Hay
Date
May 12, 2025, 11:48 a.m.

Environment
qemu-arm64
qemu-x86_64

[   19.486628] ==================================================================
[   19.486678] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x12d8/0x4858
[   19.486730] Write of size 8 at addr fff00000c788e7b0 by task kunit_try_catch/265
[   19.486780] 
[   19.486812] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250512 #1 PREEMPT 
[   19.486898] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.486928] Hardware name: linux,dummy-virt (DT)
[   19.486960] Call trace:
[   19.486985]  show_stack+0x20/0x38 (C)
[   19.487037]  dump_stack_lvl+0x8c/0xd0
[   19.487100]  print_report+0x118/0x608
[   19.487150]  kasan_report+0xdc/0x128
[   19.487194]  kasan_check_range+0x100/0x1a8
[   19.487241]  __kasan_check_write+0x20/0x30
[   19.487289]  kasan_atomics_helper+0x12d8/0x4858
[   19.487337]  kasan_atomics+0x198/0x2e0
[   19.487382]  kunit_try_run_case+0x170/0x3f0
[   19.487429]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.487482]  kthread+0x328/0x630
[   19.487527]  ret_from_fork+0x10/0x20
[   19.487576] 
[   19.487597] Allocated by task 265:
[   19.487628]  kasan_save_stack+0x3c/0x68
[   19.487671]  kasan_save_track+0x20/0x40
[   19.487710]  kasan_save_alloc_info+0x40/0x58
[   19.487751]  __kasan_kmalloc+0xd4/0xd8
[   19.487789]  __kmalloc_cache_noprof+0x15c/0x3c0
[   19.487827]  kasan_atomics+0xb8/0x2e0
[   19.487864]  kunit_try_run_case+0x170/0x3f0
[   19.487903]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.487947]  kthread+0x328/0x630
[   19.487983]  ret_from_fork+0x10/0x20
[   19.488020] 
[   19.488069] The buggy address belongs to the object at fff00000c788e780
[   19.488069]  which belongs to the cache kmalloc-64 of size 64
[   19.488189] The buggy address is located 0 bytes to the right of
[   19.488189]  allocated 48-byte region [fff00000c788e780, fff00000c788e7b0)
[   19.488319] 
[   19.488347] The buggy address belongs to the physical page:
[   19.488380] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10788e
[   19.488431] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.488478] page_type: f5(slab)
[   19.488516] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.488566] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.488607] page dumped because: kasan: bad access detected
[   19.488639] 
[   19.488660] Memory state around the buggy address:
[   19.488691]  fff00000c788e680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.488734]  fff00000c788e700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.488776] >fff00000c788e780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.488813]                                      ^
[   19.488853]  fff00000c788e800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.488934]  fff00000c788e880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.489009] ==================================================================
[   19.469239] ==================================================================
[   19.469533] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x11f8/0x4858
[   19.469727] Write of size 8 at addr fff00000c788e7b0 by task kunit_try_catch/265
[   19.469862] 
[   19.469909] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250512 #1 PREEMPT 
[   19.469999] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.470030] Hardware name: linux,dummy-virt (DT)
[   19.470074] Call trace:
[   19.470100]  show_stack+0x20/0x38 (C)
[   19.470153]  dump_stack_lvl+0x8c/0xd0
[   19.470621]  print_report+0x118/0x608
[   19.470722]  kasan_report+0xdc/0x128
[   19.471098]  kasan_check_range+0x100/0x1a8
[   19.471385]  __kasan_check_write+0x20/0x30
[   19.471448]  kasan_atomics_helper+0x11f8/0x4858
[   19.471507]  kasan_atomics+0x198/0x2e0
[   19.471716]  kunit_try_run_case+0x170/0x3f0
[   19.471821]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.472009]  kthread+0x328/0x630
[   19.472192]  ret_from_fork+0x10/0x20
[   19.472341] 
[   19.472367] Allocated by task 265:
[   19.472567]  kasan_save_stack+0x3c/0x68
[   19.472618]  kasan_save_track+0x20/0x40
[   19.472658]  kasan_save_alloc_info+0x40/0x58
[   19.472699]  __kasan_kmalloc+0xd4/0xd8
[   19.472737]  __kmalloc_cache_noprof+0x15c/0x3c0
[   19.472874]  kasan_atomics+0xb8/0x2e0
[   19.473155]  kunit_try_run_case+0x170/0x3f0
[   19.473284]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.473465]  kthread+0x328/0x630
[   19.473676]  ret_from_fork+0x10/0x20
[   19.473865] 
[   19.473982] The buggy address belongs to the object at fff00000c788e780
[   19.473982]  which belongs to the cache kmalloc-64 of size 64
[   19.474486] The buggy address is located 0 bytes to the right of
[   19.474486]  allocated 48-byte region [fff00000c788e780, fff00000c788e7b0)
[   19.474561] 
[   19.474597] The buggy address belongs to the physical page:
[   19.475061] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10788e
[   19.475523] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.475821] page_type: f5(slab)
[   19.475928] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.476242] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.476291] page dumped because: kasan: bad access detected
[   19.476585] 
[   19.476641] Memory state around the buggy address:
[   19.476680]  fff00000c788e680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.477034]  fff00000c788e700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.477095] >fff00000c788e780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.477136]                                      ^
[   19.477176]  fff00000c788e800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.478180]  fff00000c788e880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.478550] ==================================================================
[   19.499668] ==================================================================
[   19.499734] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1414/0x4858
[   19.499802] Write of size 8 at addr fff00000c788e7b0 by task kunit_try_catch/265
[   19.499879] 
[   19.499939] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250512 #1 PREEMPT 
[   19.500080] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.500112] Hardware name: linux,dummy-virt (DT)
[   19.500144] Call trace:
[   19.500194]  show_stack+0x20/0x38 (C)
[   19.500290]  dump_stack_lvl+0x8c/0xd0
[   19.500386]  print_report+0x118/0x608
[   19.500479]  kasan_report+0xdc/0x128
[   19.500571]  kasan_check_range+0x100/0x1a8
[   19.500617]  __kasan_check_write+0x20/0x30
[   19.500670]  kasan_atomics_helper+0x1414/0x4858
[   19.500768]  kasan_atomics+0x198/0x2e0
[   19.500858]  kunit_try_run_case+0x170/0x3f0
[   19.500947]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.500998]  kthread+0x328/0x630
[   19.501088]  ret_from_fork+0x10/0x20
[   19.501193] 
[   19.501215] Allocated by task 265:
[   19.501246]  kasan_save_stack+0x3c/0x68
[   19.501288]  kasan_save_track+0x20/0x40
[   19.501328]  kasan_save_alloc_info+0x40/0x58
[   19.501367]  __kasan_kmalloc+0xd4/0xd8
[   19.501402]  __kmalloc_cache_noprof+0x15c/0x3c0
[   19.501442]  kasan_atomics+0xb8/0x2e0
[   19.501478]  kunit_try_run_case+0x170/0x3f0
[   19.501515]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.501557]  kthread+0x328/0x630
[   19.501593]  ret_from_fork+0x10/0x20
[   19.501628] 
[   19.501651] The buggy address belongs to the object at fff00000c788e780
[   19.501651]  which belongs to the cache kmalloc-64 of size 64
[   19.501707] The buggy address is located 0 bytes to the right of
[   19.501707]  allocated 48-byte region [fff00000c788e780, fff00000c788e7b0)
[   19.501769] 
[   19.501790] The buggy address belongs to the physical page:
[   19.501823] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10788e
[   19.501871] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.501927] page_type: f5(slab)
[   19.501966] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.502031] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.502082] page dumped because: kasan: bad access detected
[   19.502116] 
[   19.502136] Memory state around the buggy address:
[   19.502170]  fff00000c788e680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.502211]  fff00000c788e700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.502253] >fff00000c788e780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.502291]                                      ^
[   19.502325]  fff00000c788e800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.502367]  fff00000c788e880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.502404] ==================================================================
[   19.523112] ==================================================================
[   19.523171] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3db0/0x4858
[   19.523228] Read of size 8 at addr fff00000c788e7b0 by task kunit_try_catch/265
[   19.523310] 
[   19.523350] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250512 #1 PREEMPT 
[   19.523802] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.523857] Hardware name: linux,dummy-virt (DT)
[   19.523902] Call trace:
[   19.523929]  show_stack+0x20/0x38 (C)
[   19.523992]  dump_stack_lvl+0x8c/0xd0
[   19.524064]  print_report+0x118/0x608
[   19.524116]  kasan_report+0xdc/0x128
[   19.524168]  __asan_report_load8_noabort+0x20/0x30
[   19.524220]  kasan_atomics_helper+0x3db0/0x4858
[   19.524267]  kasan_atomics+0x198/0x2e0
[   19.524945]  kunit_try_run_case+0x170/0x3f0
[   19.525050]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.525111]  kthread+0x328/0x630
[   19.525158]  ret_from_fork+0x10/0x20
[   19.525251] 
[   19.525278] Allocated by task 265:
[   19.525326]  kasan_save_stack+0x3c/0x68
[   19.525372]  kasan_save_track+0x20/0x40
[   19.525422]  kasan_save_alloc_info+0x40/0x58
[   19.525465]  __kasan_kmalloc+0xd4/0xd8
[   19.525502]  __kmalloc_cache_noprof+0x15c/0x3c0
[   19.525540]  kasan_atomics+0xb8/0x2e0
[   19.525577]  kunit_try_run_case+0x170/0x3f0
[   19.525614]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.525657]  kthread+0x328/0x630
[   19.525692]  ret_from_fork+0x10/0x20
[   19.525729] 
[   19.525749] The buggy address belongs to the object at fff00000c788e780
[   19.525749]  which belongs to the cache kmalloc-64 of size 64
[   19.525929] The buggy address is located 0 bytes to the right of
[   19.525929]  allocated 48-byte region [fff00000c788e780, fff00000c788e7b0)
[   19.526004] 
[   19.526030] The buggy address belongs to the physical page:
[   19.526088] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10788e
[   19.526147] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.526198] page_type: f5(slab)
[   19.526238] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.526290] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.526333] page dumped because: kasan: bad access detected
[   19.526374] 
[   19.526409] Memory state around the buggy address:
[   19.526456]  fff00000c788e680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.526506]  fff00000c788e700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.526551] >fff00000c788e780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.526600]                                      ^
[   19.526638]  fff00000c788e800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.526682]  fff00000c788e880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.526722] ==================================================================
[   19.445451] ==================================================================
[   19.445515] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x10c0/0x4858
[   19.445572] Write of size 8 at addr fff00000c788e7b0 by task kunit_try_catch/265
[   19.445841] 
[   19.445934] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250512 #1 PREEMPT 
[   19.446093] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.446165] Hardware name: linux,dummy-virt (DT)
[   19.446201] Call trace:
[   19.446227]  show_stack+0x20/0x38 (C)
[   19.446281]  dump_stack_lvl+0x8c/0xd0
[   19.446331]  print_report+0x118/0x608
[   19.446376]  kasan_report+0xdc/0x128
[   19.446419]  kasan_check_range+0x100/0x1a8
[   19.446467]  __kasan_check_write+0x20/0x30
[   19.446515]  kasan_atomics_helper+0x10c0/0x4858
[   19.448074]  kasan_atomics+0x198/0x2e0
[   19.448398]  kunit_try_run_case+0x170/0x3f0
[   19.448515]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.448638]  kthread+0x328/0x630
[   19.448751]  ret_from_fork+0x10/0x20
[   19.448838] 
[   19.448861] Allocated by task 265:
[   19.448894]  kasan_save_stack+0x3c/0x68
[   19.448979]  kasan_save_track+0x20/0x40
[   19.449078]  kasan_save_alloc_info+0x40/0x58
[   19.449124]  __kasan_kmalloc+0xd4/0xd8
[   19.449162]  __kmalloc_cache_noprof+0x15c/0x3c0
[   19.449202]  kasan_atomics+0xb8/0x2e0
[   19.449264]  kunit_try_run_case+0x170/0x3f0
[   19.449342]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.449385]  kthread+0x328/0x630
[   19.450071]  ret_from_fork+0x10/0x20
[   19.450142] 
[   19.450210] The buggy address belongs to the object at fff00000c788e780
[   19.450210]  which belongs to the cache kmalloc-64 of size 64
[   19.450363] The buggy address is located 0 bytes to the right of
[   19.450363]  allocated 48-byte region [fff00000c788e780, fff00000c788e7b0)
[   19.450536] 
[   19.450561] The buggy address belongs to the physical page:
[   19.450606] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10788e
[   19.450716] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.450770] page_type: f5(slab)
[   19.450811] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.450876] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.450933] page dumped because: kasan: bad access detected
[   19.451174] 
[   19.451225] Memory state around the buggy address:
[   19.451267]  fff00000c788e680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.451315]  fff00000c788e700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.451657] >fff00000c788e780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.451842]                                      ^
[   19.451897]  fff00000c788e800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.451942]  fff00000c788e880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.452134] ==================================================================
[   19.439705] ==================================================================
[   19.439884] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1058/0x4858
[   19.439943] Write of size 8 at addr fff00000c788e7b0 by task kunit_try_catch/265
[   19.439995] 
[   19.440028] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250512 #1 PREEMPT 
[   19.440125] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.440155] Hardware name: linux,dummy-virt (DT)
[   19.440186] Call trace:
[   19.440210]  show_stack+0x20/0x38 (C)
[   19.440263]  dump_stack_lvl+0x8c/0xd0
[   19.440311]  print_report+0x118/0x608
[   19.440356]  kasan_report+0xdc/0x128
[   19.440402]  kasan_check_range+0x100/0x1a8
[   19.440449]  __kasan_check_write+0x20/0x30
[   19.440496]  kasan_atomics_helper+0x1058/0x4858
[   19.440542]  kasan_atomics+0x198/0x2e0
[   19.440586]  kunit_try_run_case+0x170/0x3f0
[   19.440633]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.440683]  kthread+0x328/0x630
[   19.440727]  ret_from_fork+0x10/0x20
[   19.440774] 
[   19.440794] Allocated by task 265:
[   19.441936]  kasan_save_stack+0x3c/0x68
[   19.442001]  kasan_save_track+0x20/0x40
[   19.442118]  kasan_save_alloc_info+0x40/0x58
[   19.442194]  __kasan_kmalloc+0xd4/0xd8
[   19.442277]  __kmalloc_cache_noprof+0x15c/0x3c0
[   19.442322]  kasan_atomics+0xb8/0x2e0
[   19.442360]  kunit_try_run_case+0x170/0x3f0
[   19.442399]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.442442]  kthread+0x328/0x630
[   19.442479]  ret_from_fork+0x10/0x20
[   19.442539] 
[   19.442569] The buggy address belongs to the object at fff00000c788e780
[   19.442569]  which belongs to the cache kmalloc-64 of size 64
[   19.442726] The buggy address is located 0 bytes to the right of
[   19.442726]  allocated 48-byte region [fff00000c788e780, fff00000c788e7b0)
[   19.442822] 
[   19.442892] The buggy address belongs to the physical page:
[   19.442964] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10788e
[   19.443068] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.443131] page_type: f5(slab)
[   19.443187] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.443245] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.443287] page dumped because: kasan: bad access detected
[   19.443322] 
[   19.443343] Memory state around the buggy address:
[   19.443378]  fff00000c788e680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.443754]  fff00000c788e700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.443820] >fff00000c788e780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.444008]                                      ^
[   19.444215]  fff00000c788e800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.444434]  fff00000c788e880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.444526] ==================================================================
[   19.479662] ==================================================================
[   19.479725] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x126c/0x4858
[   19.479785] Write of size 8 at addr fff00000c788e7b0 by task kunit_try_catch/265
[   19.479835] 
[   19.479868] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250512 #1 PREEMPT 
[   19.479953] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.479983] Hardware name: linux,dummy-virt (DT)
[   19.480014] Call trace:
[   19.480038]  show_stack+0x20/0x38 (C)
[   19.482151]  dump_stack_lvl+0x8c/0xd0
[   19.482205]  print_report+0x118/0x608
[   19.482255]  kasan_report+0xdc/0x128
[   19.482299]  kasan_check_range+0x100/0x1a8
[   19.482346]  __kasan_check_write+0x20/0x30
[   19.482394]  kasan_atomics_helper+0x126c/0x4858
[   19.482442]  kasan_atomics+0x198/0x2e0
[   19.482487]  kunit_try_run_case+0x170/0x3f0
[   19.482535]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.482597]  kthread+0x328/0x630
[   19.482647]  ret_from_fork+0x10/0x20
[   19.482698] 
[   19.482720] Allocated by task 265:
[   19.484357]  kasan_save_stack+0x3c/0x68
[   19.484422]  kasan_save_track+0x20/0x40
[   19.484463]  kasan_save_alloc_info+0x40/0x58
[   19.484556]  __kasan_kmalloc+0xd4/0xd8
[   19.485059]  __kmalloc_cache_noprof+0x15c/0x3c0
[   19.485103]  kasan_atomics+0xb8/0x2e0
[   19.485143]  kunit_try_run_case+0x170/0x3f0
[   19.485181]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.485236]  kthread+0x328/0x630
[   19.485273]  ret_from_fork+0x10/0x20
[   19.485309] 
[   19.485369] The buggy address belongs to the object at fff00000c788e780
[   19.485369]  which belongs to the cache kmalloc-64 of size 64
[   19.485439] The buggy address is located 0 bytes to the right of
[   19.485439]  allocated 48-byte region [fff00000c788e780, fff00000c788e7b0)
[   19.485562] 
[   19.485586] The buggy address belongs to the physical page:
[   19.485619] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10788e
[   19.485670] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.485758] page_type: f5(slab)
[   19.485831] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.485885] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.485927] page dumped because: kasan: bad access detected
[   19.485959] 
[   19.485980] Memory state around the buggy address:
[   19.486025]  fff00000c788e680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.486088]  fff00000c788e700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.486133] >fff00000c788e780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.486171]                                      ^
[   19.486207]  fff00000c788e800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.486249]  fff00000c788e880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.486297] ==================================================================
[   19.560665] ==================================================================
[   19.561104] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x17ec/0x4858
[   19.561177] Write of size 8 at addr fff00000c788e7b0 by task kunit_try_catch/265
[   19.561232] 
[   19.561434] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250512 #1 PREEMPT 
[   19.561720] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.561788] Hardware name: linux,dummy-virt (DT)
[   19.561822] Call trace:
[   19.561848]  show_stack+0x20/0x38 (C)
[   19.561914]  dump_stack_lvl+0x8c/0xd0
[   19.561966]  print_report+0x118/0x608
[   19.562011]  kasan_report+0xdc/0x128
[   19.562068]  kasan_check_range+0x100/0x1a8
[   19.562119]  __kasan_check_write+0x20/0x30
[   19.562168]  kasan_atomics_helper+0x17ec/0x4858
[   19.562214]  kasan_atomics+0x198/0x2e0
[   19.562257]  kunit_try_run_case+0x170/0x3f0
[   19.562304]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.562356]  kthread+0x328/0x630
[   19.562401]  ret_from_fork+0x10/0x20
[   19.562449] 
[   19.562470] Allocated by task 265:
[   19.563254]  kasan_save_stack+0x3c/0x68
[   19.563320]  kasan_save_track+0x20/0x40
[   19.563361]  kasan_save_alloc_info+0x40/0x58
[   19.563411]  __kasan_kmalloc+0xd4/0xd8
[   19.563452]  __kmalloc_cache_noprof+0x15c/0x3c0
[   19.563745]  kasan_atomics+0xb8/0x2e0
[   19.563951]  kunit_try_run_case+0x170/0x3f0
[   19.564019]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.564078]  kthread+0x328/0x630
[   19.564127]  ret_from_fork+0x10/0x20
[   19.564167] 
[   19.564297] The buggy address belongs to the object at fff00000c788e780
[   19.564297]  which belongs to the cache kmalloc-64 of size 64
[   19.564496] The buggy address is located 0 bytes to the right of
[   19.564496]  allocated 48-byte region [fff00000c788e780, fff00000c788e7b0)
[   19.564684] 
[   19.564711] The buggy address belongs to the physical page:
[   19.564747] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10788e
[   19.564923] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.565009] page_type: f5(slab)
[   19.565063] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.565118] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.565158] page dumped because: kasan: bad access detected
[   19.565193] 
[   19.565214] Memory state around the buggy address:
[   19.565248]  fff00000c788e680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.565597]  fff00000c788e700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.565850] >fff00000c788e780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.566055]                                      ^
[   19.566104]  fff00000c788e800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.566161]  fff00000c788e880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.566204] ==================================================================
[   19.339787] ==================================================================
[   19.339854] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa6c/0x4858
[   19.339915] Write of size 4 at addr fff00000c788e7b0 by task kunit_try_catch/265
[   19.339966] 
[   19.339999] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250512 #1 PREEMPT 
[   19.340098] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.340129] Hardware name: linux,dummy-virt (DT)
[   19.340161] Call trace:
[   19.340187]  show_stack+0x20/0x38 (C)
[   19.340238]  dump_stack_lvl+0x8c/0xd0
[   19.340286]  print_report+0x118/0x608
[   19.340349]  kasan_report+0xdc/0x128
[   19.340580]  kasan_check_range+0x100/0x1a8
[   19.340923]  __kasan_check_write+0x20/0x30
[   19.340983]  kasan_atomics_helper+0xa6c/0x4858
[   19.341194]  kasan_atomics+0x198/0x2e0
[   19.341342]  kunit_try_run_case+0x170/0x3f0
[   19.341399]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.341462]  kthread+0x328/0x630
[   19.341512]  ret_from_fork+0x10/0x20
[   19.341563] 
[   19.341584] Allocated by task 265:
[   19.341616]  kasan_save_stack+0x3c/0x68
[   19.341658]  kasan_save_track+0x20/0x40
[   19.341700]  kasan_save_alloc_info+0x40/0x58
[   19.341740]  __kasan_kmalloc+0xd4/0xd8
[   19.341777]  __kmalloc_cache_noprof+0x15c/0x3c0
[   19.341816]  kasan_atomics+0xb8/0x2e0
[   19.341852]  kunit_try_run_case+0x170/0x3f0
[   19.341889]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.342221]  kthread+0x328/0x630
[   19.342541]  ret_from_fork+0x10/0x20
[   19.342588] 
[   19.342614] The buggy address belongs to the object at fff00000c788e780
[   19.342614]  which belongs to the cache kmalloc-64 of size 64
[   19.342681] The buggy address is located 0 bytes to the right of
[   19.342681]  allocated 48-byte region [fff00000c788e780, fff00000c788e7b0)
[   19.342972] 
[   19.343008] The buggy address belongs to the physical page:
[   19.343051] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10788e
[   19.343167] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.343271] page_type: f5(slab)
[   19.343503] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.343593] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.343678] page dumped because: kasan: bad access detected
[   19.343721] 
[   19.343743] Memory state around the buggy address:
[   19.343879]  fff00000c788e680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.344126]  fff00000c788e700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.344298] >fff00000c788e780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.344381]                                      ^
[   19.344565]  fff00000c788e800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.344768]  fff00000c788e880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.344850] ==================================================================
[   19.505225] ==================================================================
[   19.505267] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x14e4/0x4858
[   19.505313] Write of size 8 at addr fff00000c788e7b0 by task kunit_try_catch/265
[   19.505360] 
[   19.505394] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250512 #1 PREEMPT 
[   19.505566] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.505601] Hardware name: linux,dummy-virt (DT)
[   19.505633] Call trace:
[   19.505657]  show_stack+0x20/0x38 (C)
[   19.505711]  dump_stack_lvl+0x8c/0xd0
[   19.505813]  print_report+0x118/0x608
[   19.506171]  kasan_report+0xdc/0x128
[   19.506277]  kasan_check_range+0x100/0x1a8
[   19.506663]  __kasan_check_write+0x20/0x30
[   19.506985]  kasan_atomics_helper+0x14e4/0x4858
[   19.507135]  kasan_atomics+0x198/0x2e0
[   19.507195]  kunit_try_run_case+0x170/0x3f0
[   19.507245]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.507470]  kthread+0x328/0x630
[   19.507540]  ret_from_fork+0x10/0x20
[   19.507704] 
[   19.507740] Allocated by task 265:
[   19.507785]  kasan_save_stack+0x3c/0x68
[   19.507834]  kasan_save_track+0x20/0x40
[   19.508028]  kasan_save_alloc_info+0x40/0x58
[   19.508095]  __kasan_kmalloc+0xd4/0xd8
[   19.508147]  __kmalloc_cache_noprof+0x15c/0x3c0
[   19.508291]  kasan_atomics+0xb8/0x2e0
[   19.508356]  kunit_try_run_case+0x170/0x3f0
[   19.508401]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.508460]  kthread+0x328/0x630
[   19.508510]  ret_from_fork+0x10/0x20
[   19.508551] 
[   19.508724] The buggy address belongs to the object at fff00000c788e780
[   19.508724]  which belongs to the cache kmalloc-64 of size 64
[   19.508897] The buggy address is located 0 bytes to the right of
[   19.508897]  allocated 48-byte region [fff00000c788e780, fff00000c788e7b0)
[   19.509515] 
[   19.509591] The buggy address belongs to the physical page:
[   19.509649] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10788e
[   19.509723] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.509775] page_type: f5(slab)
[   19.509823] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.509924] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.509969] page dumped because: kasan: bad access detected
[   19.510004] 
[   19.510025] Memory state around the buggy address:
[   19.510070]  fff00000c788e680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.510114]  fff00000c788e700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.510375] >fff00000c788e780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.510430]                                      ^
[   19.510471]  fff00000c788e800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.510515]  fff00000c788e880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.510554] ==================================================================
[   19.539510] ==================================================================
[   19.539610] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x16d0/0x4858
[   19.539772] Write of size 8 at addr fff00000c788e7b0 by task kunit_try_catch/265
[   19.540079] 
[   19.540115] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250512 #1 PREEMPT 
[   19.540213] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.540284] Hardware name: linux,dummy-virt (DT)
[   19.540379] Call trace:
[   19.540441]  show_stack+0x20/0x38 (C)
[   19.540583]  dump_stack_lvl+0x8c/0xd0
[   19.540722]  print_report+0x118/0x608
[   19.541071]  kasan_report+0xdc/0x128
[   19.541250]  kasan_check_range+0x100/0x1a8
[   19.541308]  __kasan_check_write+0x20/0x30
[   19.541356]  kasan_atomics_helper+0x16d0/0x4858
[   19.541405]  kasan_atomics+0x198/0x2e0
[   19.541450]  kunit_try_run_case+0x170/0x3f0
[   19.541503]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.541607]  kthread+0x328/0x630
[   19.541694]  ret_from_fork+0x10/0x20
[   19.541788] 
[   19.541841] Allocated by task 265:
[   19.541873]  kasan_save_stack+0x3c/0x68
[   19.541933]  kasan_save_track+0x20/0x40
[   19.541975]  kasan_save_alloc_info+0x40/0x58
[   19.542031]  __kasan_kmalloc+0xd4/0xd8
[   19.542081]  __kmalloc_cache_noprof+0x15c/0x3c0
[   19.542121]  kasan_atomics+0xb8/0x2e0
[   19.542392]  kunit_try_run_case+0x170/0x3f0
[   19.542573]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.542626]  kthread+0x328/0x630
[   19.542741]  ret_from_fork+0x10/0x20
[   19.542904] 
[   19.542929] The buggy address belongs to the object at fff00000c788e780
[   19.542929]  which belongs to the cache kmalloc-64 of size 64
[   19.543097] The buggy address is located 0 bytes to the right of
[   19.543097]  allocated 48-byte region [fff00000c788e780, fff00000c788e7b0)
[   19.543169] 
[   19.543192] The buggy address belongs to the physical page:
[   19.543225] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10788e
[   19.543277] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.543324] page_type: f5(slab)
[   19.543484] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.543538] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.543583] page dumped because: kasan: bad access detected
[   19.543624] 
[   19.543671] Memory state around the buggy address:
[   19.543740]  fff00000c788e680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.543816]  fff00000c788e700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.544137] >fff00000c788e780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.544266]                                      ^
[   19.544353]  fff00000c788e800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.544409]  fff00000c788e880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.544449] ==================================================================
[   19.400528] ==================================================================
[   19.400580] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xdd4/0x4858
[   19.400822] Read of size 8 at addr fff00000c788e7b0 by task kunit_try_catch/265
[   19.400881] 
[   19.400917] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250512 #1 PREEMPT 
[   19.401384] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.401438] Hardware name: linux,dummy-virt (DT)
[   19.401475] Call trace:
[   19.401717]  show_stack+0x20/0x38 (C)
[   19.401869]  dump_stack_lvl+0x8c/0xd0
[   19.402247]  print_report+0x118/0x608
[   19.402309]  kasan_report+0xdc/0x128
[   19.402468]  kasan_check_range+0x100/0x1a8
[   19.402548]  __kasan_check_read+0x20/0x30
[   19.402609]  kasan_atomics_helper+0xdd4/0x4858
[   19.402659]  kasan_atomics+0x198/0x2e0
[   19.402704]  kunit_try_run_case+0x170/0x3f0
[   19.402753]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.402804]  kthread+0x328/0x630
[   19.402915]  ret_from_fork+0x10/0x20
[   19.403024] 
[   19.403101] Allocated by task 265:
[   19.403137]  kasan_save_stack+0x3c/0x68
[   19.403244]  kasan_save_track+0x20/0x40
[   19.403294]  kasan_save_alloc_info+0x40/0x58
[   19.403351]  __kasan_kmalloc+0xd4/0xd8
[   19.403389]  __kmalloc_cache_noprof+0x15c/0x3c0
[   19.403428]  kasan_atomics+0xb8/0x2e0
[   19.403510]  kunit_try_run_case+0x170/0x3f0
[   19.403575]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.403617]  kthread+0x328/0x630
[   19.403652]  ret_from_fork+0x10/0x20
[   19.403695] 
[   19.403743] The buggy address belongs to the object at fff00000c788e780
[   19.403743]  which belongs to the cache kmalloc-64 of size 64
[   19.403832] The buggy address is located 0 bytes to the right of
[   19.403832]  allocated 48-byte region [fff00000c788e780, fff00000c788e7b0)
[   19.403917] 
[   19.403984] The buggy address belongs to the physical page:
[   19.404023] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10788e
[   19.404085] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.404157] page_type: f5(slab)
[   19.404216] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.404269] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.404311] page dumped because: kasan: bad access detected
[   19.404345] 
[   19.404365] Memory state around the buggy address:
[   19.404399]  fff00000c788e680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.404444]  fff00000c788e700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.404486] >fff00000c788e780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.404555]                                      ^
[   19.404635]  fff00000c788e800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.404686]  fff00000c788e880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.404773] ==================================================================
[   19.395176] ==================================================================
[   19.395237] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e04/0x4858
[   19.395322] Read of size 4 at addr fff00000c788e7b0 by task kunit_try_catch/265
[   19.395380] 
[   19.395412] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250512 #1 PREEMPT 
[   19.395496] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.395704] Hardware name: linux,dummy-virt (DT)
[   19.395791] Call trace:
[   19.395833]  show_stack+0x20/0x38 (C)
[   19.395905]  dump_stack_lvl+0x8c/0xd0
[   19.396087]  print_report+0x118/0x608
[   19.396330]  kasan_report+0xdc/0x128
[   19.396383]  __asan_report_load4_noabort+0x20/0x30
[   19.396606]  kasan_atomics_helper+0x3e04/0x4858
[   19.396689]  kasan_atomics+0x198/0x2e0
[   19.396788]  kunit_try_run_case+0x170/0x3f0
[   19.396838]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.396890]  kthread+0x328/0x630
[   19.396936]  ret_from_fork+0x10/0x20
[   19.396984] 
[   19.397011] Allocated by task 265:
[   19.397314]  kasan_save_stack+0x3c/0x68
[   19.397452]  kasan_save_track+0x20/0x40
[   19.397501]  kasan_save_alloc_info+0x40/0x58
[   19.397543]  __kasan_kmalloc+0xd4/0xd8
[   19.397581]  __kmalloc_cache_noprof+0x15c/0x3c0
[   19.397722]  kasan_atomics+0xb8/0x2e0
[   19.397769]  kunit_try_run_case+0x170/0x3f0
[   19.397811]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.397853]  kthread+0x328/0x630
[   19.397914]  ret_from_fork+0x10/0x20
[   19.397956] 
[   19.398066] The buggy address belongs to the object at fff00000c788e780
[   19.398066]  which belongs to the cache kmalloc-64 of size 64
[   19.398141] The buggy address is located 0 bytes to the right of
[   19.398141]  allocated 48-byte region [fff00000c788e780, fff00000c788e7b0)
[   19.398206] 
[   19.398231] The buggy address belongs to the physical page:
[   19.398277] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10788e
[   19.398335] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.398401] page_type: f5(slab)
[   19.398441] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.398508] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.398676] page dumped because: kasan: bad access detected
[   19.398758] 
[   19.399279] Memory state around the buggy address:
[   19.399339]  fff00000c788e680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.399474]  fff00000c788e700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.399523] >fff00000c788e780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.399562]                                      ^
[   19.399598]  fff00000c788e800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.400018]  fff00000c788e880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.400133] ==================================================================
[   19.415168] ==================================================================
[   19.415279] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e5c/0x4858
[   19.415340] Write of size 8 at addr fff00000c788e7b0 by task kunit_try_catch/265
[   19.415442] 
[   19.415507] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250512 #1 PREEMPT 
[   19.415660] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.415690] Hardware name: linux,dummy-virt (DT)
[   19.415722] Call trace:
[   19.415747]  show_stack+0x20/0x38 (C)
[   19.415797]  dump_stack_lvl+0x8c/0xd0
[   19.415847]  print_report+0x118/0x608
[   19.415893]  kasan_report+0xdc/0x128
[   19.415938]  __asan_report_store8_noabort+0x20/0x30
[   19.415989]  kasan_atomics_helper+0x3e5c/0x4858
[   19.416036]  kasan_atomics+0x198/0x2e0
[   19.416093]  kunit_try_run_case+0x170/0x3f0
[   19.416141]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.416194]  kthread+0x328/0x630
[   19.416238]  ret_from_fork+0x10/0x20
[   19.416286] 
[   19.416307] Allocated by task 265:
[   19.416337]  kasan_save_stack+0x3c/0x68
[   19.416381]  kasan_save_track+0x20/0x40
[   19.416419]  kasan_save_alloc_info+0x40/0x58
[   19.416459]  __kasan_kmalloc+0xd4/0xd8
[   19.416495]  __kmalloc_cache_noprof+0x15c/0x3c0
[   19.416533]  kasan_atomics+0xb8/0x2e0
[   19.416569]  kunit_try_run_case+0x170/0x3f0
[   19.416612]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.416714]  kthread+0x328/0x630
[   19.416757]  ret_from_fork+0x10/0x20
[   19.416794] 
[   19.416815] The buggy address belongs to the object at fff00000c788e780
[   19.416815]  which belongs to the cache kmalloc-64 of size 64
[   19.416871] The buggy address is located 0 bytes to the right of
[   19.416871]  allocated 48-byte region [fff00000c788e780, fff00000c788e7b0)
[   19.416938] 
[   19.416969] The buggy address belongs to the physical page:
[   19.417001] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10788e
[   19.417204] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.417259] page_type: f5(slab)
[   19.417300] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.417354] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.417394] page dumped because: kasan: bad access detected
[   19.417427] 
[   19.417446] Memory state around the buggy address:
[   19.417478]  fff00000c788e680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.417523]  fff00000c788e700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.417565] >fff00000c788e780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.417603]                                      ^
[   19.417635]  fff00000c788e800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.417677]  fff00000c788e880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.417715] ==================================================================
[   19.502621] ==================================================================
[   19.502669] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x147c/0x4858
[   19.502717] Write of size 8 at addr fff00000c788e7b0 by task kunit_try_catch/265
[   19.502789] 
[   19.502822] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250512 #1 PREEMPT 
[   19.502904] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.502933] Hardware name: linux,dummy-virt (DT)
[   19.502965] Call trace:
[   19.502988]  show_stack+0x20/0x38 (C)
[   19.503036]  dump_stack_lvl+0x8c/0xd0
[   19.503099]  print_report+0x118/0x608
[   19.503156]  kasan_report+0xdc/0x128
[   19.503250]  kasan_check_range+0x100/0x1a8
[   19.503299]  __kasan_check_write+0x20/0x30
[   19.503347]  kasan_atomics_helper+0x147c/0x4858
[   19.503394]  kasan_atomics+0x198/0x2e0
[   19.503450]  kunit_try_run_case+0x170/0x3f0
[   19.503497]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.503548]  kthread+0x328/0x630
[   19.503608]  ret_from_fork+0x10/0x20
[   19.503663] 
[   19.503685] Allocated by task 265:
[   19.503716]  kasan_save_stack+0x3c/0x68
[   19.503758]  kasan_save_track+0x20/0x40
[   19.503832]  kasan_save_alloc_info+0x40/0x58
[   19.503911]  __kasan_kmalloc+0xd4/0xd8
[   19.503958]  __kmalloc_cache_noprof+0x15c/0x3c0
[   19.504049]  kasan_atomics+0xb8/0x2e0
[   19.504092]  kunit_try_run_case+0x170/0x3f0
[   19.504130]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.504174]  kthread+0x328/0x630
[   19.504219]  ret_from_fork+0x10/0x20
[   19.504260] 
[   19.504283] The buggy address belongs to the object at fff00000c788e780
[   19.504283]  which belongs to the cache kmalloc-64 of size 64
[   19.504356] The buggy address is located 0 bytes to the right of
[   19.504356]  allocated 48-byte region [fff00000c788e780, fff00000c788e7b0)
[   19.504419] 
[   19.504455] The buggy address belongs to the physical page:
[   19.504502] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10788e
[   19.504550] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.504598] page_type: f5(slab)
[   19.504635] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.504703] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.504745] page dumped because: kasan: bad access detected
[   19.504778] 
[   19.504798] Memory state around the buggy address:
[   19.504871]  fff00000c788e680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.504918]  fff00000c788e700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.504961] >fff00000c788e780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.505000]                                      ^
[   19.505035]  fff00000c788e800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.505088]  fff00000c788e880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.505127] ==================================================================
[   19.512720] ==================================================================
[   19.512788] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x154c/0x4858
[   19.512848] Write of size 8 at addr fff00000c788e7b0 by task kunit_try_catch/265
[   19.512899] 
[   19.512933] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250512 #1 PREEMPT 
[   19.513055] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.513088] Hardware name: linux,dummy-virt (DT)
[   19.513122] Call trace:
[   19.513147]  show_stack+0x20/0x38 (C)
[   19.513196]  dump_stack_lvl+0x8c/0xd0
[   19.513248]  print_report+0x118/0x608
[   19.513292]  kasan_report+0xdc/0x128
[   19.513335]  kasan_check_range+0x100/0x1a8
[   19.513382]  __kasan_check_write+0x20/0x30
[   19.513429]  kasan_atomics_helper+0x154c/0x4858
[   19.513476]  kasan_atomics+0x198/0x2e0
[   19.513521]  kunit_try_run_case+0x170/0x3f0
[   19.513569]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.513620]  kthread+0x328/0x630
[   19.513664]  ret_from_fork+0x10/0x20
[   19.513712] 
[   19.513733] Allocated by task 265:
[   19.513859]  kasan_save_stack+0x3c/0x68
[   19.513996]  kasan_save_track+0x20/0x40
[   19.514073]  kasan_save_alloc_info+0x40/0x58
[   19.514118]  __kasan_kmalloc+0xd4/0xd8
[   19.514155]  __kmalloc_cache_noprof+0x15c/0x3c0
[   19.514195]  kasan_atomics+0xb8/0x2e0
[   19.514232]  kunit_try_run_case+0x170/0x3f0
[   19.514582]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.514636]  kthread+0x328/0x630
[   19.514675]  ret_from_fork+0x10/0x20
[   19.514712] 
[   19.514738] The buggy address belongs to the object at fff00000c788e780
[   19.514738]  which belongs to the cache kmalloc-64 of size 64
[   19.514795] The buggy address is located 0 bytes to the right of
[   19.514795]  allocated 48-byte region [fff00000c788e780, fff00000c788e7b0)
[   19.514858] 
[   19.514880] The buggy address belongs to the physical page:
[   19.514914] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10788e
[   19.514964] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.515014] page_type: f5(slab)
[   19.515064] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.515120] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.515161] page dumped because: kasan: bad access detected
[   19.515196] 
[   19.515216] Memory state around the buggy address:
[   19.515252]  fff00000c788e680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.515295]  fff00000c788e700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.515400] >fff00000c788e780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.515460]                                      ^
[   19.515546]  fff00000c788e800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.515899]  fff00000c788e880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.516345] ==================================================================
[   19.345247] ==================================================================
[   19.345300] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xad4/0x4858
[   19.345357] Write of size 4 at addr fff00000c788e7b0 by task kunit_try_catch/265
[   19.345408] 
[   19.345439] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250512 #1 PREEMPT 
[   19.345524] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.345553] Hardware name: linux,dummy-virt (DT)
[   19.345587] Call trace:
[   19.345613]  show_stack+0x20/0x38 (C)
[   19.345663]  dump_stack_lvl+0x8c/0xd0
[   19.345713]  print_report+0x118/0x608
[   19.345758]  kasan_report+0xdc/0x128
[   19.345803]  kasan_check_range+0x100/0x1a8
[   19.345851]  __kasan_check_write+0x20/0x30
[   19.345908]  kasan_atomics_helper+0xad4/0x4858
[   19.345956]  kasan_atomics+0x198/0x2e0
[   19.346000]  kunit_try_run_case+0x170/0x3f0
[   19.346057]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.346113]  kthread+0x328/0x630
[   19.346158]  ret_from_fork+0x10/0x20
[   19.346205] 
[   19.346308] Allocated by task 265:
[   19.346402]  kasan_save_stack+0x3c/0x68
[   19.346449]  kasan_save_track+0x20/0x40
[   19.346487]  kasan_save_alloc_info+0x40/0x58
[   19.346529]  __kasan_kmalloc+0xd4/0xd8
[   19.346579]  __kmalloc_cache_noprof+0x15c/0x3c0
[   19.346661]  kasan_atomics+0xb8/0x2e0
[   19.346705]  kunit_try_run_case+0x170/0x3f0
[   19.346743]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.347079] 
[   19.347104] The buggy address belongs to the physical page:
[   19.347137] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10788e
[   19.347202] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.347255] page_type: f5(slab)
[   19.347296] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.347348] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.347390] page dumped because: kasan: bad access detected
[   19.347423] 
[   19.347445] Memory state around the buggy address:
[   19.347479]  fff00000c788e680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.347523]  fff00000c788e700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.347565] >fff00000c788e780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.347603]                                      ^
[   19.347637]  fff00000c788e800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.347679]  fff00000c788e880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.348205] ==================================================================
