bad access detected
[   38.749612] 
[   38.749738] Memory state around the buggy address:
[   38.749857]  fff00000c5dafb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   38.750013]  fff00000c5dafc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   38.750186] >fff00000c5dafc80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   38.750324]                                      ^
[   38.750508]  fff00000c5dafd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   38.750746]  fff00000c5dafd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   38.750976] ==================================================================
[   39.393495] ==================================================================
[   39.393675] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e20/0x4858
[   39.394010] Read of size 8 at addr fff00000c5dafcb0 by task kunit_try_catch/267
[   39.394264] 
[   39.394369] CPU: 1 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G    B            N  6.14.0-rc7-next-20250319 #1 PREEMPT 
[   39.394676] Tainted: [B]=BAD_PAGE, [N]=TEST
[   39.394774] Hardware name: linux,dummy-virt (DT)
[   39.394880] Call trace:
[   39.394968]  show_stack+0x20/0x38 (C)
[   39.396283]  dump_stack_lvl+0x8c/0xd0
[   39.396858]  print_report+0x118/0x5f0
[   39.397029]  kasan_report+0xc8/0x118
[   39.397365]  __asan_report_load8_noabort+0x20/0x30
[   39.397625]  kasan_atomics_helper+0x3e20/0x4858
[   39.397868]  kasan_atomics+0x198/0x2e8
[   39.398015]  kunit_try_run_case+0x14c/0x3d0
[   39.398630]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   39.398836]  kthread+0x318/0x618
[   39.399433]  ret_from_fork+0x10/0x20
[   39.399642] 
[   39.399711] Allocated by task 267:
[   39.399812]  kasan_save_stack+0x3c/0x68
[   39.399935]  kasan_save_track+0x20/0x40
[   39.400079]  kasan_save_alloc_info+0x40/0x58
[   39.401086]  __kasan_kmalloc+0xd4/0xd8
[   39.401581]  __kmalloc_cache_noprof+0x15c/0x3c0
[   39.401758]  kasan_atomics+0xb8/0x2e8
[   39.401898]  kunit_try_run_case+0x14c/0x3d0
[   39.402035]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   39.402214]  kthread+0x318/0x618
[   39.402516]  ret_from_fork+0x10/0x20
[   39.403463] 
[   39.403900] The buggy address belongs to the object at fff00000c5dafc80
[   39.403900]  which belongs to the cache kmalloc-64 of size 64
[   39.404386] The buggy address is located 0 bytes to the right of
[   39.404386]  allocated 48-byte region [fff00000c5dafc80, fff00000c5dafcb0)
[   39.405133] 
[   39.405210] The buggy address belongs to the physical page:
[   39.405317] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105daf
[   39.406035] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   39.406783] page_type: f5(slab)
[   39.406934] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   39.407626] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   39.408174] page dumped because: kasan: bad access detected
[   39.408296] 
[   39.408369] Memory state around the buggy address:
[   39.408481]  fff00000c5dafb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   39.408776]  fff00000c5dafc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   39.409481] >fff00000c5dafc80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   39.409815]                                      ^
[   39.410182]  fff00000c5dafd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   39.410402]  fff00000c5dafd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   39.410533] ==================================================================
[   39.214502] ==================================================================
[   39.214727] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1414/0x4858
[   39.214985] Write of size 8 at addr fff00000c5dafcb0 by task kunit_try_catch/267
[   39.215270] 
[   39.215432] CPU: 1 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G    B            N  6.14.0-rc7-next-20250319 #1 PREEMPT 
[   39.215818] Tainted: [B]=BAD_PAGE, [N]=TEST
[   39.215916] Hardware name: linux,dummy-virt (DT)
[   39.216021] Call trace:
[   39.216410]  show_stack+0x20/0x38 (C)
[   39.216659]  dump_stack_lvl+0x8c/0xd0
[   39.218253]  print_report+0x118/0x5f0
[   39.218389]  kasan_report+0xc8/0x118
[   39.218526]  kasan_check_range+0x100/0x1a8
[   39.218676]  __kasan_check_write+0x20/0x30
[   39.218810]  kasan_atomics_helper+0x1414/0x4858
[   39.219890]  kasan_atomics+0x198/0x2e8
[   39.220187]  kunit_try_run_case+0x14c/0x3d0
[   39.220397]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   39.220945]  kthread+0x318/0x618
[   39.221267]  ret_from_fork+0x10/0x20
[   39.221540] 
[   39.221623] Allocated by task 267:
[   39.221780]  kasan_save_stack+0x3c/0x68
[   39.221934]  kasan_save_track+0x20/0x40
[   39.222046]  kasan_save_alloc_info+0x40/0x58
[   39.222239]  __kasan_kmalloc+0xd4/0xd8
[   39.222398]  __kmalloc_cache_noprof+0x15c/0x3c0
[   39.222989]  kasan_atomics+0xb8/0x2e8
[   39.223165]  kunit_try_run_case+0x14c/0x3d0
[   39.223358]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   39.223804]  kthread+0x318/0x618
[   39.224102]  ret_from_fork+0x10/0x20
[   39.224248] 
[   39.224398] The buggy address belongs to the object at fff00000c5dafc80
[   39.224398]  which belongs to the cache kmalloc-64 of size 64
[   39.224651] The buggy address is located 0 bytes to the right of
[   39.224651]  allocated 48-byte region [fff00000c5dafc80, fff00000c5dafcb0)
[   39.224954] 
[   39.225026] The buggy address belongs to the physical page:
[   39.225152] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105daf
[   39.225319] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   39.225498] page_type: f5(slab)
[   39.225937] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   39.226233] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   39.226482] page dumped because: kasan: bad access detected
[   39.226645] 
[   39.226708] Memory state around the buggy address:
[   39.226815]  fff00000c5dafb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   39.227118]  fff00000c5dafc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   39.227278] >fff00000c5dafc80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   39.227493]                                      ^
[   39.227986]  fff00000c5dafd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   39.228179]  fff00000c5dafd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   39.228315] ==================================================================
[   38.695124] ==================================================================
[   38.695262] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x42d8/0x4858
[   38.695417] Read of size 4 at addr fff00000c5dafcb0 by task kunit_try_catch/267
[   38.695584] 
[   38.695685] CPU: 1 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G    B            N  6.14.0-rc7-next-20250319 #1 PREEMPT 
[   38.695959] Tainted: [B]=BAD_PAGE, [N]=TEST
[   38.696077] Hardware name: linux,dummy-virt (DT)
[   38.696178] Call trace:
[   38.696248]  show_stack+0x20/0x38 (C)
[   38.696989]  dump_stack_lvl+0x8c/0xd0
[   38.697219]  print_report+0x118/0x5f0
[   38.697538]  kasan_report+0xc8/0x118
[   38.698029]  __asan_report_load4_noabort+0x20/0x30
[   38.698258]  kasan_atomics_helper+0x42d8/0x4858
[   38.698429]  kasan_atomics+0x198/0x2e8
[   38.698625]  kunit_try_run_case+0x14c/0x3d0
[   38.698890]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   38.699281]  kthread+0x318/0x618
[   38.699978]  ret_from_fork+0x10/0x20
[   38.700237] 
[   38.700306] Allocated by task 267:
[   38.700414]  kasan_save_stack+0x3c/0x68
[   38.700547]  kasan_save_track+0x20/0x40
[   38.700668]  kasan_save_alloc_info+0x40/0x58
[   38.701871]  __kasan_kmalloc+0xd4/0xd8
[   38.701977]  __kmalloc_cache_noprof+0x15c/0x3c0
[   38.702074]  kasan_atomics+0xb8/0x2e8
[   38.702178]  kunit_try_run_case+0x14c/0x3d0
[   38.702250]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   38.702388]  kthread+0x318/0x618
[   38.702520]  ret_from_fork+0x10/0x20
[   38.702637] 
[   38.702699] The buggy address belongs to the object at fff00000c5dafc80
[   38.702699]  which belongs to the cache kmalloc-64 of size 64
[   38.702942] The buggy address is located 0 bytes to the right of
[   38.702942]  allocated 48-byte region [fff00000c5dafc80, fff00000c5dafcb0)
[   38.703304] 
[   38.703515] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105daf
[   38.703711] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   38.704075] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   38.705150] >fff00000c5dafc80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   38.705556]  fff00000c5dafd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   38.709130] 
[   38.709706] Tainted: [B]=BAD_PAGE, [N]=TEST
[   38.710319]  print_report+0x118/0x5f0
[   38.711422]  kasan_atomics+0x198/0x2e8
[   38.712801] Allocated by task 267:
[   38.713422]  __kasan_kmalloc+0xd4/0xd8
[   38.713541]  __kmalloc_cache_noprof+0x15c/0x3c0
[   38.713675]  kasan_atomics+0xb8/0x2e8
[   38.713795]  kunit_try_run_case+0x14c/0x3d0
[   38.713958]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   38.714194]  kthread+0x318/0x618
[   38.714386]  ret_from_fork+0x10/0x20
[   38.715042] 
[   38.715590] The buggy address belongs to the object at fff00000c5dafc80
[   38.715590]  which belongs to the cache kmalloc-64 of size 64
[   38.716674] The buggy address is located 0 bytes to the right of
[   38.716674]  allocated 48-byte region [fff00000c5dafc80, fff00000c5dafcb0)
[   38.717555] 
[   38.718166] The buggy address belongs to the physical page:
[   38.718363] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105daf
[   38.718819] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   38.719044] page_type: f5(slab)
[   38.720303] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   38.720923] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   38.721343] page dumped because: kasan: bad access detected
[   38.721742] 
[   38.722238] Memory state around the buggy address:
[   38.722588]  fff00000c5dafb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   38.723640]  fff00000c5dafc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   38.724223] >fff00000c5dafc80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   38.724381]                                      ^
[   38.724622]  fff00000c5dafd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   38.724803]  fff00000c5dafd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   38.725570] ==================================================================
[   39.089657] ==================================================================
[   39.090117] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1128/0x4858
[   39.090278] Write of size 8 at addr fff00000c5dafcb0 by task kunit_try_catch/267
[   39.090446] 
[   39.090540] CPU: 1 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G    B            N  6.14.0-rc7-next-20250319 #1 PREEMPT 
[   39.090826] Tainted: [B]=BAD_PAGE, [N]=TEST
[   39.090922] Hardware name: linux,dummy-virt (DT)
[   39.091036] Call trace:
[   39.091131]  show_stack+0x20/0x38 (C)
[   39.091279]  dump_stack_lvl+0x8c/0xd0
[   39.091432]  print_report+0x118/0x5f0
[   39.091579]  kasan_report+0xc8/0x118
[   39.091724]  kasan_check_range+0x100/0x1a8
[   39.091873]  __kasan_check_write+0x20/0x30
[   39.092039]  kasan_atomics_helper+0x1128/0x4858
[   39.092234]  kasan_atomics+0x198/0x2e8
[   39.092916]  kunit_try_run_case+0x14c/0x3d0
[   39.093288]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   39.093507]  kthread+0x318/0x618
[   39.094170]  ret_from_fork+0x10/0x20
[   39.094443] 
[   39.094562] Allocated by task 267:
[   39.094664]  kasan_save_stack+0x3c/0x68
[   39.094806]  kasan_save_track+0x20/0x40
[   39.095015]  kasan_save_alloc_info+0x40/0x58
[   39.095338]  __kasan_kmalloc+0xd4/0xd8
[   39.095472]  __kmalloc_cache_noprof+0x15c/0x3c0
[   39.095646]  kasan_atomics+0xb8/0x2e8
[   39.095854]  kunit_try_run_case+0x14c/0x3d0
[   39.096274]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   39.097104]  kthread+0x318/0x618
[   39.097260]  ret_from_fork+0x10/0x20
[   39.097391] 
[   39.098347] The buggy address belongs to the object at fff00000c5dafc80
[   39.098347]  which belongs to the cache kmalloc-64 of size 64
[   39.099018] The buggy address is located 0 bytes to the right of
[   39.099018]  allocated 48-byte region [fff00000c5dafc80, fff00000c5dafcb0)
[   39.100015] 
[   39.100116] The buggy address belongs to the physical page:
[   39.100228] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105daf
[   39.101424] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   39.102305] page_type: f5(slab)
[   39.102513] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   39.103684] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   39.104268] page dumped because: kasan: bad access detected
[   39.104697] 
[   39.105541] Memory state around the buggy address:
[   39.106015]  fff00000c5dafb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   39.106235]  fff00000c5dafc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   39.106396] >fff00000c5dafc80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   39.107796]                                      ^
[   39.108426]  fff00000c5dafd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   39.109267]  fff00000c5dafd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   39.110156] ==================================================================
[   39.325945] ==================================================================
[   39.326194] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x16d0/0x4858
[   39.326418] Write of size 8 at addr fff00000c5dafcb0 by task kunit_try_catch/267
[   39.326585] 
[   39.326679] CPU: 1 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G    B            N  6.14.0-rc7-next-20250319 #1 PREEMPT 
[   39.326972] Tainted: [B]=BAD_PAGE, [N]=TEST
[   39.327086] Hardware name: linux,dummy-virt (DT)
[   39.327189] Call trace:
[   39.327259]  show_stack+0x20/0x38 (C)
[   39.327519]  dump_stack_lvl+0x8c/0xd0
[   39.327938]  print_report+0x118/0x5f0
[   39.328130]  kasan_report+0xc8/0x118
[   39.328282]  kasan_check_range+0x100/0x1a8
[   39.328484]  __kasan_check_write+0x20/0x30
[   39.329580]  kasan_atomics_helper+0x16d0/0x4858
[   39.329762]  kasan_atomics+0x198/0x2e8
[   39.330500]  kunit_try_run_case+0x14c/0x3d0
[   39.331076]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   39.331514]  kthread+0x318/0x618
[   39.331700]  ret_from_fork+0x10/0x20
[   39.332799] 
[   39.332966] Allocated by task 267:
[   39.333101]  kasan_save_stack+0x3c/0x68
[   39.333420]  kasan_save_track+0x20/0x40
[   39.333569]  kasan_save_alloc_info+0x40/0x58
[   39.333704]  __kasan_kmalloc+0xd4/0xd8
[   39.333830]  __kmalloc_cache_noprof+0x15c/0x3c0
[   39.334588]  kasan_atomics+0xb8/0x2e8
[   39.335184]  kunit_try_run_case+0x14c/0x3d0
[   39.335417]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   39.336218]  kthread+0x318/0x618
[   39.336366]  ret_from_fork+0x10/0x20
[   39.336493] 
[   39.336565] The buggy address belongs to the object at fff00000c5dafc80
[   39.336565]  which belongs to the cache kmalloc-64 of size 64
[   39.336765] The buggy address is located 0 bytes to the right of
[   39.336765]  allocated 48-byte region [fff00000c5dafc80, fff00000c5dafcb0)
[   39.336989] 
[   39.338659] The buggy address belongs to the physical page:
[   39.339434] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105daf
[   39.340000] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   39.340930] page_type: f5(slab)
[   39.341075] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   39.341242] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   39.342626] page dumped because: kasan: bad access detected
[   39.342808] 
[   39.342879] Memory state around the buggy address:
[   39.342991]  fff00000c5dafb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   39.344514]  fff00000c5dafc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   39.344861] >fff00000c5dafc80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   39.346186]                                      ^
[   39.346648]  fff00000c5dafd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   39.346853]  fff00000c5dafd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   39.347890] ==================================================================
[   39.177949] ==================================================================
[   39.178218] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1384/0x4858
[   39.178496] Write of size 8 at addr fff00000c5dafcb0 by task kunit_try_catch/267
[   39.178650] 
[   39.178741] CPU: 1 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G    B            N  6.14.0-rc7-next-20250319 #1 PREEMPT 
[   39.179506] Tainted: [B]=BAD_PAGE, [N]=TEST
[   39.179741] Hardware name: linux,dummy-virt (DT)
[   39.180588] Call trace:
[   39.180939]  show_stack+0x20/0x38 (C)
[   39.181174]  dump_stack_lvl+0x8c/0xd0
[   39.181663]  print_report+0x118/0x5f0
[   39.181996]  kasan_report+0xc8/0x118
[   39.182194]  kasan_check_range+0x100/0x1a8
[   39.182831]  __kasan_check_write+0x20/0x30
[   39.184133]  kasan_atomics_helper+0x1384/0x4858
[   39.184494]  kasan_atomics+0x198/0x2e8
[   39.184664]  kunit_try_run_case+0x14c/0x3d0
[   39.184830]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   39.185286]  kthread+0x318/0x618
[   39.185778]  ret_from_fork+0x10/0x20
[   39.185944] 
[   39.186013] Allocated by task 267:
[   39.186277]  kasan_save_stack+0x3c/0x68
[   39.186621]  kasan_save_track+0x20/0x40
[   39.187101]  kasan_save_alloc_info+0x40/0x58
[   39.187250]  __kasan_kmalloc+0xd4/0xd8
[   39.187365]  __kmalloc_cache_noprof+0x15c/0x3c0
[   39.187934]  kasan_atomics+0xb8/0x2e8
[   39.188315]  kunit_try_run_case+0x14c/0x3d0
[   39.189008]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   39.189441]  kthread+0x318/0x618
[   39.189568]  ret_from_fork+0x10/0x20
[   39.189969] 
[   39.190289] The buggy address belongs to the object at fff00000c5dafc80
[   39.190289]  which belongs to the cache kmalloc-64 of size 64
[   39.190624] The buggy address is located 0 bytes to the right of
[   39.190624]  allocated 48-byte region [fff00000c5dafc80, fff00000c5dafcb0)
[   39.191344] 
[   39.191594] The buggy address belongs to the physical page:
[   39.192121] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105daf
[   39.192621] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   39.192927] page_type: f5(slab)
[   39.193459] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   39.193968] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   39.194199] page dumped because: kasan: bad access detected
[   39.194312] 
[   39.195119] Memory state around the buggy address:
[   39.195310]  fff00000c5dafb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   39.195489]  fff00000c5dafc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   39.195642] >fff00000c5dafc80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   39.195840]                                      ^
[   39.195963]  fff00000c5dafd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   39.196144]  fff00000c5dafd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   39.196293] ==================================================================
[   39.076925] ==================================================================
[   39.077086] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x10c0/0x4858
[   39.077547] Write of size 8 at addr fff00000c5dafcb0 by task kunit_try_catch/267
[   39.077821] 
[   39.077977] CPU: 1 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G    B            N  6.14.0-rc7-next-20250319 #1 PREEMPT 
[   39.078437] Tainted: [B]=BAD_PAGE, [N]=TEST
[   39.078547] Hardware name: linux,dummy-virt (DT)
[   39.078650] Call trace:
[   39.078746]  show_stack+0x20/0x38 (C)
[   39.078948]  dump_stack_lvl+0x8c/0xd0
[   39.079112]  print_report+0x118/0x5f0
[   39.079253]  kasan_report+0xc8/0x118
[   39.079397]  kasan_check_range+0x100/0x1a8
[   39.079550]  __kasan_check_write+0x20/0x30
[   39.079720]  kasan_atomics_helper+0x10c0/0x4858
[   39.079892]  kasan_atomics+0x198/0x2e8
[   39.080047]  kunit_try_run_case+0x14c/0x3d0
[   39.080907]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   39.081198]  kthread+0x318/0x618
[   39.081362]  ret_from_fork+0x10/0x20
[   39.081519] 
[   39.081588] Allocated by task 267:
[   39.081674]  kasan_save_stack+0x3c/0x68
[   39.081871]  kasan_save_track+0x20/0x40
[   39.082389]  kasan_save_alloc_info+0x40/0x58
[   39.082612]  __kasan_kmalloc+0xd4/0xd8
[   39.082803]  __kmalloc_cache_noprof+0x15c/0x3c0
[   39.083034]  kasan_atomics+0xb8/0x2e8
[   39.083275]  kunit_try_run_case+0x14c/0x3d0
[   39.083493]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   39.083662]  kthread+0x318/0x618
[   39.083787]  ret_from_fork+0x10/0x20
[   39.083914] 
[   39.083989] The buggy address belongs to the object at fff00000c5dafc80
[   39.083989]  which belongs to the cache kmalloc-64 of size 64
[   39.084196] The buggy address is located 0 bytes to the right of
[   39.084196]  allocated 48-byte region [fff00000c5dafc80, fff00000c5dafcb0)
[   39.084478] 
[   39.085011] The buggy address belongs to the physical page:
[   39.085438] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105daf
[   39.085642] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   39.085866] page_type: f5(slab)
[   39.086086] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   39.086495] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   39.086940] page dumped because: kasan: bad access detected
[   39.087156] 
[   39.087266] Memory state around the buggy address:
[   39.087451]  fff00000c5dafb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   39.087690]  fff00000c5dafc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   39.087929] >fff00000c5dafc80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   39.088158]                                      ^
[   39.088342]  fff00000c5dafd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   39.088541]  fff00000c5dafd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   39.088965] ==================================================================
[   39.155389] ==================================================================
[   39.155543] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x12d8/0x4858
[   39.155697] Write of size 8 at addr fff00000c5dafcb0 by task kunit_try_catch/267
[   39.155863] 
[   39.155962] CPU: 1 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G    B            N  6.14.0-rc7-next-20250319 #1 PREEMPT 
[   39.156268] Tainted: [B]=BAD_PAGE, [N]=TEST
[   39.156365] Hardware name: linux,dummy-virt (DT)
[   39.159149] Call trace:
[   39.159235]  show_stack+0x20/0x38 (C)
[   39.159395]  dump_stack_lvl+0x8c/0xd0
[   39.159540]  print_report+0x118/0x5f0
[   39.159691]  kasan_report+0xc8/0x118
[   39.159841]  kasan_check_range+0x100/0x1a8
[   39.159988]  __kasan_check_write+0x20/0x30
[   39.160162]  kasan_atomics_helper+0x12d8/0x4858
[   39.160326]  kasan_atomics+0x198/0x2e8
[   39.160484]  kunit_try_run_case+0x14c/0x3d0
[   39.160652]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   39.160827]  kthread+0x318/0x618
[   39.160983]  ret_from_fork+0x10/0x20
[   39.164688] 
[   39.164766] Allocated by task 267:
[   39.165262]  kasan_save_stack+0x3c/0x68
[   39.166081]  kasan_save_track+0x20/0x40
[   39.166228]  kasan_save_alloc_info+0x40/0x58
[   39.166356]  __kasan_kmalloc+0xd4/0xd8
[   39.166482]  __kmalloc_cache_noprof+0x15c/0x3c0
[   39.166656]  kasan_atomics+0xb8/0x2e8
[   39.166786]  kunit_try_run_case+0x14c/0x3d0
[   39.166915]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   39.167294]  kthread+0x318/0x618
[   39.167735]  ret_from_fork+0x10/0x20
[   39.168246] 
[   39.168560] The buggy address belongs to the object at fff00000c5dafc80
[   39.168560]  which belongs to the cache kmalloc-64 of size 64
[   39.169145] The buggy address is located 0 bytes to the right of
[   39.169145]  allocated 48-byte region [fff00000c5dafc80, fff00000c5dafcb0)
[   39.169362] 
[   39.169441] The buggy address belongs to the physical page:
[   39.169651] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105daf
[   39.170680] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   39.171241] page_type: f5(slab)
[   39.171648] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   39.172563] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   39.173272] page dumped because: kasan: bad access detected
[   39.173735] 
[   39.174110] Memory state around the buggy address:
[   39.174305]  fff00000c5dafb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   39.174624]  fff00000c5dafc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   39.174772] >fff00000c5dafc80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   39.174902]                                      ^
[   39.175030]  fff00000c5dafd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   39.175214]  fff00000c5dafd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   39.176476] ==================================================================
[   38.806575] ==================================================================
[   38.807088] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xb70/0x4858
[   38.808240] Tainted: [B]=BAD_PAGE, [N]=TEST
[   38.808453] Call trace:
[   38.810316]  __kasan_check_write+0x20/0x30
[   38.813092]  ret_from_fork+0x10/0x20
[   38.815267]  kthread+0x318/0x618
[   38.815535] 
[   38.817087] page_type: f5(slab)
[   38.817208] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   38.817522] page dumped because: kasan: bad access detected
[   38.819488]                                      ^
[   38.822411] 
[   38.822869] Hardware name: linux,dummy-virt (DT)
[   38.826574]  kthread+0x318/0x618
[   38.830355] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   38.830971]  fff00000c5dafb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   38.831553]  fff00000c5dafd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   38.834288] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xc08/0x4858
[   38.835197] Tainted: [B]=BAD_PAGE, [N]=TEST
[   38.835678]  dump_stack_lvl+0x8c/0xd0
[   38.836478]  __kasan_check_write+0x20/0x30
[   38.842812]  __kasan_kmalloc+0xd4/0xd8
[   38.844248]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   38.845481] The buggy address is located 0 bytes to the right of
[   38.845481]  allocated 48-byte region [fff00000c5dafc80, fff00000c5dafcb0)
[   38.847641] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   38.848262] page dumped because: kasan: bad access detected
[   38.848390] 
[   38.848462] Memory state around the buggy address:
[   38.848569]  fff00000c5dafb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   38.848712]  fff00000c5dafc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   38.848861] >fff00000c5dafc80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   38.848998]                                      ^
[   38.849138]  fff00000c5dafd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   38.849289]  fff00000c5dafd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   38.850323] ==================================================================
[   39.349606] ==================================================================
[   39.350108] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e10/0x4858
[   39.351010] Read of size 8 at addr fff00000c5dafcb0 by task kunit_try_catch/267
[   39.351443] 
[   39.351558] CPU: 1 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G    B            N  6.14.0-rc7-next-20250319 #1 PREEMPT 
[   39.351829] Tainted: [B]=BAD_PAGE, [N]=TEST
[   39.351924] Hardware name: linux,dummy-virt (DT)
[   39.352036] Call trace:
[   39.352132]  show_stack+0x20/0x38 (C)
[   39.352294]  dump_stack_lvl+0x8c/0xd0
[   39.353530]  print_report+0x118/0x5f0
[   39.353860]  kasan_report+0xc8/0x118
[   39.354318]  __asan_report_load8_noabort+0x20/0x30
[   39.354916]  kasan_atomics_helper+0x3e10/0x4858
[   39.355288]  kasan_atomics+0x198/0x2e8
[   39.355982]  kunit_try_run_case+0x14c/0x3d0
[   39.356510]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   39.357095]  kthread+0x318/0x618
[   39.357534]  ret_from_fork+0x10/0x20
[   39.358018] 
[   39.358110] Allocated by task 267:
[   39.358214]  kasan_save_stack+0x3c/0x68
[   39.358473]  kasan_save_track+0x20/0x40
[   39.359135]  kasan_save_alloc_info+0x40/0x58
[   39.359764]  __kasan_kmalloc+0xd4/0xd8
[   39.360097]  __kmalloc_cache_noprof+0x15c/0x3c0
[   39.360250]  kasan_atomics+0xb8/0x2e8
[   39.360436]  kunit_try_run_case+0x14c/0x3d0
[   39.361152]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   39.361638]  kthread+0x318/0x618
[   39.361766]  ret_from_fork+0x10/0x20
[   39.361889] 
[   39.361957] The buggy address belongs to the object at fff00000c5dafc80
[   39.361957]  which belongs to the cache kmalloc-64 of size 64
[   39.362582] The buggy address is located 0 bytes to the right of
[   39.362582]  allocated 48-byte region [fff00000c5dafc80, fff00000c5dafcb0)
[   39.363459] 
[   39.363717] The buggy address belongs to the physical page:
[   39.363838] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105daf
[   39.364376] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   39.364974] page_type: f5(slab)
[   39.365269] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   39.365736] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   39.365874] page dumped because: kasan: bad access detected
[   39.365982] 
[   39.366045] Memory state around the buggy address:
[   39.366179]  fff00000c5dafb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   39.366329]  fff00000c5dafc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   39.366486] >fff00000c5dafc80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   39.367244]                                      ^
[   39.367585]  fff00000c5dafd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   39.368400]  fff00000c5dafd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   39.368556] ==================================================================
[   39.142796] ==================================================================
[   39.143000] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x126c/0x4858
[   39.143177] Write of size 8 at addr fff00000c5dafcb0 by task kunit_try_catch/267
[   39.143335] 
[   39.143431] CPU: 1 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G    B            N  6.14.0-rc7-next-20250319 #1 PREEMPT 
[   39.143696] Tainted: [B]=BAD_PAGE, [N]=TEST
[   39.143849] Hardware name: linux,dummy-virt (DT)
[   39.143976] Call trace:
[   39.144075]  show_stack+0x20/0x38 (C)
[   39.144264]  dump_stack_lvl+0x8c/0xd0
[   39.144449]  print_report+0x118/0x5f0
[   39.144658]  kasan_report+0xc8/0x118
[   39.144901]  kasan_check_range+0x100/0x1a8
[   39.145126]  __kasan_check_write+0x20/0x30
[   39.145322]  kasan_atomics_helper+0x126c/0x4858
[   39.145614]  kasan_atomics+0x198/0x2e8
[   39.145862]  kunit_try_run_case+0x14c/0x3d0
[   39.146137]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   39.146433]  kthread+0x318/0x618
[   39.146622]  ret_from_fork+0x10/0x20
[   39.146773] 
[   39.146840] Allocated by task 267:
[   39.146947]  kasan_save_stack+0x3c/0x68
[   39.147138]  kasan_save_track+0x20/0x40
[   39.147293]  kasan_save_alloc_info+0x40/0x58
[   39.147507]  __kasan_kmalloc+0xd4/0xd8
[   39.147641]  __kmalloc_cache_noprof+0x15c/0x3c0
[   39.147780]  kasan_atomics+0xb8/0x2e8
[   39.147911]  kunit_try_run_case+0x14c/0x3d0
[   39.148048]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   39.148215]  kthread+0x318/0x618
[   39.148333]  ret_from_fork+0x10/0x20
[   39.148449] 
[   39.148509] The buggy address belongs to the object at fff00000c5dafc80
[   39.148509]  which belongs to the cache kmalloc-64 of size 64
[   39.148684] The buggy address is located 0 bytes to the right of
[   39.148684]  allocated 48-byte region [fff00000c5dafc80, fff00000c5dafcb0)
[   39.149026] 
[   39.149126] The buggy address belongs to the physical page:
[   39.150149] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105daf
[   39.150358] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   39.150517] page_type: f5(slab)
[   39.151527] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   39.152149] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   39.152742] page dumped because: kasan: bad access detected
[   39.152861] 
[   39.152926] Memory state around the buggy address:
[   39.153036]  fff00000c5dafb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   39.153238]  fff00000c5dafc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   39.153387] >fff00000c5dafc80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   39.153523]                                      ^
[   39.153638]  fff00000c5dafd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   39.153789]  fff00000c5dafd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   39.153924] ==================================================================
[   39.062870] ==================================================================
[   39.063030] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1058/0x4858
[   39.063206] Write of size 8 at addr fff00000c5dafcb0 by task kunit_try_catch/267
[   39.063371] 
[   39.063462] CPU: 1 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G    B            N  6.14.0-rc7-next-20250319 #1 PREEMPT 
[   39.063746] Tainted: [B]=BAD_PAGE, [N]=TEST
[   39.063844] Hardware name: linux,dummy-virt (DT)
[   39.063949] Call trace:
[   39.064024]  show_stack+0x20/0x38 (C)
[   39.064877]  dump_stack_lvl+0x8c/0xd0
[   39.065021]  print_report+0x118/0x5f0
[   39.065201]  kasan_report+0xc8/0x118
[   39.065349]  kasan_check_range+0x100/0x1a8
[   39.065507]  __kasan_check_write+0x20/0x30
[   39.065730]  kasan_atomics_helper+0x1058/0x4858
[   39.065945]  kasan_atomics+0x198/0x2e8
[   39.066327]  kunit_try_run_case+0x14c/0x3d0
[   39.066502]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   39.066736]  kthread+0x318/0x618
[   39.067223]  ret_from_fork+0x10/0x20
[   39.067406] 
[   39.067495] Allocated by task 267:
[   39.067745]  kasan_save_stack+0x3c/0x68
[   39.067933]  kasan_save_track+0x20/0x40
[   39.068617]  kasan_save_alloc_info+0x40/0x58
[   39.068768]  __kasan_kmalloc+0xd4/0xd8
[   39.068884]  __kmalloc_cache_noprof+0x15c/0x3c0
[   39.069027]  kasan_atomics+0xb8/0x2e8
[   39.069213]  kunit_try_run_case+0x14c/0x3d0
[   39.069574]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   39.070298]  kthread+0x318/0x618
[   39.070989]  ret_from_fork+0x10/0x20
[   39.071233] 
[   39.071309] The buggy address belongs to the object at fff00000c5dafc80
[   39.071309]  which belongs to the cache kmalloc-64 of size 64
[   39.071510] The buggy address is located 0 bytes to the right of
[   39.071510]  allocated 48-byte region [fff00000c5dafc80, fff00000c5dafcb0)
[   39.071725] 
[   39.071794] The buggy address belongs to the physical page:
[   39.071905] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105daf
[   39.072098] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   39.072262] page_type: f5(slab)
[   39.072461] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   39.072616] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   39.073178] page dumped because: kasan: bad access detected
[   39.073639] 
[   39.073864] Memory state around the buggy address:
[   39.073997]  fff00000c5dafb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   39.074167]  fff00000c5dafc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   39.074320] >fff00000c5dafc80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   39.074487]                                      ^
[   39.074610]  fff00000c5dafd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   39.075374]  fff00000c5dafd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   39.075908] ==================================================================
[   39.306628] ==================================================================
[   39.306841] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3df4/0x4858
[   39.307000] Read of size 8 at addr fff00000c5dafcb0 by task kunit_try_catch/267
[   39.307191] 
[   39.307762] CPU: 1 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G    B            N  6.14.0-rc7-next-20250319 #1 PREEMPT 
[   39.308797] Tainted: [B]=BAD_PAGE, [N]=TEST
[   39.309036] Hardware name: linux,dummy-virt (DT)
[   39.309423] Call trace:
[   39.309572]  show_stack+0x20/0x38 (C)
[   39.309726]  dump_stack_lvl+0x8c/0xd0
[   39.309878]  print_report+0x118/0x5f0
[   39.310025]  kasan_report+0xc8/0x118
[   39.310208]  __asan_report_load8_noabort+0x20/0x30
[   39.310377]  kasan_atomics_helper+0x3df4/0x4858
[   39.310545]  kasan_atomics+0x198/0x2e8
[   39.310705]  kunit_try_run_case+0x14c/0x3d0
[   39.310868]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   39.312270]  kthread+0x318/0x618
[   39.312588]  ret_from_fork+0x10/0x20
[   39.312757] 
[   39.312826] Allocated by task 267:
[   39.312926]  kasan_save_stack+0x3c/0x68
[   39.313159]  kasan_save_track+0x20/0x40
[   39.314140]  kasan_save_alloc_info+0x40/0x58
[   39.314836]  __kasan_kmalloc+0xd4/0xd8
[   39.315014]  __kmalloc_cache_noprof+0x15c/0x3c0
[   39.315336]  kasan_atomics+0xb8/0x2e8
[   39.315915]  kunit_try_run_case+0x14c/0x3d0
[   39.316466]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   39.316911]  kthread+0x318/0x618
[   39.317126]  ret_from_fork+0x10/0x20
[   39.317457] 
[   39.317703] The buggy address belongs to the object at fff00000c5dafc80
[   39.317703]  which belongs to the cache kmalloc-64 of size 64
[   39.318557] The buggy address is located 0 bytes to the right of
[   39.318557]  allocated 48-byte region [fff00000c5dafc80, fff00000c5dafcb0)
[   39.318880] 
[   39.319506] The buggy address belongs to the physical page:
[   39.319711] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105daf
[   39.320409] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   39.321003] page_type: f5(slab)
[   39.321276] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   39.321611] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   39.321972] page dumped because: kasan: bad access detected
[   39.322355] 
[   39.322733] Memory state around the buggy address:
[   39.323229]  fff00000c5dafb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   39.324284]  fff00000c5dafc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   39.324544] >fff00000c5dafc80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   39.324707]                                      ^
[   39.324854]  fff00000c5dafd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   39.325041]  fff00000c5dafd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   39.325287] ==================================================================
[   38.752819] ==================================================================
[   38.752968] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa6c/0x4858
[   38.753197] Write of size 4 at addr fff00000c5dafcb0 by task kunit_try_catch/267
[   38.753459] 
[   38.753629] CPU: 1 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G    B            N  6.14.0-rc7-next-20250319 #1 PREEMPT 
[   38.754089] Tainted: [B]=BAD_PAGE, [N]=TEST
[   38.754231] Hardware name: linux,dummy-virt (DT)
[   38.754328] Call trace:
[   38.754402]  show_stack+0x20/0x38 (C)
[   38.754554]  dump_stack_lvl+0x8c/0xd0
[   38.754719]  print_report+0x118/0x5f0
[   38.754977]  kasan_report+0xc8/0x118
[   38.755221]  kasan_check_range+0x100/0x1a8
[   38.755394]  __kasan_check_write+0x20/0x30
[   38.755691]  kasan_atomics_helper+0xa6c/0x4858
[   38.755881]  kasan_atomics+0x198/0x2e8
[   38.756046]  kunit_try_run_case+0x14c/0x3d0
[   38.756294]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   38.756543]  kthread+0x318/0x618
[   38.756795]  ret_from_fork+0x10/0x20
[   38.756953] 
[   38.757024] Allocated by task 267:
[   38.757140]  kasan_save_stack+0x3c/0x68
[   38.757309]  kasan_save_track+0x20/0x40
[   38.757444]  kasan_save_alloc_info+0x40/0x58
[   38.757570]  __kasan_kmalloc+0xd4/0xd8
[   38.757686]  __kmalloc_cache_noprof+0x15c/0x3c0
[   38.757832]  kasan_atomics+0xb8/0x2e8
[   38.758048]  kunit_try_run_case+0x14c/0x3d0
[   38.758742] The buggy address belongs to the object at fff00000c5dafc80
[   38.758742]  which belongs to the cache kmalloc-64 of size 64
[   38.759455] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105daf
[   38.759626] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   38.759785] page_type: f5(slab)
[   38.759903] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   38.760085] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   38.760817]  fff00000c5dafc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   38.763508] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xad4/0x4858
[   38.782068] 
[   38.783450] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105daf
[   38.783690] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   38.785166] page_type: f5(slab)
[   38.785999] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   38.786346] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   38.787636] page dumped because: kasan: bad access detected
[   38.787986] 
[   38.788343] Memory state around the buggy address:
[   38.788889]  fff00000c5dafb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   38.789042]  fff00000c5dafc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   38.789494] >fff00000c5dafc80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   38.790463]                                      ^
[   38.791263]  fff00000c5dafd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   38.791592]  fff00000c5dafd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   38.791788] ==================================================================
[   38.954965] ==================================================================
[   38.955146] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xe44/0x4858
[   38.955302] Write of size 8 at addr fff00000c5dafcb0 by task kunit_try_catch/267
[   38.955469] 
[   38.955562] CPU: 1 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G    B            N  6.14.0-rc7-next-20250319 #1 PREEMPT 
[   38.957523] Tainted: [B]=BAD_PAGE, [N]=TEST
[   38.957709] Hardware name: linux,dummy-virt (DT)
[   38.958016] Call trace:
[   38.958165]  show_stack+0x20/0x38 (C)
[   38.958503]  dump_stack_lvl+0x8c/0xd0
[   38.958665]  print_report+0x118/0x5f0
[   38.958820]  kasan_report+0xc8/0x118
[   38.959040]  kasan_check_range+0x100/0x1a8
[   38.959927]  __kasan_check_write+0x20/0x30
[   38.960601]  kasan_atomics_helper+0xe44/0x4858
[   38.961613]  kasan_atomics+0x198/0x2e8
[   38.961857]  kunit_try_run_case+0x14c/0x3d0
[   38.962460]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   38.963258]  kthread+0x318/0x618
[   38.963452]  ret_from_fork+0x10/0x20
[   38.964091] 
[   38.964172] Allocated by task 267:
[   38.964278]  kasan_save_stack+0x3c/0x68
[   38.964430]  kasan_save_track+0x20/0x40
[   38.965731]  kasan_save_alloc_info+0x40/0x58
[   38.965910]  __kasan_kmalloc+0xd4/0xd8
[   38.966837]  __kmalloc_cache_noprof+0x15c/0x3c0
[   38.967352]  kasan_atomics+0xb8/0x2e8
[   38.967968]  kunit_try_run_case+0x14c/0x3d0
[   38.968142]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   38.969362]  kthread+0x318/0x618
[   38.969520]  ret_from_fork+0x10/0x20
[   38.969711] 
[   38.970337] The buggy address belongs to the object at fff00000c5dafc80
[   38.970337]  which belongs to the cache kmalloc-64 of size 64
[   38.971030] The buggy address is located 0 bytes to the right of
[   38.971030]  allocated 48-byte region [fff00000c5dafc80, fff00000c5dafcb0)
[   38.971364] 
[   38.972421] The buggy address belongs to the physical page:
[   38.972712] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105daf
[   38.972909] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   38.973092] page_type: f5(slab)
[   38.974097] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   38.974491] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   38.975468] page dumped because: kasan: bad access detected
[   38.975967] 
[   38.976076] Memory state around the buggy address:
[   38.976351]  fff00000c5dafb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   38.976588]  fff00000c5dafc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   38.976739] >fff00000c5dafc80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   38.977270]                                      ^
[   38.978073]  fff00000c5dafd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   38.978427]  fff00000c5dafd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   38.978641] ==================================================================
[   38.886171] ==================================================================
[   38.886304] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xd3c/0x4858
[   38.886454] Write of size 4 at addr fff00000c5dafcb0 by task kunit_try_catch/267
[   38.886611] 
[   38.886707] CPU: 1 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G    B            N  6.14.0-rc7-next-20250319 #1 PREEMPT 
[   38.886996] Tainted: [B]=BAD_PAGE, [N]=TEST
[   38.889335] Hardware name: linux,dummy-virt (DT)
[   38.889752] Call trace:
[   38.890514]  show_stack+0x20/0x38 (C)
[   38.890688]  dump_stack_lvl+0x8c/0xd0
[   38.890843]  print_report+0x118/0x5f0
[   38.891012]  kasan_report+0xc8/0x118
[   38.891183]  kasan_check_range+0x100/0x1a8
[   38.891340]  __kasan_check_write+0x20/0x30
[   38.891495]  kasan_atomics_helper+0xd3c/0x4858
[   38.891656]  kasan_atomics+0x198/0x2e8
[   38.891806]  kunit_try_run_case+0x14c/0x3d0
[   38.891964]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   38.894597]  kthread+0x318/0x618
[   38.894770]  ret_from_fork+0x10/0x20
[   38.894942] 
[   38.895010] Allocated by task 267:
[   38.895130]  kasan_save_stack+0x3c/0x68
[   38.895253]  kasan_save_track+0x20/0x40
[   38.895384]  kasan_save_alloc_info+0x40/0x58
[   38.895522]  __kasan_kmalloc+0xd4/0xd8
[   38.895645]  __kmalloc_cache_noprof+0x15c/0x3c0
[   38.895783]  kasan_atomics+0xb8/0x2e8
[   38.895912]  kunit_try_run_case+0x14c/0x3d0
[   38.896046]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   38.898021]  kthread+0x318/0x618
[   38.898941]  ret_from_fork+0x10/0x20
[   38.899205] 
[   38.899280] The buggy address belongs to the object at fff00000c5dafc80
[   38.899280]  which belongs to the cache kmalloc-64 of size 64
[   38.899542] The buggy address is located 0 bytes to the right of
[   38.899542]  allocated 48-byte region [fff00000c5dafc80, fff00000c5dafcb0)
[   38.899880] 
[   38.900000] The buggy address belongs to the physical page:
[   38.900137] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105daf
[   38.900400] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   38.900551] page_type: f5(slab)
[   38.900668] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   38.900880] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   38.901028] page dumped because: kasan: bad access detected
[   38.901168] 
[   38.901236] Memory state around the buggy address:
[   38.901350]  fff00000c5dafb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   38.901500]  fff00000c5dafc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   38.901688] >fff00000c5dafc80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   38.901823]                                      ^
[   38.901933]  fff00000c5dafd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   38.902146]  fff00000c5dafd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   38.902287] ==================================================================
[   38.980267] ==================================================================
[   38.980561] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e5c/0x4858
[   38.980748] Write of size 8 at addr fff00000c5dafcb0 by task kunit_try_catch/267
[   38.980982] 
[   38.981209] CPU: 1 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G    B            N  6.14.0-rc7-next-20250319 #1 PREEMPT 
[   38.981588] Tainted: [B]=BAD_PAGE, [N]=TEST
[   38.981709] Hardware name: linux,dummy-virt (DT)
[   38.981887] Call trace:
[   38.981998]  show_stack+0x20/0x38 (C)
[   38.982189]  dump_stack_lvl+0x8c/0xd0
[   38.982340]  print_report+0x118/0x5f0
[   38.982486]  kasan_report+0xc8/0x118
[   38.982673]  __asan_report_store8_noabort+0x20/0x30
[   38.982857]  kasan_atomics_helper+0x3e5c/0x4858
[   38.983037]  kasan_atomics+0x198/0x2e8
[   38.983214]  kunit_try_run_case+0x14c/0x3d0
[   38.983375]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   38.983572]  kthread+0x318/0x618
[   38.983787]  ret_from_fork+0x10/0x20
[   38.983967] 
[   38.984078] Allocated by task 267:
[   38.984177]  kasan_save_stack+0x3c/0x68
[   38.984358]  kasan_save_track+0x20/0x40
[   38.984510]  kasan_save_alloc_info+0x40/0x58
[   38.984696]  __kasan_kmalloc+0xd4/0xd8
[   38.984826]  __kmalloc_cache_noprof+0x15c/0x3c0
[   38.984985]  kasan_atomics+0xb8/0x2e8
[   38.985158]  kunit_try_run_case+0x14c/0x3d0
[   38.985283]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   38.985739]  kthread+0x318/0x618
[   38.985898]  ret_from_fork+0x10/0x20
[   38.986037] 
[   38.986132] The buggy address belongs to the object at fff00000c5dafc80
[   38.986132]  which belongs to the cache kmalloc-64 of size 64
[   38.986366] The buggy address is located 0 bytes to the right of
[   38.986366]  allocated 48-byte region [fff00000c5dafc80, fff00000c5dafcb0)
[   38.986586] 
[   38.986659] The buggy address belongs to the physical page:
[   38.986768] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105daf
[   38.987408] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   38.987615] page_type: f5(slab)
[   38.987742] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   38.988419] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   38.988595] page dumped because: kasan: bad access detected
[   38.988711] 
[   38.989398] Memory state around the buggy address:
[   38.989793]  fff00000c5dafb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   38.990305]  fff00000c5dafc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   38.990481] >fff00000c5dafc80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   38.990626]                                      ^
[   38.991435]  fff00000c5dafd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   38.992177]  fff00000c5dafd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   38.992758] ==================================================================
[   38.931930] ==================================================================
[   38.932110] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f58/0x4858
[   38.932271] Read of size 8 at addr fff00000c5dafcb0 by task kunit_try_catch/267
[   38.932976] 
[   38.933287] CPU: 1 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G    B            N  6.14.0-rc7-next-20250319 #1 PREEMPT 
[   38.933955] Tainted: [B]=BAD_PAGE, [N]=TEST
[   38.934401] Hardware name: linux,dummy-virt (DT)
[   38.934882] Call trace:
[   38.935363]  show_stack+0x20/0x38 (C)
[   38.935622]  dump_stack_lvl+0x8c/0xd0
[   38.935835]  print_report+0x118/0x5f0
[   38.936157]  kasan_report+0xc8/0x118
[   38.936342]  __asan_report_load8_noabort+0x20/0x30
[   38.936655]  kasan_atomics_helper+0x3f58/0x4858
[   38.936871]  kasan_atomics+0x198/0x2e8
[   38.937041]  kunit_try_run_case+0x14c/0x3d0
[   38.937231]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   38.937407]  kthread+0x318/0x618
[   38.938985]  ret_from_fork+0x10/0x20
[   38.939647] 
[   38.939762] Allocated by task 267:
[   38.939868]  kasan_save_stack+0x3c/0x68
[   38.940005]  kasan_save_track+0x20/0x40
[   38.940153]  kasan_save_alloc_info+0x40/0x58
[   38.940284]  __kasan_kmalloc+0xd4/0xd8
[   38.942099]  __kmalloc_cache_noprof+0x15c/0x3c0
[   38.942369]  kasan_atomics+0xb8/0x2e8
[   38.943139]  kunit_try_run_case+0x14c/0x3d0
[   38.943530]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   38.943709]  kthread+0x318/0x618
[   38.944451]  ret_from_fork+0x10/0x20
[   38.944605] 
[   38.944674] The buggy address belongs to the object at fff00000c5dafc80
[   38.944674]  which belongs to the cache kmalloc-64 of size 64
[   38.945575] The buggy address is located 0 bytes to the right of
[   38.945575]  allocated 48-byte region [fff00000c5dafc80, fff00000c5dafcb0)
[   38.946703] 
[   38.946822] The buggy address belongs to the physical page:
[   38.946952] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105daf
[   38.947678] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   38.948271] page_type: f5(slab)
[   38.948695] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   38.948935] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   38.949522] page dumped because: kasan: bad access detected
[   38.950081] 
[   38.950175] Memory state around the buggy address:
[   38.950819]  fff00000c5dafb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   38.951012]  fff00000c5dafc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   38.951193] >fff00000c5dafc80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   38.951332]                                      ^
[   38.952030]  fff00000c5dafd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   38.952776]  fff00000c5dafd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   38.953295] ==================================================================

[   26.574186] ==================================================================
[   26.574857] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xac7/0x5450
[   26.575856] Write of size 4 at addr ffff888103231c30 by task kunit_try_catch/286
[   26.576549] 
[   26.576786] CPU: 1 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G    B            N  6.14.0-rc7-next-20250319 #1 PREEMPT(voluntary) 
[   26.576918] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.576995] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   26.577063] Call Trace:
[   26.577100]  <TASK>
[   26.577156]  dump_stack_lvl+0x73/0xb0
[   26.577281]  print_report+0xd1/0x660
[   26.577365]  ? __virt_addr_valid+0x1db/0x2d0
[   26.577491]  ? kasan_complete_mode_report_info+0x2a/0x200
[   26.577571]  kasan_report+0x104/0x140
[   26.577631]  ? kasan_atomics_helper+0xac7/0x5450
[   26.577699]  ? kasan_atomics_helper+0xac7/0x5450
[   26.577887]  kasan_check_range+0x10c/0x1c0
[   26.577971]  __kasan_check_write+0x18/0x20
[   26.578082]  kasan_atomics_helper+0xac7/0x5450
[   26.578185]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   26.578258]  ? kasan_save_alloc_info+0x3b/0x50
[   26.578395]  kasan_atomics+0x1dc/0x310
[   26.578470]  ? __pfx_kasan_atomics+0x10/0x10
[   26.578546]  ? __pfx_read_tsc+0x10/0x10
[   26.578611]  ? ktime_get_ts64+0x86/0x240
[   26.578688]  kunit_try_run_case+0x1b2/0x490
[   26.578821]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.578891]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   26.579004]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   26.579078]  ? __kthread_parkme+0x82/0x160
[   26.579163]  ? preempt_count_sub+0x50/0x80
[   26.579241]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.579365]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.579438]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   26.579505]  kthread+0x323/0x710
[   26.579569]  ? trace_preempt_on+0x20/0xc0
[   26.579669]  ? __pfx_kthread+0x10/0x10
[   26.579792]  ? _raw_spin_unlock_irq+0x47/0x80
[   26.579909]  ? calculate_sigpending+0x7b/0xa0
[   26.579988]  ? __pfx_kthread+0x10/0x10
[   26.580054]  ret_from_fork+0x41/0x80
[   26.580148]  ? __pfx_kthread+0x10/0x10
[   26.580194]  ret_from_fork_asm+0x1a/0x30
[   26.580244]  </TASK>
[   26.580262] 
[   26.597551] Allocated by task 286:
[   26.599412]  kasan_save_stack+0x3d/0x60
[   26.600165]  kasan_save_track+0x18/0x40
[   26.601521]  kasan_save_alloc_info+0x3b/0x50
[   26.603220]  __kasan_kmalloc+0xb7/0xc0
[   26.603624]  __kmalloc_cache_noprof+0x183/0x410
[   26.605841]  kasan_atomics+0x95/0x310
[   26.606154]  kunit_try_run_case+0x1b2/0x490
[   26.607266]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.608602]  kthread+0x323/0x710
[   26.609378]  ret_from_fork+0x41/0x80
[   26.609785]  ret_from_fork_asm+0x1a/0x30
[   26.610083] 
[   26.610269] The buggy address belongs to the object at ffff888103231c00
[   26.610269]  which belongs to the cache kmalloc-64 of size 64
[   26.611097] The buggy address is located 0 bytes to the right of
[   26.611097]  allocated 48-byte region [ffff888103231c00, ffff888103231c30)
[   26.612234] 
[   26.612405] The buggy address belongs to the physical page:
[   26.612747] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103231
[   26.613524] flags: 0x200000000000000(node=0|zone=2)
[   26.614163] page_type: f5(slab)
[   26.614540] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   26.615243] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   26.615871] page dumped because: kasan: bad access detected
[   26.616473] 
[   26.616742] Memory state around the buggy address:
[   26.617287]  ffff888103231b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.617803]  ffff888103231b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.618397] >ffff888103231c00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   26.619067]                                      ^
[   26.619562]  ffff888103231c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.620316]  ffff888103231d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.620958] ==================================================================
[   26.979031] ==================================================================
[   26.980067] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1079/0x5450
[   26.980915] Write of size 4 at addr ffff888103231c30 by task kunit_try_catch/286
[   26.981373] 
[   26.981568] CPU: 1 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G    B            N  6.14.0-rc7-next-20250319 #1 PREEMPT(voluntary) 
[   26.981692] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.981751] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   26.981811] Call Trace:
[   26.981847]  <TASK>
[   26.981884]  dump_stack_lvl+0x73/0xb0
[   26.981966]  print_report+0xd1/0x660
[   26.982033]  ? __virt_addr_valid+0x1db/0x2d0
[   26.982289]  ? kasan_complete_mode_report_info+0x2a/0x200
[   26.982386]  kasan_report+0x104/0x140
[   26.982450]  ? kasan_atomics_helper+0x1079/0x5450
[   26.982524]  ? kasan_atomics_helper+0x1079/0x5450
[   26.982607]  kasan_check_range+0x10c/0x1c0
[   26.982682]  __kasan_check_write+0x18/0x20
[   26.982802]  kasan_atomics_helper+0x1079/0x5450
[   26.982876]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   26.982947]  ? kasan_save_alloc_info+0x3b/0x50
[   26.983134]  kasan_atomics+0x1dc/0x310
[   26.983223]  ? __pfx_kasan_atomics+0x10/0x10
[   26.983296]  ? __pfx_read_tsc+0x10/0x10
[   26.983358]  ? ktime_get_ts64+0x86/0x240
[   26.983524]  kunit_try_run_case+0x1b2/0x490
[   26.983637]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.983748]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   26.983882]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   26.983996]  ? __kthread_parkme+0x82/0x160
[   26.984065]  ? preempt_count_sub+0x50/0x80
[   26.984162]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.984295]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.984403]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   26.984473]  kthread+0x323/0x710
[   26.984534]  ? trace_preempt_on+0x20/0xc0
[   26.984670]  ? __pfx_kthread+0x10/0x10
[   26.984827]  ? _raw_spin_unlock_irq+0x47/0x80
[   26.984919]  ? calculate_sigpending+0x7b/0xa0
[   26.985047]  ? __pfx_kthread+0x10/0x10
[   26.985176]  ret_from_fork+0x41/0x80
[   26.985276]  ? __pfx_kthread+0x10/0x10
[   26.985344]  ret_from_fork_asm+0x1a/0x30
[   26.985533]  </TASK>
[   26.985598] 
[   27.000585] Allocated by task 286:
[   27.000997]  kasan_save_stack+0x3d/0x60
[   27.001318]  kasan_save_track+0x18/0x40
[   27.001602]  kasan_save_alloc_info+0x3b/0x50
[   27.002187]  __kasan_kmalloc+0xb7/0xc0
[   27.002614]  __kmalloc_cache_noprof+0x183/0x410
[   27.003219]  kasan_atomics+0x95/0x310
[   27.003794]  kunit_try_run_case+0x1b2/0x490
[   27.004363]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.005000]  kthread+0x323/0x710
[   27.005434]  ret_from_fork+0x41/0x80
[   27.005980]  ret_from_fork_asm+0x1a/0x30
[   27.006356] 
[   27.006519] The buggy address belongs to the object at ffff888103231c00
[   27.006519]  which belongs to the cache kmalloc-64 of size 64
[   27.007293] The buggy address is located 0 bytes to the right of
[   27.007293]  allocated 48-byte region [ffff888103231c00, ffff888103231c30)
[   27.008648] 
[   27.008949] The buggy address belongs to the physical page:
[   27.009288] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103231
[   27.009844] flags: 0x200000000000000(node=0|zone=2)
[   27.010495] page_type: f5(slab)
[   27.011002] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   27.011855] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   27.012552] page dumped because: kasan: bad access detected
[   27.013075] 
[   27.013325] Memory state around the buggy address:
[   27.013799]  ffff888103231b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.014210]  ffff888103231b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.014855] >ffff888103231c00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   27.015633]                                      ^
[   27.016194]  ffff888103231c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.016757]  ffff888103231d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.017161] ==================================================================
[   27.284961] ==================================================================
[   27.285780] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x49ce/0x5450
[   27.286492] Read of size 4 at addr ffff888103231c30 by task kunit_try_catch/286
[   27.287024] 
[   27.287549] CPU: 1 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G    B            N  6.14.0-rc7-next-20250319 #1 PREEMPT(voluntary) 
[   27.287712] Tainted: [B]=BAD_PAGE, [N]=TEST
[   27.287842] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   27.287949] Call Trace:
[   27.287990]  <TASK>
[   27.288026]  dump_stack_lvl+0x73/0xb0
[   27.288378]  print_report+0xd1/0x660
[   27.288488]  ? __virt_addr_valid+0x1db/0x2d0
[   27.288618]  ? kasan_complete_mode_report_info+0x2a/0x200
[   27.288697]  kasan_report+0x104/0x140
[   27.290072]  ? kasan_atomics_helper+0x49ce/0x5450
[   27.290213]  ? kasan_atomics_helper+0x49ce/0x5450
[   27.290303]  __asan_report_load4_noabort+0x18/0x20
[   27.290375]  kasan_atomics_helper+0x49ce/0x5450
[   27.290450]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   27.290525]  ? kasan_save_alloc_info+0x3b/0x50
[   27.290615]  kasan_atomics+0x1dc/0x310
[   27.290688]  ? __pfx_kasan_atomics+0x10/0x10
[   27.290783]  ? __pfx_read_tsc+0x10/0x10
[   27.290856]  ? ktime_get_ts64+0x86/0x240
[   27.290922]  kunit_try_run_case+0x1b2/0x490
[   27.290963]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.290998]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   27.291033]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   27.291068]  ? __kthread_parkme+0x82/0x160
[   27.291102]  ? preempt_count_sub+0x50/0x80
[   27.291167]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.291204]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.291240]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   27.291276]  kthread+0x323/0x710
[   27.291307]  ? trace_preempt_on+0x20/0xc0
[   27.291344]  ? __pfx_kthread+0x10/0x10
[   27.291378]  ? _raw_spin_unlock_irq+0x47/0x80
[   27.291410]  ? calculate_sigpending+0x7b/0xa0
[   27.291443]  ? __pfx_kthread+0x10/0x10
[   27.291477]  ret_from_fork+0x41/0x80
[   27.291511]  ? __pfx_kthread+0x10/0x10
[   27.291545]  ret_from_fork_asm+0x1a/0x30
[   27.291618]  </TASK>
[   27.291637] 
[   27.305392] Allocated by task 286:
[   27.305780]  kasan_save_stack+0x3d/0x60
[   27.306235]  kasan_save_track+0x18/0x40
[   27.306775]  kasan_save_alloc_info+0x3b/0x50
[   27.307264]  __kasan_kmalloc+0xb7/0xc0
[   27.307735]  __kmalloc_cache_noprof+0x183/0x410
[   27.308396]  kasan_atomics+0x95/0x310
[   27.308782]  kunit_try_run_case+0x1b2/0x490
[   27.309299]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.309992]  kthread+0x323/0x710
[   27.310286]  ret_from_fork+0x41/0x80
[   27.310780]  ret_from_fork_asm+0x1a/0x30
[   27.311221] 
[   27.311559] The buggy address belongs to the object at ffff888103231c00
[   27.311559]  which belongs to the cache kmalloc-64 of size 64
[   27.312533] The buggy address is located 0 bytes to the right of
[   27.312533]  allocated 48-byte region [ffff888103231c00, ffff888103231c30)
[   27.313751] 
[   27.314067] The buggy address belongs to the physical page:
[   27.314547] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103231
[   27.315313] flags: 0x200000000000000(node=0|zone=2)
[   27.315786] page_type: f5(slab)
[   27.316141] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   27.316810] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   27.317388] page dumped because: kasan: bad access detected
[   27.317876] 
[   27.318034] Memory state around the buggy address:
[   27.318419]  ffff888103231b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.319651]  ffff888103231b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.320578] >ffff888103231c00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   27.323199]                                      ^
[   27.323536]  ffff888103231c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.324298]  ffff888103231d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.326466] ==================================================================
[   28.126713] ==================================================================
[   28.127406] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1d7a/0x5450
[   28.127994] Write of size 8 at addr ffff888103231c30 by task kunit_try_catch/286
[   28.129554] 
[   28.129834] CPU: 1 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G    B            N  6.14.0-rc7-next-20250319 #1 PREEMPT(voluntary) 
[   28.129971] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.130009] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   28.130074] Call Trace:
[   28.130140]  <TASK>
[   28.130185]  dump_stack_lvl+0x73/0xb0
[   28.130264]  print_report+0xd1/0x660
[   28.130336]  ? __virt_addr_valid+0x1db/0x2d0
[   28.130465]  ? kasan_complete_mode_report_info+0x2a/0x200
[   28.130546]  kasan_report+0x104/0x140
[   28.130659]  ? kasan_atomics_helper+0x1d7a/0x5450
[   28.130804]  ? kasan_atomics_helper+0x1d7a/0x5450
[   28.130965]  kasan_check_range+0x10c/0x1c0
[   28.131055]  __kasan_check_write+0x18/0x20
[   28.131142]  kasan_atomics_helper+0x1d7a/0x5450
[   28.131218]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   28.131288]  ? kasan_save_alloc_info+0x3b/0x50
[   28.131338]  kasan_atomics+0x1dc/0x310
[   28.131376]  ? __pfx_kasan_atomics+0x10/0x10
[   28.131415]  ? __pfx_read_tsc+0x10/0x10
[   28.131450]  ? ktime_get_ts64+0x86/0x240
[   28.131490]  kunit_try_run_case+0x1b2/0x490
[   28.131528]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.131562]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   28.131623]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   28.131658]  ? __kthread_parkme+0x82/0x160
[   28.131694]  ? preempt_count_sub+0x50/0x80
[   28.131829]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.131891]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.131942]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   28.131979]  kthread+0x323/0x710
[   28.132012]  ? trace_preempt_on+0x20/0xc0
[   28.132050]  ? __pfx_kthread+0x10/0x10
[   28.132085]  ? _raw_spin_unlock_irq+0x47/0x80
[   28.132141]  ? calculate_sigpending+0x7b/0xa0
[   28.132176]  ? __pfx_kthread+0x10/0x10
[   28.132211]  ret_from_fork+0x41/0x80
[   28.132246]  ? __pfx_kthread+0x10/0x10
[   28.132280]  ret_from_fork_asm+0x1a/0x30
[   28.132329]  </TASK>
[   28.132347] 
[   28.151201] Allocated by task 286:
[   28.152361]  kasan_save_stack+0x3d/0x60
[   28.152888]  kasan_save_track+0x18/0x40
[   28.153244]  kasan_save_alloc_info+0x3b/0x50
[   28.153681]  __kasan_kmalloc+0xb7/0xc0
[   28.154220]  __kmalloc_cache_noprof+0x183/0x410
[   28.154650]  kasan_atomics+0x95/0x310
[   28.155040]  kunit_try_run_case+0x1b2/0x490
[   28.155528]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.156048]  kthread+0x323/0x710
[   28.156387]  ret_from_fork+0x41/0x80
[   28.156884]  ret_from_fork_asm+0x1a/0x30
[   28.157202] 
[   28.157352] The buggy address belongs to the object at ffff888103231c00
[   28.157352]  which belongs to the cache kmalloc-64 of size 64
[   28.158107] The buggy address is located 0 bytes to the right of
[   28.158107]  allocated 48-byte region [ffff888103231c00, ffff888103231c30)
[   28.159369] 
[   28.159632] The buggy address belongs to the physical page:
[   28.160162] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103231
[   28.160752] flags: 0x200000000000000(node=0|zone=2)
[   28.161129] page_type: f5(slab)
[   28.161500] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   28.162260] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   28.162935] page dumped because: kasan: bad access detected
[   28.163409] 
[   28.163696] Memory state around the buggy address:
[   28.164174]  ffff888103231b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.164850]  ffff888103231b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.165410] >ffff888103231c00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   28.166225]                                      ^
[   28.166840]  ffff888103231c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.167659]  ffff888103231d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.168513] ==================================================================
[   27.713311] ==================================================================
[   27.714027] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1818/0x5450
[   27.714757] Write of size 8 at addr ffff888103231c30 by task kunit_try_catch/286
[   27.715491] 
[   27.715739] CPU: 1 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G    B            N  6.14.0-rc7-next-20250319 #1 PREEMPT(voluntary) 
[   27.715876] Tainted: [B]=BAD_PAGE, [N]=TEST
[   27.715918] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   27.715983] Call Trace:
[   27.716023]  <TASK>
[   27.716074]  dump_stack_lvl+0x73/0xb0
[   27.716183]  print_report+0xd1/0x660
[   27.716257]  ? __virt_addr_valid+0x1db/0x2d0
[   27.716385]  ? kasan_complete_mode_report_info+0x2a/0x200
[   27.716463]  kasan_report+0x104/0x140
[   27.716526]  ? kasan_atomics_helper+0x1818/0x5450
[   27.716600]  ? kasan_atomics_helper+0x1818/0x5450
[   27.716685]  kasan_check_range+0x10c/0x1c0
[   27.716760]  __kasan_check_write+0x18/0x20
[   27.716823]  kasan_atomics_helper+0x1818/0x5450
[   27.716896]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   27.716971]  ? kasan_save_alloc_info+0x3b/0x50
[   27.717061]  kasan_atomics+0x1dc/0x310
[   27.717366]  ? __pfx_kasan_atomics+0x10/0x10
[   27.717497]  ? __pfx_read_tsc+0x10/0x10
[   27.717572]  ? ktime_get_ts64+0x86/0x240
[   27.717654]  kunit_try_run_case+0x1b2/0x490
[   27.717765]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.717841]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   27.717950]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   27.718051]  ? __kthread_parkme+0x82/0x160
[   27.718179]  ? preempt_count_sub+0x50/0x80
[   27.718293]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.718399]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.718479]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   27.718550]  kthread+0x323/0x710
[   27.718612]  ? trace_preempt_on+0x20/0xc0
[   27.718674]  ? __pfx_kthread+0x10/0x10
[   27.718825]  ? _raw_spin_unlock_irq+0x47/0x80
[   27.718921]  ? calculate_sigpending+0x7b/0xa0
[   27.718997]  ? __pfx_kthread+0x10/0x10
[   27.719098]  ret_from_fork+0x41/0x80
[   27.719227]  ? __pfx_kthread+0x10/0x10
[   27.719299]  ret_from_fork_asm+0x1a/0x30
[   27.719430]  </TASK>
[   27.719490] 
[   27.734488] Allocated by task 286:
[   27.734877]  kasan_save_stack+0x3d/0x60
[   27.735323]  kasan_save_track+0x18/0x40
[   27.735777]  kasan_save_alloc_info+0x3b/0x50
[   27.739691]  __kasan_kmalloc+0xb7/0xc0
[   27.740770]  __kmalloc_cache_noprof+0x183/0x410
[   27.741355]  kasan_atomics+0x95/0x310
[   27.741843]  kunit_try_run_case+0x1b2/0x490
[   27.742212]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.742827]  kthread+0x323/0x710
[   27.743277]  ret_from_fork+0x41/0x80
[   27.743570]  ret_from_fork_asm+0x1a/0x30
[   27.744146] 
[   27.744376] The buggy address belongs to the object at ffff888103231c00
[   27.744376]  which belongs to the cache kmalloc-64 of size 64
[   27.745216] The buggy address is located 0 bytes to the right of
[   27.745216]  allocated 48-byte region [ffff888103231c00, ffff888103231c30)
[   27.746074] 
[   27.746329] The buggy address belongs to the physical page:
[   27.746922] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103231
[   27.747575] flags: 0x200000000000000(node=0|zone=2)
[   27.748187] page_type: f5(slab)
[   27.748556] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   27.749169] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   27.749748] page dumped because: kasan: bad access detected
[   27.750304] 
[   27.750532] Memory state around the buggy address:
[   27.750985]  ffff888103231b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.751640]  ffff888103231b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.752096] >ffff888103231c00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   27.752790]                                      ^
[   27.753324]  ffff888103231c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.754009]  ffff888103231d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.754655] ==================================================================
[   25.963087] ==================================================================
[   25.964345] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b6e/0x5450
[   25.965146] Write of size 4 at addr ffff888103231c30 by task kunit_try_catch/286
[   25.966401] 
[   25.966671] CPU: 1 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G    B            N  6.14.0-rc7-next-20250319 #1 PREEMPT(voluntary) 
[   25.967071] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.967204] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   25.967287] Call Trace:
[   25.967322]  <TASK>
[   25.967356]  dump_stack_lvl+0x73/0xb0
[   25.967433]  print_report+0xd1/0x660
[   25.967497]  ? __virt_addr_valid+0x1db/0x2d0
[   25.967651]  ? kasan_complete_mode_report_info+0x2a/0x200
[   25.967859]  kasan_report+0x104/0x140
[   25.967952]  ? kasan_atomics_helper+0x4b6e/0x5450
[   25.968021]  ? kasan_atomics_helper+0x4b6e/0x5450
[   25.968360]  __asan_report_store4_noabort+0x1b/0x30
[   25.968527]  kasan_atomics_helper+0x4b6e/0x5450
[   25.968702]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   25.968912]  ? kasan_save_alloc_info+0x3b/0x50
[   25.969005]  kasan_atomics+0x1dc/0x310
[   25.969074]  ? __pfx_kasan_atomics+0x10/0x10
[   25.969169]  ? __pfx_read_tsc+0x10/0x10
[   25.969232]  ? ktime_get_ts64+0x86/0x240
[   25.969307]  kunit_try_run_case+0x1b2/0x490
[   25.969375]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.969440]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   25.969503]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   25.969568]  ? __kthread_parkme+0x82/0x160
[   25.969632]  ? preempt_count_sub+0x50/0x80
[   25.969703]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.969774]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.969842]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   25.969910]  kthread+0x323/0x710
[   25.969970]  ? trace_preempt_on+0x20/0xc0
[   25.970037]  ? __pfx_kthread+0x10/0x10
[   25.970101]  ? _raw_spin_unlock_irq+0x47/0x80
[   25.970184]  ? calculate_sigpending+0x7b/0xa0
[   25.970248]  ? __pfx_kthread+0x10/0x10
[   25.970313]  ret_from_fork+0x41/0x80
[   25.970378]  ? __pfx_kthread+0x10/0x10
[   25.970440]  ret_from_fork_asm+0x1a/0x30
[   25.970533]  </TASK>
[   25.970565] 
[   25.988173] Allocated by task 286:
[   25.988411]  kasan_save_stack+0x3d/0x60
[   25.988684]  kasan_save_track+0x18/0x40
[   25.988944]  kasan_save_alloc_info+0x3b/0x50
[   25.989658]  __kasan_kmalloc+0xb7/0xc0
[   25.990729]  __kmalloc_cache_noprof+0x183/0x410
[   25.991510]  kasan_atomics+0x95/0x310
[   25.992305]  kunit_try_run_case+0x1b2/0x490
[   25.993569]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.994261]  kthread+0x323/0x710
[   25.994645]  ret_from_fork+0x41/0x80
[   25.995456]  ret_from_fork_asm+0x1a/0x30
[   25.996443] 
[   25.996785] The buggy address belongs to the object at ffff888103231c00
[   25.996785]  which belongs to the cache kmalloc-64 of size 64
[   25.997628] The buggy address is located 0 bytes to the right of
[   25.997628]  allocated 48-byte region [ffff888103231c00, ffff888103231c30)
[   25.999547] 
[   25.999903] The buggy address belongs to the physical page:
[   26.000461] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103231
[   26.000891] flags: 0x200000000000000(node=0|zone=2)
[   26.001264] page_type: f5(slab)
[   26.002390] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   26.003546] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   26.004552] page dumped because: kasan: bad access detected
[   26.005247] 
[   26.005564] Memory state around the buggy address:
[   26.006030]  ffff888103231b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.006927]  ffff888103231b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.007939] >ffff888103231c00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   26.008550]                                      ^
[   26.009570]  ffff888103231c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.010326]  ffff888103231d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.011534] ==================================================================
[   27.983355] ==================================================================
[   27.983871] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1c18/0x5450
[   27.984572] Write of size 8 at addr ffff888103231c30 by task kunit_try_catch/286
[   27.985093] 
[   27.985878] CPU: 1 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G    B            N  6.14.0-rc7-next-20250319 #1 PREEMPT(voluntary) 
[   27.985958] Tainted: [B]=BAD_PAGE, [N]=TEST
[   27.985978] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   27.986010] Call Trace:
[   27.986031]  <TASK>
[   27.986052]  dump_stack_lvl+0x73/0xb0
[   27.986096]  print_report+0xd1/0x660
[   27.986172]  ? __virt_addr_valid+0x1db/0x2d0
[   27.986292]  ? kasan_complete_mode_report_info+0x2a/0x200
[   27.986372]  kasan_report+0x104/0x140
[   27.986434]  ? kasan_atomics_helper+0x1c18/0x5450
[   27.986508]  ? kasan_atomics_helper+0x1c18/0x5450
[   27.986593]  kasan_check_range+0x10c/0x1c0
[   27.986669]  __kasan_check_write+0x18/0x20
[   27.986733]  kasan_atomics_helper+0x1c18/0x5450
[   27.986809]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   27.986883]  ? kasan_save_alloc_info+0x3b/0x50
[   27.986973]  kasan_atomics+0x1dc/0x310
[   27.987046]  ? __pfx_kasan_atomics+0x10/0x10
[   27.987417]  ? __pfx_read_tsc+0x10/0x10
[   27.987511]  ? ktime_get_ts64+0x86/0x240
[   27.987623]  kunit_try_run_case+0x1b2/0x490
[   27.987763]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.987869]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   27.987951]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   27.988022]  ? __kthread_parkme+0x82/0x160
[   27.988091]  ? preempt_count_sub+0x50/0x80
[   27.988200]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.988270]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.988315]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   27.988353]  kthread+0x323/0x710
[   27.988385]  ? trace_preempt_on+0x20/0xc0
[   27.988424]  ? __pfx_kthread+0x10/0x10
[   27.988459]  ? _raw_spin_unlock_irq+0x47/0x80
[   27.988491]  ? calculate_sigpending+0x7b/0xa0
[   27.988524]  ? __pfx_kthread+0x10/0x10
[   27.988560]  ret_from_fork+0x41/0x80
[   27.988594]  ? __pfx_kthread+0x10/0x10
[   27.988628]  ret_from_fork_asm+0x1a/0x30
[   27.988677]  </TASK>
[   27.988696] 
[   28.008596] Allocated by task 286:
[   28.008956]  kasan_save_stack+0x3d/0x60
[   28.009375]  kasan_save_track+0x18/0x40
[   28.009696]  kasan_save_alloc_info+0x3b/0x50
[   28.010383]  __kasan_kmalloc+0xb7/0xc0
[   28.010781]  __kmalloc_cache_noprof+0x183/0x410
[   28.011146]  kasan_atomics+0x95/0x310
[   28.011807]  kunit_try_run_case+0x1b2/0x490
[   28.012320]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.012824]  kthread+0x323/0x710
[   28.013091]  ret_from_fork+0x41/0x80
[   28.014422]  ret_from_fork_asm+0x1a/0x30
[   28.014940] 
[   28.015499] The buggy address belongs to the object at ffff888103231c00
[   28.015499]  which belongs to the cache kmalloc-64 of size 64
[   28.016965] The buggy address is located 0 bytes to the right of
[   28.016965]  allocated 48-byte region [ffff888103231c00, ffff888103231c30)
[   28.017924] 
[   28.018100] The buggy address belongs to the physical page:
[   28.018635] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103231
[   28.020018] flags: 0x200000000000000(node=0|zone=2)