[   19.452846] ==================================================================
[   19.452907] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1128/0x4858
[   19.452966] Write of size 8 at addr fff00000c788e7b0 by task kunit_try_catch/265
[   19.453017] 
[   19.453063] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250512 #1 PREEMPT 
[   19.453151] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.453180] Hardware name: linux,dummy-virt (DT)
[   19.453212] Call trace:
[   19.453237]  show_stack+0x20/0x38 (C)
[   19.453287]  dump_stack_lvl+0x8c/0xd0
[   19.453334]  print_report+0x118/0x608
[   19.453380]  kasan_report+0xdc/0x128
[   19.453423]  kasan_check_range+0x100/0x1a8
[   19.453551]  __kasan_check_write+0x20/0x30
[   19.453813]  kasan_atomics_helper+0x1128/0x4858
[   19.454946]  kasan_atomics+0x198/0x2e0
[   19.455014]  kunit_try_run_case+0x170/0x3f0
[   19.455084]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.455141]  kthread+0x328/0x630
[   19.455187]  ret_from_fork+0x10/0x20
[   19.455236] 
[   19.455257] Allocated by task 265:
[   19.455555]  kasan_save_stack+0x3c/0x68
[   19.455900]  kasan_save_track+0x20/0x40
[   19.455954]  kasan_save_alloc_info+0x40/0x58
[   19.456239]  __kasan_kmalloc+0xd4/0xd8
[   19.456296]  __kmalloc_cache_noprof+0x15c/0x3c0
[   19.456338]  kasan_atomics+0xb8/0x2e0
[   19.456567]  kunit_try_run_case+0x170/0x3f0
[   19.456625]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.456833]  kthread+0x328/0x630
[   19.456881]  ret_from_fork+0x10/0x20
[   19.456922] 
[   19.457356] The buggy address belongs to the object at fff00000c788e780
[   19.457356]  which belongs to the cache kmalloc-64 of size 64
[   19.457430] The buggy address is located 0 bytes to the right of
[   19.457430]  allocated 48-byte region [fff00000c788e780, fff00000c788e7b0)
[   19.457591] 
[   19.457617] The buggy address belongs to the physical page:
[   19.457664] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10788e
[   19.458010] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.458142] page_type: f5(slab)
[   19.458205] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.458258] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.458302] page dumped because: kasan: bad access detected
[   19.458466] 
[   19.458492] Memory state around the buggy address:
[   19.458530]  fff00000c788e680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.458586]  fff00000c788e700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.458729] >fff00000c788e780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.458904]                                      ^
[   19.459018]  fff00000c788e800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.459082]  fff00000c788e880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.459227] ==================================================================
[   19.325310] ==================================================================
[   19.325369] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x99c/0x4858
[   19.325420] Write of size 4 at addr fff00000c788e7b0 by task kunit_try_catch/265
[   19.325489] 
[   19.325555] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250512 #1 PREEMPT 
[   19.325695] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.325757] Hardware name: linux,dummy-virt (DT)
[   19.325863] Call trace:
[   19.325952]  show_stack+0x20/0x38 (C)
[   19.326047]  dump_stack_lvl+0x8c/0xd0
[   19.326105]  print_report+0x118/0x608
[   19.326162]  kasan_report+0xdc/0x128
[   19.326207]  kasan_check_range+0x100/0x1a8
[   19.326256]  __kasan_check_write+0x20/0x30
[   19.326555]  kasan_atomics_helper+0x99c/0x4858
[   19.326650]  kasan_atomics+0x198/0x2e0
[   19.326697]  kunit_try_run_case+0x170/0x3f0
[   19.326745]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.326798]  kthread+0x328/0x630
[   19.327076]  ret_from_fork+0x10/0x20
[   19.327227] 
[   19.327253] Allocated by task 265:
[   19.327287]  kasan_save_stack+0x3c/0x68
[   19.327365]  kasan_save_track+0x20/0x40
[   19.327442]  kasan_save_alloc_info+0x40/0x58
[   19.327523]  __kasan_kmalloc+0xd4/0xd8
[   19.327561]  __kmalloc_cache_noprof+0x15c/0x3c0
[   19.327601]  kasan_atomics+0xb8/0x2e0
[   19.327647]  kunit_try_run_case+0x170/0x3f0
[   19.327743]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.327820]  kthread+0x328/0x630
[   19.328021]  ret_from_fork+0x10/0x20
[   19.328236] 
[   19.328541] The buggy address belongs to the object at fff00000c788e780
[   19.328541]  which belongs to the cache kmalloc-64 of size 64
[   19.328774] The buggy address is located 0 bytes to the right of
[   19.328774]  allocated 48-byte region [fff00000c788e780, fff00000c788e7b0)
[   19.329218] 
[   19.329250] The buggy address belongs to the physical page:
[   19.329287] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10788e
[   19.329548] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.329603] page_type: f5(slab)
[   19.329756] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.329825] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.330106] page dumped because: kasan: bad access detected
[   19.330287] 
[   19.330503] Memory state around the buggy address:
[   19.330834] >fff00000c788e780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.331155] ==================================================================
[   19.230802] ==================================================================
[   19.232730] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x32c/0x4858
[   19.232965] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.233025] Call trace:
[   19.234182]  __kasan_check_write+0x20/0x30
[   19.234708]  kunit_try_run_case+0x170/0x3f0
[   19.235535]  kasan_save_track+0x20/0x40
[   19.236447] The buggy address is located 0 bytes to the right of
[   19.236447]  allocated 48-byte region [fff00000c788e780, fff00000c788e7b0)
[   19.239158] Write of size 4 at addr fff00000c788e7b0 by task kunit_try_catch/265
[   19.240636]  kasan_report+0xdc/0x128
[   19.241264]  kthread+0x328/0x630
[   19.242746] 
[   19.248682]  kasan_atomics+0x198/0x2e0
[   19.251575] page_type: f5(slab)
[   19.252553]                                      ^
[   19.253428] 
[   19.253577] Hardware name: linux,dummy-virt (DT)
[   19.253635]  show_stack+0x20/0x38 (C)
[   19.254044]  kasan_atomics_helper+0x414/0x4858
[   19.254544] 
[   19.254730]  __kasan_kmalloc+0xd4/0xd8
[   19.255048] 
[   19.255075] The buggy address belongs to the object at fff00000c788e780
[   19.255075]  which belongs to the cache kmalloc-64 of size 64
[   19.255689]                                      ^
[   19.255774]  fff00000c788e800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.255821]  fff00000c788e880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.255861] ==================================================================
[   19.517078] ==================================================================
[   19.517294] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x15b4/0x4858
[   19.517374] Write of size 8 at addr fff00000c788e7b0 by task kunit_try_catch/265
[   19.517550] 
[   19.517589] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250512 #1 PREEMPT 
[   19.517800] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.517839] Hardware name: linux,dummy-virt (DT)
[   19.518089] Call trace:
[   19.518125]  show_stack+0x20/0x38 (C)
[   19.518200]  dump_stack_lvl+0x8c/0xd0
[   19.518284]  print_report+0x118/0x608
[   19.518372]  kasan_report+0xdc/0x128
[   19.518465]  kasan_check_range+0x100/0x1a8
[   19.518513]  __kasan_check_write+0x20/0x30
[   19.518561]  kasan_atomics_helper+0x15b4/0x4858
[   19.518806]  kasan_atomics+0x198/0x2e0
[   19.518868]  kunit_try_run_case+0x170/0x3f0
[   19.518919]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.519105]  kthread+0x328/0x630
[   19.519267]  ret_from_fork+0x10/0x20
[   19.519444] 
[   19.519469] Allocated by task 265:
[   19.519505]  kasan_save_stack+0x3c/0x68
[   19.519551]  kasan_save_track+0x20/0x40
[   19.519591]  kasan_save_alloc_info+0x40/0x58
[   19.519631]  __kasan_kmalloc+0xd4/0xd8
[   19.519667]  __kmalloc_cache_noprof+0x15c/0x3c0
[   19.519707]  kasan_atomics+0xb8/0x2e0
[   19.519743]  kunit_try_run_case+0x170/0x3f0
[   19.520144]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.520192]  kthread+0x328/0x630
[   19.520718]  ret_from_fork+0x10/0x20
[   19.520837] 
[   19.520868] The buggy address belongs to the object at fff00000c788e780
[   19.520868]  which belongs to the cache kmalloc-64 of size 64
[   19.521135] The buggy address is located 0 bytes to the right of
[   19.521135]  allocated 48-byte region [fff00000c788e780, fff00000c788e7b0)
[   19.521231] 
[   19.521305] The buggy address belongs to the physical page:
[   19.521508] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10788e
[   19.521681] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.521882] page_type: f5(slab)
[   19.522058] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.522120] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.522163] page dumped because: kasan: bad access detected
[   19.522198] 
[   19.522229] Memory state around the buggy address:
[   19.522265]  fff00000c788e680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.522308]  fff00000c788e700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.522350] >fff00000c788e780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.522518]                                      ^
[   19.522569]  fff00000c788e800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.522662]  fff00000c788e880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.522706] ==================================================================
[   19.411373] ==================================================================
[   19.411563] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xe44/0x4858
[   19.411639] Write of size 8 at addr fff00000c788e7b0 by task kunit_try_catch/265
[   19.411694] 
[   19.411737] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250512 #1 PREEMPT 
[   19.411824] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.411854] Hardware name: linux,dummy-virt (DT)
[   19.411887] Call trace:
[   19.411911]  show_stack+0x20/0x38 (C)
[   19.411961]  dump_stack_lvl+0x8c/0xd0
[   19.412561]  print_report+0x118/0x608
[   19.412629]  kasan_report+0xdc/0x128
[   19.412677]  kasan_check_range+0x100/0x1a8
[   19.412740]  __kasan_check_write+0x20/0x30
[   19.412812]  kasan_atomics_helper+0xe44/0x4858
[   19.412907]  kasan_atomics+0x198/0x2e0
[   19.413000]  kunit_try_run_case+0x170/0x3f0
[   19.413120]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.413243]  kthread+0x328/0x630
[   19.413301]  ret_from_fork+0x10/0x20
[   19.413351] 
[   19.413385] Allocated by task 265:
[   19.413417]  kasan_save_stack+0x3c/0x68
[   19.413461]  kasan_save_track+0x20/0x40
[   19.413498]  kasan_save_alloc_info+0x40/0x58
[   19.413538]  __kasan_kmalloc+0xd4/0xd8
[   19.413574]  __kmalloc_cache_noprof+0x15c/0x3c0
[   19.413614]  kasan_atomics+0xb8/0x2e0
[   19.413650]  kunit_try_run_case+0x170/0x3f0
[   19.413686]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.413741]  kthread+0x328/0x630
[   19.413783]  ret_from_fork+0x10/0x20
[   19.413821] 
[   19.413855] The buggy address belongs to the object at fff00000c788e780
[   19.413855]  which belongs to the cache kmalloc-64 of size 64
[   19.413937] The buggy address is located 0 bytes to the right of
[   19.413937]  allocated 48-byte region [fff00000c788e780, fff00000c788e7b0)
[   19.414048] 
[   19.414113] The buggy address belongs to the physical page:
[   19.414148] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10788e
[   19.414200] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.414269] page_type: f5(slab)
[   19.414311] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.414381] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.414466] page dumped because: kasan: bad access detected
[   19.414534] 
[   19.414592] Memory state around the buggy address:
[   19.414644]  fff00000c788e680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.414690]  fff00000c788e700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.414747] >fff00000c788e780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.414785]                                      ^
[   19.414831]  fff00000c788e800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.414873]  fff00000c788e880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.414911] ==================================================================
[   19.550318] ==================================================================
[   19.550376] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x175c/0x4858
[   19.550533] Write of size 8 at addr fff00000c788e7b0 by task kunit_try_catch/265
[   19.550599] 
[   19.550635] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250512 #1 PREEMPT 
[   19.550809] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.550844] Hardware name: linux,dummy-virt (DT)
[   19.551072] Call trace:
[   19.551106]  show_stack+0x20/0x38 (C)
[   19.551175]  dump_stack_lvl+0x8c/0xd0
[   19.551227]  print_report+0x118/0x608
[   19.551323]  kasan_report+0xdc/0x128
[   19.551386]  kasan_check_range+0x100/0x1a8
[   19.551440]  __kasan_check_write+0x20/0x30
[   19.551662]  kasan_atomics_helper+0x175c/0x4858
[   19.551784]  kasan_atomics+0x198/0x2e0
[   19.552031]  kunit_try_run_case+0x170/0x3f0
[   19.552105]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.552161]  kthread+0x328/0x630
[   19.552499]  ret_from_fork+0x10/0x20
[   19.552725] 
[   19.552777] Allocated by task 265:
[   19.552817]  kasan_save_stack+0x3c/0x68
[   19.552870]  kasan_save_track+0x20/0x40
[   19.552910]  kasan_save_alloc_info+0x40/0x58
[   19.552950]  __kasan_kmalloc+0xd4/0xd8
[   19.552987]  __kmalloc_cache_noprof+0x15c/0x3c0
[   19.553025]  kasan_atomics+0xb8/0x2e0
[   19.553077]  kunit_try_run_case+0x170/0x3f0
[   19.553117]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.553160]  kthread+0x328/0x630
[   19.553197]  ret_from_fork+0x10/0x20
[   19.553234] 
[   19.553256] The buggy address belongs to the object at fff00000c788e780
[   19.553256]  which belongs to the cache kmalloc-64 of size 64
[   19.553315] The buggy address is located 0 bytes to the right of
[   19.553315]  allocated 48-byte region [fff00000c788e780, fff00000c788e7b0)
[   19.553376] 
[   19.553398] The buggy address belongs to the physical page:
[   19.553430] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10788e
[   19.553483] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.553532] page_type: f5(slab)
[   19.553572] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.553624] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.553665] page dumped because: kasan: bad access detected
[   19.553699] 
[   19.553718] Memory state around the buggy address:
[   19.553750]  fff00000c788e680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.553793]  fff00000c788e700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.554210] >fff00000c788e780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.554284]                                      ^
[   19.554337]  fff00000c788e800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.554390]  fff00000c788e880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.554735] ==================================================================
[   19.420937] ==================================================================
[   19.421027] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf20/0x4858
[   19.421090] Write of size 8 at addr fff00000c788e7b0 by task kunit_try_catch/265
[   19.421140] 
[   19.421171] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250512 #1 PREEMPT 
[   19.421256] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.421284] Hardware name: linux,dummy-virt (DT)
[   19.421314] Call trace:
[   19.421340]  show_stack+0x20/0x38 (C)
[   19.421388]  dump_stack_lvl+0x8c/0xd0
[   19.421436]  print_report+0x118/0x608
[   19.421482]  kasan_report+0xdc/0x128
[   19.421527]  kasan_check_range+0x100/0x1a8
[   19.421574]  __kasan_check_write+0x20/0x30
[   19.421622]  kasan_atomics_helper+0xf20/0x4858
[   19.421668]  kasan_atomics+0x198/0x2e0
[   19.421712]  kunit_try_run_case+0x170/0x3f0
[   19.421758]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.421809]  kthread+0x328/0x630
[   19.421852]  ret_from_fork+0x10/0x20
[   19.422213] 
[   19.422278] Allocated by task 265:
[   19.422317]  kasan_save_stack+0x3c/0x68
[   19.422371]  kasan_save_track+0x20/0x40
[   19.422410]  kasan_save_alloc_info+0x40/0x58
[   19.422452]  __kasan_kmalloc+0xd4/0xd8
[   19.422489]  __kmalloc_cache_noprof+0x15c/0x3c0
[   19.422528]  kasan_atomics+0xb8/0x2e0
[   19.422575]  kunit_try_run_case+0x170/0x3f0
[   19.422620]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.422663]  kthread+0x328/0x630
[   19.422700]  ret_from_fork+0x10/0x20
[   19.422738] 
[   19.422760] The buggy address belongs to the object at fff00000c788e780
[   19.422760]  which belongs to the cache kmalloc-64 of size 64
[   19.422871] The buggy address is located 0 bytes to the right of
[   19.422871]  allocated 48-byte region [fff00000c788e780, fff00000c788e7b0)
[   19.422968] 
[   19.423002] The buggy address belongs to the physical page:
[   19.423035] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10788e
[   19.423116] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.423173] page_type: f5(slab)
[   19.423213] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.423264] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.423305] page dumped because: kasan: bad access detected
[   19.423339] 
[   19.423370] Memory state around the buggy address:
[   19.423402]  fff00000c788e680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.423446]  fff00000c788e700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.423544] >fff00000c788e780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.423625]                                      ^
[   19.423678]  fff00000c788e800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.423726]  fff00000c788e880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.423766] ==================================================================
[   19.544973] ==================================================================
[   19.545302] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e10/0x4858
[   19.545386] Read of size 8 at addr fff00000c788e7b0 by task kunit_try_catch/265
[   19.545473] 
[   19.545505] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250512 #1 PREEMPT 
[   19.545588] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.545624] Hardware name: linux,dummy-virt (DT)
[   19.545690] Call trace:
[   19.545733]  show_stack+0x20/0x38 (C)
[   19.545827]  dump_stack_lvl+0x8c/0xd0
[   19.546055]  print_report+0x118/0x608
[   19.546346]  kasan_report+0xdc/0x128
[   19.546408]  __asan_report_load8_noabort+0x20/0x30
[   19.546476]  kasan_atomics_helper+0x3e10/0x4858
[   19.546818]  kasan_atomics+0x198/0x2e0
[   19.546891]  kunit_try_run_case+0x170/0x3f0
[   19.546953]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.547011]  kthread+0x328/0x630
[   19.547312]  ret_from_fork+0x10/0x20
[   19.547463] 
[   19.547593] Allocated by task 265:
[   19.547767]  kasan_save_stack+0x3c/0x68
[   19.547974]  kasan_save_track+0x20/0x40
[   19.548020]  kasan_save_alloc_info+0x40/0x58
[   19.548077]  __kasan_kmalloc+0xd4/0xd8
[   19.548118]  __kmalloc_cache_noprof+0x15c/0x3c0
[   19.548158]  kasan_atomics+0xb8/0x2e0
[   19.548196]  kunit_try_run_case+0x170/0x3f0
[   19.548235]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.548277]  kthread+0x328/0x630
[   19.548315]  ret_from_fork+0x10/0x20
[   19.548352] 
[   19.548373] The buggy address belongs to the object at fff00000c788e780
[   19.548373]  which belongs to the cache kmalloc-64 of size 64
[   19.548431] The buggy address is located 0 bytes to the right of
[   19.548431]  allocated 48-byte region [fff00000c788e780, fff00000c788e7b0)
[   19.548494] 
[   19.548516] The buggy address belongs to the physical page:
[   19.548548] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10788e
[   19.548602] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.548652] page_type: f5(slab)
[   19.548692] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.548744] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.548786] page dumped because: kasan: bad access detected
[   19.548819] 
[   19.549194] Memory state around the buggy address:
[   19.549235]  fff00000c788e680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.549283]  fff00000c788e700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.549327] >fff00000c788e780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.549418]                                      ^
[   19.549455]  fff00000c788e800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.549499]  fff00000c788e880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.549538] ==================================================================
[   19.533456] ==================================================================
[   19.533733] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3df4/0x4858
[   19.534008] Read of size 8 at addr fff00000c788e7b0 by task kunit_try_catch/265
[   19.534232] 
[   19.534271] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250512 #1 PREEMPT 
[   19.534467] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.534599] Hardware name: linux,dummy-virt (DT)
[   19.534791] Call trace:
[   19.534986]  show_stack+0x20/0x38 (C)
[   19.535064]  dump_stack_lvl+0x8c/0xd0
[   19.535117]  print_report+0x118/0x608
[   19.535201]  kasan_report+0xdc/0x128
[   19.535453]  __asan_report_load8_noabort+0x20/0x30
[   19.535565]  kasan_atomics_helper+0x3df4/0x4858
[   19.535869]  kasan_atomics+0x198/0x2e0
[   19.536113]  kunit_try_run_case+0x170/0x3f0
[   19.536178]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.536503]  kthread+0x328/0x630
[   19.536845]  ret_from_fork+0x10/0x20
[   19.536900] 
[   19.536921] Allocated by task 265:
[   19.536953]  kasan_save_stack+0x3c/0x68
[   19.536998]  kasan_save_track+0x20/0x40
[   19.537062]  kasan_save_alloc_info+0x40/0x58
[   19.537155]  __kasan_kmalloc+0xd4/0xd8
[   19.537218]  __kmalloc_cache_noprof+0x15c/0x3c0
[   19.537257]  kasan_atomics+0xb8/0x2e0
[   19.537299]  kunit_try_run_case+0x170/0x3f0
[   19.537445]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.537687]  kthread+0x328/0x630
[   19.537913]  ret_from_fork+0x10/0x20
[   19.537958] 
[   19.537981] The buggy address belongs to the object at fff00000c788e780
[   19.537981]  which belongs to the cache kmalloc-64 of size 64
[   19.538054] The buggy address is located 0 bytes to the right of
[   19.538054]  allocated 48-byte region [fff00000c788e780, fff00000c788e7b0)
[   19.538207] 
[   19.538247] The buggy address belongs to the physical page:
[   19.538329] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10788e
[   19.538386] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.538441] page_type: f5(slab)
[   19.538530] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.538596] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.538700] page dumped because: kasan: bad access detected
[   19.538736] 
[   19.538758] Memory state around the buggy address:
[   19.538845]  fff00000c788e680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.538926]  fff00000c788e700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.538970] >fff00000c788e780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.539009]                                      ^
[   19.539052]  fff00000c788e800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.539100]  fff00000c788e880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.539139] ==================================================================
[   19.459604] ==================================================================
[   19.459651] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1190/0x4858
[   19.459707] Write of size 8 at addr fff00000c788e7b0 by task kunit_try_catch/265
[   19.459757] 
[   19.459789] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250512 #1 PREEMPT 
[   19.459873] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.459902] Hardware name: linux,dummy-virt (DT)
[   19.459934] Call trace:
[   19.459958]  show_stack+0x20/0x38 (C)
[   19.460008]  dump_stack_lvl+0x8c/0xd0
[   19.460072]  print_report+0x118/0x608
[   19.462097]  kasan_report+0xdc/0x128
[   19.462932]  kasan_check_range+0x100/0x1a8
[   19.463262]  __kasan_check_write+0x20/0x30
[   19.463347]  kasan_atomics_helper+0x1190/0x4858
[   19.463450]  kasan_atomics+0x198/0x2e0
[   19.463512]  kunit_try_run_case+0x170/0x3f0
[   19.463579]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.463632]  kthread+0x328/0x630
[   19.463869]  ret_from_fork+0x10/0x20
[   19.463945] 
[   19.463981] Allocated by task 265:
[   19.464275]  kasan_save_stack+0x3c/0x68
[   19.464329]  kasan_save_track+0x20/0x40
[   19.464589]  kasan_save_alloc_info+0x40/0x58
[   19.464641]  __kasan_kmalloc+0xd4/0xd8
[   19.464680]  __kmalloc_cache_noprof+0x15c/0x3c0
[   19.464759]  kasan_atomics+0xb8/0x2e0
[   19.464822]  kunit_try_run_case+0x170/0x3f0
[   19.464865]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.464910]  kthread+0x328/0x630
[   19.465255]  ret_from_fork+0x10/0x20
[   19.465330] 
[   19.465356] The buggy address belongs to the object at fff00000c788e780
[   19.465356]  which belongs to the cache kmalloc-64 of size 64
[   19.465417] The buggy address is located 0 bytes to the right of
[   19.465417]  allocated 48-byte region [fff00000c788e780, fff00000c788e7b0)
[   19.465480] 
[   19.466069] The buggy address belongs to the physical page:
[   19.466138] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10788e
[   19.466322] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.466378] page_type: f5(slab)
[   19.466420] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.466623] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.466824] page dumped because: kasan: bad access detected
[   19.466869] 
[   19.466894] Memory state around the buggy address:
[   19.467057]  fff00000c788e680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.467339]  fff00000c788e700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.467534] >fff00000c788e780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.467581]                                      ^
[   19.467912]  fff00000c788e800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.468192]  fff00000c788e880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.468359] ==================================================================
[   19.433309] ==================================================================
[   19.433406] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xff0/0x4858
[   19.433465] Write of size 8 at addr fff00000c788e7b0 by task kunit_try_catch/265
[   19.433608] 
[   19.433673] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250512 #1 PREEMPT 
[   19.433765] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.433793] Hardware name: linux,dummy-virt (DT)
[   19.433827] Call trace:
[   19.434394]  show_stack+0x20/0x38 (C)
[   19.434478]  dump_stack_lvl+0x8c/0xd0
[   19.434529]  print_report+0x118/0x608
[   19.434591]  kasan_report+0xdc/0x128
[   19.434641]  kasan_check_range+0x100/0x1a8
[   19.434690]  __kasan_check_write+0x20/0x30
[   19.434827]  kasan_atomics_helper+0xff0/0x4858
[   19.434985]  kasan_atomics+0x198/0x2e0
[   19.435240]  kunit_try_run_case+0x170/0x3f0
[   19.435311]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.435487]  kthread+0x328/0x630
[   19.435554]  ret_from_fork+0x10/0x20
[   19.435604] 
[   19.435639] Allocated by task 265:
[   19.435715]  kasan_save_stack+0x3c/0x68
[   19.435917]  kasan_save_track+0x20/0x40
[   19.436126]  kasan_save_alloc_info+0x40/0x58
[   19.436297]  __kasan_kmalloc+0xd4/0xd8
[   19.436339]  __kmalloc_cache_noprof+0x15c/0x3c0
[   19.436398]  kasan_atomics+0xb8/0x2e0
[   19.436536]  kunit_try_run_case+0x170/0x3f0
[   19.436761]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.436812]  kthread+0x328/0x630
[   19.436851]  ret_from_fork+0x10/0x20
[   19.436888] 
[   19.436912] The buggy address belongs to the object at fff00000c788e780
[   19.436912]  which belongs to the cache kmalloc-64 of size 64
[   19.438062] The buggy address is located 0 bytes to the right of
[   19.438062]  allocated 48-byte region [fff00000c788e780, fff00000c788e7b0)
[   19.438334] 
[   19.438366] The buggy address belongs to the physical page:
[   19.438400] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10788e
[   19.438456] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.438506] page_type: f5(slab)
[   19.438547] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.438615] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.438698] page dumped because: kasan: bad access detected
[   19.438733] 
[   19.438753] Memory state around the buggy address:
[   19.438786]  fff00000c788e680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.438830]  fff00000c788e700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.438873] >fff00000c788e780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.438913]                                      ^
[   19.438946]  fff00000c788e800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.438992]  fff00000c788e880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.439030] ==================================================================
[   19.391356] ==================================================================
[   19.391417] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xd3c/0x4858
[   19.391476] Write of size 4 at addr fff00000c788e7b0 by task kunit_try_catch/265
[   19.391547] 
[   19.391585] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250512 #1 PREEMPT 
[   19.391672] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.391838] Hardware name: linux,dummy-virt (DT)
[   19.391912] Call trace:
[   19.391968]  show_stack+0x20/0x38 (C)
[   19.392088]  dump_stack_lvl+0x8c/0xd0
[   19.392149]  print_report+0x118/0x608
[   19.392254]  kasan_report+0xdc/0x128
[   19.392300]  kasan_check_range+0x100/0x1a8
[   19.392346]  __kasan_check_write+0x20/0x30
[   19.392395]  kasan_atomics_helper+0xd3c/0x4858
[   19.392443]  kasan_atomics+0x198/0x2e0
[   19.392487]  kunit_try_run_case+0x170/0x3f0
[   19.392533]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.392583]  kthread+0x328/0x630
[   19.392628]  ret_from_fork+0x10/0x20
[   19.392677] 
[   19.392697] Allocated by task 265:
[   19.392728]  kasan_save_stack+0x3c/0x68
[   19.392771]  kasan_save_track+0x20/0x40
[   19.392810]  kasan_save_alloc_info+0x40/0x58
[   19.392849]  __kasan_kmalloc+0xd4/0xd8
[   19.392885]  __kmalloc_cache_noprof+0x15c/0x3c0
[   19.392925]  kasan_atomics+0xb8/0x2e0
[   19.392959]  kunit_try_run_case+0x170/0x3f0
[   19.392995]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.393036]  kthread+0x328/0x630
[   19.393161]  ret_from_fork+0x10/0x20
[   19.393334] 
[   19.393358] The buggy address belongs to the object at fff00000c788e780
[   19.393358]  which belongs to the cache kmalloc-64 of size 64
[   19.393438] The buggy address is located 0 bytes to the right of
[   19.393438]  allocated 48-byte region [fff00000c788e780, fff00000c788e7b0)
[   19.393634] 
[   19.393701] The buggy address belongs to the physical page:
[   19.393940] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10788e
[   19.394025] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.394088] page_type: f5(slab)
[   19.394140] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.394207] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.394250] page dumped because: kasan: bad access detected
[   19.394284] 
[   19.394305] Memory state around the buggy address:
[   19.394339]  fff00000c788e680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.394405]  fff00000c788e700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.394470] >fff00000c788e780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.394520]                                      ^
[   19.394554]  fff00000c788e800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.394680]  fff00000c788e880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.394800] ==================================================================
[   19.489554] ==================================================================
[   19.489601] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1384/0x4858
[   19.489648] Write of size 8 at addr fff00000c788e7b0 by task kunit_try_catch/265
[   19.489697] 
[   19.489726] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250512 #1 PREEMPT 
[   19.489807] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.489836] Hardware name: linux,dummy-virt (DT)
[   19.489866] Call trace:
[   19.489911]  show_stack+0x20/0x38 (C)
[   19.490015]  dump_stack_lvl+0x8c/0xd0
[   19.490079]  print_report+0x118/0x608
[   19.490131]  kasan_report+0xdc/0x128
[   19.490176]  kasan_check_range+0x100/0x1a8
[   19.490222]  __kasan_check_write+0x20/0x30
[   19.490270]  kasan_atomics_helper+0x1384/0x4858
[   19.490353]  kasan_atomics+0x198/0x2e0
[   19.490409]  kunit_try_run_case+0x170/0x3f0
[   19.490482]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.490578]  kthread+0x328/0x630
[   19.490814]  ret_from_fork+0x10/0x20
[   19.490870] 
[   19.490892] Allocated by task 265:
[   19.490923]  kasan_save_stack+0x3c/0x68
[   19.491071]  kasan_save_track+0x20/0x40
[   19.491115]  kasan_save_alloc_info+0x40/0x58
[   19.491156]  __kasan_kmalloc+0xd4/0xd8
[   19.491192]  __kmalloc_cache_noprof+0x15c/0x3c0
[   19.491233]  kasan_atomics+0xb8/0x2e0
[   19.491569]  kunit_try_run_case+0x170/0x3f0
[   19.491654]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.491704]  kthread+0x328/0x630
[   19.491743]  ret_from_fork+0x10/0x20
[   19.491780] 
[   19.491946] The buggy address belongs to the object at fff00000c788e780
[   19.491946]  which belongs to the cache kmalloc-64 of size 64
[   19.492013] The buggy address is located 0 bytes to the right of
[   19.492013]  allocated 48-byte region [fff00000c788e780, fff00000c788e7b0)
[   19.492088] 
[   19.492128] The buggy address belongs to the physical page:
[   19.492175] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10788e
[   19.492225] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.492297] page_type: f5(slab)
[   19.492386] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.492438] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.492508] page dumped because: kasan: bad access detected
[   19.492542] 
[   19.492562] Memory state around the buggy address:
[   19.492611]  fff00000c788e680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.492707]  fff00000c788e700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.492939] >fff00000c788e780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.493015]                                      ^
[   19.493062]  fff00000c788e800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.493296]  fff00000c788e880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.493948] ==================================================================
[   19.555164] ==================================================================
[   19.555223] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e20/0x4858
[   19.555281] Read of size 8 at addr fff00000c788e7b0 by task kunit_try_catch/265
[   19.555332] 
[   19.555378] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250512 #1 PREEMPT 
[   19.555461] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.555491] Hardware name: linux,dummy-virt (DT)
[   19.555522] Call trace:
[   19.555545]  show_stack+0x20/0x38 (C)
[   19.555596]  dump_stack_lvl+0x8c/0xd0
[   19.555644]  print_report+0x118/0x608
[   19.555690]  kasan_report+0xdc/0x128
[   19.555734]  __asan_report_load8_noabort+0x20/0x30
[   19.555841]  kasan_atomics_helper+0x3e20/0x4858
[   19.556004]  kasan_atomics+0x198/0x2e0
[   19.556202]  kunit_try_run_case+0x170/0x3f0
[   19.556378]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.556461]  kthread+0x328/0x630
[   19.556516]  ret_from_fork+0x10/0x20
[   19.556566] 
[   19.556587] Allocated by task 265:
[   19.556618]  kasan_save_stack+0x3c/0x68
[   19.556815]  kasan_save_track+0x20/0x40
[   19.556863]  kasan_save_alloc_info+0x40/0x58
[   19.556919]  __kasan_kmalloc+0xd4/0xd8
[   19.557031]  __kmalloc_cache_noprof+0x15c/0x3c0
[   19.557144]  kasan_atomics+0xb8/0x2e0
[   19.557358]  kunit_try_run_case+0x170/0x3f0
[   19.557448]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.557601]  kthread+0x328/0x630
[   19.557641]  ret_from_fork+0x10/0x20
[   19.557686] 
[   19.557729] The buggy address belongs to the object at fff00000c788e780
[   19.557729]  which belongs to the cache kmalloc-64 of size 64
[   19.557874] The buggy address is located 0 bytes to the right of
[   19.557874]  allocated 48-byte region [fff00000c788e780, fff00000c788e7b0)
[   19.557977] 
[   19.558000] The buggy address belongs to the physical page:
[   19.558576] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10788e
[   19.558719] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.558803] page_type: f5(slab)
[   19.558844] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.558921] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.558968] page dumped because: kasan: bad access detected
[   19.559003] 
[   19.559023] Memory state around the buggy address:
[   19.559103]  fff00000c788e680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.559340]  fff00000c788e700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.559663] >fff00000c788e780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.559750]                                      ^
[   19.559808]  fff00000c788e800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.559851]  fff00000c788e880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.560080] ==================================================================
[   19.527354] ==================================================================
[   19.527423] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1644/0x4858
[   19.527790] Write of size 8 at addr fff00000c788e7b0 by task kunit_try_catch/265
[   19.527867] 
[   19.527902] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250512 #1 PREEMPT 
[   19.527990] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.528020] Hardware name: linux,dummy-virt (DT)
[   19.528063] Call trace:
[   19.528090]  show_stack+0x20/0x38 (C)
[   19.528145]  dump_stack_lvl+0x8c/0xd0
[   19.528358]  print_report+0x118/0x608
[   19.528556]  kasan_report+0xdc/0x128
[   19.528610]  kasan_check_range+0x100/0x1a8
[   19.528690]  __kasan_check_write+0x20/0x30
[   19.528780]  kasan_atomics_helper+0x1644/0x4858
[   19.528840]  kasan_atomics+0x198/0x2e0
[   19.528948]  kunit_try_run_case+0x170/0x3f0
[   19.529005]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.529165]  kthread+0x328/0x630
[   19.529223]  ret_from_fork+0x10/0x20
[   19.529292] 
[   19.529319] Allocated by task 265:
[   19.529352]  kasan_save_stack+0x3c/0x68
[   19.529397]  kasan_save_track+0x20/0x40
[   19.529651]  kasan_save_alloc_info+0x40/0x58
[   19.529933]  __kasan_kmalloc+0xd4/0xd8
[   19.529999]  __kmalloc_cache_noprof+0x15c/0x3c0
[   19.530050]  kasan_atomics+0xb8/0x2e0
[   19.530094]  kunit_try_run_case+0x170/0x3f0
[   19.530412]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.530503]  kthread+0x328/0x630
[   19.530655]  ret_from_fork+0x10/0x20
[   19.530866] 
[   19.530947] The buggy address belongs to the object at fff00000c788e780
[   19.530947]  which belongs to the cache kmalloc-64 of size 64
[   19.531014] The buggy address is located 0 bytes to the right of
[   19.531014]  allocated 48-byte region [fff00000c788e780, fff00000c788e7b0)
[   19.531089] 
[   19.531116] The buggy address belongs to the physical page:
[   19.531204] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10788e
[   19.531543] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.531615] page_type: f5(slab)
[   19.531851] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.531925] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.532106] page dumped because: kasan: bad access detected
[   19.532372] 
[   19.532401] Memory state around the buggy address:
[   19.532485]  fff00000c788e680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.532535]  fff00000c788e700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.532770] >fff00000c788e780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.532818]                                      ^
[   19.532859]  fff00000c788e800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.533185]  fff00000c788e880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.533233] ==================================================================
[   19.404957] ==================================================================
[   19.405001] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f58/0x4858
[   19.405060] Read of size 8 at addr fff00000c788e7b0 by task kunit_try_catch/265
[   19.405110] 
[   19.405143] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250512 #1 PREEMPT 
[   19.405226] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.405256] Hardware name: linux,dummy-virt (DT)
[   19.405289] Call trace:
[   19.405326]  show_stack+0x20/0x38 (C)
[   19.405377]  dump_stack_lvl+0x8c/0xd0
[   19.405426]  print_report+0x118/0x608
[   19.405471]  kasan_report+0xdc/0x128
[   19.405517]  __asan_report_load8_noabort+0x20/0x30
[   19.406082]  kasan_atomics_helper+0x3f58/0x4858
[   19.406200]  kasan_atomics+0x198/0x2e0
[   19.406253]  kunit_try_run_case+0x170/0x3f0
[   19.406302]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.406431]  kthread+0x328/0x630
[   19.406486]  ret_from_fork+0x10/0x20
[   19.406537] 
[   19.406608] Allocated by task 265:
[   19.406644]  kasan_save_stack+0x3c/0x68
[   19.407433]  kasan_save_track+0x20/0x40
[   19.407503]  kasan_save_alloc_info+0x40/0x58
[   19.407557]  __kasan_kmalloc+0xd4/0xd8
[   19.407597]  __kmalloc_cache_noprof+0x15c/0x3c0
[   19.407637]  kasan_atomics+0xb8/0x2e0
[   19.407673]  kunit_try_run_case+0x170/0x3f0
[   19.407711]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.407754]  kthread+0x328/0x630
[   19.407793]  ret_from_fork+0x10/0x20
[   19.408391] 
[   19.408419] The buggy address belongs to the object at fff00000c788e780
[   19.408419]  which belongs to the cache kmalloc-64 of size 64
[   19.408481] The buggy address is located 0 bytes to the right of
[   19.408481]  allocated 48-byte region [fff00000c788e780, fff00000c788e7b0)
[   19.408544] 
[   19.408567] The buggy address belongs to the physical page:
[   19.408598] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10788e
[   19.408650] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.408832] page_type: f5(slab)
[   19.408880] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.409397] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.409491] page dumped because: kasan: bad access detected
[   19.409727] 
[   19.409773] Memory state around the buggy address:
[   19.409807]  fff00000c788e680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.409853]  fff00000c788e700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.409905] >fff00000c788e780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.409948]                                      ^
[   19.410328]  fff00000c788e800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.410519]  fff00000c788e880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.410590] ==================================================================
[   19.315730] ==================================================================
[   19.315791] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x42d8/0x4858
[   19.315848] Read of size 4 at addr fff00000c788e7b0 by task kunit_try_catch/265
[   19.315912] 
[   19.315949] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250512 #1 PREEMPT 
[   19.316431] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.316505] Hardware name: linux,dummy-virt (DT)
[   19.316544] Call trace:
[   19.316569]  show_stack+0x20/0x38 (C)
[   19.316627]  dump_stack_lvl+0x8c/0xd0
[   19.317056]  print_report+0x118/0x608
[   19.317126]  kasan_report+0xdc/0x128
[   19.317177]  __asan_report_load4_noabort+0x20/0x30
[   19.317230]  kasan_atomics_helper+0x42d8/0x4858
[   19.317318]  kasan_atomics+0x198/0x2e0
[   19.317379]  kunit_try_run_case+0x170/0x3f0
[   19.317472]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.317550]  kthread+0x328/0x630
[   19.317644]  ret_from_fork+0x10/0x20
[   19.317751] 
[   19.317807] Allocated by task 265:
[   19.317847]  kasan_save_stack+0x3c/0x68
[   19.318124]  kasan_save_track+0x20/0x40
[   19.318170]  kasan_save_alloc_info+0x40/0x58
[   19.318212]  __kasan_kmalloc+0xd4/0xd8
[   19.318262]  __kmalloc_cache_noprof+0x15c/0x3c0
[   19.318409]  kasan_atomics+0xb8/0x2e0
[   19.318535]  kunit_try_run_case+0x170/0x3f0
[   19.318657]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.318707]  kthread+0x328/0x630
[   19.318744]  ret_from_fork+0x10/0x20
[   19.318781] 
[   19.318806] The buggy address belongs to the object at fff00000c788e780
[   19.318806]  which belongs to the cache kmalloc-64 of size 64
[   19.318866] The buggy address is located 0 bytes to the right of
[   19.318866]  allocated 48-byte region [fff00000c788e780, fff00000c788e7b0)
[   19.319283] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.319572] page dumped because: kasan: bad access detected
[   19.320383]  fff00000c788e800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.321912] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.323158]  kthread+0x328/0x630
[   19.323648]  __kmalloc_cache_noprof+0x15c/0x3c0
[   19.323689]  kasan_atomics+0xb8/0x2e0
[   19.323725]  kunit_try_run_case+0x170/0x3f0
[   19.323763]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.323806]  kthread+0x328/0x630
[   19.323895]  ret_from_fork+0x10/0x20
[   19.323947] 
[   19.323970] The buggy address belongs to the object at fff00000c788e780
[   19.323970]  which belongs to the cache kmalloc-64 of size 64
[   19.324034] The buggy address is located 0 bytes to the right of
[   19.324034]  allocated 48-byte region [fff00000c788e780, fff00000c788e7b0)
[   19.324110] 
[   19.324133] The buggy address belongs to the physical page:
[   19.324167] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10788e
[   19.324263] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.324318] page_type: f5(slab)
[   19.324368] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.324462] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.324536] page dumped because: kasan: bad access detected
[   19.324576] 
[   19.324597] Memory state around the buggy address:
[   19.324632]  fff00000c788e680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.324709]  fff00000c788e700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.324758] >fff00000c788e780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.324798]                                      ^
[   19.324838]  fff00000c788e800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.324918]  fff00000c788e880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.324964] ==================================================================
[   19.424782] ==================================================================
[   19.424860] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf88/0x4858
[   19.424923] Write of size 8 at addr fff00000c788e7b0 by task kunit_try_catch/265
[   19.424975] 
[   19.425007] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250512 #1 PREEMPT 
[   19.425104] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.425135] Hardware name: linux,dummy-virt (DT)
[   19.425169] Call trace:
[   19.425645]  show_stack+0x20/0x38 (C)
[   19.426078]  dump_stack_lvl+0x8c/0xd0