[   28.020576] page_type: f5(slab)
[   28.021275] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   28.022045] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   28.022926] page dumped because: kasan: bad access detected
[   28.023682] 
[   28.023985] Memory state around the buggy address:
[   28.024766]  ffff888103231b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.025397]  ffff888103231b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.026276] >ffff888103231c00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   28.026964]                                      ^
[   28.028008]  ffff888103231c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.028520]  ffff888103231d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.029197] ==================================================================
[   25.869930] ==================================================================
[   25.871158] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4ba2/0x5450
[   25.871787] Write of size 4 at addr ffff888103231c30 by task kunit_try_catch/286
[   25.872535] 
[   25.872999] CPU: 1 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G    B            N  6.14.0-rc7-next-20250319 #1 PREEMPT(voluntary) 
[   25.873146] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.873184] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   25.873240] Call Trace:
[   25.873273]  <TASK>
[   25.873360]  dump_stack_lvl+0x73/0xb0
[   25.873474]  print_report+0xd1/0x660
[   25.873547]  ? __virt_addr_valid+0x1db/0x2d0
[   25.873667]  ? kasan_complete_mode_report_info+0x2a/0x200
[   25.873918]  kasan_report+0x104/0x140
[   25.873999]  ? kasan_atomics_helper+0x4ba2/0x5450
[   25.874072]  ? kasan_atomics_helper+0x4ba2/0x5450
[   25.874294]  __asan_report_store4_noabort+0x1b/0x30
[   25.874403]  kasan_atomics_helper+0x4ba2/0x5450
[   25.874491]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   25.874616]  ? kasan_save_alloc_info+0x3b/0x50
[   25.874740]  kasan_atomics+0x1dc/0x310
[   25.874959]  ? __pfx_kasan_atomics+0x10/0x10
[   25.875100]  ? __pfx_read_tsc+0x10/0x10
[   25.875212]  ? ktime_get_ts64+0x86/0x240
[   25.875285]  kunit_try_run_case+0x1b2/0x490
[   25.875355]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.875473]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   25.875573]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   25.875677]  ? __kthread_parkme+0x82/0x160
[   25.875795]  ? preempt_count_sub+0x50/0x80
[   25.875844]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.875882]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.875920]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   25.875966]  kthread+0x323/0x710
[   25.875996]  ? trace_preempt_on+0x20/0xc0
[   25.876030]  ? __pfx_kthread+0x10/0x10
[   25.876064]  ? _raw_spin_unlock_irq+0x47/0x80
[   25.876094]  ? calculate_sigpending+0x7b/0xa0
[   25.876168]  ? __pfx_kthread+0x10/0x10
[   25.876264]  ret_from_fork+0x41/0x80
[   25.876337]  ? __pfx_kthread+0x10/0x10
[   25.876397]  ret_from_fork_asm+0x1a/0x30
[   25.876477]  </TASK>
[   25.876502] 
[   25.892101] Allocated by task 286:
[   25.892487]  kasan_save_stack+0x3d/0x60
[   25.893517]  kasan_save_track+0x18/0x40
[   25.894305]  kasan_save_alloc_info+0x3b/0x50
[   25.894916]  __kasan_kmalloc+0xb7/0xc0
[   25.895456]  __kmalloc_cache_noprof+0x183/0x410
[   25.896249]  kasan_atomics+0x95/0x310
[   25.896733]  kunit_try_run_case+0x1b2/0x490
[   25.897165]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.897505]  kthread+0x323/0x710
[   25.898138]  ret_from_fork+0x41/0x80
[   25.898632]  ret_from_fork_asm+0x1a/0x30
[   25.899667] 
[   25.899891] The buggy address belongs to the object at ffff888103231c00
[   25.899891]  which belongs to the cache kmalloc-64 of size 64
[   25.900835] The buggy address is located 0 bytes to the right of
[   25.900835]  allocated 48-byte region [ffff888103231c00, ffff888103231c30)
[   25.902355] 
[   25.902588] The buggy address belongs to the physical page:
[   25.903309] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103231
[   25.904294] flags: 0x200000000000000(node=0|zone=2)
[   25.904877] page_type: f5(slab)
[   25.905286] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   25.906436] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   25.906833] page dumped because: kasan: bad access detected
[   25.907515] 
[   25.908052] Memory state around the buggy address:
[   25.908502]  ffff888103231b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.909526]  ffff888103231b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.910300] >ffff888103231c00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   25.911101]                                      ^
[   25.911410]  ffff888103231c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.912307]  ffff888103231d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.913278] ==================================================================
[   25.915593] ==================================================================
[   25.916457] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b88/0x5450
[   25.917295] Read of size 4 at addr ffff888103231c30 by task kunit_try_catch/286
[   25.917977] 
[   25.918350] CPU: 1 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G    B            N  6.14.0-rc7-next-20250319 #1 PREEMPT(voluntary) 
[   25.918472] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.918508] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   25.918563] Call Trace:
[   25.918792]  <TASK>
[   25.918867]  dump_stack_lvl+0x73/0xb0
[   25.918950]  print_report+0xd1/0x660
[   25.919079]  ? __virt_addr_valid+0x1db/0x2d0
[   25.919256]  ? kasan_complete_mode_report_info+0x2a/0x200
[   25.919334]  kasan_report+0x104/0x140
[   25.919449]  ? kasan_atomics_helper+0x4b88/0x5450
[   25.919561]  ? kasan_atomics_helper+0x4b88/0x5450
[   25.919671]  __asan_report_load4_noabort+0x18/0x20
[   25.919741]  kasan_atomics_helper+0x4b88/0x5450
[   25.919935]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   25.920043]  ? kasan_save_alloc_info+0x3b/0x50
[   25.920154]  kasan_atomics+0x1dc/0x310
[   25.920229]  ? __pfx_kasan_atomics+0x10/0x10
[   25.920891]  ? __pfx_read_tsc+0x10/0x10
[   25.920985]  ? ktime_get_ts64+0x86/0x240
[   25.921064]  kunit_try_run_case+0x1b2/0x490
[   25.921157]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.921214]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   25.921274]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   25.921334]  ? __kthread_parkme+0x82/0x160
[   25.921554]  ? preempt_count_sub+0x50/0x80
[   25.921690]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.921806]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.922073]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   25.922249]  kthread+0x323/0x710
[   25.922402]  ? trace_preempt_on+0x20/0xc0
[   25.922548]  ? __pfx_kthread+0x10/0x10
[   25.922714]  ? _raw_spin_unlock_irq+0x47/0x80
[   25.922936]  ? calculate_sigpending+0x7b/0xa0
[   25.923023]  ? __pfx_kthread+0x10/0x10
[   25.923091]  ret_from_fork+0x41/0x80
[   25.923183]  ? __pfx_kthread+0x10/0x10
[   25.923250]  ret_from_fork_asm+0x1a/0x30
[   25.923337]  </TASK>
[   25.923372] 
[   25.940526] Allocated by task 286:
[   25.941069]  kasan_save_stack+0x3d/0x60
[   25.941802]  kasan_save_track+0x18/0x40
[   25.942103]  kasan_save_alloc_info+0x3b/0x50
[   25.942424]  __kasan_kmalloc+0xb7/0xc0
[   25.943285]  __kmalloc_cache_noprof+0x183/0x410
[   25.944083]  kasan_atomics+0x95/0x310
[   25.944547]  kunit_try_run_case+0x1b2/0x490
[   25.945078]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.946031]  kthread+0x323/0x710
[   25.946469]  ret_from_fork+0x41/0x80
[   25.946985]  ret_from_fork_asm+0x1a/0x30
[   25.947574] 
[   25.947883] The buggy address belongs to the object at ffff888103231c00
[   25.947883]  which belongs to the cache kmalloc-64 of size 64
[   25.949392] The buggy address is located 0 bytes to the right of
[   25.949392]  allocated 48-byte region [ffff888103231c00, ffff888103231c30)
[   25.950714] 
[   25.950919] The buggy address belongs to the physical page:
[   25.951691] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103231
[   25.952642] flags: 0x200000000000000(node=0|zone=2)
[   25.953318] page_type: f5(slab)
[   25.954430] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   25.955780] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   25.956427] page dumped because: kasan: bad access detected
[   25.956785] 
[   25.957005] Memory state around the buggy address:
[   25.957470]  ffff888103231b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.958223]  ffff888103231b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.959425] >ffff888103231c00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   25.959897]                                      ^
[   25.960228]  ffff888103231c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.960605]  ffff888103231d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.961199] ==================================================================
[   27.195626] ==================================================================
[   27.196337] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x49e8/0x5450
[   27.197011] Read of size 4 at addr ffff888103231c30 by task kunit_try_catch/286
[   27.199304] 
[   27.199559] CPU: 1 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G    B            N  6.14.0-rc7-next-20250319 #1 PREEMPT(voluntary) 
[   27.199719] Tainted: [B]=BAD_PAGE, [N]=TEST
[   27.200130] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   27.200209] Call Trace:
[   27.200248]  <TASK>
[   27.200287]  dump_stack_lvl+0x73/0xb0
[   27.200368]  print_report+0xd1/0x660
[   27.200436]  ? __virt_addr_valid+0x1db/0x2d0
[   27.200527]  ? kasan_complete_mode_report_info+0x2a/0x200
[   27.200568]  kasan_report+0x104/0x140
[   27.200601]  ? kasan_atomics_helper+0x49e8/0x5450
[   27.200638]  ? kasan_atomics_helper+0x49e8/0x5450
[   27.200681]  __asan_report_load4_noabort+0x18/0x20
[   27.200741]  kasan_atomics_helper+0x49e8/0x5450
[   27.200783]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   27.200846]  ? kasan_save_alloc_info+0x3b/0x50
[   27.200894]  kasan_atomics+0x1dc/0x310
[   27.200930]  ? __pfx_kasan_atomics+0x10/0x10
[   27.200968]  ? __pfx_read_tsc+0x10/0x10
[   27.201002]  ? ktime_get_ts64+0x86/0x240
[   27.201042]  kunit_try_run_case+0x1b2/0x490
[   27.201079]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.201135]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   27.201171]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   27.201205]  ? __kthread_parkme+0x82/0x160
[   27.201240]  ? preempt_count_sub+0x50/0x80
[   27.201280]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.201316]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.201352]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   27.201388]  kthread+0x323/0x710
[   27.201420]  ? trace_preempt_on+0x20/0xc0
[   27.201454]  ? __pfx_kthread+0x10/0x10
[   27.201488]  ? _raw_spin_unlock_irq+0x47/0x80
[   27.201519]  ? calculate_sigpending+0x7b/0xa0
[   27.201552]  ? __pfx_kthread+0x10/0x10
[   27.201587]  ret_from_fork+0x41/0x80
[   27.201621]  ? __pfx_kthread+0x10/0x10
[   27.201655]  ret_from_fork_asm+0x1a/0x30
[   27.201705]  </TASK>
[   27.201752] 
[   27.221461] Allocated by task 286:
[   27.222365]  kasan_save_stack+0x3d/0x60
[   27.223012]  kasan_save_track+0x18/0x40
[   27.223290]  kasan_save_alloc_info+0x3b/0x50
[   27.224033]  __kasan_kmalloc+0xb7/0xc0
[   27.224707]  __kmalloc_cache_noprof+0x183/0x410
[   27.225239]  kasan_atomics+0x95/0x310
[   27.225818]  kunit_try_run_case+0x1b2/0x490
[   27.226621]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.227256]  kthread+0x323/0x710
[   27.227963]  ret_from_fork+0x41/0x80
[   27.228330]  ret_from_fork_asm+0x1a/0x30
[   27.228982] 
[   27.229169] The buggy address belongs to the object at ffff888103231c00
[   27.229169]  which belongs to the cache kmalloc-64 of size 64
[   27.230659] The buggy address is located 0 bytes to the right of
[   27.230659]  allocated 48-byte region [ffff888103231c00, ffff888103231c30)
[   27.231761] 
[   27.232355] The buggy address belongs to the physical page:
[   27.232670] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103231
[   27.234162] flags: 0x200000000000000(node=0|zone=2)
[   27.234553] page_type: f5(slab)
[   27.234913] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   27.235981] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   27.236787] page dumped because: kasan: bad access detected
[   27.237443] 
[   27.237677] Memory state around the buggy address:
[   27.238477]  ffff888103231b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.239203]  ffff888103231b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.240106] >ffff888103231c00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   27.240911]                                      ^
[   27.241311]  ffff888103231c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.242236]  ffff888103231d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.242924] ==================================================================
[   28.257569] ==================================================================
[   28.258275] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1f43/0x5450
[   28.258848] Write of size 8 at addr ffff888103231c30 by task kunit_try_catch/286
[   28.259524] 
[   28.259767] CPU: 1 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G    B            N  6.14.0-rc7-next-20250319 #1 PREEMPT(voluntary) 
[   28.259898] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.259935] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   28.259998] Call Trace:
[   28.260045]  <TASK>
[   28.260084]  dump_stack_lvl+0x73/0xb0
[   28.260649]  print_report+0xd1/0x660
[   28.261068]  ? __virt_addr_valid+0x1db/0x2d0
[   28.261463]  ? kasan_complete_mode_report_info+0x2a/0x200
[   28.261563]  kasan_report+0x104/0x140
[   28.261631]  ? kasan_atomics_helper+0x1f43/0x5450
[   28.261818]  ? kasan_atomics_helper+0x1f43/0x5450
[   28.261937]  kasan_check_range+0x10c/0x1c0
[   28.262018]  __kasan_check_write+0x18/0x20
[   28.262082]  kasan_atomics_helper+0x1f43/0x5450
[   28.262186]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   28.262262]  ? kasan_save_alloc_info+0x3b/0x50
[   28.262351]  kasan_atomics+0x1dc/0x310
[   28.262419]  ? __pfx_kasan_atomics+0x10/0x10
[   28.262492]  ? __pfx_read_tsc+0x10/0x10
[   28.262558]  ? ktime_get_ts64+0x86/0x240
[   28.262635]  kunit_try_run_case+0x1b2/0x490
[   28.262696]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.262776]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   28.262831]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   28.262867]  ? __kthread_parkme+0x82/0x160
[   28.262904]  ? preempt_count_sub+0x50/0x80
[   28.262944]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.262981]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.263018]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   28.263054]  kthread+0x323/0x710
[   28.263086]  ? trace_preempt_on+0x20/0xc0
[   28.263143]  ? __pfx_kthread+0x10/0x10
[   28.263177]  ? _raw_spin_unlock_irq+0x47/0x80
[   28.263209]  ? calculate_sigpending+0x7b/0xa0
[   28.263242]  ? __pfx_kthread+0x10/0x10
[   28.263277]  ret_from_fork+0x41/0x80
[   28.263311]  ? __pfx_kthread+0x10/0x10
[   28.263345]  ret_from_fork_asm+0x1a/0x30
[   28.263393]  </TASK>
[   28.263411] 
[   28.275981] Allocated by task 286:
[   28.276241]  kasan_save_stack+0x3d/0x60
[   28.276678]  kasan_save_track+0x18/0x40
[   28.277143]  kasan_save_alloc_info+0x3b/0x50
[   28.277596]  __kasan_kmalloc+0xb7/0xc0
[   28.278130]  __kmalloc_cache_noprof+0x183/0x410
[   28.278512]  kasan_atomics+0x95/0x310
[   28.278803]  kunit_try_run_case+0x1b2/0x490
[   28.279101]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.279682]  kthread+0x323/0x710
[   28.280215]  ret_from_fork+0x41/0x80
[   28.280635]  ret_from_fork_asm+0x1a/0x30
[   28.281136] 
[   28.281366] The buggy address belongs to the object at ffff888103231c00
[   28.281366]  which belongs to the cache kmalloc-64 of size 64
[   28.282729] The buggy address is located 0 bytes to the right of
[   28.282729]  allocated 48-byte region [ffff888103231c00, ffff888103231c30)
[   28.283360] 
[   28.283641] The buggy address belongs to the physical page:
[   28.284226] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103231
[   28.284811] flags: 0x200000000000000(node=0|zone=2)
[   28.285144] page_type: f5(slab)
[   28.285535] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   28.286391] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   28.287067] page dumped because: kasan: bad access detected
[   28.287496] 
[   28.287688] Memory state around the buggy address:
[   28.287990]  ffff888103231b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.288505]  ffff888103231b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.289223] >ffff888103231c00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   28.289891]                                      ^
[   28.290370]  ffff888103231c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.290755]  ffff888103231d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.291188] ==================================================================
[   26.622366] ==================================================================
[   26.623153] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xb6a/0x5450
[   26.623953] Write of size 4 at addr ffff888103231c30 by task kunit_try_catch/286
[   26.624446] 
[   26.624745] CPU: 1 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G    B            N  6.14.0-rc7-next-20250319 #1 PREEMPT(voluntary) 
[   26.624883] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.624924] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   26.624989] Call Trace:
[   26.625028]  <TASK>
[   26.625066]  dump_stack_lvl+0x73/0xb0
[   26.625174]  print_report+0xd1/0x660
[   26.625248]  ? __virt_addr_valid+0x1db/0x2d0
[   26.625375]  ? kasan_complete_mode_report_info+0x2a/0x200
[   26.625445]  kasan_report+0x104/0x140
[   26.625508]  ? kasan_atomics_helper+0xb6a/0x5450
[   26.625618]  ? kasan_atomics_helper+0xb6a/0x5450
[   26.625760]  kasan_check_range+0x10c/0x1c0
[   26.625851]  __kasan_check_write+0x18/0x20
[   26.625915]  kasan_atomics_helper+0xb6a/0x5450
[   26.625990]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   26.626063]  ? kasan_save_alloc_info+0x3b/0x50
[   26.626169]  kasan_atomics+0x1dc/0x310
[   26.626235]  ? __pfx_kasan_atomics+0x10/0x10
[   26.626305]  ? __pfx_read_tsc+0x10/0x10
[   26.626370]  ? ktime_get_ts64+0x86/0x240
[   26.626444]  kunit_try_run_case+0x1b2/0x490
[   26.626519]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.626586]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   26.626653]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   26.626742]  ? __kthread_parkme+0x82/0x160
[   26.626810]  ? preempt_count_sub+0x50/0x80
[   26.626890]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.626960]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.627033]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   26.627102]  kthread+0x323/0x710
[   26.627185]  ? trace_preempt_on+0x20/0xc0
[   26.627256]  ? __pfx_kthread+0x10/0x10
[   26.627321]  ? _raw_spin_unlock_irq+0x47/0x80
[   26.627385]  ? calculate_sigpending+0x7b/0xa0
[   26.627449]  ? __pfx_kthread+0x10/0x10
[   26.627515]  ret_from_fork+0x41/0x80
[   26.627592]  ? __pfx_kthread+0x10/0x10
[   26.627680]  ret_from_fork_asm+0x1a/0x30
[   26.627778]  </TASK>
[   26.627814] 
[   26.640378] Allocated by task 286:
[   26.640776]  kasan_save_stack+0x3d/0x60
[   26.641261]  kasan_save_track+0x18/0x40
[   26.641688]  kasan_save_alloc_info+0x3b/0x50
[   26.642227]  __kasan_kmalloc+0xb7/0xc0
[   26.642589]  __kmalloc_cache_noprof+0x183/0x410
[   26.644079]  kasan_atomics+0x95/0x310
[   26.644513]  kunit_try_run_case+0x1b2/0x490
[   26.645532]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.646563]  kthread+0x323/0x710
[   26.647191]  ret_from_fork+0x41/0x80
[   26.647478]  ret_from_fork_asm+0x1a/0x30
[   26.647811] 
[   26.648149] The buggy address belongs to the object at ffff888103231c00
[   26.648149]  which belongs to the cache kmalloc-64 of size 64
[   26.649222] The buggy address is located 0 bytes to the right of
[   26.649222]  allocated 48-byte region [ffff888103231c00, ffff888103231c30)
[   26.650320] 
[   26.650494] The buggy address belongs to the physical page:
[   26.650895] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103231
[   26.651527] flags: 0x200000000000000(node=0|zone=2)
[   26.652131] page_type: f5(slab)
[   26.652500] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   26.653244] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   26.653826] page dumped because: kasan: bad access detected
[   26.654168] 
[   26.654327] Memory state around the buggy address:
[   26.654603]  ffff888103231b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.655306]  ffff888103231b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.656036] >ffff888103231c00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   26.656695]                                      ^
[   26.657064]  ffff888103231c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.657684]  ffff888103231d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.658076] ==================================================================
[   27.789980] ==================================================================
[   27.790655] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x194a/0x5450
[   27.791421] Write of size 8 at addr ffff888103231c30 by task kunit_try_catch/286
[   27.792185] 
[   27.792384] CPU: 1 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G    B            N  6.14.0-rc7-next-20250319 #1 PREEMPT(voluntary) 
[   27.792516] Tainted: [B]=BAD_PAGE, [N]=TEST
[   27.792555] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   27.792618] Call Trace:
[   27.792657]  <TASK>
[   27.792694]  dump_stack_lvl+0x73/0xb0
[   27.792832]  print_report+0xd1/0x660
[   27.792906]  ? __virt_addr_valid+0x1db/0x2d0
[   27.793038]  ? kasan_complete_mode_report_info+0x2a/0x200
[   27.793139]  kasan_report+0x104/0x140
[   27.793210]  ? kasan_atomics_helper+0x194a/0x5450
[   27.793282]  ? kasan_atomics_helper+0x194a/0x5450
[   27.793368]  kasan_check_range+0x10c/0x1c0
[   27.793444]  __kasan_check_write+0x18/0x20
[   27.793509]  kasan_atomics_helper+0x194a/0x5450
[   27.793583]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   27.793660]  ? kasan_save_alloc_info+0x3b/0x50
[   27.793804]  kasan_atomics+0x1dc/0x310
[   27.793890]  ? __pfx_kasan_atomics+0x10/0x10
[   27.793969]  ? __pfx_read_tsc+0x10/0x10
[   27.794036]  ? ktime_get_ts64+0x86/0x240
[   27.794189]  kunit_try_run_case+0x1b2/0x490
[   27.794291]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.794629]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   27.794839]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   27.796417]  ? __kthread_parkme+0x82/0x160
[   27.796493]  ? preempt_count_sub+0x50/0x80
[   27.796574]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.796649]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.797091]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   27.798004]  kthread+0x323/0x710
[   27.798077]  ? trace_preempt_on+0x20/0xc0
[   27.798179]  ? __pfx_kthread+0x10/0x10
[   27.798251]  ? _raw_spin_unlock_irq+0x47/0x80
[   27.798315]  ? calculate_sigpending+0x7b/0xa0
[   27.798384]  ? __pfx_kthread+0x10/0x10
[   27.798451]  ret_from_fork+0x41/0x80
[   27.798518]  ? __pfx_kthread+0x10/0x10
[   27.798587]  ret_from_fork_asm+0x1a/0x30
[   27.798681]  </TASK>
[   27.798715] 
[   27.816303] Allocated by task 286:
[   27.816546]  kasan_save_stack+0x3d/0x60
[   27.816851]  kasan_save_track+0x18/0x40
[   27.817332]  kasan_save_alloc_info+0x3b/0x50
[   27.818078]  __kasan_kmalloc+0xb7/0xc0
[   27.819147]  __kmalloc_cache_noprof+0x183/0x410
[   27.819663]  kasan_atomics+0x95/0x310
[   27.821132]  kunit_try_run_case+0x1b2/0x490
[   27.822392]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.823054]  kthread+0x323/0x710
[   27.823766]  ret_from_fork+0x41/0x80
[   27.824521]  ret_from_fork_asm+0x1a/0x30
[   27.824987] 
[   27.825188] The buggy address belongs to the object at ffff888103231c00
[   27.825188]  which belongs to the cache kmalloc-64 of size 64
[   27.826776] The buggy address is located 0 bytes to the right of
[   27.826776]  allocated 48-byte region [ffff888103231c00, ffff888103231c30)
[   27.827740] 
[   27.828072] The buggy address belongs to the physical page:
[   27.828603] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103231
[   27.829409] flags: 0x200000000000000(node=0|zone=2)
[   27.830105] page_type: f5(slab)
[   27.830454] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   27.831049] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   27.831832] page dumped because: kasan: bad access detected
[   27.832438] 
[   27.832738] Memory state around the buggy address:
[   27.833035]  ffff888103231b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.833769]  ffff888103231b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.834255] >ffff888103231c00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   27.835191]                                      ^
[   27.835681]  ffff888103231c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.837131]  ffff888103231d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.837997] ==================================================================
[   26.415214] ==================================================================
[   26.415980] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x860/0x5450
[   26.416560] Write of size 4 at addr ffff888103231c30 by task kunit_try_catch/286
[   26.417238] 
[   26.417517] CPU: 1 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G    B            N  6.14.0-rc7-next-20250319 #1 PREEMPT(voluntary) 
[   26.417672] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.417755] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   26.417824] Call Trace:
[   26.417863]  <TASK>
[   26.417901]  dump_stack_lvl+0x73/0xb0
[   26.417986]  print_report+0xd1/0x660
[   26.418061]  ? __virt_addr_valid+0x1db/0x2d0
[   26.418218]  ? kasan_complete_mode_report_info+0x2a/0x200
[   26.418347]  kasan_report+0x104/0x140
[   26.418418]  ? kasan_atomics_helper+0x860/0x5450
[   26.418493]  ? kasan_atomics_helper+0x860/0x5450
[   26.418578]  kasan_check_range+0x10c/0x1c0
[   26.418653]  __kasan_check_write+0x18/0x20
[   26.418764]  kasan_atomics_helper+0x860/0x5450
[   26.418850]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   26.418922]  ? kasan_save_alloc_info+0x3b/0x50
[   26.419015]  kasan_atomics+0x1dc/0x310
[   26.419088]  ? __pfx_kasan_atomics+0x10/0x10
[   26.419183]  ? __pfx_read_tsc+0x10/0x10
[   26.419250]  ? ktime_get_ts64+0x86/0x240
[   26.419324]  kunit_try_run_case+0x1b2/0x490
[   26.419448]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.419521]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   26.419582]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   26.419680]  ? __kthread_parkme+0x82/0x160
[   26.419824]  ? preempt_count_sub+0x50/0x80
[   26.419949]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.420028]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.420080]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   26.420143]  kthread+0x323/0x710
[   26.420180]  ? trace_preempt_on+0x20/0xc0
[   26.420215]  ? __pfx_kthread+0x10/0x10
[   26.420249]  ? _raw_spin_unlock_irq+0x47/0x80
[   26.420281]  ? calculate_sigpending+0x7b/0xa0
[   26.420313]  ? __pfx_kthread+0x10/0x10
[   26.420347]  ret_from_fork+0x41/0x80
[   26.420381]  ? __pfx_kthread+0x10/0x10
[   26.420415]  ret_from_fork_asm+0x1a/0x30
[   26.420464]  </TASK>
[   26.420481] 
[   26.433397] Allocated by task 286:
[   26.433638]  kasan_save_stack+0x3d/0x60
[   26.433928]  kasan_save_track+0x18/0x40
[   26.434367]  kasan_save_alloc_info+0x3b/0x50
[   26.434916]  __kasan_kmalloc+0xb7/0xc0
[   26.435359]  __kmalloc_cache_noprof+0x183/0x410
[   26.435913]  kasan_atomics+0x95/0x310
[   26.436445]  kunit_try_run_case+0x1b2/0x490
[   26.436980]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.437559]  kthread+0x323/0x710
[   26.438035]  ret_from_fork+0x41/0x80
[   26.438424]  ret_from_fork_asm+0x1a/0x30
[   26.438974] 
[   26.439186] The buggy address belongs to the object at ffff888103231c00
[   26.439186]  which belongs to the cache kmalloc-64 of size 64
[   26.440302] The buggy address is located 0 bytes to the right of
[   26.440302]  allocated 48-byte region [ffff888103231c00, ffff888103231c30)
[   26.441303] 
[   26.441468] The buggy address belongs to the physical page:
[   26.441772] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103231
[   26.442592] flags: 0x200000000000000(node=0|zone=2)
[   26.443288] page_type: f5(slab)
[   26.443641] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   26.444068] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   26.444795] page dumped because: kasan: bad access detected
[   26.445387] 
[   26.445682] Memory state around the buggy address:
[   26.446098]  ffff888103231b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.446505]  ffff888103231b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.446958] >ffff888103231c00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   26.447745]                                      ^
[   26.448508]  ffff888103231c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.449394]  ffff888103231d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.449902] ==================================================================
[   26.699448] ==================================================================
[   26.700181] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a84/0x5450
[   26.700589] Read of size 4 at addr ffff888103231c30 by task kunit_try_catch/286
[   26.701064] 
[   26.701342] CPU: 1 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G    B            N  6.14.0-rc7-next-20250319 #1 PREEMPT(voluntary) 
[   26.701476] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.701514] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   26.701576] Call Trace:
[   26.701616]  <TASK>
[   26.701653]  dump_stack_lvl+0x73/0xb0
[   26.701793]  print_report+0xd1/0x660
[   26.701877]  ? __virt_addr_valid+0x1db/0x2d0
[   26.702008]  ? kasan_complete_mode_report_info+0x2a/0x200
[   26.702088]  kasan_report+0x104/0x140
[   26.702174]  ? kasan_atomics_helper+0x4a84/0x5450
[   26.702243]  ? kasan_atomics_helper+0x4a84/0x5450
[   26.702320]  __asan_report_load4_noabort+0x18/0x20
[   26.702384]  kasan_atomics_helper+0x4a84/0x5450
[   26.702456]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   26.702526]  ? kasan_save_alloc_info+0x3b/0x50
[   26.702614]  kasan_atomics+0x1dc/0x310
[   26.702691]  ? __pfx_kasan_atomics+0x10/0x10
[   26.702829]  ? __pfx_read_tsc+0x10/0x10
[   26.702899]  ? ktime_get_ts64+0x86/0x240
[   26.702975]  kunit_try_run_case+0x1b2/0x490
[   26.703046]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.703135]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   26.703198]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   26.703264]  ? __kthread_parkme+0x82/0x160
[   26.703332]  ? preempt_count_sub+0x50/0x80
[   26.703410]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.703481]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.703555]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   26.703657]  kthread+0x323/0x710
[   26.703773]  ? trace_preempt_on+0x20/0xc0
[   26.703858]  ? __pfx_kthread+0x10/0x10
[   26.703937]  ? _raw_spin_unlock_irq+0x47/0x80
[   26.704001]  ? calculate_sigpending+0x7b/0xa0
[   26.704068]  ? __pfx_kthread+0x10/0x10
[   26.704162]  ret_from_fork+0x41/0x80
[   26.704236]  ? __pfx_kthread+0x10/0x10
[   26.704302]  ret_from_fork_asm+0x1a/0x30
[   26.704398]  </TASK>
[   26.704433] 
[   26.717357] Allocated by task 286:
[   26.717748]  kasan_save_stack+0x3d/0x60
[   26.718131]  kasan_save_track+0x18/0x40
[   26.718453]  kasan_save_alloc_info+0x3b/0x50
[   26.718821]  __kasan_kmalloc+0xb7/0xc0
[   26.719098]  __kmalloc_cache_noprof+0x183/0x410
[   26.719571]  kasan_atomics+0x95/0x310
[   26.720075]  kunit_try_run_case+0x1b2/0x490
[   26.720550]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.721077]  kthread+0x323/0x710
[   26.721364]  ret_from_fork+0x41/0x80
[   26.721751]  ret_from_fork_asm+0x1a/0x30
[   26.722204] 
[   26.722427] The buggy address belongs to the object at ffff888103231c00
[   26.722427]  which belongs to the cache kmalloc-64 of size 64
[   26.723478] The buggy address is located 0 bytes to the right of
[   26.723478]  allocated 48-byte region [ffff888103231c00, ffff888103231c30)
[   26.724499] 
[   26.724769] The buggy address belongs to the physical page:
[   26.725225] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103231
[   26.725887] flags: 0x200000000000000(node=0|zone=2)
[   26.726392] page_type: f5(slab)
[   26.726702] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   26.727279] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   26.727855] page dumped because: kasan: bad access detected
[   26.728259] 
[   26.728426] Memory state around the buggy address:
[   26.728759]  ffff888103231b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.729201]  ffff888103231b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.729881] >ffff888103231c00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   26.730530]                                      ^
[   26.731079]  ffff888103231c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.731807]  ffff888103231d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.732427] ==================================================================
[   26.368637] ==================================================================
[   26.369263] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x7c7/0x5450
[   26.369987] Write of size 4 at addr ffff888103231c30 by task kunit_try_catch/286
[   26.371299] 
[   26.371567] CPU: 1 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G    B            N  6.14.0-rc7-next-20250319 #1 PREEMPT(voluntary) 
[   26.371722] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.371764] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   26.371824] Call Trace:
[   26.371863]  <TASK>
[   26.371901]  dump_stack_lvl+0x73/0xb0
[   26.372025]  print_report+0xd1/0x660
[   26.372136]  ? __virt_addr_valid+0x1db/0x2d0
[   26.372272]  ? kasan_complete_mode_report_info+0x2a/0x200
[   26.372352]  kasan_report+0x104/0x140
[   26.372414]  ? kasan_atomics_helper+0x7c7/0x5450
[   26.372479]  ? kasan_atomics_helper+0x7c7/0x5450
[   26.372526]  kasan_check_range+0x10c/0x1c0
[   26.372565]  __kasan_check_write+0x18/0x20
[   26.372597]  kasan_atomics_helper+0x7c7/0x5450
[   26.372634]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   26.372672]  ? kasan_save_alloc_info+0x3b/0x50
[   26.372760]  kasan_atomics+0x1dc/0x310
[   26.372803]  ? __pfx_kasan_atomics+0x10/0x10
[   26.372841]  ? __pfx_read_tsc+0x10/0x10
[   26.372876]  ? ktime_get_ts64+0x86/0x240
[   26.372916]  kunit_try_run_case+0x1b2/0x490
[   26.372953]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.372987]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   26.373022]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   26.373056]  ? __kthread_parkme+0x82/0x160
[   26.373090]  ? preempt_count_sub+0x50/0x80
[   26.373152]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.373191]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.373228]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   26.373264]  kthread+0x323/0x710
[   26.373297]  ? trace_preempt_on+0x20/0xc0
[   26.373332]  ? __pfx_kthread+0x10/0x10
[   26.373365]  ? _raw_spin_unlock_irq+0x47/0x80
[   26.373397]  ? calculate_sigpending+0x7b/0xa0
[   26.373430]  ? __pfx_kthread+0x10/0x10
[   26.373464]  ret_from_fork+0x41/0x80
[   26.373499]  ? __pfx_kthread+0x10/0x10
[   26.373532]  ret_from_fork_asm+0x1a/0x30
[   26.373582]  </TASK>
[   26.373599] 
[   26.394910] Allocated by task 286:
[   26.395195]  kasan_save_stack+0x3d/0x60
[   26.396207]  kasan_save_track+0x18/0x40
[   26.396585]  kasan_save_alloc_info+0x3b/0x50
[   26.397009]  __kasan_kmalloc+0xb7/0xc0
[   26.397376]  __kmalloc_cache_noprof+0x183/0x410
[   26.398707]  kasan_atomics+0x95/0x310
[   26.398980]  kunit_try_run_case+0x1b2/0x490
[   26.399704]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.400907]  kthread+0x323/0x710
[   26.401259]  ret_from_fork+0x41/0x80
[   26.401583]  ret_from_fork_asm+0x1a/0x30
[   26.402271] 
[   26.402436] The buggy address belongs to the object at ffff888103231c00
[   26.402436]  which belongs to the cache kmalloc-64 of size 64
[   26.403568] The buggy address is located 0 bytes to the right of
[   26.403568]  allocated 48-byte region [ffff888103231c00, ffff888103231c30)
[   26.404759] 
[   26.405010] The buggy address belongs to the physical page:
[   26.405548] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103231
[   26.406285] flags: 0x200000000000000(node=0|zone=2)
[   26.407026] page_type: f5(slab)
[   26.407569] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   26.408321] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   26.408905] page dumped because: kasan: bad access detected
[   26.409443] 
[   26.409681] Memory state around the buggy address:
[   26.410250]  ffff888103231b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.410673]  ffff888103231b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.411286] >ffff888103231c00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   26.411894]                                      ^
[   26.412280]  ffff888103231c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.413012]  ffff888103231d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.413766] ==================================================================
[   26.733224] ==================================================================
[   26.734090] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xd47/0x5450
[   26.734817] Write of size 4 at addr ffff888103231c30 by task kunit_try_catch/286
[   26.735496] 
[   26.735835] CPU: 1 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G    B            N  6.14.0-rc7-next-20250319 #1 PREEMPT(voluntary) 
[   26.735978] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.736016] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   26.736075] Call Trace:
[   26.736129]  <TASK>
[   26.736168]  dump_stack_lvl+0x73/0xb0
[   26.736249]  print_report+0xd1/0x660
[   26.736318]  ? __virt_addr_valid+0x1db/0x2d0
[   26.736445]  ? kasan_complete_mode_report_info+0x2a/0x200
[   26.736527]  kasan_report+0x104/0x140
[   26.736592]  ? kasan_atomics_helper+0xd47/0x5450
[   26.736666]  ? kasan_atomics_helper+0xd47/0x5450
[   26.736810]  kasan_check_range+0x10c/0x1c0
[   26.736898]  __kasan_check_write+0x18/0x20
[   26.736965]  kasan_atomics_helper+0xd47/0x5450
[   26.737040]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   26.737137]  ? kasan_save_alloc_info+0x3b/0x50
[   26.737230]  kasan_atomics+0x1dc/0x310
[   26.737303]  ? __pfx_kasan_atomics+0x10/0x10
[   26.737376]  ? __pfx_read_tsc+0x10/0x10
[   26.737442]  ? ktime_get_ts64+0x86/0x240
[   26.737518]  kunit_try_run_case+0x1b2/0x490
[   26.737591]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.737654]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   26.737760]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   26.737838]  ? __kthread_parkme+0x82/0x160
[   26.737908]  ? preempt_count_sub+0x50/0x80
[   26.737983]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.738056]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.738153]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   26.738229]  kthread+0x323/0x710
[   26.738295]  ? trace_preempt_on+0x20/0xc0
[   26.738365]  ? __pfx_kthread+0x10/0x10
[   26.738433]  ? _raw_spin_unlock_irq+0x47/0x80
[   26.738499]  ? calculate_sigpending+0x7b/0xa0
[   26.738563]  ? __pfx_kthread+0x10/0x10
[   26.738629]  ret_from_fork+0x41/0x80
[   26.738697]  ? __pfx_kthread+0x10/0x10
[   26.738817]  ret_from_fork_asm+0x1a/0x30
[   26.738914]  </TASK>
[   26.738951] 
[   26.751390] Allocated by task 286:
[   26.751653]  kasan_save_stack+0x3d/0x60
[   26.752179]  kasan_save_track+0x18/0x40
[   26.752613]  kasan_save_alloc_info+0x3b/0x50
[   26.753172]  __kasan_kmalloc+0xb7/0xc0
[   26.753599]  __kmalloc_cache_noprof+0x183/0x410
[   26.754784]  kasan_atomics+0x95/0x310
[   26.755202]  kunit_try_run_case+0x1b2/0x490
[   26.755657]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.758573]  kthread+0x323/0x710
[   26.759296]  ret_from_fork+0x41/0x80
[   26.760540]  ret_from_fork_asm+0x1a/0x30
[   26.761904] 
[   26.762077] The buggy address belongs to the object at ffff888103231c00
[   26.762077]  which belongs to the cache kmalloc-64 of size 64
[   26.762684] The buggy address is located 0 bytes to the right of
[   26.762684]  allocated 48-byte region [ffff888103231c00, ffff888103231c30)
[   26.764064] 
[   26.764907] The buggy address belongs to the physical page:
[   26.765447] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103231
[   26.766584] flags: 0x200000000000000(node=0|zone=2)
[   26.768215] page_type: f5(slab)
[   26.768465] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   26.770303] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   26.771596] page dumped because: kasan: bad access detected
[   26.772173] 
[   26.772400] Memory state around the buggy address:
[   26.772849]  ffff888103231b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.773544]  ffff888103231b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.774017] >ffff888103231c00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   26.774675]                                      ^
[   26.775103]  ffff888103231c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.775696]  ffff888103231d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.776669] ==================================================================
[   28.641896] ==================================================================
[   28.642832] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x5115/0x5450
[   28.643235] Read of size 8 at addr ffff888103231c30 by task kunit_try_catch/286
[   28.644384] 
[   28.645494] CPU: 1 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G    B            N  6.14.0-rc7-next-20250319 #1 PREEMPT(voluntary) 
[   28.645697] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.645757] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   28.645794] Call Trace:
[   28.645814]  <TASK>
[   28.645836]  dump_stack_lvl+0x73/0xb0
[   28.645880]  print_report+0xd1/0x660
[   28.645916]  ? __virt_addr_valid+0x1db/0x2d0
[   28.645983]  ? kasan_complete_mode_report_info+0x2a/0x200
[   28.646021]  kasan_report+0x104/0x140
[   28.646053]  ? kasan_atomics_helper+0x5115/0x5450
[   28.646089]  ? kasan_atomics_helper+0x5115/0x5450
[   28.646153]  __asan_report_load8_noabort+0x18/0x20
[   28.646188]  kasan_atomics_helper+0x5115/0x5450
[   28.646225]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   28.646262]  ? kasan_save_alloc_info+0x3b/0x50
[   28.646306]  kasan_atomics+0x1dc/0x310
[   28.646342]  ? __pfx_kasan_atomics+0x10/0x10
[   28.646379]  ? __pfx_read_tsc+0x10/0x10
[   28.646411]  ? ktime_get_ts64+0x86/0x240
[   28.646451]  kunit_try_run_case+0x1b2/0x490
[   28.646487]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.646520]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   28.646552]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   28.646586]  ? __kthread_parkme+0x82/0x160
[   28.646619]  ? preempt_count_sub+0x50/0x80
[   28.646657]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.646693]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.646761]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   28.646800]  kthread+0x323/0x710
[   28.646831]  ? trace_preempt_on+0x20/0xc0
[   28.646867]  ? __pfx_kthread+0x10/0x10
[   28.646900]  ? _raw_spin_unlock_irq+0x47/0x80
[   28.646931]  ? calculate_sigpending+0x7b/0xa0
[   28.646964]  ? __pfx_kthread+0x10/0x10
[   28.646997]  ret_from_fork+0x41/0x80
[   28.647031]  ? __pfx_kthread+0x10/0x10
[   28.647066]  ret_from_fork_asm+0x1a/0x30
[   28.647134]  </TASK>
[   28.647153] 
[   28.659348] Allocated by task 286:
[   28.659773]  kasan_save_stack+0x3d/0x60
[   28.660179]  kasan_save_track+0x18/0x40
[   28.660590]  kasan_save_alloc_info+0x3b/0x50
[   28.661034]  __kasan_kmalloc+0xb7/0xc0
[   28.661431]  __kmalloc_cache_noprof+0x183/0x410
[   28.661784]  kasan_atomics+0x95/0x310
[   28.662141]  kunit_try_run_case+0x1b2/0x490
[   28.662642]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.663272]  kthread+0x323/0x710
[   28.663765]  ret_from_fork+0x41/0x80
[   28.664227]  ret_from_fork_asm+0x1a/0x30
[   28.664604] 
[   28.664843] The buggy address belongs to the object at ffff888103231c00
[   28.664843]  which belongs to the cache kmalloc-64 of size 64
[   28.665655] The buggy address is located 0 bytes to the right of
[   28.665655]  allocated 48-byte region [ffff888103231c00, ffff888103231c30)
[   28.666462] 
[   28.666635] The buggy address belongs to the physical page:
[   28.666986] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103231
[   28.667781] flags: 0x200000000000000(node=0|zone=2)
[   28.668303] page_type: f5(slab)
[   28.668671] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   28.669414] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   28.669951] page dumped because: kasan: bad access detected
[   28.670499] 
[   28.670763] Memory state around the buggy address:
[   28.671244]  ffff888103231b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.671893]  ffff888103231b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.672316] >ffff888103231c00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   28.672869]                                      ^
[   28.673354]  ffff888103231c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.674038]  ffff888103231d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.674682] ==================================================================
[   27.885188] ==================================================================
[   27.885835] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1a7f/0x5450
[   27.886460] Write of size 8 at addr ffff888103231c30 by task kunit_try_catch/286
[   27.886929] 
[   27.887212] CPU: 1 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G    B            N  6.14.0-rc7-next-20250319 #1 PREEMPT(voluntary) 
[   27.887352] Tainted: [B]=BAD_PAGE, [N]=TEST
[   27.887391] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   27.887453] Call Trace:
[   27.887490]  <TASK>
[   27.887530]  dump_stack_lvl+0x73/0xb0
[   27.887641]  print_report+0xd1/0x660
[   27.887765]  ? __virt_addr_valid+0x1db/0x2d0
[   27.887903]  ? kasan_complete_mode_report_info+0x2a/0x200
[   27.888041]  kasan_report+0x104/0x140
[   27.888137]  ? kasan_atomics_helper+0x1a7f/0x5450
[   27.888212]  ? kasan_atomics_helper+0x1a7f/0x5450
[   27.888340]  kasan_check_range+0x10c/0x1c0
[   27.888420]  __kasan_check_write+0x18/0x20
[   27.888483]  kasan_atomics_helper+0x1a7f/0x5450
[   27.888553]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   27.888626]  ? kasan_save_alloc_info+0x3b/0x50
[   27.888755]  kasan_atomics+0x1dc/0x310
[   27.888807]  ? __pfx_kasan_atomics+0x10/0x10
[   27.888848]  ? __pfx_read_tsc+0x10/0x10
[   27.888883]  ? ktime_get_ts64+0x86/0x240
[   27.888923]  kunit_try_run_case+0x1b2/0x490
[   27.888960]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.888994]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   27.889027]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   27.889062]  ? __kthread_parkme+0x82/0x160
[   27.889095]  ? preempt_count_sub+0x50/0x80
[   27.889160]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.889198]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.889235]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   27.889271]  kthread+0x323/0x710
[   27.889302]  ? trace_preempt_on+0x20/0xc0
[   27.889338]  ? __pfx_kthread+0x10/0x10
[   27.889371]  ? _raw_spin_unlock_irq+0x47/0x80
[   27.889403]  ? calculate_sigpending+0x7b/0xa0
[   27.889436]  ? __pfx_kthread+0x10/0x10
[   27.889470]  ret_from_fork+0x41/0x80
[   27.889505]  ? __pfx_kthread+0x10/0x10
[   27.889540]  ret_from_fork_asm+0x1a/0x30
[   27.889589]  </TASK>
[   27.889607] 
[   27.909612] Allocated by task 286:
[   27.910021]  kasan_save_stack+0x3d/0x60
[   27.911572]  kasan_save_track+0x18/0x40
[   27.912027]  kasan_save_alloc_info+0x3b/0x50
[   27.912545]  __kasan_kmalloc+0xb7/0xc0
[   27.912963]  __kmalloc_cache_noprof+0x183/0x410
[   27.913424]  kasan_atomics+0x95/0x310
[   27.913786]  kunit_try_run_case+0x1b2/0x490
[   27.914826]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.915442]  kthread+0x323/0x710
[   27.916101]  ret_from_fork+0x41/0x80
[   27.916518]  ret_from_fork_asm+0x1a/0x30
[   27.917260] 
[   27.917486] The buggy address belongs to the object at ffff888103231c00
[   27.917486]  which belongs to the cache kmalloc-64 of size 64
[   27.918697] The buggy address is located 0 bytes to the right of
[   27.918697]  allocated 48-byte region [ffff888103231c00, ffff888103231c30)
[   27.920197] 
[   27.920429] The buggy address belongs to the physical page:
[   27.921284] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103231
[   27.921544] flags: 0x200000000000000(node=0|zone=2)
[   27.921752] page_type: f5(slab)
[   27.922184] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   27.923566] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   27.924983] page dumped because: kasan: bad access detected
[   27.925418] 
[   27.925638] Memory state around the buggy address:
[   27.926374]  ffff888103231b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.926793]  ffff888103231b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.928292] >ffff888103231c00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   27.930186]                                      ^
[   27.930583]  ffff888103231c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.931181]  ffff888103231d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.931711] ==================================================================
[   26.191546] ==================================================================
[   26.192269] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x565/0x5450
[   26.193215] Write of size 4 at addr ffff888103231c30 by task kunit_try_catch/286
[   26.193783] 
[   26.193977] CPU: 1 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G    B            N  6.14.0-rc7-next-20250319 #1 PREEMPT(voluntary) 
[   26.194104] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.194165] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   26.194226] Call Trace:
[   26.194263]  <TASK>
[   26.194297]  dump_stack_lvl+0x73/0xb0
[   26.194379]  print_report+0xd1/0x660
[   26.194451]  ? __virt_addr_valid+0x1db/0x2d0
[   26.194575]  ? kasan_complete_mode_report_info+0x2a/0x200
[   26.194652]  kasan_report+0x104/0x140
[   26.194766]  ? kasan_atomics_helper+0x565/0x5450
[   26.194852]  ? kasan_atomics_helper+0x565/0x5450
[   26.194936]  kasan_check_range+0x10c/0x1c0
[   26.195010]  __kasan_check_write+0x18/0x20
[   26.195071]  kasan_atomics_helper+0x565/0x5450
[   26.195164]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   26.195238]  ? kasan_save_alloc_info+0x3b/0x50
[   26.195329]  kasan_atomics+0x1dc/0x310
[   26.195400]  ? __pfx_kasan_atomics+0x10/0x10
[   26.195476]  ? __pfx_read_tsc+0x10/0x10
[   26.195537]  ? ktime_get_ts64+0x86/0x240
[   26.195641]  kunit_try_run_case+0x1b2/0x490
[   26.195751]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.195831]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   26.195904]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   26.195977]  ? __kthread_parkme+0x82/0x160
[   26.196041]  ? preempt_count_sub+0x50/0x80
[   26.196134]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.196206]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.196278]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   26.196341]  kthread+0x323/0x710
[   26.196402]  ? trace_preempt_on+0x20/0xc0
[   26.196469]  ? __pfx_kthread+0x10/0x10
[   26.196533]  ? _raw_spin_unlock_irq+0x47/0x80
[   26.196595]  ? calculate_sigpending+0x7b/0xa0
[   26.196652]  ? __pfx_kthread+0x10/0x10
[   26.196765]  ret_from_fork+0x41/0x80
[   26.196847]  ? __pfx_kthread+0x10/0x10
[   26.196914]  ret_from_fork_asm+0x1a/0x30
[   26.197009]  </TASK>
[   26.197039] 
[   26.211294] Allocated by task 286:
[   26.211698]  kasan_save_stack+0x3d/0x60
[   26.212228]  kasan_save_track+0x18/0x40
[   26.212629]  kasan_save_alloc_info+0x3b/0x50
[   26.212952]  __kasan_kmalloc+0xb7/0xc0
[   26.213456]  __kmalloc_cache_noprof+0x183/0x410
[   26.214045]  kasan_atomics+0x95/0x310
[   26.214494]  kunit_try_run_case+0x1b2/0x490
[   26.215032]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.215531]  kthread+0x323/0x710
[   26.215950]  ret_from_fork+0x41/0x80
[   26.216397]  ret_from_fork_asm+0x1a/0x30
[   26.216851] 
[   26.217064] The buggy address belongs to the object at ffff888103231c00
[   26.217064]  which belongs to the cache kmalloc-64 of size 64
[   26.217978] The buggy address is located 0 bytes to the right of
[   26.217978]  allocated 48-byte region [ffff888103231c00, ffff888103231c30)
[   26.218906] 
[   26.219161] The buggy address belongs to the physical page:
[   26.219746] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103231
[   26.220432] flags: 0x200000000000000(node=0|zone=2)
[   26.220944] page_type: f5(slab)
[   26.221380] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   26.222033] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   26.222533] page dumped because: kasan: bad access detected
[   26.223150] 
[   26.223382] Memory state around the buggy address:
[   26.223821]  ffff888103231b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.224536]  ffff888103231b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.225088] >ffff888103231c00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   26.225780]                                      ^
[   26.226177]  ffff888103231c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.226909]  ffff888103231d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.227528] ==================================================================
[   28.424972] ==================================================================
[   28.425646] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x20c8/0x5450
[   28.426388] Write of size 8 at addr ffff888103231c30 by task kunit_try_catch/286
[   28.427089] 
[   28.427392] CPU: 1 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G    B            N  6.14.0-rc7-next-20250319 #1 PREEMPT(voluntary) 
[   28.427601] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.427665] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   28.427767] Call Trace:
[   28.427810]  <TASK>
[   28.427849]  dump_stack_lvl+0x73/0xb0
[   28.427942]  print_report+0xd1/0x660
[   28.428010]  ? __virt_addr_valid+0x1db/0x2d0
[   28.428156]  ? kasan_complete_mode_report_info+0x2a/0x200
[   28.428295]  kasan_report+0x104/0x140
[   28.428446]  ? kasan_atomics_helper+0x20c8/0x5450
[   28.428562]  ? kasan_atomics_helper+0x20c8/0x5450
[   28.428654]  kasan_check_range+0x10c/0x1c0
[   28.428773]  __kasan_check_write+0x18/0x20
[   28.428849]  kasan_atomics_helper+0x20c8/0x5450
[   28.428914]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   28.428981]  ? kasan_save_alloc_info+0x3b/0x50
[   28.429140]  kasan_atomics+0x1dc/0x310
[   28.429235]  ? __pfx_kasan_atomics+0x10/0x10
[   28.429311]  ? __pfx_read_tsc+0x10/0x10
[   28.429376]  ? ktime_get_ts64+0x86/0x240
[   28.429502]  kunit_try_run_case+0x1b2/0x490
[   28.429617]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.429687]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   28.429804]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   28.429960]  ? __kthread_parkme+0x82/0x160
[   28.430039]  ? preempt_count_sub+0x50/0x80
[   28.430150]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.430284]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.430393]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   28.430464]  kthread+0x323/0x710
[   28.430524]  ? trace_preempt_on+0x20/0xc0
[   28.430593]  ? __pfx_kthread+0x10/0x10
[   28.430769]  ? _raw_spin_unlock_irq+0x47/0x80
[   28.430930]  ? calculate_sigpending+0x7b/0xa0
[   28.431006]  ? __pfx_kthread+0x10/0x10
[   28.431078]  ret_from_fork+0x41/0x80
[   28.431171]  ? __pfx_kthread+0x10/0x10
[   28.431239]  ret_from_fork_asm+0x1a/0x30
[   28.431293]  </TASK>
[   28.431313] 
[   28.445241] Allocated by task 286:
[   28.445695]  kasan_save_stack+0x3d/0x60
[   28.446267]  kasan_save_track+0x18/0x40
[   28.446739]  kasan_save_alloc_info+0x3b/0x50
[   28.447309]  __kasan_kmalloc+0xb7/0xc0
[   28.447801]  __kmalloc_cache_noprof+0x183/0x410
[   28.448236]  kasan_atomics+0x95/0x310
[   28.448635]  kunit_try_run_case+0x1b2/0x490
[   28.449175]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.449751]  kthread+0x323/0x710
[   28.450160]  ret_from_fork+0x41/0x80
[   28.450573]  ret_from_fork_asm+0x1a/0x30
[   28.451029] 
[   28.451281] The buggy address belongs to the object at ffff888103231c00
[   28.451281]  which belongs to the cache kmalloc-64 of size 64
[   28.452368] The buggy address is located 0 bytes to the right of
[   28.452368]  allocated 48-byte region [ffff888103231c00, ffff888103231c30)
[   28.453283] 
[   28.453580] The buggy address belongs to the physical page:
[   28.454258] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103231
[   28.455040] flags: 0x200000000000000(node=0|zone=2)
[   28.455530] page_type: f5(slab)
[   28.456031] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   28.456767] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   28.457234] page dumped because: kasan: bad access detected
[   28.457554] 
[   28.457732] Memory state around the buggy address:
[   28.458023]  ffff888103231b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.458688]  ffff888103231b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.459576] >ffff888103231c00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   28.460333]                                      ^
[   28.460867]  ffff888103231c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.461607]  ffff888103231d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.462251] ==================================================================
[   28.328614] ==================================================================
[   28.329350] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x2006/0x5450
[   28.329776] Write of size 8 at addr ffff888103231c30 by task kunit_try_catch/286
[   28.330489] 
[   28.330798] CPU: 1 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G    B            N  6.14.0-rc7-next-20250319 #1 PREEMPT(voluntary) 
[   28.330983] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.331022] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   28.331081] Call Trace:
[   28.331138]  <TASK>
[   28.331178]  dump_stack_lvl+0x73/0xb0
[   28.331301]  print_report+0xd1/0x660
[   28.331381]  ? __virt_addr_valid+0x1db/0x2d0
[   28.331501]  ? kasan_complete_mode_report_info+0x2a/0x200
[   28.331577]  kasan_report+0x104/0x140
[   28.331671]  ? kasan_atomics_helper+0x2006/0x5450
[   28.331796]  ? kasan_atomics_helper+0x2006/0x5450
[   28.331891]  kasan_check_range+0x10c/0x1c0
[   28.331979]  __kasan_check_write+0x18/0x20
[   28.332037]  kasan_atomics_helper+0x2006/0x5450
[   28.332128]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   28.332205]  ? kasan_save_alloc_info+0x3b/0x50
[   28.332293]  kasan_atomics+0x1dc/0x310
[   28.332369]  ? __pfx_kasan_atomics+0x10/0x10
[   28.332447]  ? __pfx_read_tsc+0x10/0x10
[   28.332513]  ? ktime_get_ts64+0x86/0x240
[   28.332592]  kunit_try_run_case+0x1b2/0x490
[   28.332667]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.332786]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   28.332864]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   28.332933]  ? __kthread_parkme+0x82/0x160
[   28.333004]  ? preempt_count_sub+0x50/0x80
[   28.333083]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.333200]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.333306]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   28.333382]  kthread+0x323/0x710
[   28.333446]  ? trace_preempt_on+0x20/0xc0
[   28.333517]  ? __pfx_kthread+0x10/0x10
[   28.333585]  ? _raw_spin_unlock_irq+0x47/0x80
[   28.333648]  ? calculate_sigpending+0x7b/0xa0
[   28.333760]  ? __pfx_kthread+0x10/0x10
[   28.333840]  ret_from_fork+0x41/0x80
[   28.333912]  ? __pfx_kthread+0x10/0x10
[   28.333981]  ret_from_fork_asm+0x1a/0x30
[   28.334077]  </TASK>
[   28.334132] 
[   28.347405] Allocated by task 286:
[   28.347780]  kasan_save_stack+0x3d/0x60
[   28.348289]  kasan_save_track+0x18/0x40
[   28.348747]  kasan_save_alloc_info+0x3b/0x50
[   28.349138]  __kasan_kmalloc+0xb7/0xc0
[   28.349519]  __kmalloc_cache_noprof+0x183/0x410
[   28.350066]  kasan_atomics+0x95/0x310
[   28.350428]  kunit_try_run_case+0x1b2/0x490
[   28.350774]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.351398]  kthread+0x323/0x710
[   28.351833]  ret_from_fork+0x41/0x80
[   28.352280]  ret_from_fork_asm+0x1a/0x30
[   28.352704] 
[   28.352905] The buggy address belongs to the object at ffff888103231c00
[   28.352905]  which belongs to the cache kmalloc-64 of size 64
[   28.353680] The buggy address is located 0 bytes to the right of
[   28.353680]  allocated 48-byte region [ffff888103231c00, ffff888103231c30)
[   28.354546] 
[   28.354846] The buggy address belongs to the physical page:
[   28.355407] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103231
[   28.356287] flags: 0x200000000000000(node=0|zone=2)
[   28.357074] page_type: f5(slab)
[   28.358321] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   28.359376] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   28.361575] page dumped because: kasan: bad access detected
[   28.362259] 
[   28.364283] Memory state around the buggy address:
[   28.364641]  ffff888103231b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.365409]  ffff888103231b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.367250] >ffff888103231c00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   28.369015]                                      ^
[   28.369460]  ffff888103231c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.371046]  ffff888103231d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.372030] ==================================================================
[   28.292311] ==================================================================
[   28.293102] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4f71/0x5450
[   28.293807] Read of size 8 at addr ffff888103231c30 by task kunit_try_catch/286
[   28.294342] 
[   28.294532] CPU: 1 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G    B            N  6.14.0-rc7-next-20250319 #1 PREEMPT(voluntary) 
[   28.294662] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.294696] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   28.294759] Call Trace:
[   28.294793]  <TASK>
[   28.294831]  dump_stack_lvl+0x73/0xb0
[   28.294908]  print_report+0xd1/0x660
[   28.295004]  ? __virt_addr_valid+0x1db/0x2d0
[   28.295159]  ? kasan_complete_mode_report_info+0x2a/0x200
[   28.295244]  kasan_report+0x104/0x140
[   28.295306]  ? kasan_atomics_helper+0x4f71/0x5450
[   28.295379]  ? kasan_atomics_helper+0x4f71/0x5450
[   28.295462]  __asan_report_load8_noabort+0x18/0x20
[   28.295528]  kasan_atomics_helper+0x4f71/0x5450
[   28.295630]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   28.295711]  ? kasan_save_alloc_info+0x3b/0x50
[   28.295809]  kasan_atomics+0x1dc/0x310
[   28.295886]  ? __pfx_kasan_atomics+0x10/0x10
[   28.295975]  ? __pfx_read_tsc+0x10/0x10
[   28.296042]  ? ktime_get_ts64+0x86/0x240
[   28.296142]  kunit_try_run_case+0x1b2/0x490
[   28.296221]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.296290]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   28.296359]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   28.296429]  ? __kthread_parkme+0x82/0x160
[   28.296497]  ? preempt_count_sub+0x50/0x80
[   28.296572]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.296646]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.296721]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   28.296795]  kthread+0x323/0x710
[   28.296861]  ? trace_preempt_on+0x20/0xc0
[   28.296930]  ? __pfx_kthread+0x10/0x10
[   28.296999]  ? _raw_spin_unlock_irq+0x47/0x80
[   28.297061]  ? calculate_sigpending+0x7b/0xa0
[   28.297167]  ? __pfx_kthread+0x10/0x10
[   28.297243]  ret_from_fork+0x41/0x80
[   28.297316]  ? __pfx_kthread+0x10/0x10
[   28.297381]  ret_from_fork_asm+0x1a/0x30
[   28.297478]  </TASK>
[   28.297511] 
[   28.310577] Allocated by task 286:
[   28.310909]  kasan_save_stack+0x3d/0x60
[   28.311501]  kasan_save_track+0x18/0x40
[   28.312182]  kasan_save_alloc_info+0x3b/0x50
[   28.312649]  __kasan_kmalloc+0xb7/0xc0
[   28.313094]  __kmalloc_cache_noprof+0x183/0x410
[   28.313475]  kasan_atomics+0x95/0x310
[   28.314062]  kunit_try_run_case+0x1b2/0x490
[   28.314422]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.314761]  kthread+0x323/0x710
[   28.315015]  ret_from_fork+0x41/0x80
[   28.315443]  ret_from_fork_asm+0x1a/0x30
[   28.315970] 
[   28.316323] The buggy address belongs to the object at ffff888103231c00
[   28.316323]  which belongs to the cache kmalloc-64 of size 64
[   28.317700] The buggy address is located 0 bytes to the right of
[   28.317700]  allocated 48-byte region [ffff888103231c00, ffff888103231c30)
[   28.318470] 
[   28.318637] The buggy address belongs to the physical page:
[   28.318942] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103231
[   28.319725] flags: 0x200000000000000(node=0|zone=2)
[   28.320289] page_type: f5(slab)
[   28.320810] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   28.321542] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   28.322445] page dumped because: kasan: bad access detected
[   28.322769] 
[   28.322926] Memory state around the buggy address:
[   28.323457]  ffff888103231b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.324406]  ffff888103231b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.324840] >ffff888103231c00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   28.325520]                                      ^
[   28.326066]  ffff888103231c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.326671]  ffff888103231d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.327318] ==================================================================
[   26.319192] ==================================================================
[   26.320081] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x72f/0x5450
[   26.321221] Write of size 4 at addr ffff888103231c30 by task kunit_try_catch/286
[   26.323417] 
[   26.323635] CPU: 1 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G    B            N  6.14.0-rc7-next-20250319 #1 PREEMPT(voluntary) 
[   26.325282] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.325334] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   26.325400] Call Trace:
[   26.325437]  <TASK>
[   26.325476]  dump_stack_lvl+0x73/0xb0
[   26.325557]  print_report+0xd1/0x660
[   26.325629]  ? __virt_addr_valid+0x1db/0x2d0
[   26.326192]  ? kasan_complete_mode_report_info+0x2a/0x200
[   26.326284]  kasan_report+0x104/0x140
[   26.326322]  ? kasan_atomics_helper+0x72f/0x5450
[   26.326359]  ? kasan_atomics_helper+0x72f/0x5450
[   26.326402]  kasan_check_range+0x10c/0x1c0
[   26.326440]  __kasan_check_write+0x18/0x20
[   26.326472]  kasan_atomics_helper+0x72f/0x5450
[   26.326509]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   26.326546]  ? kasan_save_alloc_info+0x3b/0x50
[   26.326591]  kasan_atomics+0x1dc/0x310
[   26.326627]  ? __pfx_kasan_atomics+0x10/0x10
[   26.326664]  ? __pfx_read_tsc+0x10/0x10
[   26.326698]  ? ktime_get_ts64+0x86/0x240
[   26.327314]  kunit_try_run_case+0x1b2/0x490
[   26.327401]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.327467]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   26.327531]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   26.327624]  ? __kthread_parkme+0x82/0x160
[   26.327690]  ? preempt_count_sub+0x50/0x80
[   26.327767]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.327838]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.327910]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   26.327990]  kthread+0x323/0x710
[   26.328050]  ? trace_preempt_on+0x20/0xc0
[   26.328144]  ? __pfx_kthread+0x10/0x10
[   26.328212]  ? _raw_spin_unlock_irq+0x47/0x80
[   26.328274]  ? calculate_sigpending+0x7b/0xa0
[   26.328335]  ? __pfx_kthread+0x10/0x10
[   26.328398]  ret_from_fork+0x41/0x80
[   26.328463]  ? __pfx_kthread+0x10/0x10
[   26.328525]  ret_from_fork_asm+0x1a/0x30
[   26.328619]  </TASK>
[   26.328650] 
[   26.348425] Allocated by task 286:
[   26.348745]  kasan_save_stack+0x3d/0x60
[   26.349400]  kasan_save_track+0x18/0x40
[   26.349789]  kasan_save_alloc_info+0x3b/0x50
[   26.350238]  __kasan_kmalloc+0xb7/0xc0
[   26.351020]  __kmalloc_cache_noprof+0x183/0x410
[   26.351417]  kasan_atomics+0x95/0x310
[   26.352042]  kunit_try_run_case+0x1b2/0x490
[   26.352757]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.353192]  kthread+0x323/0x710
[   26.353584]  ret_from_fork+0x41/0x80
[   26.354331]  ret_from_fork_asm+0x1a/0x30
[   26.354656] 
[   26.355051] The buggy address belongs to the object at ffff888103231c00
[   26.355051]  which belongs to the cache kmalloc-64 of size 64
[   26.356201] The buggy address is located 0 bytes to the right of
[   26.356201]  allocated 48-byte region [ffff888103231c00, ffff888103231c30)
[   26.357292] 
[   26.357524] The buggy address belongs to the physical page:
[   26.357882] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103231
[   26.358670] flags: 0x200000000000000(node=0|zone=2)
[   26.359212] page_type: f5(slab)
[   26.359459] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   26.360098] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   26.361209] page dumped because: kasan: bad access detected
[   26.361823] 
[   26.362194] Memory state around the buggy address:
[   26.362615]  ffff888103231b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.363362]  ffff888103231b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.364091] >ffff888103231c00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   26.364891]                                      ^
[   26.365391]  ffff888103231c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.366034]  ffff888103231d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.366859] ==================================================================
[   26.779051] ==================================================================
[   26.779598] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xde0/0x5450
[   26.780594] Write of size 4 at addr ffff888103231c30 by task kunit_try_catch/286
[   26.781308] 
[   26.781555] CPU: 1 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G    B            N  6.14.0-rc7-next-20250319 #1 PREEMPT(voluntary) 
[   26.781686] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.781727] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   26.781827] Call Trace:
[   26.781867]  <TASK>
[   26.781901]  dump_stack_lvl+0x73/0xb0
[   26.781980]  print_report+0xd1/0x660
[   26.782046]  ? __virt_addr_valid+0x1db/0x2d0
[   26.782196]  ? kasan_complete_mode_report_info+0x2a/0x200
[   26.782277]  kasan_report+0x104/0x140
[   26.782341]  ? kasan_atomics_helper+0xde0/0x5450
[   26.782414]  ? kasan_atomics_helper+0xde0/0x5450
[   26.782495]  kasan_check_range+0x10c/0x1c0
[   26.782539]  __kasan_check_write+0x18/0x20
[   26.782572]  kasan_atomics_helper+0xde0/0x5450
[   26.782609]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   26.782646]  ? kasan_save_alloc_info+0x3b/0x50
[   26.782691]  kasan_atomics+0x1dc/0x310
[   26.782759]  ? __pfx_kasan_atomics+0x10/0x10
[   26.782801]  ? __pfx_read_tsc+0x10/0x10
[   26.782836]  ? ktime_get_ts64+0x86/0x240
[   26.782876]  kunit_try_run_case+0x1b2/0x490
[   26.782912]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.782946]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   26.782979]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   26.783014]  ? __kthread_parkme+0x82/0x160
[   26.783047]  ? preempt_count_sub+0x50/0x80
[   26.783086]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.783145]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.783181]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   26.783217]  kthread+0x323/0x710
[   26.783261]  ? trace_preempt_on+0x20/0xc0
[   26.783319]  ? __pfx_kthread+0x10/0x10
[   26.783370]  ? _raw_spin_unlock_irq+0x47/0x80
[   26.783424]  ? calculate_sigpending+0x7b/0xa0
[   26.783481]  ? __pfx_kthread+0x10/0x10
[   26.783539]  ret_from_fork+0x41/0x80
[   26.783626]  ? __pfx_kthread+0x10/0x10
[   26.783687]  ret_from_fork_asm+0x1a/0x30
[   26.783790]  </TASK>
[   26.783820] 
[   26.797958] Allocated by task 286:
[   26.798347]  kasan_save_stack+0x3d/0x60
[   26.798819]  kasan_save_track+0x18/0x40
[   26.799189]  kasan_save_alloc_info+0x3b/0x50
[   26.799523]  __kasan_kmalloc+0xb7/0xc0
[   26.800039]  __kmalloc_cache_noprof+0x183/0x410
[   26.800387]  kasan_atomics+0x95/0x310
[   26.800666]  kunit_try_run_case+0x1b2/0x490
[   26.801099]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.801647]  kthread+0x323/0x710
[   26.802075]  ret_from_fork+0x41/0x80
[   26.802460]  ret_from_fork_asm+0x1a/0x30
[   26.802892] 
[   26.803060] The buggy address belongs to the object at ffff888103231c00
[   26.803060]  which belongs to the cache kmalloc-64 of size 64
[   26.804172] The buggy address is located 0 bytes to the right of
[   26.804172]  allocated 48-byte region [ffff888103231c00, ffff888103231c30)
[   26.804961] 
[   26.805202] The buggy address belongs to the physical page:
[   26.805749] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103231
[   26.806210] flags: 0x200000000000000(node=0|zone=2)
[   26.806737] page_type: f5(slab)
[   26.807131] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   26.807685] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   26.808287] page dumped because: kasan: bad access detected
[   26.808652] 
[   26.808868] Memory state around the buggy address:
[   26.809183]  ffff888103231b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.809567]  ffff888103231b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.810004] >ffff888103231c00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   26.810647]                                      ^
[   26.811155]  ffff888103231c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.811875]  ffff888103231d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.812532] ==================================================================
[   26.938739] ==================================================================
[   26.939591] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a36/0x5450
[   26.940437] Read of size 4 at addr ffff888103231c30 by task kunit_try_catch/286
[   26.941625] 
[   26.941847] CPU: 1 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G    B            N  6.14.0-rc7-next-20250319 #1 PREEMPT(voluntary) 
[   26.941976] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.942015] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   26.942073] Call Trace:
[   26.942107]  <TASK>
[   26.942328]  dump_stack_lvl+0x73/0xb0
[   26.942580]  print_report+0xd1/0x660
[   26.942680]  ? __virt_addr_valid+0x1db/0x2d0
[   26.943020]  ? kasan_complete_mode_report_info+0x2a/0x200
[   26.943067]  kasan_report+0x104/0x140
[   26.943102]  ? kasan_atomics_helper+0x4a36/0x5450
[   26.943186]  ? kasan_atomics_helper+0x4a36/0x5450
[   26.943233]  __asan_report_load4_noabort+0x18/0x20
[   26.943267]  kasan_atomics_helper+0x4a36/0x5450
[   26.943304]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   26.943341]  ? kasan_save_alloc_info+0x3b/0x50
[   26.943387]  kasan_atomics+0x1dc/0x310
[   26.943422]  ? __pfx_kasan_atomics+0x10/0x10
[   26.943507]  ? __pfx_read_tsc+0x10/0x10
[   26.943544]  ? ktime_get_ts64+0x86/0x240
[   26.943592]  kunit_try_run_case+0x1b2/0x490
[   26.943649]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.943684]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   26.943779]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   26.943856]  ? __kthread_parkme+0x82/0x160
[   26.943898]  ? preempt_count_sub+0x50/0x80
[   26.943952]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.943989]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.944026]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   26.944063]  kthread+0x323/0x710
[   26.944094]  ? trace_preempt_on+0x20/0xc0
[   26.944154]  ? __pfx_kthread+0x10/0x10
[   26.944188]  ? _raw_spin_unlock_irq+0x47/0x80
[   26.944219]  ? calculate_sigpending+0x7b/0xa0
[   26.944252]  ? __pfx_kthread+0x10/0x10
[   26.944287]  ret_from_fork+0x41/0x80
[   26.944321]  ? __pfx_kthread+0x10/0x10
[   26.944354]  ret_from_fork_asm+0x1a/0x30
[   26.944402]  </TASK>
[   26.944420] 
[   26.960039] Allocated by task 286:
[   26.960448]  kasan_save_stack+0x3d/0x60
[   26.961101]  kasan_save_track+0x18/0x40
[   26.961496]  kasan_save_alloc_info+0x3b/0x50
[   26.961808]  __kasan_kmalloc+0xb7/0xc0
[   26.962080]  __kmalloc_cache_noprof+0x183/0x410
[   26.962810]  kasan_atomics+0x95/0x310
[   26.963379]  kunit_try_run_case+0x1b2/0x490
[   26.963982]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.964607]  kthread+0x323/0x710
[   26.965099]  ret_from_fork+0x41/0x80
[   26.965493]  ret_from_fork_asm+0x1a/0x30
[   26.966190] 
[   26.966381] The buggy address belongs to the object at ffff888103231c00
[   26.966381]  which belongs to the cache kmalloc-64 of size 64
[   26.967666] The buggy address is located 0 bytes to the right of
[   26.967666]  allocated 48-byte region [ffff888103231c00, ffff888103231c30)
[   26.968380] 
[   26.968629] The buggy address belongs to the physical page:
[   26.969037] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103231
[   26.969760] flags: 0x200000000000000(node=0|zone=2)
[   26.970358] page_type: f5(slab)
[   26.970730] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   26.971706] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   26.972544] page dumped because: kasan: bad access detected
[   26.973251] 
[   26.973553] Memory state around the buggy address:
[   26.974195]  ffff888103231b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.974741]  ffff888103231b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.975384] >ffff888103231c00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   26.975798]                                      ^
[   26.976101]  ffff888103231c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.976927]  ffff888103231d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.977733] ==================================================================
[   26.110250] ==================================================================
[   26.111175] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a0/0x5450
[   26.112137] Write of size 4 at addr ffff888103231c30 by task kunit_try_catch/286
[   26.113465] 
[   26.113964] CPU: 1 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G    B            N  6.14.0-rc7-next-20250319 #1 PREEMPT(voluntary) 
[   26.114141] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.114185] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   26.114221] Call Trace:
[   26.114244]  <TASK>
[   26.114266]  dump_stack_lvl+0x73/0xb0
[   26.114312]  print_report+0xd1/0x660
[   26.114348]  ? __virt_addr_valid+0x1db/0x2d0
[   26.114415]  ? kasan_complete_mode_report_info+0x2a/0x200
[   26.114453]  kasan_report+0x104/0x140
[   26.114485]  ? kasan_atomics_helper+0x4a0/0x5450
[   26.114520]  ? kasan_atomics_helper+0x4a0/0x5450
[   26.114564]  kasan_check_range+0x10c/0x1c0
[   26.114600]  __kasan_check_write+0x18/0x20
[   26.114631]  kasan_atomics_helper+0x4a0/0x5450
[   26.114666]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   26.114707]  ? kasan_save_alloc_info+0x3b/0x50
[   26.114815]  kasan_atomics+0x1dc/0x310
[   26.114858]  ? __pfx_kasan_atomics+0x10/0x10
[   26.114896]  ? __pfx_read_tsc+0x10/0x10
[   26.114931]  ? ktime_get_ts64+0x86/0x240
[   26.114970]  kunit_try_run_case+0x1b2/0x490
[   26.115007]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.115041]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   26.115075]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   26.115131]  ? __kthread_parkme+0x82/0x160
[   26.115166]  ? preempt_count_sub+0x50/0x80
[   26.115206]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.115241]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.115277]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   26.115314]  kthread+0x323/0x710
[   26.115345]  ? trace_preempt_on+0x20/0xc0
[   26.115380]  ? __pfx_kthread+0x10/0x10
[   26.115414]  ? _raw_spin_unlock_irq+0x47/0x80
[   26.115446]  ? calculate_sigpending+0x7b/0xa0
[   26.115479]  ? __pfx_kthread+0x10/0x10
[   26.115513]  ret_from_fork+0x41/0x80
[   26.115547]  ? __pfx_kthread+0x10/0x10