[   19.426569]  print_report+0x118/0x608
[   19.426753]  kasan_report+0xdc/0x128
[   19.426947]  kasan_check_range+0x100/0x1a8
[   19.427012]  __kasan_check_write+0x20/0x30
[   19.427234]  kasan_atomics_helper+0xf88/0x4858
[   19.427385]  kasan_atomics+0x198/0x2e0
[   19.427784]  kunit_try_run_case+0x170/0x3f0
[   19.427884]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.428204]  kthread+0x328/0x630
[   19.428308]  ret_from_fork+0x10/0x20
[   19.428377] 
[   19.428401] Allocated by task 265:
[   19.428726]  kasan_save_stack+0x3c/0x68
[   19.429007]  kasan_save_track+0x20/0x40
[   19.429086]  kasan_save_alloc_info+0x40/0x58
[   19.429583]  __kasan_kmalloc+0xd4/0xd8
[   19.429887]  __kmalloc_cache_noprof+0x15c/0x3c0
[   19.430107]  kasan_atomics+0xb8/0x2e0
[   19.430216]  kunit_try_run_case+0x170/0x3f0
[   19.430263]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.430307]  kthread+0x328/0x630
[   19.430344]  ret_from_fork+0x10/0x20
[   19.430380] 
[   19.430405] The buggy address belongs to the object at fff00000c788e780
[   19.430405]  which belongs to the cache kmalloc-64 of size 64
[   19.430464] The buggy address is located 0 bytes to the right of
[   19.430464]  allocated 48-byte region [fff00000c788e780, fff00000c788e7b0)
[   19.430974] 
[   19.431062] The buggy address belongs to the physical page:
[   19.431477] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10788e
[   19.431550] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.431605] page_type: f5(slab)
[   19.431776] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.431837] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.431889] page dumped because: kasan: bad access detected
[   19.432128] 
[   19.432166] Memory state around the buggy address:
[   19.432286]  fff00000c788e680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.432348]  fff00000c788e700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.432395] >fff00000c788e780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.432565]                                      ^
[   19.432620]  fff00000c788e800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.432667]  fff00000c788e880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.432813] ==================================================================
[   19.385612] ==================================================================
[   19.385659] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3dd8/0x4858
[   19.385760] Read of size 4 at addr fff00000c788e7b0 by task kunit_try_catch/265
[   19.385815] 
[   19.386446] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250512 #1 PREEMPT 
[   19.386689] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.386737] Hardware name: linux,dummy-virt (DT)
[   19.386818] Call trace:
[   19.386863]  show_stack+0x20/0x38 (C)
[   19.387118]  dump_stack_lvl+0x8c/0xd0
[   19.387180]  print_report+0x118/0x608
[   19.387229]  kasan_report+0xdc/0x128
[   19.387277]  __asan_report_load4_noabort+0x20/0x30
[   19.387542]  kasan_atomics_helper+0x3dd8/0x4858
[   19.387885]  kasan_atomics+0x198/0x2e0
[   19.387938]  kunit_try_run_case+0x170/0x3f0
[   19.387987]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.388059]  kthread+0x328/0x630
[   19.388114]  ret_from_fork+0x10/0x20
[   19.388207] 
[   19.388452] Allocated by task 265:
[   19.388512]  kasan_save_stack+0x3c/0x68
[   19.388571]  kasan_save_track+0x20/0x40
[   19.388673]  kasan_save_alloc_info+0x40/0x58
[   19.388718]  __kasan_kmalloc+0xd4/0xd8
[   19.388765]  __kmalloc_cache_noprof+0x15c/0x3c0
[   19.388933]  kasan_atomics+0xb8/0x2e0
[   19.389005]  kunit_try_run_case+0x170/0x3f0
[   19.389108]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.389161]  kthread+0x328/0x630
[   19.389197]  ret_from_fork+0x10/0x20
[   19.389235] 
[   19.389393] The buggy address belongs to the object at fff00000c788e780
[   19.389393]  which belongs to the cache kmalloc-64 of size 64
[   19.389464] The buggy address is located 0 bytes to the right of
[   19.389464]  allocated 48-byte region [fff00000c788e780, fff00000c788e7b0)
[   19.389579] 
[   19.389629] The buggy address belongs to the physical page:
[   19.389677] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10788e
[   19.389731] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.389782] page_type: f5(slab)
[   19.389824] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.389888] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.389932] page dumped because: kasan: bad access detected
[   19.389965] 
[   19.389985] Memory state around the buggy address:
[   19.390019]  fff00000c788e680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.390073]  fff00000c788e700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.390131] >fff00000c788e780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.390172]                                      ^
[   19.390209]  fff00000c788e800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.390252]  fff00000c788e880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.390300] ==================================================================
[   19.494559] ==================================================================
[   19.494856] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f04/0x4858
[   19.494921] Read of size 8 at addr fff00000c788e7b0 by task kunit_try_catch/265
[   19.495168] 
[   19.495215] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250512 #1 PREEMPT 
[   19.495646] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.495807] Hardware name: linux,dummy-virt (DT)
[   19.495852] Call trace:
[   19.496003]  show_stack+0x20/0x38 (C)
[   19.496171]  dump_stack_lvl+0x8c/0xd0
[   19.496257]  print_report+0x118/0x608
[   19.496327]  kasan_report+0xdc/0x128
[   19.496379]  __asan_report_load8_noabort+0x20/0x30
[   19.496709]  kasan_atomics_helper+0x3f04/0x4858
[   19.496936]  kasan_atomics+0x198/0x2e0
[   19.497000]  kunit_try_run_case+0x170/0x3f0
[   19.497063]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.497120]  kthread+0x328/0x630
[   19.497167]  ret_from_fork+0x10/0x20
[   19.497217] 
[   19.497238] Allocated by task 265:
[   19.497271]  kasan_save_stack+0x3c/0x68
[   19.497315]  kasan_save_track+0x20/0x40
[   19.498096]  kasan_save_alloc_info+0x40/0x58
[   19.498319]  __kasan_kmalloc+0xd4/0xd8
[   19.498363]  __kmalloc_cache_noprof+0x15c/0x3c0
[   19.498401]  kasan_atomics+0xb8/0x2e0
[   19.498439]  kunit_try_run_case+0x170/0x3f0
[   19.498476]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.498519]  kthread+0x328/0x630
[   19.498556]  ret_from_fork+0x10/0x20
[   19.498604] 
[   19.498628] The buggy address belongs to the object at fff00000c788e780
[   19.498628]  which belongs to the cache kmalloc-64 of size 64
[   19.498686] The buggy address is located 0 bytes to the right of
[   19.498686]  allocated 48-byte region [fff00000c788e780, fff00000c788e7b0)
[   19.498748] 
[   19.498770] The buggy address belongs to the physical page:
[   19.498802] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10788e
[   19.498854] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.498903] page_type: f5(slab)
[   19.498942] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.498993] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.499035] page dumped because: kasan: bad access detected
[   19.499077] 
[   19.499099] Memory state around the buggy address:
[   19.499131]  fff00000c788e680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.499176]  fff00000c788e700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.499218] >fff00000c788e780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.499256]                                      ^
[   19.499291]  fff00000c788e800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.499333]  fff00000c788e880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.499371] ==================================================================
[   19.417908] ==================================================================
[   19.417955] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xeb8/0x4858
[   19.418002] Write of size 8 at addr fff00000c788e7b0 by task kunit_try_catch/265
[   19.418059] 
[   19.418093] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250512 #1 PREEMPT 
[   19.418175] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.418226] Hardware name: linux,dummy-virt (DT)
[   19.418278] Call trace:
[   19.418337]  show_stack+0x20/0x38 (C)
[   19.418422]  dump_stack_lvl+0x8c/0xd0
[   19.418525]  print_report+0x118/0x608
[   19.418597]  kasan_report+0xdc/0x128
[   19.418645]  kasan_check_range+0x100/0x1a8
[   19.418692]  __kasan_check_write+0x20/0x30
[   19.418811]  kasan_atomics_helper+0xeb8/0x4858
[   19.418862]  kasan_atomics+0x198/0x2e0
[   19.418908]  kunit_try_run_case+0x170/0x3f0
[   19.418953]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.419018]  kthread+0x328/0x630
[   19.419076]  ret_from_fork+0x10/0x20
[   19.419127] 
[   19.419169] Allocated by task 265:
[   19.419255]  kasan_save_stack+0x3c/0x68
[   19.419342]  kasan_save_track+0x20/0x40
[   19.419406]  kasan_save_alloc_info+0x40/0x58
[   19.419501]  __kasan_kmalloc+0xd4/0xd8
[   19.419543]  __kmalloc_cache_noprof+0x15c/0x3c0
[   19.419582]  kasan_atomics+0xb8/0x2e0
[   19.419619]  kunit_try_run_case+0x170/0x3f0
[   19.419656]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.419699]  kthread+0x328/0x630
[   19.419758]  ret_from_fork+0x10/0x20
[   19.419840] 
[   19.419865] The buggy address belongs to the object at fff00000c788e780
[   19.419865]  which belongs to the cache kmalloc-64 of size 64
[   19.419923] The buggy address is located 0 bytes to the right of
[   19.419923]  allocated 48-byte region [fff00000c788e780, fff00000c788e7b0)
[   19.419984] 
[   19.420005] The buggy address belongs to the physical page:
[   19.420036] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10788e
[   19.420098] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.420145] page_type: f5(slab)
[   19.420201] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.420262] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.420319] page dumped because: kasan: bad access detected
[   19.420359] 
[   19.420378] Memory state around the buggy address:
[   19.420419]  fff00000c788e680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.420463]  fff00000c788e700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.420505] >fff00000c788e780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.420542]                                      ^
[   19.420576]  fff00000c788e800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.420618]  fff00000c788e880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.420656] ==================================================================

[   19.988528] ==================================================================
[   19.989093] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b3a/0x5450
[   19.989648] Write of size 4 at addr ffff888102b66530 by task kunit_try_catch/282
[   19.989971] 
[   19.990129] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250512 #1 PREEMPT(voluntary) 
[   19.990237] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.990276] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   19.990326] Call Trace:
[   19.990370]  <TASK>
[   19.990412]  dump_stack_lvl+0x73/0xb0
[   19.990475]  print_report+0xd1/0x650
[   19.990529]  ? __virt_addr_valid+0x1db/0x2d0
[   19.990584]  ? kasan_atomics_helper+0x4b3a/0x5450
[   19.990635]  ? kasan_complete_mode_report_info+0x2a/0x200
[   19.990711]  ? kasan_atomics_helper+0x4b3a/0x5450
[   19.990765]  kasan_report+0x141/0x180
[   19.990819]  ? kasan_atomics_helper+0x4b3a/0x5450
[   19.990878]  __asan_report_store4_noabort+0x1b/0x30
[   19.990920]  kasan_atomics_helper+0x4b3a/0x5450
[   19.990974]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   19.991036]  ? __kmalloc_cache_noprof+0x189/0x420
[   19.991086]  ? kasan_atomics+0x152/0x310
[   19.991148]  kasan_atomics+0x1dc/0x310
[   19.991193]  ? __pfx_kasan_atomics+0x10/0x10
[   19.991235]  ? __pfx_read_tsc+0x10/0x10
[   19.991292]  ? ktime_get_ts64+0x86/0x230
[   19.991335]  kunit_try_run_case+0x1a5/0x480
[   19.991377]  ? __pfx_kunit_try_run_case+0x10/0x10
[   19.991413]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   19.991454]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   19.991492]  ? __kthread_parkme+0x82/0x180
[   19.991527]  ? preempt_count_sub+0x50/0x80
[   19.991568]  ? __pfx_kunit_try_run_case+0x10/0x10
[   19.991607]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   19.991651]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   19.991860]  kthread+0x337/0x6f0
[   19.991960]  ? trace_preempt_on+0x20/0xc0
[   19.992030]  ? __pfx_kthread+0x10/0x10
[   19.992193]  ? _raw_spin_unlock_irq+0x47/0x80
[   19.992292]  ? calculate_sigpending+0x7b/0xa0
[   19.992370]  ? __pfx_kthread+0x10/0x10
[   19.992425]  ret_from_fork+0x116/0x1d0
[   19.992461]  ? __pfx_kthread+0x10/0x10
[   19.992500]  ret_from_fork_asm+0x1a/0x30
[   19.992563]  </TASK>
[   19.992591] 
[   20.007373] Allocated by task 282:
[   20.007791]  kasan_save_stack+0x45/0x70
[   20.008361]  kasan_save_track+0x18/0x40
[   20.008700]  kasan_save_alloc_info+0x3b/0x50
[   20.009303]  __kasan_kmalloc+0xb7/0xc0
[   20.009953]  __kmalloc_cache_noprof+0x189/0x420
[   20.010419]  kasan_atomics+0x95/0x310
[   20.010709]  kunit_try_run_case+0x1a5/0x480
[   20.010936]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   20.011378]  kthread+0x337/0x6f0
[   20.011689]  ret_from_fork+0x116/0x1d0
[   20.011936]  ret_from_fork_asm+0x1a/0x30
[   20.012508] 
[   20.012793] The buggy address belongs to the object at ffff888102b66500
[   20.012793]  which belongs to the cache kmalloc-64 of size 64
[   20.013954] The buggy address is located 0 bytes to the right of
[   20.013954]  allocated 48-byte region [ffff888102b66500, ffff888102b66530)
[   20.014902] 
[   20.015303] The buggy address belongs to the physical page:
[   20.015670] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b66
[   20.016378] flags: 0x200000000000000(node=0|zone=2)
[   20.016810] page_type: f5(slab)
[   20.017393] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   20.017905] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   20.018519] page dumped because: kasan: bad access detected
[   20.018952] 
[   20.019316] Memory state around the buggy address:
[   20.019715]  ffff888102b66400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.020505]  ffff888102b66480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.020986] >ffff888102b66500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   20.021856]                                      ^
[   20.022341]  ffff888102b66580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.022861]  ffff888102b66600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.023615] ==================================================================
[   20.834864] ==================================================================
[   20.835530] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x12e6/0x5450
[   20.836122] Write of size 4 at addr ffff888102b66530 by task kunit_try_catch/282
[   20.836651] 
[   20.836852] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250512 #1 PREEMPT(voluntary) 
[   20.836962] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.836991] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   20.837037] Call Trace:
[   20.837080]  <TASK>
[   20.837121]  dump_stack_lvl+0x73/0xb0
[   20.837185]  print_report+0xd1/0x650
[   20.837238]  ? __virt_addr_valid+0x1db/0x2d0
[   20.837302]  ? kasan_atomics_helper+0x12e6/0x5450
[   20.837355]  ? kasan_complete_mode_report_info+0x2a/0x200
[   20.837408]  ? kasan_atomics_helper+0x12e6/0x5450
[   20.837458]  kasan_report+0x141/0x180
[   20.837510]  ? kasan_atomics_helper+0x12e6/0x5450
[   20.837569]  kasan_check_range+0x10c/0x1c0
[   20.837624]  __kasan_check_write+0x18/0x20
[   20.837702]  kasan_atomics_helper+0x12e6/0x5450
[   20.837759]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   20.837814]  ? __kmalloc_cache_noprof+0x189/0x420
[   20.837863]  ? kasan_atomics+0x152/0x310
[   20.837923]  kasan_atomics+0x1dc/0x310
[   20.837977]  ? __pfx_kasan_atomics+0x10/0x10
[   20.838034]  ? __pfx_read_tsc+0x10/0x10
[   20.838079]  ? ktime_get_ts64+0x86/0x230
[   20.838133]  kunit_try_run_case+0x1a5/0x480
[   20.838189]  ? __pfx_kunit_try_run_case+0x10/0x10
[   20.838236]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   20.838292]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   20.838338]  ? __kthread_parkme+0x82/0x180
[   20.838382]  ? preempt_count_sub+0x50/0x80
[   20.838430]  ? __pfx_kunit_try_run_case+0x10/0x10
[   20.838483]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   20.838536]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   20.838588]  kthread+0x337/0x6f0
[   20.838632]  ? trace_preempt_on+0x20/0xc0
[   20.838724]  ? __pfx_kthread+0x10/0x10
[   20.838770]  ? _raw_spin_unlock_irq+0x47/0x80
[   20.838810]  ? calculate_sigpending+0x7b/0xa0
[   20.838856]  ? __pfx_kthread+0x10/0x10
[   20.838898]  ret_from_fork+0x116/0x1d0
[   20.838937]  ? __pfx_kthread+0x10/0x10
[   20.838974]  ret_from_fork_asm+0x1a/0x30
[   20.839043]  </TASK>
[   20.839069] 
[   20.849364] Allocated by task 282:
[   20.849623]  kasan_save_stack+0x45/0x70
[   20.849886]  kasan_save_track+0x18/0x40
[   20.850081]  kasan_save_alloc_info+0x3b/0x50
[   20.850293]  __kasan_kmalloc+0xb7/0xc0
[   20.850624]  __kmalloc_cache_noprof+0x189/0x420
[   20.851060]  kasan_atomics+0x95/0x310
[   20.851408]  kunit_try_run_case+0x1a5/0x480
[   20.851779]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   20.852227]  kthread+0x337/0x6f0
[   20.852542]  ret_from_fork+0x116/0x1d0
[   20.852830]  ret_from_fork_asm+0x1a/0x30
[   20.853026] 
[   20.853210] The buggy address belongs to the object at ffff888102b66500
[   20.853210]  which belongs to the cache kmalloc-64 of size 64
[   20.854003] The buggy address is located 0 bytes to the right of
[   20.854003]  allocated 48-byte region [ffff888102b66500, ffff888102b66530)
[   20.854509] 
[   20.854737] The buggy address belongs to the physical page:
[   20.855151] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b66
[   20.855647] flags: 0x200000000000000(node=0|zone=2)
[   20.855998] page_type: f5(slab)
[   20.856235] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   20.856540] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   20.856859] page dumped because: kasan: bad access detected
[   20.857082] 
[   20.857198] Memory state around the buggy address:
[   20.857586]  ffff888102b66400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.858164]  ffff888102b66480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.858761] >ffff888102b66500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   20.859301]                                      ^
[   20.859718]  ffff888102b66580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.859997]  ffff888102b66600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.860496] ==================================================================
[   20.862070] ==================================================================
[   20.862583] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x49ce/0x5450
[   20.863060] Read of size 4 at addr ffff888102b66530 by task kunit_try_catch/282
[   20.863412] 
[   20.863639] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250512 #1 PREEMPT(voluntary) 
[   20.863777] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.863809] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   20.863857] Call Trace:
[   20.863898]  <TASK>
[   20.863938]  dump_stack_lvl+0x73/0xb0
[   20.863999]  print_report+0xd1/0x650
[   20.864049]  ? __virt_addr_valid+0x1db/0x2d0
[   20.864099]  ? kasan_atomics_helper+0x49ce/0x5450
[   20.864148]  ? kasan_complete_mode_report_info+0x2a/0x200
[   20.864204]  ? kasan_atomics_helper+0x49ce/0x5450
[   20.864254]  kasan_report+0x141/0x180
[   20.864319]  ? kasan_atomics_helper+0x49ce/0x5450
[   20.864377]  __asan_report_load4_noabort+0x18/0x20
[   20.864423]  kasan_atomics_helper+0x49ce/0x5450
[   20.864472]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   20.864517]  ? __kmalloc_cache_noprof+0x189/0x420
[   20.864563]  ? kasan_atomics+0x152/0x310
[   20.864624]  kasan_atomics+0x1dc/0x310
[   20.864713]  ? __pfx_kasan_atomics+0x10/0x10
[   20.864773]  ? __pfx_read_tsc+0x10/0x10
[   20.864822]  ? ktime_get_ts64+0x86/0x230
[   20.864880]  kunit_try_run_case+0x1a5/0x480
[   20.864935]  ? __pfx_kunit_try_run_case+0x10/0x10
[   20.864985]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   20.865032]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   20.865073]  ? __kthread_parkme+0x82/0x180
[   20.865111]  ? preempt_count_sub+0x50/0x80
[   20.865160]  ? __pfx_kunit_try_run_case+0x10/0x10
[   20.865209]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   20.865255]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   20.865320]  kthread+0x337/0x6f0
[   20.865361]  ? trace_preempt_on+0x20/0xc0
[   20.865412]  ? __pfx_kthread+0x10/0x10
[   20.865459]  ? _raw_spin_unlock_irq+0x47/0x80
[   20.865504]  ? calculate_sigpending+0x7b/0xa0
[   20.865552]  ? __pfx_kthread+0x10/0x10
[   20.865600]  ret_from_fork+0x116/0x1d0
[   20.865642]  ? __pfx_kthread+0x10/0x10
[   20.865724]  ret_from_fork_asm+0x1a/0x30
[   20.865790]  </TASK>
[   20.865815] 
[   20.875784] Allocated by task 282:
[   20.876115]  kasan_save_stack+0x45/0x70
[   20.876404]  kasan_save_track+0x18/0x40
[   20.876773]  kasan_save_alloc_info+0x3b/0x50
[   20.877031]  __kasan_kmalloc+0xb7/0xc0
[   20.877270]  __kmalloc_cache_noprof+0x189/0x420
[   20.877624]  kasan_atomics+0x95/0x310
[   20.877841]  kunit_try_run_case+0x1a5/0x480
[   20.878025]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   20.878441]  kthread+0x337/0x6f0
[   20.878781]  ret_from_fork+0x116/0x1d0
[   20.879007]  ret_from_fork_asm+0x1a/0x30
[   20.879196] 
[   20.879327] The buggy address belongs to the object at ffff888102b66500
[   20.879327]  which belongs to the cache kmalloc-64 of size 64
[   20.879771] The buggy address is located 0 bytes to the right of
[   20.879771]  allocated 48-byte region [ffff888102b66500, ffff888102b66530)
[   20.880208] 
[   20.880375] The buggy address belongs to the physical page:
[   20.880843] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b66
[   20.881449] flags: 0x200000000000000(node=0|zone=2)
[   20.881862] page_type: f5(slab)
[   20.882182] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   20.882814] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   20.883391] page dumped because: kasan: bad access detected
[   20.883853] 
[   20.884037] Memory state around the buggy address:
[   20.884321]  ffff888102b66400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.884779]  ffff888102b66480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.885177] >ffff888102b66500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   20.885624]                                      ^
[   20.885925]  ffff888102b66580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.888011]  ffff888102b66600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.888359] ==================================================================
[   21.071275] ==================================================================
[   21.071822] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x164f/0x5450
[   21.072404] Write of size 8 at addr ffff888102b66530 by task kunit_try_catch/282
[   21.072938] 
[   21.073109] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250512 #1 PREEMPT(voluntary) 
[   21.073216] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.073245] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   21.073339] Call Trace:
[   21.073420]  <TASK>
[   21.073476]  dump_stack_lvl+0x73/0xb0
[   21.073574]  print_report+0xd1/0x650
[   21.073651]  ? __virt_addr_valid+0x1db/0x2d0
[   21.073773]  ? kasan_atomics_helper+0x164f/0x5450
[   21.073837]  ? kasan_complete_mode_report_info+0x2a/0x200
[   21.073893]  ? kasan_atomics_helper+0x164f/0x5450
[   21.073945]  kasan_report+0x141/0x180
[   21.073998]  ? kasan_atomics_helper+0x164f/0x5450
[   21.074058]  kasan_check_range+0x10c/0x1c0
[   21.074114]  __kasan_check_write+0x18/0x20
[   21.074161]  kasan_atomics_helper+0x164f/0x5450
[   21.074214]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   21.074273]  ? __kmalloc_cache_noprof+0x189/0x420
[   21.074322]  ? kasan_atomics+0x152/0x310
[   21.074416]  kasan_atomics+0x1dc/0x310
[   21.074483]  ? __pfx_kasan_atomics+0x10/0x10
[   21.074540]  ? __pfx_read_tsc+0x10/0x10
[   21.074580]  ? ktime_get_ts64+0x86/0x230
[   21.074626]  kunit_try_run_case+0x1a5/0x480
[   21.074743]  ? __pfx_kunit_try_run_case+0x10/0x10
[   21.074810]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   21.074892]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   21.074961]  ? __kthread_parkme+0x82/0x180
[   21.075021]  ? preempt_count_sub+0x50/0x80
[   21.075074]  ? __pfx_kunit_try_run_case+0x10/0x10
[   21.075120]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   21.075156]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   21.075183]  kthread+0x337/0x6f0
[   21.075207]  ? trace_preempt_on+0x20/0xc0
[   21.075234]  ? __pfx_kthread+0x10/0x10
[   21.075277]  ? _raw_spin_unlock_irq+0x47/0x80
[   21.075310]  ? calculate_sigpending+0x7b/0xa0
[   21.075338]  ? __pfx_kthread+0x10/0x10
[   21.075363]  ret_from_fork+0x116/0x1d0
[   21.075386]  ? __pfx_kthread+0x10/0x10
[   21.075410]  ret_from_fork_asm+0x1a/0x30
[   21.075444]  </TASK>
[   21.075459] 
[   21.088076] Allocated by task 282:
[   21.088526]  kasan_save_stack+0x45/0x70
[   21.088943]  kasan_save_track+0x18/0x40
[   21.089305]  kasan_save_alloc_info+0x3b/0x50
[   21.089608]  __kasan_kmalloc+0xb7/0xc0
[   21.090050]  __kmalloc_cache_noprof+0x189/0x420
[   21.090336]  kasan_atomics+0x95/0x310
[   21.090801]  kunit_try_run_case+0x1a5/0x480
[   21.091085]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   21.091538]  kthread+0x337/0x6f0
[   21.091888]  ret_from_fork+0x116/0x1d0
[   21.092197]  ret_from_fork_asm+0x1a/0x30
[   21.092645] 
[   21.092789] The buggy address belongs to the object at ffff888102b66500
[   21.092789]  which belongs to the cache kmalloc-64 of size 64
[   21.093690] The buggy address is located 0 bytes to the right of
[   21.093690]  allocated 48-byte region [ffff888102b66500, ffff888102b66530)
[   21.094374] 
[   21.094538] The buggy address belongs to the physical page:
[   21.094942] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b66
[   21.095607] flags: 0x200000000000000(node=0|zone=2)
[   21.096049] page_type: f5(slab)
[   21.096412] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   21.096951] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   21.097436] page dumped because: kasan: bad access detected
[   21.097895] 
[   21.098112] Memory state around the buggy address:
[   21.098459]  ffff888102b66400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.098936]  ffff888102b66480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.099514] >ffff888102b66500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   21.100039]                                      ^
[   21.100450]  ffff888102b66580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.101035]  ffff888102b66600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.101575] ==================================================================
[   21.778908] ==================================================================
[   21.779738] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x5115/0x5450
[   21.780313] Read of size 8 at addr ffff888102b66530 by task kunit_try_catch/282
[   21.780964] 
[   21.781146] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250512 #1 PREEMPT(voluntary) 
[   21.781270] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.781302] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   21.781353] Call Trace:
[   21.781398]  <TASK>
[   21.781443]  dump_stack_lvl+0x73/0xb0
[   21.781513]  print_report+0xd1/0x650
[   21.781568]  ? __virt_addr_valid+0x1db/0x2d0
[   21.781624]  ? kasan_atomics_helper+0x5115/0x5450
[   21.781673]  ? kasan_complete_mode_report_info+0x2a/0x200
[   21.781724]  ? kasan_atomics_helper+0x5115/0x5450
[   21.781775]  kasan_report+0x141/0x180
[   21.781826]  ? kasan_atomics_helper+0x5115/0x5450
[   21.781890]  __asan_report_load8_noabort+0x18/0x20
[   21.781940]  kasan_atomics_helper+0x5115/0x5450
[   21.781994]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   21.782065]  ? __kmalloc_cache_noprof+0x189/0x420
[   21.782109]  ? kasan_atomics+0x152/0x310
[   21.782159]  kasan_atomics+0x1dc/0x310
[   21.782205]  ? __pfx_kasan_atomics+0x10/0x10
[   21.782306]  ? __pfx_read_tsc+0x10/0x10
[   21.782370]  ? ktime_get_ts64+0x86/0x230
[   21.782459]  kunit_try_run_case+0x1a5/0x480
[   21.782931]  ? __pfx_kunit_try_run_case+0x10/0x10
[   21.782973]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   21.783033]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   21.783071]  ? __kthread_parkme+0x82/0x180
[   21.783116]  ? preempt_count_sub+0x50/0x80
[   21.783168]  ? __pfx_kunit_try_run_case+0x10/0x10
[   21.783222]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   21.783286]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   21.783341]  kthread+0x337/0x6f0
[   21.783390]  ? trace_preempt_on+0x20/0xc0
[   21.783444]  ? __pfx_kthread+0x10/0x10
[   21.783492]  ? _raw_spin_unlock_irq+0x47/0x80
[   21.783543]  ? calculate_sigpending+0x7b/0xa0
[   21.783602]  ? __pfx_kthread+0x10/0x10
[   21.783653]  ret_from_fork+0x116/0x1d0
[   21.783695]  ? __pfx_kthread+0x10/0x10
[   21.783742]  ret_from_fork_asm+0x1a/0x30
[   21.783811]  </TASK>
[   21.783840] 
[   21.795544] Allocated by task 282:
[   21.795907]  kasan_save_stack+0x45/0x70
[   21.796316]  kasan_save_track+0x18/0x40
[   21.796799]  kasan_save_alloc_info+0x3b/0x50
[   21.797362]  __kasan_kmalloc+0xb7/0xc0
[   21.797812]  __kmalloc_cache_noprof+0x189/0x420
[   21.798314]  kasan_atomics+0x95/0x310
[   21.798907]  kunit_try_run_case+0x1a5/0x480
[   21.799053]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   21.799181]  kthread+0x337/0x6f0
[   21.799385]  ret_from_fork+0x116/0x1d0
[   21.799869]  ret_from_fork_asm+0x1a/0x30
[   21.800285] 
[   21.800419] The buggy address belongs to the object at ffff888102b66500
[   21.800419]  which belongs to the cache kmalloc-64 of size 64
[   21.801492] The buggy address is located 0 bytes to the right of
[   21.801492]  allocated 48-byte region [ffff888102b66500, ffff888102b66530)
[   21.802079] 
[   21.802193] The buggy address belongs to the physical page:
[   21.802473] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b66
[   21.803321] flags: 0x200000000000000(node=0|zone=2)
[   21.803777] page_type: f5(slab)
[   21.804089] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   21.804681] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   21.805343] page dumped because: kasan: bad access detected
[   21.805891] 
[   21.806080] Memory state around the buggy address:
[   21.806609]  ffff888102b66400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.807273]  ffff888102b66480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.807619] >ffff888102b66500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   21.808062]                                      ^
[   21.808502]  ffff888102b66580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.808794]  ffff888102b66600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.809361] ==================================================================
[   21.251854] ==================================================================
[   21.252247] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x19e3/0x5450
[   21.252530] Write of size 8 at addr ffff888102b66530 by task kunit_try_catch/282
[   21.252739] 
[   21.252865] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250512 #1 PREEMPT(voluntary) 
[   21.252949] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.253034] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   21.253075] Call Trace:
[   21.253217]  <TASK>
[   21.253274]  dump_stack_lvl+0x73/0xb0
[   21.253351]  print_report+0xd1/0x650
[   21.253416]  ? __virt_addr_valid+0x1db/0x2d0
[   21.253469]  ? kasan_atomics_helper+0x19e3/0x5450
[   21.253516]  ? kasan_complete_mode_report_info+0x2a/0x200
[   21.253569]  ? kasan_atomics_helper+0x19e3/0x5450
[   21.253614]  kasan_report+0x141/0x180
[   21.253658]  ? kasan_atomics_helper+0x19e3/0x5450
[   21.253714]  kasan_check_range+0x10c/0x1c0
[   21.253766]  __kasan_check_write+0x18/0x20
[   21.253813]  kasan_atomics_helper+0x19e3/0x5450
[   21.253866]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   21.253918]  ? __kmalloc_cache_noprof+0x189/0x420
[   21.253965]  ? kasan_atomics+0x152/0x310
[   21.254015]  kasan_atomics+0x1dc/0x310
[   21.254061]  ? __pfx_kasan_atomics+0x10/0x10
[   21.254114]  ? __pfx_read_tsc+0x10/0x10
[   21.254152]  ? ktime_get_ts64+0x86/0x230
[   21.254239]  kunit_try_run_case+0x1a5/0x480
[   21.254324]  ? __pfx_kunit_try_run_case+0x10/0x10
[   21.254376]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   21.254430]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   21.254481]  ? __kthread_parkme+0x82/0x180
[   21.254530]  ? preempt_count_sub+0x50/0x80
[   21.254586]  ? __pfx_kunit_try_run_case+0x10/0x10
[   21.254640]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   21.254705]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   21.254751]  kthread+0x337/0x6f0
[   21.254794]  ? trace_preempt_on+0x20/0xc0
[   21.254842]  ? __pfx_kthread+0x10/0x10
[   21.254900]  ? _raw_spin_unlock_irq+0x47/0x80
[   21.254962]  ? calculate_sigpending+0x7b/0xa0
[   21.255028]  ? __pfx_kthread+0x10/0x10
[   21.255081]  ret_from_fork+0x116/0x1d0
[   21.255124]  ? __pfx_kthread+0x10/0x10
[   21.255171]  ret_from_fork_asm+0x1a/0x30
[   21.255235]  </TASK>
[   21.255279] 
[   21.266747] Allocated by task 282:
[   21.267127]  kasan_save_stack+0x45/0x70
[   21.267442]  kasan_save_track+0x18/0x40
[   21.267649]  kasan_save_alloc_info+0x3b/0x50
[   21.268129]  __kasan_kmalloc+0xb7/0xc0
[   21.268499]  __kmalloc_cache_noprof+0x189/0x420
[   21.269624]  kasan_atomics+0x95/0x310
[   21.269900]  kunit_try_run_case+0x1a5/0x480
[   21.270115]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   21.270361]  kthread+0x337/0x6f0
[   21.270542]  ret_from_fork+0x116/0x1d0
[   21.271589]  ret_from_fork_asm+0x1a/0x30
[   21.272174] 
[   21.272705] The buggy address belongs to the object at ffff888102b66500
[   21.272705]  which belongs to the cache kmalloc-64 of size 64
[   21.273482] The buggy address is located 0 bytes to the right of
[   21.273482]  allocated 48-byte region [ffff888102b66500, ffff888102b66530)
[   21.274523] 
[   21.274649] The buggy address belongs to the physical page:
[   21.275164] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b66
[   21.275599] flags: 0x200000000000000(node=0|zone=2)
[   21.276366] page_type: f5(slab)
[   21.276667] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   21.277317] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   21.278145] page dumped because: kasan: bad access detected
[   21.278479] 
[   21.278667] Memory state around the buggy address:
[   21.279347]  ffff888102b66400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.279729]  ffff888102b66480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.280127] >ffff888102b66500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   21.280581]                                      ^
[   21.280864]  ffff888102b66580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.281307]  ffff888102b66600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.281635] ==================================================================
[   21.721797] ==================================================================
[   21.722284] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4fa5/0x5450
[   21.722669] Read of size 8 at addr ffff888102b66530 by task kunit_try_catch/282
[   21.722952] 
[   21.723116] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250512 #1 PREEMPT(voluntary) 
[   21.723221] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.723253] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   21.723315] Call Trace:
[   21.723356]  <TASK>
[   21.723395]  dump_stack_lvl+0x73/0xb0
[   21.723459]  print_report+0xd1/0x650
[   21.723509]  ? __virt_addr_valid+0x1db/0x2d0
[   21.723559]  ? kasan_atomics_helper+0x4fa5/0x5450
[   21.723610]  ? kasan_complete_mode_report_info+0x2a/0x200
[   21.723658]  ? kasan_atomics_helper+0x4fa5/0x5450
[   21.724507]  kasan_report+0x141/0x180
[   21.724570]  ? kasan_atomics_helper+0x4fa5/0x5450
[   21.724635]  __asan_report_load8_noabort+0x18/0x20
[   21.724679]  kasan_atomics_helper+0x4fa5/0x5450
[   21.724974]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   21.725003]  ? __kmalloc_cache_noprof+0x189/0x420
[   21.725028]  ? kasan_atomics+0x152/0x310
[   21.725058]  kasan_atomics+0x1dc/0x310
[   21.725084]  ? __pfx_kasan_atomics+0x10/0x10
[   21.725112]  ? __pfx_read_tsc+0x10/0x10
[   21.725137]  ? ktime_get_ts64+0x86/0x230
[   21.725165]  kunit_try_run_case+0x1a5/0x480
[   21.725193]  ? __pfx_kunit_try_run_case+0x10/0x10
[   21.725218]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   21.725245]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   21.725295]  ? __kthread_parkme+0x82/0x180
[   21.725323]  ? preempt_count_sub+0x50/0x80
[   21.725349]  ? __pfx_kunit_try_run_case+0x10/0x10
[   21.725376]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   21.725402]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   21.725428]  kthread+0x337/0x6f0
[   21.725451]  ? trace_preempt_on+0x20/0xc0
[   21.725478]  ? __pfx_kthread+0x10/0x10
[   21.725501]  ? _raw_spin_unlock_irq+0x47/0x80
[   21.725524]  ? calculate_sigpending+0x7b/0xa0
[   21.725552]  ? __pfx_kthread+0x10/0x10
[   21.725576]  ret_from_fork+0x116/0x1d0
[   21.725597]  ? __pfx_kthread+0x10/0x10
[   21.725621]  ret_from_fork_asm+0x1a/0x30
[   21.725655]  </TASK>
[   21.725677] 
[   21.738203] Allocated by task 282:
[   21.738557]  kasan_save_stack+0x45/0x70
[   21.738875]  kasan_save_track+0x18/0x40
[   21.739212]  kasan_save_alloc_info+0x3b/0x50
[   21.739583]  __kasan_kmalloc+0xb7/0xc0
[   21.740043]  __kmalloc_cache_noprof+0x189/0x420
[   21.740275]  kasan_atomics+0x95/0x310
[   21.740467]  kunit_try_run_case+0x1a5/0x480
[   21.740882]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   21.741328]  kthread+0x337/0x6f0
[   21.741641]  ret_from_fork+0x116/0x1d0
[   21.741899]  ret_from_fork_asm+0x1a/0x30
[   21.742215] 
[   21.742411] The buggy address belongs to the object at ffff888102b66500
[   21.742411]  which belongs to the cache kmalloc-64 of size 64
[   21.743232] The buggy address is located 0 bytes to the right of
[   21.743232]  allocated 48-byte region [ffff888102b66500, ffff888102b66530)
[   21.743701] 
[   21.743915] The buggy address belongs to the physical page:
[   21.744355] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b66
[   21.744799] flags: 0x200000000000000(node=0|zone=2)
[   21.745230] page_type: f5(slab)
[   21.745657] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   21.746043] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   21.746660] page dumped because: kasan: bad access detected
[   21.747239] 
[   21.747433] Memory state around the buggy address:
[   21.747754]  ffff888102b66400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.748028]  ffff888102b66480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.748710] >ffff888102b66500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   21.749059]                                      ^
[   21.749282]  ffff888102b66580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.749558]  ffff888102b66600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.749821] ==================================================================
[   20.168692] ==================================================================
[   20.169888] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x7c7/0x5450
[   20.170564] Write of size 4 at addr ffff888102b66530 by task kunit_try_catch/282
[   20.170942] 
[   20.171254] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250512 #1 PREEMPT(voluntary) 
[   20.171377] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.171407] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   20.171458] Call Trace:
[   20.171726]  <TASK>
[   20.171805]  dump_stack_lvl+0x73/0xb0
[   20.171897]  print_report+0xd1/0x650
[   20.171974]  ? __virt_addr_valid+0x1db/0x2d0
[   20.172067]  ? kasan_atomics_helper+0x7c7/0x5450
[   20.172347]  ? kasan_complete_mode_report_info+0x2a/0x200
[   20.172396]  ? kasan_atomics_helper+0x7c7/0x5450
[   20.172422]  kasan_report+0x141/0x180
[   20.172451]  ? kasan_atomics_helper+0x7c7/0x5450
[   20.172480]  kasan_check_range+0x10c/0x1c0
[   20.172507]  __kasan_check_write+0x18/0x20
[   20.172530]  kasan_atomics_helper+0x7c7/0x5450
[   20.172556]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   20.172581]  ? __kmalloc_cache_noprof+0x189/0x420
[   20.172606]  ? kasan_atomics+0x152/0x310
[   20.172635]  kasan_atomics+0x1dc/0x310
[   20.172683]  ? __pfx_kasan_atomics+0x10/0x10
[   20.172737]  ? __pfx_read_tsc+0x10/0x10
[   20.172762]  ? ktime_get_ts64+0x86/0x230
[   20.172789]  kunit_try_run_case+0x1a5/0x480
[   20.172818]  ? __pfx_kunit_try_run_case+0x10/0x10
[   20.172843]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   20.172870]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   20.172894]  ? __kthread_parkme+0x82/0x180
[   20.172918]  ? preempt_count_sub+0x50/0x80
[   20.172944]  ? __pfx_kunit_try_run_case+0x10/0x10
[   20.172971]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   20.172996]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   20.173022]  kthread+0x337/0x6f0
[   20.173052]  ? trace_preempt_on+0x20/0xc0
[   20.173111]  ? __pfx_kthread+0x10/0x10
[   20.173149]  ? _raw_spin_unlock_irq+0x47/0x80
[   20.173184]  ? calculate_sigpending+0x7b/0xa0
[   20.173228]  ? __pfx_kthread+0x10/0x10
[   20.173269]  ret_from_fork+0x116/0x1d0
[   20.173298]  ? __pfx_kthread+0x10/0x10
[   20.173323]  ret_from_fork_asm+0x1a/0x30
[   20.173356]  </TASK>
[   20.173371] 
[   20.189819] Allocated by task 282:
[   20.190385]  kasan_save_stack+0x45/0x70
[   20.191190]  kasan_save_track+0x18/0x40
[   20.191699]  kasan_save_alloc_info+0x3b/0x50
[   20.192028]  __kasan_kmalloc+0xb7/0xc0
[   20.192374]  __kmalloc_cache_noprof+0x189/0x420
[   20.192672]  kasan_atomics+0x95/0x310
[   20.193017]  kunit_try_run_case+0x1a5/0x480
[   20.193880]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   20.194473]  kthread+0x337/0x6f0
[   20.194649]  ret_from_fork+0x116/0x1d0
[   20.195373]  ret_from_fork_asm+0x1a/0x30
[   20.196043] 
[   20.196572] The buggy address belongs to the object at ffff888102b66500
[   20.196572]  which belongs to the cache kmalloc-64 of size 64
[   20.197271] The buggy address is located 0 bytes to the right of
[   20.197271]  allocated 48-byte region [ffff888102b66500, ffff888102b66530)
[   20.198386] 
[   20.199223] The buggy address belongs to the physical page:
[   20.199691] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b66
[   20.200659] flags: 0x200000000000000(node=0|zone=2)
[   20.200986] page_type: f5(slab)
[   20.201294] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   20.202659] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   20.203058] page dumped because: kasan: bad access detected
[   20.203497] 
[   20.204247] Memory state around the buggy address:
[   20.204804]  ffff888102b66400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.205335]  ffff888102b66480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.205853] >ffff888102b66500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   20.206562]                                      ^
[   20.207046]  ffff888102b66580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.207379]  ffff888102b66600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.208765] ==================================================================
[   19.775823] ==================================================================
[   19.777795] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4ba2/0x5450
[   19.778236] Write of size 4 at addr ffff888102b66530 by task kunit_try_catch/282
[   19.779310] 
[   19.779464] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250512 #1 PREEMPT(voluntary) 
[   19.779531] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.779545] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   19.779572] Call Trace:
[   19.779589]  <TASK>
[   19.779611]  dump_stack_lvl+0x73/0xb0
[   19.779649]  print_report+0xd1/0x650
[   19.779686]  ? __virt_addr_valid+0x1db/0x2d0
[   19.779719]  ? kasan_atomics_helper+0x4ba2/0x5450
[   19.779742]  ? kasan_complete_mode_report_info+0x2a/0x200
[   19.779766]  ? kasan_atomics_helper+0x4ba2/0x5450
[   19.779789]  kasan_report+0x141/0x180
[   19.779813]  ? kasan_atomics_helper+0x4ba2/0x5450
[   19.779840]  __asan_report_store4_noabort+0x1b/0x30
[   19.779862]  kasan_atomics_helper+0x4ba2/0x5450
[   19.779886]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   19.779910]  ? __kmalloc_cache_noprof+0x189/0x420
[   19.779933]  ? kasan_atomics+0x152/0x310
[   19.779961]  kasan_atomics+0x1dc/0x310
[   19.779986]  ? __pfx_kasan_atomics+0x10/0x10
[   19.780011]  ? __pfx_read_tsc+0x10/0x10
[   19.780038]  ? ktime_get_ts64+0x86/0x230
[   19.780326]  kunit_try_run_case+0x1a5/0x480
[   19.780390]  ? __pfx_kunit_try_run_case+0x10/0x10
[   19.780438]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   19.780483]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   19.780539]  ? __kthread_parkme+0x82/0x180
[   19.780582]  ? preempt_count_sub+0x50/0x80
[   19.780633]  ? __pfx_kunit_try_run_case+0x10/0x10
[   19.780680]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   19.780726]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   19.780766]  kthread+0x337/0x6f0
[   19.780798]  ? trace_preempt_on+0x20/0xc0
[   19.780825]  ? __pfx_kthread+0x10/0x10
[   19.780847]  ? _raw_spin_unlock_irq+0x47/0x80
[   19.780869]  ? calculate_sigpending+0x7b/0xa0
[   19.780894]  ? __pfx_kthread+0x10/0x10
[   19.780917]  ret_from_fork+0x116/0x1d0
[   19.780937]  ? __pfx_kthread+0x10/0x10
[   19.780958]  ret_from_fork_asm+0x1a/0x30
[   19.780989]  </TASK>
[   19.781002] 
[   19.794225] Allocated by task 282:
[   19.794879]  kasan_save_stack+0x45/0x70
[   19.795588]  kasan_save_track+0x18/0x40
[   19.795971]  kasan_save_alloc_info+0x3b/0x50
[   19.796425]  __kasan_kmalloc+0xb7/0xc0
[   19.796799]  __kmalloc_cache_noprof+0x189/0x420
[   19.797348]  kasan_atomics+0x95/0x310
[   19.797730]  kunit_try_run_case+0x1a5/0x480
[   19.798370]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   19.798883]  kthread+0x337/0x6f0
[   19.799687]  ret_from_fork+0x116/0x1d0
[   19.800120]  ret_from_fork_asm+0x1a/0x30
[   19.800511] 
[   19.800721] The buggy address belongs to the object at ffff888102b66500
[   19.800721]  which belongs to the cache kmalloc-64 of size 64
[   19.801577] The buggy address is located 0 bytes to the right of
[   19.801577]  allocated 48-byte region [ffff888102b66500, ffff888102b66530)
[   19.802617] 
[   19.802824] The buggy address belongs to the physical page:
[   19.803177] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b66
[   19.803955] flags: 0x200000000000000(node=0|zone=2)
[   19.804828] page_type: f5(slab)
[   19.805393] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   19.805858] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.806550] page dumped because: kasan: bad access detected
[   19.807029] 
[   19.807210] Memory state around the buggy address:
[   19.807490]  ffff888102b66400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.808032]  ffff888102b66480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.808941] >ffff888102b66500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.809361]                                      ^
[   19.810114]  ffff888102b66580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.810922]  ffff888102b66600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.811896] ==================================================================
[   20.086429] ==================================================================
[   20.087094] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x697/0x5450
[   20.087628] Write of size 4 at addr ffff888102b66530 by task kunit_try_catch/282
[   20.088150] 
[   20.088388] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250512 #1 PREEMPT(voluntary) 
[   20.088486] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.088511] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   20.088550] Call Trace:
[   20.088588]  <TASK>
[   20.088625]  dump_stack_lvl+0x73/0xb0
[   20.088781]  print_report+0xd1/0x650
[   20.088833]  ? __virt_addr_valid+0x1db/0x2d0
[   20.088886]  ? kasan_atomics_helper+0x697/0x5450
[   20.088931]  ? kasan_complete_mode_report_info+0x2a/0x200
[   20.089017]  ? kasan_atomics_helper+0x697/0x5450
[   20.089093]  kasan_report+0x141/0x180
[   20.089146]  ? kasan_atomics_helper+0x697/0x5450
[   20.089235]  kasan_check_range+0x10c/0x1c0
[   20.089304]  __kasan_check_write+0x18/0x20
[   20.089345]  kasan_atomics_helper+0x697/0x5450
[   20.089386]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   20.089424]  ? __kmalloc_cache_noprof+0x189/0x420
[   20.089462]  ? kasan_atomics+0x152/0x310
[   20.089508]  kasan_atomics+0x1dc/0x310
[   20.089546]  ? __pfx_kasan_atomics+0x10/0x10
[   20.089586]  ? __pfx_read_tsc+0x10/0x10
[   20.089624]  ? ktime_get_ts64+0x86/0x230
[   20.089702]  kunit_try_run_case+0x1a5/0x480
[   20.089753]  ? __pfx_kunit_try_run_case+0x10/0x10
[   20.089796]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   20.089888]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   20.089935]  ? __kthread_parkme+0x82/0x180
[   20.089978]  ? preempt_count_sub+0x50/0x80
[   20.090055]  ? __pfx_kunit_try_run_case+0x10/0x10
[   20.090145]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   20.090221]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   20.090306]  kthread+0x337/0x6f0
[   20.090375]  ? trace_preempt_on+0x20/0xc0
[   20.090450]  ? __pfx_kthread+0x10/0x10
[   20.090520]  ? _raw_spin_unlock_irq+0x47/0x80
[   20.090570]  ? calculate_sigpending+0x7b/0xa0
[   20.090643]  ? __pfx_kthread+0x10/0x10
[   20.090764]  ret_from_fork+0x116/0x1d0
[   20.090824]  ? __pfx_kthread+0x10/0x10
[   20.090879]  ret_from_fork_asm+0x1a/0x30
[   20.090948]  </TASK>
[   20.090977] 
[   20.108987] Allocated by task 282:
[   20.109800]  kasan_save_stack+0x45/0x70
[   20.110407]  kasan_save_track+0x18/0x40
[   20.110734]  kasan_save_alloc_info+0x3b/0x50
[   20.110927]  __kasan_kmalloc+0xb7/0xc0
[   20.111554]  __kmalloc_cache_noprof+0x189/0x420
[   20.112088]  kasan_atomics+0x95/0x310
[   20.112518]  kunit_try_run_case+0x1a5/0x480
[   20.113193]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   20.113556]  kthread+0x337/0x6f0
[   20.113815]  ret_from_fork+0x116/0x1d0
[   20.114453]  ret_from_fork_asm+0x1a/0x30
[   20.115153] 
[   20.115370] The buggy address belongs to the object at ffff888102b66500
[   20.115370]  which belongs to the cache kmalloc-64 of size 64
[   20.116286] The buggy address is located 0 bytes to the right of
[   20.116286]  allocated 48-byte region [ffff888102b66500, ffff888102b66530)
[   20.116907] 
[   20.117042] The buggy address belongs to the physical page:
[   20.117250] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b66
[   20.118516] flags: 0x200000000000000(node=0|zone=2)
[   20.119463] page_type: f5(slab)
[   20.120031] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   20.120572] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   20.121242] page dumped because: kasan: bad access detected
[   20.121992] 
[   20.122788] Memory state around the buggy address:
[   20.123071]  ffff888102b66400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.123919]  ffff888102b66480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.124376] >ffff888102b66500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   20.125054]                                      ^
[   20.125311]  ffff888102b66580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.125564]  ffff888102b66600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.126184] ==================================================================
[   20.690008] ==================================================================
[   20.691416] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a1c/0x5450
[   20.692110] Read of size 4 at addr ffff888102b66530 by task kunit_try_catch/282
[   20.693074] 
[   20.693234] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250512 #1 PREEMPT(voluntary) 
[   20.693327] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.693354] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   20.693397] Call Trace:
[   20.693438]  <TASK>
[   20.693503]  dump_stack_lvl+0x73/0xb0
[   20.693550]  print_report+0xd1/0x650
[   20.693591]  ? __virt_addr_valid+0x1db/0x2d0
[   20.693629]  ? kasan_atomics_helper+0x4a1c/0x5450
[   20.693659]  ? kasan_complete_mode_report_info+0x2a/0x200
[   20.693816]  ? kasan_atomics_helper+0x4a1c/0x5450
[   20.693844]  kasan_report+0x141/0x180
[   20.693870]  ? kasan_atomics_helper+0x4a1c/0x5450
[   20.693903]  __asan_report_load4_noabort+0x18/0x20
[   20.693926]  kasan_atomics_helper+0x4a1c/0x5450
[   20.693952]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   20.693979]  ? __kmalloc_cache_noprof+0x189/0x420
[   20.694004]  ? kasan_atomics+0x152/0x310
[   20.694033]  kasan_atomics+0x1dc/0x310
[   20.694059]  ? __pfx_kasan_atomics+0x10/0x10
[   20.694087]  ? __pfx_read_tsc+0x10/0x10
[   20.694111]  ? ktime_get_ts64+0x86/0x230
[   20.694138]  kunit_try_run_case+0x1a5/0x480
[   20.694166]  ? __pfx_kunit_try_run_case+0x10/0x10
[   20.694191]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   20.694217]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   20.694243]  ? __kthread_parkme+0x82/0x180
[   20.694281]  ? preempt_count_sub+0x50/0x80
[   20.694310]  ? __pfx_kunit_try_run_case+0x10/0x10
[   20.694337]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   20.694362]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   20.694388]  kthread+0x337/0x6f0
[   20.694410]  ? trace_preempt_on+0x20/0xc0
[   20.694437]  ? __pfx_kthread+0x10/0x10
[   20.694460]  ? _raw_spin_unlock_irq+0x47/0x80
[   20.694484]  ? calculate_sigpending+0x7b/0xa0
[   20.694511]  ? __pfx_kthread+0x10/0x10
[   20.694535]  ret_from_fork+0x116/0x1d0
[   20.694556]  ? __pfx_kthread+0x10/0x10
[   20.694579]  ret_from_fork_asm+0x1a/0x30
[   20.694613]  </TASK>
[   20.694627] 
[   20.705565] Allocated by task 282:
[   20.706001]  kasan_save_stack+0x45/0x70
[   20.706337]  kasan_save_track+0x18/0x40
[   20.706746]  kasan_save_alloc_info+0x3b/0x50
[   20.707072]  __kasan_kmalloc+0xb7/0xc0
[   20.707415]  __kmalloc_cache_noprof+0x189/0x420
[   20.707840]  kasan_atomics+0x95/0x310
[   20.708215]  kunit_try_run_case+0x1a5/0x480
[   20.708558]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   20.708977]  kthread+0x337/0x6f0
[   20.709316]  ret_from_fork+0x116/0x1d0
[   20.709510]  ret_from_fork_asm+0x1a/0x30
[   20.709734] 
[   20.709856] The buggy address belongs to the object at ffff888102b66500
[   20.709856]  which belongs to the cache kmalloc-64 of size 64
[   20.710792] The buggy address is located 0 bytes to the right of
[   20.710792]  allocated 48-byte region [ffff888102b66500, ffff888102b66530)
[   20.711622] 
[   20.711775] The buggy address belongs to the physical page:
[   20.712007] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b66
[   20.712450] flags: 0x200000000000000(node=0|zone=2)
[   20.712933] page_type: f5(slab)
[   20.713266] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   20.713976] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   20.714600] page dumped because: kasan: bad access detected
[   20.714981] 
[   20.715178] Memory state around the buggy address:
[   20.715464]  ffff888102b66400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.715787]  ffff888102b66480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.716252] >ffff888102b66500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   20.716877]                                      ^
[   20.717274]  ffff888102b66580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.717705]  ffff888102b66600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.717975] ==================================================================
[   20.659230] ==================================================================
[   20.659736] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1079/0x5450
[   20.660378] Write of size 4 at addr ffff888102b66530 by task kunit_try_catch/282
[   20.660752] 
[   20.661028] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250512 #1 PREEMPT(voluntary) 
[   20.661173] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.661203] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   20.661251] Call Trace:
[   20.661305]  <TASK>
[   20.661347]  dump_stack_lvl+0x73/0xb0
[   20.661414]  print_report+0xd1/0x650
[   20.661467]  ? __virt_addr_valid+0x1db/0x2d0
[   20.661548]  ? kasan_atomics_helper+0x1079/0x5450
[   20.661586]  ? kasan_complete_mode_report_info+0x2a/0x200
[   20.662104]  ? kasan_atomics_helper+0x1079/0x5450
[   20.662166]  kasan_report+0x141/0x180
[   20.662273]  ? kasan_atomics_helper+0x1079/0x5450
[   20.662361]  kasan_check_range+0x10c/0x1c0
[   20.662410]  __kasan_check_write+0x18/0x20
[   20.662454]  kasan_atomics_helper+0x1079/0x5450
[   20.662505]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   20.662560]  ? __kmalloc_cache_noprof+0x189/0x420
[   20.662611]  ? kasan_atomics+0x152/0x310
[   20.662709]  kasan_atomics+0x1dc/0x310
[   20.662760]  ? __pfx_kasan_atomics+0x10/0x10
[   20.662790]  ? __pfx_read_tsc+0x10/0x10
[   20.662815]  ? ktime_get_ts64+0x86/0x230
[   20.662843]  kunit_try_run_case+0x1a5/0x480
[   20.662871]  ? __pfx_kunit_try_run_case+0x10/0x10
[   20.662896]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   20.662922]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   20.662947]  ? __kthread_parkme+0x82/0x180
[   20.662971]  ? preempt_count_sub+0x50/0x80
[   20.663009]  ? __pfx_kunit_try_run_case+0x10/0x10
[   20.663039]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   20.663065]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   20.663091]  kthread+0x337/0x6f0
[   20.663113]  ? trace_preempt_on+0x20/0xc0
[   20.663141]  ? __pfx_kthread+0x10/0x10
[   20.663164]  ? _raw_spin_unlock_irq+0x47/0x80
[   20.663187]  ? calculate_sigpending+0x7b/0xa0
[   20.663216]  ? __pfx_kthread+0x10/0x10
[   20.663240]  ret_from_fork+0x116/0x1d0
[   20.663282]  ? __pfx_kthread+0x10/0x10
[   20.663311]  ret_from_fork_asm+0x1a/0x30
[   20.663345]  </TASK>
[   20.663360] 
[   20.675178] Allocated by task 282:
[   20.675412]  kasan_save_stack+0x45/0x70
[   20.675741]  kasan_save_track+0x18/0x40
[   20.676211]  kasan_save_alloc_info+0x3b/0x50
[   20.676595]  __kasan_kmalloc+0xb7/0xc0
[   20.677095]  __kmalloc_cache_noprof+0x189/0x420
[   20.677495]  kasan_atomics+0x95/0x310
[   20.677947]  kunit_try_run_case+0x1a5/0x480
[   20.678379]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   20.678937]  kthread+0x337/0x6f0
[   20.679169]  ret_from_fork+0x116/0x1d0
[   20.679535]  ret_from_fork_asm+0x1a/0x30
[   20.679976] 
[   20.680176] The buggy address belongs to the object at ffff888102b66500
[   20.680176]  which belongs to the cache kmalloc-64 of size 64
[   20.680610] The buggy address is located 0 bytes to the right of
[   20.680610]  allocated 48-byte region [ffff888102b66500, ffff888102b66530)
[   20.681296] 
[   20.681507] The buggy address belongs to the physical page:
[   20.682110] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b66
[   20.682770] flags: 0x200000000000000(node=0|zone=2)
[   20.683310] page_type: f5(slab)
[   20.683713] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   20.684310] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   20.684924] page dumped because: kasan: bad access detected
[   20.685158] 
[   20.685346] Memory state around the buggy address:
[   20.685885]  ffff888102b66400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.686492]  ffff888102b66480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.686918] >ffff888102b66500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   20.687277]                                      ^
[   20.687656]  ffff888102b66580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.688755]  ffff888102b66600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.689273] ==================================================================
[   20.248627] ==================================================================
[   20.249079] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x8f9/0x5450
[   20.250725] Write of size 4 at addr ffff888102b66530 by task kunit_try_catch/282
[   20.251156] 
[   20.251338] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250512 #1 PREEMPT(voluntary) 
[   20.251406] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.251425] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   20.251452] Call Trace:
[   20.251476]  <TASK>
[   20.251511]  dump_stack_lvl+0x73/0xb0
[   20.251572]  print_report+0xd1/0x650
[   20.251621]  ? __virt_addr_valid+0x1db/0x2d0
[   20.251666]  ? kasan_atomics_helper+0x8f9/0x5450
[   20.251729]  ? kasan_complete_mode_report_info+0x2a/0x200
[   20.251772]  ? kasan_atomics_helper+0x8f9/0x5450
[   20.251814]  kasan_report+0x141/0x180
[   20.251861]  ? kasan_atomics_helper+0x8f9/0x5450
[   20.251916]  kasan_check_range+0x10c/0x1c0
[   20.251963]  __kasan_check_write+0x18/0x20
[   20.252003]  kasan_atomics_helper+0x8f9/0x5450
[   20.252048]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   20.252087]  ? __kmalloc_cache_noprof+0x189/0x420
[   20.252127]  ? kasan_atomics+0x152/0x310
[   20.252182]  kasan_atomics+0x1dc/0x310
[   20.252232]  ? __pfx_kasan_atomics+0x10/0x10
[   20.252302]  ? __pfx_read_tsc+0x10/0x10
[   20.252339]  ? ktime_get_ts64+0x86/0x230
[   20.252368]  kunit_try_run_case+0x1a5/0x480
[   20.252398]  ? __pfx_kunit_try_run_case+0x10/0x10
[   20.252423]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   20.252449]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   20.252474]  ? __kthread_parkme+0x82/0x180
[   20.252499]  ? preempt_count_sub+0x50/0x80
[   20.252525]  ? __pfx_kunit_try_run_case+0x10/0x10
[   20.252551]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   20.252576]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   20.252602]  kthread+0x337/0x6f0
[   20.252624]  ? trace_preempt_on+0x20/0xc0
[   20.252651]  ? __pfx_kthread+0x10/0x10
[   20.252686]  ? _raw_spin_unlock_irq+0x47/0x80
[   20.252719]  ? calculate_sigpending+0x7b/0xa0
[   20.252746]  ? __pfx_kthread+0x10/0x10
[   20.252770]  ret_from_fork+0x116/0x1d0
[   20.252791]  ? __pfx_kthread+0x10/0x10
[   20.252815]  ret_from_fork_asm+0x1a/0x30
[   20.252848]  </TASK>
[   20.252861] 
[   20.263249] Allocated by task 282:
[   20.263493]  kasan_save_stack+0x45/0x70
[   20.263898]  kasan_save_track+0x18/0x40
[   20.264099]  kasan_save_alloc_info+0x3b/0x50
[   20.264311]  __kasan_kmalloc+0xb7/0xc0
[   20.264497]  __kmalloc_cache_noprof+0x189/0x420
[   20.264698]  kasan_atomics+0x95/0x310
[   20.265006]  kunit_try_run_case+0x1a5/0x480
[   20.265396]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   20.265841]  kthread+0x337/0x6f0
[   20.267796]  ret_from_fork+0x116/0x1d0
[   20.268187]  ret_from_fork_asm+0x1a/0x30
[   20.268561] 
[   20.268772] The buggy address belongs to the object at ffff888102b66500
[   20.268772]  which belongs to the cache kmalloc-64 of size 64
[   20.269198] The buggy address is located 0 bytes to the right of
[   20.269198]  allocated 48-byte region [ffff888102b66500, ffff888102b66530)
[   20.269651] 
[   20.270696] The buggy address belongs to the physical page:
[   20.271503] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b66
[   20.271991] flags: 0x200000000000000(node=0|zone=2)
[   20.272384] page_type: f5(slab)
[   20.272569] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   20.273071] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   20.273573] page dumped because: kasan: bad access detected
[   20.273809] 
[   20.273995] Memory state around the buggy address:
[   20.274349]  ffff888102b66400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.274807]  ffff888102b66480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.275386] >ffff888102b66500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   20.275686]                                      ^
[   20.276083]  ffff888102b66580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.276814]  ffff888102b66600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.277127] ==================================================================
[   21.459483] ==================================================================
[   21.460126] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1e12/0x5450
[   21.460555] Write of size 8 at addr ffff888102b66530 by task kunit_try_catch/282
[   21.461055] 
[   21.461295] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250512 #1 PREEMPT(voluntary) 
[   21.461405] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.461435] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   21.461482] Call Trace:
[   21.461525]  <TASK>
[   21.461571]  dump_stack_lvl+0x73/0xb0
[   21.461641]  print_report+0xd1/0x650
[   21.461734]  ? __virt_addr_valid+0x1db/0x2d0
[   21.461788]  ? kasan_atomics_helper+0x1e12/0x5450
[   21.461838]  ? kasan_complete_mode_report_info+0x2a/0x200
[   21.461890]  ? kasan_atomics_helper+0x1e12/0x5450
[   21.461937]  kasan_report+0x141/0x180
[   21.461984]  ? kasan_atomics_helper+0x1e12/0x5450
[   21.462041]  kasan_check_range+0x10c/0x1c0
[   21.462088]  __kasan_check_write+0x18/0x20
[   21.462129]  kasan_atomics_helper+0x1e12/0x5450
[   21.462176]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   21.462220]  ? __kmalloc_cache_noprof+0x189/0x420
[   21.462274]  ? kasan_atomics+0x152/0x310
[   21.462337]  kasan_atomics+0x1dc/0x310
[   21.462390]  ? __pfx_kasan_atomics+0x10/0x10
[   21.462446]  ? __pfx_read_tsc+0x10/0x10
[   21.462496]  ? ktime_get_ts64+0x86/0x230
[   21.462553]  kunit_try_run_case+0x1a5/0x480
[   21.462610]  ? __pfx_kunit_try_run_case+0x10/0x10
[   21.462686]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   21.462744]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   21.462797]  ? __kthread_parkme+0x82/0x180
[   21.462846]  ? preempt_count_sub+0x50/0x80
[   21.462902]  ? __pfx_kunit_try_run_case+0x10/0x10
[   21.462956]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   21.463022]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   21.463076]  kthread+0x337/0x6f0
[   21.463118]  ? trace_preempt_on+0x20/0xc0
[   21.463167]  ? __pfx_kthread+0x10/0x10
[   21.463203]  ? _raw_spin_unlock_irq+0x47/0x80
[   21.463241]  ? calculate_sigpending+0x7b/0xa0
[   21.463300]  ? __pfx_kthread+0x10/0x10
[   21.463344]  ret_from_fork+0x116/0x1d0
[   21.463382]  ? __pfx_kthread+0x10/0x10
[   21.463421]  ret_from_fork_asm+0x1a/0x30
[   21.463487]  </TASK>
[   21.463515] 
[   21.473694] Allocated by task 282:
[   21.473999]  kasan_save_stack+0x45/0x70
[   21.474374]  kasan_save_track+0x18/0x40
[   21.474724]  kasan_save_alloc_info+0x3b/0x50
[   21.475070]  __kasan_kmalloc+0xb7/0xc0
[   21.475410]  __kmalloc_cache_noprof+0x189/0x420
[   21.475705]  kasan_atomics+0x95/0x310
[   21.476043]  kunit_try_run_case+0x1a5/0x480
[   21.476375]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   21.476749]  kthread+0x337/0x6f0
[   21.477046]  ret_from_fork+0x116/0x1d0
[   21.477308]  ret_from_fork_asm+0x1a/0x30
[   21.477545] 
[   21.477738] The buggy address belongs to the object at ffff888102b66500
[   21.477738]  which belongs to the cache kmalloc-64 of size 64
[   21.478341] The buggy address is located 0 bytes to the right of
[   21.478341]  allocated 48-byte region [ffff888102b66500, ffff888102b66530)
[   21.479019] 
[   21.479147] The buggy address belongs to the physical page:
[   21.479567] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b66
[   21.479997] flags: 0x200000000000000(node=0|zone=2)
[   21.480235] page_type: f5(slab)
[   21.480448] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   21.480776] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   21.481059] page dumped because: kasan: bad access detected
[   21.481291] 
[   21.481471] Memory state around the buggy address:
[   21.481894]  ffff888102b66400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.482456]  ffff888102b66480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.483021] >ffff888102b66500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   21.483575]                                      ^
[   21.484006]  ffff888102b66580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.484560]  ffff888102b66600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.485101] ==================================================================
[   20.279014] ==================================================================
[   20.279664] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x992/0x5450
[   20.280479] Write of size 4 at addr ffff888102b66530 by task kunit_try_catch/282
[   20.280890] 
[   20.281580] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250512 #1 PREEMPT(voluntary) 
[   20.281708] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.281738] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   20.281782] Call Trace:
[   20.281822]  <TASK>
[   20.281864]  dump_stack_lvl+0x73/0xb0
[   20.281925]  print_report+0xd1/0x650
[   20.281954]  ? __virt_addr_valid+0x1db/0x2d0
[   20.281981]  ? kasan_atomics_helper+0x992/0x5450
[   20.282006]  ? kasan_complete_mode_report_info+0x2a/0x200
[   20.282032]  ? kasan_atomics_helper+0x992/0x5450
[   20.282056]  kasan_report+0x141/0x180
[   20.282081]  ? kasan_atomics_helper+0x992/0x5450
[   20.282110]  kasan_check_range+0x10c/0x1c0
[   20.282137]  __kasan_check_write+0x18/0x20
[   20.282159]  kasan_atomics_helper+0x992/0x5450
[   20.282184]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   20.282211]  ? __kmalloc_cache_noprof+0x189/0x420
[   20.282236]  ? kasan_atomics+0x152/0x310
[   20.282288]  kasan_atomics+0x1dc/0x310
[   20.282318]  ? __pfx_kasan_atomics+0x10/0x10
[   20.282345]  ? __pfx_read_tsc+0x10/0x10
[   20.282370]  ? ktime_get_ts64+0x86/0x230
[   20.282397]  kunit_try_run_case+0x1a5/0x480
[   20.282425]  ? __pfx_kunit_try_run_case+0x10/0x10
[   20.282450]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   20.282476]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   20.282501]  ? __kthread_parkme+0x82/0x180
[   20.282525]  ? preempt_count_sub+0x50/0x80
[   20.282551]  ? __pfx_kunit_try_run_case+0x10/0x10
[   20.282577]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   20.282603]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   20.282629]  kthread+0x337/0x6f0
[   20.282651]  ? trace_preempt_on+0x20/0xc0
[   20.282678]  ? __pfx_kthread+0x10/0x10
[   20.282701]  ? _raw_spin_unlock_irq+0x47/0x80
[   20.282725]  ? calculate_sigpending+0x7b/0xa0
[   20.282753]  ? __pfx_kthread+0x10/0x10
[   20.282777]  ret_from_fork+0x116/0x1d0
[   20.282798]  ? __pfx_kthread+0x10/0x10
[   20.282821]  ret_from_fork_asm+0x1a/0x30
[   20.282854]  </TASK>
[   20.282869] 
[   20.293598] Allocated by task 282:
[   20.293941]  kasan_save_stack+0x45/0x70
[   20.294323]  kasan_save_track+0x18/0x40
[   20.294672]  kasan_save_alloc_info+0x3b/0x50
[   20.295038]  __kasan_kmalloc+0xb7/0xc0
[   20.295379]  __kmalloc_cache_noprof+0x189/0x420
[   20.295710]  kasan_atomics+0x95/0x310
[   20.295971]  kunit_try_run_case+0x1a5/0x480
[   20.296333]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   20.296573]  kthread+0x337/0x6f0
[   20.296829]  ret_from_fork+0x116/0x1d0
[   20.297186]  ret_from_fork_asm+0x1a/0x30
[   20.297541] 
[   20.297759] The buggy address belongs to the object at ffff888102b66500
[   20.297759]  which belongs to the cache kmalloc-64 of size 64
[   20.298504] The buggy address is located 0 bytes to the right of
[   20.298504]  allocated 48-byte region [ffff888102b66500, ffff888102b66530)
[   20.299311] 
[   20.299505] The buggy address belongs to the physical page:
[   20.299860] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b66
[   20.300382] flags: 0x200000000000000(node=0|zone=2)
[   20.300832] page_type: f5(slab)
[   20.301205] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   20.301639] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   20.302173] page dumped because: kasan: bad access detected
[   20.302529] 
[   20.302750] Memory state around the buggy address:
[   20.303306]  ffff888102b66400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.303737]  ffff888102b66480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.304230] >ffff888102b66500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   20.304704]                                      ^
[   20.305033]  ffff888102b66580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.305483]  ffff888102b66600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.306180] ==================================================================
[   20.402822] ==================================================================
[   20.404155] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xc70/0x5450
[   20.404681] Write of size 4 at addr ffff888102b66530 by task kunit_try_catch/282
[   20.405218] 
[   20.405455] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250512 #1 PREEMPT(voluntary) 
[   20.405552] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.405576] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   20.405613] Call Trace:
[   20.405649]  <TASK>
[   20.405686]  dump_stack_lvl+0x73/0xb0
[   20.405738]  print_report+0xd1/0x650
[   20.405780]  ? __virt_addr_valid+0x1db/0x2d0
[   20.405818]  ? kasan_atomics_helper+0xc70/0x5450
[   20.405855]  ? kasan_complete_mode_report_info+0x2a/0x200
[   20.405891]  ? kasan_atomics_helper+0xc70/0x5450
[   20.405932]  kasan_report+0x141/0x180
[   20.405970]  ? kasan_atomics_helper+0xc70/0x5450
[   20.406016]  kasan_check_range+0x10c/0x1c0
[   20.406054]  __kasan_check_write+0x18/0x20
[   20.406086]  kasan_atomics_helper+0xc70/0x5450
[   20.406120]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   20.406156]  ? __kmalloc_cache_noprof+0x189/0x420
[   20.406192]  ? kasan_atomics+0x152/0x310
[   20.406239]  kasan_atomics+0x1dc/0x310
[   20.406302]  ? __pfx_kasan_atomics+0x10/0x10
[   20.406353]  ? __pfx_read_tsc+0x10/0x10
[   20.406901]  ? ktime_get_ts64+0x86/0x230
[   20.406941]  kunit_try_run_case+0x1a5/0x480
[   20.406972]  ? __pfx_kunit_try_run_case+0x10/0x10
[   20.407010]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   20.407041]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   20.407069]  ? __kthread_parkme+0x82/0x180
[   20.407093]  ? preempt_count_sub+0x50/0x80
[   20.407120]  ? __pfx_kunit_try_run_case+0x10/0x10
[   20.407147]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   20.407172]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   20.407198]  kthread+0x337/0x6f0
[   20.407220]  ? trace_preempt_on+0x20/0xc0
[   20.407248]  ? __pfx_kthread+0x10/0x10
[   20.407295]  ? _raw_spin_unlock_irq+0x47/0x80
[   20.407320]  ? calculate_sigpending+0x7b/0xa0
[   20.407348]  ? __pfx_kthread+0x10/0x10
[   20.407372]  ret_from_fork+0x116/0x1d0
[   20.407394]  ? __pfx_kthread+0x10/0x10
[   20.407419]  ret_from_fork_asm+0x1a/0x30
[   20.407452]  </TASK>
[   20.407467] 
[   20.421102] Allocated by task 282:
[   20.421528]  kasan_save_stack+0x45/0x70
[   20.421971]  kasan_save_track+0x18/0x40
[   20.422166]  kasan_save_alloc_info+0x3b/0x50
[   20.422377]  __kasan_kmalloc+0xb7/0xc0
[   20.422583]  __kmalloc_cache_noprof+0x189/0x420
[   20.423724]  kasan_atomics+0x95/0x310
[   20.423947]  kunit_try_run_case+0x1a5/0x480
[   20.424119]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   20.424459]  kthread+0x337/0x6f0
[   20.424754]  ret_from_fork+0x116/0x1d0
[   20.425572]  ret_from_fork_asm+0x1a/0x30
[   20.426028] 
[   20.426134] The buggy address belongs to the object at ffff888102b66500
[   20.426134]  which belongs to the cache kmalloc-64 of size 64
[   20.427221] The buggy address is located 0 bytes to the right of
[   20.427221]  allocated 48-byte region [ffff888102b66500, ffff888102b66530)
[   20.428242] 
[   20.428466] The buggy address belongs to the physical page:
[   20.428857] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b66
[   20.429230] flags: 0x200000000000000(node=0|zone=2)
[   20.429580] page_type: f5(slab)
[   20.429848] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   20.430763] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   20.431355] page dumped because: kasan: bad access detected
[   20.431811] 
[   20.431999] Memory state around the buggy address:
[   20.432541]  ffff888102b66400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.433137]  ffff888102b66480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.433746] >ffff888102b66500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   20.434285]                                      ^
[   20.434668]  ffff888102b66580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.435329]  ffff888102b66600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.435881] ==================================================================
[   21.626602] ==================================================================
[   21.627596] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x20c8/0x5450
[   21.628238] Write of size 8 at addr ffff888102b66530 by task kunit_try_catch/282
[   21.628820] 
[   21.628986] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250512 #1 PREEMPT(voluntary) 
[   21.629095] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.629126] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   21.629171] Call Trace:
[   21.629212]  <TASK>
[   21.629254]  dump_stack_lvl+0x73/0xb0
[   21.629334]  print_report+0xd1/0x650
[   21.629388]  ? __virt_addr_valid+0x1db/0x2d0
[   21.629441]  ? kasan_atomics_helper+0x20c8/0x5450
[   21.629491]  ? kasan_complete_mode_report_info+0x2a/0x200
[   21.629539]  ? kasan_atomics_helper+0x20c8/0x5450
[   21.629582]  kasan_report+0x141/0x180
[   21.629624]  ? kasan_atomics_helper+0x20c8/0x5450
[   21.629709]  kasan_check_range+0x10c/0x1c0
[   21.629765]  __kasan_check_write+0x18/0x20
[   21.629811]  kasan_atomics_helper+0x20c8/0x5450
[   21.629861]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   21.629904]  ? __kmalloc_cache_noprof+0x189/0x420
[   21.629943]  ? kasan_atomics+0x152/0x310
[   21.629995]  kasan_atomics+0x1dc/0x310
[   21.630041]  ? __pfx_kasan_atomics+0x10/0x10
[   21.630082]  ? __pfx_read_tsc+0x10/0x10
[   21.630128]  ? ktime_get_ts64+0x86/0x230
[   21.630184]  kunit_try_run_case+0x1a5/0x480
[   21.630240]  ? __pfx_kunit_try_run_case+0x10/0x10
[   21.630304]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   21.630358]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   21.630410]  ? __kthread_parkme+0x82/0x180
[   21.630461]  ? preempt_count_sub+0x50/0x80
[   21.630517]  ? __pfx_kunit_try_run_case+0x10/0x10
[   21.630572]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   21.630627]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   21.630714]  kthread+0x337/0x6f0
[   21.630762]  ? trace_preempt_on+0x20/0xc0
[   21.630817]  ? __pfx_kthread+0x10/0x10
[   21.630865]  ? _raw_spin_unlock_irq+0x47/0x80
[   21.630913]  ? calculate_sigpending+0x7b/0xa0
[   21.630963]  ? __pfx_kthread+0x10/0x10
[   21.631023]  ret_from_fork+0x116/0x1d0
[   21.631068]  ? __pfx_kthread+0x10/0x10
[   21.631118]  ret_from_fork_asm+0x1a/0x30
[   21.631189]  </TASK>
[   21.631217] 
[   21.640950] Allocated by task 282:
[   21.641164]  kasan_save_stack+0x45/0x70
[   21.641543]  kasan_save_track+0x18/0x40
[   21.641925]  kasan_save_alloc_info+0x3b/0x50
[   21.642295]  __kasan_kmalloc+0xb7/0xc0
[   21.642618]  __kmalloc_cache_noprof+0x189/0x420
[   21.643040]  kasan_atomics+0x95/0x310
[   21.643368]  kunit_try_run_case+0x1a5/0x480
[   21.643740]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   21.644020]  kthread+0x337/0x6f0
[   21.644314]  ret_from_fork+0x116/0x1d0
[   21.644570]  ret_from_fork_asm+0x1a/0x30
[   21.644812] 
[   21.644938] The buggy address belongs to the object at ffff888102b66500
[   21.644938]  which belongs to the cache kmalloc-64 of size 64
[   21.645502] The buggy address is located 0 bytes to the right of
[   21.645502]  allocated 48-byte region [ffff888102b66500, ffff888102b66530)
[   21.646402] 
[   21.646593] The buggy address belongs to the physical page:
[   21.648674] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b66
[   21.649719] flags: 0x200000000000000(node=0|zone=2)
[   21.650137] page_type: f5(slab)
[   21.650456] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   21.651349] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   21.652569] page dumped because: kasan: bad access detected
[   21.653059] 
[   21.653240] Memory state around the buggy address:
[   21.653581]  ffff888102b66400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.654309]  ffff888102b66480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.654913] >ffff888102b66500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   21.655520]                                      ^
[   21.655895]  ffff888102b66580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.656337]  ffff888102b66600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.656927] ==================================================================
[   20.209623] ==================================================================
[   20.209955] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x860/0x5450
[   20.210572] Write of size 4 at addr ffff888102b66530 by task kunit_try_catch/282
[   20.211711] 
[   20.211921] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250512 #1 PREEMPT(voluntary) 
[   20.212029] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.212055] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   20.212599] Call Trace:
[   20.212651]  <TASK>
[   20.212708]  dump_stack_lvl+0x73/0xb0
[   20.212815]  print_report+0xd1/0x650
[   20.212868]  ? __virt_addr_valid+0x1db/0x2d0
[   20.212959]  ? kasan_atomics_helper+0x860/0x5450
[   20.213033]  ? kasan_complete_mode_report_info+0x2a/0x200
[   20.213098]  ? kasan_atomics_helper+0x860/0x5450
[   20.213146]  kasan_report+0x141/0x180
[   20.213188]  ? kasan_atomics_helper+0x860/0x5450
[   20.213233]  kasan_check_range+0x10c/0x1c0
[   20.213291]  __kasan_check_write+0x18/0x20
[   20.213329]  kasan_atomics_helper+0x860/0x5450
[   20.213371]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   20.213396]  ? __kmalloc_cache_noprof+0x189/0x420
[   20.213421]  ? kasan_atomics+0x152/0x310
[   20.213451]  kasan_atomics+0x1dc/0x310
[   20.213477]  ? __pfx_kasan_atomics+0x10/0x10
[   20.213504]  ? __pfx_read_tsc+0x10/0x10
[   20.213529]  ? ktime_get_ts64+0x86/0x230
[   20.213556]  kunit_try_run_case+0x1a5/0x480
[   20.213584]  ? __pfx_kunit_try_run_case+0x10/0x10
[   20.213610]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   20.213636]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   20.213678]  ? __kthread_parkme+0x82/0x180
[   20.213729]  ? preempt_count_sub+0x50/0x80
[   20.213756]  ? __pfx_kunit_try_run_case+0x10/0x10
[   20.213783]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   20.213808]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   20.213834]  kthread+0x337/0x6f0
[   20.213857]  ? trace_preempt_on+0x20/0xc0
[   20.213883]  ? __pfx_kthread+0x10/0x10
[   20.213910]  ? _raw_spin_unlock_irq+0x47/0x80
[   20.213933]  ? calculate_sigpending+0x7b/0xa0
[   20.213960]  ? __pfx_kthread+0x10/0x10
[   20.213984]  ret_from_fork+0x116/0x1d0
[   20.214005]  ? __pfx_kthread+0x10/0x10
[   20.214028]  ret_from_fork_asm+0x1a/0x30
[   20.214095]  </TASK>
[   20.214119] 
[   20.229806] Allocated by task 282:
[   20.230248]  kasan_save_stack+0x45/0x70
[   20.231146]  kasan_save_track+0x18/0x40
[   20.231603]  kasan_save_alloc_info+0x3b/0x50
[   20.231994]  __kasan_kmalloc+0xb7/0xc0
[   20.232529]  __kmalloc_cache_noprof+0x189/0x420
[   20.233080]  kasan_atomics+0x95/0x310
[   20.233625]  kunit_try_run_case+0x1a5/0x480
[   20.234169]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   20.234658]  kthread+0x337/0x6f0
[   20.235156]  ret_from_fork+0x116/0x1d0
[   20.235406]  ret_from_fork_asm+0x1a/0x30
[   20.236112] 
[   20.236492] The buggy address belongs to the object at ffff888102b66500
[   20.236492]  which belongs to the cache kmalloc-64 of size 64
[   20.237429] The buggy address is located 0 bytes to the right of
[   20.237429]  allocated 48-byte region [ffff888102b66500, ffff888102b66530)
[   20.237974] 
[   20.238560] The buggy address belongs to the physical page:
[   20.239487] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b66
[   20.240016] flags: 0x200000000000000(node=0|zone=2)
[   20.240343] page_type: f5(slab)
[   20.240962] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   20.241433] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   20.241686] page dumped because: kasan: bad access detected
[   20.242235] 
[   20.242441] Memory state around the buggy address:
[   20.243506]  ffff888102b66400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.243902]  ffff888102b66480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.244557] >ffff888102b66500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   20.245135]                                      ^
[   20.245519]  ffff888102b66580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.246762]  ffff888102b66600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.247239] ==================================================================
[   20.719044] ==================================================================
[   20.720279] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1148/0x5450
[   20.720978] Write of size 4 at addr ffff888102b66530 by task kunit_try_catch/282
[   20.721593] 
[   20.721888] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250512 #1 PREEMPT(voluntary) 
[   20.722052] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.722085] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   20.722132] Call Trace:
[   20.722173]  <TASK>
[   20.722217]  dump_stack_lvl+0x73/0xb0
[   20.722295]  print_report+0xd1/0x650
[   20.722352]  ? __virt_addr_valid+0x1db/0x2d0
[   20.722399]  ? kasan_atomics_helper+0x1148/0x5450
[   20.722445]  ? kasan_complete_mode_report_info+0x2a/0x200
[   20.722525]  ? kasan_atomics_helper+0x1148/0x5450
[   20.722594]  kasan_report+0x141/0x180
[   20.722646]  ? kasan_atomics_helper+0x1148/0x5450
[   20.722712]  kasan_check_range+0x10c/0x1c0
[   20.722756]  __kasan_check_write+0x18/0x20
[   20.722798]  kasan_atomics_helper+0x1148/0x5450
[   20.722846]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   20.722932]  ? __kmalloc_cache_noprof+0x189/0x420
[   20.723032]  ? kasan_atomics+0x152/0x310
[   20.723107]  kasan_atomics+0x1dc/0x310
[   20.723161]  ? __pfx_kasan_atomics+0x10/0x10
[   20.723217]  ? __pfx_read_tsc+0x10/0x10
[   20.723269]  ? ktime_get_ts64+0x86/0x230
[   20.723319]  kunit_try_run_case+0x1a5/0x480
[   20.723358]  ? __pfx_kunit_try_run_case+0x10/0x10
[   20.723385]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   20.723412]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   20.723438]  ? __kthread_parkme+0x82/0x180
[   20.723462]  ? preempt_count_sub+0x50/0x80
[   20.723489]  ? __pfx_kunit_try_run_case+0x10/0x10
[   20.723515]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   20.723544]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   20.723571]  kthread+0x337/0x6f0
[   20.723592]  ? trace_preempt_on+0x20/0xc0
[   20.723619]  ? __pfx_kthread+0x10/0x10
[   20.723643]  ? _raw_spin_unlock_irq+0x47/0x80
[   20.723674]  ? calculate_sigpending+0x7b/0xa0
[   20.723731]  ? __pfx_kthread+0x10/0x10
[   20.723756]  ret_from_fork+0x116/0x1d0
[   20.723778]  ? __pfx_kthread+0x10/0x10
[   20.723801]  ret_from_fork_asm+0x1a/0x30
[   20.723835]  </TASK>
[   20.723849] 
[   20.734594] Allocated by task 282:
[   20.734805]  kasan_save_stack+0x45/0x70
[   20.735166]  kasan_save_track+0x18/0x40
[   20.735531]  kasan_save_alloc_info+0x3b/0x50
[   20.735884]  __kasan_kmalloc+0xb7/0xc0
[   20.736344]  __kmalloc_cache_noprof+0x189/0x420
[   20.736741]  kasan_atomics+0x95/0x310
[   20.737080]  kunit_try_run_case+0x1a5/0x480
[   20.737475]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   20.737710]  kthread+0x337/0x6f0
[   20.737859]  ret_from_fork+0x116/0x1d0
[   20.738012]  ret_from_fork_asm+0x1a/0x30
[   20.738179] 
[   20.738296] The buggy address belongs to the object at ffff888102b66500
[   20.738296]  which belongs to the cache kmalloc-64 of size 64
[   20.738682] The buggy address is located 0 bytes to the right of
[   20.738682]  allocated 48-byte region [ffff888102b66500, ffff888102b66530)
[   20.739076] 
[   20.739182] The buggy address belongs to the physical page:
[   20.739417] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b66
[   20.739724] flags: 0x200000000000000(node=0|zone=2)
[   20.739949] page_type: f5(slab)
[   20.740138] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   20.740606] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   20.741418] page dumped because: kasan: bad access detected
[   20.741635] 
[   20.741743] Memory state around the buggy address:
[   20.741957]  ffff888102b66400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.742222]  ffff888102b66480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.742781] >ffff888102b66500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   20.743475]                                      ^
[   20.743862]  ffff888102b66580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.744109]  ffff888102b66600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.744369] ==================================================================
[   21.282923] ==================================================================
[   21.283394] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1a7f/0x5450
[   21.283962] Write of size 8 at addr ffff888102b66530 by task kunit_try_catch/282
[   21.284515] 
[   21.284732] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250512 #1 PREEMPT(voluntary) 
[   21.284862] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.284894] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   21.284942] Call Trace:
[   21.284987]  <TASK>
[   21.285026]  dump_stack_lvl+0x73/0xb0
[   21.285090]  print_report+0xd1/0x650
[   21.285136]  ? __virt_addr_valid+0x1db/0x2d0
[   21.285187]  ? kasan_atomics_helper+0x1a7f/0x5450
[   21.285236]  ? kasan_complete_mode_report_info+0x2a/0x200
[   21.285303]  ? kasan_atomics_helper+0x1a7f/0x5450
[   21.285357]  kasan_report+0x141/0x180
[   21.285409]  ? kasan_atomics_helper+0x1a7f/0x5450
[   21.285471]  kasan_check_range+0x10c/0x1c0
[   21.285521]  __kasan_check_write+0x18/0x20
[   21.285560]  kasan_atomics_helper+0x1a7f/0x5450
[   21.285604]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   21.285643]  ? __kmalloc_cache_noprof+0x189/0x420
[   21.285708]  ? kasan_atomics+0x152/0x310
[   21.285764]  kasan_atomics+0x1dc/0x310
[   21.285808]  ? __pfx_kasan_atomics+0x10/0x10
[   21.285856]  ? __pfx_read_tsc+0x10/0x10
[   21.285899]  ? ktime_get_ts64+0x86/0x230
[   21.285948]  kunit_try_run_case+0x1a5/0x480
[   21.286004]  ? __pfx_kunit_try_run_case+0x10/0x10
[   21.286053]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   21.286106]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   21.286151]  ? __kthread_parkme+0x82/0x180
[   21.286198]  ? preempt_count_sub+0x50/0x80
[   21.286251]  ? __pfx_kunit_try_run_case+0x10/0x10
[   21.286320]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   21.286368]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   21.286414]  kthread+0x337/0x6f0
[   21.286448]  ? trace_preempt_on+0x20/0xc0
[   21.286495]  ? __pfx_kthread+0x10/0x10
[   21.286537]  ? _raw_spin_unlock_irq+0x47/0x80
[   21.286583]  ? calculate_sigpending+0x7b/0xa0
[   21.286636]  ? __pfx_kthread+0x10/0x10
[   21.286680]  ret_from_fork+0x116/0x1d0
[   21.286721]  ? __pfx_kthread+0x10/0x10
[   21.286770]  ret_from_fork_asm+0x1a/0x30
[   21.286842]  </TASK>
[   21.286871] 
[   21.296760] Allocated by task 282:
[   21.297003]  kasan_save_stack+0x45/0x70
[   21.297242]  kasan_save_track+0x18/0x40
[   21.297578]  kasan_save_alloc_info+0x3b/0x50
[   21.297956]  __kasan_kmalloc+0xb7/0xc0
[   21.298300]  __kmalloc_cache_noprof+0x189/0x420
[   21.298851]  kasan_atomics+0x95/0x310
[   21.299210]  kunit_try_run_case+0x1a5/0x480
[   21.299601]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   21.300049]  kthread+0x337/0x6f0
[   21.300379]  ret_from_fork+0x116/0x1d0
[   21.302212]  ret_from_fork_asm+0x1a/0x30
[   21.302633] 
[   21.302850] The buggy address belongs to the object at ffff888102b66500
[   21.302850]  which belongs to the cache kmalloc-64 of size 64
[   21.303409] The buggy address is located 0 bytes to the right of
[   21.303409]  allocated 48-byte region [ffff888102b66500, ffff888102b66530)
[   21.304881] 
[   21.305135] The buggy address belongs to the physical page:
[   21.305543] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b66
[   21.306422] flags: 0x200000000000000(node=0|zone=2)
[   21.306975] page_type: f5(slab)
[   21.307611] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   21.308067] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   21.308361] page dumped because: kasan: bad access detected
[   21.308651] 
[   21.309340] Memory state around the buggy address:
[   21.309755]  ffff888102b66400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.310134]  ffff888102b66480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.310546] >ffff888102b66500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   21.310825]                                      ^
[   21.311240]  ffff888102b66580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.311623]  ffff888102b66600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.312098] ==================================================================
[   21.569846] ==================================================================
[   21.570363] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x2006/0x5450
[   21.570832] Write of size 8 at addr ffff888102b66530 by task kunit_try_catch/282
[   21.571254] 
[   21.571444] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250512 #1 PREEMPT(voluntary) 
[   21.571560] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.571592] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   21.571641] Call Trace:
[   21.571727]  <TASK>
[   21.571776]  dump_stack_lvl+0x73/0xb0
[   21.571844]  print_report+0xd1/0x650
[   21.571899]  ? __virt_addr_valid+0x1db/0x2d0
[   21.571952]  ? kasan_atomics_helper+0x2006/0x5450
[   21.572003]  ? kasan_complete_mode_report_info+0x2a/0x200
[   21.572054]  ? kasan_atomics_helper+0x2006/0x5450
[   21.572104]  kasan_report+0x141/0x180
[   21.572147]  ? kasan_atomics_helper+0x2006/0x5450
[   21.572197]  kasan_check_range+0x10c/0x1c0
[   21.572245]  __kasan_check_write+0x18/0x20
[   21.572301]  kasan_atomics_helper+0x2006/0x5450
[   21.572352]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   21.572405]  ? __kmalloc_cache_noprof+0x189/0x420
[   21.572455]  ? kasan_atomics+0x152/0x310