[   26.115580]  ret_from_fork_asm+0x1a/0x30
[   26.115660]  </TASK>
[   26.115677] 
[   26.130158] Allocated by task 286:
[   26.130561]  kasan_save_stack+0x3d/0x60
[   26.131077]  kasan_save_track+0x18/0x40
[   26.131570]  kasan_save_alloc_info+0x3b/0x50
[   26.132096]  __kasan_kmalloc+0xb7/0xc0
[   26.132535]  __kmalloc_cache_noprof+0x183/0x410
[   26.132911]  kasan_atomics+0x95/0x310
[   26.133350]  kunit_try_run_case+0x1b2/0x490
[   26.133698]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.134267]  kthread+0x323/0x710
[   26.134772]  ret_from_fork+0x41/0x80
[   26.135216]  ret_from_fork_asm+0x1a/0x30
[   26.135680] 
[   26.135896] The buggy address belongs to the object at ffff888103231c00
[   26.135896]  which belongs to the cache kmalloc-64 of size 64
[   26.136923] The buggy address is located 0 bytes to the right of
[   26.136923]  allocated 48-byte region [ffff888103231c00, ffff888103231c30)
[   26.137749] 
[   26.137923] The buggy address belongs to the physical page:
[   26.138325] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103231
[   26.139128] flags: 0x200000000000000(node=0|zone=2)
[   26.139671] page_type: f5(slab)
[   26.140154] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   26.140876] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   26.141421] page dumped because: kasan: bad access detected
[   26.142016] 
[   26.142272] Memory state around the buggy address:
[   26.142740]  ffff888103231b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.143204]  ffff888103231b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.144397] >ffff888103231c00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   26.146091]                                      ^
[   26.147466]  ffff888103231c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.148312]  ffff888103231d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.149757] ==================================================================
[   27.496239] ==================================================================
[   27.496989] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x151d/0x5450
[   27.497677] Write of size 8 at addr ffff888103231c30 by task kunit_try_catch/286
[   27.498398] 
[   27.498657] CPU: 1 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G    B            N  6.14.0-rc7-next-20250319 #1 PREEMPT(voluntary) 
[   27.498826] Tainted: [B]=BAD_PAGE, [N]=TEST
[   27.498868] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   27.498929] Call Trace:
[   27.498964]  <TASK>
[   27.499003]  dump_stack_lvl+0x73/0xb0
[   27.499081]  print_report+0xd1/0x660
[   27.499178]  ? __virt_addr_valid+0x1db/0x2d0
[   27.499308]  ? kasan_complete_mode_report_info+0x2a/0x200
[   27.499382]  kasan_report+0x104/0x140
[   27.499441]  ? kasan_atomics_helper+0x151d/0x5450
[   27.499512]  ? kasan_atomics_helper+0x151d/0x5450
[   27.499618]  kasan_check_range+0x10c/0x1c0
[   27.499696]  __kasan_check_write+0x18/0x20
[   27.499820]  kasan_atomics_helper+0x151d/0x5450
[   27.499900]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   27.499986]  ? kasan_save_alloc_info+0x3b/0x50
[   27.500063]  kasan_atomics+0x1dc/0x310
[   27.500155]  ? __pfx_kasan_atomics+0x10/0x10
[   27.500233]  ? __pfx_read_tsc+0x10/0x10
[   27.500298]  ? ktime_get_ts64+0x86/0x240
[   27.500376]  kunit_try_run_case+0x1b2/0x490
[   27.500451]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.500520]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   27.500590]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   27.500661]  ? __kthread_parkme+0x82/0x160
[   27.500784]  ? preempt_count_sub+0x50/0x80
[   27.500910]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.500989]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.501059]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   27.502270]  kthread+0x323/0x710
[   27.502366]  ? trace_preempt_on+0x20/0xc0
[   27.502438]  ? __pfx_kthread+0x10/0x10
[   27.502509]  ? _raw_spin_unlock_irq+0x47/0x80
[   27.502572]  ? calculate_sigpending+0x7b/0xa0
[   27.502639]  ? __pfx_kthread+0x10/0x10
[   27.502752]  ret_from_fork+0x41/0x80
[   27.502836]  ? __pfx_kthread+0x10/0x10
[   27.502906]  ret_from_fork_asm+0x1a/0x30
[   27.503000]  </TASK>
[   27.503036] 
[   27.521334] Allocated by task 286:
[   27.521698]  kasan_save_stack+0x3d/0x60
[   27.522588]  kasan_save_track+0x18/0x40
[   27.522970]  kasan_save_alloc_info+0x3b/0x50
[   27.523398]  __kasan_kmalloc+0xb7/0xc0
[   27.524138]  __kmalloc_cache_noprof+0x183/0x410
[   27.524677]  kasan_atomics+0x95/0x310
[   27.525222]  kunit_try_run_case+0x1b2/0x490
[   27.525571]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.526299]  kthread+0x323/0x710
[   27.526523]  ret_from_fork+0x41/0x80
[   27.526684]  ret_from_fork_asm+0x1a/0x30
[   27.527060] 
[   27.527342] The buggy address belongs to the object at ffff888103231c00
[   27.527342]  which belongs to the cache kmalloc-64 of size 64
[   27.528600] The buggy address is located 0 bytes to the right of
[   27.528600]  allocated 48-byte region [ffff888103231c00, ffff888103231c30)
[   27.529274] 
[   27.529544] The buggy address belongs to the physical page:
[   27.529972] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103231
[   27.530420] flags: 0x200000000000000(node=0|zone=2)
[   27.530891] page_type: f5(slab)
[   27.531419] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   27.532347] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   27.532848] page dumped because: kasan: bad access detected
[   27.533366] 
[   27.533527] Memory state around the buggy address:
[   27.533809]  ffff888103231b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.534268]  ffff888103231b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.534957] >ffff888103231c00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   27.535962]                                      ^
[   27.536364]  ffff888103231c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.536749]  ffff888103231d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.537409] ==================================================================
[   28.214002] ==================================================================
[   28.214822] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1eaa/0x5450
[   28.215753] Write of size 8 at addr ffff888103231c30 by task kunit_try_catch/286
[   28.216624] 
[   28.216974] CPU: 1 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G    B            N  6.14.0-rc7-next-20250319 #1 PREEMPT(voluntary) 
[   28.217107] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.217282] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   28.217361] Call Trace:
[   28.217395]  <TASK>
[   28.217433]  dump_stack_lvl+0x73/0xb0
[   28.217509]  print_report+0xd1/0x660
[   28.217570]  ? __virt_addr_valid+0x1db/0x2d0
[   28.217884]  ? kasan_complete_mode_report_info+0x2a/0x200
[   28.217993]  kasan_report+0x104/0x140
[   28.218060]  ? kasan_atomics_helper+0x1eaa/0x5450
[   28.218159]  ? kasan_atomics_helper+0x1eaa/0x5450
[   28.218249]  kasan_check_range+0x10c/0x1c0
[   28.218326]  __kasan_check_write+0x18/0x20
[   28.218389]  kasan_atomics_helper+0x1eaa/0x5450
[   28.218462]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   28.218534]  ? kasan_save_alloc_info+0x3b/0x50
[   28.218624]  kasan_atomics+0x1dc/0x310
[   28.218695]  ? __pfx_kasan_atomics+0x10/0x10
[   28.218832]  ? __pfx_read_tsc+0x10/0x10
[   28.218897]  ? ktime_get_ts64+0x86/0x240
[   28.218964]  kunit_try_run_case+0x1b2/0x490
[   28.219035]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.219218]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   28.219454]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   28.219666]  ? __kthread_parkme+0x82/0x160
[   28.219979]  ? preempt_count_sub+0x50/0x80
[   28.220187]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.220274]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.220349]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   28.220420]  kthread+0x323/0x710
[   28.220488]  ? trace_preempt_on+0x20/0xc0
[   28.220558]  ? __pfx_kthread+0x10/0x10
[   28.220623]  ? _raw_spin_unlock_irq+0x47/0x80
[   28.220687]  ? calculate_sigpending+0x7b/0xa0
[   28.220814]  ? __pfx_kthread+0x10/0x10
[   28.220891]  ret_from_fork+0x41/0x80
[   28.220961]  ? __pfx_kthread+0x10/0x10
[   28.221029]  ret_from_fork_asm+0x1a/0x30
[   28.221100]  </TASK>
[   28.221150] 
[   28.236416] Allocated by task 286:
[   28.236842]  kasan_save_stack+0x3d/0x60
[   28.237298]  kasan_save_track+0x18/0x40
[   28.237760]  kasan_save_alloc_info+0x3b/0x50
[   28.238423]  __kasan_kmalloc+0xb7/0xc0
[   28.238818]  __kmalloc_cache_noprof+0x183/0x410
[   28.239143]  kasan_atomics+0x95/0x310
[   28.239419]  kunit_try_run_case+0x1b2/0x490
[   28.240296]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.240945]  kthread+0x323/0x710
[   28.241541]  ret_from_fork+0x41/0x80
[   28.242326]  ret_from_fork_asm+0x1a/0x30
[   28.242818] 
[   28.243050] The buggy address belongs to the object at ffff888103231c00
[   28.243050]  which belongs to the cache kmalloc-64 of size 64
[   28.244266] The buggy address is located 0 bytes to the right of
[   28.244266]  allocated 48-byte region [ffff888103231c00, ffff888103231c30)
[   28.245516] 
[   28.246034] The buggy address belongs to the physical page:
[   28.246781] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103231
[   28.247510] flags: 0x200000000000000(node=0|zone=2)
[   28.248086] page_type: f5(slab)
[   28.249424] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   28.250202] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   28.251407] page dumped because: kasan: bad access detected
[   28.251849] 
[   28.252136] Memory state around the buggy address:
[   28.252608]  ffff888103231b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.253296]  ffff888103231b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.253831] >ffff888103231c00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   28.254476]                                      ^
[   28.255018]  ffff888103231c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.255774]  ffff888103231d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.256287] ==================================================================
[   27.585012] ==================================================================
[   27.585528] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x164f/0x5450
[   27.587794] Write of size 8 at addr ffff888103231c30 by task kunit_try_catch/286
[   27.588670] 
[   27.589018] CPU: 1 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G    B            N  6.14.0-rc7-next-20250319 #1 PREEMPT(voluntary) 
[   27.589175] Tainted: [B]=BAD_PAGE, [N]=TEST
[   27.589214] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   27.589531] Call Trace:
[   27.589569]  <TASK>
[   27.589593]  dump_stack_lvl+0x73/0xb0
[   27.589641]  print_report+0xd1/0x660
[   27.589676]  ? __virt_addr_valid+0x1db/0x2d0
[   27.589765]  ? kasan_complete_mode_report_info+0x2a/0x200
[   27.589806]  kasan_report+0x104/0x140
[   27.589838]  ? kasan_atomics_helper+0x164f/0x5450
[   27.589875]  ? kasan_atomics_helper+0x164f/0x5450
[   27.589918]  kasan_check_range+0x10c/0x1c0
[   27.589955]  __kasan_check_write+0x18/0x20
[   27.589986]  kasan_atomics_helper+0x164f/0x5450
[   27.590022]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   27.590058]  ? kasan_save_alloc_info+0x3b/0x50
[   27.590103]  kasan_atomics+0x1dc/0x310
[   27.590161]  ? __pfx_kasan_atomics+0x10/0x10
[   27.590199]  ? __pfx_read_tsc+0x10/0x10
[   27.590232]  ? ktime_get_ts64+0x86/0x240
[   27.590271]  kunit_try_run_case+0x1b2/0x490
[   27.590307]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.590340]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   27.590375]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   27.590408]  ? __kthread_parkme+0x82/0x160
[   27.590441]  ? preempt_count_sub+0x50/0x80
[   27.590478]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.590514]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.590549]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   27.590584]  kthread+0x323/0x710
[   27.590615]  ? trace_preempt_on+0x20/0xc0
[   27.590650]  ? __pfx_kthread+0x10/0x10
[   27.590683]  ? _raw_spin_unlock_irq+0x47/0x80
[   27.590744]  ? calculate_sigpending+0x7b/0xa0
[   27.590782]  ? __pfx_kthread+0x10/0x10
[   27.590817]  ret_from_fork+0x41/0x80
[   27.590881]  ? __pfx_kthread+0x10/0x10
[   27.590916]  ret_from_fork_asm+0x1a/0x30
[   27.590965]  </TASK>
[   27.590982] 
[   27.608800] Allocated by task 286:
[   27.609197]  kasan_save_stack+0x3d/0x60
[   27.609583]  kasan_save_track+0x18/0x40
[   27.609987]  kasan_save_alloc_info+0x3b/0x50
[   27.610456]  __kasan_kmalloc+0xb7/0xc0
[   27.610935]  __kmalloc_cache_noprof+0x183/0x410
[   27.611305]  kasan_atomics+0x95/0x310
[   27.611852]  kunit_try_run_case+0x1b2/0x490
[   27.612218]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.612783]  kthread+0x323/0x710
[   27.613058]  ret_from_fork+0x41/0x80
[   27.613408]  ret_from_fork_asm+0x1a/0x30
[   27.613929] 
[   27.614183] The buggy address belongs to the object at ffff888103231c00
[   27.614183]  which belongs to the cache kmalloc-64 of size 64
[   27.615074] The buggy address is located 0 bytes to the right of
[   27.615074]  allocated 48-byte region [ffff888103231c00, ffff888103231c30)
[   27.616149] 
[   27.616402] The buggy address belongs to the physical page:
[   27.616997] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103231
[   27.617620] flags: 0x200000000000000(node=0|zone=2)
[   27.618069] page_type: f5(slab)
[   27.618342] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   27.618937] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   27.619697] page dumped because: kasan: bad access detected
[   27.620327] 
[   27.620554] Memory state around the buggy address:
[   27.621045]  ffff888103231b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.621651]  ffff888103231b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.622222] >ffff888103231c00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   27.622914]                                      ^
[   27.623374]  ffff888103231c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.623974]  ffff888103231d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.624536] ==================================================================
[   26.852076] ==================================================================
[   26.853650] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf10/0x5450
[   26.854585] Write of size 4 at addr ffff888103231c30 by task kunit_try_catch/286
[   26.855430] 
[   26.855758] CPU: 1 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G    B            N  6.14.0-rc7-next-20250319 #1 PREEMPT(voluntary) 
[   26.855892] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.855939] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   26.855998] Call Trace:
[   26.856036]  <TASK>
[   26.856073]  dump_stack_lvl+0x73/0xb0
[   26.856188]  print_report+0xd1/0x660
[   26.856260]  ? __virt_addr_valid+0x1db/0x2d0
[   26.856384]  ? kasan_complete_mode_report_info+0x2a/0x200
[   26.856461]  kasan_report+0x104/0x140
[   26.856523]  ? kasan_atomics_helper+0xf10/0x5450
[   26.856595]  ? kasan_atomics_helper+0xf10/0x5450
[   26.856676]  kasan_check_range+0x10c/0x1c0
[   26.856783]  __kasan_check_write+0x18/0x20
[   26.856853]  kasan_atomics_helper+0xf10/0x5450
[   26.856927]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   26.856998]  ? kasan_save_alloc_info+0x3b/0x50
[   26.857079]  kasan_atomics+0x1dc/0x310
[   26.857177]  ? __pfx_kasan_atomics+0x10/0x10
[   26.857252]  ? __pfx_read_tsc+0x10/0x10
[   26.857318]  ? ktime_get_ts64+0x86/0x240
[   26.857390]  kunit_try_run_case+0x1b2/0x490
[   26.857461]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.857523]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   26.857586]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   26.857652]  ? __kthread_parkme+0x82/0x160
[   26.857721]  ? preempt_count_sub+0x50/0x80
[   26.857829]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.857882]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.857922]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   26.857959]  kthread+0x323/0x710
[   26.857993]  ? trace_preempt_on+0x20/0xc0
[   26.858029]  ? __pfx_kthread+0x10/0x10
[   26.858063]  ? _raw_spin_unlock_irq+0x47/0x80
[   26.858095]  ? calculate_sigpending+0x7b/0xa0
[   26.858153]  ? __pfx_kthread+0x10/0x10
[   26.858191]  ret_from_fork+0x41/0x80
[   26.858226]  ? __pfx_kthread+0x10/0x10
[   26.858260]  ret_from_fork_asm+0x1a/0x30
[   26.858309]  </TASK>
[   26.858326] 
[   26.883675] Allocated by task 286:
[   26.884173]  kasan_save_stack+0x3d/0x60
[   26.884660]  kasan_save_track+0x18/0x40
[   26.885219]  kasan_save_alloc_info+0x3b/0x50
[   26.885759]  __kasan_kmalloc+0xb7/0xc0
[   26.886285]  __kmalloc_cache_noprof+0x183/0x410
[   26.886856]  kasan_atomics+0x95/0x310
[   26.887343]  kunit_try_run_case+0x1b2/0x490
[   26.887795]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.888432]  kthread+0x323/0x710
[   26.888921]  ret_from_fork+0x41/0x80
[   26.889362]  ret_from_fork_asm+0x1a/0x30
[   26.889636] 
[   26.889806] The buggy address belongs to the object at ffff888103231c00
[   26.889806]  which belongs to the cache kmalloc-64 of size 64
[   26.890387] The buggy address is located 0 bytes to the right of
[   26.890387]  allocated 48-byte region [ffff888103231c00, ffff888103231c30)
[   26.891006] 
[   26.891196] The buggy address belongs to the physical page:
[   26.891505] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103231
[   26.892003] flags: 0x200000000000000(node=0|zone=2)
[   26.892340] page_type: f5(slab)
[   26.892582] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   26.893026] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   26.893438] page dumped because: kasan: bad access detected
[   26.893750] 
[   26.893909] Memory state around the buggy address:
[   26.894218]  ffff888103231b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.894551]  ffff888103231b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.894866] >ffff888103231c00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   26.895251]                                      ^
[   26.895547]  ffff888103231c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.896261]  ffff888103231d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.896636] ==================================================================
[   25.822158] ==================================================================
[   25.823701] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4bbc/0x5450
[   25.824870] Read of size 4 at addr ffff888103231c30 by task kunit_try_catch/286
[   25.825467] 
[   25.825921] CPU: 1 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G    B            N  6.14.0-rc7-next-20250319 #1 PREEMPT(voluntary) 
[   25.826063] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.826103] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   25.826189] Call Trace:
[   25.826225]  <TASK>
[   25.826321]  dump_stack_lvl+0x73/0xb0
[   25.826445]  print_report+0xd1/0x660
[   25.826522]  ? __virt_addr_valid+0x1db/0x2d0
[   25.826650]  ? kasan_complete_mode_report_info+0x2a/0x200
[   25.826724]  kasan_report+0x104/0x140
[   25.826785]  ? kasan_atomics_helper+0x4bbc/0x5450
[   25.826854]  ? kasan_atomics_helper+0x4bbc/0x5450
[   25.827166]  __asan_report_load4_noabort+0x18/0x20
[   25.827254]  kasan_atomics_helper+0x4bbc/0x5450
[   25.827314]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   25.827352]  ? kasan_save_alloc_info+0x3b/0x50
[   25.827396]  kasan_atomics+0x1dc/0x310
[   25.827432]  ? __pfx_kasan_atomics+0x10/0x10
[   25.827468]  ? __pfx_read_tsc+0x10/0x10
[   25.827498]  ? ktime_get_ts64+0x86/0x240
[   25.827536]  kunit_try_run_case+0x1b2/0x490
[   25.827575]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.827639]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   25.827671]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   25.827782]  ? __kthread_parkme+0x82/0x160
[   25.827872]  ? preempt_count_sub+0x50/0x80
[   25.827912]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.827950]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.827986]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   25.828032]  kthread+0x323/0x710
[   25.828062]  ? trace_preempt_on+0x20/0xc0
[   25.828098]  ? __pfx_kthread+0x10/0x10
[   25.828152]  ? _raw_spin_unlock_irq+0x47/0x80
[   25.828183]  ? calculate_sigpending+0x7b/0xa0
[   25.828215]  ? __pfx_kthread+0x10/0x10
[   25.828248]  ret_from_fork+0x41/0x80
[   25.828280]  ? __pfx_kthread+0x10/0x10
[   25.828313]  ret_from_fork_asm+0x1a/0x30
[   25.828362]  </TASK>
[   25.828379] 
[   25.846920] Allocated by task 286:
[   25.847343]  kasan_save_stack+0x3d/0x60
[   25.847659]  kasan_save_track+0x18/0x40
[   25.848294]  kasan_save_alloc_info+0x3b/0x50
[   25.848886]  __kasan_kmalloc+0xb7/0xc0
[   25.849447]  __kmalloc_cache_noprof+0x183/0x410
[   25.850177]  kasan_atomics+0x95/0x310
[   25.850765]  kunit_try_run_case+0x1b2/0x490
[   25.851480]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.852254]  kthread+0x323/0x710
[   25.852725]  ret_from_fork+0x41/0x80
[   25.853253]  ret_from_fork_asm+0x1a/0x30
[   25.853906] 
[   25.854199] The buggy address belongs to the object at ffff888103231c00
[   25.854199]  which belongs to the cache kmalloc-64 of size 64
[   25.855512] The buggy address is located 0 bytes to the right of
[   25.855512]  allocated 48-byte region [ffff888103231c00, ffff888103231c30)
[   25.856580] 
[   25.857157] The buggy address belongs to the physical page:
[   25.858095] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103231
[   25.858850] flags: 0x200000000000000(node=0|zone=2)
[   25.859531] page_type: f5(slab)
[   25.859971] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   25.861464] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   25.862052] page dumped because: kasan: bad access detected
[   25.862751] 
[   25.863131] Memory state around the buggy address:
[   25.863675]  ffff888103231b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.864560]  ffff888103231b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.865904] >ffff888103231c00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   25.866664]                                      ^
[   25.867183]  ffff888103231c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.868155]  ffff888103231d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.868701] ==================================================================
[   26.450964] ==================================================================
[   26.451396] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x8f9/0x5450
[   26.451840] Write of size 4 at addr ffff888103231c30 by task kunit_try_catch/286
[   26.453062] 
[   26.453348] CPU: 1 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G    B            N  6.14.0-rc7-next-20250319 #1 PREEMPT(voluntary) 
[   26.453482] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.453520] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   26.453578] Call Trace:
[   26.453615]  <TASK>
[   26.453654]  dump_stack_lvl+0x73/0xb0
[   26.453783]  print_report+0xd1/0x660
[   26.453874]  ? __virt_addr_valid+0x1db/0x2d0
[   26.454004]  ? kasan_complete_mode_report_info+0x2a/0x200
[   26.454083]  kasan_report+0x104/0x140
[   26.454172]  ? kasan_atomics_helper+0x8f9/0x5450
[   26.454245]  ? kasan_atomics_helper+0x8f9/0x5450
[   26.454331]  kasan_check_range+0x10c/0x1c0
[   26.454406]  __kasan_check_write+0x18/0x20
[   26.454473]  kasan_atomics_helper+0x8f9/0x5450
[   26.454547]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   26.454621]  ? kasan_save_alloc_info+0x3b/0x50
[   26.454712]  kasan_atomics+0x1dc/0x310
[   26.454818]  ? __pfx_kasan_atomics+0x10/0x10
[   26.454892]  ? __pfx_read_tsc+0x10/0x10
[   26.454985]  ? ktime_get_ts64+0x86/0x240
[   26.455093]  kunit_try_run_case+0x1b2/0x490
[   26.455237]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.455313]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   26.455423]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   26.455499]  ? __kthread_parkme+0x82/0x160
[   26.455634]  ? preempt_count_sub+0x50/0x80
[   26.455751]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.455834]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.455911]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   26.455996]  kthread+0x323/0x710
[   26.456061]  ? trace_preempt_on+0x20/0xc0
[   26.456160]  ? __pfx_kthread+0x10/0x10
[   26.456233]  ? _raw_spin_unlock_irq+0x47/0x80
[   26.456295]  ? calculate_sigpending+0x7b/0xa0
[   26.456359]  ? __pfx_kthread+0x10/0x10
[   26.456424]  ret_from_fork+0x41/0x80
[   26.456494]  ? __pfx_kthread+0x10/0x10
[   26.456559]  ret_from_fork_asm+0x1a/0x30
[   26.456655]  </TASK>
[   26.456690] 
[   26.470543] Allocated by task 286:
[   26.470970]  kasan_save_stack+0x3d/0x60
[   26.471294]  kasan_save_track+0x18/0x40
[   26.471574]  kasan_save_alloc_info+0x3b/0x50
[   26.472066]  __kasan_kmalloc+0xb7/0xc0
[   26.472499]  __kmalloc_cache_noprof+0x183/0x410
[   26.473170]  kasan_atomics+0x95/0x310
[   26.473589]  kunit_try_run_case+0x1b2/0x490
[   26.474204]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.474606]  kthread+0x323/0x710
[   26.474873]  ret_from_fork+0x41/0x80
[   26.475162]  ret_from_fork_asm+0x1a/0x30
[   26.475446] 
[   26.475630] The buggy address belongs to the object at ffff888103231c00
[   26.475630]  which belongs to the cache kmalloc-64 of size 64
[   26.476708] The buggy address is located 0 bytes to the right of
[   26.476708]  allocated 48-byte region [ffff888103231c00, ffff888103231c30)
[   26.477877] 
[   26.478177] The buggy address belongs to the physical page:
[   26.478830] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103231
[   26.479657] flags: 0x200000000000000(node=0|zone=2)
[   26.480219] page_type: f5(slab)
[   26.480596] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   26.481106] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   26.481524] page dumped because: kasan: bad access detected
[   26.481921] 
[   26.482165] Memory state around the buggy address:
[   26.482620]  ffff888103231b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.483675]  ffff888103231b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.484378] >ffff888103231c00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   26.484814]                                      ^
[   26.485373]  ffff888103231c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.485825]  ffff888103231d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.486469] ==================================================================
[   28.030408] ==================================================================
[   28.031037] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4f30/0x5450
[   28.032391] Read of size 8 at addr ffff888103231c30 by task kunit_try_catch/286
[   28.033692] 
[   28.034477] CPU: 1 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G    B            N  6.14.0-rc7-next-20250319 #1 PREEMPT(voluntary) 
[   28.034563] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.034584] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   28.034616] Call Trace:
[   28.034637]  <TASK>
[   28.034658]  dump_stack_lvl+0x73/0xb0
[   28.034704]  print_report+0xd1/0x660
[   28.034784]  ? __virt_addr_valid+0x1db/0x2d0
[   28.034853]  ? kasan_complete_mode_report_info+0x2a/0x200
[   28.034894]  kasan_report+0x104/0x140
[   28.034925]  ? kasan_atomics_helper+0x4f30/0x5450
[   28.034962]  ? kasan_atomics_helper+0x4f30/0x5450
[   28.035007]  __asan_report_load8_noabort+0x18/0x20
[   28.035041]  kasan_atomics_helper+0x4f30/0x5450
[   28.035078]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   28.035137]  ? kasan_save_alloc_info+0x3b/0x50
[   28.035184]  kasan_atomics+0x1dc/0x310
[   28.035221]  ? __pfx_kasan_atomics+0x10/0x10
[   28.035258]  ? __pfx_read_tsc+0x10/0x10
[   28.035290]  ? ktime_get_ts64+0x86/0x240
[   28.035328]  kunit_try_run_case+0x1b2/0x490
[   28.035365]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.035398]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   28.035431]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   28.035465]  ? __kthread_parkme+0x82/0x160
[   28.035497]  ? preempt_count_sub+0x50/0x80
[   28.035536]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.035572]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.035637]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   28.035674]  kthread+0x323/0x710
[   28.035710]  ? trace_preempt_on+0x20/0xc0
[   28.035780]  ? __pfx_kthread+0x10/0x10
[   28.035816]  ? _raw_spin_unlock_irq+0x47/0x80
[   28.035848]  ? calculate_sigpending+0x7b/0xa0
[   28.035883]  ? __pfx_kthread+0x10/0x10
[   28.035919]  ret_from_fork+0x41/0x80
[   28.035965]  ? __pfx_kthread+0x10/0x10
[   28.035999]  ret_from_fork_asm+0x1a/0x30
[   28.036048]  </TASK>
[   28.036065] 
[   28.056588] Allocated by task 286:
[   28.057488]  kasan_save_stack+0x3d/0x60
[   28.057888]  kasan_save_track+0x18/0x40
[   28.058780]  kasan_save_alloc_info+0x3b/0x50
[   28.059223]  __kasan_kmalloc+0xb7/0xc0
[   28.060015]  __kmalloc_cache_noprof+0x183/0x410
[   28.060460]  kasan_atomics+0x95/0x310
[   28.060938]  kunit_try_run_case+0x1b2/0x490
[   28.061730]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.062161]  kthread+0x323/0x710
[   28.062573]  ret_from_fork+0x41/0x80
[   28.063430]  ret_from_fork_asm+0x1a/0x30
[   28.064132] 
[   28.064364] The buggy address belongs to the object at ffff888103231c00
[   28.064364]  which belongs to the cache kmalloc-64 of size 64
[   28.065693] The buggy address is located 0 bytes to the right of
[   28.065693]  allocated 48-byte region [ffff888103231c00, ffff888103231c30)
[   28.066662] 
[   28.067482] The buggy address belongs to the physical page:
[   28.067932] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103231
[   28.068662] flags: 0x200000000000000(node=0|zone=2)
[   28.069462] page_type: f5(slab)
[   28.069798] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   28.070789] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   28.071719] page dumped because: kasan: bad access detected
[   28.072254] 
[   28.072877] Memory state around the buggy address:
[   28.073300]  ffff888103231b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.073981]  ffff888103231b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.074559] >ffff888103231c00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   28.075621]                                      ^
[   28.076386]  ffff888103231c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.077345]  ffff888103231d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.077790] ==================================================================
[   28.463187] ==================================================================
[   28.463818] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4fb2/0x5450
[   28.464419] Read of size 8 at addr ffff888103231c30 by task kunit_try_catch/286
[   28.464873] 
[   28.465063] CPU: 1 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G    B            N  6.14.0-rc7-next-20250319 #1 PREEMPT(voluntary) 
[   28.465279] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.465353] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   28.465422] Call Trace:
[   28.465485]  <TASK>
[   28.465525]  dump_stack_lvl+0x73/0xb0
[   28.465634]  print_report+0xd1/0x660
[   28.465780]  ? __virt_addr_valid+0x1db/0x2d0
[   28.465980]  ? kasan_complete_mode_report_info+0x2a/0x200
[   28.466095]  kasan_report+0x104/0x140
[   28.466210]  ? kasan_atomics_helper+0x4fb2/0x5450
[   28.466314]  ? kasan_atomics_helper+0x4fb2/0x5450
[   28.466402]  __asan_report_load8_noabort+0x18/0x20
[   28.466470]  kasan_atomics_helper+0x4fb2/0x5450
[   28.466542]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   28.466616]  ? kasan_save_alloc_info+0x3b/0x50
[   28.466748]  kasan_atomics+0x1dc/0x310
[   28.466835]  ? __pfx_kasan_atomics+0x10/0x10
[   28.466912]  ? __pfx_read_tsc+0x10/0x10
[   28.466977]  ? ktime_get_ts64+0x86/0x240
[   28.467053]  kunit_try_run_case+0x1b2/0x490
[   28.467150]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.467221]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   28.467282]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   28.467436]  ? __kthread_parkme+0x82/0x160
[   28.467515]  ? preempt_count_sub+0x50/0x80
[   28.467618]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.467690]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.468294]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   28.468514]  kthread+0x323/0x710
[   28.468599]  ? trace_preempt_on+0x20/0xc0
[   28.469795]  ? __pfx_kthread+0x10/0x10
[   28.469892]  ? _raw_spin_unlock_irq+0x47/0x80
[   28.469959]  ? calculate_sigpending+0x7b/0xa0
[   28.470022]  ? __pfx_kthread+0x10/0x10
[   28.470088]  ret_from_fork+0x41/0x80
[   28.470951]  ? __pfx_kthread+0x10/0x10
[   28.471073]  ret_from_fork_asm+0x1a/0x30
[   28.471276]  </TASK>
[   28.471319] 
[   28.486820] Allocated by task 286:
[   28.487356]  kasan_save_stack+0x3d/0x60
[   28.487736]  kasan_save_track+0x18/0x40
[   28.488142]  kasan_save_alloc_info+0x3b/0x50
[   28.488613]  __kasan_kmalloc+0xb7/0xc0
[   28.490465]  __kmalloc_cache_noprof+0x183/0x410
[   28.491553]  kasan_atomics+0x95/0x310
[   28.492142]  kunit_try_run_case+0x1b2/0x490
[   28.492538]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.493262]  kthread+0x323/0x710
[   28.493568]  ret_from_fork+0x41/0x80
[   28.493854]  ret_from_fork_asm+0x1a/0x30
[   28.494163] 
[   28.494460] The buggy address belongs to the object at ffff888103231c00
[   28.494460]  which belongs to the cache kmalloc-64 of size 64
[   28.495948] The buggy address is located 0 bytes to the right of
[   28.495948]  allocated 48-byte region [ffff888103231c00, ffff888103231c30)
[   28.497184] 
[   28.497424] The buggy address belongs to the physical page:
[   28.497761] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103231
[   28.498422] flags: 0x200000000000000(node=0|zone=2)
[   28.498897] page_type: f5(slab)
[   28.499291] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   28.500156] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   28.500749] page dumped because: kasan: bad access detected
[   28.501170] 
[   28.501401] Memory state around the buggy address:
[   28.501797]  ffff888103231b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.502211]  ffff888103231b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.502588] >ffff888103231c00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   28.502985]                                      ^
[   28.503522]  ffff888103231c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.504463]  ffff888103231d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.505087] ==================================================================
[   27.018632] ==================================================================
[   27.019371] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a1c/0x5450
[   27.020293] Read of size 4 at addr ffff888103231c30 by task kunit_try_catch/286
[   27.020885] 
[   27.021085] CPU: 1 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G    B            N  6.14.0-rc7-next-20250319 #1 PREEMPT(voluntary) 
[   27.021240] Tainted: [B]=BAD_PAGE, [N]=TEST
[   27.021277] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   27.021335] Call Trace:
[   27.021372]  <TASK>
[   27.021407]  dump_stack_lvl+0x73/0xb0
[   27.021577]  print_report+0xd1/0x660
[   27.021789]  ? __virt_addr_valid+0x1db/0x2d0
[   27.021980]  ? kasan_complete_mode_report_info+0x2a/0x200
[   27.022061]  kasan_report+0x104/0x140
[   27.022150]  ? kasan_atomics_helper+0x4a1c/0x5450
[   27.022225]  ? kasan_atomics_helper+0x4a1c/0x5450
[   27.022305]  __asan_report_load4_noabort+0x18/0x20
[   27.022371]  kasan_atomics_helper+0x4a1c/0x5450
[   27.022531]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   27.022619]  ? kasan_save_alloc_info+0x3b/0x50
[   27.022745]  kasan_atomics+0x1dc/0x310
[   27.022913]  ? __pfx_kasan_atomics+0x10/0x10
[   27.022998]  ? __pfx_read_tsc+0x10/0x10
[   27.023064]  ? ktime_get_ts64+0x86/0x240
[   27.023163]  kunit_try_run_case+0x1b2/0x490
[   27.023329]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.023405]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   27.023474]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   27.023538]  ? __kthread_parkme+0x82/0x160
[   27.023760]  ? preempt_count_sub+0x50/0x80
[   27.023854]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.023939]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.024095]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   27.024198]  kthread+0x323/0x710
[   27.024263]  ? trace_preempt_on+0x20/0xc0
[   27.024332]  ? __pfx_kthread+0x10/0x10
[   27.024486]  ? _raw_spin_unlock_irq+0x47/0x80
[   27.024585]  ? calculate_sigpending+0x7b/0xa0
[   27.024676]  ? __pfx_kthread+0x10/0x10
[   27.024867]  ret_from_fork+0x41/0x80
[   27.024971]  ? __pfx_kthread+0x10/0x10
[   27.025070]  ret_from_fork_asm+0x1a/0x30
[   27.025253]  </TASK>
[   27.025300] 
[   27.039679] Allocated by task 286:
[   27.040058]  kasan_save_stack+0x3d/0x60
[   27.040533]  kasan_save_track+0x18/0x40
[   27.041066]  kasan_save_alloc_info+0x3b/0x50
[   27.042373]  __kasan_kmalloc+0xb7/0xc0
[   27.042896]  __kmalloc_cache_noprof+0x183/0x410
[   27.043862]  kasan_atomics+0x95/0x310
[   27.044149]  kunit_try_run_case+0x1b2/0x490
[   27.045527]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.046461]  kthread+0x323/0x710
[   27.046842]  ret_from_fork+0x41/0x80
[   27.047286]  ret_from_fork_asm+0x1a/0x30
[   27.047674] 
[   27.047916] The buggy address belongs to the object at ffff888103231c00
[   27.047916]  which belongs to the cache kmalloc-64 of size 64
[   27.052624] The buggy address is located 0 bytes to the right of
[   27.052624]  allocated 48-byte region [ffff888103231c00, ffff888103231c30)
[   27.053292] 
[   27.053597] The buggy address belongs to the physical page:
[   27.054183] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103231
[   27.054844] flags: 0x200000000000000(node=0|zone=2)
[   27.055338] page_type: f5(slab)
[   27.055807] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   27.056437] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   27.057014] page dumped because: kasan: bad access detected
[   27.057486] 
[   27.057801] Memory state around the buggy address:
[   27.058202]  ffff888103231b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.058923]  ffff888103231b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.059430] >ffff888103231c00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   27.059897]                                      ^
[   27.060401]  ffff888103231c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.061132]  ffff888103231d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.061820] ==================================================================
[   27.456217] ==================================================================
[   27.457145] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x50d4/0x5450
[   27.457905] Write of size 8 at addr ffff888103231c30 by task kunit_try_catch/286
[   27.458589] 
[   27.458901] CPU: 1 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G    B            N  6.14.0-rc7-next-20250319 #1 PREEMPT(voluntary) 
[   27.459032] Tainted: [B]=BAD_PAGE, [N]=TEST
[   27.459071] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   27.459153] Call Trace:
[   27.459192]  <TASK>
[   27.459231]  dump_stack_lvl+0x73/0xb0
[   27.459312]  print_report+0xd1/0x660
[   27.459384]  ? __virt_addr_valid+0x1db/0x2d0
[   27.459512]  ? kasan_complete_mode_report_info+0x2a/0x200
[   27.459619]  kasan_report+0x104/0x140
[   27.459688]  ? kasan_atomics_helper+0x50d4/0x5450
[   27.459827]  ? kasan_atomics_helper+0x50d4/0x5450
[   27.459920]  __asan_report_store8_noabort+0x1b/0x30
[   27.459999]  kasan_atomics_helper+0x50d4/0x5450
[   27.460072]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   27.460169]  ? kasan_save_alloc_info+0x3b/0x50
[   27.460261]  kasan_atomics+0x1dc/0x310
[   27.460334]  ? __pfx_kasan_atomics+0x10/0x10
[   27.460442]  ? __pfx_read_tsc+0x10/0x10
[   27.460564]  ? ktime_get_ts64+0x86/0x240
[   27.460641]  kunit_try_run_case+0x1b2/0x490
[   27.460734]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.460801]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   27.460904]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   27.460976]  ? __kthread_parkme+0x82/0x160
[   27.461044]  ? preempt_count_sub+0x50/0x80