[   21.572516]  kasan_atomics+0x1dc/0x310
[   21.572569]  ? __pfx_kasan_atomics+0x10/0x10
[   21.572624]  ? __pfx_read_tsc+0x10/0x10
[   21.572702]  ? ktime_get_ts64+0x86/0x230
[   21.572754]  kunit_try_run_case+0x1a5/0x480
[   21.572811]  ? __pfx_kunit_try_run_case+0x10/0x10
[   21.572863]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   21.572915]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   21.572966]  ? __kthread_parkme+0x82/0x180
[   21.573017]  ? preempt_count_sub+0x50/0x80
[   21.573071]  ? __pfx_kunit_try_run_case+0x10/0x10
[   21.573125]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   21.573179]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   21.573232]  kthread+0x337/0x6f0
[   21.573290]  ? trace_preempt_on+0x20/0xc0
[   21.573342]  ? __pfx_kthread+0x10/0x10
[   21.573383]  ? _raw_spin_unlock_irq+0x47/0x80
[   21.573421]  ? calculate_sigpending+0x7b/0xa0
[   21.573461]  ? __pfx_kthread+0x10/0x10
[   21.573501]  ret_from_fork+0x116/0x1d0
[   21.573540]  ? __pfx_kthread+0x10/0x10
[   21.573585]  ret_from_fork_asm+0x1a/0x30
[   21.573642]  </TASK>
[   21.573698] 
[   21.583633] Allocated by task 282:
[   21.584000]  kasan_save_stack+0x45/0x70
[   21.584383]  kasan_save_track+0x18/0x40
[   21.584749]  kasan_save_alloc_info+0x3b/0x50
[   21.585115]  __kasan_kmalloc+0xb7/0xc0
[   21.585428]  __kmalloc_cache_noprof+0x189/0x420
[   21.585819]  kasan_atomics+0x95/0x310
[   21.586142]  kunit_try_run_case+0x1a5/0x480
[   21.586436]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   21.586821]  kthread+0x337/0x6f0
[   21.587022]  ret_from_fork+0x116/0x1d0
[   21.587216]  ret_from_fork_asm+0x1a/0x30
[   21.587430] 
[   21.587553] The buggy address belongs to the object at ffff888102b66500
[   21.587553]  which belongs to the cache kmalloc-64 of size 64
[   21.588399] The buggy address is located 0 bytes to the right of
[   21.588399]  allocated 48-byte region [ffff888102b66500, ffff888102b66530)
[   21.589306] 
[   21.589485] The buggy address belongs to the physical page:
[   21.589922] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b66
[   21.590401] flags: 0x200000000000000(node=0|zone=2)
[   21.590636] page_type: f5(slab)
[   21.590860] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   21.591162] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   21.591719] page dumped because: kasan: bad access detected
[   21.592136] 
[   21.592315] Memory state around the buggy address:
[   21.592751]  ffff888102b66400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.593300]  ffff888102b66480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.593861] >ffff888102b66500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   21.594344]                                      ^
[   21.594555]  ffff888102b66580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.594867]  ffff888102b66600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.595150] ==================================================================
[   21.486389] ==================================================================
[   21.487007] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1eaa/0x5450
[   21.487602] Write of size 8 at addr ffff888102b66530 by task kunit_try_catch/282
[   21.487918] 
[   21.488138] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250512 #1 PREEMPT(voluntary) 
[   21.488237] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.488274] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   21.488324] Call Trace:
[   21.488368]  <TASK>
[   21.488412]  dump_stack_lvl+0x73/0xb0
[   21.488476]  print_report+0xd1/0x650
[   21.488526]  ? __virt_addr_valid+0x1db/0x2d0
[   21.488573]  ? kasan_atomics_helper+0x1eaa/0x5450
[   21.488613]  ? kasan_complete_mode_report_info+0x2a/0x200
[   21.488648]  ? kasan_atomics_helper+0x1eaa/0x5450
[   21.488726]  kasan_report+0x141/0x180
[   21.488762]  ? kasan_atomics_helper+0x1eaa/0x5450
[   21.488802]  kasan_check_range+0x10c/0x1c0
[   21.488839]  __kasan_check_write+0x18/0x20
[   21.488893]  kasan_atomics_helper+0x1eaa/0x5450
[   21.488934]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   21.488968]  ? __kmalloc_cache_noprof+0x189/0x420
[   21.489005]  ? kasan_atomics+0x152/0x310
[   21.489070]  kasan_atomics+0x1dc/0x310
[   21.489116]  ? __pfx_kasan_atomics+0x10/0x10
[   21.489167]  ? __pfx_read_tsc+0x10/0x10
[   21.489210]  ? ktime_get_ts64+0x86/0x230
[   21.489253]  kunit_try_run_case+0x1a5/0x480
[   21.489332]  ? __pfx_kunit_try_run_case+0x10/0x10
[   21.489375]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   21.489417]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   21.489459]  ? __kthread_parkme+0x82/0x180
[   21.489501]  ? preempt_count_sub+0x50/0x80
[   21.489550]  ? __pfx_kunit_try_run_case+0x10/0x10
[   21.489596]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   21.489648]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   21.490145]  kthread+0x337/0x6f0
[   21.490197]  ? trace_preempt_on+0x20/0xc0
[   21.490247]  ? __pfx_kthread+0x10/0x10
[   21.490305]  ? _raw_spin_unlock_irq+0x47/0x80
[   21.490353]  ? calculate_sigpending+0x7b/0xa0
[   21.490403]  ? __pfx_kthread+0x10/0x10
[   21.490448]  ret_from_fork+0x116/0x1d0
[   21.490490]  ? __pfx_kthread+0x10/0x10
[   21.490530]  ret_from_fork_asm+0x1a/0x30
[   21.490592]  </TASK>
[   21.490618] 
[   21.501390] Allocated by task 282:
[   21.501786]  kasan_save_stack+0x45/0x70
[   21.502184]  kasan_save_track+0x18/0x40
[   21.502536]  kasan_save_alloc_info+0x3b/0x50
[   21.502933]  __kasan_kmalloc+0xb7/0xc0
[   21.503284]  __kmalloc_cache_noprof+0x189/0x420
[   21.503639]  kasan_atomics+0x95/0x310
[   21.504007]  kunit_try_run_case+0x1a5/0x480
[   21.504363]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   21.504678]  kthread+0x337/0x6f0
[   21.504868]  ret_from_fork+0x116/0x1d0
[   21.505167]  ret_from_fork_asm+0x1a/0x30
[   21.505499] 
[   21.505697] The buggy address belongs to the object at ffff888102b66500
[   21.505697]  which belongs to the cache kmalloc-64 of size 64
[   21.506151] The buggy address is located 0 bytes to the right of
[   21.506151]  allocated 48-byte region [ffff888102b66500, ffff888102b66530)
[   21.507097] 
[   21.507296] The buggy address belongs to the physical page:
[   21.507531] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b66
[   21.507871] flags: 0x200000000000000(node=0|zone=2)
[   21.508106] page_type: f5(slab)
[   21.508303] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   21.508600] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   21.509062] page dumped because: kasan: bad access detected
[   21.509456] 
[   21.509618] Memory state around the buggy address:
[   21.510029]  ffff888102b66400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.510585]  ffff888102b66480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.511143] >ffff888102b66500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   21.511695]                                      ^
[   21.512090]  ffff888102b66580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.512540]  ffff888102b66600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.512868] ==================================================================
[   20.807536] ==================================================================
[   20.807994] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x49e8/0x5450
[   20.808347] Read of size 4 at addr ffff888102b66530 by task kunit_try_catch/282
[   20.808957] 
[   20.809236] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250512 #1 PREEMPT(voluntary) 
[   20.809329] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.809351] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   20.809386] Call Trace:
[   20.809422]  <TASK>
[   20.809455]  dump_stack_lvl+0x73/0xb0
[   20.809505]  print_report+0xd1/0x650
[   20.809539]  ? __virt_addr_valid+0x1db/0x2d0
[   20.809577]  ? kasan_atomics_helper+0x49e8/0x5450
[   20.809622]  ? kasan_complete_mode_report_info+0x2a/0x200
[   20.809702]  ? kasan_atomics_helper+0x49e8/0x5450
[   20.809758]  kasan_report+0x141/0x180
[   20.809809]  ? kasan_atomics_helper+0x49e8/0x5450
[   20.809868]  __asan_report_load4_noabort+0x18/0x20
[   20.809916]  kasan_atomics_helper+0x49e8/0x5450
[   20.809967]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   20.810017]  ? __kmalloc_cache_noprof+0x189/0x420
[   20.810069]  ? kasan_atomics+0x152/0x310
[   20.810119]  kasan_atomics+0x1dc/0x310
[   20.810159]  ? __pfx_kasan_atomics+0x10/0x10
[   20.810205]  ? __pfx_read_tsc+0x10/0x10
[   20.810247]  ? ktime_get_ts64+0x86/0x230
[   20.810310]  kunit_try_run_case+0x1a5/0x480
[   20.810350]  ? __pfx_kunit_try_run_case+0x10/0x10
[   20.810388]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   20.810432]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   20.810478]  ? __kthread_parkme+0x82/0x180
[   20.810522]  ? preempt_count_sub+0x50/0x80
[   20.810581]  ? __pfx_kunit_try_run_case+0x10/0x10
[   20.810636]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   20.810722]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   20.810767]  kthread+0x337/0x6f0
[   20.810808]  ? trace_preempt_on+0x20/0xc0
[   20.810855]  ? __pfx_kthread+0x10/0x10
[   20.810903]  ? _raw_spin_unlock_irq+0x47/0x80
[   20.810952]  ? calculate_sigpending+0x7b/0xa0
[   20.811017]  ? __pfx_kthread+0x10/0x10
[   20.811072]  ret_from_fork+0x116/0x1d0
[   20.811116]  ? __pfx_kthread+0x10/0x10
[   20.811166]  ret_from_fork_asm+0x1a/0x30
[   20.811230]  </TASK>
[   20.811255] 
[   20.821499] Allocated by task 282:
[   20.821785]  kasan_save_stack+0x45/0x70
[   20.822480]  kasan_save_track+0x18/0x40
[   20.822811]  kasan_save_alloc_info+0x3b/0x50
[   20.823037]  __kasan_kmalloc+0xb7/0xc0
[   20.823230]  __kmalloc_cache_noprof+0x189/0x420
[   20.823453]  kasan_atomics+0x95/0x310
[   20.824023]  kunit_try_run_case+0x1a5/0x480
[   20.824436]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   20.824911]  kthread+0x337/0x6f0
[   20.825211]  ret_from_fork+0x116/0x1d0
[   20.825549]  ret_from_fork_asm+0x1a/0x30
[   20.825922] 
[   20.826103] The buggy address belongs to the object at ffff888102b66500
[   20.826103]  which belongs to the cache kmalloc-64 of size 64
[   20.826798] The buggy address is located 0 bytes to the right of
[   20.826798]  allocated 48-byte region [ffff888102b66500, ffff888102b66530)
[   20.827694] 
[   20.827860] The buggy address belongs to the physical page:
[   20.828144] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b66
[   20.828696] flags: 0x200000000000000(node=0|zone=2)
[   20.829022] page_type: f5(slab)
[   20.829306] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   20.829641] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   20.829958] page dumped because: kasan: bad access detected
[   20.830179] 
[   20.830310] Memory state around the buggy address:
[   20.830719]  ffff888102b66400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.831279]  ffff888102b66480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.831841] >ffff888102b66500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   20.832367]                                      ^
[   20.832632]  ffff888102b66580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.832947]  ffff888102b66600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.833217] ==================================================================
[   20.945558] ==================================================================
[   20.947544] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1467/0x5450
[   20.948035] Write of size 8 at addr ffff888102b66530 by task kunit_try_catch/282
[   20.948351] 
[   20.948515] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250512 #1 PREEMPT(voluntary) 
[   20.948627] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.948658] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   20.948706] Call Trace:
[   20.948748]  <TASK>
[   20.948793]  dump_stack_lvl+0x73/0xb0
[   20.948857]  print_report+0xd1/0x650
[   20.950626]  ? __virt_addr_valid+0x1db/0x2d0
[   20.950668]  ? kasan_atomics_helper+0x1467/0x5450
[   20.950707]  ? kasan_complete_mode_report_info+0x2a/0x200
[   20.950743]  ? kasan_atomics_helper+0x1467/0x5450
[   20.950778]  kasan_report+0x141/0x180
[   20.950818]  ? kasan_atomics_helper+0x1467/0x5450
[   20.950926]  kasan_check_range+0x10c/0x1c0
[   20.951022]  __kasan_check_write+0x18/0x20
[   20.951069]  kasan_atomics_helper+0x1467/0x5450
[   20.951113]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   20.951151]  ? __kmalloc_cache_noprof+0x189/0x420
[   20.951186]  ? kasan_atomics+0x152/0x310
[   20.951230]  kasan_atomics+0x1dc/0x310
[   20.951299]  ? __pfx_kasan_atomics+0x10/0x10
[   20.951341]  ? __pfx_read_tsc+0x10/0x10
[   20.951375]  ? ktime_get_ts64+0x86/0x230
[   20.951416]  kunit_try_run_case+0x1a5/0x480
[   20.951458]  ? __pfx_kunit_try_run_case+0x10/0x10
[   20.951499]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   20.951540]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   20.951579]  ? __kthread_parkme+0x82/0x180
[   20.951615]  ? preempt_count_sub+0x50/0x80
[   20.951669]  ? __pfx_kunit_try_run_case+0x10/0x10
[   20.951715]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   20.951755]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   20.951796]  kthread+0x337/0x6f0
[   20.951832]  ? trace_preempt_on+0x20/0xc0
[   20.951874]  ? __pfx_kthread+0x10/0x10
[   20.951915]  ? _raw_spin_unlock_irq+0x47/0x80
[   20.951952]  ? calculate_sigpending+0x7b/0xa0
[   20.952001]  ? __pfx_kthread+0x10/0x10
[   20.952042]  ret_from_fork+0x116/0x1d0
[   20.952074]  ? __pfx_kthread+0x10/0x10
[   20.952111]  ret_from_fork_asm+0x1a/0x30
[   20.952170]  </TASK>
[   20.952192] 
[   20.966478] Allocated by task 282:
[   20.966867]  kasan_save_stack+0x45/0x70
[   20.967126]  kasan_save_track+0x18/0x40
[   20.967329]  kasan_save_alloc_info+0x3b/0x50
[   20.967767]  __kasan_kmalloc+0xb7/0xc0
[   20.968237]  __kmalloc_cache_noprof+0x189/0x420
[   20.968741]  kasan_atomics+0x95/0x310
[   20.969077]  kunit_try_run_case+0x1a5/0x480
[   20.969350]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   20.969922]  kthread+0x337/0x6f0
[   20.970117]  ret_from_fork+0x116/0x1d0
[   20.970355]  ret_from_fork_asm+0x1a/0x30
[   20.970831] 
[   20.971058] The buggy address belongs to the object at ffff888102b66500
[   20.971058]  which belongs to the cache kmalloc-64 of size 64
[   20.971932] The buggy address is located 0 bytes to the right of
[   20.971932]  allocated 48-byte region [ffff888102b66500, ffff888102b66530)
[   20.972966] 
[   20.973209] The buggy address belongs to the physical page:
[   20.973475] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b66
[   20.974160] flags: 0x200000000000000(node=0|zone=2)
[   20.974613] page_type: f5(slab)
[   20.975038] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   20.975496] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   20.975966] page dumped because: kasan: bad access detected
[   20.976518] 
[   20.976738] Memory state around the buggy address:
[   20.977168]  ffff888102b66400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.977652]  ffff888102b66480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.978083] >ffff888102b66500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   20.978633]                                      ^
[   20.979084]  ffff888102b66580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.979528]  ffff888102b66600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.980101] ==================================================================
[   20.467362] ==================================================================
[   20.468600] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xd47/0x5450
[   20.468989] Write of size 4 at addr ffff888102b66530 by task kunit_try_catch/282
[   20.469819] 
[   20.470124] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250512 #1 PREEMPT(voluntary) 
[   20.470250] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.470296] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   20.470347] Call Trace:
[   20.470393]  <TASK>
[   20.470437]  dump_stack_lvl+0x73/0xb0
[   20.470508]  print_report+0xd1/0x650
[   20.470562]  ? __virt_addr_valid+0x1db/0x2d0
[   20.470615]  ? kasan_atomics_helper+0xd47/0x5450
[   20.470671]  ? kasan_complete_mode_report_info+0x2a/0x200
[   20.470723]  ? kasan_atomics_helper+0xd47/0x5450
[   20.470775]  kasan_report+0x141/0x180
[   20.470828]  ? kasan_atomics_helper+0xd47/0x5450
[   20.470889]  kasan_check_range+0x10c/0x1c0
[   20.470945]  __kasan_check_write+0x18/0x20
[   20.470998]  kasan_atomics_helper+0xd47/0x5450
[   20.471054]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   20.471107]  ? __kmalloc_cache_noprof+0x189/0x420
[   20.471154]  ? kasan_atomics+0x152/0x310
[   20.471201]  kasan_atomics+0x1dc/0x310
[   20.471232]  ? __pfx_kasan_atomics+0x10/0x10
[   20.471282]  ? __pfx_read_tsc+0x10/0x10
[   20.471312]  ? ktime_get_ts64+0x86/0x230
[   20.471345]  kunit_try_run_case+0x1a5/0x480
[   20.471388]  ? __pfx_kunit_try_run_case+0x10/0x10
[   20.471431]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   20.471475]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   20.471516]  ? __kthread_parkme+0x82/0x180
[   20.471609]  ? preempt_count_sub+0x50/0x80
[   20.471675]  ? __pfx_kunit_try_run_case+0x10/0x10
[   20.471745]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   20.471794]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   20.471859]  kthread+0x337/0x6f0
[   20.471912]  ? trace_preempt_on+0x20/0xc0
[   20.471968]  ? __pfx_kthread+0x10/0x10
[   20.472003]  ? _raw_spin_unlock_irq+0x47/0x80
[   20.472028]  ? calculate_sigpending+0x7b/0xa0
[   20.472056]  ? __pfx_kthread+0x10/0x10
[   20.472081]  ret_from_fork+0x116/0x1d0
[   20.472103]  ? __pfx_kthread+0x10/0x10
[   20.472127]  ret_from_fork_asm+0x1a/0x30
[   20.472161]  </TASK>
[   20.472175] 
[   20.484800] Allocated by task 282:
[   20.485167]  kasan_save_stack+0x45/0x70
[   20.485548]  kasan_save_track+0x18/0x40
[   20.485930]  kasan_save_alloc_info+0x3b/0x50
[   20.486360]  __kasan_kmalloc+0xb7/0xc0
[   20.486773]  __kmalloc_cache_noprof+0x189/0x420
[   20.487250]  kasan_atomics+0x95/0x310
[   20.487649]  kunit_try_run_case+0x1a5/0x480
[   20.488079]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   20.488469]  kthread+0x337/0x6f0
[   20.488580]  ret_from_fork+0x116/0x1d0
[   20.488726]  ret_from_fork_asm+0x1a/0x30
[   20.489029] 
[   20.489272] The buggy address belongs to the object at ffff888102b66500
[   20.489272]  which belongs to the cache kmalloc-64 of size 64
[   20.489763] The buggy address is located 0 bytes to the right of
[   20.489763]  allocated 48-byte region [ffff888102b66500, ffff888102b66530)
[   20.490422] 
[   20.490637] The buggy address belongs to the physical page:
[   20.491191] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b66
[   20.491663] flags: 0x200000000000000(node=0|zone=2)
[   20.491998] page_type: f5(slab)
[   20.492301] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   20.492783] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   20.493113] page dumped because: kasan: bad access detected
[   20.493432] 
[   20.493597] Memory state around the buggy address:
[   20.494104]  ffff888102b66400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.494416]  ffff888102b66480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.494949] >ffff888102b66500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   20.495335]                                      ^
[   20.495732]  ffff888102b66580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.496454]  ffff888102b66600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.496807] ==================================================================
[   20.057415] ==================================================================
[   20.057889] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x5fe/0x5450
[   20.058444] Write of size 4 at addr ffff888102b66530 by task kunit_try_catch/282
[   20.058900] 
[   20.059079] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250512 #1 PREEMPT(voluntary) 
[   20.059187] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.059216] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   20.059307] Call Trace:
[   20.059348]  <TASK>
[   20.059384]  dump_stack_lvl+0x73/0xb0
[   20.059441]  print_report+0xd1/0x650
[   20.059480]  ? __virt_addr_valid+0x1db/0x2d0
[   20.059519]  ? kasan_atomics_helper+0x5fe/0x5450
[   20.059556]  ? kasan_complete_mode_report_info+0x2a/0x200
[   20.059599]  ? kasan_atomics_helper+0x5fe/0x5450
[   20.059645]  kasan_report+0x141/0x180
[   20.059772]  ? kasan_atomics_helper+0x5fe/0x5450
[   20.059826]  kasan_check_range+0x10c/0x1c0
[   20.059877]  __kasan_check_write+0x18/0x20
[   20.059925]  kasan_atomics_helper+0x5fe/0x5450
[   20.059976]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   20.060024]  ? __kmalloc_cache_noprof+0x189/0x420
[   20.060138]  ? kasan_atomics+0x152/0x310
[   20.060195]  kasan_atomics+0x1dc/0x310
[   20.060246]  ? __pfx_kasan_atomics+0x10/0x10
[   20.060314]  ? __pfx_read_tsc+0x10/0x10
[   20.060359]  ? ktime_get_ts64+0x86/0x230
[   20.060453]  kunit_try_run_case+0x1a5/0x480
[   20.060507]  ? __pfx_kunit_try_run_case+0x10/0x10
[   20.060558]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   20.060634]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   20.060698]  ? __kthread_parkme+0x82/0x180
[   20.060749]  ? preempt_count_sub+0x50/0x80
[   20.060828]  ? __pfx_kunit_try_run_case+0x10/0x10
[   20.060906]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   20.060952]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   20.060994]  kthread+0x337/0x6f0
[   20.061045]  ? trace_preempt_on+0x20/0xc0
[   20.061148]  ? __pfx_kthread+0x10/0x10
[   20.061193]  ? _raw_spin_unlock_irq+0x47/0x80
[   20.061242]  ? calculate_sigpending+0x7b/0xa0
[   20.061304]  ? __pfx_kthread+0x10/0x10
[   20.061342]  ret_from_fork+0x116/0x1d0
[   20.061377]  ? __pfx_kthread+0x10/0x10
[   20.061414]  ret_from_fork_asm+0x1a/0x30
[   20.061466]  </TASK>
[   20.061489] 
[   20.073188] Allocated by task 282:
[   20.073481]  kasan_save_stack+0x45/0x70
[   20.073783]  kasan_save_track+0x18/0x40
[   20.074195]  kasan_save_alloc_info+0x3b/0x50
[   20.074576]  __kasan_kmalloc+0xb7/0xc0
[   20.074907]  __kmalloc_cache_noprof+0x189/0x420
[   20.075268]  kasan_atomics+0x95/0x310
[   20.075674]  kunit_try_run_case+0x1a5/0x480
[   20.076179]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   20.076390]  kthread+0x337/0x6f0
[   20.076537]  ret_from_fork+0x116/0x1d0
[   20.076752]  ret_from_fork_asm+0x1a/0x30
[   20.077138] 
[   20.077334] The buggy address belongs to the object at ffff888102b66500
[   20.077334]  which belongs to the cache kmalloc-64 of size 64
[   20.078217] The buggy address is located 0 bytes to the right of
[   20.078217]  allocated 48-byte region [ffff888102b66500, ffff888102b66530)
[   20.078881] 
[   20.079023] The buggy address belongs to the physical page:
[   20.079446] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b66
[   20.080212] flags: 0x200000000000000(node=0|zone=2)
[   20.080522] page_type: f5(slab)
[   20.080740] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   20.081377] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   20.081971] page dumped because: kasan: bad access detected
[   20.082391] 
[   20.082498] Memory state around the buggy address:
[   20.082945]  ffff888102b66400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.083458]  ffff888102b66480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.083689] >ffff888102b66500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   20.084287]                                      ^
[   20.084675]  ffff888102b66580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.085131]  ffff888102b66600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.085477] ==================================================================
[   20.526783] ==================================================================
[   20.527376] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xe78/0x5450
[   20.528020] Write of size 4 at addr ffff888102b66530 by task kunit_try_catch/282
[   20.528329] 
[   20.528494] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250512 #1 PREEMPT(voluntary) 
[   20.528605] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.528636] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   20.528686] Call Trace:
[   20.528731]  <TASK>
[   20.528773]  dump_stack_lvl+0x73/0xb0
[   20.528838]  print_report+0xd1/0x650
[   20.528892]  ? __virt_addr_valid+0x1db/0x2d0
[   20.528933]  ? kasan_atomics_helper+0xe78/0x5450
[   20.528967]  ? kasan_complete_mode_report_info+0x2a/0x200
[   20.529001]  ? kasan_atomics_helper+0xe78/0x5450
[   20.529035]  kasan_report+0x141/0x180
[   20.529070]  ? kasan_atomics_helper+0xe78/0x5450
[   20.529110]  kasan_check_range+0x10c/0x1c0
[   20.529147]  __kasan_check_write+0x18/0x20
[   20.529177]  kasan_atomics_helper+0xe78/0x5450
[   20.529211]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   20.529246]  ? __kmalloc_cache_noprof+0x189/0x420
[   20.529298]  ? kasan_atomics+0x152/0x310
[   20.529338]  kasan_atomics+0x1dc/0x310
[   20.529374]  ? __pfx_kasan_atomics+0x10/0x10
[   20.529411]  ? __pfx_read_tsc+0x10/0x10
[   20.529445]  ? ktime_get_ts64+0x86/0x230
[   20.529483]  kunit_try_run_case+0x1a5/0x480
[   20.529522]  ? __pfx_kunit_try_run_case+0x10/0x10
[   20.529556]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   20.529591]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   20.529624]  ? __kthread_parkme+0x82/0x180
[   20.529662]  ? preempt_count_sub+0x50/0x80
[   20.529701]  ? __pfx_kunit_try_run_case+0x10/0x10
[   20.529859]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   20.529907]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   20.529955]  kthread+0x337/0x6f0
[   20.530030]  ? trace_preempt_on+0x20/0xc0
[   20.530086]  ? __pfx_kthread+0x10/0x10
[   20.530131]  ? _raw_spin_unlock_irq+0x47/0x80
[   20.530193]  ? calculate_sigpending+0x7b/0xa0
[   20.530270]  ? __pfx_kthread+0x10/0x10
[   20.530337]  ret_from_fork+0x116/0x1d0
[   20.530384]  ? __pfx_kthread+0x10/0x10
[   20.530443]  ret_from_fork_asm+0x1a/0x30
[   20.530524]  </TASK>
[   20.530565] 
[   20.542115] Allocated by task 282:
[   20.542587]  kasan_save_stack+0x45/0x70
[   20.543028]  kasan_save_track+0x18/0x40
[   20.543355]  kasan_save_alloc_info+0x3b/0x50
[   20.543757]  __kasan_kmalloc+0xb7/0xc0
[   20.544097]  __kmalloc_cache_noprof+0x189/0x420
[   20.544502]  kasan_atomics+0x95/0x310
[   20.544878]  kunit_try_run_case+0x1a5/0x480
[   20.545114]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   20.545499]  kthread+0x337/0x6f0
[   20.545684]  ret_from_fork+0x116/0x1d0
[   20.545877]  ret_from_fork_asm+0x1a/0x30
[   20.546079] 
[   20.546295] The buggy address belongs to the object at ffff888102b66500
[   20.546295]  which belongs to the cache kmalloc-64 of size 64
[   20.547183] The buggy address is located 0 bytes to the right of
[   20.547183]  allocated 48-byte region [ffff888102b66500, ffff888102b66530)
[   20.547917] 
[   20.548068] The buggy address belongs to the physical page:
[   20.548335] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b66
[   20.548690] flags: 0x200000000000000(node=0|zone=2)
[   20.548959] page_type: f5(slab)
[   20.549179] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   20.549885] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   20.550496] page dumped because: kasan: bad access detected
[   20.550942] 
[   20.551137] Memory state around the buggy address:
[   20.551553]  ffff888102b66400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.552108]  ffff888102b66480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.553755] >ffff888102b66500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   20.554345]                                      ^
[   20.555610]  ffff888102b66580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.556573]  ffff888102b66600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.557497] ==================================================================
[   19.955275] ==================================================================
[   19.955793] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a0/0x5450
[   19.956939] Write of size 4 at addr ffff888102b66530 by task kunit_try_catch/282
[   19.957739] 
[   19.958079] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250512 #1 PREEMPT(voluntary) 
[   19.958182] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.958204] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   19.958248] Call Trace:
[   19.958285]  <TASK>
[   19.958323]  dump_stack_lvl+0x73/0xb0
[   19.958392]  print_report+0xd1/0x650
[   19.958446]  ? __virt_addr_valid+0x1db/0x2d0
[   19.958494]  ? kasan_atomics_helper+0x4a0/0x5450
[   19.958545]  ? kasan_complete_mode_report_info+0x2a/0x200
[   19.958594]  ? kasan_atomics_helper+0x4a0/0x5450
[   19.958631]  kasan_report+0x141/0x180
[   19.958703]  ? kasan_atomics_helper+0x4a0/0x5450
[   19.958748]  kasan_check_range+0x10c/0x1c0
[   19.958790]  __kasan_check_write+0x18/0x20
[   19.958826]  kasan_atomics_helper+0x4a0/0x5450
[   19.958868]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   19.958907]  ? __kmalloc_cache_noprof+0x189/0x420
[   19.958948]  ? kasan_atomics+0x152/0x310
[   19.959007]  kasan_atomics+0x1dc/0x310
[   19.959096]  ? __pfx_kasan_atomics+0x10/0x10
[   19.959148]  ? __pfx_read_tsc+0x10/0x10
[   19.959191]  ? ktime_get_ts64+0x86/0x230
[   19.959246]  kunit_try_run_case+0x1a5/0x480
[   19.959314]  ? __pfx_kunit_try_run_case+0x10/0x10
[   19.959365]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   19.959408]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   19.959447]  ? __kthread_parkme+0x82/0x180
[   19.959483]  ? preempt_count_sub+0x50/0x80
[   19.959526]  ? __pfx_kunit_try_run_case+0x10/0x10
[   19.959571]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   19.959610]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   19.959650]  kthread+0x337/0x6f0
[   19.959773]  ? trace_preempt_on+0x20/0xc0
[   19.959836]  ? __pfx_kthread+0x10/0x10
[   19.959879]  ? _raw_spin_unlock_irq+0x47/0x80
[   19.959927]  ? calculate_sigpending+0x7b/0xa0
[   19.959980]  ? __pfx_kthread+0x10/0x10
[   19.960030]  ret_from_fork+0x116/0x1d0
[   19.960109]  ? __pfx_kthread+0x10/0x10
[   19.960147]  ret_from_fork_asm+0x1a/0x30
[   19.960199]  </TASK>
[   19.960222] 
[   19.974097] Allocated by task 282:
[   19.974366]  kasan_save_stack+0x45/0x70
[   19.975068]  kasan_save_track+0x18/0x40
[   19.975420]  kasan_save_alloc_info+0x3b/0x50
[   19.975583]  __kasan_kmalloc+0xb7/0xc0
[   19.975773]  __kmalloc_cache_noprof+0x189/0x420
[   19.976177]  kasan_atomics+0x95/0x310
[   19.976528]  kunit_try_run_case+0x1a5/0x480
[   19.977044]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   19.977427]  kthread+0x337/0x6f0
[   19.977618]  ret_from_fork+0x116/0x1d0
[   19.977836]  ret_from_fork_asm+0x1a/0x30
[   19.978025] 
[   19.978145] The buggy address belongs to the object at ffff888102b66500
[   19.978145]  which belongs to the cache kmalloc-64 of size 64
[   19.978961] The buggy address is located 0 bytes to the right of
[   19.978961]  allocated 48-byte region [ffff888102b66500, ffff888102b66530)
[   19.980254] 
[   19.980537] The buggy address belongs to the physical page:
[   19.981019] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b66
[   19.981864] flags: 0x200000000000000(node=0|zone=2)
[   19.982317] page_type: f5(slab)
[   19.982747] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   19.983185] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.983484] page dumped because: kasan: bad access detected
[   19.983745] 
[   19.983867] Memory state around the buggy address:
[   19.984110]  ffff888102b66400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.984643]  ffff888102b66480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.985157] >ffff888102b66500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.985766]                                      ^
[   19.986157]  ffff888102b66580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.987022]  ffff888102b66600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.987560] ==================================================================
[   20.981316] ==================================================================
[   20.982006] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x50d4/0x5450
[   20.982793] Write of size 8 at addr ffff888102b66530 by task kunit_try_catch/282
[   20.983146] 
[   20.983881] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250512 #1 PREEMPT(voluntary) 
[   20.984014] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.984046] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   20.984095] Call Trace:
[   20.984128]  <TASK>
[   20.984155]  dump_stack_lvl+0x73/0xb0
[   20.984196]  print_report+0xd1/0x650
[   20.984223]  ? __virt_addr_valid+0x1db/0x2d0
[   20.984251]  ? kasan_atomics_helper+0x50d4/0x5450
[   20.984302]  ? kasan_complete_mode_report_info+0x2a/0x200
[   20.984328]  ? kasan_atomics_helper+0x50d4/0x5450
[   20.984354]  kasan_report+0x141/0x180
[   20.984380]  ? kasan_atomics_helper+0x50d4/0x5450
[   20.984409]  __asan_report_store8_noabort+0x1b/0x30
[   20.984433]  kasan_atomics_helper+0x50d4/0x5450
[   20.984459]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   20.984484]  ? __kmalloc_cache_noprof+0x189/0x420
[   20.984509]  ? kasan_atomics+0x152/0x310
[   20.984539]  kasan_atomics+0x1dc/0x310
[   20.984566]  ? __pfx_kasan_atomics+0x10/0x10
[   20.984593]  ? __pfx_read_tsc+0x10/0x10
[   20.984618]  ? ktime_get_ts64+0x86/0x230
[   20.984650]  kunit_try_run_case+0x1a5/0x480
[   20.984707]  ? __pfx_kunit_try_run_case+0x10/0x10
[   20.984735]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   20.984761]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   20.984786]  ? __kthread_parkme+0x82/0x180
[   20.984810]  ? preempt_count_sub+0x50/0x80
[   20.984835]  ? __pfx_kunit_try_run_case+0x10/0x10
[   20.984862]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   20.984888]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   20.984914]  kthread+0x337/0x6f0
[   20.984936]  ? trace_preempt_on+0x20/0xc0
[   20.984964]  ? __pfx_kthread+0x10/0x10
[   20.984987]  ? _raw_spin_unlock_irq+0x47/0x80
[   20.985010]  ? calculate_sigpending+0x7b/0xa0
[   20.985038]  ? __pfx_kthread+0x10/0x10
[   20.985062]  ret_from_fork+0x116/0x1d0
[   20.985083]  ? __pfx_kthread+0x10/0x10
[   20.985106]  ret_from_fork_asm+0x1a/0x30
[   20.985140]  </TASK>
[   20.985155] 
[   20.998781] Allocated by task 282:
[   20.999017]  kasan_save_stack+0x45/0x70
[   20.999209]  kasan_save_track+0x18/0x40
[   20.999444]  kasan_save_alloc_info+0x3b/0x50
[   21.000333]  __kasan_kmalloc+0xb7/0xc0
[   21.000581]  __kmalloc_cache_noprof+0x189/0x420
[   21.000794]  kasan_atomics+0x95/0x310
[   21.000988]  kunit_try_run_case+0x1a5/0x480
[   21.001899]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   21.002369]  kthread+0x337/0x6f0
[   21.002632]  ret_from_fork+0x116/0x1d0
[   21.002863]  ret_from_fork_asm+0x1a/0x30
[   21.003224] 
[   21.003369] The buggy address belongs to the object at ffff888102b66500
[   21.003369]  which belongs to the cache kmalloc-64 of size 64
[   21.004028] The buggy address is located 0 bytes to the right of
[   21.004028]  allocated 48-byte region [ffff888102b66500, ffff888102b66530)
[   21.004641] 
[   21.004810] The buggy address belongs to the physical page:
[   21.005041] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b66
[   21.005682] flags: 0x200000000000000(node=0|zone=2)
[   21.006103] page_type: f5(slab)
[   21.006453] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   21.007095] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   21.007447] page dumped because: kasan: bad access detected
[   21.007946] 
[   21.008084] Memory state around the buggy address:
[   21.008374]  ffff888102b66400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.008880]  ffff888102b66480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.009319] >ffff888102b66500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   21.009734]                                      ^
[   21.010081]  ffff888102b66580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.010577]  ffff888102b66600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.011038] ==================================================================
[   19.878475] ==================================================================
[   19.878893] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3df/0x5450
[   19.879250] Read of size 4 at addr ffff888102b66530 by task kunit_try_catch/282
[   19.880140] 
[   19.880387] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250512 #1 PREEMPT(voluntary) 
[   19.880523] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.880549] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   19.880595] Call Trace:
[   19.880637]  <TASK>
[   19.880720]  dump_stack_lvl+0x73/0xb0
[   19.880827]  print_report+0xd1/0x650
[   19.880886]  ? __virt_addr_valid+0x1db/0x2d0
[   19.880943]  ? kasan_atomics_helper+0x3df/0x5450
[   19.880994]  ? kasan_complete_mode_report_info+0x2a/0x200
[   19.881072]  ? kasan_atomics_helper+0x3df/0x5450
[   19.881127]  kasan_report+0x141/0x180
[   19.881180]  ? kasan_atomics_helper+0x3df/0x5450
[   19.881241]  kasan_check_range+0x10c/0x1c0
[   19.881308]  __kasan_check_read+0x15/0x20
[   19.881357]  kasan_atomics_helper+0x3df/0x5450
[   19.881411]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   19.881465]  ? __kmalloc_cache_noprof+0x189/0x420
[   19.881518]  ? kasan_atomics+0x152/0x310
[   19.881577]  kasan_atomics+0x1dc/0x310
[   19.881628]  ? __pfx_kasan_atomics+0x10/0x10
[   19.881706]  ? __pfx_read_tsc+0x10/0x10
[   19.881750]  ? ktime_get_ts64+0x86/0x230
[   19.881857]  kunit_try_run_case+0x1a5/0x480
[   19.881918]  ? __pfx_kunit_try_run_case+0x10/0x10
[   19.881970]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   19.882023]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   19.882075]  ? __kthread_parkme+0x82/0x180
[   19.882123]  ? preempt_count_sub+0x50/0x80
[   19.882179]  ? __pfx_kunit_try_run_case+0x10/0x10
[   19.882233]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   19.882296]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   19.882356]  kthread+0x337/0x6f0
[   19.882402]  ? trace_preempt_on+0x20/0xc0
[   19.882458]  ? __pfx_kthread+0x10/0x10
[   19.882505]  ? _raw_spin_unlock_irq+0x47/0x80
[   19.882549]  ? calculate_sigpending+0x7b/0xa0
[   19.882602]  ? __pfx_kthread+0x10/0x10
[   19.882680]  ret_from_fork+0x116/0x1d0
[   19.882730]  ? __pfx_kthread+0x10/0x10
[   19.882781]  ret_from_fork_asm+0x1a/0x30
[   19.882853]  </TASK>
[   19.882882] 
[   19.896211] Allocated by task 282:
[   19.899936]  kasan_save_stack+0x45/0x70
[   19.900521]  kasan_save_track+0x18/0x40
[   19.900844]  kasan_save_alloc_info+0x3b/0x50
[   19.901430]  __kasan_kmalloc+0xb7/0xc0
[   19.902016]  __kmalloc_cache_noprof+0x189/0x420
[   19.902729]  kasan_atomics+0x95/0x310
[   19.903066]  kunit_try_run_case+0x1a5/0x480
[   19.903925]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   19.904582]  kthread+0x337/0x6f0
[   19.905043]  ret_from_fork+0x116/0x1d0
[   19.905739]  ret_from_fork_asm+0x1a/0x30
[   19.905956] 
[   19.906151] The buggy address belongs to the object at ffff888102b66500
[   19.906151]  which belongs to the cache kmalloc-64 of size 64
[   19.907011] The buggy address is located 0 bytes to the right of
[   19.907011]  allocated 48-byte region [ffff888102b66500, ffff888102b66530)
[   19.909098] 
[   19.909235] The buggy address belongs to the physical page:
[   19.909561] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b66
[   19.910333] flags: 0x200000000000000(node=0|zone=2)
[   19.910582] page_type: f5(slab)
[   19.910913] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   19.911828] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.912713] page dumped because: kasan: bad access detected
[   19.912948] 
[   19.913345] Memory state around the buggy address:
[   19.914179]  ffff888102b66400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.914665]  ffff888102b66480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.915082] >ffff888102b66500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.915789]                                      ^
[   19.916379]  ffff888102b66580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.916647]  ffff888102b66600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.917065] ==================================================================
[   21.041913] ==================================================================
[   21.042563] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x15b6/0x5450
[   21.043189] Write of size 8 at addr ffff888102b66530 by task kunit_try_catch/282
[   21.043686] 
[   21.043947] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250512 #1 PREEMPT(voluntary) 
[   21.044043] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.044065] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   21.044102] Call Trace:
[   21.044139]  <TASK>
[   21.044178]  dump_stack_lvl+0x73/0xb0
[   21.044244]  print_report+0xd1/0x650
[   21.044308]  ? __virt_addr_valid+0x1db/0x2d0
[   21.044338]  ? kasan_atomics_helper+0x15b6/0x5450
[   21.044363]  ? kasan_complete_mode_report_info+0x2a/0x200
[   21.044388]  ? kasan_atomics_helper+0x15b6/0x5450
[   21.044414]  kasan_report+0x141/0x180
[   21.044439]  ? kasan_atomics_helper+0x15b6/0x5450
[   21.044468]  kasan_check_range+0x10c/0x1c0
[   21.044495]  __kasan_check_write+0x18/0x20
[   21.044517]  kasan_atomics_helper+0x15b6/0x5450
[   21.044544]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   21.044569]  ? __kmalloc_cache_noprof+0x189/0x420
[   21.044594]  ? kasan_atomics+0x152/0x310
[   21.044623]  kasan_atomics+0x1dc/0x310
[   21.044649]  ? __pfx_kasan_atomics+0x10/0x10
[   21.044688]  ? __pfx_read_tsc+0x10/0x10
[   21.044713]  ? ktime_get_ts64+0x86/0x230
[   21.044739]  kunit_try_run_case+0x1a5/0x480
[   21.044768]  ? __pfx_kunit_try_run_case+0x10/0x10
[   21.044793]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   21.044819]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   21.044844]  ? __kthread_parkme+0x82/0x180
[   21.044867]  ? preempt_count_sub+0x50/0x80
[   21.044893]  ? __pfx_kunit_try_run_case+0x10/0x10
[   21.044919]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   21.044945]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   21.044971]  kthread+0x337/0x6f0
[   21.044992]  ? trace_preempt_on+0x20/0xc0
[   21.045020]  ? __pfx_kthread+0x10/0x10
[   21.045043]  ? _raw_spin_unlock_irq+0x47/0x80
[   21.045066]  ? calculate_sigpending+0x7b/0xa0
[   21.045093]  ? __pfx_kthread+0x10/0x10
[   21.045116]  ret_from_fork+0x116/0x1d0
[   21.045137]  ? __pfx_kthread+0x10/0x10
[   21.045160]  ret_from_fork_asm+0x1a/0x30
[   21.045193]  </TASK>
[   21.045207] 
[   21.057183] Allocated by task 282:
[   21.057584]  kasan_save_stack+0x45/0x70
[   21.057897]  kasan_save_track+0x18/0x40
[   21.058098]  kasan_save_alloc_info+0x3b/0x50
[   21.058306]  __kasan_kmalloc+0xb7/0xc0
[   21.058716]  __kmalloc_cache_noprof+0x189/0x420
[   21.059114]  kasan_atomics+0x95/0x310
[   21.059555]  kunit_try_run_case+0x1a5/0x480
[   21.059998]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   21.060474]  kthread+0x337/0x6f0
[   21.060780]  ret_from_fork+0x116/0x1d0
[   21.061125]  ret_from_fork_asm+0x1a/0x30
[   21.061478] 
[   21.061608] The buggy address belongs to the object at ffff888102b66500
[   21.061608]  which belongs to the cache kmalloc-64 of size 64
[   21.062060] The buggy address is located 0 bytes to the right of
[   21.062060]  allocated 48-byte region [ffff888102b66500, ffff888102b66530)
[   21.063072] 
[   21.063277] The buggy address belongs to the physical page:
[   21.063784] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b66
[   21.064380] flags: 0x200000000000000(node=0|zone=2)
[   21.064622] page_type: f5(slab)
[   21.064853] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   21.065364] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   21.065991] page dumped because: kasan: bad access detected
[   21.066508] 
[   21.066805] Memory state around the buggy address:
[   21.067204]  ffff888102b66400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.067516]  ffff888102b66480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.067801] >ffff888102b66500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   21.068071]                                      ^
[   21.068550]  ffff888102b66580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.069207]  ffff888102b66600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.069810] ==================================================================
[   20.337676] ==================================================================
[   20.338199] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xac7/0x5450
[   20.338582] Write of size 4 at addr ffff888102b66530 by task kunit_try_catch/282
[   20.339189] 
[   20.339448] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250512 #1 PREEMPT(voluntary) 
[   20.339553] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.339584] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   20.339632] Call Trace:
[   20.339704]  <TASK>
[   20.339751]  dump_stack_lvl+0x73/0xb0
[   20.339822]  print_report+0xd1/0x650
[   20.339873]  ? __virt_addr_valid+0x1db/0x2d0
[   20.339921]  ? kasan_atomics_helper+0xac7/0x5450
[   20.339992]  ? kasan_complete_mode_report_info+0x2a/0x200
[   20.340037]  ? kasan_atomics_helper+0xac7/0x5450
[   20.340083]  kasan_report+0x141/0x180
[   20.340150]  ? kasan_atomics_helper+0xac7/0x5450
[   20.340201]  kasan_check_range+0x10c/0x1c0
[   20.340248]  __kasan_check_write+0x18/0x20
[   20.340306]  kasan_atomics_helper+0xac7/0x5450
[   20.340373]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   20.340435]  ? __kmalloc_cache_noprof+0x189/0x420
[   20.340495]  ? kasan_atomics+0x152/0x310
[   20.340547]  kasan_atomics+0x1dc/0x310
[   20.340594]  ? __pfx_kasan_atomics+0x10/0x10
[   20.340649]  ? __pfx_read_tsc+0x10/0x10
[   20.340729]  ? ktime_get_ts64+0x86/0x230
[   20.340782]  kunit_try_run_case+0x1a5/0x480
[   20.340832]  ? __pfx_kunit_try_run_case+0x10/0x10
[   20.340882]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   20.340935]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   20.340988]  ? __kthread_parkme+0x82/0x180
[   20.341038]  ? preempt_count_sub+0x50/0x80
[   20.341088]  ? __pfx_kunit_try_run_case+0x10/0x10
[   20.341133]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   20.341183]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   20.341266]  kthread+0x337/0x6f0
[   20.341312]  ? trace_preempt_on+0x20/0xc0
[   20.341362]  ? __pfx_kthread+0x10/0x10
[   20.341409]  ? _raw_spin_unlock_irq+0x47/0x80
[   20.341452]  ? calculate_sigpending+0x7b/0xa0
[   20.341522]  ? __pfx_kthread+0x10/0x10
[   20.341572]  ret_from_fork+0x116/0x1d0
[   20.341610]  ? __pfx_kthread+0x10/0x10
[   20.341683]  ret_from_fork_asm+0x1a/0x30
[   20.341751]  </TASK>
[   20.341769] 
[   20.352179] Allocated by task 282:
[   20.352518]  kasan_save_stack+0x45/0x70
[   20.352927]  kasan_save_track+0x18/0x40
[   20.353282]  kasan_save_alloc_info+0x3b/0x50
[   20.353645]  __kasan_kmalloc+0xb7/0xc0
[   20.354005]  __kmalloc_cache_noprof+0x189/0x420
[   20.354380]  kasan_atomics+0x95/0x310
[   20.354765]  kunit_try_run_case+0x1a5/0x480
[   20.355089]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   20.355440]  kthread+0x337/0x6f0
[   20.355625]  ret_from_fork+0x116/0x1d0
[   20.356013]  ret_from_fork_asm+0x1a/0x30
[   20.356379] 
[   20.356563] The buggy address belongs to the object at ffff888102b66500
[   20.356563]  which belongs to the cache kmalloc-64 of size 64
[   20.357210] The buggy address is located 0 bytes to the right of
[   20.357210]  allocated 48-byte region [ffff888102b66500, ffff888102b66530)
[   20.357728] 
[   20.357878] The buggy address belongs to the physical page:
[   20.358147] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b66
[   20.358792] flags: 0x200000000000000(node=0|zone=2)
[   20.359219] page_type: f5(slab)
[   20.359557] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   20.360157] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   20.361175] page dumped because: kasan: bad access detected
[   20.361622] 
[   20.362667] Memory state around the buggy address:
[   20.363448]  ffff888102b66400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.365808]  ffff888102b66480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.366179] >ffff888102b66500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   20.366852]                                      ^
[   20.367278]  ffff888102b66580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.367806]  ffff888102b66600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.368413] ==================================================================
[   21.373026] ==================================================================
[   21.373642] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4f30/0x5450
[   21.373992] Read of size 8 at addr ffff888102b66530 by task kunit_try_catch/282
[   21.374201] 
[   21.375347] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250512 #1 PREEMPT(voluntary) 
[   21.375473] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.375505] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   21.375554] Call Trace:
[   21.375600]  <TASK>
[   21.375640]  dump_stack_lvl+0x73/0xb0
[   21.375744]  print_report+0xd1/0x650
[   21.375816]  ? __virt_addr_valid+0x1db/0x2d0
[   21.375871]  ? kasan_atomics_helper+0x4f30/0x5450
[   21.375933]  ? kasan_complete_mode_report_info+0x2a/0x200
[   21.375982]  ? kasan_atomics_helper+0x4f30/0x5450
[   21.376025]  kasan_report+0x141/0x180
[   21.376055]  ? kasan_atomics_helper+0x4f30/0x5450
[   21.376085]  __asan_report_load8_noabort+0x18/0x20
[   21.376109]  kasan_atomics_helper+0x4f30/0x5450
[   21.376135]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   21.376160]  ? __kmalloc_cache_noprof+0x189/0x420
[   21.376185]  ? kasan_atomics+0x152/0x310
[   21.376215]  kasan_atomics+0x1dc/0x310
[   21.376240]  ? __pfx_kasan_atomics+0x10/0x10
[   21.376299]  ? __pfx_read_tsc+0x10/0x10
[   21.376326]  ? ktime_get_ts64+0x86/0x230
[   21.376353]  kunit_try_run_case+0x1a5/0x480
[   21.376382]  ? __pfx_kunit_try_run_case+0x10/0x10
[   21.376406]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   21.376433]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   21.376457]  ? __kthread_parkme+0x82/0x180
[   21.376481]  ? preempt_count_sub+0x50/0x80
[   21.376508]  ? __pfx_kunit_try_run_case+0x10/0x10
[   21.376534]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   21.376559]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   21.376586]  kthread+0x337/0x6f0
[   21.376608]  ? trace_preempt_on+0x20/0xc0
[   21.376634]  ? __pfx_kthread+0x10/0x10
[   21.376664]  ? _raw_spin_unlock_irq+0x47/0x80
[   21.376716]  ? calculate_sigpending+0x7b/0xa0
[   21.376746]  ? __pfx_kthread+0x10/0x10
[   21.376771]  ret_from_fork+0x116/0x1d0
[   21.376793]  ? __pfx_kthread+0x10/0x10
[   21.376816]  ret_from_fork_asm+0x1a/0x30
[   21.376850]  </TASK>
[   21.376864] 
[   21.390336] Allocated by task 282:
[   21.390862]  kasan_save_stack+0x45/0x70
[   21.391131]  kasan_save_track+0x18/0x40
[   21.391432]  kasan_save_alloc_info+0x3b/0x50
[   21.392056]  __kasan_kmalloc+0xb7/0xc0
[   21.392294]  __kmalloc_cache_noprof+0x189/0x420
[   21.392469]  kasan_atomics+0x95/0x310
[   21.393076]  kunit_try_run_case+0x1a5/0x480
[   21.393485]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   21.394098]  kthread+0x337/0x6f0
[   21.394567]  ret_from_fork+0x116/0x1d0
[   21.394916]  ret_from_fork_asm+0x1a/0x30
[   21.395198] 
[   21.395331] The buggy address belongs to the object at ffff888102b66500
[   21.395331]  which belongs to the cache kmalloc-64 of size 64
[   21.396340] The buggy address is located 0 bytes to the right of
[   21.396340]  allocated 48-byte region [ffff888102b66500, ffff888102b66530)
[   21.397214] 
[   21.397473] The buggy address belongs to the physical page:
[   21.397942] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b66
[   21.398332] flags: 0x200000000000000(node=0|zone=2)
[   21.398762] page_type: f5(slab)
[   21.398982] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   21.399464] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   21.399883] page dumped because: kasan: bad access detected
[   21.400312] 
[   21.400506] Memory state around the buggy address:
[   21.400845]  ffff888102b66400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.401398]  ffff888102b66480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.401948] >ffff888102b66500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   21.402451]                                      ^
[   21.402726]  ffff888102b66580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.403201]  ffff888102b66600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.403714] ==================================================================
[   20.593493] ==================================================================
[   20.593801] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xfa9/0x5450
[   20.594054] Write of size 4 at addr ffff888102b66530 by task kunit_try_catch/282
[   20.594239] 
[   20.594355] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250512 #1 PREEMPT(voluntary) 
[   20.594417] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.594432] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   20.594460] Call Trace:
[   20.594484]  <TASK>
[   20.594509]  dump_stack_lvl+0x73/0xb0
[   20.594543]  print_report+0xd1/0x650
[   20.594568]  ? __virt_addr_valid+0x1db/0x2d0
[   20.594595]  ? kasan_atomics_helper+0xfa9/0x5450
[   20.594618]  ? kasan_complete_mode_report_info+0x2a/0x200
[   20.594643]  ? kasan_atomics_helper+0xfa9/0x5450
[   20.594667]  kasan_report+0x141/0x180
[   20.594692]  ? kasan_atomics_helper+0xfa9/0x5450
[   20.594721]  kasan_check_range+0x10c/0x1c0
[   20.594747]  __kasan_check_write+0x18/0x20
[   20.594769]  kasan_atomics_helper+0xfa9/0x5450
[   20.594794]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   20.594818]  ? __kmalloc_cache_noprof+0x189/0x420
[   20.594843]  ? kasan_atomics+0x152/0x310
[   20.594873]  kasan_atomics+0x1dc/0x310
[   20.594899]  ? __pfx_kasan_atomics+0x10/0x10
[   20.594925]  ? __pfx_read_tsc+0x10/0x10
[   20.594949]  ? ktime_get_ts64+0x86/0x230
[   20.594977]  kunit_try_run_case+0x1a5/0x480
[   20.595022]  ? __pfx_kunit_try_run_case+0x10/0x10
[   20.595048]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   20.595073]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   20.595098]  ? __kthread_parkme+0x82/0x180
[   20.595121]  ? preempt_count_sub+0x50/0x80
[   20.595147]  ? __pfx_kunit_try_run_case+0x10/0x10
[   20.595173]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   20.595199]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   20.595225]  kthread+0x337/0x6f0
[   20.595247]  ? trace_preempt_on+0x20/0xc0
[   20.595520]  ? __pfx_kthread+0x10/0x10
[   20.595565]  ? _raw_spin_unlock_irq+0x47/0x80
[   20.595609]  ? calculate_sigpending+0x7b/0xa0
[   20.595660]  ? __pfx_kthread+0x10/0x10
[   20.595706]  ret_from_fork+0x116/0x1d0
[   20.595748]  ? __pfx_kthread+0x10/0x10
[   20.595794]  ret_from_fork_asm+0x1a/0x30
[   20.595857]  </TASK>
[   20.595880] 
[   20.612226] Allocated by task 282:
[   20.612609]  kasan_save_stack+0x45/0x70
[   20.613220]  kasan_save_track+0x18/0x40
[   20.613412]  kasan_save_alloc_info+0x3b/0x50
[   20.613942]  __kasan_kmalloc+0xb7/0xc0
[   20.614179]  __kmalloc_cache_noprof+0x189/0x420
[   20.614558]  kasan_atomics+0x95/0x310
[   20.615250]  kunit_try_run_case+0x1a5/0x480
[   20.615610]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   20.616329]  kthread+0x337/0x6f0
[   20.616550]  ret_from_fork+0x116/0x1d0
[   20.617003]  ret_from_fork_asm+0x1a/0x30
[   20.617499] 
[   20.617608] The buggy address belongs to the object at ffff888102b66500
[   20.617608]  which belongs to the cache kmalloc-64 of size 64
[   20.617927] The buggy address is located 0 bytes to the right of
[   20.617927]  allocated 48-byte region [ffff888102b66500, ffff888102b66530)
[   20.619454] 
[   20.619628] The buggy address belongs to the physical page:
[   20.620013] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b66
[   20.620930] flags: 0x200000000000000(node=0|zone=2)
[   20.621363] page_type: f5(slab)
[   20.621718] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   20.622305] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   20.622976] page dumped because: kasan: bad access detected
[   20.623315] 
[   20.623522] Memory state around the buggy address:
[   20.623898]  ffff888102b66400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.624682]  ffff888102b66480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.625097] >ffff888102b66500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   20.625631]                                      ^
[   20.626071]  ffff888102b66580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.626502]  ffff888102b66600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.627033] ==================================================================
[   21.132622] ==================================================================
[   21.133102] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x177f/0x5450
[   21.133759] Write of size 8 at addr ffff888102b66530 by task kunit_try_catch/282
[   21.134151] 
[   21.134333] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250512 #1 PREEMPT(voluntary) 
[   21.134441] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.134495] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   21.134532] Call Trace:
[   21.134570]  <TASK>
[   21.134605]  dump_stack_lvl+0x73/0xb0
[   21.134661]  print_report+0xd1/0x650
[   21.134726]  ? __virt_addr_valid+0x1db/0x2d0
[   21.134774]  ? kasan_atomics_helper+0x177f/0x5450
[   21.134840]  ? kasan_complete_mode_report_info+0x2a/0x200
[   21.134884]  ? kasan_atomics_helper+0x177f/0x5450
[   21.134920]  kasan_report+0x141/0x180
[   21.134959]  ? kasan_atomics_helper+0x177f/0x5450
[   21.135021]  kasan_check_range+0x10c/0x1c0
[   21.135074]  __kasan_check_write+0x18/0x20
[   21.135121]  kasan_atomics_helper+0x177f/0x5450
[   21.135174]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   21.135216]  ? __kmalloc_cache_noprof+0x189/0x420
[   21.135252]  ? kasan_atomics+0x152/0x310
[   21.135332]  kasan_atomics+0x1dc/0x310
[   21.135372]  ? __pfx_kasan_atomics+0x10/0x10
[   21.135410]  ? __pfx_read_tsc+0x10/0x10
[   21.135444]  ? ktime_get_ts64+0x86/0x230
[   21.135483]  kunit_try_run_case+0x1a5/0x480
[   21.135520]  ? __pfx_kunit_try_run_case+0x10/0x10
[   21.135554]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   21.135590]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   21.135626]  ? __kthread_parkme+0x82/0x180
[   21.135661]  ? preempt_count_sub+0x50/0x80
[   21.135699]  ? __pfx_kunit_try_run_case+0x10/0x10
[   21.135735]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   21.135770]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   21.135806]  kthread+0x337/0x6f0
[   21.135838]  ? trace_preempt_on+0x20/0xc0
[   21.135876]  ? __pfx_kthread+0x10/0x10
[   21.135910]  ? _raw_spin_unlock_irq+0x47/0x80
[   21.135956]  ? calculate_sigpending+0x7b/0xa0
[   21.136003]  ? __pfx_kthread+0x10/0x10
[   21.136046]  ret_from_fork+0x116/0x1d0
[   21.136117]  ? __pfx_kthread+0x10/0x10
[   21.136155]  ret_from_fork_asm+0x1a/0x30
[   21.136213]  </TASK>
[   21.136241] 
[   21.148098] Allocated by task 282:
[   21.148562]  kasan_save_stack+0x45/0x70
[   21.149078]  kasan_save_track+0x18/0x40
[   21.149578]  kasan_save_alloc_info+0x3b/0x50
[   21.150154]  __kasan_kmalloc+0xb7/0xc0
[   21.150544]  __kmalloc_cache_noprof+0x189/0x420
[   21.151001]  kasan_atomics+0x95/0x310
[   21.151411]  kunit_try_run_case+0x1a5/0x480
[   21.151994]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   21.152626]  kthread+0x337/0x6f0
[   21.153048]  ret_from_fork+0x116/0x1d0
[   21.153283]  ret_from_fork_asm+0x1a/0x30
[   21.153799] 
[   21.153938] The buggy address belongs to the object at ffff888102b66500
[   21.153938]  which belongs to the cache kmalloc-64 of size 64
[   21.154696] The buggy address is located 0 bytes to the right of
[   21.154696]  allocated 48-byte region [ffff888102b66500, ffff888102b66530)
[   21.155496] 
[   21.155738] The buggy address belongs to the physical page:
[   21.156296] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b66
[   21.156487] flags: 0x200000000000000(node=0|zone=2)
[   21.156610] page_type: f5(slab)
[   21.156811] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   21.157890] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   21.158320] page dumped because: kasan: bad access detected
[   21.158690] 
[   21.158818] Memory state around the buggy address:
[   21.159202]  ffff888102b66400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.159603]  ffff888102b66480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.160067] >ffff888102b66500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   21.160621]                                      ^
[   21.160958]  ffff888102b66580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.161411]  ffff888102b66600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.161914] ==================================================================
[   20.436970] ==================================================================
[   20.437922] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a84/0x5450
[   20.438557] Read of size 4 at addr ffff888102b66530 by task kunit_try_catch/282
[   20.439070] 
[   20.439241] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250512 #1 PREEMPT(voluntary) 
[   20.439575] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.439604] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   20.439810] Call Trace:
[   20.439845]  <TASK>
[   20.439875]  dump_stack_lvl+0x73/0xb0
[   20.439923]  print_report+0xd1/0x650
[   20.439950]  ? __virt_addr_valid+0x1db/0x2d0
[   20.439987]  ? kasan_atomics_helper+0x4a84/0x5450
[   20.440025]  ? kasan_complete_mode_report_info+0x2a/0x200
[   20.440050]  ? kasan_atomics_helper+0x4a84/0x5450
[   20.440075]  kasan_report+0x141/0x180
[   20.440100]  ? kasan_atomics_helper+0x4a84/0x5450
[   20.440129]  __asan_report_load4_noabort+0x18/0x20
[   20.440152]  kasan_atomics_helper+0x4a84/0x5450
[   20.440178]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   20.440202]  ? __kmalloc_cache_noprof+0x189/0x420
[   20.440227]  ? kasan_atomics+0x152/0x310
[   20.440366]  kasan_atomics+0x1dc/0x310
[   20.440402]  ? __pfx_kasan_atomics+0x10/0x10
[   20.440431]  ? __pfx_read_tsc+0x10/0x10
[   20.440456]  ? ktime_get_ts64+0x86/0x230
[   20.440484]  kunit_try_run_case+0x1a5/0x480
[   20.440513]  ? __pfx_kunit_try_run_case+0x10/0x10
[   20.440537]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   20.440565]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   20.440590]  ? __kthread_parkme+0x82/0x180
[   20.440615]  ? preempt_count_sub+0x50/0x80
[   20.440641]  ? __pfx_kunit_try_run_case+0x10/0x10
[   20.440676]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   20.440734]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   20.440761]  kthread+0x337/0x6f0
[   20.440784]  ? trace_preempt_on+0x20/0xc0
[   20.440811]  ? __pfx_kthread+0x10/0x10
[   20.440834]  ? _raw_spin_unlock_irq+0x47/0x80
[   20.440857]  ? calculate_sigpending+0x7b/0xa0
[   20.440886]  ? __pfx_kthread+0x10/0x10
[   20.440910]  ret_from_fork+0x116/0x1d0
[   20.440930]  ? __pfx_kthread+0x10/0x10
[   20.440954]  ret_from_fork_asm+0x1a/0x30
[   20.440987]  </TASK>
[   20.441002] 
[   20.453643] Allocated by task 282:
[   20.453859]  kasan_save_stack+0x45/0x70
[   20.454293]  kasan_save_track+0x18/0x40
[   20.454816]  kasan_save_alloc_info+0x3b/0x50
[   20.455211]  __kasan_kmalloc+0xb7/0xc0
[   20.455428]  __kmalloc_cache_noprof+0x189/0x420
[   20.455643]  kasan_atomics+0x95/0x310
[   20.455918]  kunit_try_run_case+0x1a5/0x480
[   20.456340]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   20.456773]  kthread+0x337/0x6f0
[   20.457084]  ret_from_fork+0x116/0x1d0
[   20.457513]  ret_from_fork_asm+0x1a/0x30
[   20.457974] 
[   20.458104] The buggy address belongs to the object at ffff888102b66500
[   20.458104]  which belongs to the cache kmalloc-64 of size 64
[   20.458537] The buggy address is located 0 bytes to the right of
[   20.458537]  allocated 48-byte region [ffff888102b66500, ffff888102b66530)
[   20.458965] 
[   20.459154] The buggy address belongs to the physical page:
[   20.459838] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b66
[   20.460466] flags: 0x200000000000000(node=0|zone=2)
[   20.460886] page_type: f5(slab)
[   20.461333] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   20.462000] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   20.462598] page dumped because: kasan: bad access detected
[   20.463217] 
[   20.463357] Memory state around the buggy address:
[   20.463568]  ffff888102b66400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.463844]  ffff888102b66480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.464121] >ffff888102b66500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   20.464541]                                      ^
[   20.464933]  ffff888102b66580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.465487]  ffff888102b66600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.466065] ==================================================================
[   21.751761] ==================================================================
[   21.753456] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x224c/0x5450
[   21.753943] Write of size 8 at addr ffff888102b66530 by task kunit_try_catch/282
[   21.754339] 
[   21.754570] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250512 #1 PREEMPT(voluntary) 
[   21.754680] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.754709] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   21.754758] Call Trace:
[   21.754802]  <TASK>
[   21.754845]  dump_stack_lvl+0x73/0xb0
[   21.754911]  print_report+0xd1/0x650
[   21.754957]  ? __virt_addr_valid+0x1db/0x2d0
[   21.755012]  ? kasan_atomics_helper+0x224c/0x5450
[   21.755056]  ? kasan_complete_mode_report_info+0x2a/0x200
[   21.755103]  ? kasan_atomics_helper+0x224c/0x5450
[   21.755150]  kasan_report+0x141/0x180
[   21.755202]  ? kasan_atomics_helper+0x224c/0x5450
[   21.755274]  kasan_check_range+0x10c/0x1c0
[   21.755333]  __kasan_check_write+0x18/0x20
[   21.755382]  kasan_atomics_helper+0x224c/0x5450
[   21.755436]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   21.755488]  ? __kmalloc_cache_noprof+0x189/0x420
[   21.755540]  ? kasan_atomics+0x152/0x310
[   21.755589]  kasan_atomics+0x1dc/0x310
[   21.755617]  ? __pfx_kasan_atomics+0x10/0x10
[   21.755646]  ? __pfx_read_tsc+0x10/0x10
[   21.755686]  ? ktime_get_ts64+0x86/0x230
[   21.755742]  kunit_try_run_case+0x1a5/0x480
[   21.755772]  ? __pfx_kunit_try_run_case+0x10/0x10
[   21.755798]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   21.755825]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   21.755851]  ? __kthread_parkme+0x82/0x180
[   21.755876]  ? preempt_count_sub+0x50/0x80
[   21.755904]  ? __pfx_kunit_try_run_case+0x10/0x10
[   21.755932]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   21.755958]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   21.755986]  kthread+0x337/0x6f0
[   21.756009]  ? trace_preempt_on+0x20/0xc0
[   21.756036]  ? __pfx_kthread+0x10/0x10
[   21.756060]  ? _raw_spin_unlock_irq+0x47/0x80
[   21.756084]  ? calculate_sigpending+0x7b/0xa0
[   21.756112]  ? __pfx_kthread+0x10/0x10
[   21.756137]  ret_from_fork+0x116/0x1d0
[   21.756159]  ? __pfx_kthread+0x10/0x10
[   21.756182]  ret_from_fork_asm+0x1a/0x30
[   21.756216]  </TASK>
[   21.756231] 
[   21.766629] Allocated by task 282:
[   21.766985]  kasan_save_stack+0x45/0x70
[   21.767216]  kasan_save_track+0x18/0x40
[   21.767430]  kasan_save_alloc_info+0x3b/0x50
[   21.767638]  __kasan_kmalloc+0xb7/0xc0
[   21.767964]  __kmalloc_cache_noprof+0x189/0x420
[   21.768466]  kasan_atomics+0x95/0x310
[   21.768813]  kunit_try_run_case+0x1a5/0x480
[   21.769176]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   21.769557]  kthread+0x337/0x6f0
[   21.769864]  ret_from_fork+0x116/0x1d0
[   21.770080]  ret_from_fork_asm+0x1a/0x30
[   21.770352] 
[   21.770465] The buggy address belongs to the object at ffff888102b66500
[   21.770465]  which belongs to the cache kmalloc-64 of size 64
[   21.771268] The buggy address is located 0 bytes to the right of
[   21.771268]  allocated 48-byte region [ffff888102b66500, ffff888102b66530)
[   21.772287] 
[   21.772423] The buggy address belongs to the physical page:
[   21.772647] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b66
[   21.772956] flags: 0x200000000000000(node=0|zone=2)
[   21.773224] page_type: f5(slab)
[   21.773541] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   21.774311] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   21.774738] page dumped because: kasan: bad access detected
[   21.775074] 
[   21.775241] Memory state around the buggy address:
[   21.775492]  ffff888102b66400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.776179]  ffff888102b66480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.776535] >ffff888102b66500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   21.777002]                                      ^
[   21.777226]  ffff888102b66580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.777507]  ffff888102b66600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.777775] ==================================================================
[   21.013761] ==================================================================
[   21.014204] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x151d/0x5450
[   21.014681] Write of size 8 at addr ffff888102b66530 by task kunit_try_catch/282
[   21.015020] 
[   21.015248] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250512 #1 PREEMPT(voluntary) 
[   21.015398] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.015429] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   21.015477] Call Trace:
[   21.015520]  <TASK>
[   21.015579]  dump_stack_lvl+0x73/0xb0
[   21.015648]  print_report+0xd1/0x650
[   21.015698]  ? __virt_addr_valid+0x1db/0x2d0
[   21.015764]  ? kasan_atomics_helper+0x151d/0x5450
[   21.015824]  ? kasan_complete_mode_report_info+0x2a/0x200
[   21.015898]  ? kasan_atomics_helper+0x151d/0x5450
[   21.015941]  kasan_report+0x141/0x180
[   21.015990]  ? kasan_atomics_helper+0x151d/0x5450
[   21.016051]  kasan_check_range+0x10c/0x1c0
[   21.016106]  __kasan_check_write+0x18/0x20
[   21.016154]  kasan_atomics_helper+0x151d/0x5450
[   21.016210]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   21.016274]  ? __kmalloc_cache_noprof+0x189/0x420
[   21.016327]  ? kasan_atomics+0x152/0x310
[   21.016387]  kasan_atomics+0x1dc/0x310
[   21.016431]  ? __pfx_kasan_atomics+0x10/0x10
[   21.016465]  ? __pfx_read_tsc+0x10/0x10
[   21.016491]  ? ktime_get_ts64+0x86/0x230
[   21.016518]  kunit_try_run_case+0x1a5/0x480
[   21.016547]  ? __pfx_kunit_try_run_case+0x10/0x10
[   21.016573]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   21.016599]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   21.016624]  ? __kthread_parkme+0x82/0x180
[   21.016648]  ? preempt_count_sub+0x50/0x80
[   21.016688]  ? __pfx_kunit_try_run_case+0x10/0x10
[   21.016723]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   21.016749]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   21.016775]  kthread+0x337/0x6f0
[   21.016797]  ? trace_preempt_on+0x20/0xc0
[   21.016823]  ? __pfx_kthread+0x10/0x10
[   21.016846]  ? _raw_spin_unlock_irq+0x47/0x80
[   21.016869]  ? calculate_sigpending+0x7b/0xa0
[   21.016899]  ? __pfx_kthread+0x10/0x10
[   21.016923]  ret_from_fork+0x116/0x1d0
[   21.016944]  ? __pfx_kthread+0x10/0x10
[   21.016966]  ret_from_fork_asm+0x1a/0x30
[   21.016998]  </TASK>
[   21.017013] 
[   21.027850] Allocated by task 282:
[   21.028071]  kasan_save_stack+0x45/0x70
[   21.028312]  kasan_save_track+0x18/0x40
[   21.028508]  kasan_save_alloc_info+0x3b/0x50
[   21.028712]  __kasan_kmalloc+0xb7/0xc0
[   21.029088]  __kmalloc_cache_noprof+0x189/0x420
[   21.029487]  kasan_atomics+0x95/0x310
[   21.029862]  kunit_try_run_case+0x1a5/0x480
[   21.030223]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   21.030511]  kthread+0x337/0x6f0
[   21.030906]  ret_from_fork+0x116/0x1d0
[   21.031147]  ret_from_fork_asm+0x1a/0x30
[   21.031496] 
[   21.031749] The buggy address belongs to the object at ffff888102b66500
[   21.031749]  which belongs to the cache kmalloc-64 of size 64
[   21.032270] The buggy address is located 0 bytes to the right of
[   21.032270]  allocated 48-byte region [ffff888102b66500, ffff888102b66530)
[   21.032982] 
[   21.033183] The buggy address belongs to the physical page:
[   21.033703] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b66
[   21.034370] flags: 0x200000000000000(node=0|zone=2)
[   21.034868] page_type: f5(slab)
[   21.035160] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   21.035471] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   21.035836] page dumped because: kasan: bad access detected
[   21.036297] 
[   21.036500] Memory state around the buggy address:
[   21.036936]  ffff888102b66400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.037555]  ffff888102b66480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.038114] >ffff888102b66500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   21.038604]                                      ^
[   21.038858]  ffff888102b66580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.039142]  ffff888102b66600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.039735] ==================================================================
[   20.497902] ==================================================================
[   20.498319] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xde0/0x5450
[   20.498902] Write of size 4 at addr ffff888102b66530 by task kunit_try_catch/282
[   20.499280] 
[   20.499447] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250512 #1 PREEMPT(voluntary) 
[   20.499549] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.499580] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   20.499630] Call Trace:
[   20.499674]  <TASK>
[   20.499714]  dump_stack_lvl+0x73/0xb0
[   20.499777]  print_report+0xd1/0x650
[   20.499875]  ? __virt_addr_valid+0x1db/0x2d0
[   20.499920]  ? kasan_atomics_helper+0xde0/0x5450
[   20.499953]  ? kasan_complete_mode_report_info+0x2a/0x200
[   20.499986]  ? kasan_atomics_helper+0xde0/0x5450
[   20.500020]  kasan_report+0x141/0x180
[   20.500054]  ? kasan_atomics_helper+0xde0/0x5450
[   20.500091]  kasan_check_range+0x10c/0x1c0
[   20.500128]  __kasan_check_write+0x18/0x20
[   20.500158]  kasan_atomics_helper+0xde0/0x5450
[   20.500193]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   20.500227]  ? __kmalloc_cache_noprof+0x189/0x420
[   20.500278]  ? kasan_atomics+0x152/0x310
[   20.500334]  kasan_atomics+0x1dc/0x310
[   20.500385]  ? __pfx_kasan_atomics+0x10/0x10
[   20.500439]  ? __pfx_read_tsc+0x10/0x10
[   20.500481]  ? ktime_get_ts64+0x86/0x230
[   20.500535]  kunit_try_run_case+0x1a5/0x480
[   20.500611]  ? __pfx_kunit_try_run_case+0x10/0x10
[   20.500660]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   20.500735]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   20.500805]  ? __kthread_parkme+0x82/0x180
[   20.500855]  ? preempt_count_sub+0x50/0x80
[   20.500904]  ? __pfx_kunit_try_run_case+0x10/0x10
[   20.500954]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   20.501011]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   20.501064]  kthread+0x337/0x6f0
[   20.501110]  ? trace_preempt_on+0x20/0xc0
[   20.501181]  ? __pfx_kthread+0x10/0x10
[   20.501228]  ? _raw_spin_unlock_irq+0x47/0x80
[   20.501286]  ? calculate_sigpending+0x7b/0xa0
[   20.501336]  ? __pfx_kthread+0x10/0x10
[   20.501375]  ret_from_fork+0x116/0x1d0
[   20.501414]  ? __pfx_kthread+0x10/0x10
[   20.501460]  ret_from_fork_asm+0x1a/0x30
[   20.501546]  </TASK>
[   20.501575] 
[   20.512825] Allocated by task 282:
[   20.513181]  kasan_save_stack+0x45/0x70
[   20.513572]  kasan_save_track+0x18/0x40
[   20.514027]  kasan_save_alloc_info+0x3b/0x50
[   20.514330]  __kasan_kmalloc+0xb7/0xc0
[   20.514616]  __kmalloc_cache_noprof+0x189/0x420
[   20.514999]  kasan_atomics+0x95/0x310
[   20.515286]  kunit_try_run_case+0x1a5/0x480
[   20.515548]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   20.516141]  kthread+0x337/0x6f0
[   20.516395]  ret_from_fork+0x116/0x1d0
[   20.516709]  ret_from_fork_asm+0x1a/0x30
[   20.517077] 
[   20.517253] The buggy address belongs to the object at ffff888102b66500
[   20.517253]  which belongs to the cache kmalloc-64 of size 64
[   20.517706] The buggy address is located 0 bytes to the right of
[   20.517706]  allocated 48-byte region [ffff888102b66500, ffff888102b66530)
[   20.518208] 
[   20.518437] The buggy address belongs to the physical page:
[   20.518935] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b66
[   20.519588] flags: 0x200000000000000(node=0|zone=2)
[   20.520031] page_type: f5(slab)
[   20.520361] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   20.520984] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   20.521350] page dumped because: kasan: bad access detected
[   20.521718] 
[   20.521894] Memory state around the buggy address:
[   20.522241]  ffff888102b66400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.522634]  ffff888102b66480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.523184] >ffff888102b66500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   20.523599]                                      ^
[   20.524170]  ffff888102b66580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.524485]  ffff888102b66600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.525173] ==================================================================
[   20.745433] ==================================================================
[   20.745743] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a02/0x5450
[   20.746007] Read of size 4 at addr ffff888102b66530 by task kunit_try_catch/282
[   20.746255] 
[   20.746920] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250512 #1 PREEMPT(voluntary) 
[   20.747046] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.747076] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   20.747127] Call Trace:
[   20.747170]  <TASK>
[   20.747213]  dump_stack_lvl+0x73/0xb0
[   20.747295]  print_report+0xd1/0x650
[   20.747351]  ? __virt_addr_valid+0x1db/0x2d0
[   20.747404]  ? kasan_atomics_helper+0x4a02/0x5450
[   20.747455]  ? kasan_complete_mode_report_info+0x2a/0x200
[   20.747508]  ? kasan_atomics_helper+0x4a02/0x5450
[   20.747561]  kasan_report+0x141/0x180
[   20.747612]  ? kasan_atomics_helper+0x4a02/0x5450
[   20.747669]  __asan_report_load4_noabort+0x18/0x20
[   20.747717]  kasan_atomics_helper+0x4a02/0x5450
[   20.747770]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   20.747823]  ? __kmalloc_cache_noprof+0x189/0x420
[   20.747874]  ? kasan_atomics+0x152/0x310
[   20.747936]  kasan_atomics+0x1dc/0x310
[   20.747989]  ? __pfx_kasan_atomics+0x10/0x10
[   20.748045]  ? __pfx_read_tsc+0x10/0x10
[   20.748092]  ? ktime_get_ts64+0x86/0x230
[   20.748146]  kunit_try_run_case+0x1a5/0x480
[   20.748202]  ? __pfx_kunit_try_run_case+0x10/0x10
[   20.748251]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   20.748305]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   20.748347]  ? __kthread_parkme+0x82/0x180
[   20.748384]  ? preempt_count_sub+0x50/0x80
[   20.748423]  ? __pfx_kunit_try_run_case+0x10/0x10
[   20.748469]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   20.748514]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   20.748559]  kthread+0x337/0x6f0
[   20.748597]  ? trace_preempt_on+0x20/0xc0
[   20.748643]  ? __pfx_kthread+0x10/0x10
[   20.748684]  ? _raw_spin_unlock_irq+0x47/0x80
[   20.748724]  ? calculate_sigpending+0x7b/0xa0
[   20.748770]  ? __pfx_kthread+0x10/0x10
[   20.748814]  ret_from_fork+0x116/0x1d0
[   20.748855]  ? __pfx_kthread+0x10/0x10
[   20.748900]  ret_from_fork_asm+0x1a/0x30
[   20.748958]  </TASK>
[   20.748986] 
[   20.763843] Allocated by task 282:
[   20.764267]  kasan_save_stack+0x45/0x70
[   20.764630]  kasan_save_track+0x18/0x40
[   20.764832]  kasan_save_alloc_info+0x3b/0x50
[   20.765194]  __kasan_kmalloc+0xb7/0xc0
[   20.765528]  __kmalloc_cache_noprof+0x189/0x420
[   20.765924]  kasan_atomics+0x95/0x310
[   20.766549]  kunit_try_run_case+0x1a5/0x480
[   20.766826]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   20.767269]  kthread+0x337/0x6f0
[   20.767588]  ret_from_fork+0x116/0x1d0
[   20.767918]  ret_from_fork_asm+0x1a/0x30
[   20.768114] 
[   20.768343] The buggy address belongs to the object at ffff888102b66500
[   20.768343]  which belongs to the cache kmalloc-64 of size 64
[   20.769120] The buggy address is located 0 bytes to the right of
[   20.769120]  allocated 48-byte region [ffff888102b66500, ffff888102b66530)
[   20.769798] 
[   20.769987] The buggy address belongs to the physical page:
[   20.770368] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b66
[   20.770880] flags: 0x200000000000000(node=0|zone=2)
[   20.771159] page_type: f5(slab)
[   20.771419] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   20.771754] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   20.772033] page dumped because: kasan: bad access detected
[   20.772384] 
[   20.772498] Memory state around the buggy address:
[   20.772930]  ffff888102b66400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.773452]  ffff888102b66480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.773923] >ffff888102b66500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   20.774289]                                      ^
[   20.774586]  ffff888102b66580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.775011]  ffff888102b66600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.775415] ==================================================================
[   19.738949] ==================================================================
[   19.739949] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4bbc/0x5450
[   19.740752] Read of size 4 at addr ffff888102b66530 by task kunit_try_catch/282
[   19.741571] 
[   19.741840] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250512 #1 PREEMPT(voluntary) 
[   19.741968] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.741998] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   19.742041] Call Trace:
[   19.742069]  <TASK>
[   19.742115]  dump_stack_lvl+0x73/0xb0
[   19.742186]  print_report+0xd1/0x650
[   19.742239]  ? __virt_addr_valid+0x1db/0x2d0
[   19.742342]  ? kasan_atomics_helper+0x4bbc/0x5450
[   19.742381]  ? kasan_complete_mode_report_info+0x2a/0x200
[   19.742417]  ? kasan_atomics_helper+0x4bbc/0x5450
[   19.742453]  kasan_report+0x141/0x180
[   19.742490]  ? kasan_atomics_helper+0x4bbc/0x5450
[   19.742533]  __asan_report_load4_noabort+0x18/0x20
[   19.742566]  kasan_atomics_helper+0x4bbc/0x5450
[   19.742603]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   19.742639]  ? __kmalloc_cache_noprof+0x189/0x420
[   19.742674]  ? kasan_atomics+0x152/0x310
[   19.742759]  kasan_atomics+0x1dc/0x310
[   19.742787]  ? __pfx_kasan_atomics+0x10/0x10
[   19.742815]  ? __pfx_read_tsc+0x10/0x10
[   19.742838]  ? ktime_get_ts64+0x86/0x230
[   19.742865]  kunit_try_run_case+0x1a5/0x480
[   19.742893]  ? __pfx_kunit_try_run_case+0x10/0x10
[   19.742916]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   19.742942]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   19.742966]  ? __kthread_parkme+0x82/0x180
[   19.742997]  ? preempt_count_sub+0x50/0x80
[   19.743029]  ? __pfx_kunit_try_run_case+0x10/0x10
[   19.743209]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   19.743238]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   19.743284]  kthread+0x337/0x6f0
[   19.743309]  ? trace_preempt_on+0x20/0xc0
[   19.743337]  ? __pfx_kthread+0x10/0x10
[   19.743360]  ? _raw_spin_unlock_irq+0x47/0x80
[   19.743383]  ? calculate_sigpending+0x7b/0xa0
[   19.743410]  ? __pfx_kthread+0x10/0x10
[   19.743433]  ret_from_fork+0x116/0x1d0
[   19.743453]  ? __pfx_kthread+0x10/0x10
[   19.743476]  ret_from_fork_asm+0x1a/0x30
[   19.743508]  </TASK>
[   19.743522] 
[   19.756238] Allocated by task 282:
[   19.756730]  kasan_save_stack+0x45/0x70
[   19.757217]  kasan_save_track+0x18/0x40
[   19.757756]  kasan_save_alloc_info+0x3b/0x50
[   19.758422]  __kasan_kmalloc+0xb7/0xc0
[   19.758800]  __kmalloc_cache_noprof+0x189/0x420
[   19.759775]  kasan_atomics+0x95/0x310
[   19.760022]  kunit_try_run_case+0x1a5/0x480
[   19.760541]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   19.761437]  kthread+0x337/0x6f0
[   19.762213]  ret_from_fork+0x116/0x1d0
[   19.762426]  ret_from_fork_asm+0x1a/0x30
[   19.763081] 
[   19.763518] The buggy address belongs to the object at ffff888102b66500
[   19.763518]  which belongs to the cache kmalloc-64 of size 64
[   19.764747] The buggy address is located 0 bytes to the right of
[   19.764747]  allocated 48-byte region [ffff888102b66500, ffff888102b66530)
[   19.765668] 
[   19.766132] The buggy address belongs to the physical page:
[   19.766855] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b66
[   19.767404] flags: 0x200000000000000(node=0|zone=2)
[   19.768085] page_type: f5(slab)
[   19.768401] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   19.768998] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.769853] page dumped because: kasan: bad access detected
[   19.770490] 
[   19.770808] Memory state around the buggy address:
[   19.771094]  ffff888102b66400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.771822]  ffff888102b66480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.772253] >ffff888102b66500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.772654]                                      ^
[   19.772893]  ffff888102b66580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.773588]  ffff888102b66600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.774610] ==================================================================
[   20.627963] ==================================================================
[   20.629059] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a36/0x5450
[   20.629497] Read of size 4 at addr ffff888102b66530 by task kunit_try_catch/282
[   20.630087] 
[   20.630287] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250512 #1 PREEMPT(voluntary) 
[   20.630447] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.630480] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   20.630539] Call Trace:
[   20.630585]  <TASK>
[   20.630631]  dump_stack_lvl+0x73/0xb0
[   20.630843]  print_report+0xd1/0x650
[   20.630920]  ? __virt_addr_valid+0x1db/0x2d0
[   20.630975]  ? kasan_atomics_helper+0x4a36/0x5450
[   20.631013]  ? kasan_complete_mode_report_info+0x2a/0x200
[   20.631040]  ? kasan_atomics_helper+0x4a36/0x5450
[   20.631066]  kasan_report+0x141/0x180
[   20.631092]  ? kasan_atomics_helper+0x4a36/0x5450
[   20.631121]  __asan_report_load4_noabort+0x18/0x20
[   20.631145]  kasan_atomics_helper+0x4a36/0x5450
[   20.631170]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   20.631196]  ? __kmalloc_cache_noprof+0x189/0x420
[   20.631221]  ? kasan_atomics+0x152/0x310
[   20.631250]  kasan_atomics+0x1dc/0x310
[   20.631313]  ? __pfx_kasan_atomics+0x10/0x10
[   20.631360]  ? __pfx_read_tsc+0x10/0x10
[   20.631404]  ? ktime_get_ts64+0x86/0x230
[   20.631451]  kunit_try_run_case+0x1a5/0x480
[   20.631515]  ? __pfx_kunit_try_run_case+0x10/0x10
[   20.631622]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   20.631672]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   20.631718]  ? __kthread_parkme+0x82/0x180
[   20.631762]  ? preempt_count_sub+0x50/0x80
[   20.631819]  ? __pfx_kunit_try_run_case+0x10/0x10
[   20.631871]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   20.631937]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   20.631986]  kthread+0x337/0x6f0
[   20.632023]  ? trace_preempt_on+0x20/0xc0
[   20.632055]  ? __pfx_kthread+0x10/0x10
[   20.632079]  ? _raw_spin_unlock_irq+0x47/0x80
[   20.632103]  ? calculate_sigpending+0x7b/0xa0
[   20.632131]  ? __pfx_kthread+0x10/0x10
[   20.632155]  ret_from_fork+0x116/0x1d0
[   20.632177]  ? __pfx_kthread+0x10/0x10
[   20.632200]  ret_from_fork_asm+0x1a/0x30
[   20.632234]  </TASK>
[   20.632249] 
[   20.644857] Allocated by task 282:
[   20.645190]  kasan_save_stack+0x45/0x70
[   20.645565]  kasan_save_track+0x18/0x40
[   20.645910]  kasan_save_alloc_info+0x3b/0x50
[   20.646277]  __kasan_kmalloc+0xb7/0xc0
[   20.646480]  __kmalloc_cache_noprof+0x189/0x420
[   20.646734]  kasan_atomics+0x95/0x310
[   20.646921]  kunit_try_run_case+0x1a5/0x480
[   20.647138]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   20.647616]  kthread+0x337/0x6f0
[   20.648048]  ret_from_fork+0x116/0x1d0
[   20.648434]  ret_from_fork_asm+0x1a/0x30
[   20.648864] 
[   20.649056] The buggy address belongs to the object at ffff888102b66500
[   20.649056]  which belongs to the cache kmalloc-64 of size 64
[   20.649850] The buggy address is located 0 bytes to the right of
[   20.649850]  allocated 48-byte region [ffff888102b66500, ffff888102b66530)
[   20.650579] 
[   20.650824] The buggy address belongs to the physical page:
[   20.651285] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b66
[   20.651894] flags: 0x200000000000000(node=0|zone=2)
[   20.652138] page_type: f5(slab)
[   20.652501] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   20.653141] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   20.653779] page dumped because: kasan: bad access detected
[   20.654189] 
[   20.654391] Memory state around the buggy address:
[   20.654751]  ffff888102b66400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.655302]  ffff888102b66480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.655834] >ffff888102b66500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   20.656285]                                      ^
[   20.656685]  ffff888102b66580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.657141]  ffff888102b66600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.657598] ==================================================================
[   21.313225] ==================================================================
[   21.313606] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1b22/0x5450
[   21.314190] Write of size 8 at addr ffff888102b66530 by task kunit_try_catch/282
[   21.314513] 
[   21.314719] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250512 #1 PREEMPT(voluntary) 
[   21.314827] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.314857] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   21.314906] Call Trace:
[   21.314947]  <TASK>
[   21.314983]  dump_stack_lvl+0x73/0xb0
[   21.315055]  print_report+0xd1/0x650
[   21.315103]  ? __virt_addr_valid+0x1db/0x2d0
[   21.315150]  ? kasan_atomics_helper+0x1b22/0x5450
[   21.315191]  ? kasan_complete_mode_report_info+0x2a/0x200
[   21.315234]  ? kasan_atomics_helper+0x1b22/0x5450
[   21.315293]  kasan_report+0x141/0x180
[   21.315343]  ? kasan_atomics_helper+0x1b22/0x5450
[   21.315391]  kasan_check_range+0x10c/0x1c0
[   21.315437]  __kasan_check_write+0x18/0x20
[   21.315476]  kasan_atomics_helper+0x1b22/0x5450
[   21.315519]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   21.315568]  ? __kmalloc_cache_noprof+0x189/0x420
[   21.315616]  ? kasan_atomics+0x152/0x310
[   21.315673]  kasan_atomics+0x1dc/0x310
[   21.315724]  ? __pfx_kasan_atomics+0x10/0x10
[   21.315780]  ? __pfx_read_tsc+0x10/0x10
[   21.315828]  ? ktime_get_ts64+0x86/0x230
[   21.315880]  kunit_try_run_case+0x1a5/0x480
[   21.315930]  ? __pfx_kunit_try_run_case+0x10/0x10
[   21.315979]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   21.316032]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   21.316101]  ? __kthread_parkme+0x82/0x180
[   21.316145]  ? preempt_count_sub+0x50/0x80
[   21.316198]  ? __pfx_kunit_try_run_case+0x10/0x10
[   21.316241]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   21.316305]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   21.316359]  kthread+0x337/0x6f0
[   21.316404]  ? trace_preempt_on+0x20/0xc0
[   21.316459]  ? __pfx_kthread+0x10/0x10
[   21.316507]  ? _raw_spin_unlock_irq+0x47/0x80
[   21.316557]  ? calculate_sigpending+0x7b/0xa0
[   21.316613]  ? __pfx_kthread+0x10/0x10
[   21.316655]  ret_from_fork+0x116/0x1d0
[   21.316714]  ? __pfx_kthread+0x10/0x10
[   21.316758]  ret_from_fork_asm+0x1a/0x30
[   21.316820]  </TASK>
[   21.316847] 
[   21.327233] Allocated by task 282:
[   21.327634]  kasan_save_stack+0x45/0x70
[   21.328049]  kasan_save_track+0x18/0x40
[   21.328408]  kasan_save_alloc_info+0x3b/0x50
[   21.328643]  __kasan_kmalloc+0xb7/0xc0
[   21.328897]  __kmalloc_cache_noprof+0x189/0x420
[   21.329115]  kasan_atomics+0x95/0x310
[   21.329321]  kunit_try_run_case+0x1a5/0x480
[   21.329682]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   21.330143]  kthread+0x337/0x6f0
[   21.330450]  ret_from_fork+0x116/0x1d0
[   21.330794]  ret_from_fork_asm+0x1a/0x30
[   21.331148] 
[   21.331329] The buggy address belongs to the object at ffff888102b66500
[   21.331329]  which belongs to the cache kmalloc-64 of size 64
[   21.332312] The buggy address is located 0 bytes to the right of
[   21.332312]  allocated 48-byte region [ffff888102b66500, ffff888102b66530)
[   21.335343] 
[   21.335557] The buggy address belongs to the physical page:
[   21.336152] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b66
[   21.336478] flags: 0x200000000000000(node=0|zone=2)
[   21.337299] page_type: f5(slab)
[   21.337660] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   21.338434] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   21.339151] page dumped because: kasan: bad access detected
[   21.339570] 
[   21.339759] Memory state around the buggy address:
[   21.340076]  ffff888102b66400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.340433]  ffff888102b66480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.340848] >ffff888102b66500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   21.341276]                                      ^
[   21.341687]  ffff888102b66580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.342046]  ffff888102b66600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.342570] ==================================================================
[   20.919600] ==================================================================
[   20.920362] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4eae/0x5450
[   20.920799] Read of size 8 at addr ffff888102b66530 by task kunit_try_catch/282
[   20.921155] 
[   20.921373] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250512 #1 PREEMPT(voluntary) 
[   20.921482] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.921512] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   20.921559] Call Trace:
[   20.921602]  <TASK>
[   20.921641]  dump_stack_lvl+0x73/0xb0
[   20.921741]  print_report+0xd1/0x650