[   27.461145]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.461226]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.461301]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   27.461374]  kthread+0x323/0x710
[   27.461436]  ? trace_preempt_on+0x20/0xc0
[   27.461510]  ? __pfx_kthread+0x10/0x10
[   27.461575]  ? _raw_spin_unlock_irq+0x47/0x80
[   27.461640]  ? calculate_sigpending+0x7b/0xa0
[   27.461709]  ? __pfx_kthread+0x10/0x10
[   27.461778]  ret_from_fork+0x41/0x80
[   27.461844]  ? __pfx_kthread+0x10/0x10
[   27.461910]  ret_from_fork_asm+0x1a/0x30
[   27.462005]  </TASK>
[   27.462039] 
[   27.480246] Allocated by task 286:
[   27.480623]  kasan_save_stack+0x3d/0x60
[   27.480977]  kasan_save_track+0x18/0x40
[   27.481426]  kasan_save_alloc_info+0x3b/0x50
[   27.481790]  __kasan_kmalloc+0xb7/0xc0
[   27.482177]  __kmalloc_cache_noprof+0x183/0x410
[   27.482491]  kasan_atomics+0x95/0x310
[   27.482954]  kunit_try_run_case+0x1b2/0x490
[   27.483417]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.484045]  kthread+0x323/0x710
[   27.484453]  ret_from_fork+0x41/0x80
[   27.484911]  ret_from_fork_asm+0x1a/0x30
[   27.485265] 
[   27.485425] The buggy address belongs to the object at ffff888103231c00
[   27.485425]  which belongs to the cache kmalloc-64 of size 64
[   27.486353] The buggy address is located 0 bytes to the right of
[   27.486353]  allocated 48-byte region [ffff888103231c00, ffff888103231c30)
[   27.487326] 
[   27.487493] The buggy address belongs to the physical page:
[   27.487886] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103231
[   27.488519] flags: 0x200000000000000(node=0|zone=2)
[   27.489054] page_type: f5(slab)
[   27.489440] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   27.490193] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   27.490931] page dumped because: kasan: bad access detected
[   27.491440] 
[   27.491696] Memory state around the buggy address:
[   27.492240]  ffff888103231b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.492742]  ffff888103231b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.493157] >ffff888103231c00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   27.493842]                                      ^
[   27.494332]  ffff888103231c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.494863]  ffff888103231d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.495263] ==================================================================
[   27.419198] ==================================================================
[   27.420031] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1467/0x5450
[   27.420691] Write of size 8 at addr ffff888103231c30 by task kunit_try_catch/286
[   27.421232] 
[   27.421529] CPU: 1 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G    B            N  6.14.0-rc7-next-20250319 #1 PREEMPT(voluntary) 
[   27.421689] Tainted: [B]=BAD_PAGE, [N]=TEST
[   27.421773] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   27.421837] Call Trace:
[   27.421876]  <TASK>
[   27.421912]  dump_stack_lvl+0x73/0xb0
[   27.421995]  print_report+0xd1/0x660
[   27.422065]  ? __virt_addr_valid+0x1db/0x2d0
[   27.422218]  ? kasan_complete_mode_report_info+0x2a/0x200
[   27.422297]  kasan_report+0x104/0x140
[   27.422361]  ? kasan_atomics_helper+0x1467/0x5450
[   27.422433]  ? kasan_atomics_helper+0x1467/0x5450
[   27.422567]  kasan_check_range+0x10c/0x1c0
[   27.422648]  __kasan_check_write+0x18/0x20
[   27.422758]  kasan_atomics_helper+0x1467/0x5450
[   27.422836]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   27.422954]  ? kasan_save_alloc_info+0x3b/0x50
[   27.423045]  kasan_atomics+0x1dc/0x310
[   27.423142]  ? __pfx_kasan_atomics+0x10/0x10
[   27.423221]  ? __pfx_read_tsc+0x10/0x10
[   27.423321]  ? ktime_get_ts64+0x86/0x240
[   27.423409]  kunit_try_run_case+0x1b2/0x490
[   27.423486]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.423548]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   27.423618]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   27.423656]  ? __kthread_parkme+0x82/0x160
[   27.423739]  ? preempt_count_sub+0x50/0x80
[   27.423821]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.423886]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.423968]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   27.424075]  kthread+0x323/0x710
[   27.424172]  ? trace_preempt_on+0x20/0xc0
[   27.424246]  ? __pfx_kthread+0x10/0x10
[   27.424309]  ? _raw_spin_unlock_irq+0x47/0x80
[   27.424370]  ? calculate_sigpending+0x7b/0xa0
[   27.424432]  ? __pfx_kthread+0x10/0x10
[   27.424547]  ret_from_fork+0x41/0x80
[   27.424616]  ? __pfx_kthread+0x10/0x10
[   27.424683]  ret_from_fork_asm+0x1a/0x30
[   27.424829]  </TASK>
[   27.424905] 
[   27.438043] Allocated by task 286:
[   27.438433]  kasan_save_stack+0x3d/0x60
[   27.438919]  kasan_save_track+0x18/0x40
[   27.439377]  kasan_save_alloc_info+0x3b/0x50
[   27.440657]  __kasan_kmalloc+0xb7/0xc0
[   27.441521]  __kmalloc_cache_noprof+0x183/0x410
[   27.441917]  kasan_atomics+0x95/0x310
[   27.442400]  kunit_try_run_case+0x1b2/0x490
[   27.442892]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.443416]  kthread+0x323/0x710
[   27.443896]  ret_from_fork+0x41/0x80
[   27.444271]  ret_from_fork_asm+0x1a/0x30
[   27.444564] 
[   27.444765] The buggy address belongs to the object at ffff888103231c00
[   27.444765]  which belongs to the cache kmalloc-64 of size 64
[   27.445571] The buggy address is located 0 bytes to the right of
[   27.445571]  allocated 48-byte region [ffff888103231c00, ffff888103231c30)
[   27.446764] 
[   27.447019] The buggy address belongs to the physical page:
[   27.447618] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103231
[   27.448444] flags: 0x200000000000000(node=0|zone=2)
[   27.449005] page_type: f5(slab)
[   27.449399] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   27.450084] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   27.450497] page dumped because: kasan: bad access detected
[   27.450885] 
[   27.451051] Memory state around the buggy address:
[   27.451532]  ffff888103231b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.452298]  ffff888103231b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.453026] >ffff888103231c00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   27.453778]                                      ^
[   27.454288]  ffff888103231c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.454850]  ffff888103231d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.455252] ==================================================================
[   26.897331] ==================================================================
[   26.897908] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xfa9/0x5450
[   26.898691] Write of size 4 at addr ffff888103231c30 by task kunit_try_catch/286
[   26.899503] 
[   26.899862] CPU: 1 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G    B            N  6.14.0-rc7-next-20250319 #1 PREEMPT(voluntary) 
[   26.900008] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.900046] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   26.900129] Call Trace:
[   26.900168]  <TASK>
[   26.900204]  dump_stack_lvl+0x73/0xb0
[   26.900282]  print_report+0xd1/0x660
[   26.900350]  ? __virt_addr_valid+0x1db/0x2d0
[   26.900475]  ? kasan_complete_mode_report_info+0x2a/0x200
[   26.900547]  kasan_report+0x104/0x140
[   26.900608]  ? kasan_atomics_helper+0xfa9/0x5450
[   26.900677]  ? kasan_atomics_helper+0xfa9/0x5450
[   26.900771]  kasan_check_range+0x10c/0x1c0
[   26.900857]  __kasan_check_write+0x18/0x20
[   26.900923]  kasan_atomics_helper+0xfa9/0x5450
[   26.900991]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   26.901061]  ? kasan_save_alloc_info+0x3b/0x50
[   26.901167]  kasan_atomics+0x1dc/0x310
[   26.901224]  ? __pfx_kasan_atomics+0x10/0x10
[   26.901265]  ? __pfx_read_tsc+0x10/0x10
[   26.901300]  ? ktime_get_ts64+0x86/0x240
[   26.901352]  kunit_try_run_case+0x1b2/0x490
[   26.901423]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.901481]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   26.901542]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   26.901606]  ? __kthread_parkme+0x82/0x160
[   26.901665]  ? preempt_count_sub+0x50/0x80
[   26.901762]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.901836]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.901902]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   26.901973]  kthread+0x323/0x710
[   26.902030]  ? trace_preempt_on+0x20/0xc0
[   26.902094]  ? __pfx_kthread+0x10/0x10
[   26.902189]  ? _raw_spin_unlock_irq+0x47/0x80
[   26.902250]  ? calculate_sigpending+0x7b/0xa0
[   26.902309]  ? __pfx_kthread+0x10/0x10
[   26.902370]  ret_from_fork+0x41/0x80
[   26.902437]  ? __pfx_kthread+0x10/0x10
[   26.902503]  ret_from_fork_asm+0x1a/0x30
[   26.902592]  </TASK>
[   26.902622] 
[   26.919994] Allocated by task 286:
[   26.920347]  kasan_save_stack+0x3d/0x60
[   26.920622]  kasan_save_track+0x18/0x40
[   26.921147]  kasan_save_alloc_info+0x3b/0x50
[   26.921604]  __kasan_kmalloc+0xb7/0xc0
[   26.922144]  __kmalloc_cache_noprof+0x183/0x410
[   26.922455]  kasan_atomics+0x95/0x310
[   26.922735]  kunit_try_run_case+0x1b2/0x490
[   26.923210]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.923745]  kthread+0x323/0x710
[   26.924074]  ret_from_fork+0x41/0x80
[   26.924423]  ret_from_fork_asm+0x1a/0x30
[   26.924713] 
[   26.924874] The buggy address belongs to the object at ffff888103231c00
[   26.924874]  which belongs to the cache kmalloc-64 of size 64
[   26.925893] The buggy address is located 0 bytes to the right of
[   26.925893]  allocated 48-byte region [ffff888103231c00, ffff888103231c30)
[   26.926807] 
[   26.927001] The buggy address belongs to the physical page:
[   26.927552] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103231
[   26.929063] flags: 0x200000000000000(node=0|zone=2)
[   26.929562] page_type: f5(slab)
[   26.930500] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   26.930980] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   26.931399] page dumped because: kasan: bad access detected
[   26.931746] 
[   26.931906] Memory state around the buggy address:
[   26.932412]  ffff888103231b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.933452]  ffff888103231b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.934391] >ffff888103231c00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   26.935221]                                      ^
[   26.935986]  ffff888103231c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.936840]  ffff888103231d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.937276] ==================================================================
[   27.675066] ==================================================================
[   27.675970] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x177f/0x5450
[   27.676859] Write of size 8 at addr ffff888103231c30 by task kunit_try_catch/286
[   27.677645] 
[   27.678009] CPU: 1 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G    B            N  6.14.0-rc7-next-20250319 #1 PREEMPT(voluntary) 
[   27.678198] Tainted: [B]=BAD_PAGE, [N]=TEST
[   27.678243] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   27.678305] Call Trace:
[   27.678339]  <TASK>
[   27.678378]  dump_stack_lvl+0x73/0xb0
[   27.678458]  print_report+0xd1/0x660
[   27.678524]  ? __virt_addr_valid+0x1db/0x2d0
[   27.678650]  ? kasan_complete_mode_report_info+0x2a/0x200
[   27.678813]  kasan_report+0x104/0x140
[   27.678902]  ? kasan_atomics_helper+0x177f/0x5450
[   27.678978]  ? kasan_atomics_helper+0x177f/0x5450
[   27.679064]  kasan_check_range+0x10c/0x1c0
[   27.679164]  __kasan_check_write+0x18/0x20
[   27.679233]  kasan_atomics_helper+0x177f/0x5450
[   27.679357]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   27.679436]  ? kasan_save_alloc_info+0x3b/0x50
[   27.679563]  kasan_atomics+0x1dc/0x310
[   27.679673]  ? __pfx_kasan_atomics+0x10/0x10
[   27.679811]  ? __pfx_read_tsc+0x10/0x10
[   27.679936]  ? ktime_get_ts64+0x86/0x240
[   27.680047]  kunit_try_run_case+0x1b2/0x490
[   27.680178]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.680254]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   27.680322]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   27.680388]  ? __kthread_parkme+0x82/0x160
[   27.680455]  ? preempt_count_sub+0x50/0x80
[   27.680531]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.680599]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.680672]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   27.680796]  kthread+0x323/0x710
[   27.680900]  ? trace_preempt_on+0x20/0xc0
[   27.680968]  ? __pfx_kthread+0x10/0x10
[   27.681005]  ? _raw_spin_unlock_irq+0x47/0x80
[   27.681038]  ? calculate_sigpending+0x7b/0xa0
[   27.681072]  ? __pfx_kthread+0x10/0x10
[   27.681129]  ret_from_fork+0x41/0x80
[   27.681174]  ? __pfx_kthread+0x10/0x10
[   27.681208]  ret_from_fork_asm+0x1a/0x30
[   27.681258]  </TASK>
[   27.681275] 
[   27.694696] Allocated by task 286:
[   27.695167]  kasan_save_stack+0x3d/0x60
[   27.695549]  kasan_save_track+0x18/0x40
[   27.696094]  kasan_save_alloc_info+0x3b/0x50
[   27.696524]  __kasan_kmalloc+0xb7/0xc0
[   27.696952]  __kmalloc_cache_noprof+0x183/0x410
[   27.697381]  kasan_atomics+0x95/0x310
[   27.697795]  kunit_try_run_case+0x1b2/0x490
[   27.698196]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.698774]  kthread+0x323/0x710
[   27.699181]  ret_from_fork+0x41/0x80
[   27.699618]  ret_from_fork_asm+0x1a/0x30
[   27.700126] 
[   27.700349] The buggy address belongs to the object at ffff888103231c00
[   27.700349]  which belongs to the cache kmalloc-64 of size 64
[   27.701454] The buggy address is located 0 bytes to the right of
[   27.701454]  allocated 48-byte region [ffff888103231c00, ffff888103231c30)
[   27.702568] 
[   27.702895] The buggy address belongs to the physical page:
[   27.703364] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103231
[   27.704038] flags: 0x200000000000000(node=0|zone=2)
[   27.704376] page_type: f5(slab)
[   27.704619] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   27.705416] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   27.706153] page dumped because: kasan: bad access detected
[   27.706768] 
[   27.707031] Memory state around the buggy address:
[   27.707519]  ffff888103231b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.708137]  ffff888103231b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.708835] >ffff888103231c00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   27.709483]                                      ^
[   27.710010]  ffff888103231c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.710667]  ffff888103231d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.711301] ==================================================================
[   27.932977] ==================================================================
[   27.933610] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1b22/0x5450
[   27.935693] Write of size 8 at addr ffff888103231c30 by task kunit_try_catch/286
[   27.939815] 
[   27.940471] CPU: 1 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G    B            N  6.14.0-rc7-next-20250319 #1 PREEMPT(voluntary) 
[   27.940609] Tainted: [B]=BAD_PAGE, [N]=TEST
[   27.940646] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   27.940723] Call Trace:
[   27.940761]  <TASK>
[   27.940798]  dump_stack_lvl+0x73/0xb0
[   27.940883]  print_report+0xd1/0x660
[   27.940950]  ? __virt_addr_valid+0x1db/0x2d0
[   27.941069]  ? kasan_complete_mode_report_info+0x2a/0x200
[   27.941954]  kasan_report+0x104/0x140
[   27.942034]  ? kasan_atomics_helper+0x1b22/0x5450
[   27.942106]  ? kasan_atomics_helper+0x1b22/0x5450
[   27.942205]  kasan_check_range+0x10c/0x1c0
[   27.942280]  __kasan_check_write+0x18/0x20
[   27.942341]  kasan_atomics_helper+0x1b22/0x5450
[   27.942413]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   27.942485]  ? kasan_save_alloc_info+0x3b/0x50
[   27.942572]  kasan_atomics+0x1dc/0x310
[   27.942641]  ? __pfx_kasan_atomics+0x10/0x10
[   27.942752]  ? __pfx_read_tsc+0x10/0x10
[   27.942819]  ? ktime_get_ts64+0x86/0x240
[   27.942896]  kunit_try_run_case+0x1b2/0x490
[   27.942962]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.943025]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   27.943082]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   27.943166]  ? __kthread_parkme+0x82/0x160
[   27.943231]  ? preempt_count_sub+0x50/0x80
[   27.943305]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.943376]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.943445]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   27.943516]  kthread+0x323/0x710
[   27.943575]  ? trace_preempt_on+0x20/0xc0
[   27.943671]  ? __pfx_kthread+0x10/0x10
[   27.943782]  ? _raw_spin_unlock_irq+0x47/0x80
[   27.943849]  ? calculate_sigpending+0x7b/0xa0
[   27.943911]  ? __pfx_kthread+0x10/0x10
[   27.943985]  ret_from_fork+0x41/0x80
[   27.944049]  ? __pfx_kthread+0x10/0x10
[   27.944130]  ret_from_fork_asm+0x1a/0x30
[   27.944202]  </TASK>
[   27.944224] 
[   27.964625] Allocated by task 286:
[   27.964912]  kasan_save_stack+0x3d/0x60
[   27.965487]  kasan_save_track+0x18/0x40
[   27.965908]  kasan_save_alloc_info+0x3b/0x50
[   27.966468]  __kasan_kmalloc+0xb7/0xc0
[   27.966894]  __kmalloc_cache_noprof+0x183/0x410
[   27.967231]  kasan_atomics+0x95/0x310
[   27.967506]  kunit_try_run_case+0x1b2/0x490
[   27.968099]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.968687]  kthread+0x323/0x710
[   27.969276]  ret_from_fork+0x41/0x80
[   27.969896]  ret_from_fork_asm+0x1a/0x30
[   27.970435] 
[   27.970667] The buggy address belongs to the object at ffff888103231c00
[   27.970667]  which belongs to the cache kmalloc-64 of size 64
[   27.971779] The buggy address is located 0 bytes to the right of
[   27.971779]  allocated 48-byte region [ffff888103231c00, ffff888103231c30)
[   27.972787] 
[   27.973093] The buggy address belongs to the physical page:
[   27.973432] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103231
[   27.973907] flags: 0x200000000000000(node=0|zone=2)
[   27.974433] page_type: f5(slab)
[   27.974935] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   27.975830] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   27.976677] page dumped because: kasan: bad access detected
[   27.977142] 
[   27.977312] Memory state around the buggy address:
[   27.977589]  ffff888103231b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.978027]  ffff888103231b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.978808] >ffff888103231c00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   27.979481]                                      ^
[   27.980126]  ffff888103231c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.980806]  ffff888103231d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.981524] ==================================================================
[   28.079160] ==================================================================
[   28.080087] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1ce1/0x5450
[   28.080967] Write of size 8 at addr ffff888103231c30 by task kunit_try_catch/286
[   28.082090] 
[   28.082333] CPU: 1 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G    B            N  6.14.0-rc7-next-20250319 #1 PREEMPT(voluntary) 
[   28.082498] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.082544] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   28.082608] Call Trace:
[   28.082676]  <TASK>
[   28.082702]  dump_stack_lvl+0x73/0xb0
[   28.082801]  print_report+0xd1/0x660
[   28.082862]  ? __virt_addr_valid+0x1db/0x2d0
[   28.082933]  ? kasan_complete_mode_report_info+0x2a/0x200
[   28.082973]  kasan_report+0x104/0x140
[   28.083005]  ? kasan_atomics_helper+0x1ce1/0x5450
[   28.083042]  ? kasan_atomics_helper+0x1ce1/0x5450
[   28.083085]  kasan_check_range+0x10c/0x1c0
[   28.083144]  __kasan_check_write+0x18/0x20
[   28.083177]  kasan_atomics_helper+0x1ce1/0x5450
[   28.083215]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   28.083251]  ? kasan_save_alloc_info+0x3b/0x50
[   28.083297]  kasan_atomics+0x1dc/0x310
[   28.083333]  ? __pfx_kasan_atomics+0x10/0x10
[   28.083370]  ? __pfx_read_tsc+0x10/0x10
[   28.083403]  ? ktime_get_ts64+0x86/0x240
[   28.083441]  kunit_try_run_case+0x1b2/0x490
[   28.083478]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.083512]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   28.083546]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   28.083580]  ? __kthread_parkme+0x82/0x160
[   28.083641]  ? preempt_count_sub+0x50/0x80
[   28.083682]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.083761]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.083851]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   28.083938]  kthread+0x323/0x710
[   28.084003]  ? trace_preempt_on+0x20/0xc0
[   28.084069]  ? __pfx_kthread+0x10/0x10
[   28.084107]  ? _raw_spin_unlock_irq+0x47/0x80
[   28.084168]  ? calculate_sigpending+0x7b/0xa0
[   28.084202]  ? __pfx_kthread+0x10/0x10
[   28.084238]  ret_from_fork+0x41/0x80
[   28.084275]  ? __pfx_kthread+0x10/0x10
[   28.084310]  ret_from_fork_asm+0x1a/0x30
[   28.084360]  </TASK>
[   28.084377] 
[   28.105568] Allocated by task 286:
[   28.105887]  kasan_save_stack+0x3d/0x60
[   28.106191]  kasan_save_track+0x18/0x40
[   28.106451]  kasan_save_alloc_info+0x3b/0x50
[   28.106737]  __kasan_kmalloc+0xb7/0xc0
[   28.106995]  __kmalloc_cache_noprof+0x183/0x410
[   28.108904]  kasan_atomics+0x95/0x310
[   28.109350]  kunit_try_run_case+0x1b2/0x490
[   28.110539]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.111526]  kthread+0x323/0x710
[   28.112579]  ret_from_fork+0x41/0x80
[   28.113018]  ret_from_fork_asm+0x1a/0x30
[   28.113478] 
[   28.113798] The buggy address belongs to the object at ffff888103231c00
[   28.113798]  which belongs to the cache kmalloc-64 of size 64
[   28.114866] The buggy address is located 0 bytes to the right of
[   28.114866]  allocated 48-byte region [ffff888103231c00, ffff888103231c30)
[   28.115908] 
[   28.116088] The buggy address belongs to the physical page:
[   28.116800] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103231
[   28.117339] flags: 0x200000000000000(node=0|zone=2)
[   28.117925] page_type: f5(slab)
[   28.118336] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   28.119076] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   28.119871] page dumped because: kasan: bad access detected
[   28.120317] 
[   28.120637] Memory state around the buggy address:
[   28.121174]  ffff888103231b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.121611]  ffff888103231b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.122385] >ffff888103231c00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   28.123176]                                      ^
[   28.123765]  ffff888103231c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.124492]  ffff888103231d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.124930] ==================================================================
[   27.152426] ==================================================================
[   27.153171] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1217/0x5450
[   27.153892] Write of size 4 at addr ffff888103231c30 by task kunit_try_catch/286
[   27.154527] 
[   27.154763] CPU: 1 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G    B            N  6.14.0-rc7-next-20250319 #1 PREEMPT(voluntary) 
[   27.155434] Tainted: [B]=BAD_PAGE, [N]=TEST
[   27.155481] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   27.155542] Call Trace:
[   27.155582]  <TASK>
[   27.155651]  dump_stack_lvl+0x73/0xb0
[   27.156522]  print_report+0xd1/0x660
[   27.156595]  ? __virt_addr_valid+0x1db/0x2d0
[   27.156665]  ? kasan_complete_mode_report_info+0x2a/0x200
[   27.156713]  kasan_report+0x104/0x140
[   27.156817]  ? kasan_atomics_helper+0x1217/0x5450
[   27.156893]  ? kasan_atomics_helper+0x1217/0x5450
[   27.156983]  kasan_check_range+0x10c/0x1c0
[   27.157060]  __kasan_check_write+0x18/0x20
[   27.157107]  kasan_atomics_helper+0x1217/0x5450
[   27.157187]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   27.157226]  ? kasan_save_alloc_info+0x3b/0x50
[   27.157272]  kasan_atomics+0x1dc/0x310
[   27.157308]  ? __pfx_kasan_atomics+0x10/0x10
[   27.157346]  ? __pfx_read_tsc+0x10/0x10
[   27.157379]  ? ktime_get_ts64+0x86/0x240
[   27.157418]  kunit_try_run_case+0x1b2/0x490
[   27.157455]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.157489]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   27.157523]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   27.157557]  ? __kthread_parkme+0x82/0x160
[   27.157591]  ? preempt_count_sub+0x50/0x80
[   27.157629]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.157665]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.157702]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   27.157776]  kthread+0x323/0x710
[   27.157811]  ? trace_preempt_on+0x20/0xc0
[   27.157847]  ? __pfx_kthread+0x10/0x10
[   27.157880]  ? _raw_spin_unlock_irq+0x47/0x80
[   27.157913]  ? calculate_sigpending+0x7b/0xa0
[   27.157945]  ? __pfx_kthread+0x10/0x10
[   27.157979]  ret_from_fork+0x41/0x80
[   27.158013]  ? __pfx_kthread+0x10/0x10
[   27.158046]  ret_from_fork_asm+0x1a/0x30
[   27.158094]  </TASK>
[   27.158131] 
[   27.174016] Allocated by task 286:
[   27.174383]  kasan_save_stack+0x3d/0x60
[   27.174857]  kasan_save_track+0x18/0x40
[   27.175389]  kasan_save_alloc_info+0x3b/0x50
[   27.175841]  __kasan_kmalloc+0xb7/0xc0
[   27.176359]  __kmalloc_cache_noprof+0x183/0x410
[   27.176838]  kasan_atomics+0x95/0x310
[   27.177252]  kunit_try_run_case+0x1b2/0x490
[   27.177782]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.178249]  kthread+0x323/0x710
[   27.178697]  ret_from_fork+0x41/0x80
[   27.179275]  ret_from_fork_asm+0x1a/0x30
[   27.179921] 
[   27.180106] The buggy address belongs to the object at ffff888103231c00
[   27.180106]  which belongs to the cache kmalloc-64 of size 64
[   27.181072] The buggy address is located 0 bytes to the right of
[   27.181072]  allocated 48-byte region [ffff888103231c00, ffff888103231c30)
[   27.182424] 
[   27.182596] The buggy address belongs to the physical page:
[   27.182913] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103231
[   27.183363] flags: 0x200000000000000(node=0|zone=2)
[   27.183705] page_type: f5(slab)
[   27.184086] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   27.185016] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   27.185705] page dumped because: kasan: bad access detected
[   27.186257] 
[   27.186484] Memory state around the buggy address:
[   27.187033]  ffff888103231b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.187716]  ffff888103231b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.188487] >ffff888103231c00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   27.190881]                                      ^
[   27.192154]  ffff888103231c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.194104]  ffff888103231d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.194510] ==================================================================
[   27.756407] ==================================================================
[   27.757873] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x18b1/0x5450
[   27.758487] Write of size 8 at addr ffff888103231c30 by task kunit_try_catch/286
[   27.758979] 
[   27.759271] CPU: 1 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G    B            N  6.14.0-rc7-next-20250319 #1 PREEMPT(voluntary) 
[   27.759396] Tainted: [B]=BAD_PAGE, [N]=TEST
[   27.759432] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   27.759492] Call Trace:
[   27.759528]  <TASK>
[   27.759566]  dump_stack_lvl+0x73/0xb0
[   27.759677]  print_report+0xd1/0x660
[   27.759798]  ? __virt_addr_valid+0x1db/0x2d0
[   27.759942]  ? kasan_complete_mode_report_info+0x2a/0x200
[   27.760021]  kasan_report+0x104/0x140
[   27.760083]  ? kasan_atomics_helper+0x18b1/0x5450
[   27.760181]  ? kasan_atomics_helper+0x18b1/0x5450
[   27.760265]  kasan_check_range+0x10c/0x1c0
[   27.760340]  __kasan_check_write+0x18/0x20
[   27.760401]  kasan_atomics_helper+0x18b1/0x5450
[   27.760471]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   27.760542]  ? kasan_save_alloc_info+0x3b/0x50
[   27.760630]  kasan_atomics+0x1dc/0x310
[   27.760744]  ? __pfx_kasan_atomics+0x10/0x10
[   27.760804]  ? __pfx_read_tsc+0x10/0x10
[   27.760859]  ? ktime_get_ts64+0x86/0x240
[   27.760902]  kunit_try_run_case+0x1b2/0x490
[   27.760941]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.760977]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   27.761012]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   27.761047]  ? __kthread_parkme+0x82/0x160
[   27.761082]  ? preempt_count_sub+0x50/0x80
[   27.761143]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.761182]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.761219]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   27.761256]  kthread+0x323/0x710
[   27.761290]  ? trace_preempt_on+0x20/0xc0
[   27.761326]  ? __pfx_kthread+0x10/0x10
[   27.761360]  ? _raw_spin_unlock_irq+0x47/0x80
[   27.761391]  ? calculate_sigpending+0x7b/0xa0
[   27.761424]  ? __pfx_kthread+0x10/0x10
[   27.761458]  ret_from_fork+0x41/0x80
[   27.761492]  ? __pfx_kthread+0x10/0x10
[   27.761528]  ret_from_fork_asm+0x1a/0x30
[   27.761576]  </TASK>
[   27.761594] 
[   27.774318] Allocated by task 286:
[   27.774677]  kasan_save_stack+0x3d/0x60
[   27.775167]  kasan_save_track+0x18/0x40
[   27.775552]  kasan_save_alloc_info+0x3b/0x50
[   27.776053]  __kasan_kmalloc+0xb7/0xc0
[   27.776420]  __kmalloc_cache_noprof+0x183/0x410
[   27.776933]  kasan_atomics+0x95/0x310
[   27.777362]  kunit_try_run_case+0x1b2/0x490
[   27.777790]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.778302]  kthread+0x323/0x710
[   27.778613]  ret_from_fork+0x41/0x80
[   27.779059]  ret_from_fork_asm+0x1a/0x30
[   27.779506] 
[   27.779750] The buggy address belongs to the object at ffff888103231c00
[   27.779750]  which belongs to the cache kmalloc-64 of size 64
[   27.780430] The buggy address is located 0 bytes to the right of
[   27.780430]  allocated 48-byte region [ffff888103231c00, ffff888103231c30)
[   27.781472] 
[   27.781697] The buggy address belongs to the physical page:
[   27.782185] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103231
[   27.782888] flags: 0x200000000000000(node=0|zone=2)
[   27.783242] page_type: f5(slab)
[   27.783491] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   27.784262] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   27.784940] page dumped because: kasan: bad access detected
[   27.785276] 
[   27.785443] Memory state around the buggy address:
[   27.785774]  ffff888103231b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.786189]  ffff888103231b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.786574] >ffff888103231c00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   27.786991]                                      ^
[   27.787451]  ffff888103231c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.788207]  ffff888103231d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.788882] ==================================================================
[   28.594216] ==================================================================
[   28.595061] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x224c/0x5450
[   28.595983] Write of size 8 at addr ffff888103231c30 by task kunit_try_catch/286
[   28.596850] 
[   28.597198] CPU: 1 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G    B            N  6.14.0-rc7-next-20250319 #1 PREEMPT(voluntary) 
[   28.597321] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.597358] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   28.597417] Call Trace:
[   28.597490]  <TASK>
[   28.597532]  dump_stack_lvl+0x73/0xb0
[   28.597612]  print_report+0xd1/0x660
[   28.597682]  ? __virt_addr_valid+0x1db/0x2d0
[   28.597812]  ? kasan_complete_mode_report_info+0x2a/0x200
[   28.597854]  kasan_report+0x104/0x140
[   28.597904]  ? kasan_atomics_helper+0x224c/0x5450
[   28.597968]  ? kasan_atomics_helper+0x224c/0x5450
[   28.598046]  kasan_check_range+0x10c/0x1c0
[   28.598145]  __kasan_check_write+0x18/0x20
[   28.598211]  kasan_atomics_helper+0x224c/0x5450
[   28.598318]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   28.598405]  ? kasan_save_alloc_info+0x3b/0x50
[   28.598492]  kasan_atomics+0x1dc/0x310
[   28.598565]  ? __pfx_kasan_atomics+0x10/0x10
[   28.598631]  ? __pfx_read_tsc+0x10/0x10
[   28.598670]  ? ktime_get_ts64+0x86/0x240
[   28.598767]  kunit_try_run_case+0x1b2/0x490
[   28.598808]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.598843]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   28.598876]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   28.598910]  ? __kthread_parkme+0x82/0x160
[   28.598946]  ? preempt_count_sub+0x50/0x80
[   28.598984]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.599020]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.599056]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   28.599092]  kthread+0x323/0x710
[   28.599149]  ? trace_preempt_on+0x20/0xc0
[   28.599184]  ? __pfx_kthread+0x10/0x10
[   28.599217]  ? _raw_spin_unlock_irq+0x47/0x80
[   28.599249]  ? calculate_sigpending+0x7b/0xa0
[   28.599282]  ? __pfx_kthread+0x10/0x10
[   28.599316]  ret_from_fork+0x41/0x80
[   28.599350]  ? __pfx_kthread+0x10/0x10
[   28.599385]  ret_from_fork_asm+0x1a/0x30
[   28.599435]  </TASK>
[   28.599452] 
[   28.617844] Allocated by task 286:
[   28.619080]  kasan_save_stack+0x3d/0x60
[   28.619504]  kasan_save_track+0x18/0x40
[   28.619966]  kasan_save_alloc_info+0x3b/0x50
[   28.620533]  __kasan_kmalloc+0xb7/0xc0
[   28.621509]  __kmalloc_cache_noprof+0x183/0x410
[   28.621885]  kasan_atomics+0x95/0x310
[   28.622324]  kunit_try_run_case+0x1b2/0x490
[   28.623140]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.623679]  kthread+0x323/0x710
[   28.624183]  ret_from_fork+0x41/0x80
[   28.624599]  ret_from_fork_asm+0x1a/0x30
[   28.625688] 
[   28.625863] The buggy address belongs to the object at ffff888103231c00
[   28.625863]  which belongs to the cache kmalloc-64 of size 64
[   28.627350] The buggy address is located 0 bytes to the right of
[   28.627350]  allocated 48-byte region [ffff888103231c00, ffff888103231c30)
[   28.628711] 
[   28.629208] The buggy address belongs to the physical page:
[   28.629677] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103231
[   28.630407] flags: 0x200000000000000(node=0|zone=2)
[   28.631533] page_type: f5(slab)
[   28.631912] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   28.632611] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   28.633351] page dumped because: kasan: bad access detected
[   28.634099] 
[   28.634284] Memory state around the buggy address:
[   28.634961]  ffff888103231b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.635817]  ffff888103231b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.636803] >ffff888103231c00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   28.637505]                                      ^
[   28.638192]  ffff888103231c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.638620]  ffff888103231d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.639514] ==================================================================
[   26.228555] ==================================================================
[   26.229980] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x5fe/0x5450
[   26.232808] Write of size 4 at addr ffff888103231c30 by task kunit_try_catch/286
[   26.233425] 
[   26.233619] CPU: 1 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G    B            N  6.14.0-rc7-next-20250319 #1 PREEMPT(voluntary) 
[   26.234804] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.234853] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   26.234916] Call Trace:
[   26.234952]  <TASK>
[   26.234991]  dump_stack_lvl+0x73/0xb0
[   26.235073]  print_report+0xd1/0x660
[   26.235170]  ? __virt_addr_valid+0x1db/0x2d0
[   26.235297]  ? kasan_complete_mode_report_info+0x2a/0x200
[   26.235377]  kasan_report+0x104/0x140
[   26.235443]  ? kasan_atomics_helper+0x5fe/0x5450
[   26.235516]  ? kasan_atomics_helper+0x5fe/0x5450
[   26.235628]  kasan_check_range+0x10c/0x1c0
[   26.235823]  __kasan_check_write+0x18/0x20
[   26.236463]  kasan_atomics_helper+0x5fe/0x5450
[   26.236556]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   26.236632]  ? kasan_save_alloc_info+0x3b/0x50
[   26.236847]  kasan_atomics+0x1dc/0x310
[   26.237031]  ? __pfx_kasan_atomics+0x10/0x10
[   26.237498]  ? __pfx_read_tsc+0x10/0x10
[   26.237574]  ? ktime_get_ts64+0x86/0x240
[   26.237649]  kunit_try_run_case+0x1b2/0x490
[   26.237768]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.237835]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   26.237873]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   26.237911]  ? __kthread_parkme+0x82/0x160
[   26.237946]  ? preempt_count_sub+0x50/0x80
[   26.237984]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.238020]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.238057]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   26.238092]  kthread+0x323/0x710
[   26.238149]  ? trace_preempt_on+0x20/0xc0
[   26.238186]  ? __pfx_kthread+0x10/0x10
[   26.238221]  ? _raw_spin_unlock_irq+0x47/0x80
[   26.238252]  ? calculate_sigpending+0x7b/0xa0
[   26.238286]  ? __pfx_kthread+0x10/0x10
[   26.238320]  ret_from_fork+0x41/0x80
[   26.238354]  ? __pfx_kthread+0x10/0x10
[   26.238388]  ret_from_fork_asm+0x1a/0x30
[   26.238436]  </TASK>
[   26.238453] 
[   26.256227] Allocated by task 286:
[   26.257048]  kasan_save_stack+0x3d/0x60
[   26.257514]  kasan_save_track+0x18/0x40
[   26.258035]  kasan_save_alloc_info+0x3b/0x50
[   26.258361]  __kasan_kmalloc+0xb7/0xc0
[   26.258941]  __kmalloc_cache_noprof+0x183/0x410
[   26.259750]  kasan_atomics+0x95/0x310
[   26.260506]  kunit_try_run_case+0x1b2/0x490
[   26.261106]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.261542]  kthread+0x323/0x710
[   26.261847]  ret_from_fork+0x41/0x80
[   26.262430]  ret_from_fork_asm+0x1a/0x30
[   26.262865] 
[   26.263354] The buggy address belongs to the object at ffff888103231c00
[   26.263354]  which belongs to the cache kmalloc-64 of size 64
[   26.264548] The buggy address is located 0 bytes to the right of
[   26.264548]  allocated 48-byte region [ffff888103231c00, ffff888103231c30)
[   26.265807] 
[   26.266189] The buggy address belongs to the physical page:
[   26.266935] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103231
[   26.267650] flags: 0x200000000000000(node=0|zone=2)
[   26.267982] page_type: f5(slab)
[   26.268309] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   26.269433] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   26.270332] page dumped because: kasan: bad access detected
[   26.270650] 
[   26.271056] Memory state around the buggy address:
[   26.271681]  ffff888103231b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.272385]  ffff888103231b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.273064] >ffff888103231c00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   26.273593]                                      ^
[   26.274310]  ffff888103231c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.275172]  ffff888103231d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.276060] ==================================================================
[   26.487688] ==================================================================
[   26.488237] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x992/0x5450
[   26.489028] Write of size 4 at addr ffff888103231c30 by task kunit_try_catch/286
[   26.489457] 
[   26.489651] CPU: 1 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G    B            N  6.14.0-rc7-next-20250319 #1 PREEMPT(voluntary) 
[   26.489797] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.489839] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   26.489924] Call Trace:
[   26.489961]  <TASK>
[   26.490000]  dump_stack_lvl+0x73/0xb0
[   26.490080]  print_report+0xd1/0x660
[   26.490174]  ? __virt_addr_valid+0x1db/0x2d0
[   26.490307]  ? kasan_complete_mode_report_info+0x2a/0x200
[   26.490386]  kasan_report+0x104/0x140
[   26.490449]  ? kasan_atomics_helper+0x992/0x5450
[   26.490522]  ? kasan_atomics_helper+0x992/0x5450
[   26.490607]  kasan_check_range+0x10c/0x1c0
[   26.490678]  __kasan_check_write+0x18/0x20
[   26.490767]  kasan_atomics_helper+0x992/0x5450