[   20.921788]  ? __virt_addr_valid+0x1db/0x2d0
[   20.921836]  ? kasan_atomics_helper+0x4eae/0x5450
[   20.921879]  ? kasan_complete_mode_report_info+0x2a/0x200
[   20.921930]  ? kasan_atomics_helper+0x4eae/0x5450
[   20.921976]  kasan_report+0x141/0x180
[   20.922018]  ? kasan_atomics_helper+0x4eae/0x5450
[   20.922064]  __asan_report_load8_noabort+0x18/0x20
[   20.922103]  kasan_atomics_helper+0x4eae/0x5450
[   20.922148]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   20.922197]  ? __kmalloc_cache_noprof+0x189/0x420
[   20.922245]  ? kasan_atomics+0x152/0x310
[   20.922316]  kasan_atomics+0x1dc/0x310
[   20.922370]  ? __pfx_kasan_atomics+0x10/0x10
[   20.922424]  ? __pfx_read_tsc+0x10/0x10
[   20.922469]  ? ktime_get_ts64+0x86/0x230
[   20.922506]  kunit_try_run_case+0x1a5/0x480
[   20.922534]  ? __pfx_kunit_try_run_case+0x10/0x10
[   20.922561]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   20.922587]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   20.922612]  ? __kthread_parkme+0x82/0x180
[   20.922636]  ? preempt_count_sub+0x50/0x80
[   20.922686]  ? __pfx_kunit_try_run_case+0x10/0x10
[   20.922737]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   20.922764]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   20.922791]  kthread+0x337/0x6f0
[   20.922813]  ? trace_preempt_on+0x20/0xc0
[   20.922843]  ? __pfx_kthread+0x10/0x10
[   20.922865]  ? _raw_spin_unlock_irq+0x47/0x80
[   20.922889]  ? calculate_sigpending+0x7b/0xa0
[   20.922917]  ? __pfx_kthread+0x10/0x10
[   20.922941]  ret_from_fork+0x116/0x1d0
[   20.922961]  ? __pfx_kthread+0x10/0x10
[   20.922985]  ret_from_fork_asm+0x1a/0x30
[   20.923031]  </TASK>
[   20.923045] 
[   20.932700] Allocated by task 282:
[   20.933015]  kasan_save_stack+0x45/0x70
[   20.933533]  kasan_save_track+0x18/0x40
[   20.933947]  kasan_save_alloc_info+0x3b/0x50
[   20.934196]  __kasan_kmalloc+0xb7/0xc0
[   20.934392]  __kmalloc_cache_noprof+0x189/0x420
[   20.934770]  kasan_atomics+0x95/0x310
[   20.935097]  kunit_try_run_case+0x1a5/0x480
[   20.935310]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   20.935661]  kthread+0x337/0x6f0
[   20.935941]  ret_from_fork+0x116/0x1d0
[   20.936141]  ret_from_fork_asm+0x1a/0x30
[   20.936442] 
[   20.936567] The buggy address belongs to the object at ffff888102b66500
[   20.936567]  which belongs to the cache kmalloc-64 of size 64
[   20.937021] The buggy address is located 0 bytes to the right of
[   20.937021]  allocated 48-byte region [ffff888102b66500, ffff888102b66530)
[   20.938057] 
[   20.938251] The buggy address belongs to the physical page:
[   20.938525] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b66
[   20.939280] flags: 0x200000000000000(node=0|zone=2)
[   20.939517] page_type: f5(slab)
[   20.939707] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   20.940493] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   20.941005] page dumped because: kasan: bad access detected
[   20.941230] 
[   20.941363] Memory state around the buggy address:
[   20.941580]  ffff888102b66400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.941851]  ffff888102b66480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.942120] >ffff888102b66500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   20.942534]                                      ^
[   20.942925]  ffff888102b66580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.943719]  ffff888102b66600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.944252] ==================================================================
[   21.688805] ==================================================================
[   21.689889] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x218a/0x5450
[   21.690498] Write of size 8 at addr ffff888102b66530 by task kunit_try_catch/282
[   21.690925] 
[   21.691102] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250512 #1 PREEMPT(voluntary) 
[   21.691215] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.691246] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   21.691302] Call Trace:
[   21.691344]  <TASK>
[   21.691384]  dump_stack_lvl+0x73/0xb0
[   21.691475]  print_report+0xd1/0x650
[   21.691536]  ? __virt_addr_valid+0x1db/0x2d0
[   21.691585]  ? kasan_atomics_helper+0x218a/0x5450
[   21.691635]  ? kasan_complete_mode_report_info+0x2a/0x200
[   21.691732]  ? kasan_atomics_helper+0x218a/0x5450
[   21.691777]  kasan_report+0x141/0x180
[   21.691822]  ? kasan_atomics_helper+0x218a/0x5450
[   21.691875]  kasan_check_range+0x10c/0x1c0
[   21.691925]  __kasan_check_write+0x18/0x20
[   21.691972]  kasan_atomics_helper+0x218a/0x5450
[   21.692026]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   21.692077]  ? __kmalloc_cache_noprof+0x189/0x420
[   21.692116]  ? kasan_atomics+0x152/0x310
[   21.692172]  kasan_atomics+0x1dc/0x310
[   21.692214]  ? __pfx_kasan_atomics+0x10/0x10
[   21.692254]  ? __pfx_read_tsc+0x10/0x10
[   21.692306]  ? ktime_get_ts64+0x86/0x230
[   21.692335]  kunit_try_run_case+0x1a5/0x480
[   21.692365]  ? __pfx_kunit_try_run_case+0x10/0x10
[   21.692391]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   21.692418]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   21.692444]  ? __kthread_parkme+0x82/0x180
[   21.692468]  ? preempt_count_sub+0x50/0x80
[   21.692495]  ? __pfx_kunit_try_run_case+0x10/0x10
[   21.692522]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   21.692548]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   21.692574]  kthread+0x337/0x6f0
[   21.692597]  ? trace_preempt_on+0x20/0xc0
[   21.692623]  ? __pfx_kthread+0x10/0x10
[   21.692647]  ? _raw_spin_unlock_irq+0x47/0x80
[   21.692724]  ? calculate_sigpending+0x7b/0xa0
[   21.692773]  ? __pfx_kthread+0x10/0x10
[   21.692818]  ret_from_fork+0x116/0x1d0
[   21.692860]  ? __pfx_kthread+0x10/0x10
[   21.692907]  ret_from_fork_asm+0x1a/0x30
[   21.692945]  </TASK>
[   21.692960] 
[   21.706431] Allocated by task 282:
[   21.707172]  kasan_save_stack+0x45/0x70
[   21.707673]  kasan_save_track+0x18/0x40
[   21.708128]  kasan_save_alloc_info+0x3b/0x50
[   21.708535]  __kasan_kmalloc+0xb7/0xc0
[   21.709073]  __kmalloc_cache_noprof+0x189/0x420
[   21.709324]  kasan_atomics+0x95/0x310
[   21.709556]  kunit_try_run_case+0x1a5/0x480
[   21.710184]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   21.710660]  kthread+0x337/0x6f0
[   21.711124]  ret_from_fork+0x116/0x1d0
[   21.711322]  ret_from_fork_asm+0x1a/0x30
[   21.711555] 
[   21.712092] The buggy address belongs to the object at ffff888102b66500
[   21.712092]  which belongs to the cache kmalloc-64 of size 64
[   21.712788] The buggy address is located 0 bytes to the right of
[   21.712788]  allocated 48-byte region [ffff888102b66500, ffff888102b66530)
[   21.713432] 
[   21.713634] The buggy address belongs to the physical page:
[   21.714124] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b66
[   21.714982] flags: 0x200000000000000(node=0|zone=2)
[   21.715351] page_type: f5(slab)
[   21.715566] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   21.716379] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   21.716961] page dumped because: kasan: bad access detected
[   21.717174] 
[   21.717354] Memory state around the buggy address:
[   21.717727]  ffff888102b66400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.718181]  ffff888102b66480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.718611] >ffff888102b66500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   21.719358]                                      ^
[   21.719646]  ffff888102b66580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.720274]  ffff888102b66600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.720541] ==================================================================
[   19.846511] ==================================================================
[   19.847323] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b6e/0x5450
[   19.847930] Write of size 4 at addr ffff888102b66530 by task kunit_try_catch/282
[   19.848476] 
[   19.848955] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250512 #1 PREEMPT(voluntary) 
[   19.849125] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.849199] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   19.849242] Call Trace:
[   19.849291]  <TASK>
[   19.849328]  dump_stack_lvl+0x73/0xb0
[   19.849395]  print_report+0xd1/0x650
[   19.849442]  ? __virt_addr_valid+0x1db/0x2d0
[   19.849529]  ? kasan_atomics_helper+0x4b6e/0x5450
[   19.849618]  ? kasan_complete_mode_report_info+0x2a/0x200
[   19.849707]  ? kasan_atomics_helper+0x4b6e/0x5450
[   19.849761]  kasan_report+0x141/0x180
[   19.849806]  ? kasan_atomics_helper+0x4b6e/0x5450
[   19.849866]  __asan_report_store4_noabort+0x1b/0x30
[   19.849915]  kasan_atomics_helper+0x4b6e/0x5450
[   19.849968]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   19.850021]  ? __kmalloc_cache_noprof+0x189/0x420
[   19.850101]  ? kasan_atomics+0x152/0x310
[   19.850165]  kasan_atomics+0x1dc/0x310
[   19.850220]  ? __pfx_kasan_atomics+0x10/0x10
[   19.850288]  ? __pfx_read_tsc+0x10/0x10
[   19.850340]  ? ktime_get_ts64+0x86/0x230
[   19.850397]  kunit_try_run_case+0x1a5/0x480
[   19.850454]  ? __pfx_kunit_try_run_case+0x10/0x10
[   19.850505]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   19.850558]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   19.850612]  ? __kthread_parkme+0x82/0x180
[   19.850687]  ? preempt_count_sub+0x50/0x80
[   19.850747]  ? __pfx_kunit_try_run_case+0x10/0x10
[   19.850802]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   19.850857]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   19.850904]  kthread+0x337/0x6f0
[   19.850946]  ? trace_preempt_on+0x20/0xc0
[   19.851005]  ? __pfx_kthread+0x10/0x10
[   19.851093]  ? _raw_spin_unlock_irq+0x47/0x80
[   19.851159]  ? calculate_sigpending+0x7b/0xa0
[   19.851216]  ? __pfx_kthread+0x10/0x10
[   19.851276]  ret_from_fork+0x116/0x1d0
[   19.851323]  ? __pfx_kthread+0x10/0x10
[   19.851372]  ret_from_fork_asm+0x1a/0x30
[   19.851459]  </TASK>
[   19.851483] 
[   19.864073] Allocated by task 282:
[   19.864379]  kasan_save_stack+0x45/0x70
[   19.864774]  kasan_save_track+0x18/0x40
[   19.864977]  kasan_save_alloc_info+0x3b/0x50
[   19.865500]  __kasan_kmalloc+0xb7/0xc0
[   19.865900]  __kmalloc_cache_noprof+0x189/0x420
[   19.866240]  kasan_atomics+0x95/0x310
[   19.866545]  kunit_try_run_case+0x1a5/0x480
[   19.866921]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   19.867206]  kthread+0x337/0x6f0
[   19.867509]  ret_from_fork+0x116/0x1d0
[   19.867896]  ret_from_fork_asm+0x1a/0x30
[   19.868333] 
[   19.868508] The buggy address belongs to the object at ffff888102b66500
[   19.868508]  which belongs to the cache kmalloc-64 of size 64
[   19.869098] The buggy address is located 0 bytes to the right of
[   19.869098]  allocated 48-byte region [ffff888102b66500, ffff888102b66530)
[   19.869968] 
[   19.870219] The buggy address belongs to the physical page:
[   19.870916] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b66
[   19.871559] flags: 0x200000000000000(node=0|zone=2)
[   19.871906] page_type: f5(slab)
[   19.872096] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   19.872618] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.873255] page dumped because: kasan: bad access detected
[   19.873678] 
[   19.873873] Memory state around the buggy address:
[   19.874324]  ffff888102b66400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.874915]  ffff888102b66480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.875507] >ffff888102b66500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.875887]                                      ^
[   19.876394]  ffff888102b66580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.877244]  ffff888102b66600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.877546] ==================================================================
[   21.658317] ==================================================================
[   21.658891] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4fb2/0x5450
[   21.659529] Read of size 8 at addr ffff888102b66530 by task kunit_try_catch/282
[   21.660043] 
[   21.660303] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250512 #1 PREEMPT(voluntary) 
[   21.660426] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.660459] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   21.660516] Call Trace:
[   21.660559]  <TASK>
[   21.660605]  dump_stack_lvl+0x73/0xb0
[   21.660674]  print_report+0xd1/0x650
[   21.660729]  ? __virt_addr_valid+0x1db/0x2d0
[   21.660777]  ? kasan_atomics_helper+0x4fb2/0x5450
[   21.660818]  ? kasan_complete_mode_report_info+0x2a/0x200
[   21.660860]  ? kasan_atomics_helper+0x4fb2/0x5450
[   21.660907]  kasan_report+0x141/0x180
[   21.660951]  ? kasan_atomics_helper+0x4fb2/0x5450
[   21.661007]  __asan_report_load8_noabort+0x18/0x20
[   21.661053]  kasan_atomics_helper+0x4fb2/0x5450
[   21.661099]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   21.661139]  ? __kmalloc_cache_noprof+0x189/0x420
[   21.661179]  ? kasan_atomics+0x152/0x310
[   21.661232]  kasan_atomics+0x1dc/0x310
[   21.661296]  ? __pfx_kasan_atomics+0x10/0x10
[   21.661353]  ? __pfx_read_tsc+0x10/0x10
[   21.661401]  ? ktime_get_ts64+0x86/0x230
[   21.661436]  kunit_try_run_case+0x1a5/0x480
[   21.661466]  ? __pfx_kunit_try_run_case+0x10/0x10
[   21.661495]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   21.661522]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   21.661548]  ? __kthread_parkme+0x82/0x180
[   21.661571]  ? preempt_count_sub+0x50/0x80
[   21.661598]  ? __pfx_kunit_try_run_case+0x10/0x10
[   21.661624]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   21.661650]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   21.661689]  kthread+0x337/0x6f0
[   21.661720]  ? trace_preempt_on+0x20/0xc0
[   21.661748]  ? __pfx_kthread+0x10/0x10
[   21.661771]  ? _raw_spin_unlock_irq+0x47/0x80
[   21.661794]  ? calculate_sigpending+0x7b/0xa0
[   21.661822]  ? __pfx_kthread+0x10/0x10
[   21.661846]  ret_from_fork+0x116/0x1d0
[   21.661867]  ? __pfx_kthread+0x10/0x10
[   21.661891]  ret_from_fork_asm+0x1a/0x30
[   21.661924]  </TASK>
[   21.661939] 
[   21.674893] Allocated by task 282:
[   21.675267]  kasan_save_stack+0x45/0x70
[   21.675650]  kasan_save_track+0x18/0x40
[   21.675864]  kasan_save_alloc_info+0x3b/0x50
[   21.676116]  __kasan_kmalloc+0xb7/0xc0
[   21.677089]  __kmalloc_cache_noprof+0x189/0x420
[   21.677642]  kasan_atomics+0x95/0x310
[   21.677969]  kunit_try_run_case+0x1a5/0x480
[   21.678266]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   21.678600]  kthread+0x337/0x6f0
[   21.678934]  ret_from_fork+0x116/0x1d0
[   21.679322]  ret_from_fork_asm+0x1a/0x30
[   21.679591] 
[   21.679759] The buggy address belongs to the object at ffff888102b66500
[   21.679759]  which belongs to the cache kmalloc-64 of size 64
[   21.680437] The buggy address is located 0 bytes to the right of
[   21.680437]  allocated 48-byte region [ffff888102b66500, ffff888102b66530)
[   21.681252] 
[   21.681454] The buggy address belongs to the physical page:
[   21.681780] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b66
[   21.682432] flags: 0x200000000000000(node=0|zone=2)
[   21.682859] page_type: f5(slab)
[   21.683111] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   21.683479] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   21.684077] page dumped because: kasan: bad access detected
[   21.684407] 
[   21.684531] Memory state around the buggy address:
[   21.684941]  ffff888102b66400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.685496]  ffff888102b66480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.685849] >ffff888102b66500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   21.686383]                                      ^
[   21.686847]  ffff888102b66580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.687174]  ffff888102b66600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.687736] ==================================================================
[   20.776804] ==================================================================
[   20.777404] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1217/0x5450
[   20.777866] Write of size 4 at addr ffff888102b66530 by task kunit_try_catch/282
[   20.778290] 
[   20.778453] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250512 #1 PREEMPT(voluntary) 
[   20.778565] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.778595] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   20.778641] Call Trace:
[   20.778712]  <TASK>
[   20.778749]  dump_stack_lvl+0x73/0xb0
[   20.778828]  print_report+0xd1/0x650
[   20.778867]  ? __virt_addr_valid+0x1db/0x2d0
[   20.778905]  ? kasan_atomics_helper+0x1217/0x5450
[   20.778939]  ? kasan_complete_mode_report_info+0x2a/0x200
[   20.778973]  ? kasan_atomics_helper+0x1217/0x5450
[   20.779020]  kasan_report+0x141/0x180
[   20.779084]  ? kasan_atomics_helper+0x1217/0x5450
[   20.779131]  kasan_check_range+0x10c/0x1c0
[   20.779176]  __kasan_check_write+0x18/0x20
[   20.779216]  kasan_atomics_helper+0x1217/0x5450
[   20.779271]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   20.779326]  ? __kmalloc_cache_noprof+0x189/0x420
[   20.779377]  ? kasan_atomics+0x152/0x310
[   20.779438]  kasan_atomics+0x1dc/0x310
[   20.779493]  ? __pfx_kasan_atomics+0x10/0x10
[   20.779550]  ? __pfx_read_tsc+0x10/0x10
[   20.779599]  ? ktime_get_ts64+0x86/0x230
[   20.779654]  kunit_try_run_case+0x1a5/0x480
[   20.779741]  ? __pfx_kunit_try_run_case+0x10/0x10
[   20.779795]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   20.779850]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   20.779889]  ? __kthread_parkme+0x82/0x180
[   20.779922]  ? preempt_count_sub+0x50/0x80
[   20.779960]  ? __pfx_kunit_try_run_case+0x10/0x10
[   20.779996]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   20.780033]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   20.780072]  kthread+0x337/0x6f0
[   20.780105]  ? trace_preempt_on+0x20/0xc0
[   20.780142]  ? __pfx_kthread+0x10/0x10
[   20.780175]  ? _raw_spin_unlock_irq+0x47/0x80
[   20.780210]  ? calculate_sigpending+0x7b/0xa0
[   20.780247]  ? __pfx_kthread+0x10/0x10
[   20.780299]  ret_from_fork+0x116/0x1d0
[   20.780328]  ? __pfx_kthread+0x10/0x10
[   20.780352]  ret_from_fork_asm+0x1a/0x30
[   20.780386]  </TASK>
[   20.780401] 
[   20.793883] Allocated by task 282:
[   20.794245]  kasan_save_stack+0x45/0x70
[   20.794649]  kasan_save_track+0x18/0x40
[   20.795019]  kasan_save_alloc_info+0x3b/0x50
[   20.795422]  __kasan_kmalloc+0xb7/0xc0
[   20.795617]  __kmalloc_cache_noprof+0x189/0x420
[   20.795961]  kasan_atomics+0x95/0x310
[   20.796207]  kunit_try_run_case+0x1a5/0x480
[   20.797770]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   20.798057]  kthread+0x337/0x6f0
[   20.798240]  ret_from_fork+0x116/0x1d0
[   20.798563]  ret_from_fork_asm+0x1a/0x30
[   20.798935] 
[   20.799122] The buggy address belongs to the object at ffff888102b66500
[   20.799122]  which belongs to the cache kmalloc-64 of size 64
[   20.799955] The buggy address is located 0 bytes to the right of
[   20.799955]  allocated 48-byte region [ffff888102b66500, ffff888102b66530)
[   20.800445] 
[   20.800579] The buggy address belongs to the physical page:
[   20.801006] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b66
[   20.801551] flags: 0x200000000000000(node=0|zone=2)
[   20.801936] page_type: f5(slab)
[   20.802189] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   20.802488] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   20.802807] page dumped because: kasan: bad access detected
[   20.803253] 
[   20.803451] Memory state around the buggy address:
[   20.803853]  ffff888102b66400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.804414]  ffff888102b66480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.804761] >ffff888102b66500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   20.805034]                                      ^
[   20.805395]  ffff888102b66580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.805953]  ffff888102b66600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.806492] ==================================================================
[   20.024604] ==================================================================
[   20.025498] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x565/0x5450
[   20.026447] Write of size 4 at addr ffff888102b66530 by task kunit_try_catch/282
[   20.027024] 
[   20.027426] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250512 #1 PREEMPT(voluntary) 
[   20.027551] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.027583] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   20.027631] Call Trace:
[   20.027703]  <TASK>
[   20.027747]  dump_stack_lvl+0x73/0xb0
[   20.027812]  print_report+0xd1/0x650
[   20.027861]  ? __virt_addr_valid+0x1db/0x2d0
[   20.027908]  ? kasan_atomics_helper+0x565/0x5450
[   20.027960]  ? kasan_complete_mode_report_info+0x2a/0x200
[   20.028025]  ? kasan_atomics_helper+0x565/0x5450
[   20.028202]  kasan_report+0x141/0x180
[   20.028250]  ? kasan_atomics_helper+0x565/0x5450
[   20.028312]  kasan_check_range+0x10c/0x1c0
[   20.028340]  __kasan_check_write+0x18/0x20
[   20.028363]  kasan_atomics_helper+0x565/0x5450
[   20.028388]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   20.028414]  ? __kmalloc_cache_noprof+0x189/0x420
[   20.028439]  ? kasan_atomics+0x152/0x310
[   20.028468]  kasan_atomics+0x1dc/0x310
[   20.028494]  ? __pfx_kasan_atomics+0x10/0x10
[   20.028521]  ? __pfx_read_tsc+0x10/0x10
[   20.028546]  ? ktime_get_ts64+0x86/0x230
[   20.028573]  kunit_try_run_case+0x1a5/0x480
[   20.028600]  ? __pfx_kunit_try_run_case+0x10/0x10
[   20.028625]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   20.028651]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   20.028690]  ? __kthread_parkme+0x82/0x180
[   20.028716]  ? preempt_count_sub+0x50/0x80
[   20.028743]  ? __pfx_kunit_try_run_case+0x10/0x10
[   20.028769]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   20.028795]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   20.028821]  kthread+0x337/0x6f0
[   20.028844]  ? trace_preempt_on+0x20/0xc0
[   20.028870]  ? __pfx_kthread+0x10/0x10
[   20.028893]  ? _raw_spin_unlock_irq+0x47/0x80
[   20.028917]  ? calculate_sigpending+0x7b/0xa0
[   20.028944]  ? __pfx_kthread+0x10/0x10
[   20.028968]  ret_from_fork+0x116/0x1d0
[   20.028988]  ? __pfx_kthread+0x10/0x10
[   20.029012]  ret_from_fork_asm+0x1a/0x30
[   20.029060]  </TASK>
[   20.029081] 
[   20.042194] Allocated by task 282:
[   20.042880]  kasan_save_stack+0x45/0x70
[   20.043294]  kasan_save_track+0x18/0x40
[   20.043641]  kasan_save_alloc_info+0x3b/0x50
[   20.044049]  __kasan_kmalloc+0xb7/0xc0
[   20.044501]  __kmalloc_cache_noprof+0x189/0x420
[   20.044841]  kasan_atomics+0x95/0x310
[   20.045450]  kunit_try_run_case+0x1a5/0x480
[   20.046321]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   20.046797]  kthread+0x337/0x6f0
[   20.047070]  ret_from_fork+0x116/0x1d0
[   20.047415]  ret_from_fork_asm+0x1a/0x30
[   20.047677] 
[   20.047791] The buggy address belongs to the object at ffff888102b66500
[   20.047791]  which belongs to the cache kmalloc-64 of size 64
[   20.048583] The buggy address is located 0 bytes to the right of
[   20.048583]  allocated 48-byte region [ffff888102b66500, ffff888102b66530)
[   20.049120] 
[   20.049267] The buggy address belongs to the physical page:
[   20.049492] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b66
[   20.050162] flags: 0x200000000000000(node=0|zone=2)
[   20.050699] page_type: f5(slab)
[   20.051052] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   20.051780] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   20.052021] page dumped because: kasan: bad access detected
[   20.052510] 
[   20.052738] Memory state around the buggy address:
[   20.053142]  ffff888102b66400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.053632]  ffff888102b66480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.053941] >ffff888102b66500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   20.054198]                                      ^
[   20.054779]  ffff888102b66580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.055608]  ffff888102b66600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.056251] ==================================================================
[   20.307547] ==================================================================
[   20.308600] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa2b/0x5450
[   20.308963] Write of size 4 at addr ffff888102b66530 by task kunit_try_catch/282
[   20.309252] 
[   20.309500] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250512 #1 PREEMPT(voluntary) 
[   20.309604] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.309679] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   20.309749] Call Trace:
[   20.309793]  <TASK>
[   20.309860]  dump_stack_lvl+0x73/0xb0
[   20.309927]  print_report+0xd1/0x650
[   20.309976]  ? __virt_addr_valid+0x1db/0x2d0
[   20.310028]  ? kasan_atomics_helper+0xa2b/0x5450
[   20.310078]  ? kasan_complete_mode_report_info+0x2a/0x200
[   20.310130]  ? kasan_atomics_helper+0xa2b/0x5450
[   20.310179]  kasan_report+0x141/0x180
[   20.310235]  ? kasan_atomics_helper+0xa2b/0x5450
[   20.310311]  kasan_check_range+0x10c/0x1c0
[   20.310369]  __kasan_check_write+0x18/0x20
[   20.310417]  kasan_atomics_helper+0xa2b/0x5450
[   20.310467]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   20.310516]  ? __kmalloc_cache_noprof+0x189/0x420
[   20.310564]  ? kasan_atomics+0x152/0x310
[   20.310624]  kasan_atomics+0x1dc/0x310
[   20.310672]  ? __pfx_kasan_atomics+0x10/0x10
[   20.310721]  ? __pfx_read_tsc+0x10/0x10
[   20.310768]  ? ktime_get_ts64+0x86/0x230
[   20.310822]  kunit_try_run_case+0x1a5/0x480
[   20.310876]  ? __pfx_kunit_try_run_case+0x10/0x10
[   20.310927]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   20.310975]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   20.311057]  ? __kthread_parkme+0x82/0x180
[   20.311110]  ? preempt_count_sub+0x50/0x80
[   20.311138]  ? __pfx_kunit_try_run_case+0x10/0x10
[   20.311166]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   20.311196]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   20.311222]  kthread+0x337/0x6f0
[   20.311245]  ? trace_preempt_on+0x20/0xc0
[   20.311298]  ? __pfx_kthread+0x10/0x10
[   20.311341]  ? _raw_spin_unlock_irq+0x47/0x80
[   20.311385]  ? calculate_sigpending+0x7b/0xa0
[   20.311438]  ? __pfx_kthread+0x10/0x10
[   20.311488]  ret_from_fork+0x116/0x1d0
[   20.311533]  ? __pfx_kthread+0x10/0x10
[   20.311583]  ret_from_fork_asm+0x1a/0x30
[   20.311664]  </TASK>
[   20.311696] 
[   20.323036] Allocated by task 282:
[   20.323351]  kasan_save_stack+0x45/0x70
[   20.323729]  kasan_save_track+0x18/0x40
[   20.323952]  kasan_save_alloc_info+0x3b/0x50
[   20.324224]  __kasan_kmalloc+0xb7/0xc0
[   20.324427]  __kmalloc_cache_noprof+0x189/0x420
[   20.324638]  kasan_atomics+0x95/0x310
[   20.324867]  kunit_try_run_case+0x1a5/0x480
[   20.325078]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   20.325328]  kthread+0x337/0x6f0
[   20.325625]  ret_from_fork+0x116/0x1d0
[   20.325989]  ret_from_fork_asm+0x1a/0x30
[   20.326341] 
[   20.326515] The buggy address belongs to the object at ffff888102b66500
[   20.326515]  which belongs to the cache kmalloc-64 of size 64
[   20.327447] The buggy address is located 0 bytes to the right of
[   20.327447]  allocated 48-byte region [ffff888102b66500, ffff888102b66530)
[   20.328514] 
[   20.329837] The buggy address belongs to the physical page:
[   20.330397] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b66
[   20.330895] flags: 0x200000000000000(node=0|zone=2)
[   20.331552] page_type: f5(slab)
[   20.331893] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   20.332401] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   20.332930] page dumped because: kasan: bad access detected
[   20.333382] 
[   20.333555] Memory state around the buggy address:
[   20.333865]  ffff888102b66400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.334306]  ffff888102b66480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.334789] >ffff888102b66500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   20.335287]                                      ^
[   20.335687]  ffff888102b66580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.336154]  ffff888102b66600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.336578] ==================================================================
[   20.890868] ==================================================================
[   20.891512] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x13b5/0x5450
[   20.892120] Read of size 8 at addr ffff888102b66530 by task kunit_try_catch/282
[   20.893230] 
[   20.893484] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250512 #1 PREEMPT(voluntary) 
[   20.893596] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.893624] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   20.893699] Call Trace:
[   20.893742]  <TASK>
[   20.893781]  dump_stack_lvl+0x73/0xb0
[   20.893849]  print_report+0xd1/0x650
[   20.893901]  ? __virt_addr_valid+0x1db/0x2d0
[   20.893953]  ? kasan_atomics_helper+0x13b5/0x5450
[   20.894001]  ? kasan_complete_mode_report_info+0x2a/0x200
[   20.894051]  ? kasan_atomics_helper+0x13b5/0x5450
[   20.894101]  kasan_report+0x141/0x180
[   20.894152]  ? kasan_atomics_helper+0x13b5/0x5450
[   20.894213]  kasan_check_range+0x10c/0x1c0
[   20.894280]  __kasan_check_read+0x15/0x20
[   20.894329]  kasan_atomics_helper+0x13b5/0x5450
[   20.894384]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   20.894437]  ? __kmalloc_cache_noprof+0x189/0x420
[   20.894488]  ? kasan_atomics+0x152/0x310
[   20.894551]  kasan_atomics+0x1dc/0x310
[   20.894605]  ? __pfx_kasan_atomics+0x10/0x10
[   20.894688]  ? __pfx_read_tsc+0x10/0x10
[   20.894740]  ? ktime_get_ts64+0x86/0x230
[   20.894798]  kunit_try_run_case+0x1a5/0x480
[   20.894855]  ? __pfx_kunit_try_run_case+0x10/0x10
[   20.894902]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   20.894936]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   20.894962]  ? __kthread_parkme+0x82/0x180
[   20.894986]  ? preempt_count_sub+0x50/0x80
[   20.895031]  ? __pfx_kunit_try_run_case+0x10/0x10
[   20.895058]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   20.895084]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   20.895111]  kthread+0x337/0x6f0
[   20.895133]  ? trace_preempt_on+0x20/0xc0
[   20.895160]  ? __pfx_kthread+0x10/0x10
[   20.895183]  ? _raw_spin_unlock_irq+0x47/0x80
[   20.895206]  ? calculate_sigpending+0x7b/0xa0
[   20.895233]  ? __pfx_kthread+0x10/0x10
[   20.895273]  ret_from_fork+0x116/0x1d0
[   20.895303]  ? __pfx_kthread+0x10/0x10
[   20.895326]  ret_from_fork_asm+0x1a/0x30
[   20.895359]  </TASK>
[   20.895374] 
[   20.904544] Allocated by task 282:
[   20.904921]  kasan_save_stack+0x45/0x70
[   20.905300]  kasan_save_track+0x18/0x40
[   20.905622]  kasan_save_alloc_info+0x3b/0x50
[   20.906014]  __kasan_kmalloc+0xb7/0xc0
[   20.906352]  __kmalloc_cache_noprof+0x189/0x420
[   20.906771]  kasan_atomics+0x95/0x310
[   20.907110]  kunit_try_run_case+0x1a5/0x480
[   20.907484]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   20.907942]  kthread+0x337/0x6f0
[   20.908242]  ret_from_fork+0x116/0x1d0
[   20.908482]  ret_from_fork_asm+0x1a/0x30
[   20.908800] 
[   20.908985] The buggy address belongs to the object at ffff888102b66500
[   20.908985]  which belongs to the cache kmalloc-64 of size 64
[   20.909577] The buggy address is located 0 bytes to the right of
[   20.909577]  allocated 48-byte region [ffff888102b66500, ffff888102b66530)
[   20.910102] 
[   20.910308] The buggy address belongs to the physical page:
[   20.910643] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b66
[   20.911034] flags: 0x200000000000000(node=0|zone=2)
[   20.911277] page_type: f5(slab)
[   20.911468] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   20.911789] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   20.912071] page dumped because: kasan: bad access detected
[   20.912295] 
[   20.912452] Memory state around the buggy address:
[   20.912888]  ffff888102b66400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.913457]  ffff888102b66480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.914031] >ffff888102b66500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   20.914534]                                      ^
[   20.914975]  ffff888102b66580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.915551]  ffff888102b66600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.917162] ==================================================================
[   21.343836] ==================================================================
[   21.344386] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1c18/0x5450
[   21.344708] Write of size 8 at addr ffff888102b66530 by task kunit_try_catch/282
[   21.345241] 
[   21.345544] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250512 #1 PREEMPT(voluntary) 
[   21.345656] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.345685] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   21.345735] Call Trace:
[   21.345779]  <TASK>
[   21.345824]  dump_stack_lvl+0x73/0xb0
[   21.345893]  print_report+0xd1/0x650
[   21.345938]  ? __virt_addr_valid+0x1db/0x2d0
[   21.345986]  ? kasan_atomics_helper+0x1c18/0x5450
[   21.346031]  ? kasan_complete_mode_report_info+0x2a/0x200
[   21.346073]  ? kasan_atomics_helper+0x1c18/0x5450
[   21.346113]  kasan_report+0x141/0x180
[   21.346161]  ? kasan_atomics_helper+0x1c18/0x5450
[   21.346213]  kasan_check_range+0x10c/0x1c0
[   21.346278]  __kasan_check_write+0x18/0x20
[   21.346325]  kasan_atomics_helper+0x1c18/0x5450
[   21.346373]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   21.346417]  ? __kmalloc_cache_noprof+0x189/0x420
[   21.346465]  ? kasan_atomics+0x152/0x310
[   21.346520]  kasan_atomics+0x1dc/0x310
[   21.346569]  ? __pfx_kasan_atomics+0x10/0x10
[   21.346619]  ? __pfx_read_tsc+0x10/0x10
[   21.346664]  ? ktime_get_ts64+0x86/0x230
[   21.346732]  kunit_try_run_case+0x1a5/0x480
[   21.346785]  ? __pfx_kunit_try_run_case+0x10/0x10
[   21.346829]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   21.346879]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   21.346924]  ? __kthread_parkme+0x82/0x180
[   21.346965]  ? preempt_count_sub+0x50/0x80
[   21.347029]  ? __pfx_kunit_try_run_case+0x10/0x10
[   21.347085]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   21.347139]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   21.347188]  kthread+0x337/0x6f0
[   21.347228]  ? trace_preempt_on+0x20/0xc0
[   21.347294]  ? __pfx_kthread+0x10/0x10
[   21.347339]  ? _raw_spin_unlock_irq+0x47/0x80
[   21.347382]  ? calculate_sigpending+0x7b/0xa0
[   21.347431]  ? __pfx_kthread+0x10/0x10
[   21.347480]  ret_from_fork+0x116/0x1d0
[   21.347520]  ? __pfx_kthread+0x10/0x10
[   21.347564]  ret_from_fork_asm+0x1a/0x30
[   21.347628]  </TASK>
[   21.347657] 
[   21.357972] Allocated by task 282:
[   21.358369]  kasan_save_stack+0x45/0x70
[   21.358781]  kasan_save_track+0x18/0x40
[   21.359141]  kasan_save_alloc_info+0x3b/0x50
[   21.359384]  __kasan_kmalloc+0xb7/0xc0
[   21.359712]  __kmalloc_cache_noprof+0x189/0x420
[   21.359982]  kasan_atomics+0x95/0x310
[   21.360305]  kunit_try_run_case+0x1a5/0x480
[   21.360657]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   21.360914]  kthread+0x337/0x6f0
[   21.361107]  ret_from_fork+0x116/0x1d0
[   21.361450]  ret_from_fork_asm+0x1a/0x30
[   21.361834] 
[   21.362004] The buggy address belongs to the object at ffff888102b66500
[   21.362004]  which belongs to the cache kmalloc-64 of size 64
[   21.362619] The buggy address is located 0 bytes to the right of
[   21.362619]  allocated 48-byte region [ffff888102b66500, ffff888102b66530)
[   21.364702] 
[   21.364855] The buggy address belongs to the physical page:
[   21.365088] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b66
[   21.365436] flags: 0x200000000000000(node=0|zone=2)
[   21.366445] page_type: f5(slab)
[   21.366691] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   21.367307] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   21.368167] page dumped because: kasan: bad access detected
[   21.368726] 
[   21.368855] Memory state around the buggy address:
[   21.369055]  ffff888102b66400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.369628]  ffff888102b66480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.370477] >ffff888102b66500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   21.370819]                                      ^
[   21.371331]  ffff888102b66580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.371844]  ffff888102b66600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.372006] ==================================================================
[   20.370226] ==================================================================
[   20.370637] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xb6a/0x5450
[   20.371091] Write of size 4 at addr ffff888102b66530 by task kunit_try_catch/282
[   20.371800] 
[   20.372066] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250512 #1 PREEMPT(voluntary) 
[   20.372176] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.372238] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   20.372296] Call Trace:
[   20.372340]  <TASK>
[   20.372381]  dump_stack_lvl+0x73/0xb0
[   20.372452]  print_report+0xd1/0x650
[   20.372506]  ? __virt_addr_valid+0x1db/0x2d0
[   20.372551]  ? kasan_atomics_helper+0xb6a/0x5450
[   20.372594]  ? kasan_complete_mode_report_info+0x2a/0x200
[   20.372643]  ? kasan_atomics_helper+0xb6a/0x5450
[   20.372730]  kasan_report+0x141/0x180
[   20.372778]  ? kasan_atomics_helper+0xb6a/0x5450
[   20.372839]  kasan_check_range+0x10c/0x1c0
[   20.372894]  __kasan_check_write+0x18/0x20
[   20.372938]  kasan_atomics_helper+0xb6a/0x5450
[   20.373028]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   20.373081]  ? __kmalloc_cache_noprof+0x189/0x420
[   20.373127]  ? kasan_atomics+0x152/0x310
[   20.373176]  kasan_atomics+0x1dc/0x310
[   20.373204]  ? __pfx_kasan_atomics+0x10/0x10
[   20.373232]  ? __pfx_read_tsc+0x10/0x10
[   20.373273]  ? ktime_get_ts64+0x86/0x230
[   20.373307]  kunit_try_run_case+0x1a5/0x480
[   20.373337]  ? __pfx_kunit_try_run_case+0x10/0x10
[   20.373363]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   20.373391]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   20.373416]  ? __kthread_parkme+0x82/0x180
[   20.373440]  ? preempt_count_sub+0x50/0x80
[   20.373466]  ? __pfx_kunit_try_run_case+0x10/0x10
[   20.373492]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   20.373518]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   20.373544]  kthread+0x337/0x6f0
[   20.373566]  ? trace_preempt_on+0x20/0xc0
[   20.373594]  ? __pfx_kthread+0x10/0x10
[   20.373618]  ? _raw_spin_unlock_irq+0x47/0x80
[   20.373640]  ? calculate_sigpending+0x7b/0xa0
[   20.373677]  ? __pfx_kthread+0x10/0x10
[   20.373734]  ret_from_fork+0x116/0x1d0
[   20.373756]  ? __pfx_kthread+0x10/0x10
[   20.373780]  ret_from_fork_asm+0x1a/0x30
[   20.373814]  </TASK>
[   20.373830] 
[   20.387176] Allocated by task 282:
[   20.387408]  kasan_save_stack+0x45/0x70
[   20.387642]  kasan_save_track+0x18/0x40
[   20.388736]  kasan_save_alloc_info+0x3b/0x50
[   20.389108]  __kasan_kmalloc+0xb7/0xc0
[   20.389331]  __kmalloc_cache_noprof+0x189/0x420
[   20.389655]  kasan_atomics+0x95/0x310
[   20.390195]  kunit_try_run_case+0x1a5/0x480
[   20.390634]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   20.391517]  kthread+0x337/0x6f0
[   20.391815]  ret_from_fork+0x116/0x1d0
[   20.391995]  ret_from_fork_asm+0x1a/0x30
[   20.392557] 
[   20.392734] The buggy address belongs to the object at ffff888102b66500
[   20.392734]  which belongs to the cache kmalloc-64 of size 64
[   20.393532] The buggy address is located 0 bytes to the right of
[   20.393532]  allocated 48-byte region [ffff888102b66500, ffff888102b66530)
[   20.394316] 
[   20.394887] The buggy address belongs to the physical page:
[   20.395127] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b66
[   20.395656] flags: 0x200000000000000(node=0|zone=2)
[   20.395986] page_type: f5(slab)
[   20.396233] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   20.396571] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   20.397118] page dumped because: kasan: bad access detected
[   20.397349] 
[   20.397467] Memory state around the buggy address:
[   20.397679]  ffff888102b66400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.397935]  ffff888102b66480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.398458] >ffff888102b66500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   20.399010]                                      ^
[   20.399487]  ffff888102b66580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.400859]  ffff888102b66600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.401189] ==================================================================
[   21.405011] ==================================================================
[   21.405627] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1ce1/0x5450
[   21.406173] Write of size 8 at addr ffff888102b66530 by task kunit_try_catch/282
[   21.406713] 
[   21.406944] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250512 #1 PREEMPT(voluntary) 
[   21.407087] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.407117] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   21.407162] Call Trace:
[   21.407204]  <TASK>
[   21.407252]  dump_stack_lvl+0x73/0xb0
[   21.407339]  print_report+0xd1/0x650
[   21.407387]  ? __virt_addr_valid+0x1db/0x2d0
[   21.407433]  ? kasan_atomics_helper+0x1ce1/0x5450
[   21.407476]  ? kasan_complete_mode_report_info+0x2a/0x200
[   21.407523]  ? kasan_atomics_helper+0x1ce1/0x5450
[   21.407567]  kasan_report+0x141/0x180
[   21.407626]  ? kasan_atomics_helper+0x1ce1/0x5450
[   21.407728]  kasan_check_range+0x10c/0x1c0
[   21.407783]  __kasan_check_write+0x18/0x20
[   21.407826]  kasan_atomics_helper+0x1ce1/0x5450
[   21.407887]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   21.407950]  ? __kmalloc_cache_noprof+0x189/0x420
[   21.407999]  ? kasan_atomics+0x152/0x310
[   21.408053]  kasan_atomics+0x1dc/0x310
[   21.408101]  ? __pfx_kasan_atomics+0x10/0x10
[   21.408163]  ? __pfx_read_tsc+0x10/0x10
[   21.408229]  ? ktime_get_ts64+0x86/0x230
[   21.408290]  kunit_try_run_case+0x1a5/0x480
[   21.408346]  ? __pfx_kunit_try_run_case+0x10/0x10
[   21.408399]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   21.408464]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   21.408515]  ? __kthread_parkme+0x82/0x180
[   21.408555]  ? preempt_count_sub+0x50/0x80
[   21.408606]  ? __pfx_kunit_try_run_case+0x10/0x10
[   21.408690]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   21.408749]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   21.408813]  kthread+0x337/0x6f0
[   21.408858]  ? trace_preempt_on+0x20/0xc0
[   21.408907]  ? __pfx_kthread+0x10/0x10
[   21.408951]  ? _raw_spin_unlock_irq+0x47/0x80
[   21.409005]  ? calculate_sigpending+0x7b/0xa0
[   21.409074]  ? __pfx_kthread+0x10/0x10
[   21.409116]  ret_from_fork+0x116/0x1d0
[   21.409144]  ? __pfx_kthread+0x10/0x10
[   21.409168]  ret_from_fork_asm+0x1a/0x30
[   21.409203]  </TASK>
[   21.409218] 
[   21.419855] Allocated by task 282:
[   21.420187]  kasan_save_stack+0x45/0x70
[   21.420524]  kasan_save_track+0x18/0x40
[   21.420895]  kasan_save_alloc_info+0x3b/0x50
[   21.421213]  __kasan_kmalloc+0xb7/0xc0
[   21.421415]  __kmalloc_cache_noprof+0x189/0x420
[   21.421632]  kasan_atomics+0x95/0x310
[   21.421992]  kunit_try_run_case+0x1a5/0x480
[   21.422383]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   21.422862]  kthread+0x337/0x6f0
[   21.423173]  ret_from_fork+0x116/0x1d0
[   21.423487]  ret_from_fork_asm+0x1a/0x30
[   21.423816] 
[   21.423996] The buggy address belongs to the object at ffff888102b66500
[   21.423996]  which belongs to the cache kmalloc-64 of size 64
[   21.424699] The buggy address is located 0 bytes to the right of
[   21.424699]  allocated 48-byte region [ffff888102b66500, ffff888102b66530)
[   21.425420] 
[   21.425597] The buggy address belongs to the physical page:
[   21.426046] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b66
[   21.426481] flags: 0x200000000000000(node=0|zone=2)
[   21.426910] page_type: f5(slab)
[   21.427117] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   21.427632] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   21.428227] page dumped because: kasan: bad access detected
[   21.428678] 
[   21.428790] Memory state around the buggy address:
[   21.428978]  ffff888102b66400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.429216]  ffff888102b66480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.431229] >ffff888102b66500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   21.431540]                                      ^
[   21.431760]  ffff888102b66580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.432000]  ffff888102b66600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.432243] ==================================================================
[   20.127919] ==================================================================
[   20.129120] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x72f/0x5450
[   20.129817] Write of size 4 at addr ffff888102b66530 by task kunit_try_catch/282
[   20.130376] 
[   20.130576] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250512 #1 PREEMPT(voluntary) 
[   20.130709] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.130735] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   20.130775] Call Trace:
[   20.130814]  <TASK>
[   20.130851]  dump_stack_lvl+0x73/0xb0
[   20.130916]  print_report+0xd1/0x650
[   20.131013]  ? __virt_addr_valid+0x1db/0x2d0
[   20.131099]  ? kasan_atomics_helper+0x72f/0x5450
[   20.131146]  ? kasan_complete_mode_report_info+0x2a/0x200
[   20.131185]  ? kasan_atomics_helper+0x72f/0x5450
[   20.131222]  kasan_report+0x141/0x180
[   20.131321]  ? kasan_atomics_helper+0x72f/0x5450
[   20.131377]  kasan_check_range+0x10c/0x1c0
[   20.131427]  __kasan_check_write+0x18/0x20
[   20.131501]  kasan_atomics_helper+0x72f/0x5450
[   20.131551]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   20.131623]  ? __kmalloc_cache_noprof+0x189/0x420
[   20.131718]  ? kasan_atomics+0x152/0x310
[   20.131804]  kasan_atomics+0x1dc/0x310
[   20.131865]  ? __pfx_kasan_atomics+0x10/0x10
[   20.131917]  ? __pfx_read_tsc+0x10/0x10
[   20.131962]  ? ktime_get_ts64+0x86/0x230
[   20.132012]  kunit_try_run_case+0x1a5/0x480
[   20.132124]  ? __pfx_kunit_try_run_case+0x10/0x10
[   20.132190]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   20.132242]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   20.132295]  ? __kthread_parkme+0x82/0x180
[   20.132334]  ? preempt_count_sub+0x50/0x80
[   20.132375]  ? __pfx_kunit_try_run_case+0x10/0x10
[   20.132417]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   20.132461]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   20.132492]  kthread+0x337/0x6f0
[   20.132516]  ? trace_preempt_on+0x20/0xc0
[   20.132544]  ? __pfx_kthread+0x10/0x10
[   20.132568]  ? _raw_spin_unlock_irq+0x47/0x80
[   20.132592]  ? calculate_sigpending+0x7b/0xa0
[   20.132619]  ? __pfx_kthread+0x10/0x10
[   20.132643]  ret_from_fork+0x116/0x1d0
[   20.132689]  ? __pfx_kthread+0x10/0x10
[   20.132722]  ret_from_fork_asm+0x1a/0x30
[   20.132756]  </TASK>
[   20.132771] 
[   20.148235] Allocated by task 282:
[   20.148982]  kasan_save_stack+0x45/0x70
[   20.149483]  kasan_save_track+0x18/0x40
[   20.150031]  kasan_save_alloc_info+0x3b/0x50
[   20.150491]  __kasan_kmalloc+0xb7/0xc0
[   20.150946]  __kmalloc_cache_noprof+0x189/0x420
[   20.151188]  kasan_atomics+0x95/0x310
[   20.151554]  kunit_try_run_case+0x1a5/0x480
[   20.152657]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   20.153291]  kthread+0x337/0x6f0
[   20.153899]  ret_from_fork+0x116/0x1d0
[   20.154284]  ret_from_fork_asm+0x1a/0x30
[   20.154954] 
[   20.155106] The buggy address belongs to the object at ffff888102b66500
[   20.155106]  which belongs to the cache kmalloc-64 of size 64
[   20.155981] The buggy address is located 0 bytes to the right of
[   20.155981]  allocated 48-byte region [ffff888102b66500, ffff888102b66530)
[   20.157160] 
[   20.157588] The buggy address belongs to the physical page:
[   20.158046] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b66
[   20.159048] flags: 0x200000000000000(node=0|zone=2)
[   20.159444] page_type: f5(slab)
[   20.159996] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   20.161058] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   20.161392] page dumped because: kasan: bad access detected
[   20.162550] 
[   20.162722] Memory state around the buggy address:
[   20.162938]  ffff888102b66400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.163482]  ffff888102b66480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.164453] >ffff888102b66500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   20.165525]                                      ^
[   20.165834]  ffff888102b66580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.166316]  ffff888102b66600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.167053] ==================================================================
[   21.433078] ==================================================================
[   21.433787] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1d7a/0x5450
[   21.434183] Write of size 8 at addr ffff888102b66530 by task kunit_try_catch/282
[   21.434724] 
[   21.434852] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250512 #1 PREEMPT(voluntary) 
[   21.434938] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.434959] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   21.435009] Call Trace:
[   21.435050]  <TASK>
[   21.435088]  dump_stack_lvl+0x73/0xb0
[   21.435157]  print_report+0xd1/0x650
[   21.435211]  ? __virt_addr_valid+0x1db/0x2d0
[   21.435275]  ? kasan_atomics_helper+0x1d7a/0x5450
[   21.435316]  ? kasan_complete_mode_report_info+0x2a/0x200
[   21.435353]  ? kasan_atomics_helper+0x1d7a/0x5450
[   21.435393]  kasan_report+0x141/0x180
[   21.435436]  ? kasan_atomics_helper+0x1d7a/0x5450
[   21.435488]  kasan_check_range+0x10c/0x1c0
[   21.435536]  __kasan_check_write+0x18/0x20
[   21.435581]  kasan_atomics_helper+0x1d7a/0x5450
[   21.435631]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   21.435715]  ? __kmalloc_cache_noprof+0x189/0x420
[   21.435765]  ? kasan_atomics+0x152/0x310
[   21.435825]  kasan_atomics+0x1dc/0x310
[   21.435876]  ? __pfx_kasan_atomics+0x10/0x10
[   21.435932]  ? __pfx_read_tsc+0x10/0x10
[   21.435979]  ? ktime_get_ts64+0x86/0x230
[   21.436033]  kunit_try_run_case+0x1a5/0x480
[   21.436076]  ? __pfx_kunit_try_run_case+0x10/0x10
[   21.436116]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   21.436158]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   21.436197]  ? __kthread_parkme+0x82/0x180
[   21.436238]  ? preempt_count_sub+0x50/0x80
[   21.436302]  ? __pfx_kunit_try_run_case+0x10/0x10
[   21.436354]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   21.436405]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   21.436449]  kthread+0x337/0x6f0
[   21.436486]  ? trace_preempt_on+0x20/0xc0
[   21.436534]  ? __pfx_kthread+0x10/0x10
[   21.436574]  ? _raw_spin_unlock_irq+0x47/0x80
[   21.436622]  ? calculate_sigpending+0x7b/0xa0
[   21.436709]  ? __pfx_kthread+0x10/0x10
[   21.436763]  ret_from_fork+0x116/0x1d0
[   21.436809]  ? __pfx_kthread+0x10/0x10
[   21.436859]  ret_from_fork_asm+0x1a/0x30
[   21.436928]  </TASK>
[   21.436957] 
[   21.446994] Allocated by task 282:
[   21.447253]  kasan_save_stack+0x45/0x70
[   21.447630]  kasan_save_track+0x18/0x40
[   21.447934]  kasan_save_alloc_info+0x3b/0x50
[   21.448253]  __kasan_kmalloc+0xb7/0xc0
[   21.448574]  __kmalloc_cache_noprof+0x189/0x420
[   21.448843]  kasan_atomics+0x95/0x310
[   21.449165]  kunit_try_run_case+0x1a5/0x480
[   21.449390]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   21.449632]  kthread+0x337/0x6f0
[   21.449842]  ret_from_fork+0x116/0x1d0
[   21.450163]  ret_from_fork_asm+0x1a/0x30
[   21.450512] 
[   21.450710] The buggy address belongs to the object at ffff888102b66500
[   21.450710]  which belongs to the cache kmalloc-64 of size 64
[   21.451554] The buggy address is located 0 bytes to the right of
[   21.451554]  allocated 48-byte region [ffff888102b66500, ffff888102b66530)
[   21.452151] 
[   21.452295] The buggy address belongs to the physical page:
[   21.452524] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b66
[   21.452858] flags: 0x200000000000000(node=0|zone=2)
[   21.453090] page_type: f5(slab)
[   21.453289] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   21.453899] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   21.454491] page dumped because: kasan: bad access detected
[   21.454951] 
[   21.455146] Memory state around the buggy address:
[   21.455555]  ffff888102b66400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.456137]  ffff888102b66480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.456698] >ffff888102b66500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   21.457124]                                      ^
[   21.457424]  ffff888102b66580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.457955]  ffff888102b66600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.458232] ==================================================================
[   19.812576] ==================================================================
[   19.813729] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b88/0x5450
[   19.814208] Read of size 4 at addr ffff888102b66530 by task kunit_try_catch/282
[   19.815468] 
[   19.815642] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250512 #1 PREEMPT(voluntary) 
[   19.816018] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.816544] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   19.816636] Call Trace:
[   19.816682]  <TASK>
[   19.816718]  dump_stack_lvl+0x73/0xb0
[   19.816787]  print_report+0xd1/0x650
[   19.816841]  ? __virt_addr_valid+0x1db/0x2d0
[   19.816888]  ? kasan_atomics_helper+0x4b88/0x5450
[   19.816951]  ? kasan_complete_mode_report_info+0x2a/0x200
[   19.816995]  ? kasan_atomics_helper+0x4b88/0x5450
[   19.817036]  kasan_report+0x141/0x180
[   19.817107]  ? kasan_atomics_helper+0x4b88/0x5450
[   19.817156]  __asan_report_load4_noabort+0x18/0x20
[   19.817193]  kasan_atomics_helper+0x4b88/0x5450
[   19.817224]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   19.817250]  ? __kmalloc_cache_noprof+0x189/0x420
[   19.817300]  ? kasan_atomics+0x152/0x310
[   19.817329]  kasan_atomics+0x1dc/0x310
[   19.817353]  ? __pfx_kasan_atomics+0x10/0x10
[   19.817379]  ? __pfx_read_tsc+0x10/0x10
[   19.817402]  ? ktime_get_ts64+0x86/0x230
[   19.817428]  kunit_try_run_case+0x1a5/0x480
[   19.817455]  ? __pfx_kunit_try_run_case+0x10/0x10
[   19.817479]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   19.817504]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   19.817529]  ? __kthread_parkme+0x82/0x180
[   19.817552]  ? preempt_count_sub+0x50/0x80
[   19.817577]  ? __pfx_kunit_try_run_case+0x10/0x10
[   19.817603]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   19.817628]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   19.817666]  kthread+0x337/0x6f0
[   19.817714]  ? trace_preempt_on+0x20/0xc0
[   19.817741]  ? __pfx_kthread+0x10/0x10
[   19.817763]  ? _raw_spin_unlock_irq+0x47/0x80
[   19.817786]  ? calculate_sigpending+0x7b/0xa0
[   19.817813]  ? __pfx_kthread+0x10/0x10
[   19.817837]  ret_from_fork+0x116/0x1d0
[   19.817857]  ? __pfx_kthread+0x10/0x10
[   19.817879]  ret_from_fork_asm+0x1a/0x30
[   19.817912]  </TASK>
[   19.817925] 
[   19.833403] Allocated by task 282:
[   19.833766]  kasan_save_stack+0x45/0x70
[   19.834140]  kasan_save_track+0x18/0x40
[   19.834460]  kasan_save_alloc_info+0x3b/0x50
[   19.834762]  __kasan_kmalloc+0xb7/0xc0
[   19.834912]  __kmalloc_cache_noprof+0x189/0x420
[   19.835361]  kasan_atomics+0x95/0x310
[   19.835788]  kunit_try_run_case+0x1a5/0x480
[   19.836144]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   19.836393]  kthread+0x337/0x6f0
[   19.836562]  ret_from_fork+0x116/0x1d0
[   19.836779]  ret_from_fork_asm+0x1a/0x30
[   19.837156] 
[   19.837396] The buggy address belongs to the object at ffff888102b66500
[   19.837396]  which belongs to the cache kmalloc-64 of size 64
[   19.838344] The buggy address is located 0 bytes to the right of
[   19.838344]  allocated 48-byte region [ffff888102b66500, ffff888102b66530)
[   19.838842] 
[   19.838967] The buggy address belongs to the physical page:
[   19.839197] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b66
[   19.839958] flags: 0x200000000000000(node=0|zone=2)
[   19.840491] page_type: f5(slab)
[   19.840805] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   19.841458] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.842087] page dumped because: kasan: bad access detected
[   19.842517] 
[   19.842763] Memory state around the buggy address:
[   19.843070]  ffff888102b66400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.843359]  ffff888102b66480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.843634] >ffff888102b66500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.843900]                                      ^
[   19.844106]  ffff888102b66580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.844641]  ffff888102b66600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.845247] ==================================================================
[   21.514396] ==================================================================
[   21.515101] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1f43/0x5450
[   21.515736] Write of size 8 at addr ffff888102b66530 by task kunit_try_catch/282
[   21.516316] 
[   21.516527] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250512 #1 PREEMPT(voluntary) 
[   21.516634] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.516695] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   21.516743] Call Trace:
[   21.516786]  <TASK>
[   21.516829]  dump_stack_lvl+0x73/0xb0
[   21.516894]  print_report+0xd1/0x650
[   21.516945]  ? __virt_addr_valid+0x1db/0x2d0
[   21.516991]  ? kasan_atomics_helper+0x1f43/0x5450
[   21.517037]  ? kasan_complete_mode_report_info+0x2a/0x200
[   21.517083]  ? kasan_atomics_helper+0x1f43/0x5450
[   21.517133]  kasan_report+0x141/0x180
[   21.517179]  ? kasan_atomics_helper+0x1f43/0x5450
[   21.517236]  kasan_check_range+0x10c/0x1c0
[   21.517298]  __kasan_check_write+0x18/0x20
[   21.517342]  kasan_atomics_helper+0x1f43/0x5450
[   21.517393]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   21.517438]  ? __kmalloc_cache_noprof+0x189/0x420
[   21.517484]  ? kasan_atomics+0x152/0x310
[   21.517537]  kasan_atomics+0x1dc/0x310
[   21.517583]  ? __pfx_kasan_atomics+0x10/0x10
[   21.517635]  ? __pfx_read_tsc+0x10/0x10
[   21.517715]  ? ktime_get_ts64+0x86/0x230
[   21.517769]  kunit_try_run_case+0x1a5/0x480
[   21.517816]  ? __pfx_kunit_try_run_case+0x10/0x10
[   21.517863]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   21.517911]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   21.517958]  ? __kthread_parkme+0x82/0x180
[   21.518002]  ? preempt_count_sub+0x50/0x80
[   21.518051]  ? __pfx_kunit_try_run_case+0x10/0x10
[   21.518097]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   21.518145]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   21.518192]  kthread+0x337/0x6f0
[   21.518235]  ? trace_preempt_on+0x20/0xc0
[   21.518299]  ? __pfx_kthread+0x10/0x10
[   21.518346]  ? _raw_spin_unlock_irq+0x47/0x80
[   21.518393]  ? calculate_sigpending+0x7b/0xa0
[   21.518448]  ? __pfx_kthread+0x10/0x10
[   21.518499]  ret_from_fork+0x116/0x1d0
[   21.518542]  ? __pfx_kthread+0x10/0x10
[   21.518591]  ret_from_fork_asm+0x1a/0x30
[   21.518688]  </TASK>
[   21.518721] 
[   21.529950] Allocated by task 282:
[   21.530175]  kasan_save_stack+0x45/0x70
[   21.530563]  kasan_save_track+0x18/0x40
[   21.530912]  kasan_save_alloc_info+0x3b/0x50
[   21.531272]  __kasan_kmalloc+0xb7/0xc0
[   21.531608]  __kmalloc_cache_noprof+0x189/0x420
[   21.531999]  kasan_atomics+0x95/0x310
[   21.532345]  kunit_try_run_case+0x1a5/0x480
[   21.533079]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   21.533532]  kthread+0x337/0x6f0
[   21.533851]  ret_from_fork+0x116/0x1d0
[   21.534129]  ret_from_fork_asm+0x1a/0x30
[   21.534405] 
[   21.534544] The buggy address belongs to the object at ffff888102b66500
[   21.534544]  which belongs to the cache kmalloc-64 of size 64
[   21.535133] The buggy address is located 0 bytes to the right of
[   21.535133]  allocated 48-byte region [ffff888102b66500, ffff888102b66530)
[   21.535876] 
[   21.536009] The buggy address belongs to the physical page:
[   21.536368] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b66
[   21.536856] flags: 0x200000000000000(node=0|zone=2)
[   21.537241] page_type: f5(slab)
[   21.537441] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   21.537990] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   21.538299] page dumped because: kasan: bad access detected
[   21.538524] 
[   21.538641] Memory state around the buggy address:
[   21.538885]  ffff888102b66400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.539168]  ffff888102b66480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.539448] >ffff888102b66500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   21.539741]                                      ^
[   21.539954]  ffff888102b66580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.540218]  ffff888102b66600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.540790] ==================================================================
[   20.559816] ==================================================================
[   20.560247] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf10/0x5450
[   20.560704] Write of size 4 at addr ffff888102b66530 by task kunit_try_catch/282
[   20.561653] 
[   20.561815] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250512 #1 PREEMPT(voluntary) 
[   20.561882] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.561898] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   20.561925] Call Trace:
[   20.561949]  <TASK>
[   20.561979]  dump_stack_lvl+0x73/0xb0
[   20.562019]  print_report+0xd1/0x650
[   20.562047]  ? __virt_addr_valid+0x1db/0x2d0
[   20.562074]  ? kasan_atomics_helper+0xf10/0x5450
[   20.562099]  ? kasan_complete_mode_report_info+0x2a/0x200
[   20.562125]  ? kasan_atomics_helper+0xf10/0x5450
[   20.562150]  kasan_report+0x141/0x180
[   20.562175]  ? kasan_atomics_helper+0xf10/0x5450
[   20.562203]  kasan_check_range+0x10c/0x1c0
[   20.562230]  __kasan_check_write+0x18/0x20
[   20.562252]  kasan_atomics_helper+0xf10/0x5450
[   20.562310]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   20.562352]  ? __kmalloc_cache_noprof+0x189/0x420
[   20.562396]  ? kasan_atomics+0x152/0x310
[   20.562447]  kasan_atomics+0x1dc/0x310
[   20.562497]  ? __pfx_kasan_atomics+0x10/0x10
[   20.562549]  ? __pfx_read_tsc+0x10/0x10
[   20.562602]  ? ktime_get_ts64+0x86/0x230
[   20.562666]  kunit_try_run_case+0x1a5/0x480
[   20.562720]  ? __pfx_kunit_try_run_case+0x10/0x10
[   20.562775]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   20.562829]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   20.562872]  ? __kthread_parkme+0x82/0x180
[   20.562913]  ? preempt_count_sub+0x50/0x80
[   20.562950]  ? __pfx_kunit_try_run_case+0x10/0x10
[   20.562977]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   20.563018]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   20.563046]  kthread+0x337/0x6f0
[   20.563069]  ? trace_preempt_on+0x20/0xc0
[   20.563097]  ? __pfx_kthread+0x10/0x10
[   20.563120]  ? _raw_spin_unlock_irq+0x47/0x80
[   20.563144]  ? calculate_sigpending+0x7b/0xa0
[   20.563171]  ? __pfx_kthread+0x10/0x10
[   20.563195]  ret_from_fork+0x116/0x1d0
[   20.563216]  ? __pfx_kthread+0x10/0x10
[   20.563239]  ret_from_fork_asm+0x1a/0x30
[   20.563285]  </TASK>
[   20.563301] 
[   20.576967] Allocated by task 282:
[   20.577298]  kasan_save_stack+0x45/0x70
[   20.577543]  kasan_save_track+0x18/0x40
[   20.578151]  kasan_save_alloc_info+0x3b/0x50
[   20.578494]  __kasan_kmalloc+0xb7/0xc0
[   20.578925]  __kmalloc_cache_noprof+0x189/0x420
[   20.579597]  kasan_atomics+0x95/0x310
[   20.580017]  kunit_try_run_case+0x1a5/0x480
[   20.580221]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   20.580427]  kthread+0x337/0x6f0
[   20.580614]  ret_from_fork+0x116/0x1d0
[   20.581212]  ret_from_fork_asm+0x1a/0x30
[   20.581902] 
[   20.582022] The buggy address belongs to the object at ffff888102b66500
[   20.582022]  which belongs to the cache kmalloc-64 of size 64
[   20.583388] The buggy address is located 0 bytes to the right of
[   20.583388]  allocated 48-byte region [ffff888102b66500, ffff888102b66530)
[   20.584313] 
[   20.584524] The buggy address belongs to the physical page:
[   20.585016] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b66
[   20.585884] flags: 0x200000000000000(node=0|zone=2)
[   20.586128] page_type: f5(slab)
[   20.586299] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   20.587439] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   20.587938] page dumped because: kasan: bad access detected
[   20.588466] 
[   20.588646] Memory state around the buggy address:
[   20.589070]  ffff888102b66400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.589352]  ffff888102b66480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.590423] >ffff888102b66500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   20.590794]                                      ^
[   20.591150]  ffff888102b66580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.591544]  ffff888102b66600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.592079] ==================================================================
[   19.918499] ==================================================================
[   19.919459] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b54/0x5450
[   19.919848] Read of size 4 at addr ffff888102b66530 by task kunit_try_catch/282
[   19.920312] 
[   19.920502] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250512 #1 PREEMPT(voluntary) 
[   19.920603] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.920620] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   19.920650] Call Trace:
[   19.920689]  <TASK>
[   19.920725]  dump_stack_lvl+0x73/0xb0
[   19.920788]  print_report+0xd1/0x650
[   19.920836]  ? __virt_addr_valid+0x1db/0x2d0
[   19.920887]  ? kasan_atomics_helper+0x4b54/0x5450
[   19.920932]  ? kasan_complete_mode_report_info+0x2a/0x200
[   19.920974]  ? kasan_atomics_helper+0x4b54/0x5450
[   19.921010]  kasan_report+0x141/0x180
[   19.921041]  ? kasan_atomics_helper+0x4b54/0x5450
[   19.921078]  __asan_report_load4_noabort+0x18/0x20
[   19.921104]  kasan_atomics_helper+0x4b54/0x5450
[   19.921129]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   19.921156]  ? __kmalloc_cache_noprof+0x189/0x420
[   19.921180]  ? kasan_atomics+0x152/0x310
[   19.921208]  kasan_atomics+0x1dc/0x310
[   19.921233]  ? __pfx_kasan_atomics+0x10/0x10
[   19.921279]  ? __pfx_read_tsc+0x10/0x10
[   19.921307]  ? ktime_get_ts64+0x86/0x230
[   19.921335]  kunit_try_run_case+0x1a5/0x480
[   19.921362]  ? __pfx_kunit_try_run_case+0x10/0x10
[   19.921387]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   19.921413]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   19.921438]  ? __kthread_parkme+0x82/0x180
[   19.921462]  ? preempt_count_sub+0x50/0x80
[   19.921489]  ? __pfx_kunit_try_run_case+0x10/0x10
[   19.921515]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   19.921541]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   19.921566]  kthread+0x337/0x6f0
[   19.921588]  ? trace_preempt_on+0x20/0xc0
[   19.921614]  ? __pfx_kthread+0x10/0x10
[   19.921638]  ? _raw_spin_unlock_irq+0x47/0x80
[   19.921667]  ? calculate_sigpending+0x7b/0xa0
[   19.922339]  ? __pfx_kthread+0x10/0x10
[   19.922369]  ret_from_fork+0x116/0x1d0
[   19.922394]  ? __pfx_kthread+0x10/0x10
[   19.922418]  ret_from_fork_asm+0x1a/0x30
[   19.922451]  </TASK>
[   19.922465] 
[   19.936612] Allocated by task 282:
[   19.937075]  kasan_save_stack+0x45/0x70
[   19.937793]  kasan_save_track+0x18/0x40
[   19.938023]  kasan_save_alloc_info+0x3b/0x50
[   19.938472]  __kasan_kmalloc+0xb7/0xc0
[   19.938985]  __kmalloc_cache_noprof+0x189/0x420
[   19.939616]  kasan_atomics+0x95/0x310
[   19.939881]  kunit_try_run_case+0x1a5/0x480
[   19.940768]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   19.941128]  kthread+0x337/0x6f0
[   19.941242]  ret_from_fork+0x116/0x1d0
[   19.941417]  ret_from_fork_asm+0x1a/0x30
[   19.941532] 
[   19.941594] The buggy address belongs to the object at ffff888102b66500
[   19.941594]  which belongs to the cache kmalloc-64 of size 64
[   19.942103] The buggy address is located 0 bytes to the right of
[   19.942103]  allocated 48-byte region [ffff888102b66500, ffff888102b66530)
[   19.943674] 
[   19.943959] The buggy address belongs to the physical page:
[   19.944444] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b66
[   19.945417] flags: 0x200000000000000(node=0|zone=2)
[   19.945822] page_type: f5(slab)
[   19.946420] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   19.946913] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.947552] page dumped because: kasan: bad access detected
[   19.948462] 
[   19.948850] Memory state around the buggy address:
[   19.949542]  ffff888102b66400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.950326]  ffff888102b66480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.950781] >ffff888102b66500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.951323]                                      ^
[   19.952087]  ffff888102b66580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.953326]  ffff888102b66600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.953765] ==================================================================
[   21.542398] ==================================================================
[   21.543033] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4f71/0x5450
[   21.543681] Read of size 8 at addr ffff888102b66530 by task kunit_try_catch/282
[   21.544217] 
[   21.544453] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250512 #1 PREEMPT(voluntary) 
[   21.544560] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.544588] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   21.544632] Call Trace:
[   21.544700]  <TASK>
[   21.544746]  dump_stack_lvl+0x73/0xb0
[   21.544813]  print_report+0xd1/0x650
[   21.544867]  ? __virt_addr_valid+0x1db/0x2d0
[   21.544923]  ? kasan_atomics_helper+0x4f71/0x5450
[   21.544975]  ? kasan_complete_mode_report_info+0x2a/0x200
[   21.545028]  ? kasan_atomics_helper+0x4f71/0x5450
[   21.545079]  kasan_report+0x141/0x180
[   21.545132]  ? kasan_atomics_helper+0x4f71/0x5450
[   21.545198]  __asan_report_load8_noabort+0x18/0x20
[   21.545247]  kasan_atomics_helper+0x4f71/0x5450
[   21.545315]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   21.545368]  ? __kmalloc_cache_noprof+0x189/0x420
[   21.545420]  ? kasan_atomics+0x152/0x310
[   21.545478]  kasan_atomics+0x1dc/0x310
[   21.545532]  ? __pfx_kasan_atomics+0x10/0x10
[   21.545588]  ? __pfx_read_tsc+0x10/0x10
[   21.545635]  ? ktime_get_ts64+0x86/0x230
[   21.545724]  kunit_try_run_case+0x1a5/0x480
[   21.545771]  ? __pfx_kunit_try_run_case+0x10/0x10
[   21.545815]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   21.545864]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   21.545912]  ? __kthread_parkme+0x82/0x180
[   21.545948]  ? preempt_count_sub+0x50/0x80
[   21.545993]  ? __pfx_kunit_try_run_case+0x10/0x10
[   21.546040]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   21.546080]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   21.546121]  kthread+0x337/0x6f0
[   21.546161]  ? trace_preempt_on+0x20/0xc0
[   21.546210]  ? __pfx_kthread+0x10/0x10
[   21.546249]  ? _raw_spin_unlock_irq+0x47/0x80
[   21.546302]  ? calculate_sigpending+0x7b/0xa0
[   21.546352]  ? __pfx_kthread+0x10/0x10
[   21.546398]  ret_from_fork+0x116/0x1d0
[   21.546437]  ? __pfx_kthread+0x10/0x10
[   21.546480]  ret_from_fork_asm+0x1a/0x30
[   21.546544]  </TASK>
[   21.546570] 
[   21.556985] Allocated by task 282:
[   21.557200]  kasan_save_stack+0x45/0x70
[   21.557479]  kasan_save_track+0x18/0x40
[   21.557853]  kasan_save_alloc_info+0x3b/0x50
[   21.558231]  __kasan_kmalloc+0xb7/0xc0
[   21.558581]  __kmalloc_cache_noprof+0x189/0x420
[   21.558996]  kasan_atomics+0x95/0x310
[   21.559312]  kunit_try_run_case+0x1a5/0x480
[   21.559691]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   21.559963]  kthread+0x337/0x6f0
[   21.560270]  ret_from_fork+0x116/0x1d0
[   21.560482]  ret_from_fork_asm+0x1a/0x30
[   21.560810] 
[   21.560978] The buggy address belongs to the object at ffff888102b66500
[   21.560978]  which belongs to the cache kmalloc-64 of size 64
[   21.561531] The buggy address is located 0 bytes to the right of
[   21.561531]  allocated 48-byte region [ffff888102b66500, ffff888102b66530)
[   21.562213] 
[   21.562424] The buggy address belongs to the physical page:
[   21.562763] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b66
[   21.563182] flags: 0x200000000000000(node=0|zone=2)
[   21.563431] page_type: f5(slab)
[   21.563624] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   21.563950] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   21.564233] page dumped because: kasan: bad access detected
[   21.564647] 
[   21.564842] Memory state around the buggy address:
[   21.565190]  ffff888102b66400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.565706]  ffff888102b66480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.566255] >ffff888102b66500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   21.566820]                                      ^
[   21.567203]  ffff888102b66580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.567775]  ffff888102b66600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.568319] ==================================================================
[   21.219432] ==================================================================
[   21.220138] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x194a/0x5450
[   21.220599] Write of size 8 at addr ffff888102b66530 by task kunit_try_catch/282
[   21.221353] 
[   21.221511] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250512 #1 PREEMPT(voluntary) 
[   21.221597] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.221618] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   21.221678] Call Trace:
[   21.221719]  <TASK>
[   21.221757]  dump_stack_lvl+0x73/0xb0
[   21.221820]  print_report+0xd1/0x650
[   21.221894]  ? __virt_addr_valid+0x1db/0x2d0
[   21.221939]  ? kasan_atomics_helper+0x194a/0x5450
[   21.221983]  ? kasan_complete_mode_report_info+0x2a/0x200
[   21.222030]  ? kasan_atomics_helper+0x194a/0x5450
[   21.222097]  kasan_report+0x141/0x180
[   21.222147]  ? kasan_atomics_helper+0x194a/0x5450
[   21.222207]  kasan_check_range+0x10c/0x1c0
[   21.222277]  __kasan_check_write+0x18/0x20
[   21.222321]  kasan_atomics_helper+0x194a/0x5450
[   21.222367]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   21.222416]  ? __kmalloc_cache_noprof+0x189/0x420
[   21.222483]  ? kasan_atomics+0x152/0x310
[   21.222538]  kasan_atomics+0x1dc/0x310
[   21.222589]  ? __pfx_kasan_atomics+0x10/0x10
[   21.222642]  ? __pfx_read_tsc+0x10/0x10
[   21.222716]  ? ktime_get_ts64+0x86/0x230
[   21.222762]  kunit_try_run_case+0x1a5/0x480
[   21.222811]  ? __pfx_kunit_try_run_case+0x10/0x10
[   21.222858]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   21.222928]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   21.222998]  ? __kthread_parkme+0x82/0x180
[   21.223061]  ? preempt_count_sub+0x50/0x80
[   21.223125]  ? __pfx_kunit_try_run_case+0x10/0x10
[   21.223180]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   21.223244]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   21.223320]  kthread+0x337/0x6f0
[   21.223380]  ? trace_preempt_on+0x20/0xc0
[   21.223433]  ? __pfx_kthread+0x10/0x10
[   21.223492]  ? _raw_spin_unlock_irq+0x47/0x80
[   21.223549]  ? calculate_sigpending+0x7b/0xa0
[   21.223612]  ? __pfx_kthread+0x10/0x10
[   21.223699]  ret_from_fork+0x116/0x1d0
[   21.223758]  ? __pfx_kthread+0x10/0x10
[   21.223807]  ret_from_fork_asm+0x1a/0x30
[   21.223898]  </TASK>
[   21.223928] 
[   21.234350] Allocated by task 282:
[   21.234618]  kasan_save_stack+0x45/0x70
[   21.234998]  kasan_save_track+0x18/0x40
[   21.235233]  kasan_save_alloc_info+0x3b/0x50
[   21.235484]  __kasan_kmalloc+0xb7/0xc0
[   21.235753]  __kmalloc_cache_noprof+0x189/0x420
[   21.235999]  kasan_atomics+0x95/0x310
[   21.236223]  kunit_try_run_case+0x1a5/0x480
[   21.236605]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   21.237088]  kthread+0x337/0x6f0
[   21.237429]  ret_from_fork+0x116/0x1d0
[   21.237784]  ret_from_fork_asm+0x1a/0x30
[   21.238145] 
[   21.238390] The buggy address belongs to the object at ffff888102b66500
[   21.238390]  which belongs to the cache kmalloc-64 of size 64
[   21.239735] The buggy address is located 0 bytes to the right of
[   21.239735]  allocated 48-byte region [ffff888102b66500, ffff888102b66530)
[   21.240506] 
[   21.240636] The buggy address belongs to the physical page:
[   21.241836] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b66
[   21.242161] flags: 0x200000000000000(node=0|zone=2)
[   21.242410] page_type: f5(slab)
[   21.242595] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   21.245609] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   21.246142] page dumped because: kasan: bad access detected
[   21.246518] 
[   21.246648] Memory state around the buggy address:
[   21.247619]  ffff888102b66400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.247934]  ffff888102b66480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.248468] >ffff888102b66500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   21.249009]                                      ^
[   21.249418]  ffff888102b66580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.249922]  ffff888102b66600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.250411] ==================================================================
[   21.190799] ==================================================================
[   21.191332] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x18b1/0x5450
[   21.191698] Write of size 8 at addr ffff888102b66530 by task kunit_try_catch/282
[   21.191990] 
[   21.192138] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250512 #1 PREEMPT(voluntary) 
[   21.192275] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.192298] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   21.192334] Call Trace:
[   21.192371]  <TASK>
[   21.192406]  dump_stack_lvl+0x73/0xb0
[   21.192455]  print_report+0xd1/0x650
[   21.192492]  ? __virt_addr_valid+0x1db/0x2d0
[   21.192528]  ? kasan_atomics_helper+0x18b1/0x5450
[   21.192565]  ? kasan_complete_mode_report_info+0x2a/0x200
[   21.192608]  ? kasan_atomics_helper+0x18b1/0x5450
[   21.192707]  kasan_report+0x141/0x180
[   21.192758]  ? kasan_atomics_helper+0x18b1/0x5450
[   21.192812]  kasan_check_range+0x10c/0x1c0
[   21.192877]  __kasan_check_write+0x18/0x20
[   21.192918]  kasan_atomics_helper+0x18b1/0x5450
[   21.192962]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   21.193005]  ? __kmalloc_cache_noprof+0x189/0x420
[   21.193050]  ? kasan_atomics+0x152/0x310
[   21.193097]  kasan_atomics+0x1dc/0x310
[   21.193138]  ? __pfx_kasan_atomics+0x10/0x10
[   21.193188]  ? __pfx_read_tsc+0x10/0x10
[   21.193268]  ? ktime_get_ts64+0x86/0x230
[   21.193323]  kunit_try_run_case+0x1a5/0x480
[   21.193373]  ? __pfx_kunit_try_run_case+0x10/0x10
[   21.193424]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   21.193476]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   21.193525]  ? __kthread_parkme+0x82/0x180
[   21.193574]  ? preempt_count_sub+0x50/0x80
[   21.193629]  ? __pfx_kunit_try_run_case+0x10/0x10
[   21.193732]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   21.193785]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   21.193835]  kthread+0x337/0x6f0
[   21.193879]  ? trace_preempt_on+0x20/0xc0
[   21.193930]  ? __pfx_kthread+0x10/0x10
[   21.193996]  ? _raw_spin_unlock_irq+0x47/0x80
[   21.194044]  ? calculate_sigpending+0x7b/0xa0
[   21.194095]  ? __pfx_kthread+0x10/0x10
[   21.194143]  ret_from_fork+0x116/0x1d0
[   21.194186]  ? __pfx_kthread+0x10/0x10
[   21.194253]  ret_from_fork_asm+0x1a/0x30
[   21.194333]  </TASK>
[   21.194359] 
[   21.206166] Allocated by task 282:
[   21.206498]  kasan_save_stack+0x45/0x70
[   21.206848]  kasan_save_track+0x18/0x40
[   21.207118]  kasan_save_alloc_info+0x3b/0x50
[   21.207373]  __kasan_kmalloc+0xb7/0xc0
[   21.207567]  __kmalloc_cache_noprof+0x189/0x420
[   21.207834]  kasan_atomics+0x95/0x310
[   21.208062]  kunit_try_run_case+0x1a5/0x480
[   21.208317]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   21.208792]  kthread+0x337/0x6f0
[   21.209105]  ret_from_fork+0x116/0x1d0
[   21.209458]  ret_from_fork_asm+0x1a/0x30
[   21.209845] 
[   21.210029] The buggy address belongs to the object at ffff888102b66500
[   21.210029]  which belongs to the cache kmalloc-64 of size 64
[   21.210942] The buggy address is located 0 bytes to the right of
[   21.210942]  allocated 48-byte region [ffff888102b66500, ffff888102b66530)
[   21.211913] 
[   21.212126] The buggy address belongs to the physical page:
[   21.212434] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b66
[   21.212926] flags: 0x200000000000000(node=0|zone=2)
[   21.213317] page_type: f5(slab)
[   21.213616] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   21.214168] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   21.214568] page dumped because: kasan: bad access detected
[   21.214983] 
[   21.215137] Memory state around the buggy address:
[   21.215452]  ffff888102b66400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.215858]  ffff888102b66480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.216407] >ffff888102b66500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   21.216897]                                      ^
[   21.217199]  ffff888102b66580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.217621]  ffff888102b66600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.218156] ==================================================================
[   21.163168] ==================================================================
[   21.163783] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1818/0x5450
[   21.164349] Write of size 8 at addr ffff888102b66530 by task kunit_try_catch/282
[   21.164700] 
[   21.164927] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250512 #1 PREEMPT(voluntary) 
[   21.165010] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.165031] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   21.165068] Call Trace:
[   21.165104]  <TASK>
[   21.165138]  dump_stack_lvl+0x73/0xb0
[   21.165189]  print_report+0xd1/0x650
[   21.165230]  ? __virt_addr_valid+0x1db/0x2d0
[   21.165288]  ? kasan_atomics_helper+0x1818/0x5450
[   21.165333]  ? kasan_complete_mode_report_info+0x2a/0x200
[   21.165383]  ? kasan_atomics_helper+0x1818/0x5450
[   21.165433]  kasan_report+0x141/0x180
[   21.165485]  ? kasan_atomics_helper+0x1818/0x5450
[   21.165542]  kasan_check_range+0x10c/0x1c0
[   21.165594]  __kasan_check_write+0x18/0x20
[   21.165632]  kasan_atomics_helper+0x1818/0x5450
[   21.165717]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   21.165790]  ? __kmalloc_cache_noprof+0x189/0x420
[   21.165839]  ? kasan_atomics+0x152/0x310
[   21.165901]  kasan_atomics+0x1dc/0x310
[   21.165947]  ? __pfx_kasan_atomics+0x10/0x10
[   21.165996]  ? __pfx_read_tsc+0x10/0x10
[   21.166039]  ? ktime_get_ts64+0x86/0x230
[   21.166093]  kunit_try_run_case+0x1a5/0x480
[   21.166150]  ? __pfx_kunit_try_run_case+0x10/0x10
[   21.166194]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   21.166240]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   21.166302]  ? __kthread_parkme+0x82/0x180
[   21.166372]  ? preempt_count_sub+0x50/0x80
[   21.166421]  ? __pfx_kunit_try_run_case+0x10/0x10
[   21.166475]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   21.166522]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   21.166591]  kthread+0x337/0x6f0
[   21.166637]  ? trace_preempt_on+0x20/0xc0
[   21.166724]  ? __pfx_kthread+0x10/0x10
[   21.166766]  ? _raw_spin_unlock_irq+0x47/0x80
[   21.166806]  ? calculate_sigpending+0x7b/0xa0
[   21.166842]  ? __pfx_kthread+0x10/0x10
[   21.166868]  ret_from_fork+0x116/0x1d0
[   21.166890]  ? __pfx_kthread+0x10/0x10
[   21.166914]  ret_from_fork_asm+0x1a/0x30
[   21.166949]  </TASK>
[   21.166964] 
[   21.177555] Allocated by task 282:
[   21.177960]  kasan_save_stack+0x45/0x70
[   21.178291]  kasan_save_track+0x18/0x40
[   21.178534]  kasan_save_alloc_info+0x3b/0x50
[   21.178803]  __kasan_kmalloc+0xb7/0xc0
[   21.179033]  __kmalloc_cache_noprof+0x189/0x420
[   21.179285]  kasan_atomics+0x95/0x310
[   21.179617]  kunit_try_run_case+0x1a5/0x480
[   21.180029]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   21.180490]  kthread+0x337/0x6f0
[   21.180828]  ret_from_fork+0x116/0x1d0
[   21.181166]  ret_from_fork_asm+0x1a/0x30
[   21.181525] 
[   21.181746] The buggy address belongs to the object at ffff888102b66500
[   21.181746]  which belongs to the cache kmalloc-64 of size 64
[   21.182470] The buggy address is located 0 bytes to the right of
[   21.182470]  allocated 48-byte region [ffff888102b66500, ffff888102b66530)
[   21.183067] 
[   21.183283] The buggy address belongs to the physical page:
[   21.183752] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b66
[   21.184189] flags: 0x200000000000000(node=0|zone=2)
[   21.184544] page_type: f5(slab)
[   21.184882] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   21.185214] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   21.185824] page dumped because: kasan: bad access detected
[   21.186199] 
[   21.186411] Memory state around the buggy address:
[   21.186722]  ffff888102b66400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.187064]  ffff888102b66480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.187425] >ffff888102b66500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   21.187993]                                      ^
[   21.188409]  ffff888102b66580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.188801]  ffff888102b66600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.189329] ==================================================================
[   21.103193] ==================================================================
[   21.104787] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x16e7/0x5450
[   21.105154] Write of size 8 at addr ffff888102b66530 by task kunit_try_catch/282
[   21.105597] 
[   21.105760] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250512 #1 PREEMPT(voluntary) 
[   21.105892] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.105923] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   21.105979] Call Trace:
[   21.106020]  <TASK>
[   21.106060]  dump_stack_lvl+0x73/0xb0
[   21.106122]  print_report+0xd1/0x650
[   21.106172]  ? __virt_addr_valid+0x1db/0x2d0
[   21.106243]  ? kasan_atomics_helper+0x16e7/0x5450
[   21.106302]  ? kasan_complete_mode_report_info+0x2a/0x200
[   21.106355]  ? kasan_atomics_helper+0x16e7/0x5450
[   21.106408]  kasan_report+0x141/0x180
[   21.106461]  ? kasan_atomics_helper+0x16e7/0x5450
[   21.106522]  kasan_check_range+0x10c/0x1c0
[   21.106573]  __kasan_check_write+0x18/0x20
[   21.106617]  kasan_atomics_helper+0x16e7/0x5450
[   21.106682]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   21.106726]  ? __kmalloc_cache_noprof+0x189/0x420
[   21.106790]  ? kasan_atomics+0x152/0x310
[   21.106846]  kasan_atomics+0x1dc/0x310
[   21.106899]  ? __pfx_kasan_atomics+0x10/0x10
[   21.106936]  ? __pfx_read_tsc+0x10/0x10
[   21.106962]  ? ktime_get_ts64+0x86/0x230
[   21.106997]  kunit_try_run_case+0x1a5/0x480
[   21.107036]  ? __pfx_kunit_try_run_case+0x10/0x10
[   21.107062]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   21.107088]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   21.107113]  ? __kthread_parkme+0x82/0x180
[   21.107137]  ? preempt_count_sub+0x50/0x80
[   21.107164]  ? __pfx_kunit_try_run_case+0x10/0x10
[   21.107191]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   21.107218]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   21.107243]  kthread+0x337/0x6f0
[   21.107295]  ? trace_preempt_on+0x20/0xc0
[   21.107324]  ? __pfx_kthread+0x10/0x10
[   21.107347]  ? _raw_spin_unlock_irq+0x47/0x80
[   21.107370]  ? calculate_sigpending+0x7b/0xa0
[   21.107447]  ? __pfx_kthread+0x10/0x10
[   21.107492]  ret_from_fork+0x116/0x1d0
[   21.107533]  ? __pfx_kthread+0x10/0x10
[   21.107566]  ret_from_fork_asm+0x1a/0x30
[   21.107611]  </TASK>
[   21.107626] 
[   21.118039] Allocated by task 282:
[   21.118456]  kasan_save_stack+0x45/0x70
[   21.118889]  kasan_save_track+0x18/0x40
[   21.119338]  kasan_save_alloc_info+0x3b/0x50
[   21.119824]  __kasan_kmalloc+0xb7/0xc0
[   21.120248]  __kmalloc_cache_noprof+0x189/0x420
[   21.120720]  kasan_atomics+0x95/0x310
[   21.121151]  kunit_try_run_case+0x1a5/0x480
[   21.121604]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   21.122144]  kthread+0x337/0x6f0
[   21.122458]  ret_from_fork+0x116/0x1d0
[   21.122872]  ret_from_fork_asm+0x1a/0x30
[   21.123282] 
[   21.123440] The buggy address belongs to the object at ffff888102b66500
[   21.123440]  which belongs to the cache kmalloc-64 of size 64
[   21.124034] The buggy address is located 0 bytes to the right of
[   21.124034]  allocated 48-byte region [ffff888102b66500, ffff888102b66530)
[   21.124843] 
[   21.125013] The buggy address belongs to the physical page:
[   21.125255] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b66
[   21.125911] flags: 0x200000000000000(node=0|zone=2)
[   21.126197] page_type: f5(slab)
[   21.126474] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   21.127012] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   21.127326] page dumped because: kasan: bad access detected
[   21.127773] 
[   21.127964] Memory state around the buggy address:
[   21.128446]  ffff888102b66400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.128919]  ffff888102b66480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.129216] >ffff888102b66500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   21.129801]                                      ^
[   21.130110]  ffff888102b66580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.130398]  ffff888102b66600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.131035] ==================================================================
[   21.596241] ==================================================================
[   21.596878] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4f98/0x5450
[   21.597460] Read of size 8 at addr ffff888102b66530 by task kunit_try_catch/282
[   21.597984] 
[   21.598205] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250512 #1 PREEMPT(voluntary) 
[   21.599566] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.599609] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   21.599688] Call Trace:
[   21.599734]  <TASK>
[   21.599774]  dump_stack_lvl+0x73/0xb0
[   21.599849]  print_report+0xd1/0x650
[   21.599897]  ? __virt_addr_valid+0x1db/0x2d0
[   21.599946]  ? kasan_atomics_helper+0x4f98/0x5450
[   21.599992]  ? kasan_complete_mode_report_info+0x2a/0x200
[   21.600038]  ? kasan_atomics_helper+0x4f98/0x5450
[   21.600085]  kasan_report+0x141/0x180
[   21.600132]  ? kasan_atomics_helper+0x4f98/0x5450
[   21.600190]  __asan_report_load8_noabort+0x18/0x20
[   21.600239]  kasan_atomics_helper+0x4f98/0x5450
[   21.600306]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   21.600358]  ? __kmalloc_cache_noprof+0x189/0x420
[   21.600410]  ? kasan_atomics+0x152/0x310
[   21.600471]  kasan_atomics+0x1dc/0x310
[   21.600525]  ? __pfx_kasan_atomics+0x10/0x10
[   21.600580]  ? __pfx_read_tsc+0x10/0x10
[   21.600628]  ? ktime_get_ts64+0x86/0x230
[   21.600720]  kunit_try_run_case+0x1a5/0x480
[   21.600778]  ? __pfx_kunit_try_run_case+0x10/0x10
[   21.600830]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   21.600883]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   21.600935]  ? __kthread_parkme+0x82/0x180
[   21.600983]  ? preempt_count_sub+0x50/0x80
[   21.601040]  ? __pfx_kunit_try_run_case+0x10/0x10
[   21.601092]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   21.601144]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   21.601195]  kthread+0x337/0x6f0
[   21.601240]  ? trace_preempt_on+0x20/0xc0
[   21.601301]  ? __pfx_kthread+0x10/0x10
[   21.601347]  ? _raw_spin_unlock_irq+0x47/0x80
[   21.601387]  ? calculate_sigpending+0x7b/0xa0
[   21.601435]  ? __pfx_kthread+0x10/0x10
[   21.601479]  ret_from_fork+0x116/0x1d0
[   21.601522]  ? __pfx_kthread+0x10/0x10
[   21.601571]  ret_from_fork_asm+0x1a/0x30
[   21.601641]  </TASK>
[   21.601701] 
[   21.611387] Allocated by task 282:
[   21.611730]  kasan_save_stack+0x45/0x70
[   21.612103]  kasan_save_track+0x18/0x40
[   21.612434]  kasan_save_alloc_info+0x3b/0x50
[   21.612806]  __kasan_kmalloc+0xb7/0xc0
[   21.613009]  __kmalloc_cache_noprof+0x189/0x420
[   21.613223]  kasan_atomics+0x95/0x310
[   21.613561]  kunit_try_run_case+0x1a5/0x480
[   21.613969]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   21.614393]  kthread+0x337/0x6f0
[   21.615748]  ret_from_fork+0x116/0x1d0
[   21.616096]  ret_from_fork_asm+0x1a/0x30
[   21.616316] 
[   21.616440] The buggy address belongs to the object at ffff888102b66500
[   21.616440]  which belongs to the cache kmalloc-64 of size 64
[   21.616897] The buggy address is located 0 bytes to the right of
[   21.616897]  allocated 48-byte region [ffff888102b66500, ffff888102b66530)
[   21.619217] 
[   21.619430] The buggy address belongs to the physical page:
[   21.619865] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b66
[   21.620476] flags: 0x200000000000000(node=0|zone=2)
[   21.620922] page_type: f5(slab)
[   21.621126] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   21.621606] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   21.622114] page dumped because: kasan: bad access detected
[   21.622374] 
[   21.622491] Memory state around the buggy address:
[   21.622739]  ffff888102b66400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.623023]  ffff888102b66480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.623515] >ffff888102b66500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   21.624086]                                      ^
[   21.624480]  ffff888102b66580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.625052]  ffff888102b66600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.625429] ==================================================================