[   26.490886]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   26.490971]  ? kasan_save_alloc_info+0x3b/0x50
[   26.491056]  kasan_atomics+0x1dc/0x310
[   26.491154]  ? __pfx_kasan_atomics+0x10/0x10
[   26.491229]  ? __pfx_read_tsc+0x10/0x10
[   26.491340]  ? ktime_get_ts64+0x86/0x240
[   26.491424]  kunit_try_run_case+0x1b2/0x490
[   26.491493]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.491558]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   26.491651]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   26.491742]  ? __kthread_parkme+0x82/0x160
[   26.491838]  ? preempt_count_sub+0x50/0x80
[   26.491952]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.492031]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.492102]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   26.492223]  kthread+0x323/0x710
[   26.492316]  ? trace_preempt_on+0x20/0xc0
[   26.492386]  ? __pfx_kthread+0x10/0x10
[   26.492447]  ? _raw_spin_unlock_irq+0x47/0x80
[   26.492510]  ? calculate_sigpending+0x7b/0xa0
[   26.492591]  ? __pfx_kthread+0x10/0x10
[   26.492689]  ret_from_fork+0x41/0x80
[   26.492789]  ? __pfx_kthread+0x10/0x10
[   26.492857]  ret_from_fork_asm+0x1a/0x30
[   26.492949]  </TASK>
[   26.492983] 
[   26.509132] Allocated by task 286:
[   26.509383]  kasan_save_stack+0x3d/0x60
[   26.509664]  kasan_save_track+0x18/0x40
[   26.509930]  kasan_save_alloc_info+0x3b/0x50
[   26.510380]  __kasan_kmalloc+0xb7/0xc0
[   26.510926]  __kmalloc_cache_noprof+0x183/0x410
[   26.511496]  kasan_atomics+0x95/0x310
[   26.512266]  kunit_try_run_case+0x1b2/0x490
[   26.512850]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.513545]  kthread+0x323/0x710
[   26.514141]  ret_from_fork+0x41/0x80
[   26.514647]  ret_from_fork_asm+0x1a/0x30
[   26.515189] 
[   26.515486] The buggy address belongs to the object at ffff888103231c00
[   26.515486]  which belongs to the cache kmalloc-64 of size 64
[   26.516836] The buggy address is located 0 bytes to the right of
[   26.516836]  allocated 48-byte region [ffff888103231c00, ffff888103231c30)
[   26.518290] 
[   26.518550] The buggy address belongs to the physical page:
[   26.519466] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103231
[   26.520342] flags: 0x200000000000000(node=0|zone=2)
[   26.520904] page_type: f5(slab)
[   26.521404] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   26.522223] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   26.522991] page dumped because: kasan: bad access detected
[   26.523885] 
[   26.524212] Memory state around the buggy address:
[   26.524765]  ffff888103231b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.525573]  ffff888103231b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.526429] >ffff888103231c00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   26.527046]                                      ^
[   26.527455]  ffff888103231c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.528347]  ffff888103231d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.528978] ==================================================================
[   27.625609] ==================================================================
[   27.626339] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x16e7/0x5450
[   27.626798] Write of size 8 at addr ffff888103231c30 by task kunit_try_catch/286
[   27.627579] 
[   27.627953] CPU: 1 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G    B            N  6.14.0-rc7-next-20250319 #1 PREEMPT(voluntary) 
[   27.628081] Tainted: [B]=BAD_PAGE, [N]=TEST
[   27.628169] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   27.628234] Call Trace:
[   27.628270]  <TASK>
[   27.628307]  dump_stack_lvl+0x73/0xb0
[   27.628388]  print_report+0xd1/0x660
[   27.628459]  ? __virt_addr_valid+0x1db/0x2d0
[   27.628585]  ? kasan_complete_mode_report_info+0x2a/0x200
[   27.628664]  kasan_report+0x104/0x140
[   27.628774]  ? kasan_atomics_helper+0x16e7/0x5450
[   27.628848]  ? kasan_atomics_helper+0x16e7/0x5450
[   27.628928]  kasan_check_range+0x10c/0x1c0
[   27.629052]  __kasan_check_write+0x18/0x20
[   27.629143]  kasan_atomics_helper+0x16e7/0x5450
[   27.629214]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   27.629283]  ? kasan_save_alloc_info+0x3b/0x50
[   27.629385]  kasan_atomics+0x1dc/0x310
[   27.629485]  ? __pfx_kasan_atomics+0x10/0x10
[   27.629563]  ? __pfx_read_tsc+0x10/0x10
[   27.629627]  ? ktime_get_ts64+0x86/0x240
[   27.629699]  kunit_try_run_case+0x1b2/0x490
[   27.629835]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.629906]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   27.629975]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   27.630086]  ? __kthread_parkme+0x82/0x160
[   27.630178]  ? preempt_count_sub+0x50/0x80
[   27.630260]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.630333]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.630406]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   27.630478]  kthread+0x323/0x710
[   27.630538]  ? trace_preempt_on+0x20/0xc0
[   27.630608]  ? __pfx_kthread+0x10/0x10
[   27.630664]  ? _raw_spin_unlock_irq+0x47/0x80
[   27.630774]  ? calculate_sigpending+0x7b/0xa0
[   27.630870]  ? __pfx_kthread+0x10/0x10
[   27.630970]  ret_from_fork+0x41/0x80
[   27.631040]  ? __pfx_kthread+0x10/0x10
[   27.631100]  ret_from_fork_asm+0x1a/0x30
[   27.631217]  </TASK>
[   27.631250] 
[   27.648260] Allocated by task 286:
[   27.648674]  kasan_save_stack+0x3d/0x60
[   27.649145]  kasan_save_track+0x18/0x40
[   27.649770]  kasan_save_alloc_info+0x3b/0x50
[   27.650245]  __kasan_kmalloc+0xb7/0xc0
[   27.650635]  __kmalloc_cache_noprof+0x183/0x410
[   27.651351]  kasan_atomics+0x95/0x310
[   27.651664]  kunit_try_run_case+0x1b2/0x490
[   27.651982]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.652534]  kthread+0x323/0x710
[   27.653026]  ret_from_fork+0x41/0x80
[   27.653623]  ret_from_fork_asm+0x1a/0x30
[   27.654076] 
[   27.654331] The buggy address belongs to the object at ffff888103231c00
[   27.654331]  which belongs to the cache kmalloc-64 of size 64
[   27.655668] The buggy address is located 0 bytes to the right of
[   27.655668]  allocated 48-byte region [ffff888103231c00, ffff888103231c30)
[   27.656794] 
[   27.658322] The buggy address belongs to the physical page:
[   27.658752] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103231
[   27.659716] flags: 0x200000000000000(node=0|zone=2)
[   27.662438] page_type: f5(slab)
[   27.663041] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   27.664640] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   27.666517] page dumped because: kasan: bad access detected
[   27.667277] 
[   27.667837] Memory state around the buggy address:
[   27.668605]  ffff888103231b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.669938]  ffff888103231b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.670350] >ffff888103231c00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   27.670710]                                      ^
[   27.671014]  ffff888103231c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.671945]  ffff888103231d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.672741] ==================================================================
[   27.372004] ==================================================================
[   27.372857] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4eae/0x5450
[   27.373706] Read of size 8 at addr ffff888103231c30 by task kunit_try_catch/286
[   27.374734] 
[   27.374992] CPU: 1 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G    B            N  6.14.0-rc7-next-20250319 #1 PREEMPT(voluntary) 
[   27.375147] Tainted: [B]=BAD_PAGE, [N]=TEST
[   27.375189] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   27.375228] Call Trace:
[   27.375248]  <TASK>
[   27.375269]  dump_stack_lvl+0x73/0xb0
[   27.375314]  print_report+0xd1/0x660
[   27.375365]  ? __virt_addr_valid+0x1db/0x2d0
[   27.375484]  ? kasan_complete_mode_report_info+0x2a/0x200
[   27.375560]  kasan_report+0x104/0x140
[   27.375655]  ? kasan_atomics_helper+0x4eae/0x5450
[   27.375730]  ? kasan_atomics_helper+0x4eae/0x5450
[   27.376263]  __asan_report_load8_noabort+0x18/0x20
[   27.376340]  kasan_atomics_helper+0x4eae/0x5450
[   27.376414]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   27.376489]  ? kasan_save_alloc_info+0x3b/0x50
[   27.376549]  kasan_atomics+0x1dc/0x310
[   27.376589]  ? __pfx_kasan_atomics+0x10/0x10
[   27.376628]  ? __pfx_read_tsc+0x10/0x10
[   27.376663]  ? ktime_get_ts64+0x86/0x240
[   27.376719]  kunit_try_run_case+0x1b2/0x490
[   27.376786]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.376821]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   27.376856]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   27.376892]  ? __kthread_parkme+0x82/0x160
[   27.376925]  ? preempt_count_sub+0x50/0x80
[   27.376965]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.377001]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.377037]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   27.377072]  kthread+0x323/0x710
[   27.377105]  ? trace_preempt_on+0x20/0xc0
[   27.377163]  ? __pfx_kthread+0x10/0x10
[   27.377198]  ? _raw_spin_unlock_irq+0x47/0x80
[   27.377231]  ? calculate_sigpending+0x7b/0xa0
[   27.377265]  ? __pfx_kthread+0x10/0x10
[   27.377299]  ret_from_fork+0x41/0x80
[   27.377333]  ? __pfx_kthread+0x10/0x10
[   27.377367]  ret_from_fork_asm+0x1a/0x30
[   27.377416]  </TASK>
[   27.377433] 
[   27.397468] Allocated by task 286:
[   27.397700]  kasan_save_stack+0x3d/0x60
[   27.398275]  kasan_save_track+0x18/0x40
[   27.398712]  kasan_save_alloc_info+0x3b/0x50
[   27.399462]  __kasan_kmalloc+0xb7/0xc0
[   27.401015]  __kmalloc_cache_noprof+0x183/0x410
[   27.401386]  kasan_atomics+0x95/0x310
[   27.403106]  kunit_try_run_case+0x1b2/0x490
[   27.403444]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.403823]  kthread+0x323/0x710
[   27.404151]  ret_from_fork+0x41/0x80
[   27.404542]  ret_from_fork_asm+0x1a/0x30
[   27.404976] 
[   27.405417] The buggy address belongs to the object at ffff888103231c00
[   27.405417]  which belongs to the cache kmalloc-64 of size 64
[   27.405999] The buggy address is located 0 bytes to the right of
[   27.405999]  allocated 48-byte region [ffff888103231c00, ffff888103231c30)
[   27.406604] 
[   27.406753] The buggy address belongs to the physical page:
[   27.408506] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103231
[   27.408924] flags: 0x200000000000000(node=0|zone=2)
[   27.411014] page_type: f5(slab)
[   27.411696] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   27.412475] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   27.413214] page dumped because: kasan: bad access detected
[   27.413807] 
[   27.414039] Memory state around the buggy address:
[   27.414565]  ffff888103231b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.415212]  ffff888103231b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.415624] >ffff888103231c00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   27.416333]                                      ^
[   27.416905]  ffff888103231c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.417644]  ffff888103231d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.418325] ==================================================================
[   27.244063] ==================================================================
[   27.244700] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x12e6/0x5450
[   27.245227] Write of size 4 at addr ffff888103231c30 by task kunit_try_catch/286
[   27.246072] 
[   27.246385] CPU: 1 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G    B            N  6.14.0-rc7-next-20250319 #1 PREEMPT(voluntary) 
[   27.246516] Tainted: [B]=BAD_PAGE, [N]=TEST
[   27.246555] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   27.246617] Call Trace:
[   27.246652]  <TASK>
[   27.246692]  dump_stack_lvl+0x73/0xb0
[   27.246832]  print_report+0xd1/0x660
[   27.246961]  ? __virt_addr_valid+0x1db/0x2d0
[   27.247183]  ? kasan_complete_mode_report_info+0x2a/0x200
[   27.247302]  kasan_report+0x104/0x140
[   27.247402]  ? kasan_atomics_helper+0x12e6/0x5450
[   27.247529]  ? kasan_atomics_helper+0x12e6/0x5450
[   27.247648]  kasan_check_range+0x10c/0x1c0
[   27.247775]  __kasan_check_write+0x18/0x20
[   27.247850]  kasan_atomics_helper+0x12e6/0x5450
[   27.247937]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   27.248012]  ? kasan_save_alloc_info+0x3b/0x50
[   27.248087]  kasan_atomics+0x1dc/0x310
[   27.248154]  ? __pfx_kasan_atomics+0x10/0x10
[   27.248196]  ? __pfx_read_tsc+0x10/0x10
[   27.248231]  ? ktime_get_ts64+0x86/0x240
[   27.248271]  kunit_try_run_case+0x1b2/0x490
[   27.248308]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.248342]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   27.248375]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   27.248410]  ? __kthread_parkme+0x82/0x160
[   27.248444]  ? preempt_count_sub+0x50/0x80
[   27.248483]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.248519]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.248554]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   27.248590]  kthread+0x323/0x710
[   27.248623]  ? trace_preempt_on+0x20/0xc0
[   27.248658]  ? __pfx_kthread+0x10/0x10
[   27.248693]  ? _raw_spin_unlock_irq+0x47/0x80
[   27.248769]  ? calculate_sigpending+0x7b/0xa0
[   27.248805]  ? __pfx_kthread+0x10/0x10
[   27.248840]  ret_from_fork+0x41/0x80
[   27.248874]  ? __pfx_kthread+0x10/0x10
[   27.248909]  ret_from_fork_asm+0x1a/0x30
[   27.248958]  </TASK>
[   27.248975] 
[   27.265226] Allocated by task 286:
[   27.265598]  kasan_save_stack+0x3d/0x60
[   27.266187]  kasan_save_track+0x18/0x40
[   27.266707]  kasan_save_alloc_info+0x3b/0x50
[   27.267287]  __kasan_kmalloc+0xb7/0xc0
[   27.267742]  __kmalloc_cache_noprof+0x183/0x410
[   27.268377]  kasan_atomics+0x95/0x310
[   27.268659]  kunit_try_run_case+0x1b2/0x490
[   27.269199]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.269951]  kthread+0x323/0x710
[   27.270497]  ret_from_fork+0x41/0x80
[   27.270975]  ret_from_fork_asm+0x1a/0x30
[   27.271386] 
[   27.271551] The buggy address belongs to the object at ffff888103231c00
[   27.271551]  which belongs to the cache kmalloc-64 of size 64
[   27.272190] The buggy address is located 0 bytes to the right of
[   27.272190]  allocated 48-byte region [ffff888103231c00, ffff888103231c30)
[   27.273444] 
[   27.273946] The buggy address belongs to the physical page:
[   27.274676] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103231
[   27.275557] flags: 0x200000000000000(node=0|zone=2)
[   27.276249] page_type: f5(slab)
[   27.276749] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   27.277332] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   27.278316] page dumped because: kasan: bad access detected
[   27.278833] 
[   27.279158] Memory state around the buggy address:
[   27.279649]  ffff888103231b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.280356]  ffff888103231b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.281089] >ffff888103231c00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   27.281999]                                      ^
[   27.282688]  ffff888103231c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.283375]  ffff888103231d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.284240] ==================================================================
[   26.060602] ==================================================================
[   26.064563] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b54/0x5450
[   26.066625] Read of size 4 at addr ffff888103231c30 by task kunit_try_catch/286
[   26.067011] 
[   26.067258] CPU: 1 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G    B            N  6.14.0-rc7-next-20250319 #1 PREEMPT(voluntary) 
[   26.067382] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.067415] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   26.068000] Call Trace:
[   26.068054]  <TASK>
[   26.068092]  dump_stack_lvl+0x73/0xb0
[   26.068249]  print_report+0xd1/0x660
[   26.068319]  ? __virt_addr_valid+0x1db/0x2d0
[   26.068445]  ? kasan_complete_mode_report_info+0x2a/0x200
[   26.068519]  kasan_report+0x104/0x140
[   26.068578]  ? kasan_atomics_helper+0x4b54/0x5450
[   26.068648]  ? kasan_atomics_helper+0x4b54/0x5450
[   26.068728]  __asan_report_load4_noabort+0x18/0x20
[   26.068793]  kasan_atomics_helper+0x4b54/0x5450
[   26.068851]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   26.068917]  ? kasan_save_alloc_info+0x3b/0x50
[   26.068999]  kasan_atomics+0x1dc/0x310
[   26.069064]  ? __pfx_kasan_atomics+0x10/0x10
[   26.069769]  ? __pfx_read_tsc+0x10/0x10
[   26.069855]  ? ktime_get_ts64+0x86/0x240
[   26.069928]  kunit_try_run_case+0x1b2/0x490
[   26.069996]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.070321]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   26.070393]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   26.070504]  ? __kthread_parkme+0x82/0x160
[   26.070569]  ? preempt_count_sub+0x50/0x80
[   26.070643]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.070712]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.070783]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   26.070884]  kthread+0x323/0x710
[   26.070947]  ? trace_preempt_on+0x20/0xc0
[   26.071015]  ? __pfx_kthread+0x10/0x10
[   26.071076]  ? _raw_spin_unlock_irq+0x47/0x80
[   26.071163]  ? calculate_sigpending+0x7b/0xa0
[   26.071225]  ? __pfx_kthread+0x10/0x10
[   26.071287]  ret_from_fork+0x41/0x80
[   26.071352]  ? __pfx_kthread+0x10/0x10
[   26.071415]  ret_from_fork_asm+0x1a/0x30
[   26.071508]  </TASK>
[   26.071541] 
[   26.088035] Allocated by task 286:
[   26.088508]  kasan_save_stack+0x3d/0x60
[   26.089037]  kasan_save_track+0x18/0x40
[   26.089459]  kasan_save_alloc_info+0x3b/0x50
[   26.090036]  __kasan_kmalloc+0xb7/0xc0
[   26.090358]  __kmalloc_cache_noprof+0x183/0x410
[   26.091023]  kasan_atomics+0x95/0x310
[   26.091582]  kunit_try_run_case+0x1b2/0x490
[   26.092334]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.093133]  kthread+0x323/0x710
[   26.093746]  ret_from_fork+0x41/0x80
[   26.094365]  ret_from_fork_asm+0x1a/0x30
[   26.094917] 
[   26.095173] The buggy address belongs to the object at ffff888103231c00
[   26.095173]  which belongs to the cache kmalloc-64 of size 64
[   26.096039] The buggy address is located 0 bytes to the right of
[   26.096039]  allocated 48-byte region [ffff888103231c00, ffff888103231c30)
[   26.097386] 
[   26.097691] The buggy address belongs to the physical page:
[   26.098345] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103231
[   26.099269] flags: 0x200000000000000(node=0|zone=2)
[   26.099926] page_type: f5(slab)
[   26.100658] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   26.101272] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   26.102213] page dumped because: kasan: bad access detected
[   26.102992] 
[   26.103400] Memory state around the buggy address:
[   26.104067]  ffff888103231b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.104693]  ffff888103231b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.105974] >ffff888103231c00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   26.106449]                                      ^
[   26.107254]  ffff888103231c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.108096]  ffff888103231d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.109227] ==================================================================
[   26.014375] ==================================================================
[   26.015254] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3df/0x5450
[   26.015697] Read of size 4 at addr ffff888103231c30 by task kunit_try_catch/286
[   26.016462] 
[   26.017571] CPU: 1 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G    B            N  6.14.0-rc7-next-20250319 #1 PREEMPT(voluntary) 
[   26.017731] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.017770] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   26.017827] Call Trace:
[   26.017860]  <TASK>
[   26.017892]  dump_stack_lvl+0x73/0xb0
[   26.018082]  print_report+0xd1/0x660
[   26.018187]  ? __virt_addr_valid+0x1db/0x2d0
[   26.018315]  ? kasan_complete_mode_report_info+0x2a/0x200
[   26.018390]  kasan_report+0x104/0x140
[   26.018449]  ? kasan_atomics_helper+0x3df/0x5450
[   26.018517]  ? kasan_atomics_helper+0x3df/0x5450
[   26.018571]  kasan_check_range+0x10c/0x1c0
[   26.018608]  __kasan_check_read+0x15/0x20
[   26.018641]  kasan_atomics_helper+0x3df/0x5450
[   26.018675]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   26.018716]  ? kasan_save_alloc_info+0x3b/0x50
[   26.018830]  kasan_atomics+0x1dc/0x310
[   26.018866]  ? __pfx_kasan_atomics+0x10/0x10
[   26.018903]  ? __pfx_read_tsc+0x10/0x10
[   26.018936]  ? ktime_get_ts64+0x86/0x240
[   26.018973]  kunit_try_run_case+0x1b2/0x490
[   26.019008]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.019040]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   26.019072]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   26.019104]  ? __kthread_parkme+0x82/0x160
[   26.019160]  ? preempt_count_sub+0x50/0x80
[   26.019197]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.019231]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.019265]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   26.019299]  kthread+0x323/0x710
[   26.019329]  ? trace_preempt_on+0x20/0xc0
[   26.019363]  ? __pfx_kthread+0x10/0x10
[   26.019393]  ? _raw_spin_unlock_irq+0x47/0x80
[   26.019423]  ? calculate_sigpending+0x7b/0xa0
[   26.019454]  ? __pfx_kthread+0x10/0x10
[   26.019487]  ret_from_fork+0x41/0x80
[   26.019519]  ? __pfx_kthread+0x10/0x10
[   26.019550]  ret_from_fork_asm+0x1a/0x30
[   26.019623]  </TASK>
[   26.019639] 
[   26.039399] Allocated by task 286:
[   26.039717]  kasan_save_stack+0x3d/0x60
[   26.040737]  kasan_save_track+0x18/0x40
[   26.041355]  kasan_save_alloc_info+0x3b/0x50
[   26.041682]  __kasan_kmalloc+0xb7/0xc0
[   26.042389]  __kmalloc_cache_noprof+0x183/0x410
[   26.042777]  kasan_atomics+0x95/0x310
[   26.043744]  kunit_try_run_case+0x1b2/0x490
[   26.044141]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.044621]  kthread+0x323/0x710
[   26.045260]  ret_from_fork+0x41/0x80
[   26.045684]  ret_from_fork_asm+0x1a/0x30
[   26.046029] 
[   26.046270] The buggy address belongs to the object at ffff888103231c00
[   26.046270]  which belongs to the cache kmalloc-64 of size 64
[   26.047143] The buggy address is located 0 bytes to the right of
[   26.047143]  allocated 48-byte region [ffff888103231c00, ffff888103231c30)
[   26.048790] 
[   26.049627] The buggy address belongs to the physical page:
[   26.050319] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103231
[   26.051141] flags: 0x200000000000000(node=0|zone=2)
[   26.051527] page_type: f5(slab)
[   26.051926] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   26.053382] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   26.053826] page dumped because: kasan: bad access detected
[   26.054131] 
[   26.054332] Memory state around the buggy address:
[   26.054599]  ffff888103231b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.057700]  ffff888103231b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.058350] >ffff888103231c00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   26.058706]                                      ^
[   26.058969]  ffff888103231c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.059344]  ffff888103231d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.059715] ==================================================================
[   28.550094] ==================================================================
[   28.550807] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4fa5/0x5450
[   28.551398] Read of size 8 at addr ffff888103231c30 by task kunit_try_catch/286
[   28.552270] 
[   28.552717] CPU: 1 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G    B            N  6.14.0-rc7-next-20250319 #1 PREEMPT(voluntary) 
[   28.552849] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.552890] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   28.552948] Call Trace:
[   28.552985]  <TASK>
[   28.553024]  dump_stack_lvl+0x73/0xb0
[   28.553103]  print_report+0xd1/0x660
[   28.553192]  ? __virt_addr_valid+0x1db/0x2d0
[   28.553315]  ? kasan_complete_mode_report_info+0x2a/0x200
[   28.553392]  kasan_report+0x104/0x140
[   28.553456]  ? kasan_atomics_helper+0x4fa5/0x5450
[   28.553586]  ? kasan_atomics_helper+0x4fa5/0x5450
[   28.553747]  __asan_report_load8_noabort+0x18/0x20
[   28.553826]  kasan_atomics_helper+0x4fa5/0x5450
[   28.553904]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   28.553979]  ? kasan_save_alloc_info+0x3b/0x50
[   28.554067]  kasan_atomics+0x1dc/0x310
[   28.554157]  ? __pfx_kasan_atomics+0x10/0x10
[   28.554202]  ? __pfx_read_tsc+0x10/0x10
[   28.554237]  ? ktime_get_ts64+0x86/0x240
[   28.554278]  kunit_try_run_case+0x1b2/0x490
[   28.554314]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.554348]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   28.554382]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   28.554417]  ? __kthread_parkme+0x82/0x160
[   28.554449]  ? preempt_count_sub+0x50/0x80
[   28.554488]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.554525]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.554559]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   28.554595]  kthread+0x323/0x710
[   28.554626]  ? trace_preempt_on+0x20/0xc0
[   28.554662]  ? __pfx_kthread+0x10/0x10
[   28.554695]  ? _raw_spin_unlock_irq+0x47/0x80
[   28.554774]  ? calculate_sigpending+0x7b/0xa0
[   28.554808]  ? __pfx_kthread+0x10/0x10
[   28.554843]  ret_from_fork+0x41/0x80
[   28.554878]  ? __pfx_kthread+0x10/0x10
[   28.554912]  ret_from_fork_asm+0x1a/0x30
[   28.554962]  </TASK>
[   28.554979] 
[   28.574270] Allocated by task 286:
[   28.574783]  kasan_save_stack+0x3d/0x60
[   28.575566]  kasan_save_track+0x18/0x40
[   28.576204]  kasan_save_alloc_info+0x3b/0x50
[   28.576659]  __kasan_kmalloc+0xb7/0xc0
[   28.577285]  __kmalloc_cache_noprof+0x183/0x410
[   28.577732]  kasan_atomics+0x95/0x310
[   28.578090]  kunit_try_run_case+0x1b2/0x490
[   28.578491]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.579563]  kthread+0x323/0x710
[   28.580021]  ret_from_fork+0x41/0x80
[   28.580790]  ret_from_fork_asm+0x1a/0x30
[   28.581156] 
[   28.581551] The buggy address belongs to the object at ffff888103231c00
[   28.581551]  which belongs to the cache kmalloc-64 of size 64
[   28.582709] The buggy address is located 0 bytes to the right of
[   28.582709]  allocated 48-byte region [ffff888103231c00, ffff888103231c30)
[   28.583601] 
[   28.583932] The buggy address belongs to the physical page:
[   28.584501] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103231
[   28.584935] flags: 0x200000000000000(node=0|zone=2)
[   28.585458] page_type: f5(slab)
[   28.585973] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   28.586657] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   28.587351] page dumped because: kasan: bad access detected
[   28.587701] 
[   28.587943] Memory state around the buggy address:
[   28.588591]  ffff888103231b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.589439]  ffff888103231b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.590047] >ffff888103231c00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   28.590960]                                      ^
[   28.591554]  ffff888103231c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.592341]  ffff888103231d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.592762] ==================================================================
[   28.169595] ==================================================================
[   28.170203] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1e12/0x5450
[   28.170754] Write of size 8 at addr ffff888103231c30 by task kunit_try_catch/286
[   28.171426] 
[   28.171745] CPU: 1 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G    B            N  6.14.0-rc7-next-20250319 #1 PREEMPT(voluntary) 
[   28.171883] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.171933] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   28.171992] Call Trace:
[   28.172028]  <TASK>
[   28.172065]  dump_stack_lvl+0x73/0xb0
[   28.172201]  print_report+0xd1/0x660
[   28.172273]  ? __virt_addr_valid+0x1db/0x2d0
[   28.172380]  ? kasan_complete_mode_report_info+0x2a/0x200
[   28.172423]  kasan_report+0x104/0x140
[   28.172457]  ? kasan_atomics_helper+0x1e12/0x5450
[   28.172503]  ? kasan_atomics_helper+0x1e12/0x5450
[   28.172587]  kasan_check_range+0x10c/0x1c0
[   28.172652]  __kasan_check_write+0x18/0x20
[   28.172758]  kasan_atomics_helper+0x1e12/0x5450
[   28.172866]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   28.172972]  ? kasan_save_alloc_info+0x3b/0x50
[   28.173058]  kasan_atomics+0x1dc/0x310
[   28.173153]  ? __pfx_kasan_atomics+0x10/0x10
[   28.173227]  ? __pfx_read_tsc+0x10/0x10
[   28.173294]  ? ktime_get_ts64+0x86/0x240
[   28.173370]  kunit_try_run_case+0x1b2/0x490
[   28.173444]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.173510]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   28.173575]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   28.173645]  ? __kthread_parkme+0x82/0x160
[   28.173763]  ? preempt_count_sub+0x50/0x80
[   28.173904]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.173987]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.174062]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   28.174155]  kthread+0x323/0x710
[   28.174224]  ? trace_preempt_on+0x20/0xc0
[   28.174295]  ? __pfx_kthread+0x10/0x10
[   28.174363]  ? _raw_spin_unlock_irq+0x47/0x80
[   28.174426]  ? calculate_sigpending+0x7b/0xa0
[   28.174485]  ? __pfx_kthread+0x10/0x10
[   28.174524]  ret_from_fork+0x41/0x80
[   28.174562]  ? __pfx_kthread+0x10/0x10
[   28.174597]  ret_from_fork_asm+0x1a/0x30
[   28.174646]  </TASK>
[   28.174664] 
[   28.193868] Allocated by task 286:
[   28.194192]  kasan_save_stack+0x3d/0x60
[   28.195334]  kasan_save_track+0x18/0x40
[   28.195650]  kasan_save_alloc_info+0x3b/0x50
[   28.195966]  __kasan_kmalloc+0xb7/0xc0
[   28.196271]  __kmalloc_cache_noprof+0x183/0x410
[   28.196559]  kasan_atomics+0x95/0x310
[   28.196810]  kunit_try_run_case+0x1b2/0x490
[   28.197093]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.198501]  kthread+0x323/0x710
[   28.198964]  ret_from_fork+0x41/0x80
[   28.199429]  ret_from_fork_asm+0x1a/0x30
[   28.200027] 
[   28.200321] The buggy address belongs to the object at ffff888103231c00
[   28.200321]  which belongs to the cache kmalloc-64 of size 64
[   28.202057] The buggy address is located 0 bytes to the right of
[   28.202057]  allocated 48-byte region [ffff888103231c00, ffff888103231c30)
[   28.203655] 
[   28.203973] The buggy address belongs to the physical page:
[   28.204669] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103231
[   28.205565] flags: 0x200000000000000(node=0|zone=2)
[   28.206214] page_type: f5(slab)
[   28.206634] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   28.207547] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   28.208439] page dumped because: kasan: bad access detected
[   28.209131] 
[   28.209455] Memory state around the buggy address:
[   28.210100]  ffff888103231b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.210918]  ffff888103231b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.211393] >ffff888103231c00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   28.211798]                                      ^
[   28.212105]  ffff888103231c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.212505]  ffff888103231d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.212878] ==================================================================
[   27.105310] ==================================================================
[   27.106186] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a02/0x5450
[   27.106649] Read of size 4 at addr ffff888103231c30 by task kunit_try_catch/286
[   27.107379] 
[   27.107668] CPU: 1 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G    B            N  6.14.0-rc7-next-20250319 #1 PREEMPT(voluntary) 
[   27.107800] Tainted: [B]=BAD_PAGE, [N]=TEST
[   27.107841] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   27.107905] Call Trace:
[   27.107954]  <TASK>
[   27.107996]  dump_stack_lvl+0x73/0xb0
[   27.108077]  print_report+0xd1/0x660
[   27.108178]  ? __virt_addr_valid+0x1db/0x2d0
[   27.108304]  ? kasan_complete_mode_report_info+0x2a/0x200
[   27.108419]  kasan_report+0x104/0x140
[   27.108497]  ? kasan_atomics_helper+0x4a02/0x5450
[   27.108572]  ? kasan_atomics_helper+0x4a02/0x5450
[   27.108652]  __asan_report_load4_noabort+0x18/0x20
[   27.108723]  kasan_atomics_helper+0x4a02/0x5450
[   27.108863]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   27.108953]  ? kasan_save_alloc_info+0x3b/0x50
[   27.109042]  kasan_atomics+0x1dc/0x310
[   27.109136]  ? __pfx_kasan_atomics+0x10/0x10
[   27.109216]  ? __pfx_read_tsc+0x10/0x10
[   27.109280]  ? ktime_get_ts64+0x86/0x240
[   27.109412]  kunit_try_run_case+0x1b2/0x490
[   27.109489]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.109555]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   27.109608]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   27.109646]  ? __kthread_parkme+0x82/0x160
[   27.109681]  ? preempt_count_sub+0x50/0x80
[   27.109765]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.109842]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.109909]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   27.109976]  kthread+0x323/0x710
[   27.110036]  ? trace_preempt_on+0x20/0xc0
[   27.110107]  ? __pfx_kthread+0x10/0x10
[   27.110201]  ? _raw_spin_unlock_irq+0x47/0x80
[   27.110270]  ? calculate_sigpending+0x7b/0xa0
[   27.110336]  ? __pfx_kthread+0x10/0x10
[   27.110406]  ret_from_fork+0x41/0x80
[   27.110475]  ? __pfx_kthread+0x10/0x10
[   27.110541]  ret_from_fork_asm+0x1a/0x30
[   27.110638]  </TASK>
[   27.110673] 
[   27.128511] Allocated by task 286:
[   27.128967]  kasan_save_stack+0x3d/0x60
[   27.129481]  kasan_save_track+0x18/0x40
[   27.130183]  kasan_save_alloc_info+0x3b/0x50
[   27.130868]  __kasan_kmalloc+0xb7/0xc0
[   27.132616]  __kmalloc_cache_noprof+0x183/0x410
[   27.134247]  kasan_atomics+0x95/0x310
[   27.135494]  kunit_try_run_case+0x1b2/0x490
[   27.136071]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.137470]  kthread+0x323/0x710
[   27.138461]  ret_from_fork+0x41/0x80
[   27.138855]  ret_from_fork_asm+0x1a/0x30
[   27.139149] 
[   27.139303] The buggy address belongs to the object at ffff888103231c00
[   27.139303]  which belongs to the cache kmalloc-64 of size 64
[   27.139905] The buggy address is located 0 bytes to the right of
[   27.139905]  allocated 48-byte region [ffff888103231c00, ffff888103231c30)
[   27.141173] 
[   27.141545] The buggy address belongs to the physical page:
[   27.142307] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103231
[   27.143211] flags: 0x200000000000000(node=0|zone=2)
[   27.144000] page_type: f5(slab)
[   27.144515] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   27.145479] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   27.146363] page dumped because: kasan: bad access detected
[   27.146908] 
[   27.147215] Memory state around the buggy address:
[   27.147835]  ffff888103231b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.148238]  ffff888103231b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.148894] >ffff888103231c00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   27.149449]                                      ^
[   27.149959]  ffff888103231c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.150470]  ffff888103231d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.151174] ==================================================================
[   28.374342] ==================================================================
[   28.376214] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4f98/0x5450
[   28.378324] Read of size 8 at addr ffff888103231c30 by task kunit_try_catch/286
[   28.380451] 
[   28.381073] CPU: 1 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G    B            N  6.14.0-rc7-next-20250319 #1 PREEMPT(voluntary) 
[   28.381205] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.381228] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   28.381261] Call Trace:
[   28.381282]  <TASK>
[   28.381303]  dump_stack_lvl+0x73/0xb0
[   28.381345]  print_report+0xd1/0x660
[   28.381381]  ? __virt_addr_valid+0x1db/0x2d0
[   28.381446]  ? kasan_complete_mode_report_info+0x2a/0x200
[   28.381485]  kasan_report+0x104/0x140
[   28.381516]  ? kasan_atomics_helper+0x4f98/0x5450
[   28.381551]  ? kasan_atomics_helper+0x4f98/0x5450
[   28.381593]  __asan_report_load8_noabort+0x18/0x20
[   28.381626]  kasan_atomics_helper+0x4f98/0x5450
[   28.381661]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   28.381698]  ? kasan_save_alloc_info+0x3b/0x50
[   28.381838]  kasan_atomics+0x1dc/0x310
[   28.381910]  ? __pfx_kasan_atomics+0x10/0x10
[   28.382204]  ? __pfx_read_tsc+0x10/0x10
[   28.382248]  ? ktime_get_ts64+0x86/0x240
[   28.382289]  kunit_try_run_case+0x1b2/0x490
[   28.382328]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.382363]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   28.382397]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   28.382432]  ? __kthread_parkme+0x82/0x160
[   28.382465]  ? preempt_count_sub+0x50/0x80
[   28.382504]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.382540]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.382575]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   28.382611]  kthread+0x323/0x710
[   28.382642]  ? trace_preempt_on+0x20/0xc0
[   28.382677]  ? __pfx_kthread+0x10/0x10
[   28.382759]  ? _raw_spin_unlock_irq+0x47/0x80
[   28.382798]  ? calculate_sigpending+0x7b/0xa0
[   28.382830]  ? __pfx_kthread+0x10/0x10
[   28.382866]  ret_from_fork+0x41/0x80
[   28.382902]  ? __pfx_kthread+0x10/0x10
[   28.382936]  ret_from_fork_asm+0x1a/0x30
[   28.382985]  </TASK>
[   28.383002] 
[   28.404338] Allocated by task 286:
[   28.404932]  kasan_save_stack+0x3d/0x60
[   28.405310]  kasan_save_track+0x18/0x40
[   28.406065]  kasan_save_alloc_info+0x3b/0x50
[   28.406506]  __kasan_kmalloc+0xb7/0xc0
[   28.407349]  __kmalloc_cache_noprof+0x183/0x410
[   28.407762]  kasan_atomics+0x95/0x310
[   28.408648]  kunit_try_run_case+0x1b2/0x490
[   28.409246]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.410164]  kthread+0x323/0x710
[   28.410756]  ret_from_fork+0x41/0x80
[   28.411407]  ret_from_fork_asm+0x1a/0x30
[   28.412251] 
[   28.412429] The buggy address belongs to the object at ffff888103231c00
[   28.412429]  which belongs to the cache kmalloc-64 of size 64
[   28.413739] The buggy address is located 0 bytes to the right of
[   28.413739]  allocated 48-byte region [ffff888103231c00, ffff888103231c30)
[   28.414603] 
[   28.414841] The buggy address belongs to the physical page:
[   28.415305] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103231
[   28.415957] flags: 0x200000000000000(node=0|zone=2)
[   28.416512] page_type: f5(slab)
[   28.416935] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   28.417556] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   28.418317] page dumped because: kasan: bad access detected
[   28.418822] 
[   28.419082] Memory state around the buggy address:
[   28.419643]  ffff888103231b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.420291]  ffff888103231b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.421072] >ffff888103231c00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   28.421472]                                      ^
[   28.422049]  ffff888103231c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.422898]  ffff888103231d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.423551] ==================================================================
[   27.064580] ==================================================================
[   27.065106] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1148/0x5450
[   27.065886] Write of size 4 at addr ffff888103231c30 by task kunit_try_catch/286
[   27.066511] 
[   27.066871] CPU: 1 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G    B            N  6.14.0-rc7-next-20250319 #1 PREEMPT(voluntary) 
[   27.067004] Tainted: [B]=BAD_PAGE, [N]=TEST
[   27.067043] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   27.067104] Call Trace:
[   27.067164]  <TASK>
[   27.067236]  dump_stack_lvl+0x73/0xb0
[   27.067331]  print_report+0xd1/0x660
[   27.067405]  ? __virt_addr_valid+0x1db/0x2d0
[   27.067527]  ? kasan_complete_mode_report_info+0x2a/0x200
[   27.067635]  kasan_report+0x104/0x140
[   27.067780]  ? kasan_atomics_helper+0x1148/0x5450
[   27.067878]  ? kasan_atomics_helper+0x1148/0x5450
[   27.067974]  kasan_check_range+0x10c/0x1c0
[   27.068051]  __kasan_check_write+0x18/0x20
[   27.068136]  kasan_atomics_helper+0x1148/0x5450
[   27.068262]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   27.068338]  ? kasan_save_alloc_info+0x3b/0x50
[   27.068423]  kasan_atomics+0x1dc/0x310
[   27.068496]  ? __pfx_kasan_atomics+0x10/0x10
[   27.068605]  ? __pfx_read_tsc+0x10/0x10
[   27.068688]  ? ktime_get_ts64+0x86/0x240
[   27.068818]  kunit_try_run_case+0x1b2/0x490
[   27.068897]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.068964]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   27.069082]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   27.069175]  ? __kthread_parkme+0x82/0x160
[   27.069241]  ? preempt_count_sub+0x50/0x80
[   27.069295]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.069335]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.069373]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   27.069422]  kthread+0x323/0x710
[   27.069478]  ? trace_preempt_on+0x20/0xc0
[   27.069544]  ? __pfx_kthread+0x10/0x10
[   27.069644]  ? _raw_spin_unlock_irq+0x47/0x80
[   27.069763]  ? calculate_sigpending+0x7b/0xa0
[   27.069839]  ? __pfx_kthread+0x10/0x10
[   27.069904]  ret_from_fork+0x41/0x80
[   27.069976]  ? __pfx_kthread+0x10/0x10
[   27.070086]  ret_from_fork_asm+0x1a/0x30
[   27.070206]  </TASK>
[   27.070247] 
[   27.084031] Allocated by task 286:
[   27.085380]  kasan_save_stack+0x3d/0x60
[   27.085819]  kasan_save_track+0x18/0x40
[   27.086258]  kasan_save_alloc_info+0x3b/0x50
[   27.086657]  __kasan_kmalloc+0xb7/0xc0
[   27.087002]  __kmalloc_cache_noprof+0x183/0x410
[   27.090065]  kasan_atomics+0x95/0x310
[   27.090598]  kunit_try_run_case+0x1b2/0x490
[   27.091243]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.091777]  kthread+0x323/0x710
[   27.092161]  ret_from_fork+0x41/0x80
[   27.092972]  ret_from_fork_asm+0x1a/0x30
[   27.093590] 
[   27.093823] The buggy address belongs to the object at ffff888103231c00
[   27.093823]  which belongs to the cache kmalloc-64 of size 64
[   27.094847] The buggy address is located 0 bytes to the right of
[   27.094847]  allocated 48-byte region [ffff888103231c00, ffff888103231c30)
[   27.095708] 
[   27.096009] The buggy address belongs to the physical page:
[   27.096601] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103231
[   27.097089] flags: 0x200000000000000(node=0|zone=2)
[   27.097680] page_type: f5(slab)
[   27.098130] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   27.098644] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   27.099245] page dumped because: kasan: bad access detected
[   27.099696] 
[   27.100015] Memory state around the buggy address:
[   27.100513]  ffff888103231b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.101107]  ffff888103231b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.101523] >ffff888103231c00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   27.102347]                                      ^
[   27.102853]  ffff888103231c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.103730]  ffff888103231d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.104186] ==================================================================
[   26.530096] ==================================================================
[   26.530749] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa2b/0x5450
[   26.531309] Write of size 4 at addr ffff888103231c30 by task kunit_try_catch/286
[   26.532153] 
[   26.532457] CPU: 1 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G    B            N  6.14.0-rc7-next-20250319 #1 PREEMPT(voluntary) 
[   26.532610] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.532651] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   26.532713] Call Trace:
[   26.532774]  <TASK>
[   26.532813]  dump_stack_lvl+0x73/0xb0
[   26.532893]  print_report+0xd1/0x660
[   26.532961]  ? __virt_addr_valid+0x1db/0x2d0
[   26.533085]  ? kasan_complete_mode_report_info+0x2a/0x200
[   26.533193]  kasan_report+0x104/0x140
[   26.533260]  ? kasan_atomics_helper+0xa2b/0x5450
[   26.533334]  ? kasan_atomics_helper+0xa2b/0x5450
[   26.533419]  kasan_check_range+0x10c/0x1c0
[   26.533496]  __kasan_check_write+0x18/0x20
[   26.533561]  kasan_atomics_helper+0xa2b/0x5450
[   26.533636]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   26.533712]  ? kasan_save_alloc_info+0x3b/0x50
[   26.533797]  kasan_atomics+0x1dc/0x310
[   26.533867]  ? __pfx_kasan_atomics+0x10/0x10
[   26.533991]  ? __pfx_read_tsc+0x10/0x10
[   26.534063]  ? ktime_get_ts64+0x86/0x240
[   26.534160]  kunit_try_run_case+0x1b2/0x490
[   26.534239]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.534304]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   26.534371]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   26.534439]  ? __kthread_parkme+0x82/0x160
[   26.534506]  ? preempt_count_sub+0x50/0x80
[   26.534583]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.534656]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.534757]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   26.534838]  kthread+0x323/0x710
[   26.534950]  ? trace_preempt_on+0x20/0xc0
[   26.535031]  ? __pfx_kthread+0x10/0x10
[   26.535141]  ? _raw_spin_unlock_irq+0x47/0x80
[   26.535214]  ? calculate_sigpending+0x7b/0xa0
[   26.535278]  ? __pfx_kthread+0x10/0x10
[   26.535341]  ret_from_fork+0x41/0x80
[   26.535409]  ? __pfx_kthread+0x10/0x10
[   26.535475]  ret_from_fork_asm+0x1a/0x30
[   26.535570]  </TASK>
[   26.535636] 
[   26.554969] Allocated by task 286:
[   26.555474]  kasan_save_stack+0x3d/0x60
[   26.556089]  kasan_save_track+0x18/0x40
[   26.556636]  kasan_save_alloc_info+0x3b/0x50
[   26.557254]  __kasan_kmalloc+0xb7/0xc0
[   26.557801]  __kmalloc_cache_noprof+0x183/0x410
[   26.558405]  kasan_atomics+0x95/0x310
[   26.558963]  kunit_try_run_case+0x1b2/0x490
[   26.559535]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.560071]  kthread+0x323/0x710
[   26.560383]  ret_from_fork+0x41/0x80
[   26.560895]  ret_from_fork_asm+0x1a/0x30
[   26.561293] 
[   26.561455] The buggy address belongs to the object at ffff888103231c00
[   26.561455]  which belongs to the cache kmalloc-64 of size 64
[   26.562519] The buggy address is located 0 bytes to the right of
[   26.562519]  allocated 48-byte region [ffff888103231c00, ffff888103231c30)
[   26.563375] 
[   26.563669] The buggy address belongs to the physical page:
[   26.564292] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103231
[   26.565028] flags: 0x200000000000000(node=0|zone=2)
[   26.565524] page_type: f5(slab)
[   26.565932] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   26.566438] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   26.567174] page dumped because: kasan: bad access detected
[   26.567809] 
[   26.568055] Memory state around the buggy address:
[   26.568485]  ffff888103231b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.569043]  ffff888103231b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.569729] >ffff888103231c00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   26.570382]                                      ^
[   26.570884]  ffff888103231c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.571532]  ffff888103231d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.572199] ==================================================================
[   26.659411] ==================================================================
[   26.660166] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xc70/0x5450
[   26.660876] Write of size 4 at addr ffff888103231c30 by task kunit_try_catch/286
[   26.661306] 
[   26.661505] CPU: 1 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G    B            N  6.14.0-rc7-next-20250319 #1 PREEMPT(voluntary) 
[   26.661639] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.661682] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   26.661798] Call Trace:
[   26.661841]  <TASK>
[   26.661879]  dump_stack_lvl+0x73/0xb0
[   26.661965]  print_report+0xd1/0x660
[   26.662037]  ? __virt_addr_valid+0x1db/0x2d0
[   26.662191]  ? kasan_complete_mode_report_info+0x2a/0x200
[   26.662275]  kasan_report+0x104/0x140
[   26.662338]  ? kasan_atomics_helper+0xc70/0x5450
[   26.662410]  ? kasan_atomics_helper+0xc70/0x5450
[   26.662492]  kasan_check_range+0x10c/0x1c0
[   26.662569]  __kasan_check_write+0x18/0x20
[   26.662632]  kasan_atomics_helper+0xc70/0x5450
[   26.662752]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   26.662841]  ? kasan_save_alloc_info+0x3b/0x50
[   26.662934]  kasan_atomics+0x1dc/0x310
[   26.663008]  ? __pfx_kasan_atomics+0x10/0x10
[   26.663084]  ? __pfx_read_tsc+0x10/0x10
[   26.663172]  ? ktime_get_ts64+0x86/0x240
[   26.663250]  kunit_try_run_case+0x1b2/0x490
[   26.663325]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.663390]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   26.663458]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   26.663525]  ? __kthread_parkme+0x82/0x160
[   26.663620]  ? preempt_count_sub+0x50/0x80
[   26.663748]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.663834]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.663911]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   26.663994]  kthread+0x323/0x710
[   26.664057]  ? trace_preempt_on+0x20/0xc0
[   26.664146]  ? __pfx_kthread+0x10/0x10
[   26.664186]  ? _raw_spin_unlock_irq+0x47/0x80
[   26.664220]  ? calculate_sigpending+0x7b/0xa0
[   26.664259]  ? __pfx_kthread+0x10/0x10
[   26.664324]  ret_from_fork+0x41/0x80
[   26.664390]  ? __pfx_kthread+0x10/0x10
[   26.664447]  ret_from_fork_asm+0x1a/0x30
[   26.664538]  </TASK>
[   26.664569] 
[   26.682585] Allocated by task 286:
[   26.682863]  kasan_save_stack+0x3d/0x60
[   26.683210]  kasan_save_track+0x18/0x40
[   26.683657]  kasan_save_alloc_info+0x3b/0x50
[   26.684160]  __kasan_kmalloc+0xb7/0xc0
[   26.684517]  __kmalloc_cache_noprof+0x183/0x410
[   26.685020]  kasan_atomics+0x95/0x310
[   26.685384]  kunit_try_run_case+0x1b2/0x490
[   26.685851]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.686326]  kthread+0x323/0x710
[   26.686746]  ret_from_fork+0x41/0x80
[   26.687042]  ret_from_fork_asm+0x1a/0x30
[   26.687356] 
[   26.687522] The buggy address belongs to the object at ffff888103231c00
[   26.687522]  which belongs to the cache kmalloc-64 of size 64
[   26.688250] The buggy address is located 0 bytes to the right of
[   26.688250]  allocated 48-byte region [ffff888103231c00, ffff888103231c30)
[   26.689361] 
[   26.689594] The buggy address belongs to the physical page:
[   26.690170] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103231
[   26.690956] flags: 0x200000000000000(node=0|zone=2)
[   26.691464] page_type: f5(slab)
[   26.691913] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   26.692413] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   26.693025] page dumped because: kasan: bad access detected
[   26.693513] 
[   26.693677] Memory state around the buggy address:
[   26.694012]  ffff888103231b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.694679]  ffff888103231b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.695386] >ffff888103231c00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   26.696107]                                      ^
[   26.696459]  ffff888103231c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.696906]  ffff888103231d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.697447] ==================================================================
[   27.538723] ==================================================================
[   27.539473] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x15b6/0x5450
[   27.540077] Write of size 8 at addr ffff888103231c30 by task kunit_try_catch/286
[   27.540773] 
[   27.541514] CPU: 1 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G    B            N  6.14.0-rc7-next-20250319 #1 PREEMPT(voluntary) 
[   27.541651] Tainted: [B]=BAD_PAGE, [N]=TEST
[   27.541691] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   27.541779] Call Trace:
[   27.541819]  <TASK>
[   27.541860]  dump_stack_lvl+0x73/0xb0
[   27.541939]  print_report+0xd1/0x660
[   27.542012]  ? __virt_addr_valid+0x1db/0x2d0
[   27.542168]  ? kasan_complete_mode_report_info+0x2a/0x200
[   27.542253]  kasan_report+0x104/0x140
[   27.542307]  ? kasan_atomics_helper+0x15b6/0x5450
[   27.542376]  ? kasan_atomics_helper+0x15b6/0x5450
[   27.542494]  kasan_check_range+0x10c/0x1c0
[   27.542582]  __kasan_check_write+0x18/0x20
[   27.542650]  kasan_atomics_helper+0x15b6/0x5450
[   27.542803]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   27.543001]  ? kasan_save_alloc_info+0x3b/0x50
[   27.543262]  kasan_atomics+0x1dc/0x310
[   27.543466]  ? __pfx_kasan_atomics+0x10/0x10
[   27.543596]  ? __pfx_read_tsc+0x10/0x10
[   27.543687]  ? ktime_get_ts64+0x86/0x240
[   27.543769]  kunit_try_run_case+0x1b2/0x490
[   27.543847]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.543918]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   27.543994]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   27.544062]  ? __kthread_parkme+0x82/0x160
[   27.544152]  ? preempt_count_sub+0x50/0x80
[   27.544230]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.544305]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.544377]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   27.544482]  kthread+0x323/0x710
[   27.544521]  ? trace_preempt_on+0x20/0xc0
[   27.544561]  ? __pfx_kthread+0x10/0x10
[   27.544596]  ? _raw_spin_unlock_irq+0x47/0x80
[   27.544629]  ? calculate_sigpending+0x7b/0xa0
[   27.544662]  ? __pfx_kthread+0x10/0x10
[   27.544696]  ret_from_fork+0x41/0x80
[   27.544768]  ? __pfx_kthread+0x10/0x10
[   27.544803]  ret_from_fork_asm+0x1a/0x30
[   27.544855]  </TASK>
[   27.544872] 
[   27.563835] Allocated by task 286:
[   27.564416]  kasan_save_stack+0x3d/0x60
[   27.564690]  kasan_save_track+0x18/0x40
[   27.565597]  kasan_save_alloc_info+0x3b/0x50
[   27.566166]  __kasan_kmalloc+0xb7/0xc0
[   27.566678]  __kmalloc_cache_noprof+0x183/0x410
[   27.567306]  kasan_atomics+0x95/0x310
[   27.567696]  kunit_try_run_case+0x1b2/0x490
[   27.568656]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.569459]  kthread+0x323/0x710
[   27.570168]  ret_from_fork+0x41/0x80
[   27.570880]  ret_from_fork_asm+0x1a/0x30
[   27.571277] 
[   27.571502] The buggy address belongs to the object at ffff888103231c00
[   27.571502]  which belongs to the cache kmalloc-64 of size 64
[   27.572554] The buggy address is located 0 bytes to the right of
[   27.572554]  allocated 48-byte region [ffff888103231c00, ffff888103231c30)
[   27.574100] 
[   27.574360] The buggy address belongs to the physical page:
[   27.574868] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103231
[   27.575553] flags: 0x200000000000000(node=0|zone=2)
[   27.576194] page_type: f5(slab)
[   27.576450] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   27.577484] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   27.578167] page dumped because: kasan: bad access detected
[   27.578638] 
[   27.578806] Memory state around the buggy address:
[   27.579235]  ffff888103231b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.579636]  ffff888103231b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.581144] >ffff888103231c00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   27.582082]                                      ^
[   27.582795]  ffff888103231c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.583429]  ffff888103231d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.584188] ==================================================================
[   28.506604] ==================================================================
[   28.507374] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x218a/0x5450
[   28.507967] Write of size 8 at addr ffff888103231c30 by task kunit_try_catch/286
[   28.508750] 
[   28.509015] CPU: 1 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G    B            N  6.14.0-rc7-next-20250319 #1 PREEMPT(voluntary) 
[   28.509172] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.509213] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   28.509275] Call Trace:
[   28.509313]  <TASK>
[   28.509353]  dump_stack_lvl+0x73/0xb0
[   28.509431]  print_report+0xd1/0x660
[   28.509501]  ? __virt_addr_valid+0x1db/0x2d0
[   28.509631]  ? kasan_complete_mode_report_info+0x2a/0x200
[   28.509711]  kasan_report+0x104/0x140
[   28.509774]  ? kasan_atomics_helper+0x218a/0x5450
[   28.509844]  ? kasan_atomics_helper+0x218a/0x5450
[   28.509929]  kasan_check_range+0x10c/0x1c0
[   28.510003]  __kasan_check_write+0x18/0x20
[   28.510064]  kasan_atomics_helper+0x218a/0x5450
[   28.510208]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   28.510309]  ? kasan_save_alloc_info+0x3b/0x50
[   28.510392]  kasan_atomics+0x1dc/0x310
[   28.510458]  ? __pfx_kasan_atomics+0x10/0x10
[   28.510525]  ? __pfx_read_tsc+0x10/0x10
[   28.510579]  ? ktime_get_ts64+0x86/0x240
[   28.510655]  kunit_try_run_case+0x1b2/0x490
[   28.510797]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.510915]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   28.510986]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   28.511083]  ? __kthread_parkme+0x82/0x160
[   28.511217]  ? preempt_count_sub+0x50/0x80
[   28.511328]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.511431]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.511536]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   28.511670]  kthread+0x323/0x710
[   28.511821]  ? trace_preempt_on+0x20/0xc0
[   28.511946]  ? __pfx_kthread+0x10/0x10
[   28.512049]  ? _raw_spin_unlock_irq+0x47/0x80
[   28.512167]  ? calculate_sigpending+0x7b/0xa0
[   28.512243]  ? __pfx_kthread+0x10/0x10
[   28.512314]  ret_from_fork+0x41/0x80
[   28.512382]  ? __pfx_kthread+0x10/0x10
[   28.512449]  ret_from_fork_asm+0x1a/0x30
[   28.512542]  </TASK>
[   28.512576] 
[   28.525947] Allocated by task 286:
[   28.526337]  kasan_save_stack+0x3d/0x60
[   28.526925]  kasan_save_track+0x18/0x40
[   28.527333]  kasan_save_alloc_info+0x3b/0x50
[   28.527794]  __kasan_kmalloc+0xb7/0xc0
[   28.528258]  __kmalloc_cache_noprof+0x183/0x410
[   28.528768]  kasan_atomics+0x95/0x310
[   28.529197]  kunit_try_run_case+0x1b2/0x490
[   28.529586]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.530089]  kthread+0x323/0x710
[   28.530465]  ret_from_fork+0x41/0x80
[   28.530894]  ret_from_fork_asm+0x1a/0x30
[   28.531390] 
[   28.531643] The buggy address belongs to the object at ffff888103231c00
[   28.531643]  which belongs to the cache kmalloc-64 of size 64
[   28.532769] The buggy address is located 0 bytes to the right of
[   28.532769]  allocated 48-byte region [ffff888103231c00, ffff888103231c30)
[   28.533895] 
[   28.534135] The buggy address belongs to the physical page:
[   28.534650] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103231
[   28.535476] flags: 0x200000000000000(node=0|zone=2)
[   28.536053] page_type: f5(slab)
[   28.536480] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   28.537106] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   28.537592] page dumped because: kasan: bad access detected
[   28.537965] 
[   28.539168] Memory state around the buggy address:
[   28.539952]  ffff888103231b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.542430]  ffff888103231b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.543652] >ffff888103231c00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   28.546838]                                      ^
[   28.547407]  ffff888103231c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.548496]  ffff888103231d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.549249] ==================================================================
[   26.277315] ==================================================================
[   26.278286] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x697/0x5450
[   26.279012] Write of size 4 at addr ffff888103231c30 by task kunit_try_catch/286
[   26.279641] 
[   26.280018] CPU: 1 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G    B            N  6.14.0-rc7-next-20250319 #1 PREEMPT(voluntary) 
[   26.280334] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.280475] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   26.280573] Call Trace:
[   26.280614]  <TASK>
[   26.280653]  dump_stack_lvl+0x73/0xb0
[   26.280737]  print_report+0xd1/0x660
[   26.280838]  ? __virt_addr_valid+0x1db/0x2d0
[   26.280973]  ? kasan_complete_mode_report_info+0x2a/0x200
[   26.281053]  kasan_report+0x104/0x140
[   26.281139]  ? kasan_atomics_helper+0x697/0x5450
[   26.281217]  ? kasan_atomics_helper+0x697/0x5450
[   26.281302]  kasan_check_range+0x10c/0x1c0
[   26.281378]  __kasan_check_write+0x18/0x20
[   26.281441]  kasan_atomics_helper+0x697/0x5450
[   26.281544]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   26.281626]  ? kasan_save_alloc_info+0x3b/0x50
[   26.281790]  kasan_atomics+0x1dc/0x310
[   26.282075]  ? __pfx_kasan_atomics+0x10/0x10
[   26.282304]  ? __pfx_read_tsc+0x10/0x10
[   26.282383]  ? ktime_get_ts64+0x86/0x240
[   26.282461]  kunit_try_run_case+0x1b2/0x490
[   26.282536]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.282603]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   26.282673]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   26.282756]  ? __kthread_parkme+0x82/0x160
[   26.282825]  ? preempt_count_sub+0x50/0x80
[   26.282870]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.282908]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.282946]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   26.282983]  kthread+0x323/0x710
[   26.283015]  ? trace_preempt_on+0x20/0xc0
[   26.283050]  ? __pfx_kthread+0x10/0x10
[   26.283083]  ? _raw_spin_unlock_irq+0x47/0x80
[   26.283138]  ? calculate_sigpending+0x7b/0xa0
[   26.283173]  ? __pfx_kthread+0x10/0x10
[   26.283208]  ret_from_fork+0x41/0x80
[   26.283243]  ? __pfx_kthread+0x10/0x10
[   26.283277]  ret_from_fork_asm+0x1a/0x30
[   26.283325]  </TASK>
[   26.283342] 
[   26.298611] Allocated by task 286:
[   26.299147]  kasan_save_stack+0x3d/0x60
[   26.299597]  kasan_save_track+0x18/0x40
[   26.300257]  kasan_save_alloc_info+0x3b/0x50
[   26.301289]  __kasan_kmalloc+0xb7/0xc0
[   26.301712]  __kmalloc_cache_noprof+0x183/0x410
[   26.302225]  kasan_atomics+0x95/0x310
[   26.302789]  kunit_try_run_case+0x1b2/0x490
[   26.303384]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.304211]  kthread+0x323/0x710
[   26.304478]  ret_from_fork+0x41/0x80
[   26.304743]  ret_from_fork_asm+0x1a/0x30
[   26.305016] 
[   26.305216] The buggy address belongs to the object at ffff888103231c00
[   26.305216]  which belongs to the cache kmalloc-64 of size 64
[   26.306641] The buggy address is located 0 bytes to the right of
[   26.306641]  allocated 48-byte region [ffff888103231c00, ffff888103231c30)
[   26.307961] 
[   26.308309] The buggy address belongs to the physical page:
[   26.308847] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103231
[   26.309645] flags: 0x200000000000000(node=0|zone=2)
[   26.310268] page_type: f5(slab)
[   26.310635] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   26.311571] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   26.312431] page dumped because: kasan: bad access detected
[   26.312936] 
[   26.313193] Memory state around the buggy address:
[   26.313585]  ffff888103231b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.314454]  ffff888103231b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.315050] >ffff888103231c00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   26.315452]                                      ^
[   26.315777]  ffff888103231c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.316758]  ffff888103231d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.317636] ==================================================================
[   26.150719] ==================================================================
[   26.151171] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b3a/0x5450
[   26.153514] Write of size 4 at addr ffff888103231c30 by task kunit_try_catch/286
[   26.154351] 
[   26.155023] CPU: 1 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G    B            N  6.14.0-rc7-next-20250319 #1 PREEMPT(voluntary) 
[   26.155144] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.155184] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   26.155244] Call Trace:
[   26.155277]  <TASK>
[   26.155497]  dump_stack_lvl+0x73/0xb0
[   26.155570]  print_report+0xd1/0x660
[   26.155638]  ? __virt_addr_valid+0x1db/0x2d0
[   26.155713]  ? kasan_complete_mode_report_info+0x2a/0x200
[   26.155788]  kasan_report+0x104/0x140
[   26.155821]  ? kasan_atomics_helper+0x4b3a/0x5450
[   26.155861]  ? kasan_atomics_helper+0x4b3a/0x5450
[   26.155905]  __asan_report_store4_noabort+0x1b/0x30
[   26.155950]  kasan_atomics_helper+0x4b3a/0x5450
[   26.155987]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   26.156023]  ? kasan_save_alloc_info+0x3b/0x50
[   26.156067]  kasan_atomics+0x1dc/0x310
[   26.156103]  ? __pfx_kasan_atomics+0x10/0x10
[   26.156175]  ? __pfx_read_tsc+0x10/0x10
[   26.156211]  ? ktime_get_ts64+0x86/0x240
[   26.156250]  kunit_try_run_case+0x1b2/0x490
[   26.156287]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.156320]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   26.156354]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   26.156388]  ? __kthread_parkme+0x82/0x160
[   26.156421]  ? preempt_count_sub+0x50/0x80
[   26.156459]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.156495]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.156530]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   26.156566]  kthread+0x323/0x710
[   26.156597]  ? trace_preempt_on+0x20/0xc0
[   26.156632]  ? __pfx_kthread+0x10/0x10
[   26.156665]  ? _raw_spin_unlock_irq+0x47/0x80
[   26.156696]  ? calculate_sigpending+0x7b/0xa0
[   26.156765]  ? __pfx_kthread+0x10/0x10
[   26.156801]  ret_from_fork+0x41/0x80
[   26.156836]  ? __pfx_kthread+0x10/0x10
[   26.156871]  ret_from_fork_asm+0x1a/0x30
[   26.156920]  </TASK>
[   26.156937] 
[   26.174045] Allocated by task 286:
[   26.174567]  kasan_save_stack+0x3d/0x60
[   26.175100]  kasan_save_track+0x18/0x40
[   26.175570]  kasan_save_alloc_info+0x3b/0x50
[   26.176388]  __kasan_kmalloc+0xb7/0xc0
[   26.176980]  __kmalloc_cache_noprof+0x183/0x410
[   26.177326]  kasan_atomics+0x95/0x310
[   26.177762]  kunit_try_run_case+0x1b2/0x490
[   26.178219]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.178587]  kthread+0x323/0x710
[   26.178977]  ret_from_fork+0x41/0x80
[   26.179404]  ret_from_fork_asm+0x1a/0x30
[   26.179773] 
[   26.179969] The buggy address belongs to the object at ffff888103231c00
[   26.179969]  which belongs to the cache kmalloc-64 of size 64
[   26.180740] The buggy address is located 0 bytes to the right of
[   26.180740]  allocated 48-byte region [ffff888103231c00, ffff888103231c30)
[   26.181776] 
[   26.182000] The buggy address belongs to the physical page:
[   26.182535] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103231
[   26.183148] flags: 0x200000000000000(node=0|zone=2)
[   26.183461] page_type: f5(slab)
[   26.183911] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   26.184621] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   26.185326] page dumped because: kasan: bad access detected
[   26.185666] 
[   26.185935] Memory state around the buggy address:
[   26.186329]  ffff888103231b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.186925]  ffff888103231b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.187341] >ffff888103231c00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   26.187847]                                      ^
[   26.188338]  ffff888103231c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.189008]  ffff888103231d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.189660] ==================================================================
[   27.839637] ==================================================================
[   27.840578] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x19e3/0x5450
[   27.842027] Write of size 8 at addr ffff888103231c30 by task kunit_try_catch/286
[   27.842668] 
[   27.843286] CPU: 1 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G    B            N  6.14.0-rc7-next-20250319 #1 PREEMPT(voluntary) 
[   27.843703] Tainted: [B]=BAD_PAGE, [N]=TEST
[   27.844167] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   27.844208] Call Trace:
[   27.844232]  <TASK>
[   27.844254]  dump_stack_lvl+0x73/0xb0
[   27.844301]  print_report+0xd1/0x660
[   27.844338]  ? __virt_addr_valid+0x1db/0x2d0
[   27.844406]  ? kasan_complete_mode_report_info+0x2a/0x200
[   27.844445]  kasan_report+0x104/0x140
[   27.844477]  ? kasan_atomics_helper+0x19e3/0x5450
[   27.844514]  ? kasan_atomics_helper+0x19e3/0x5450
[   27.844557]  kasan_check_range+0x10c/0x1c0
[   27.844594]  __kasan_check_write+0x18/0x20
[   27.844625]  kasan_atomics_helper+0x19e3/0x5450
[   27.844663]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   27.844699]  ? kasan_save_alloc_info+0x3b/0x50
[   27.844788]  kasan_atomics+0x1dc/0x310
[   27.844827]  ? __pfx_kasan_atomics+0x10/0x10
[   27.844866]  ? __pfx_read_tsc+0x10/0x10
[   27.844900]  ? ktime_get_ts64+0x86/0x240
[   27.844939]  kunit_try_run_case+0x1b2/0x490
[   27.844977]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.845012]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   27.845045]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   27.845080]  ? __kthread_parkme+0x82/0x160
[   27.845133]  ? preempt_count_sub+0x50/0x80
[   27.845176]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.845212]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.845248]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   27.845285]  kthread+0x323/0x710
[   27.845317]  ? trace_preempt_on+0x20/0xc0
[   27.845353]  ? __pfx_kthread+0x10/0x10
[   27.845387]  ? _raw_spin_unlock_irq+0x47/0x80
[   27.845418]  ? calculate_sigpending+0x7b/0xa0
[   27.845452]  ? __pfx_kthread+0x10/0x10
[   27.845486]  ret_from_fork+0x41/0x80
[   27.845521]  ? __pfx_kthread+0x10/0x10
[   27.845555]  ret_from_fork_asm+0x1a/0x30
[   27.845603]  </TASK>
[   27.845619] 
[   27.865215] Allocated by task 286:
[   27.865821]  kasan_save_stack+0x3d/0x60
[   27.866358]  kasan_save_track+0x18/0x40
[   27.866770]  kasan_save_alloc_info+0x3b/0x50
[   27.867441]  __kasan_kmalloc+0xb7/0xc0
[   27.868003]  __kmalloc_cache_noprof+0x183/0x410
[   27.868511]  kasan_atomics+0x95/0x310
[   27.869081]  kunit_try_run_case+0x1b2/0x490
[   27.869544]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.870184]  kthread+0x323/0x710
[   27.870574]  ret_from_fork+0x41/0x80
[   27.871037]  ret_from_fork_asm+0x1a/0x30
[   27.871624] 
[   27.872033] The buggy address belongs to the object at ffff888103231c00
[   27.872033]  which belongs to the cache kmalloc-64 of size 64
[   27.872902] The buggy address is located 0 bytes to the right of
[   27.872902]  allocated 48-byte region [ffff888103231c00, ffff888103231c30)
[   27.874061] 
[   27.874315] The buggy address belongs to the physical page:
[   27.874995] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103231
[   27.875651] flags: 0x200000000000000(node=0|zone=2)
[   27.876242] page_type: f5(slab)
[   27.876623] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   27.877347] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   27.878071] page dumped because: kasan: bad access detected
[   27.878604] 
[   27.878913] Memory state around the buggy address:
[   27.879408]  ffff888103231b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.880102]  ffff888103231b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.880589] >ffff888103231c00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   27.881346]                                      ^
[   27.881937]  ffff888103231c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.882519]  ffff888103231d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.882941] ==================================================================
[   27.329055] ==================================================================
[   27.329977] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x13b5/0x5450
[   27.331169] Read of size 8 at addr ffff888103231c30 by task kunit_try_catch/286
[   27.331437] 
[   27.331544] CPU: 1 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G    B            N  6.14.0-rc7-next-20250319 #1 PREEMPT(voluntary) 
[   27.331644] Tainted: [B]=BAD_PAGE, [N]=TEST
[   27.331665] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   27.331697] Call Trace:
[   27.331717]  <TASK>
[   27.331740]  dump_stack_lvl+0x73/0xb0
[   27.331783]  print_report+0xd1/0x660
[   27.331821]  ? __virt_addr_valid+0x1db/0x2d0
[   27.331889]  ? kasan_complete_mode_report_info+0x2a/0x200
[   27.331940]  kasan_report+0x104/0x140
[   27.331971]  ? kasan_atomics_helper+0x13b5/0x5450
[   27.332008]  ? kasan_atomics_helper+0x13b5/0x5450
[   27.332050]  kasan_check_range+0x10c/0x1c0
[   27.332087]  __kasan_check_read+0x15/0x20
[   27.332221]  kasan_atomics_helper+0x13b5/0x5450
[   27.332308]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   27.332440]  ? kasan_save_alloc_info+0x3b/0x50
[   27.332548]  kasan_atomics+0x1dc/0x310
[   27.332699]  ? __pfx_kasan_atomics+0x10/0x10
[   27.332778]  ? __pfx_read_tsc+0x10/0x10
[   27.332920]  ? ktime_get_ts64+0x86/0x240
[   27.333008]  kunit_try_run_case+0x1b2/0x490
[   27.333086]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.333176]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   27.333247]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   27.333314]  ? __kthread_parkme+0x82/0x160
[   27.333381]  ? preempt_count_sub+0x50/0x80
[   27.333457]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.333529]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.333602]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   27.333674]  kthread+0x323/0x710
[   27.333741]  ? trace_preempt_on+0x20/0xc0
[   27.333810]  ? __pfx_kthread+0x10/0x10
[   27.333876]  ? _raw_spin_unlock_irq+0x47/0x80
[   27.333935]  ? calculate_sigpending+0x7b/0xa0
[   27.333999]  ? __pfx_kthread+0x10/0x10
[   27.334066]  ret_from_fork+0x41/0x80
[   27.334220]  ? __pfx_kthread+0x10/0x10
[   27.334305]  ret_from_fork_asm+0x1a/0x30
[   27.334404]  </TASK>
[   27.334441] 
[   27.352161] Allocated by task 286:
[   27.352398]  kasan_save_stack+0x3d/0x60
[   27.352878]  kasan_save_track+0x18/0x40
[   27.353335]  kasan_save_alloc_info+0x3b/0x50
[   27.353866]  __kasan_kmalloc+0xb7/0xc0
[   27.354195]  __kmalloc_cache_noprof+0x183/0x410
[   27.354571]  kasan_atomics+0x95/0x310
[   27.355075]  kunit_try_run_case+0x1b2/0x490
[   27.355602]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.356127]  kthread+0x323/0x710
[   27.356439]  ret_from_fork+0x41/0x80
[   27.356912]  ret_from_fork_asm+0x1a/0x30
[   27.357400] 
[   27.357630] The buggy address belongs to the object at ffff888103231c00
[   27.357630]  which belongs to the cache kmalloc-64 of size 64
[   27.358383] The buggy address is located 0 bytes to the right of
[   27.358383]  allocated 48-byte region [ffff888103231c00, ffff888103231c30)
[   27.359419] 
[   27.359681] The buggy address belongs to the physical page:
[   27.360288] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103231
[   27.362563] flags: 0x200000000000000(node=0|zone=2)
[   27.363042] page_type: f5(slab)
[   27.363432] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   27.364440] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   27.365193] page dumped because: kasan: bad access detected
[   27.365635] 
[   27.366459] Memory state around the buggy address:
[   27.366840]  ffff888103231b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.367086]  ffff888103231b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.367996] >ffff888103231c00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   27.368520]                                      ^
[   27.369080]  ffff888103231c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.369885]  ffff888103231d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.370563] ==================================================================
[   26.816978] ==================================================================
[   26.817647] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xe78/0x5450
[   26.818371] Write of size 4 at addr ffff888103231c30 by task kunit_try_catch/286
[   26.819077] 
[   26.819358] CPU: 1 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G    B            N  6.14.0-rc7-next-20250319 #1 PREEMPT(voluntary) 
[   26.819494] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.819532] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   26.819617] Call Trace:
[   26.819657]  <TASK>
[   26.819695]  dump_stack_lvl+0x73/0xb0
[   26.819978]  print_report+0xd1/0x660
[   26.820424]  ? __virt_addr_valid+0x1db/0x2d0
[   26.821065]  ? kasan_complete_mode_report_info+0x2a/0x200
[   26.821219]  kasan_report+0x104/0x140
[   26.821289]  ? kasan_atomics_helper+0xe78/0x5450
[   26.821363]  ? kasan_atomics_helper+0xe78/0x5450
[   26.821449]  kasan_check_range+0x10c/0x1c0
[   26.821523]  __kasan_check_write+0x18/0x20
[   26.821589]  kasan_atomics_helper+0xe78/0x5450
[   26.821660]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   26.822184]  ? kasan_save_alloc_info+0x3b/0x50
[   26.822297]  kasan_atomics+0x1dc/0x310
[   26.822376]  ? __pfx_kasan_atomics+0x10/0x10
[   26.822431]  ? __pfx_read_tsc+0x10/0x10
[   26.822469]  ? ktime_get_ts64+0x86/0x240
[   26.822509]  kunit_try_run_case+0x1b2/0x490
[   26.822547]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.822582]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   26.822616]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   26.822650]  ? __kthread_parkme+0x82/0x160
[   26.822684]  ? preempt_count_sub+0x50/0x80
[   26.822776]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.822817]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.822855]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   26.822891]  kthread+0x323/0x710
[   26.822923]  ? trace_preempt_on+0x20/0xc0
[   26.822959]  ? __pfx_kthread+0x10/0x10
[   26.822994]  ? _raw_spin_unlock_irq+0x47/0x80
[   26.823025]  ? calculate_sigpending+0x7b/0xa0
[   26.823058]  ? __pfx_kthread+0x10/0x10
[   26.823093]  ret_from_fork+0x41/0x80
[   26.823150]  ? __pfx_kthread+0x10/0x10
[   26.823185]  ret_from_fork_asm+0x1a/0x30
[   26.823234]  </TASK>
[   26.823251] 
[   26.831973] Allocated by task 286:
[   26.832241]  kasan_save_stack+0x3d/0x60
[   26.832523]  kasan_save_track+0x18/0x40
[   26.832828]  kasan_save_alloc_info+0x3b/0x50
[   26.833155]  __kasan_kmalloc+0xb7/0xc0
[   26.833439]  __kmalloc_cache_noprof+0x183/0x410
[   26.833742]  kasan_atomics+0x95/0x310
[   26.834020]  kunit_try_run_case+0x1b2/0x490
[   26.834341]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.834679]  kthread+0x323/0x710
[   26.835152]  ret_from_fork+0x41/0x80
[   26.835657]  ret_from_fork_asm+0x1a/0x30
[   26.836216] 
[   26.836470] The buggy address belongs to the object at ffff888103231c00
[   26.836470]  which belongs to the cache kmalloc-64 of size 64
[   26.837681] The buggy address is located 0 bytes to the right of
[   26.837681]  allocated 48-byte region [ffff888103231c00, ffff888103231c30)
[   26.839086] 
[   26.839372] The buggy address belongs to the physical page:
[   26.840205] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103231
[   26.841035] flags: 0x200000000000000(node=0|zone=2)
[   26.841627] page_type: f5(slab)
[   26.842237] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   26.843204] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   26.844219] page dumped because: kasan: bad access detected
[   26.844854] 
[   26.845133] Memory state around the buggy address:
[   26.845674]  ffff888103231b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.846427]  ffff888103231b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.847453] >ffff888103231c00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   26.848360]                                      ^
[   26.849002]  ffff888103231c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.849767]  ffff888103231d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.850530] ==================================================================